Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

25,002 Article Results

Nutritional Status and Age at Menarche on Female Students of Junior High School

10.11591/ijere.v4i2.4494
Rihul Husnul Juliyatmi , Lina Handayani
Menarche is the first menstrual period in the middle of puberty. There are many factors that affect the age of menarche include nutritional status, genetic, environmental conditions, socioeconomic status, and education. The purpose of this research is to determine the relationship between nutritional status and age of menarche on female student of junior high school Ali Maksum Krapyak, Bantul, Yogyakarta. The research employed a cross sectional research design. The number of this sample was 81 female students that determined by total sampling. The statistical test used was Chi Square. The results of this research showed that there was a relationship between nutritional status and the age of menarche on female student of junior high school Ali Maksum Krapyak, Bantul, Yogyakarta (p value = 0.002) and the ratio prevalence was 3.077 (95% CI = 1.675 – 5.650); it means that respondents who have abnormal nutritional status get 3.007 times greater chance of experiencing abnormal menarche than respondents who have normal nutritional status.
Volume: 4
Issue: 2
Page: 71-75
Publish at: 2015-06-01

The Adaptive Federal Unscented Particle Filter Algorithm with Applications in All-Attitude Integrated BDS/INS Navigation System

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1507
Ping Luo , Li-jie Yuan , Liang-xue Huang , Xian-fei Li
In order to improve the attitude accuracy, the thesis establishes the all-attitude integrated BDS/INS navigation nonlinear system model based on the position, velocity, attitude by adding the BDS’s attitude measurement information into the measurement equation of the traditional BDS/INS integrated navigation nonlinear system model. Considering the problem that the dynamic navigation system model is difficult to accurately describe the complex navigation environment, the thesis improves the dynamic characteristics of the information distribution of the federal filter algorithm which could timely change based on the eigenvalues ratio of each subsystem’s error variance matrix. Then, the adaptive federal unscented particle filter (AFUPF) is proposed. The simulation shows that the proposed algorithm could effectively weaken the impact on the system accuracy of the inaccurate high-dynamic model, and improve the adaptability, the fault tolerance and the accuracy, especially the attitude accuracy. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.8069
Volume: 14
Issue: 3
Page: 543-556
Publish at: 2015-06-01

Design and Implementation of Embedded Processor Based Brushless Motor Drive using Lead Acid Battery as Source with Lithium Ion Capacitor

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1498
Sathishkumar Shanmugam , Meenakumari Ramachandran
For the past two decades, Brushless DC motor has become more efficient and robust motor in industrial applications due to their simplicity in structure, reliability, good mechanical properties. The absence of brushes features these motors similar to AC motors whereas their speed performance is nearly equal to that of the DC motors. Thus the combined advantages of AC and DC motors make these motors more efficient in various applications. The design was based on the output equation similar to that of conventional dc machines. This generates high-resolution PWM outputs, used to control the switching pattern of the BLDC Inverter. By varying the PWM signal produced from the microcontroller, the speed of the motor can be varied. The Hall Effect sensing unit gives information about the rotor position and based on this rotor information, switching sequence of the MOSFET is decided. The firing pulses to the gate of the MOSFET are given by the Control Signal Generation Module. Based on the developed model simulation studies are performed in Matlab/Simulink environment and hardware implementation of BLDCM drive using Lead acid battery as source With Lithium ion capacitor   system is done and  results were analysed  using Digital Scope Oscilloscope (DSO) and output Carried Out Sucessfully.  DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7938
Volume: 14
Issue: 3
Page: 455-469
Publish at: 2015-06-01

An Advanced High Performance Maximum Power Point Tracking Method with Ant Colony and Particle Swarm Optimization Method Using Interleaved Boost Converter

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1488
Nivetha V , G. Vijaya Gowri , Elamathy A
To obtain efficient maximum power point tracking operation under varying and steady state environmental conditions which is based on Ant Colony Optimization (ACO) combined with Particle Swarm Optimization (PSO) that controls an interleaved DC-DC converter connected at the output of PV array and maintains a constant input-power load. The operation of maximum power point tracking is to adjust the power interfaces so that the operating characteristics of the load and the photovoltaic array match at the maximum power points. The simulation is based on the computed algorithms which show very good perspectives. The searching routine is done in less than 15 steps and takes less than 50ms. The tracking accuracy is better than those found in conventional methods. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7900
Volume: 14
Issue: 3
Page: 376-380
Publish at: 2015-06-01

An Introduction to Journal Phishings and Their Detection Approach

10.12928/telkomnika.v13i2.1436
Mehdi; Foulad Institute of Technology Foulad shahr Dadkhah , Tole; Universitas Ahmad Dahlan Sutikno , Mohammad; Foulad Institute of Technology Foulad shahr Davarpanah Jazi , Deris; Universitas Sriwijaya Stiawan
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
Volume: 13
Issue: 2
Page: 373-380
Publish at: 2015-06-01

A Weighted Evidence Combination Method Based on Improved Conflict Measure Factor

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1505
Xiaochen Xing , Yuanwen Cai , Zhengyu Zhao , Long Cheng , Yan Li
D-S evidence theory is usually used for the fusion of multi-source information. But the fusion result is always against with general knowledge for the heavy conflict of evidence. Research on combination of conflict evidence at home and abroad is summarized and analyzed in detail. On the base of this, the conclusion that modified evidence combination method of conflict evidence is more useful can be dawn. Effective evidence conflict measure is the first step of conflict evidence combination. The existing conflict measure methods are summarized and the main problem of those methods is analyzed in detail. Based on previous research of conflict evidence combination, a modified measure factor of evidence conflict which is called Mconf is put forward. Mconf is mainly built up with modified distance of evidence named mdBPA and traditional evidence conflict factor named k. The examples in this paper show that Mconf can measure the evidence conflict correctly, both for general evidence and conflict evidence. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7850
Volume: 14
Issue: 3
Page: 525-533
Publish at: 2015-06-01

A Power Factor Corrected Bridgeless Type III Cuk Derived Converter fed BLDC Motor Drive

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1493
J. Pearly Catherine , R. Balamurugan
This paper deals with the power factor correction in BLDC motor drive with different cuk derived converter topologies and the best one is simulated for power factor correction operation. Power quality issues is the major concern in the BLDC motor drive due to recommended limits of harmonics in the supply current. Conventionally the BLDC motors are powered with the help of diode bridge rectifiers which results in highly distorted supply current and poor power factor. So modification in converter topology is the research hotspot in recent years. Alternatively bridgeless converter topologies are used in place of diode bridge rectifiers (DBR). Among the bridgeless topologies cuk derived converters suited well for power factor correction. In this paper the different cuk topologies are investigated and the best one is simulated with the help of neuro-fuzzy controller in MATLAB/Simulink platform.DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7893
Volume: 14
Issue: 3
Page: 420-427
Publish at: 2015-06-01

A method of Trajectory Restoration at Intersection

10.12928/telkomnika.v13i2.980
Ke; School of Computer and Information Engineering, Nanyang Institute of Technology Zheng , Xiangbo; Wuhan KOTEI Informatics Co., LTD. Song , Dunyao; Wuhan KOTEI Informatics Co., LTD. Zhu
Floating car data (FCD) is vechiel’s position trace that is comes from Global Positioning System receivers.collected at the discrete time. FCD contains much information of traffic and road-network. But there are different level of trajectory shape damages because of the affection of sample frequency and running speed. So before the FCD mining, the first thing should be done is to restore track to make up for the loss. This paper analyzes the spatial-temporal characteristics of floating car trajectory at intersection, and build an error recognition model and a adjust algorithm. Experiments showed that this method can improve accuracy of trajectory restoration, and set a solid foundation for further data mining.
Volume: 13
Issue: 2
Page: 563-570
Publish at: 2015-06-01

Virtual Instrument of Harmonics Detection Based on Neural Network Adaptive Filters

10.12928/telkomnika.v13i2.1471
Xianfeng; Henan Mechanical and Electrical Engineering College Zheng , Zheng; Henan Mechanical and Electrical Engineering College Fan
This study investigated the adaptive detection principle based on a single artificial neuron, and constructed a method for detecting harmonics using the artificial neural network technique. Based on the established method, and by comprehensively processing the obtained harmonics data using the LabVIEW software-developing environment of the virtual instrument, the harmonic waves were detected and analyzed. Finally, the analysis of current ball crusher harmonics verified that the designed system was effective.
Volume: 13
Issue: 2
Page: 556-562
Publish at: 2015-06-01

Blind Signal Processing Algorithmsbased based on Recursive Gradient Estimation

10.11591/ijece.v5i3.pp548-561
Namyong Kim , Mingoo Kang
Blind algorithms based on the Euclidean distance (ED) between the output distribution function and a set of Dirac delta functions have a heavy computational burden of  due to some double summation operations for the sample size and symbol points. In this paper, a recursive approach to the estimation of the ED and its gradient is proposed to reduce the computational complexity for efficient implementation of the algorithm. The ED of the algorithm is comprised of information potentials (IPs), and the IPs at the next iteration can be calculated recursively based on the currently obtained IPs. Utilizing the recursively estimated IPs, the next step gradient for the weight update of the algorithm can be estimated recursively with the present gradient. With this recursive approach, the computational complexity of gradient calculation has only . The simulation results show that the proposed gradient estimation method holds significantly reduced computational complexity keeping the same performance as the block processing method
Volume: 5
Issue: 3
Page: 548-561
Publish at: 2015-06-01

Iris Image Recognition Based on Independent Component Analysis and Support Vector Machine

10.12928/telkomnika.v13i2.1171
Muhammad; Sriwijaya University Fachrurrozi , Muhammad; Sriwijaya University Mujtahid
Iris has a very unique texture and pattern, different for each individual and the pattern will remain stable, making it possible as biometric technology called iris recognition. In this paper, 150 iris image from Dept. Computer Science, Palacky University in Olomouc iris database used for iris recognition based on independent component analysis and support vector machine. There are three steps for developing this research namely, image preprocessing, feature extraction and recognition. First step is image preprocessing in order to get the iris region from eye image. Second is feature extraction by using independent component analysis in order to get the feature from iris image. Support vector machine (SVM) is used for iris classification and recognition. In the end of this experimental, the implement method will evaluated based upon Genuine Acceptance Rate (GAR). Experimental result shown that the recognize rate from variation of training data is 52% with one data train, 73% with two data train and 90% three data train. From experimental result also shows that this technique produces good performance.  
Volume: 13
Issue: 2
Page: 597-603
Publish at: 2015-06-01

Optimal Two Dimensional Preventive Maintenance Policy Based on Asymmetric Copula Function

10.12928/telkomnika.v13i2.1455
Xinyue; Mechanical Engineering College, Shijiazhuang Li , Yunxian; Mechanical Engineering College, Shijiazhuang Jia , Zhen; Mechanical Engineering College, Shijiazhuang Li
For some kinds of products, the consumers have strict requirements to the reliability of these products in the based warranty period. Then the manufacturer is inclined to provide the two-dimensional preventive maintenance policy to take the usage degree of the product into account. As a result, two-dimensional preventive maintenance policy in the warranty period has recently obtained increasing attention from manufacturers and consumers. In this paper, we focused on the optimization of based warranty cost and proposed a new expected based warranty cost model considering the two-dimensional imperfect preventive maintenance policy from the perspective of the manufacture. Asymmetric copula function was applied to modeling the failure function of the product. And the optimal two-dimensional preventive maintenance period was obtained by minimizing based warranty cost. At last, numerical examples are given to illustrate the proposed models, of which the results prove the model effective and validate.
Volume: 13
Issue: 2
Page: 722-729
Publish at: 2015-06-01

The Implementation of One Opportunistic Routing in Wireless Networks

10.12928/telkomnika.v13i2.132
Han; Nanjing University of Science & Technology Li , Huan-yan; Nanjing University of Science & Technology Qian
In the paper, it proposes an optimization framework addressing fairness issues for opportunity routing in wireless mesh networks, where we use network coding to ease the routing problem. We propose a distributed heuristic algorithm in the case when scheduling is determined by MAC, and discuss the suitability of our algorithm through simulations. It is found that in most situations our algorithm has better performances than the single-path algorithm and the classical network coding which is based opportunity algorithm MORE.
Volume: 13
Issue: 2
Page: 460-468
Publish at: 2015-06-01

An Image Compression Method Based on Wavelet Transform and Neural Network

10.12928/telkomnika.v13i2.1430
Suqing; Henan Vocational and Technical Institute Zhang , Aiqiang; Henan Vocational and Technical Institute Wang
Image compression is to compress the redundancy between the pixels as much as possible by using the correlation between the neighborhood pixels so as to reduce the transmission bandwidth and the storage space. This paper applies the integration of wavelet analysis and artificial neural network in the image compression, discusses its performance in the image compression theoretically, analyzes the multi-resolution analysis thought, constructs a wavelet neural network model which is used in the improved image compression and gives the corresponding algorithm. Only the weight in the output layer of the wavelet neural network needs training while the weight of the input layer can be determined according to the relationship between the interval of the sampling points and the interval of the compactly-supported intervals. Once determined, training is unnecessary, in this way, it accelerates the training speed of the wavelet neural network and solves the problem that it is difficult to determine the nodes of the hidden layer in the traditional neural network. The computer simulation experiment shows that the algorithm of this paper has more excellent compression effect than the traditional neural network method.
Volume: 13
Issue: 2
Page: 587-596
Publish at: 2015-06-01

High Available VoIP Server Failover Mechanism in Wide Area Network

10.12928/telkomnika.v13i2.1741
Hery; University of Lampung Dian Septama , Ardian; University of Lampung Ulvan , Jiri; Czech Technical University Hlavacek , Robert; Czech Technical University Bestak
The development of telecommunication technology specified the Internet Protocol (IP) based technology for the next generation network. Voice over Internet Protocol (VoIP) has been introduced to overcome future telephony demand. However, these rapid changes encountered some issues, and the most critical is how to provide the services availability and reliability equally to circuit based telephony. Virtualization is widely used not only for hardware efficiency and maintenance, but also for High Availability support. Virtualized environment provides the ability among servers to migrate or replicate into another machine, even when they are running their services, which is known as Live Migration. In this paper, the ability of virtualization failover mechanism over WAN and voice quality of VoIP service when running on the High Availability system in virtualized environment is studied and examined. The objective analysis by using quality of services (QoS) attributes is conducted as well as the subjective analysis using Mean Opinion Score (MOS). The work utilizes Xen® Hypervisor with modified Remus extensions to provide the High Availability environment with GRE tunnelling and newtwork virtualization. Remus approach using checkpoint based is deployed to copy the primary server to the backup server. A range of 40ms – 900ms has been applied as time interval of checkpoint. The results show that the the failover downtime is 1.4 s and mean jitter is 9,98 ms, packet loss 3,12% and MOS 3.61 for Remus 400ms checkpoint. MOS with different checkpoint time interval is also presented.
Volume: 13
Issue: 2
Page: 739-744
Publish at: 2015-06-01
Show 1402 of 1667

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration