Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,860 Article Results

Design and Evaluation of Submersible 11/0.415kV Distribution Substation for Flood Prone Areas

10.12928/telkomnika.v15i4.7232
M.; Kawasan Institusi Penyelidikan, Malaysia D. M. Amir , S.; Kawasan Institusi Penyelidikan, Malaysia Ishak , A.; Kawasan Institusi Penyelidikan, Malaysia Raj Gopal
Flood levels exceeding 2 metres above ground level has been observed causing electrical equipment in the 11/0.415kV substation to be fully submerged. This caused widespread supply disruption as the equipment need to be switched off due to safety reasons and prevention of further equipment damage. The use of submersible equipment and accessories has been identified as one of the mitigation methods to ensure continuous electrical supply during flood events. A research project was undertaken to develop the design criteria of the selection of submersible equipment and accessories as well as to develop the test method and evaluate the selected submersible equipment and accessories in a substation configuration. All the equipment could continuously operate in ON condition during the wet test. However, design improvements are suggested for the submersible switchgear and feeder pillar for better performance during and after flood events.
Volume: 15
Issue: 4
Page: 1540-1546
Publish at: 2017-12-01

Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style

10.11591/ijece.v7i6.pp3332-3343
Rakesh Ahuja , S. S. Bedi
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
Volume: 7
Issue: 6
Page: 3332-3343
Publish at: 2017-12-01

Sentiment Mining of Community Development Program Evaluation Based on Social Media

10.12928/telkomnika.v15i4.4633
Siti; Bogor Agricultural University, Indonesia Yuliyanti , Taufik; Bogor Agricultural University, Indonesia Djatna , Heru; Bogor Agricultural University, Indonesia Sukoco
It is crucial to support community-oriented services for youth awareness in the social media with knowledge extraction, which would be useful for both government agencies and community group of interest for program evaluation. This work provided to formulate effective evaluation on community development program and addressing them to a correct action. By using classification based SVM, evaluation of the achievement level conducted in both quantitative and qualitative analysis, particularly to conclude which activities has high success rate. By using social media based activities, this study searched the sentiment analysis from every activities comments based on their tweet. First, we kicked off preprocessing stage, reducing feature space by using principle of component analysis and estimate parameters for classification purposes. Second, we modeled activity classification by using support vector machine. At last, set term score by calculating term frequency, which combined with term sentiment scores based on lexicon.The result shows that models provided sentiment summarization that point out the success level of positive sentiment.
Volume: 15
Issue: 4
Page: 1858-1864
Publish at: 2017-12-01

Hierarchy Process Mining from Multi-Source Logs

10.12928/telkomnika.v15i4.6326
Riyanarto; Institut Teknologi Sepuluh Nopember, Indonesia Sarno , Yutika Amelia; Institut Teknologi Sepuluh Nopember, Indonesia Effendi
Nowadays, large-scale business processes is growing rapidly; in this regards process mining is required to discover and enhance business processes in different departments of an organization. A process mining algorithm can generally discover the process model of an organization without considering the detailed process models of the departments, and the relationship among departments. The exchange of messages among departments can produce asynchronous activities among department process models. The event logs from departments can be considered as multi-source logs, which cause difficulties in mining the process model. Discovering process models from multi-source logs is still in the state of the art, therefore this paper proposes a hierarchy high-to-low process mining approach to discover the process model from a complex multi-source and heterogeneous event logs collected from distributed departments. The proposed method involves three steps; i.e. firstly a high level process model is developed; secondly a separate low level process model is discovered from multi-source logs; finally the Petri net refinement operation is used to integrate the discovered process models. The refinement operation replaced the abctract transitions of a high level process model with the corresponding low level process models. Multi-source event logs from several departments of a yarn manufacturing were used in the computational study, and the results showed that the proposed method combined with the modified time-based heuristics miner could discover a correct parallel process business model containing XOR, AND, and OR relations.
Volume: 15
Issue: 4
Page: 1955-1970
Publish at: 2017-12-01

IMC Based Fractional Order Controller for Three Interacting Tank Process

10.12928/telkomnika.v15i4.5784
Abdul Wahid; NIT Jamshedpur, India Nasir , Idamakanti; NIT Jamshedpur, India Kasireddy , Arun Kumar; NIT Jamshedpur, India Singh
In model based control, performance of the controlled plant considerably depends on the accuracy of real plant being modelled. In present work, an attempt has been made to design Internal Model Control (IMC), for three interacting tank process for liquid level control. To avoid complexities in controller design, the third order three interacting tank process is modelled to First Order Plus Dead Time (FOPDT) model. Exploiting the admirable features of Fractional Calculus, the higher order model is also modelled to Fractional Order First Order Plus Dead Time (FO-FOPDT) model, which further reduces the modelling error. Moving to control section, different IMC schemes have been proposed, where the fractional order filter is introduced along with the conventional integer order filter. Various simulations have been performed to show the greatness of Fractional order modelled system & fractional order filters over conventional integer order modelled system & integer order filters respectively. Both for parameters estimation of reduced order model and filter tuning, Genetic Algorithm (GA) is being applied.  
Volume: 15
Issue: 4
Page: 1723-1732
Publish at: 2017-12-01

Determining the Optimum Number of Paths for Realization of Multi-path Routing in MPLS-TE Networks

10.12928/telkomnika.v15i4.6597
Mohammad; Philadelphia University, Jordan Alhihi , Mohammad Reza; Shiraz University of Technology, Iran Khosravi , Hani; Philadelphia University, Jordan Attar , Mohammad; Philadelphia University, Jordan Samour
Multi-Protocol Label Switching for Traffic Engineering (MPLS-TE) technology is an intelligent and advanced tool for handling traffic through the core networks and implementing new services based on virtual transport. Since MPLS-TE combines channel and network layer mechanisms, network administrators can optimally integrate and allocate the traffic loads while maintaining the speed of technologies such as Asynchronous Transfer Mode (ATM) technology. In this paper, the problem of the developed algorithm of multi-path routing which allows us to determine the optimum number of independent shortest paths is theoretically solved. In details, the article proposes a way for finding the set of shortest paths using Dijkstra's algorithm, and then determination of the maximum flow for each of the shortest paths based on the mathematical concepts and finally, introducing the solution of the multi-criteria optimization problem for a set of shortest paths. According to our approach, optimizing the use of resources in the core networks is possible with using the MPLS-TE technology.
Volume: 15
Issue: 4
Page: 1701-1709
Publish at: 2017-12-01

Immensely Discriminate Routing in Wireless Networks

10.11591/ijeecs.v8.i3.pp712-714
Sujatha V , E. A. Mary Anitha
Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Volume: 8
Issue: 3
Page: 712-714
Publish at: 2017-12-01

Effectiveness Leadership of Principal

10.11591/ijere.v6i4.10774
Rudolf Kempa , Marthen Ulorlo , Izaak Hendrik Wenno
Effective principal leadership is a leadership that can foster cooperative efforts and maintain an ideal working climate in schools. The purpose of this research is to know the effectiveness leadership of the principal of the 2nd State Junior High School of Ambon, with qualitative approach. Data sources include school principals, vice principals, heads of administration, heads of affairs, library coordinators, teacher subject coordinators, counselors coordinators, and school supervisors. Data collection techniques through Focus Group Discussion, Interview, Observation, and documentation study. The analysis technique used is descriptive narrative. The results concluded that the leadership style of principal in the 2nd State Junior High School of Ambon has not been effective.
Volume: 6
Issue: 4
Page: 306-311
Publish at: 2017-12-01

NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem

10.11591/ijeecs.v8.i3.pp651-653
Paramasivam E , D. Arivazhaga
India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack issue that we are confront in our nation. The arrangement included a secured advanced payment framework that has reason assembled margins on the sum required in the exchange. Every exchange includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the bank at the time of year of exchange, a base support of banks is important to effectively execute this. There is no need of a web association, in this way making it available to all aspects of the nation.
Volume: 8
Issue: 3
Page: 651-653
Publish at: 2017-12-01

WareWise: Business Development Management Framework based on Device-to-Device Industrial Internet of Things

10.11591/ijeecs.v8.i3.pp747-750
Ramesh P. , V. Mathivanan
Internet of Things (IoT) - empowered data framework arrangements are developing in different spaces, for example, remote social insurance, keen coordination’s, farming et cetera. In the mean time, Business Development Management Frameworks (BDMF) has turned out to be promising instruments for driving and overseeing gadgets inside IoT frameworks. Be that as it may, past works have not completely tended to how the IoT-based BDMF can proceed with their execution when the included IoT gadgets don't have a dependable Internet association. In this paper, we propose a framework outline for decentralized device to device (D2D) - based BD execution, where versatile hubs have the ability of both executing BDs additionally moving BD execution to different hubs amid runtime. We apply this plan to the field of shrewd coordination’s, keeping in mind the end goal to empower savvy products checking. The exhibited merchandise observing arrangement empowers responding to occasions when they happen, while likewise producing a hint of the checking execution history. A model concentrating on the movement usefulness of the stage has been actualized and tried to assess its execution with regards to the specified savvy coordination’s situation.
Volume: 8
Issue: 3
Page: 747-750
Publish at: 2017-12-01

A Portable Insole Pressure Mapping System

10.12928/telkomnika.v15i4.7227
Kian; Universiti Tun Hussein Onn Malaysia Sek Tee , Yogindra; Universiti Tun Hussein Onn Malaysia Syam Hari Javahar , Hashim; Universiti Tun Hussein Onn Malaysia Saim , Wan; Universiti Tun Hussein Onn Malaysia Nurshazwani Wan Zakaria , Safinaz; University Kebangsaan Malaysia Binti Mohd Khialdin , Hazlita; University Kebangsaan Malaysia Isa , M.; Ain Shams University I. Awad , Chin; Universiti Tun Hussein Onn Malaysia Fhong Soon
The human locomotion is studied through gait analysis and is best observed instrumentally rather than observing visually. Thus, a portable insole pressure mapping system is built to assist in studying the human gait cycle. The pressure distribution is determined by instrumentally mapping the insole using force sensitive resistive sensors that are connected to Arduino UNO via cables. The values are saved into a secure digital card that could be post processed. Hardware and software design phase are executed for the development of this project. The outcomes match to the knowledge of human gait definitions in static posture and normal walking.
Volume: 15
Issue: 4
Page: 1493-1500
Publish at: 2017-12-01

A Load-Balanced Parallelization of AKS Algorithm

10.12928/telkomnika.v15i4.6049
Ardhi Wiratama; Universitas Gadjah Mada, Indonesia Baskara Yudha , Reza; Universitas Gadjah Mada, Indonesia Pulungan
The best known deterministic polynomial-time algorithm for primality testing right now is due to Agrawal, Kayal, and Saxena. This algorithm has a time complexity O(log^{15/2}(n)). Although this algorithm is polynomial, its reliance on the congruence of large polynomials results in enormous computational requirement. In this paper, we propose a parallelization technique for this algorithm based on message-passing parallelism together with four workload-distribution strategies. We perform a series of experiments on an implementation of this algorithm in a high-performance computing system consisting of 15 nodes, each with 4 CPU cores. The experiments indicate that our proposed parallelization technique introduce a significant speedup on existing implementations. Furthermore, the dynamic workload-distribution strategy performs better than the others. Overall, the experiments show that the parallelization obtains up to 36 times speedup. 
Volume: 15
Issue: 4
Page: 1883-1894
Publish at: 2017-12-01

Investigating Maturity State and Internal Properties of Fruits Using Non-destructive Techniques-a Review

10.12928/telkomnika.v15i4.7236
Mohd; Universiti Tun Hussein Onn, Malaysia Fadzli Abd Shaib , Ruzairi; Universiti Tun Hussein Onn, Malaysia Abdul Rahim , S.; Universiti Tun Hussein Onn, Malaysia Z. M. Muji , Azian; Universiti Teknologi Malaysia, Malaysia Abd Aziz Ahmad
The evaluation of internal condition of the fruit via destructive techniques mostly damaged the internal and external fruit structure. However, there are several non-destructive techniques available could be applied in the agricultural industry, specifically for observing internal fruit conditions. Different kinds of internal conditions of fruits are evaluated in terms of their quality and ripeness levels. These non-destructive techniques include fruit evaluation via ultrasonic measurement techniques, light spectroscopy, imaging via Magnetic Resonance Imaging (MRI) and X-Ray, computer vision, electric nose and also vibration. The capabilities and the effectiveness of these techniques towards fruit monitoring are thoroughly discussed. Besides, the drawback of these non-destructive technique has been analysed.
Volume: 15
Issue: 4
Page: 1574-1584
Publish at: 2017-12-01

The Competition Between ISPs in Presence of the Net Neutrality

10.11591/ijict.v6i3.pp166-178
Mohamed El Amrani , Hamid Garmani , Mohamed Baslam , Rachid El Ayachi
In this work, we present an economic model of computer networks that describes the in-teraction between Internet Service Providers (ISP ), customers and content provider. The competition between ISP s may be translated by the prices they require and the qualities of service (QoS) they offer. The customer demand for service from an ISP does not only de-pend on the price and quality of service (QoS) of the ISP , but it is influenced by all those offered by its competitors. This behavior has been extensively analyzed using game the-ory as a decision support tool. We interpret a non-neutral network when a content provider privileges ISP s by offering them more bandwidth to ensure proper QoS to support ap-plications that require more data transport capacity (voice over internet protocol (V OIP ) the live video streaming, online gaming). In addition, our work focuses on the price game analysis and QoS between ISP s in two cases: neutral network and non-neutral network. After showing the existence and uniqueness of equilibrium in terms of quality of service, we analyzed the impact of net neutrality on competition between ISP s. We also validated our theoretical study with numerical results, which show that the game has an equilibrium point which depends on all the parameters of the system.
Volume: 6
Issue: 3
Page: 166-178
Publish at: 2017-12-01

Investigation of the Optimal Position of Wind Sensors and Wind Turbines on a Building: A Computational Fluid Dynamics Study

10.11591/ijeecs.v8.i3.pp756-761
Leon Chan , Mohd Eqwan Bin Mohd Roslan , Hassan Bin Mohamed
Most numerical studies on flow over buildings simplify the geometry of the roof and assume that it is flat. This may lead to misrepresentation of the flow as the roof of actual buildings contains some sort of roughness. In this study, the flow over the administrative building of Universiti Tenaga Nasional is investigated for multidirectional flow conditions. The actual topology of the building is gridded and simulated using the steady-state Reynolds-averaged Navier-Stokes equation. Four points at the top of the building are identified and the wind statistics at these designated locations at three different heights are investigated. The optimal location with the highest average wind speed and consistent wind speeds for all wind angles is identified and is earmarked as a potential location to install the wind turbine. 
Volume: 8
Issue: 3
Page: 756-761
Publish at: 2017-12-01
Show 1376 of 1858

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration