Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,061 Article Results

Personal Security Tracking based on Android and Web Application

10.12928/telkomnika.v16i2.7625
Angry; Bina Nusantara University Ronald , Violitta; Bina Nusantara University Yesmaya , Muhammad; Bina Nusantara University Danaparamita
Nowadays, the frequency of abduction is increasing significantly. Information technology provide many social media which is causing the leaked of personal information where abductor can find out the information. Using social media, people can share location, life event, and anything related about their life event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking device is developed, but the response is too late. Because, the family or relative of the victims will notice that abduction had happen after the victim is lost. According to the problem, this research will focus on develop the personal tracking device which trigger by the victims who own the phone based on android and web application. Whenever the abduction happens, the victim just need to click the button and the system will send a message to the relatives and family in their contact also trigger the notification to the local security. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is android application for user and web application for managing application.
Volume: 16
Issue: 2
Page: 771-775
Publish at: 2018-04-01

Noise Level Estimation for Digital Images Using Local Statistics and Its Applications to Noise Removal

10.12928/telkomnika.v16i2.9060
Asem; University of Zawia Khmag , Sami; University of Zawia Ghoul , Syed Abdul; Universiti Putra Malaysia Rahman Al-Haddad , Noraziahtulhidayu; Universiti Putra Malaysia Kamarudin
In this paper, an automatic estimation of additive white Gaussian noise technique is proposed. This technique is built according to the local statistics of Gaussian noise. In the field of digital signal processing, estimation of the noise is considered as pivotal process that many signal processing tasks relies on. The main aim of this paper is to design a patch-based estimation technique in order to estimate the noise level in natural images and use it in blind image removal technique. The estimation processes is utilized selected patches which is most contaminated sub-pixels in the tested images sing principal component analysis (PCA). The performance of the suggested noise level estimation technique is shown its superior to state of the art noise estimation and noise removal algorithms, the proposed algorithm produces the best performance in most cases compared with the investigated techniques in terms of PSNR, IQI and the visual perception.
Volume: 16
Issue: 2
Page: 915-924
Publish at: 2018-04-01

An Optimum Approach for Preprocessing of Web User Query

10.11591/ijict.v7i1.pp8-12
Sunny Sharma , Sunita Sunita , Arjun Kumar , Vijay Rana
The emergence of the Web technology generated a massive amount of raw data by enabling Internet users to post their opinions, comments, and reviews on the web. To extract useful information from this raw data can be a very challenging task. Search engines play a critical role in these circumstances. User queries are becoming main issues for the search engines. Therefore a preprocessing operation is essential. In this paper, we present a framework for natural language preprocessing for efficient data retrieval and some of the required processing for effective retrieval such as elongated word handling, stop word removal, stemming, etc. This manuscript starts by building a manually annotated dataset and then takes the reader through the detailed steps of process. Experiments are conducted for special stages of this process to examine the accuracy of the system.
Volume: 7
Issue: 1
Page: 8-12
Publish at: 2018-04-01

File Reconstruction in Digital Forensic

10.12928/telkomnika.v16i2.8230
Opim Salim; Universitas Sumatera Utara Sitompul , Andrew; Universitas Sumatera Utara Handoko , Romi Fadillah; Universitas Sumatera Utara Rahmat
File recovery is one of the stages in computer forensic investigative process to identify an acquired file to be used as digital evident. The recovery is performed on files that have been deleted from a file system. However, in order to recover a deleted file, some considerations should be taken. A deleted file is potentially modified from its original condition because another file might either partly or entirely overriding the file content. A typical approach in recovering deleted file is to apply Boyer-Moore algorithm that has rather high time complexity in terms of string searching. Therefore, a better string matching approach for recovering deleted file is required. We propose Aho-Corasick parsing technique to read file attributes from the master file table (MFT) in order to examine the file condition. If the file was deleted, then the parser search the file content in order to reconstruct the file. Experiments were conducted using several file modifications, such as 0% (unmodified), 18.98%, 32.21% and 9.77%. From the experimental results we found that the file reconstruction process on the file system was performed successfully. The average successful rate for the file recovery from four experiments on each modification was 87.50% and for the string matching process average time on searching file names was 0.32 second.
Volume: 16
Issue: 2
Page: 776-794
Publish at: 2018-04-01

Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced

10.11591/ijeecs.v10.i1.pp330-336
Huda Adibah Mohd Ramli , Ani Liza Asnawi , Farah Nadia Mohd Isa , Amelia Wong Azman , Mohamad ‘Ismat Hafizi Mansor
Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Volume: 10
Issue: 1
Page: 330-336
Publish at: 2018-04-01

Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique

10.12928/telkomnika.v16i2.6812
Nirmala Devi; Amrita University M. , Irene Susan; Amrita University Jacob , Sree; Amrita University Ranjani R , Jayakumar; Amrita University M.
In recent years, serious concerns have been raised against the tampering of integrated circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious circuitry known as Hardware Trojan. In this paper, a transition probability based node reduction technique for faster and efficient Hardware Trojan (HT) detection has been attempted. In the proposed method, the fact that the least controllable and observable nodes or the nodes with least transition probability are more vulnerable as Trojan sites is taken into consideration. The nodes that have lesser activity than the threshold are the candidate nodes. At each candidate node, segmentation is done for further leakage power analysis to detect the presence of Trojans. Experimental results observed on ISCAS’85 and ISCAS’89 benchmark circuits illustrate that the proposed work can achieve remarkable node reduction upto 78.81% and time reduction upto 58.7%. It was also observed that the circuit activity can be increased by varying the input probability. Hence, for further reduction in the Trojan activation time, the weighted input probability was obtained.
Volume: 16
Issue: 2
Page: 573-579
Publish at: 2018-04-01

A Specific Routing Protocol for Flying Adhoc Network

10.12928/telkomnika.v16i2.8444
Bashir Olaniyi; Ahmadu Bello University Zaria Sadiq , Adewale Emmanuel; Ahmadu Bello University Zaria Adedokun , Mohammad Bashir; Ahmadu Bello University Zaria Mu’azu , Yusuf Abubakar; University of Manchester Sha’aban
This paper presents a novel data and timed control routing protocol which is Flying Adhoc Network (FANET) specific. The developed FANET specific routing protocol laid emphasis on the route connectivity in the network by considering the captured data size, minimum allowable distance between randomly moving nodes and connection time. The performance of the proposed FANET specific routing protocol was simulated using NS3. The obtained throughput value for the routing protocol fluctuated between 742.064kbps and 755.083kbps as data are exchanged between nodes. This showed that when all the UAVs are on the network and communicating with one another, the throughput is flatline and not plummet. This implies consistency as nodes join and leave the network. The packet delivery ratio obtained for the FSRP during simulation was 96.13%. These results implied that data is successfully transmitted between the UAV acting as server and UAV acting as client on the network.
Volume: 16
Issue: 2
Page: 606-617
Publish at: 2018-04-01

Characterization of Respiratory Conditions Using Labview and Digital Spirometer

10.11591/ijeecs.v10.i1.pp66-73
S. Noorjannah Ibrahim , A. Z. Jusoh , N. Abdul Malik , A. L. Asnawi , S. Mazalan
One of the effective ways to diagnose various respiratory diseases is using spirometry test. Good spirometer comes with excellent graphical user interface. Spirometer is used to measure lung parameters such as Forced Expiratory Volume in the first second and the sixth seconds (FEV1 and FEV6). This paper presents an algorithm with Graphical User Interface (GUI) for characterization of respiratory conditions using LabVIEW Software. The whole spirometry system consists of a breathing circuitry with pressure sensor and a data acquisition board (NI sbRIO FPGA board). Results obtained from three different volunteers with different health performances are also presented in this paper. The FEV1/FEV6 ratio of a healthy volunteer is 81.1%, an asthma volunteer is 72.04%, and suspected bronchitis volunteer is 33.4%. Based on these results, the unhealthy volunteers tend to have smaller value of FEV1 with lower area under the curve when compared to healthy volunteer.
Volume: 10
Issue: 1
Page: 66-73
Publish at: 2018-04-01

Trash Basket Sensor Notification Using Arduino with Android Application

10.11591/ijeecs.v10.i1.pp120-128
Adel ALFoudery , Abdulrahman Abdullah Alkandari , Nayfah Mohsen Almutairi
The protection of society and environment from garbage accumulation and its polluting effects is carried by waste management companies, the services provided by these companies are improving life overall quality. By preserving raw materials, proper collecting and elimination of trash have reduced pollution and environmental impact. On the other hand, areas which are suffered from inappropriate negative service appreciate the garbage collector’s valuable efforts. Appropriate garbage collection and management facilities have made a recycling process improvement which caused a reduction in waste generation. Also controlling the released contaminators and pollutants has decreased the impact on landfills and protected the environment from the pollution negative effects. Using mobile and electronic technology to enable waste management companies to finish its work and make it easier for collecting trash in a simple and an easy way. We introduce Trash Sensor Android Application to help waste management companies detect trash levels to collect it and help citizens from undesired odours.
Volume: 10
Issue: 1
Page: 120-128
Publish at: 2018-04-01

Real Time Face Recognition Based on Face Descriptor and Its Application

10.12928/telkomnika.v16i2.7418
I Gede Pasek Suta; Mataram University Wijaya , Ario Yudo; Mataram University Husodo , I Wayan Agus; Mataram University Arimbawa
This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second).
Volume: 16
Issue: 2
Page: 739-746
Publish at: 2018-04-01

Tree Physiology Optimization in Constrained Optimization Problem

10.12928/telkomnika.v16i2.9021
A. Hanif; Universiti Teknologi PETRONAS Halim , I.; Universiti Teknologi PETRONAS Ismail
Metaheuristic algorithms are proven to be more effective on finding global optimum in numerous problems including the constrained optimization area. The algorithms have the capacity to prevail over many deficiencies in conventional algorithms. Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. Most of the real-world problems consist of constrained problem that is significantly important in modern engineering design and must be considered in order to perform any optimization task. Therefore, it is essential to compare the performance of the algorithm in diverse level of difficulties in constrained region. This paper introduces Tree Physiology Optimization (TPO) algorithm for solving constrained optimization problem and compares the performance with other existing metaheuristic algorithms. The constrained problems that are included in the comparison are three engineering design and nonlinear mathematic problems. The difficulties of each proposed problem are the function complexity, number of constraints, and dimension of variables. The performance measure of each algorithm is the statistical results of finding the global optimum and the convergence towards global optimum.
Volume: 16
Issue: 2
Page: 876-882
Publish at: 2018-04-01

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

10.12928/telkomnika.v16i2.8420
Rifki; Telkom University Suwandi , Surya Michrandi; Telkom University Nasution , Fairuz; Telkom University Azmi
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique properties that can perform mathematical operations against ciphertext. This paper proposed the use of the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the additional properties so that it can calculate the results of voting data that has been encrypted without having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote tallying process by comparing the advantages and disadvantages of each algorithm.
Volume: 16
Issue: 2
Page: 862-867
Publish at: 2018-04-01

Cyber Threat Intelligence – Issue and Challenges

10.11591/ijeecs.v10.i1.pp371-379
Md Sahrom Abu , Siti Rahayu Selamat , Aswami Ariffin , Robiah Yusof
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Volume: 10
Issue: 1
Page: 371-379
Publish at: 2018-04-01

Body Information Analysis based Personal Exercise Management System

10.11591/ijece.v8i2.pp651-657
Jongwon Lee , Hyunju Lee , Donggyun Yu , Hoekyung Jung
Recently, people's interest in health is deepening. So health-related systems are being developed. Existing exercise management systems provided users with exercise related information using PC or smart phone. However, there is a problem that the accuracy of the algorithm for analyzing the user's body information and providing information is low.In this paper, we analyze users' body mass index (BMI) and basal metabolic rate (BMR) and we propose a system that provides the user with necessary information through recommendation algorithm. It informs the user of exercise intensity and momentum, and graphs the exercise history of the user. It also allows the user to refer to the fitness history of other users in the same BMI group. This allows the user to receive more personalized services than the existing exercise management system, thereby enabling efficient exercise.
Volume: 8
Issue: 2
Page: 651-657
Publish at: 2018-04-01

A Technical Review of BMS Performance Standard for Electric Vehicle Applications in Indonesia

10.12928/telkomnika.v16i2.7930
Wahyudi; Sebelas Maret University Sutopo , Budhy; Sebelas Maret University Rahmawatie , Fakhrina; Sebelas Maret University Fahma , Muhammad; Sebelas Maret University Nizam , Agus; Sebelas Maret University Purwanto , B.B; BSN, Jakarta Louhenapessy , Evizal; Universitas Islam Riau Abdul Kadir
The development of Battery Management System (BMS) standards in Indonesia has been carried out causing the FACTS approach. That's approach makes it possible to accommodate all stakeholder requirements. However, the approach has not yet considered a technical review of the regulated standards. Based on this, this study undertook a comprehensive review of BMS performance parameters set out in the standard. In order that the regulated standards not only accommodate the needs of stakeholders but also consider BMS technical studies in order not to impede the future development of BMS.
Volume: 16
Issue: 2
Page: 544-549
Publish at: 2018-04-01
Show 1409 of 1938

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration