Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,325 Article Results

Comparison of Entropy Coding mechanism on IEEE1857.2 Lossless Audio Compression Standard

10.11591/ijeecs.v10.i1.pp176-183
Fathiah Abdul Muin , Teddy Surya Gunawan , Mira Kartiwi , Elsheikh M.A. Elsheikh
This paper has two objectives. First, we aim to review and analyze the performance of the IEEE 1857.2 standard, focusing is on the Golomb-Rice and Arithmetic entropy algorithms as well as the effect of the pre-processing block on these entropy blocks. The pre-processing block normalizes the error residue of the Linear Predictive encoder, which then is passed to Entropy block, where the selector chooses the entropy encoder to use. The second objective is to present results from experimenting different existing algorithms available to benchmark it’. The results are discussed, and comparisons are made to identify the effect on compression ratio and encoding speed of the lossless encoder. As well as this, comparison is made to analyze effects of enabling and disabling the pre-processing output to the Entropy Coding block. We concluded that pre-processing block works well to flatten the output at lower predictor order for all the sound types, but works best at improving the residual output for music sound type.
Volume: 10
Issue: 1
Page: 176-183
Publish at: 2018-04-01

Finite Element Simulation of Microfluidic Biochip for High Throughput Hydrodynamic Single Cell Trapping

10.12928/telkomnika.v16i2.9023
Amelia Ahmad; Universiti Teknologi Malaysia Khalili , Mohd Ariffanan Mohd; Universiti Teknologi Malaysia Basri , Mohd Azhar Abdul; Universiti Teknologi Malaysia Razak
In this paper, a microfluidic device capable of trapping a single cell in a high throughput manner and at high trapping efficiency is designed simply through a concept of hydrodynamic manipulation. The microfluidic device is designed with a series of trap and bypass microchannel structures for trapping individual cells without the need for microwell, robotic equipment, external electric force or surface modification. In order to investigate the single cell trapping efficiency, a finite element model of the proposed design has been developed using ABAQUS-FEA software. Based on the simulation, the geometrical parameters and fluid velocity which affect the single cell trapping are extensively optimized. After optimization of the trap and bypass microchannel structures via simulations, a single cell can be trapped at a desired location efficiently.
Volume: 16
Issue: 2
Page: 883-888
Publish at: 2018-04-01

Error Performance Analysis in Underwater Acoustic Noise With Non-Gaussian Distribution

10.12928/telkomnika.v16i2.8001
Nor Shahida; Universiti Tun Hussein Onn Malaysia (UTHM) Mohd Shah , Yasin Yousif; University of Mustansiriyah Al-Aboosi , Musatafa Sami; Universiti Tun Hussein Onn Malaysia (UTHM) Ahmed
There is a high demand for underwater communication systems due to the increase in current social underwater activities. The assumption of Gaussian noise allows the use of Traditional communication systems. However, the non-Gaussian nature of underwater acoustic noise (UWAN) results in the poor performance of such systems. This study presents an experimental model for the noise of the acoustic underwater channel in tropical shallow water at Desaru beach on the eastern shore of Johor in Malaysia, on the South China Sea with the use of broadband hydrophones. A probability density function of the noise amplitude distribution is proposed and its parameters defined. Furthermore, an expression of the probability of symbol error for binary signalling is presented for the channel in order to verify the noise effect on the performance of underwater acoustic communication binary signalling systems.
Volume: 16
Issue: 2
Page: 681-689
Publish at: 2018-04-01

Energy Management through Bio-gas Based Electricity Generation System during Load Shedding in Rural Areas

10.12928/telkomnika.v16i2.5190
Shah Mohazzem; Military Institute of Science & Technology (MIST) Hossain , Md. Mahadi; Military Institute of Science & Technology (MIST) Hasan
The scarcity of energy especially electrical energy is an acute problem and hinders the modern economic development of a country. Most of the time only a small percentage of peoples have access to use continuous electricity supply. But in this modern era, all types of arena like economies, households and companies have extensive demand for electricity which is due to industrialization, extensive urbanization, population growth, rising standard of living and modernization of the agricultural sector of a country. Electricity generation from bio-gas plant through cowdungs of a dairy firm can mitigate the electricity demand to some extends in rural areas, where biogas plant will act act as a backup supply especially during load shedding. This research paper proposed an electricity generation system from bio-gas, which can work as a secondary source of the electricity for all electrical appliances of a particular area in a cost effective manner.
Volume: 16
Issue: 2
Page: 525-532
Publish at: 2018-04-01

Sentence Extraction Based on Sentence Distribution and Part of Speech Tagging for Multi-Document Summarization

10.12928/telkomnika.v16i2.8431
Agus Zainal; Institut Teknologi Sepuluh Nopember Arifin , Moch Zawaruddin; Institut Teknologi Sepuluh Nopember Abdullah , Ahmad Wahyu; Institut Teknologi Sepuluh Nopember Rosyadi , Desepta Isna; Institut Teknologi Sepuluh Nopember Ulumi , Aminul; Institut Teknologi Sepuluh Nopember Wahib , Rizka Wakhidatus; Institut Teknologi Sepuluh Nopember Sholikah
Automatic multi-document summarization needs to find representative sentences not only by sentence distribution to select the most important sentence but also by how informative a term is in a sentence. Sentence distribution is suitable for obtaining important sentences by determining frequent and well-spread words in the corpus but ignores the grammatical information that indicates instructive content. The presence or absence of informative content in a sentence can be indicated by grammatical information which is carried by part of speech (POS) labels. In this paper, we propose a new sentence weighting method by incorporating sentence distribution and POS tagging for multi-document summarization. Similarity-based Histogram Clustering (SHC) is used to cluster sentences in the data set. Cluster ordering is based on cluster importance to determine the important clusters. Sentence extraction based on sentence distribution and POS tagging is introduced to extract the representative sentences from the ordered clusters. The results of the experiment on the Document Understanding Conferences (DUC) 2004 are compared with those of the Sentence Distribution Method. Our proposed method achieved better results with an increasing rate of 5.41% on ROUGE-1 and 0.62% on ROUGE-2.
Volume: 16
Issue: 2
Page: 843-851
Publish at: 2018-04-01

Accumulator Charging Control with Piezoelectric Based on Fuzzy Algorithm Scheduling

10.12928/telkomnika.v16i2.7067
Iswanto; Universitas Muhammadiyah Yogyakarta Iswanto , Wahyu Sari; Universitas Muhammadiyah Yogyakarta Agustiningsih , Faaris; Universitas Muhammadiyah Yogyakarta Mujaahid , Rohmansyah; Universitas Muhammadiyah Yogyakarta Rohmansyah , Aris; Universitas Muhammadiyah Surakarta Budiman
Battery accumulator charging with pizoelectric takes considerable long time so that an energy harvester is needed by using in this study LTC 3588 circuit. However, by using the energy harvester, the pizoelectric cannot be used to charge 12 volt battery, thus a boost converter is needed. The output voltage is too small to increase by using the boost converter so that the output from the energy converter is used to charge four AA batteries. After the voltage of the four AA batteries as much as 4.7 volt is increased by using the boost converter, the batteries can be used to charge accumulator battery 12 volt. To charge the battery to accumulator, scheduling algorithm planted in microcontroller arduino is needed. By using the scheduling algorithm with fuzzy logic in the arduino microcontroller, the microcontroller is able to control schedule of accumulatro battery charging.
Volume: 16
Issue: 2
Page: 635-640
Publish at: 2018-04-01

Varying Effects of Temperature and Path-length on Ozone Absorption Cross-Section

10.12928/telkomnika.v16i2.8577
Enenche; Federal University Of Technology Minna Patrick , Michael; Federal University of Technology Minna David , A.O.; Federal University of Technology Minna Caroline , Mohd Haniff; Universiti Teknologi Malaysia Ibrahim , Sevia Mahdaliza; Universiti Teknologi Malaysia Idrus , Tay Ching En; First City University College Marcus
Inconsistencies in the absorption cross section of ozone have been observed. Hence, for accurate measurement, we have reported the combined effects of varying optical path-length and temperature on the ozone gas absorption cross section (OACS) at 334.15nm. Adopting optical absorption spectroscopy, results of the (OACS) have been simulated using spectralcalc simulator with HITRAN 12 has the latest line list. OACS increased by 52.27% as the temperature increased from 100K to 350K while it was slightly affected by a 0.007% decrease varying the path-length from 0.75cm-130cm.
Volume: 16
Issue: 2
Page: 618-623
Publish at: 2018-04-01

Internal and External e-Customs Services IOS Application Case Study: Kuwait Customs Department

10.11591/ijeecs.v10.i1.pp400-408
Soha Aljaber , Nayfah Mohsen Almutairi , Abdulrahman Alkandari
Government regulations usually characterized by the many stages of completion of any transaction and that causing a delay in the work and that wasting a lot of time. Especially with the particular customs system which consists of several points of entry, including land, sea, and air. In addition, the General Customs Department is one of the sensitive circuits in the state. Therefore, to continue the process any shipment or any transaction relating to customs, it requires a long time. This paper presented a design for an application that running on smartphones with IOS system. This application provides internal services and external services for the General Customs Department to ease the completion of any transaction either for the customs’ employee or the citizens. The employee uses the internal services section, and the external services section is used by the citizens. As a result of this application, it provides time and effort for the citizens and customs and decreasing the number of customs’ reviewers.
Volume: 10
Issue: 1
Page: 400-408
Publish at: 2018-04-01

Personal Security Tracking based on Android and Web Application

10.12928/telkomnika.v16i2.7625
Angry; Bina Nusantara University Ronald , Violitta; Bina Nusantara University Yesmaya , Muhammad; Bina Nusantara University Danaparamita
Nowadays, the frequency of abduction is increasing significantly. Information technology provide many social media which is causing the leaked of personal information where abductor can find out the information. Using social media, people can share location, life event, and anything related about their life event, these become the useful information for the abductor. To anticipate this, a lot of personal tracking device is developed, but the response is too late. Because, the family or relative of the victims will notice that abduction had happen after the victim is lost. According to the problem, this research will focus on develop the personal tracking device which trigger by the victims who own the phone based on android and web application. Whenever the abduction happens, the victim just need to click the button and the system will send a message to the relatives and family in their contact also trigger the notification to the local security. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is android application for user and web application for managing application.
Volume: 16
Issue: 2
Page: 771-775
Publish at: 2018-04-01

Noise Level Estimation for Digital Images Using Local Statistics and Its Applications to Noise Removal

10.12928/telkomnika.v16i2.9060
Asem; University of Zawia Khmag , Sami; University of Zawia Ghoul , Syed Abdul; Universiti Putra Malaysia Rahman Al-Haddad , Noraziahtulhidayu; Universiti Putra Malaysia Kamarudin
In this paper, an automatic estimation of additive white Gaussian noise technique is proposed. This technique is built according to the local statistics of Gaussian noise. In the field of digital signal processing, estimation of the noise is considered as pivotal process that many signal processing tasks relies on. The main aim of this paper is to design a patch-based estimation technique in order to estimate the noise level in natural images and use it in blind image removal technique. The estimation processes is utilized selected patches which is most contaminated sub-pixels in the tested images sing principal component analysis (PCA). The performance of the suggested noise level estimation technique is shown its superior to state of the art noise estimation and noise removal algorithms, the proposed algorithm produces the best performance in most cases compared with the investigated techniques in terms of PSNR, IQI and the visual perception.
Volume: 16
Issue: 2
Page: 915-924
Publish at: 2018-04-01

File Reconstruction in Digital Forensic

10.12928/telkomnika.v16i2.8230
Opim Salim; Universitas Sumatera Utara Sitompul , Andrew; Universitas Sumatera Utara Handoko , Romi Fadillah; Universitas Sumatera Utara Rahmat
File recovery is one of the stages in computer forensic investigative process to identify an acquired file to be used as digital evident. The recovery is performed on files that have been deleted from a file system. However, in order to recover a deleted file, some considerations should be taken. A deleted file is potentially modified from its original condition because another file might either partly or entirely overriding the file content. A typical approach in recovering deleted file is to apply Boyer-Moore algorithm that has rather high time complexity in terms of string searching. Therefore, a better string matching approach for recovering deleted file is required. We propose Aho-Corasick parsing technique to read file attributes from the master file table (MFT) in order to examine the file condition. If the file was deleted, then the parser search the file content in order to reconstruct the file. Experiments were conducted using several file modifications, such as 0% (unmodified), 18.98%, 32.21% and 9.77%. From the experimental results we found that the file reconstruction process on the file system was performed successfully. The average successful rate for the file recovery from four experiments on each modification was 87.50% and for the string matching process average time on searching file names was 0.32 second.
Volume: 16
Issue: 2
Page: 776-794
Publish at: 2018-04-01

Investigations of Component Carrier Selection Algorithms in Long Term Evolution-Advanced

10.11591/ijeecs.v10.i1.pp330-336
Huda Adibah Mohd Ramli , Ani Liza Asnawi , Farah Nadia Mohd Isa , Amelia Wong Azman , Mohamad ‘Ismat Hafizi Mansor
Given that the demand for real-time multimedia contents that require significantly high data rate are getting of high popularity, a new mobile cellular technology known as Long term Evolution-Advanced (LTE-A) was standardized. The LTE-A is envisaged to support high peak data rate by aggregating more than one Component Carriers (CCs) of the same or different frequency bandwidths. Since the inter-band non-contiguous carrier aggregation is likely to be used due to the current frequency allocation, this paper provides a performance study of a number of CC selection algorithms for use in the inter-band non-contiguous downlink LTE-A. It should be noted that CC selection is of paramount importance in the LTE-A operating in backward compatible mode as the LTE-A contains a mixture of the legacy Long Term Evolution (LTE) users that support packets (re)transmission on a single CC and the LTE-A users that utilize more than one CCs for packets (re)transmission. Simulation results demonstrated the efficacy of the Channel-Throughput Aware (CTA) algorithm for maximizing the system capacity without compromising the required Quality of Service of real-time video users.
Volume: 10
Issue: 1
Page: 330-336
Publish at: 2018-04-01

Detection of Malicious Circuitry using Transition Probability Based Node Reduction Technique

10.12928/telkomnika.v16i2.6812
Nirmala Devi; Amrita University M. , Irene Susan; Amrita University Jacob , Sree; Amrita University Ranjani R , Jayakumar; Amrita University M.
In recent years, serious concerns have been raised against the tampering of integrated circuits due to outsourcing of circuits for fabrication. It has led to the addition of malicious circuitry known as Hardware Trojan. In this paper, a transition probability based node reduction technique for faster and efficient Hardware Trojan (HT) detection has been attempted. In the proposed method, the fact that the least controllable and observable nodes or the nodes with least transition probability are more vulnerable as Trojan sites is taken into consideration. The nodes that have lesser activity than the threshold are the candidate nodes. At each candidate node, segmentation is done for further leakage power analysis to detect the presence of Trojans. Experimental results observed on ISCAS’85 and ISCAS’89 benchmark circuits illustrate that the proposed work can achieve remarkable node reduction upto 78.81% and time reduction upto 58.7%. It was also observed that the circuit activity can be increased by varying the input probability. Hence, for further reduction in the Trojan activation time, the weighted input probability was obtained.
Volume: 16
Issue: 2
Page: 573-579
Publish at: 2018-04-01

A Specific Routing Protocol for Flying Adhoc Network

10.12928/telkomnika.v16i2.8444
Bashir Olaniyi; Ahmadu Bello University Zaria Sadiq , Adewale Emmanuel; Ahmadu Bello University Zaria Adedokun , Mohammad Bashir; Ahmadu Bello University Zaria Mu’azu , Yusuf Abubakar; University of Manchester Sha’aban
This paper presents a novel data and timed control routing protocol which is Flying Adhoc Network (FANET) specific. The developed FANET specific routing protocol laid emphasis on the route connectivity in the network by considering the captured data size, minimum allowable distance between randomly moving nodes and connection time. The performance of the proposed FANET specific routing protocol was simulated using NS3. The obtained throughput value for the routing protocol fluctuated between 742.064kbps and 755.083kbps as data are exchanged between nodes. This showed that when all the UAVs are on the network and communicating with one another, the throughput is flatline and not plummet. This implies consistency as nodes join and leave the network. The packet delivery ratio obtained for the FSRP during simulation was 96.13%. These results implied that data is successfully transmitted between the UAV acting as server and UAV acting as client on the network.
Volume: 16
Issue: 2
Page: 606-617
Publish at: 2018-04-01

Characterization of Respiratory Conditions Using Labview and Digital Spirometer

10.11591/ijeecs.v10.i1.pp66-73
S. Noorjannah Ibrahim , A. Z. Jusoh , N. Abdul Malik , A. L. Asnawi , S. Mazalan
One of the effective ways to diagnose various respiratory diseases is using spirometry test. Good spirometer comes with excellent graphical user interface. Spirometer is used to measure lung parameters such as Forced Expiratory Volume in the first second and the sixth seconds (FEV1 and FEV6). This paper presents an algorithm with Graphical User Interface (GUI) for characterization of respiratory conditions using LabVIEW Software. The whole spirometry system consists of a breathing circuitry with pressure sensor and a data acquisition board (NI sbRIO FPGA board). Results obtained from three different volunteers with different health performances are also presented in this paper. The FEV1/FEV6 ratio of a healthy volunteer is 81.1%, an asthma volunteer is 72.04%, and suspected bronchitis volunteer is 33.4%. Based on these results, the unhealthy volunteers tend to have smaller value of FEV1 with lower area under the curve when compared to healthy volunteer.
Volume: 10
Issue: 1
Page: 66-73
Publish at: 2018-04-01
Show 1426 of 1955

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration