Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,817 Article Results

Control Synthesis for Marine Vessels in Case of Limited Disturbances

10.12928/telkomnika.v16i2.7180
Mikhail; St. Petersburg State University Smirnov , Maria A.; St. Petersburg State University Smirnova
In view of rapid development of computer technology digital systems of automatic control are installed on the modern marine vessels for performance of various manoeuvres at optimal trajectories taking into account features of the ship and active disturbances. In this connection, great number of problems that deal with construction of automatic control systems, such as minimizing the fulfillment time of the maneuver, searching for the optimal trajectory, the suppression of various types of exogenous disturbances like wind and rough sea, arises. In the work, the problem of suppression of exogenous disturbances acting on a marine vessel, about which we have no information except its boundedness, is considered. The problem of searching of the controller as a static state feedback is the basis of offered approach. The system MATLAB-Simulink is accepted as the basic tool of the computer support. An example of modeling control system for the carrier is presented.
Volume: 16
Issue: 2
Page: 648-653
Publish at: 2018-04-01

Alternative Grounding Method Using Coconut Shell Charcoal as Media of Mesh Electrodes

10.12928/telkomnika.v16i2.8700
Moch; Brawijaya University Dhofir , Rini Nur; Brawijaya University Hasanah , Hadi; Brawijaya University Suyono , Avrizal Riva; Brawijaya University Belan
The utilization of coconut charcoal as alternative media of grounding was investigated. The mesh-electrode was made of stainless steel of 8-mm diameter, whereas its lattice dimension was 50cmx50cm. Four variations of lattice number were considered, i.e. 1-, 2-, and 4-lattice structures. Dry and wet charcoal media were considered. Mesh location was fixed in the depth of 80cm under the ground, while the 10cm of medium thickness variation was chosen. The resistance obtained using 10-cm thickness of charcoal layer in a mesh consisting of 1-, 2-, and 4-lattices were 268, 131, and 78 ohms consecutively. The addition of layer up to 80-cm resulted in a resistance decrease of 48%, 33%, and 44%. Using wet charcoal, the 10-cm layer produced 26.5, 17.5, and 14.8 ohms of grounding resistance and a reduction of 25%, 10%, and 3.6% subsequently for 1-, 2-, and 4-lattice mesh structure if the layer thickness was 80 cm.
Volume: 16
Issue: 2
Page: 488-494
Publish at: 2018-04-01

On the Comparison of Line Spectral Frequencies and Mel-Frequency Cepstral Coefficients Using Feedforward Neural Network for Language Identification

10.11591/ijeecs.v10.i1.pp168-175
Teddy Surya Gunawan , Mira Kartiwi
Of the many audio features available, this paper focuses on the comparison of two most popular features, i.e. line spectral frequencies (LSF) and Mel-Frequency Cepstral Coefficients. We trained a feedforward neural network with various hidden layers and number of hidden nodes to identify five different languages, i.e. Arabic, Chinese, English, Korean, and Malay. LSF, MFCC, and combination of both features were extracted as the feature vectors. Systematic experiments have been conducted to find the optimum parameters, i.e. sampling frequency, frame size, model order, and structure of neural network. The recognition rate per frame was converted to recognition rate per audio file using majority voting. On average, the recognition rate for LSF, MFCC, and combination of both features are 96%, 92%, and 96%, respectively. Therefore, LSF is the most suitable features to be utilized for language identification using feedforward neural network classifier.
Volume: 10
Issue: 1
Page: 168-175
Publish at: 2018-04-01

Improved Key Frame Extraction using Discrete Wavelet Transform with Modified Threshold Factor

10.12928/telkomnika.v16i2.7692
Hussein Ali; University of Technology Aldelfy , Mahmood Hamza; University of Technology Al-Mufraji , Thamir; University of Technology R. Saeed
Video summarization used for a different application like video object recognition and classification. In video processing, numerous frames containing similar information, this leads to time consumption and slow processing speed and complexity. By using key frames reducing the amount of memory needed for video data processing and complexity greatly. In this paper key frame extraction of Arabic isolated word using discrete wavelet transform (DWT) with modified threshold factor is proposed with different bases. The results for different wavelet basis db, sym and coif show the best result for numbers of key frames at the threshold factor value (0.75).
Volume: 16
Issue: 2
Page: 567-572
Publish at: 2018-04-01

Notice of Retraction Digital Image Steganography Using Bit Flipping

10.11591/ijict.v7i1.pp1-7
Aditya Kumar Sahu , Gandharba Swain
Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Volume: 7
Issue: 1
Page: 1-7
Publish at: 2018-04-01

A Real Time Vein Detection System

10.11591/ijeecs.v10.i1.pp129-137
Kazi Istiaque Ahmed , Mohamed Hadi Habaebi , Md Rafiqul Islam
Blood veins detection process can be cumbersome for nurses and medical practioners when it comes to special overweight type of patients.This simple routine procedure can lead the process into an extreme calamity for these patients. In this paper, we emphasized on a process for the detection of the vein in real time using the consecrations of Matlab to prevent or at least reduce the number of inescapable calamity for patients during the infusion of a needle by phlebotomy or doctor in everyday lives. Hemoglobin of the blood tissues engrossed the Near Infrared (NIR) illuminated light and Night vision camera is used to capture the scene and enhance the vein pattern clearly using Contrast Limited Adaptive Histogram Equalization (CLAHE) method. This simple approach can successfully also lead to localizing bleeding spots, clots from stroke …etc among other things.
Volume: 10
Issue: 1
Page: 129-137
Publish at: 2018-04-01

Editorial: Scientific Writing Workshop on TELKOMNIKA Editors and Authors Meeting (TEAM)

10.12928/telkomnika.v16i2.3773
Tole; Universitas Ahmad Dahlan Sutikno
In this year, TELKOMNIKA is organizing scientific writing workshop series for improving manuscript quality which is called as “Scientific Writing Workshop on TELKOMNIKA Editors and Authors Meeting (TEAM)”. This workshop is aimed at developing scientific writing skills to both editing and proofreading for preparing final manuscript. Editing covers reread manuscript which includes content, overall structure, clarity, style and citations to see whether the manuscript is well-organized and the transitions between paragraphs are smooth. Proofreading is the final stage of the editing process, focusing on surface errors such as misspellings and mistakes in grammar and punctuation. This process is just as important as any other aspect of writing. The process is instrumental in getting ideas across in an accessible and logical manner.
Volume: 16
Issue: 2
Page: 463-464
Publish at: 2018-04-01

Driver Behaviour State Recognition based on Speech

10.12928/telkomnika.v16i2.8416
Norhaslinda; Universiti Teknologi MARA Kamaruddin , Abdul Wahab; International Islamic University Malaysia Abdul Rahman , Khairul Ikhwan; Universiti Teknologi MARA Mohamad Halim , Muhammad Hafiq Iqmal; Universiti Teknologi MARA Mohd Noh
Researches have linked the cause of traffic accident to driver behavior and some studies provided practical preventive measures based on different input sources. Due to its simplicity to collect, speech can be used as one of the input. The emotion information gathered from speech can be used to measure driver behavior state based on the hypothesis that emotion influences driver behavior. However, the massive amount of driving speech data may hinder optimal performance of processing and analyzing the data due to the computational complexity and time constraint. This paper presents a silence removal approach using Short Term Energy (STE) and Zero Crossing Rate (ZCR) in the pre-processing phase to reduce the unnecessary processing. Mel Frequency Cepstral Coefficient (MFCC) feature extraction method coupled with Multi-Layer Perceptron (MLP) classifier are employed to get the driver behavior state recognition performance. Experimental results demonstrated that the proposed approach can obtain comparable performance with accuracy ranging between 58.7% and 76.6% to differentiate four driver behavior states, namely; talking through mobile phone, laughing, sleepy and normal driving. It is envisaged that such approach can be extended for a more comprehensive driver behavior identification system that may acts as an embedded warning system for sleepy driver.
Volume: 16
Issue: 2
Page: 852-861
Publish at: 2018-04-01

Vehicle Accident Report Application for Solving Traffic Problems and Reduce the Ratio of Pollution using Case Study: Kuwait City

10.11591/ijeecs.v10.i1.pp380-391
Abdulrahman Alkandari , Samer Moein
Minor traffic accidents have become a major problem facing the road users in the recent years, according to the statistics from the Ministry of Interior (MOI) in Kuwait there were recorded 80,388 accidents by the year 2014. Accidents not only affect the mobility but also contribute to air pollution and slow down economic growth. These effects are the result of the seriously extended trips travel time due to accumulated vehicles queue. In some accidents cases, the lost time waiting for the arrival of the traffic officers and filling up the accident report could take up to 45 minutes. The new idea of Vehicle Accident Report application (I-VAR) concept developed by the research team would reduce the waiting time up to 3 minutes (93% savings), which would increase the level of service of the segment of a roadway. In addition, the study will be discussed four major situations on some of the busiest roads in Kuwait. Specifically, gas emissions and cost estimation. Improve the pollution obviously, by using the (I-VAR) application for the minor accidents there is an amount of 360,776,460 K.D would be saved yearly from the Kuwait government funds. It is a consequence of the huge savings in alleviating traffic congestion and generally produces more saver and efficient travel conditions.
Volume: 10
Issue: 1
Page: 380-391
Publish at: 2018-04-01

An Optimum Approach for Preprocessing of Web User Query

10.11591/ijict.v7i1.pp8-12
Sunny Sharma , Sunita Sunita , Arjun Kumar , Vijay Rana
The emergence of the Web technology generated a massive amount of raw data by enabling Internet users to post their opinions, comments, and reviews on the web. To extract useful information from this raw data can be a very challenging task. Search engines play a critical role in these circumstances. User queries are becoming main issues for the search engines. Therefore a preprocessing operation is essential. In this paper, we present a framework for natural language preprocessing for efficient data retrieval and some of the required processing for effective retrieval such as elongated word handling, stop word removal, stemming, etc. This manuscript starts by building a manually annotated dataset and then takes the reader through the detailed steps of process. Experiments are conducted for special stages of this process to examine the accuracy of the system.
Volume: 7
Issue: 1
Page: 8-12
Publish at: 2018-04-01

Deduplication Analysis of Products In Digital Marketing

10.11591/ijeecs.v10.i1.pp392-399
P. Amudhavalli , N. Rajalakshmi , K.S. Sindhu
As Digital Marketing is becoming more popular, the number of customer’s interpretation on brands is increasing promptly which makes it firmer for companies to evaluate their brand image and to digital market their products on the web. The Forensic Analysis is used to determine and analyze patterns of fraudulent activities on images. Pixel Analysis and Least square support vector machine are used to compare and associate the scores acquired from the images into one result per tweet. We selected these techniques to compare and find the accuracy of the Digital Marketing images with the received product’s images to identify the fraudulent activities on images in Digital Marketing. As the result of this project the customer can identify whether the received product is exactly what is given in the online purchase website.
Volume: 10
Issue: 1
Page: 392-399
Publish at: 2018-04-01

Predicting the Spread of Acacia Nilotica Using Maximum Entropy Modeling

10.12928/telkomnika.v16i2.6894
Budi Arif; Universitas Singaperbangsa Karawang Dermawan , Yeni; Bogor Agricultural University Herdiyeni , Lilik Budi; Bogor Agriculturan University Prasetyo , Agung; The Ministry of Environment and Forestry Siswoyo
Acacia nilotica planted in Baluran National Park aims to prevent the spread of fire from savanna to teak forest became developed into invasive and led to a decrease in the quality and quantity of savannas. Therefore, it is required to predict the spread of A. nilotica to minimize the impacts of invasion on savanna area. The study aims to identify environmental factors which affect spread of A. nilotica. Furthermore, the spread of A. nilotica is predicted using Maximum Entropy. Maximum Entropy is efficient model since it uses presence-only data while the most of other models use presence and absence data. The experimental results reveal six environmental factors, including elevation, slope, NDMI, NDVI, distance from the river, and temperature were identified affecting the spread of A. nilotica. The most dominant environmental factors were elevation and temperature with 40% and 39.6% contributions. Maximum Entropy performed well in predicting the spread of A. nilotica, it was indicated by AUC value of 0.938.
Volume: 16
Issue: 2
Page: 703-712
Publish at: 2018-04-01

Kalman Filter Algorithm for Mitigation of Power System Harmonics

10.11591/ijece.v8i2.pp771-779
K. Dhineshkumar , C. Subramani
The maiden application of a variant of Kalman Filter (KF) algorithms known as Local Ensemble Transform Kalman Filter (LET-KF) are used for mitigation and estimation power system harmonics are proposed in this paper. The proposed algorithm is applied for estimating the harmonic parameters of power signal containing harmonics, sub-harmonics and inter-harmonics in presence of random noise. The KF group of algorithms are tested and applied for both stationary as well as dynamic signal containing harmonics. The proposed LET-KF algorithm is compared with conventional KF based algorithms like KF, Ensemble Kalman Filter (En-KF) algorithms for harmonic estimation with the random noise values 0.001, 0.05 and 0.1. Among these three noises, 0.01 random noise results will give better than other two noises. Because the phase deviation and amplitude deviation less in 0.01 random noise. The proposed algorithm gives the better results to improve the efficiency and accuracy in terms of simplicity and computational features. Hence there are less multiplicative operations, which reduce the rounding errors. It is also less expensive as it reduces the requirement of storing large matrices, such as the Kalman gain matrix used in other KF based methods.
Volume: 8
Issue: 2
Page: 771-779
Publish at: 2018-04-01

Bayesian Segmentation in Signal with Multiplicative Noise Using Reversible Jump MCMC

10.12928/telkomnika.v16i2.7510
Suparman; Universitas Ahmad Dahlan Suparman , Michel; Signal and Communications Group, ENSEEIHT Doisy
This paper proposes the important issues in signal segmentation. The signal is disturbed by multiplicative noise where the number of segments is unknown. A Bayesian approach is proposed to estimate the parameter. The parameter includes the number of segments, the location of the segment, and the amplitude. The posterior distribution for the parameter does not have a simple equation so that the Bayes estimator is not easily determined. Reversible Jump Markov chain Monte Carlo (MCMC) method is adopted to overcome the problem. The Reversible Jump MCMC method creates a Markov chain whose distribution is close to the posterior distribution. The performance of the algorithm is shown by simulation data. The result of this simulation shows that the algorithm works well. As an application, the algorithm is used to segment a Synthetic Aperture Radar (SAR) signal. The advantage of this method is that the number of segments, the position of the segment change, and the amplitude are estimated simultaneously.
Volume: 16
Issue: 2
Page: 673-680
Publish at: 2018-04-01

Fuzzified Single Phase Automatic Sequential Reactive Power Compensation with Minimized Switches

10.12928/telkomnika.v16i2.9024
K.; Multimedia University Shashikumar , C.; Multimedia University Venkataseshaiah , K. S.; Multimedia University Sim
The current rapid growth in IoT technology facilitates the effortless implementation of bidirectional remote monitoring and control system implementation in homes and buildings. We have modeled an actual non-intrusive PnP sequential SVC prototype hardware and wireless FLC automation software design on a real single phase home appliances system as load modeling. In addition, we have also designed a novel Unidirectional MOSFET Switched Capasitor model (UniMosSC) which enables us to reduce the hardware cost and increase the life span of SVC due it uses minimum switching devices. The system we have designed is able to correct the power factor at the root of the problem at each appliance. Due to complexity of appliance clustering and overlapping clusters, we implemented fuzziness in the system for more reliability in computations. The system could be used in homes or buildings resulting in electricity bill reduction, saving dollars and cents.
Volume: 16
Issue: 2
Page: 889-899
Publish at: 2018-04-01
Show 1457 of 1988

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration