Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

Intelligent Image Capturing Alarm System Using Raspberry Pi

10.12928/telkomnika.v15i4.6532
K.A.M.; Universiti Teknikal Malaysia Melaka, Malaysia Annuar , N.A.; Universiti Teknikal Malaysia Melaka, Malaysia Ab Hadi , S.K.; Universiti Teknikal Malaysia Melaka, Malaysia Subramaniam , M. F. Mohd Ab; Universiti Teknikal Malaysia Melaka, Malaysia Halim , M.B.; Universiti Teknikal Malaysia Melaka, Malaysia N. Shah , A.F.; Universiti Teknikal Malaysia Melaka, Malaysia Kadmin , M.S.; Universiti Teknikal Malaysia Melaka, Malaysia Amri , A.; Universiti Kuala Lumpur-British Malaysian Institute, Malaysia Abdul Salam
Home surveillance system assumes an essential part in this present day living style to help recognizing illegal activities. In this proposed paper, an intelligent image capturing alarm system to protect locker was developed. Raspberry Pi 2 is used as the main controller (server). At the point when any conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the intruder. In the meantime, the spotlight or light of the house which represented by an LED will be turned "ON" alongside an alarm sound from a buzzer which is fixed as an output. Taking everything into account, this improvement offers reasonable and easy to use surveillance alarm system.
Volume: 15
Issue: 4
Page: 1651-1658
Publish at: 2017-12-01

A Novel Single Source Multiple Output Converter Integrating Buck-Boost and Fly Back Yopology for SMPS Applications

10.11591/ijeecs.v8.i3.pp733-736
A. Kalirasu
This paper presents a novel single DC input source and multiple DC output suitable for switched mode power supply (SMPS) applications integrating interleaved boost and sepic converter with fly back topology. The proposed converter can be remodeled for any required output voltage power supply without changing hardware structure because wide range of output voltage can be obtained using sepic and boost converters by changing duty cycle command by implementing a simple voltage input pi controller. Conventional fly back topology is added to interleaved circuit to produce desired dc output voltage this voltage can be controlled by choosing turns ratio of fly back transformer. The proposed multi output DC converter is simulated in MATLAB/Simulink environment and results are presented for verifying merits of the converter.
Volume: 8
Issue: 3
Page: 733-736
Publish at: 2017-12-01

Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks

10.12928/telkomnika.v15i4.6092
Eppy; Universitas Negeri Surabaya, Indonesia Yundra , Bih-Hwang; National Taiwan University of Science and Technology, Taiwan Lee
The challenges of CSMA/CA as following: first, when the device nodes detect the channel in busy condition, the device nodes have to increase the value of backoff exponent which cause range of blind backoff process also increase. Second, the blind backoff process will cause lower channel utilization and more energy consumptions. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called adjustment delay scheme (ADES). This article also presents a comprehensive Markov chain analysis to predict the probability of successful transmission, network goodput, bandwidth utilization and total network energy consumption. The validity of the model analysis is proven by precisely matching the simulation experiments. ADES performs better than those of other algorithms in term of the probability of successful packet transmission, network goodput, bandwidth utilization as well as energy consumption in the networks.
Volume: 15
Issue: 4
Page: 1710-1722
Publish at: 2017-12-01

Embedded Applications of MS-PSO-BP on Wind/Storage Power Forecasting

10.12928/telkomnika.v15i4.6720
Jianhong; HoHai University Nantong University, China Zhu , Wen-xia; Nantong University, China Pan , Zhi-ping; Jiangsu Longyuan Wind Power Co., Ltd, China Zhang
Higher proportion wind power penetration has great impact on grid operation and dispatching, intelligent hybrid algorithm is proposed to cope with inaccurate schedule forecast. Firstly, hybrid algorithm of MS-PSO-BP (Mathematical Statistics, Particle Swarm Optimization, Back Propagation neural network) is proposed to improve the wind power system prediction accuracy. MS is used to optimize artificial neural network training sample, PSO-BP (particle swarm combined with back propagation neural network) is employed on prediction error dynamic revision. From the angle of root mean square error (RMSE), the mean absolute error (MAE) and convergence rate, analysis and comparison of several intelligent algorithms (BP, RBP, PSO-BP, MS-BP, MS-RBP, MS-PSO-BP) are done to verify the availability of the proposed prediction method. Further, due to the physical function of energy storage in improving accuracy of schedule pre-fabrication, a mathematical statistical method is proposed to determine the optimal capacity of the storage batteries in power forecasting based on the historical statistical data of wind farm. Algorithm feasibility is validated by application of experiment simulation and comparative analysis.
Volume: 15
Issue: 4
Page: 1610-1624
Publish at: 2017-12-01

Zakah Management System Using Approach Classification

10.12928/telkomnika.v15i4.5640
Zulfajri Basri; Hasanuddin University, Indonesia Hasanuddin , Syafruddin; Hasanuddin University, Indonesia Syarif , Darniati; Hasanuddin University, Indonesia Darniati
The often problematic faced by Muslims are lack of understanding in calculating Zakah and determining the feasibility of compliant recipients based on Islamic Shari'a. This study aimed to establish Zakah management system to support calculation process based on Al Qaradhawi method, helping Board of Zakah in distributing Zakah funds to mustahik. The algorithm used for the classification of Zakah recipients is Naive Bayes. The classification was combination of discrete and continuous data which is conducted by experiments using feasible and unfeasible data as a novelty approach. The results have shown that the Naive Bayes method could solve the problem with 85% of average.
Volume: 15
Issue: 4
Page: 1852-1857
Publish at: 2017-12-01

A Good Performance OTP Encryption Image based on DCT-DWT Steganography

10.12928/telkomnika.v15i4.5883
Wellia Shinta; Dian Nuswantoro University (UDINUS), Indonesia Sari , Eko Hari; Dian Nuswantoro University (UDINUS), Indonesia Rachmawanto , De Rosal Ignatius Moses; Dian Nuswantoro University (UDINUS), Indonesia Setiadi , Christy Atika; Dian Nuswantoro University (UDINUS), Indonesia Sari
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
Volume: 15
Issue: 4
Page: 1982-1989
Publish at: 2017-12-01

Design and Evaluation of Submersible 11/0.415kV Distribution Substation for Flood Prone Areas

10.12928/telkomnika.v15i4.7232
M.; Kawasan Institusi Penyelidikan, Malaysia D. M. Amir , S.; Kawasan Institusi Penyelidikan, Malaysia Ishak , A.; Kawasan Institusi Penyelidikan, Malaysia Raj Gopal
Flood levels exceeding 2 metres above ground level has been observed causing electrical equipment in the 11/0.415kV substation to be fully submerged. This caused widespread supply disruption as the equipment need to be switched off due to safety reasons and prevention of further equipment damage. The use of submersible equipment and accessories has been identified as one of the mitigation methods to ensure continuous electrical supply during flood events. A research project was undertaken to develop the design criteria of the selection of submersible equipment and accessories as well as to develop the test method and evaluate the selected submersible equipment and accessories in a substation configuration. All the equipment could continuously operate in ON condition during the wet test. However, design improvements are suggested for the submersible switchgear and feeder pillar for better performance during and after flood events.
Volume: 15
Issue: 4
Page: 1540-1546
Publish at: 2017-12-01

Sentiment Mining of Community Development Program Evaluation Based on Social Media

10.12928/telkomnika.v15i4.4633
Siti; Bogor Agricultural University, Indonesia Yuliyanti , Taufik; Bogor Agricultural University, Indonesia Djatna , Heru; Bogor Agricultural University, Indonesia Sukoco
It is crucial to support community-oriented services for youth awareness in the social media with knowledge extraction, which would be useful for both government agencies and community group of interest for program evaluation. This work provided to formulate effective evaluation on community development program and addressing them to a correct action. By using classification based SVM, evaluation of the achievement level conducted in both quantitative and qualitative analysis, particularly to conclude which activities has high success rate. By using social media based activities, this study searched the sentiment analysis from every activities comments based on their tweet. First, we kicked off preprocessing stage, reducing feature space by using principle of component analysis and estimate parameters for classification purposes. Second, we modeled activity classification by using support vector machine. At last, set term score by calculating term frequency, which combined with term sentiment scores based on lexicon.The result shows that models provided sentiment summarization that point out the success level of positive sentiment.
Volume: 15
Issue: 4
Page: 1858-1864
Publish at: 2017-12-01

Hierarchy Process Mining from Multi-Source Logs

10.12928/telkomnika.v15i4.6326
Riyanarto; Institut Teknologi Sepuluh Nopember, Indonesia Sarno , Yutika Amelia; Institut Teknologi Sepuluh Nopember, Indonesia Effendi
Nowadays, large-scale business processes is growing rapidly; in this regards process mining is required to discover and enhance business processes in different departments of an organization. A process mining algorithm can generally discover the process model of an organization without considering the detailed process models of the departments, and the relationship among departments. The exchange of messages among departments can produce asynchronous activities among department process models. The event logs from departments can be considered as multi-source logs, which cause difficulties in mining the process model. Discovering process models from multi-source logs is still in the state of the art, therefore this paper proposes a hierarchy high-to-low process mining approach to discover the process model from a complex multi-source and heterogeneous event logs collected from distributed departments. The proposed method involves three steps; i.e. firstly a high level process model is developed; secondly a separate low level process model is discovered from multi-source logs; finally the Petri net refinement operation is used to integrate the discovered process models. The refinement operation replaced the abctract transitions of a high level process model with the corresponding low level process models. Multi-source event logs from several departments of a yarn manufacturing were used in the computational study, and the results showed that the proposed method combined with the modified time-based heuristics miner could discover a correct parallel process business model containing XOR, AND, and OR relations.
Volume: 15
Issue: 4
Page: 1955-1970
Publish at: 2017-12-01

IMC Based Fractional Order Controller for Three Interacting Tank Process

10.12928/telkomnika.v15i4.5784
Abdul Wahid; NIT Jamshedpur, India Nasir , Idamakanti; NIT Jamshedpur, India Kasireddy , Arun Kumar; NIT Jamshedpur, India Singh
In model based control, performance of the controlled plant considerably depends on the accuracy of real plant being modelled. In present work, an attempt has been made to design Internal Model Control (IMC), for three interacting tank process for liquid level control. To avoid complexities in controller design, the third order three interacting tank process is modelled to First Order Plus Dead Time (FOPDT) model. Exploiting the admirable features of Fractional Calculus, the higher order model is also modelled to Fractional Order First Order Plus Dead Time (FO-FOPDT) model, which further reduces the modelling error. Moving to control section, different IMC schemes have been proposed, where the fractional order filter is introduced along with the conventional integer order filter. Various simulations have been performed to show the greatness of Fractional order modelled system & fractional order filters over conventional integer order modelled system & integer order filters respectively. Both for parameters estimation of reduced order model and filter tuning, Genetic Algorithm (GA) is being applied.  
Volume: 15
Issue: 4
Page: 1723-1732
Publish at: 2017-12-01

Determining the Optimum Number of Paths for Realization of Multi-path Routing in MPLS-TE Networks

10.12928/telkomnika.v15i4.6597
Mohammad; Philadelphia University, Jordan Alhihi , Mohammad Reza; Shiraz University of Technology, Iran Khosravi , Hani; Philadelphia University, Jordan Attar , Mohammad; Philadelphia University, Jordan Samour
Multi-Protocol Label Switching for Traffic Engineering (MPLS-TE) technology is an intelligent and advanced tool for handling traffic through the core networks and implementing new services based on virtual transport. Since MPLS-TE combines channel and network layer mechanisms, network administrators can optimally integrate and allocate the traffic loads while maintaining the speed of technologies such as Asynchronous Transfer Mode (ATM) technology. In this paper, the problem of the developed algorithm of multi-path routing which allows us to determine the optimum number of independent shortest paths is theoretically solved. In details, the article proposes a way for finding the set of shortest paths using Dijkstra's algorithm, and then determination of the maximum flow for each of the shortest paths based on the mathematical concepts and finally, introducing the solution of the multi-criteria optimization problem for a set of shortest paths. According to our approach, optimizing the use of resources in the core networks is possible with using the MPLS-TE technology.
Volume: 15
Issue: 4
Page: 1701-1709
Publish at: 2017-12-01

Immensely Discriminate Routing in Wireless Networks

10.11591/ijeecs.v8.i3.pp712-714
Sujatha V , E. A. Mary Anitha
Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Volume: 8
Issue: 3
Page: 712-714
Publish at: 2017-12-01

NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem

10.11591/ijeecs.v8.i3.pp651-653
Paramasivam E , D. Arivazhaga
India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack issue that we are confront in our nation. The arrangement included a secured advanced payment framework that has reason assembled margins on the sum required in the exchange. Every exchange includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the bank at the time of year of exchange, a base support of banks is important to effectively execute this. There is no need of a web association, in this way making it available to all aspects of the nation.
Volume: 8
Issue: 3
Page: 651-653
Publish at: 2017-12-01

WareWise: Business Development Management Framework based on Device-to-Device Industrial Internet of Things

10.11591/ijeecs.v8.i3.pp747-750
Ramesh P. , V. Mathivanan
Internet of Things (IoT) - empowered data framework arrangements are developing in different spaces, for example, remote social insurance, keen coordination’s, farming et cetera. In the mean time, Business Development Management Frameworks (BDMF) has turned out to be promising instruments for driving and overseeing gadgets inside IoT frameworks. Be that as it may, past works have not completely tended to how the IoT-based BDMF can proceed with their execution when the included IoT gadgets don't have a dependable Internet association. In this paper, we propose a framework outline for decentralized device to device (D2D) - based BD execution, where versatile hubs have the ability of both executing BDs additionally moving BD execution to different hubs amid runtime. We apply this plan to the field of shrewd coordination’s, keeping in mind the end goal to empower savvy products checking. The exhibited merchandise observing arrangement empowers responding to occasions when they happen, while likewise producing a hint of the checking execution history. A model concentrating on the movement usefulness of the stage has been actualized and tried to assess its execution with regards to the specified savvy coordination’s situation.
Volume: 8
Issue: 3
Page: 747-750
Publish at: 2017-12-01

Robust Video Watermarking Scheme Based on Intra-Coding Process in MPEG-2 Style

10.11591/ijece.v7i6.pp3332-3343
Rakesh Ahuja , S. S. Bedi
The proposed scheme implemented a semi blind digital watermarking method for video exploiting MPEG-2 standard. The watermark is inserted into selected high frequency coefficients of plain types of discrete cosine transform blocks instead of edge and texture blocks during intra coding process. The selection is essential because the error in such type of blocks is less sensitive to human eyes as compared to other categories of blocks. Therefore, the perceptibility of watermarked video does not degraded sharply. Visual quality is also maintained as motion vectors used for generating the motion compensated images are untouched during the entire watermarking process. Experimental results revealed that the scheme is not only robust to re-compression attack, spatial synchronization attacks like cropping, rotation but also strong to temporal synchronization attacks like frame inserting, deleting, swapping and averaging. The superiority of the anticipated method is obtaining the best sturdiness results contrast to the recently delivered schemes.
Volume: 7
Issue: 6
Page: 3332-3343
Publish at: 2017-12-01
Show 1411 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration