Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,758 Article Results

Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with Minimized Switches

10.12928/telkomnika.v16i2.9024
K.; Multimedia University Shashikumar , C.; Multimedia University Venkataseshaiah , K. S.; Multimedia University Sim
The current rapid growth in IoT technology facilitates the effortless implementation of bidirectional remote monitoring and control system implementation in homes and buildings. We have modeled an actual non-intrusive PnP sequential SVC prototype hardware and wireless FLC automation software design on a real single phase home appliances system as load modeling. In addition, we have also designed a novel Unidirectional MOSFET Switched Capasitor model (UniMosSC) which enables us to reduce the hardware cost and increase the life span of SVC due it uses minimum switching devices. The system we have designed is able to correct the power factor at the root of the problem at each appliance. Due to complexity of appliance clustering and overlapping clusters, we implemented fuzziness in the system for more reliability in computations. The system could be used in homes or buildings resulting in electricity bill reduction, saving dollars and cents.
Volume: 16
Issue: 2
Page: 889-899
Publish at: 2018-04-01

Design and Analysis of Ku/K-band Circular SIW Patch Antenna using 3D EM-based Artificial Neural Networks

10.12928/telkomnika.v16i2.8011
Mohammed; Aboubekr Belkaid University of Tlemcen Chetioui , Abdelhakim; Aboubekr Belkaid University of Tlemcen Boudkhil , Nadia; Aboubekr Belkaid University of Tlemcen Benabdellah , Nasreddine; Aboubekr Belkaid University of Tlemcen Benahmed
Substrate Integrated Waveguide (SIW) antennas are considered as main radiators for RF and microwave wireless systems due to their low profile, low cost and soft integration with the other devices. The gain of a SIW patch antenna may be enhanced using different techniques such as Artificial Neural Networks (ANN) by modifying the antenna’s geometry with high efficiency comparing to electromagnetic techniques that take more time. This paper describes a novel structure of a circular SIW patch antenna design using a tree-dimensional electromagnetic (3D-EM) simulation based on ANN model which is developed as an accurate tool for synthesizing the forward side and then analyzing the reverse side of the problem. In this work, ANN algorithms are used for training the samples to provide precise geometrical dimensions of the SIW patch antenna with high accuracy for the target requirements. The antenna is designed to operate in Ku and K frequency bands, resonate at 16.10 GHz and 19.81 GHz respectively and show good performance resulting in low return losses of less than -10dB to -29dB for the selective frequency bands.
Volume: 16
Issue: 2
Page: 594-599
Publish at: 2018-04-01

Quality Translation Enhancement Using Sequence Knowledge and Pruning in Statistical Machine Translation

10.12928/telkomnika.v16i2.8687
Media A.; Sampoerna University Ayu , Teddy; Sampoerna University Mantoro , Jelita; Surya University Asean
Machine translation has two important parts, a learning process which followed by a translation process. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This study evaluated 28 different parameters in IRSTLM language modeling, which resulting 270 millions experiments, and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The parallel corpus and statistical machine learning for English and Bahasa Indonesia were used in this study. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence knowledge/value parameter in translation process has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail.
Volume: 16
Issue: 2
Page: 718-727
Publish at: 2018-04-01

Breast Mass Segmentation Using a Semi-automatic Procedure Based on Fuzzy C-means Clustering

10.12928/telkomnika.v16i2.6193
Moustapha Mohamed; Chouaib Doukkali University Saleck , Abdelmajid El; Chouaib Doukkali University Moutaouakkil , Mohammed; Chouaib Doukkali University Moucouf , Maksi; Hospital Mohamed V Bouchaib , Hani; Hospital Mohamed V Samira , Jamaldine; Hospital Mohamed V Zineb
Mammography is the primary modality that helped in the early detection and diagnosis of women breast diseases. Further, the process of extracting the masses in mammogram represents a challenging task facing the radiologists, due to problems such as fuzzy or speculated borders, low contrast and the presence of intensity inhomogeneities. Aims to help the radiologists in the diagnosis of breast cancer, many approaches have been conducted to automatically segment the masses in mammograms. Towards this aim, in this paper, we present a new approach for extraction of tumors from region-of-interest (ROI) using the algorithm of Fuzzy C-Means (FCM) setting two clusters for semi-automated segmentation. The proposed method meant to select as input data the set of pixels that enable to get the meaningful information required to segment the masses with high accuracy. This could be accomplished through eliminating unnecessary pixels, which influence on this process through separating it outside of the input data using an optimal threshold given by monitoring the change of clusters rate during the process of threshold decrementing. The proposed methodology has successfully segmented the masses, with an average sensitivity of 82.02% and specificity of 98.23%.
Volume: 16
Issue: 2
Page: 665-672
Publish at: 2018-04-01

Exergy Assessment of Photovoltaic Thermal with V-groove Collector Using Theoretical study

10.12928/telkomnika.v16i2.8433
Muhammad; The National University of Malaysia Zohri , Nurato; Mercu Buana University Nurato , Lalu Darmawan; College Computer Information Management (STMIK) Mataram Bakti , Ahmad; The National University of Malaysia Fudholi
The solution of the environmental problems because of fuel fossil is to use new and renewable energy. There are many studies about energy analysis of solar collector with v-groove but exergy analysis of photovoltaic thermal system with v-groove is still less especially by theoretical study. Photovoltaic thermal with v-groove collector has been conducted the exergy analysis by theoretical assessment. The matrix inversion methods were used to analyze the energy balance equation. The theoretical assessment was conducted under the solar intensity of 385 W/m2, 575 W/m2, and 875 W/m2 and mass flow rate between 0.01 and 0.05 kg/s. The maximum exergy efficiency and exergy of PVT system with v-groove collector were 17.80% and 86.32 Watt at the solar intensity of 875 W/m2.
Volume: 16
Issue: 2
Page: 550-557
Publish at: 2018-04-01

Data in Transit Validation for Cloud Computing Using Cloud-Based Algorithm Detection of Injected Objects

10.11591/ijeecs.v10.i1.pp348-353
Rashidah Funke Olanrewaju , Thouhedul Islam , Othman O. Khalifa , Fawwaz Eniola Fajingbesi
The recent paradigm shift in the IT sector leading to cloud computing however innovative had brought along numerous data security concerns. One major such security laps is that referred to as the Man in the Middle (MITM) attack where external data are injected to either hijack a data in transit or to manipulate the files and object by posing as a floating cloud base. Fresh algorithms for cloud data protection do exist however, they are still prone to attack especially in real-time data transmissions due to employed mechanism. Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. The labelling header technique allows for a two-way data binding; DOM based communication between local and cloud computing that triggers automated acknowledgment immediately after file modification. A two layer encryption functions in PHP was designed for detecting injected object; bcrypt methods in Laravel and MD5 that generate 32 random keys. A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.
Volume: 10
Issue: 1
Page: 348-353
Publish at: 2018-04-01

A Simple, Rapid Analysis, Portable, Low-cost, and Arduino-based Spectrophotometer with White LED as a Light Source for Analyzing Solution Concentration

10.12928/telkomnika.v16i2.7159
Asep Bayu; Universitas Pendidikan Indonesia Dani Nandiyanto , Rena; Universitas Pendidikan Indonesia Zaen , Rosi; Universitas Pendidikan Indonesia Oktiani , Ade Gafar; Universitas Pendidikan Indonesia Abdullah , Lala Septem; Universitas Pendidikan Indonesia Riza
The purpose of this study was to demonstrate a simple, rapid analysis, portable, and inexpensive spectrophotometer. Different from other spectrophotometers, the present instrument consisted of a single white light-emmiting-diode (LED) as a light source, a light sensor, and arduino electronic card as an acquisition system. To maintain a constant light intensity, a common white-color LED emitting a 450-620 nm continous spectrum was employed. Software was written in C++ to control photometer through a USB interface and for data acquistion to the computer. The instrument is designed to be simple and compacted with sizes of 200 x 130 x 150 mm for length, width, and height, respectively. The analysis of the total cost isabout less than 500 USD, while commercially available offers price of more than 10,000 USD. Thus, this makes the present instrument feasible for teaching support media in developing countries. The effectiveness of the present spectrophotometer for analyzing solution concentration (i.e. curcumin) was also demonstrated. Interestingly, the present spectrophotometer is able to measure the concentration of curcumin precisely with an accuracy of more than 90%. Different from commercially available standard UV-visible spectrophotometers that have limitations in the analysis of concentration of less than 50 ppm, the present system can measure the concentration with no limitation since the measurement is based on the LED light being penetrated.
Volume: 16
Issue: 2
Page: 580-585
Publish at: 2018-04-01

Design MIMO 1x8 Antenna for Future 5G Applications

10.12928/telkomnika.v16i2.8383
Yusnita; Universitas Riau Rahayu , Muhammad Rifqy; Universitas Riau Asrul , Tulus; Universitas Riau Rahayu
This paper presented the design of MIMO 1x8 antenna operating at 38 GHz for future 5G applications. The antenna used the Rogers RT / duroid 5880 substrate with a thickness of 0.787 mm and a dielectric constant of 2.2. This antenna has 1x8 elements with 13.4 dBi of gain and the return loss of -15.76 dB. It has approximately 1.294 GHz bandwidth within the range of 37.485 GHz-38.779 GHz. The comparison performances between both antennas MIMO 1x4 and 1x8 are also discussed. It is shown that both radiation patterns are similar. The increasing number of elements affect to the gain and frequency. The proposed antenna meets the 5G requirements.
Volume: 16
Issue: 2
Page: 600-605
Publish at: 2018-04-01

Data Cleaning Service for Data Warehouse: An Experimental Comparative Study on Local Data

10.12928/telkomnika.v16i2.7669
Arif; King Abdulaziz University Bramantoro
Data warehouse is a collective entity of data from various data sources. Data are prone to several complications and irregularities in data warehouse. Data cleaning service is non trivial activity to ensure data quality. Data cleaning service involves identification of errors, removing them and improve the quality of data. One of the common methods is duplicate elimination. This research focuses on the service of duplicate elimination on local data. It initially surveys data quality focusing on quality problems, cleaning methodology, involved stages and services within data warehouse environment. It also provides a comparison through some experiments on local data with different cases, such as different spelling on different pronunciation, misspellings, name abbreviation, honorific prefixes, common nicknames, splitted name and exact match. All services are evaluated based on the proposed quality of service metrics such as performance, capability to process the number of records, platform support, data heterogeneity, and price; so that in the future these services are reliable to handle big data in data warehouse.
Volume: 16
Issue: 2
Page: 834-842
Publish at: 2018-04-01

Fast and Accurate Spelling Correction Using Trie and Damerau-levenshtein Distance Bigram

10.12928/telkomnika.v16i2.6890
Viny Christanti; Tarumanagara University M. , Rudy; Tarumanagara University Rudy , Dali S.; Tarumanagara University Naga
This research was intended to create a fast and accurate spelling correction system with the ability to handle both kind of spelling errors, non-word and real word errors. Existing spelling correction system was analyzed and was then applied some modifications to improve its accuracy and speed. The proposed spelling correction system is then built based on the method and intuition used by existing system along with the modifications made in previous step. The result is a various spelling correction system using different methods. Best result is achieved by the system that uses bigram with Trie and Damerau-Levenshtein distance with the word level accuracy of 84.62% and an average processing speed of 18.89 ms per sentence.
Volume: 16
Issue: 2
Page: 827-833
Publish at: 2018-04-01

Balancing Trade-off between Data Security and Energy Model for Wireless Sensor Network

10.11591/ijece.v8i2.pp1048-1055
Manjunath B. E. , P. V. Rao
An extensive effort to evolve various routing protocol to ensure optimal data delivery in energy efficient way is beneficial only if there is additional means of security process is synchronized. However, the security process consideration introduces additional overhead thus a security mechanism is needed to accomplish an optimal trade-off that exists in-between security as well as resource utilization especially energy. The prime purpose of this paper is to develop a process of security in the context of wireless sensor networks (WSN) by introducing two types of sensor node deployed with different capabilities. The proposed algorithm Novel Model of Secure Paradigm (N-MSP) which is further integrated with WSN. However, this algorithm uses a Hash-based Message Authentication Code (HMAC) authentication followed by pairwise key establishment during data aggregation process in a WSN. The extensive simulation carried out in a numerical platform called MATLAB that depicts that the proposed N-MSP achieves optimal processing time along with energy efficient pairwise key establishment during data aggregation process
Volume: 8
Issue: 2
Page: 1048-1055
Publish at: 2018-04-01

Design and Analysis of a Broadcast Network Using Logical Segmentation

10.12928/telkomnika.v16i2.8461
Anyasi; Ambrose Alli University Francis , Uzairue; Covenant University Stanley , Enehizena; University of Benin O.N. , Victor Matthews; Covenant University Olu , Amaize; Covenant University Peter , Nsikan; Covenant University Nkordeh
This study shows how the network performance of a flat switch network in the main library complex of Ambrose Ali University (AAU), Ekpoma can greatly be improved by logical segmentation. A survey of the flat switch network of the library complex was carried out to ascertain the physical and logical topology of the network and the number of hosts and network devices available. The kind of traffic transmitted over the network was also considered. Riverbed Modeler Academic Edition was used to simulate two replicas of the library network. One of the simulated networks was logically segmented by implementing Virtual Local Area Network (VLAN). Statistics like traffic dropped, traffic forwarded, traffic received, broadcast traffic dropped and traffic sent in bits/sec or packets/sec were collected from both simulations and the results were analyzed and compared. The results from the simulations showed that the application of VLAN immensely enhanced the network performance by about 75%(depending on the size of the network) because the logical segmentation increased the number of broadcast domain while reducing each of the broadcast size. This further implied that poor network design and large broadcast domain in a network, gravely affect the performance of a network.
Volume: 16
Issue: 2
Page: 803-810
Publish at: 2018-04-01

Motion Detection and Clustering Using PCA and NN in Color Image Sequence

10.12928/telkomnika.v16i2.7471
Mourad; University of Gafsa Moussa , Nesrine; University of Sousse Bdioui , Ali; University of Sousse Douik
This paper presents a motion detection method with the use of the Principal Component Analysis. This method is able to detect and track moving objects in a sequence of images. The tested sequence is segmented within the meaning of movement. In this paper, the concept of extracting significant information from a large number of data is adopted to provide an effective method for tracking moving objects on the video image. The principal components are different in term of getting significant information, the nature of motion (the nature of information) is responsible of this difference, the algorithm in this paper distinguish the motion nature and choose the appropriate components to give a best segmentation.
Volume: 16
Issue: 2
Page: 747-754
Publish at: 2018-04-01

Comparison of Entropy Coding mechanism on IEEE1857.2 Lossless Audio Compression Standard

10.11591/ijeecs.v10.i1.pp176-183
Fathiah Abdul Muin , Teddy Surya Gunawan , Mira Kartiwi , Elsheikh M.A. Elsheikh
This paper has two objectives. First, we aim to review and analyze the performance of the IEEE 1857.2 standard, focusing is on the Golomb-Rice and Arithmetic entropy algorithms as well as the effect of the pre-processing block on these entropy blocks. The pre-processing block normalizes the error residue of the Linear Predictive encoder, which then is passed to Entropy block, where the selector chooses the entropy encoder to use. The second objective is to present results from experimenting different existing algorithms available to benchmark it’. The results are discussed, and comparisons are made to identify the effect on compression ratio and encoding speed of the lossless encoder. As well as this, comparison is made to analyze effects of enabling and disabling the pre-processing output to the Entropy Coding block. We concluded that pre-processing block works well to flatten the output at lower predictor order for all the sound types, but works best at improving the residual output for music sound type.
Volume: 10
Issue: 1
Page: 176-183
Publish at: 2018-04-01

Finite Element Simulation of Microfluidic Biochip for High Throughput Hydrodynamic Single Cell Trapping

10.12928/telkomnika.v16i2.9023
Amelia Ahmad; Universiti Teknologi Malaysia Khalili , Mohd Ariffanan Mohd; Universiti Teknologi Malaysia Basri , Mohd Azhar Abdul; Universiti Teknologi Malaysia Razak
In this paper, a microfluidic device capable of trapping a single cell in a high throughput manner and at high trapping efficiency is designed simply through a concept of hydrodynamic manipulation. The microfluidic device is designed with a series of trap and bypass microchannel structures for trapping individual cells without the need for microwell, robotic equipment, external electric force or surface modification. In order to investigate the single cell trapping efficiency, a finite element model of the proposed design has been developed using ABAQUS-FEA software. Based on the simulation, the geometrical parameters and fluid velocity which affect the single cell trapping are extensively optimized. After optimization of the trap and bypass microchannel structures via simulations, a single cell can be trapped at a desired location efficiently.
Volume: 16
Issue: 2
Page: 883-888
Publish at: 2018-04-01
Show 1454 of 1984

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration