Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Optimum Network Reconfiguration using Grey Wolf Optimizer

10.12928/telkomnika.v16i5.10271
Ridha Djamel; University of Djelfa Mohammedi , Rabie; Prince Sattam Bin Abdulaziz University Zine , Mustafa; Amar Telidji University of Laghouat Mosbah , Salem; Amar Telidji University of Laghouat Arif
The objective of this paper is to determine an optimal network reconfiguration that presents the minimum losses considering network constraints using Grey Wolf Optimizer (GWO) algorithm. The proposed algorithm was tested using some standard networks (33_bus, 69_bus, 84_busand 118_bus).
Volume: 16
Issue: 5
Page: 2428-2435
Publish at: 2018-10-01

HSO: A Hybrid Swarm Optimization Algorithm for Reducing Energy Consumption in the Cloudlets

10.12928/telkomnika.v16i5.9415
Raed A.; University Malaysia Pahang Hasan , Mostafa A.; University Politechnica of Bucharest Mohammed , Zeyad Hussein; Tikrit University Salih , Mohammed Ariff; University Malaysia Pahang Bin Ameedeen , Nicolae; University Politechnica of Bucharest Ţăpuş , Muamer N.; University Malaysia Pahang Mohammed
Mobile Cloud Computing (MCC) is an emerging technology for the improvement of mobile service quality. MCC resources are dynamically allocated to the users who pay for the resources based on their needs. The drawback of this process is that it is prone to failure and demands a high energy input. Resource providers mainly focus on resource performance and utilization with more consideration on the constraints of service level agreement (SLA). Resource performance can be achieved through virtualization techniques which facilitates the sharing of resource providers’ information between different virtual machines. To address these issues, this study sets forth a novel algorithm (HSO) that optimized energy efficiency resource management in the cloud; the process of the proposed method involves the use of the developed cost and runtime-effective model to create a minimum energy configuration of the cloud compute nodes while guaranteeing the maintenance of all minimum performances. The cost functions will cover energy, performance and reliability concerns. With the proposed model, the performance of the Hybrid swarm algorithm was significantly increased, as observed by optimizing the number of tasks through simulation, (power consumption was reduced by 42%). The simulation studies also showed a reduction in the number of required calculations by about 20% by the inclusion of the presented algorithms compared to the traditional static approach. There was also a decrease in the node loss which allowed the optimization algorithm to achieve a minimal overhead on cloud compute resources while still saving energy significantly. Conclusively, an energy-aware optimization model which describes the required system constraints was presented in this study, and a further proposal for techniques to determine the best overall solution was also made.
Volume: 16
Issue: 5
Page: 2144-2154
Publish at: 2018-10-01

Genetic Algorithm with Elitist-Tournament for Clashes-Free Slots of Lecturer Timetabling Problem

10.11591/ijeecs.v12.i1.pp303-309
Marina Yusoff , Anis Amalina Othman
Genetic algorithm (GA) approach is one of an evolutionary optimization technique relies on natural selection. The employment of GA still popular and it was applied to many real-world problems, especially in many combinatorial optimization solutions. Lecturer Timetabling Problem (LTP) has been researched for a few decades and produced good solutions. Although, some of LTP offers good results, the criteria and constraints of each LTP however are different from other universities. The LTP appears to be a tiresome job to the scheduler that involves scheduling of students, classes, lecturers and rooms at specific time-slots while satisfying all the necessary requirements to build a feasible timetable. This paper addresses the employment and evaluation of GA to overcome the biggest challenge in LTP to find clashes-free slots for lecturer based on a case study in the Faculty of Computer and Mathematical Sciences, University Technologi MARA, Malaysia. Hence, the performance of the GA is evaluated based on selection, mutation and crossover using different number of population size. A comparison of performance between simple GA with Tournament Selection scheme combined with Elitism (TE) and a GA with Tournament (T) selection scheme. The findings demonstrate that the embedded penalty measures and elitism composition provide good performance that satisfies all the constraints in producing timetables to lecturers. 
Volume: 12
Issue: 1
Page: 303-309
Publish at: 2018-10-01

Adaptive Multi-state Millimeter Wave Cell Selection Scheme for 5G communication

10.11591/ijece.v8i5.pp2967-2978
Mothana L Attiah , Azmi Awang Md Isa , Zahriladha Zakaria , Nor Fadzilah Abdullah , Mahamod Ismail , Rosdiadee Nordin
Millimeter wave bands have been introduced as one of the most promising solutions to alleviate the spectrum secrecy in the upcoming future cellular technology (5G) due the enormous amount of raw bandwidth available in these bands. However, the inherent propagation characteristics of mmWave frequencies could impose new challenges i.e. higher path loss, atmospheric absorption, and rain attenuation which in turn increase the outage probability and hence, degrading the overall system performance. Therefore, in this paper, a novel flexible scheme is proposed namely Adaptive Multi-State MmWave Cell Selection (AMSMC-S) through adopting three classes of mmWave base stations, able to operate at various mmWave carrier frequencies (73, 38 and 28 GHz). Two mmWave cellular Grid-Based cell deployment scenarios have been implemented with two inter-site-distances 200 m and 300 m, corresponding to target area of (2.1 km2) and (2.2 km2). The maximum SINR value at the user equipment (UE) is taken in to consideration to enrich the mobile user experience. Numerical results show an improvement of overall system performance, where the outage probability reduced significantly to zero while maintaining an acceptable performance of the 5G systems with approximately more than 50% of the mobile stations with more than 1Gbps data rate. 
Volume: 8
Issue: 5
Page: 2967-2978
Publish at: 2018-10-01

Website Content Analysis Using Clickstream Data and Apriori Algorithm

10.12928/telkomnika.v16i5.7573
Supriyadi; STMIK Kharisma Karawang Supriyadi , Yani; Bogor Agricultural University Nurhadryani , Arif Imam; Bogor Agricultural University Suroso
Clickstream analysis is the process of collecting, analyzing, and reporting data of visited pages by visitor at the time of mouse clicks. Clickstream data are generally stored on a web server in the access.log file including IP Address data, reference pages, and access time. This study aims to analyze clickstream data by converting into the form of a comma sparated value (csv) so that the string inside of it could be grouped and stored in a database. The important information in the database was processed and retrieved by using one of the techniques in web mining called apriori algorithm analysis. Apriori algorithm implementation was done at the time of reading the database and table query analysis on the software developed. Results of this study were the statistics describing the level of access to web pages that were very helpful for web developers to develop web sites.
Volume: 16
Issue: 5
Page: 2118-2126
Publish at: 2018-10-01

Direction of Arrival Using Uniform Circular Array based on 2-D MUSIC Algorithm

10.11591/ijeecs.v12.i1.pp30-37
Mohammed Amine Ihedrane , Seddik Bri
This study presents the conception, simulation, realisation and characterisation of a patch antenna for Wi-Fi. The antenna is designed at the frequency of 2.45 GHz; the dielectric substrate used is FR4_epoxy which has a dielectric permittivity of 4.4.this patch antenna is used to estimate the direction of arrival (DOA) using 2-D Multiple Signal Classification (2-D MUSIC) the case of the proposed  uniform circular arrays (UCA). The comparison between Uniform circular arrays and Uniform Linear arrays (ULA) demonstrate that the proposed structure give better angles resolutions compared to ULAs.
Volume: 12
Issue: 1
Page: 30-37
Publish at: 2018-10-01

A New Configuration of A High Output Voltage 2.45 GHz Rectifier For Wireless Power Transmission Applications

10.12928/telkomnika.v16i5.9707
A.; Hassan 1st University Taybi , A.; Hassan 1st University Tajmouati , J.; Hassan 1st University Zbitou , A.; Hassan 1st University Errkik , M.; Hassan 1st University Latrach , L. El; Microwave Group ESEO Angers Abdellaoui
This work deals with the design, simulation, fabrication and experimentation of a novel 2.45 GHz rectifier for wireless power transmission applications. We have designed a voltage multiplier topology rectifier including 5 Schottky diodes known by their low threshold. This rectifier could perform a wireless power supply for many cases where the use of batteries or wires is impossible due to many limitations. The circuit was analyzed and optimized with the Harmonic Balance method provided by the Advanced Design System (ADS). Good performances are observed through the simulated results and confirmed by the fabrication tests in terms of RF-DC conversion efficiency, DC output voltage level and matching input impedance.
Volume: 16
Issue: 5
Page: 1939-1946
Publish at: 2018-10-01

User Selective Encryption Method for Securing MANETs

10.11591/ijece.v8i5.pp3103-3111
Amal Ahmad , Shereen Ismail
Security issue is getting important day by day. At present, there are a variety of methodologies to provide protection for data confidentiality. MANETs have lots of security challenges than traditional networks like infrastructureless and self-organizing requirements. As the MANETs are dynamic networks that’s make every transmission in such networks vulnerable to many attacks and improving security level becomes a main issue. This paper introduces a user selective encryption method by operating Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES) and the Diffie-Hellman Key Exchange (DHKE) protocol for key management in order to improve MANET security. Through the Network Simulator-2 (NS-2), the we investigate the performance of the proposed method in terms of data transfer time and network throughput for different data sizes and different sender-to-receiver number of hops. The results show the superiority of AES over other encryption algorithms. Furthermore, the effectiveness of our proposed method is verified through comparing our results with those obtained from previous studies.
Volume: 8
Issue: 5
Page: 3103-3111
Publish at: 2018-10-01

A Deterministic Eviction Model for Removing Redundancies in Video Corpus

10.11591/ijece.v8i5.pp3221-3231
Jyoti Malhotra , Jagdish Bakal
The traditional storage approaches are being challenged by huge data volumes. In multimedia content, every file does not necessarily get tagged as an exact duplicate; rather they are prone to editing and resulting in similar copies of the same file. This paper proposes the similarity-based deduplication approach to evict similar duplicates from the archive storage, which compares the samples of binary hashes to identify the duplicates. This eviction is done by initially dividing the query video into dynamic key frames based on the video length. Binary hash codes of these frames are then compared with existing key frames to identify the differences. The similarity score is determined based on these differences, which decides the eradication strategy of duplicate copy. Duplicate elimination goes through two levels, namely removal of exact duplicates and similar duplicates. The proposed approach has shortened the comparison window by comparing only the candidate hash codes based on the dynamic key frames and aims the accurate lossless duplicate removals. The presented work is executed and tested on the produced synthetic video dataset. Results show the reduction in redundant data and increase in the storage space. Binary hashes and similarity scores contributed to achieving good deduplication ratio and overall performance.
Volume: 8
Issue: 5
Page: 3221-3231
Publish at: 2018-10-01

Power Cable with Two Joints Experimental Analysis for Defect Assessments

10.11591/ijeecs.v12.i1.pp399-405
Tze Mei Kuan , Azrul Mohd. Ariffin
Time domain reflectometry (TDR) is an easy technique that provides quick response which is ideal for power utility companies to conduct cable diagnostics on-site. Electricity disruption due to power cable failure is a major challenge for power utility companies due to the long length of cable installed with joints. The long time taken to diagnose the defect along the cable before electricity can be restored has not only jeopardized the reputation of power utility companies but also brings losses to the economy. Hence, this study conducts experimental analysis on cable with two joints with the application of TDR technique to reduce the electricity disruption time. This research is divided into two stages where stage 1 conducts experiments on cable with one degraded section while stage 2 looks into cable with two degraded sections. The TDR reflection characteristics are studied from stage 1 experiments and applied to stage 2 experiments to verify the consistency of the TDR reflection characteristics. The cable conditions of stage 2 experiments are predicted using the reflection characteristics from stage 1 observations and are then validated by comparing these predictions with the actual cable configuration. Results obtained from these experiments have proven that the TDR reflection characteristics are consistent and accurate which can be used to sectionalize the degraded cable section. Detail findings of all experiments conducted with the TDR application are discussed in part three of this paper.
Volume: 12
Issue: 1
Page: 399-405
Publish at: 2018-10-01

Subjective-Objective Matching Evaluation Approach for Enhanced Dental Images

10.11591/ijeecs.v12.i1.pp239-245
Siti Arpah Ahmad , Noor Elaiza Abd Khalid , Mohd Nasir Taib , Haslina Taib
Cases of misdiagnosis and variability evaluation among the dentists do happen. The complexity of anatomical structures and the low contrast of the original images are factors that contribute to the problems. Image enhancement is often used to enhance medical images. However, currently limited work has been done in enhancing the dental pathological features. Dentists come from different background in terms of experience, place of study, method of practices and emotional quotient. These are some of the factors that may cause differences in subjective evaluation among dentists. Therefore, this research focused on identifying objective measurements based on dentists’ subjective evaluation on abnormalities’ detection in jaw area. Objective measurement is based on contrast improvement index (CII) and subjective evaluation is derived from dentists’ questionnaire answering. This paper contributes to new knowledge in the initial phase of identifying dental disease characteristics by means of correlation between the subjective and objective evaluation.
Volume: 12
Issue: 1
Page: 239-245
Publish at: 2018-10-01

Arrhythmia Classification Based on Combined Chaotic and Statistical Feature Extraction

10.11591/ijeecs.v12.i1.pp127-136
Jayagopi G , Pushpa S
Obvious information content in Electro cardio graph has become mandatory to reveal the abnormalities in the heart functions. Arrhythmia is commonly seen heart disorder and results in fatal end, if not identified and treated properly within time limits. The straight forward scene in such diagnosis is to detect the salient features from the Electro cardio graph data using signal processing methods followed by proper classification methods.  16 classes of Arrhythmia had been classified in this work by adopting the traditional method of abnormality detection while introducing a novelty in the type of features to be extracted. Lyapunov Exponents, Kolmogorov Sinai Entropy Density, Kolmogorov Sinai Entropy Universality and R-R interval features based on Kurtosis and Skewness had been used to classify the heart beats from the benchmark MIT-Arrhythmia database. Since alternative features had been utilized, common Support Vector Machines based classification could produce an accuracy of 98.95% in the proposed work with just 13 features.
Volume: 12
Issue: 1
Page: 127-136
Publish at: 2018-10-01

IT Service Management System Measurement using ISO20000-1 and ISO15504-8: Developing a Solution-Mediated Process Assessment Tool to Enable Transparent and SMS Process Assessment

10.11591/ijece.v8i5.pp4023-4032
Imam Asrowardi , Septafiansyah Dwi Putra , Eko Subyantoro , Norzaidi Haji Mohd Daud
Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
Volume: 8
Issue: 5
Page: 4023-4032
Publish at: 2018-10-01

Modified Blowfish Algorithm

10.11591/ijeecs.v12.i1.pp38-45
Theda Flare Ginoy Quilala , Ariel M Sison , Ruji P Medina
Cryptography guarantees security in communication through encryption. This paper proposed a modified Blowfish encryption that uses 128-bit block size and 128-bit key to comply with minimum requirements as an encryption standard. The modification retained the original structure for easy migration but utilized two S-boxes to save memory. A derivation was added to prevent symmetry.  The algorithm’s performance was evaluated using time, and avalanche. Upon testing, the modified blowfish is slower with key, encryption, and decryption average of 26.99ms, 1651.83ms, and 2765.04ms compared to blowfish with 21.65ms, 1297.76ms and 2176.59ms due to block size difference. Applying 128-bit block size increases security by decreasing the chances of having duplicate blocks that may leak information. The modified Blowfish is faster compared to Twofish with an encryption and decryption average time of 2418.08ms and 4002.70ms. The added derivation improved the avalanche of the modified blowfish.  Blowfish achieved 47.14% while modified Blowfish attained 52.86%.
Volume: 12
Issue: 1
Page: 38-45
Publish at: 2018-10-01

Review on Public Key Cryptography Scheme-Based Performance Metrics

10.11591/ijeecs.v12.i1.pp386-392
Jasmin Ilyani Ahmad , Roshidi Din , Mazida Ahmad
Cryptography is a method used to establish secure data communication. The goal of cryptography is to send data to satisfy the criteria of confidentiality, data integrity, authentication and non-repudiation. In line with the goals, the performance metrics is the important evaluation criteria to be analyzed. This paper presents the review of performance metrics of Public Key Cryptography (PKC) that had been analyzed based on the PKC scheme from the previous researchers’ effort since the last four decades. It also displayed the research pattern in different performance metrics over the years. The aim of this paper is to identify the key performance metrics which addressed by the researchers in previous studies. Finally, the critical concern of this paper which shows the overall PKC performance metrics also presented in this paper.
Volume: 12
Issue: 1
Page: 386-392
Publish at: 2018-10-01
Show 1391 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration