Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,167 Article Results

A Good Performance OTP Encryption Image based on DCT-DWT Steganography

10.12928/telkomnika.v15i4.5883
Wellia Shinta; Dian Nuswantoro University (UDINUS), Indonesia Sari , Eko Hari; Dian Nuswantoro University (UDINUS), Indonesia Rachmawanto , De Rosal Ignatius Moses; Dian Nuswantoro University (UDINUS), Indonesia Setiadi , Christy Atika; Dian Nuswantoro University (UDINUS), Indonesia Sari
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
Volume: 15
Issue: 4
Page: 1982-1989
Publish at: 2017-12-01

Design and Evaluation of Submersible 11/0.415kV Distribution Substation for Flood Prone Areas

10.12928/telkomnika.v15i4.7232
M.; Kawasan Institusi Penyelidikan, Malaysia D. M. Amir , S.; Kawasan Institusi Penyelidikan, Malaysia Ishak , A.; Kawasan Institusi Penyelidikan, Malaysia Raj Gopal
Flood levels exceeding 2 metres above ground level has been observed causing electrical equipment in the 11/0.415kV substation to be fully submerged. This caused widespread supply disruption as the equipment need to be switched off due to safety reasons and prevention of further equipment damage. The use of submersible equipment and accessories has been identified as one of the mitigation methods to ensure continuous electrical supply during flood events. A research project was undertaken to develop the design criteria of the selection of submersible equipment and accessories as well as to develop the test method and evaluate the selected submersible equipment and accessories in a substation configuration. All the equipment could continuously operate in ON condition during the wet test. However, design improvements are suggested for the submersible switchgear and feeder pillar for better performance during and after flood events.
Volume: 15
Issue: 4
Page: 1540-1546
Publish at: 2017-12-01

Neural KDE Based Behaviour Model for Detecting Intrusions in Network Environment

10.11591/ijai.v6.i4.pp166-173
V. Brindha Devi , K.L. Shunmuganathan
Network intrusion is one of the growing concern throughout the globe about the information stealing and data exfiltration. In recent years this was coupled with the data exfiltration and infiltration through the internal threats. Various security encounters have been taken in order to reduce the intrusion and to prevent intrusion, since the stats reveals that every 4 seconds, at least one intrusion is detected in the detection engines. An external software mechanism is required in order to detect the network intrusions. Based on the above stated problem, here we proposed a new hybrid behaviour model based on Neural KDE and correlation method to detect intrusions. The proposed work is splitted into two phases. Initial phase is setup with the Neural KDE as the learning phase and the basic network parameters are profiled for each hosts, here the neural KDE is generated based on the input and learned parameters of the network. Next phase is the detection phase, here the Neural KDE is computed for the identified parameters and the learned KDE feature value is correlated with the present KDE values and correlated values are calculated using cross correlation method. Experimental results show that the proposed model is robust in detecting the intrusions over the network.
Volume: 6
Issue: 4
Page: 166-173
Publish at: 2017-12-01

Sentiment Mining of Community Development Program Evaluation Based on Social Media

10.12928/telkomnika.v15i4.4633
Siti; Bogor Agricultural University, Indonesia Yuliyanti , Taufik; Bogor Agricultural University, Indonesia Djatna , Heru; Bogor Agricultural University, Indonesia Sukoco
It is crucial to support community-oriented services for youth awareness in the social media with knowledge extraction, which would be useful for both government agencies and community group of interest for program evaluation. This work provided to formulate effective evaluation on community development program and addressing them to a correct action. By using classification based SVM, evaluation of the achievement level conducted in both quantitative and qualitative analysis, particularly to conclude which activities has high success rate. By using social media based activities, this study searched the sentiment analysis from every activities comments based on their tweet. First, we kicked off preprocessing stage, reducing feature space by using principle of component analysis and estimate parameters for classification purposes. Second, we modeled activity classification by using support vector machine. At last, set term score by calculating term frequency, which combined with term sentiment scores based on lexicon.The result shows that models provided sentiment summarization that point out the success level of positive sentiment.
Volume: 15
Issue: 4
Page: 1858-1864
Publish at: 2017-12-01

Hierarchy Process Mining from Multi-Source Logs

10.12928/telkomnika.v15i4.6326
Riyanarto; Institut Teknologi Sepuluh Nopember, Indonesia Sarno , Yutika Amelia; Institut Teknologi Sepuluh Nopember, Indonesia Effendi
Nowadays, large-scale business processes is growing rapidly; in this regards process mining is required to discover and enhance business processes in different departments of an organization. A process mining algorithm can generally discover the process model of an organization without considering the detailed process models of the departments, and the relationship among departments. The exchange of messages among departments can produce asynchronous activities among department process models. The event logs from departments can be considered as multi-source logs, which cause difficulties in mining the process model. Discovering process models from multi-source logs is still in the state of the art, therefore this paper proposes a hierarchy high-to-low process mining approach to discover the process model from a complex multi-source and heterogeneous event logs collected from distributed departments. The proposed method involves three steps; i.e. firstly a high level process model is developed; secondly a separate low level process model is discovered from multi-source logs; finally the Petri net refinement operation is used to integrate the discovered process models. The refinement operation replaced the abctract transitions of a high level process model with the corresponding low level process models. Multi-source event logs from several departments of a yarn manufacturing were used in the computational study, and the results showed that the proposed method combined with the modified time-based heuristics miner could discover a correct parallel process business model containing XOR, AND, and OR relations.
Volume: 15
Issue: 4
Page: 1955-1970
Publish at: 2017-12-01

IMC Based Fractional Order Controller for Three Interacting Tank Process

10.12928/telkomnika.v15i4.5784
Abdul Wahid; NIT Jamshedpur, India Nasir , Idamakanti; NIT Jamshedpur, India Kasireddy , Arun Kumar; NIT Jamshedpur, India Singh
In model based control, performance of the controlled plant considerably depends on the accuracy of real plant being modelled. In present work, an attempt has been made to design Internal Model Control (IMC), for three interacting tank process for liquid level control. To avoid complexities in controller design, the third order three interacting tank process is modelled to First Order Plus Dead Time (FOPDT) model. Exploiting the admirable features of Fractional Calculus, the higher order model is also modelled to Fractional Order First Order Plus Dead Time (FO-FOPDT) model, which further reduces the modelling error. Moving to control section, different IMC schemes have been proposed, where the fractional order filter is introduced along with the conventional integer order filter. Various simulations have been performed to show the greatness of Fractional order modelled system & fractional order filters over conventional integer order modelled system & integer order filters respectively. Both for parameters estimation of reduced order model and filter tuning, Genetic Algorithm (GA) is being applied.  
Volume: 15
Issue: 4
Page: 1723-1732
Publish at: 2017-12-01

Determining the Optimum Number of Paths for Realization of Multi-path Routing in MPLS-TE Networks

10.12928/telkomnika.v15i4.6597
Mohammad; Philadelphia University, Jordan Alhihi , Mohammad Reza; Shiraz University of Technology, Iran Khosravi , Hani; Philadelphia University, Jordan Attar , Mohammad; Philadelphia University, Jordan Samour
Multi-Protocol Label Switching for Traffic Engineering (MPLS-TE) technology is an intelligent and advanced tool for handling traffic through the core networks and implementing new services based on virtual transport. Since MPLS-TE combines channel and network layer mechanisms, network administrators can optimally integrate and allocate the traffic loads while maintaining the speed of technologies such as Asynchronous Transfer Mode (ATM) technology. In this paper, the problem of the developed algorithm of multi-path routing which allows us to determine the optimum number of independent shortest paths is theoretically solved. In details, the article proposes a way for finding the set of shortest paths using Dijkstra's algorithm, and then determination of the maximum flow for each of the shortest paths based on the mathematical concepts and finally, introducing the solution of the multi-criteria optimization problem for a set of shortest paths. According to our approach, optimizing the use of resources in the core networks is possible with using the MPLS-TE technology.
Volume: 15
Issue: 4
Page: 1701-1709
Publish at: 2017-12-01

Immensely Discriminate Routing in Wireless Networks

10.11591/ijeecs.v8.i3.pp712-714
Sujatha V , E. A. Mary Anitha
Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Volume: 8
Issue: 3
Page: 712-714
Publish at: 2017-12-01

NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem

10.11591/ijeecs.v8.i3.pp651-653
Paramasivam E , D. Arivazhaga
India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack issue that we are confront in our nation. The arrangement included a secured advanced payment framework that has reason assembled margins on the sum required in the exchange. Every exchange includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the bank at the time of year of exchange, a base support of banks is important to effectively execute this. There is no need of a web association, in this way making it available to all aspects of the nation.
Volume: 8
Issue: 3
Page: 651-653
Publish at: 2017-12-01

WareWise: Business Development Management Framework based on Device-to-Device Industrial Internet of Things

10.11591/ijeecs.v8.i3.pp747-750
Ramesh P. , V. Mathivanan
Internet of Things (IoT) - empowered data framework arrangements are developing in different spaces, for example, remote social insurance, keen coordination’s, farming et cetera. In the mean time, Business Development Management Frameworks (BDMF) has turned out to be promising instruments for driving and overseeing gadgets inside IoT frameworks. Be that as it may, past works have not completely tended to how the IoT-based BDMF can proceed with their execution when the included IoT gadgets don't have a dependable Internet association. In this paper, we propose a framework outline for decentralized device to device (D2D) - based BD execution, where versatile hubs have the ability of both executing BDs additionally moving BD execution to different hubs amid runtime. We apply this plan to the field of shrewd coordination’s, keeping in mind the end goal to empower savvy products checking. The exhibited merchandise observing arrangement empowers responding to occasions when they happen, while likewise producing a hint of the checking execution history. A model concentrating on the movement usefulness of the stage has been actualized and tried to assess its execution with regards to the specified savvy coordination’s situation.
Volume: 8
Issue: 3
Page: 747-750
Publish at: 2017-12-01

A Portable Insole Pressure Mapping System

10.12928/telkomnika.v15i4.7227
Kian; Universiti Tun Hussein Onn Malaysia Sek Tee , Yogindra; Universiti Tun Hussein Onn Malaysia Syam Hari Javahar , Hashim; Universiti Tun Hussein Onn Malaysia Saim , Wan; Universiti Tun Hussein Onn Malaysia Nurshazwani Wan Zakaria , Safinaz; University Kebangsaan Malaysia Binti Mohd Khialdin , Hazlita; University Kebangsaan Malaysia Isa , M.; Ain Shams University I. Awad , Chin; Universiti Tun Hussein Onn Malaysia Fhong Soon
The human locomotion is studied through gait analysis and is best observed instrumentally rather than observing visually. Thus, a portable insole pressure mapping system is built to assist in studying the human gait cycle. The pressure distribution is determined by instrumentally mapping the insole using force sensitive resistive sensors that are connected to Arduino UNO via cables. The values are saved into a secure digital card that could be post processed. Hardware and software design phase are executed for the development of this project. The outcomes match to the knowledge of human gait definitions in static posture and normal walking.
Volume: 15
Issue: 4
Page: 1493-1500
Publish at: 2017-12-01

Customers’ Perception Towards Services of Telecommunications Operators

10.11591/ijict.v6i3.pp146-154
Driss Ait Omar , Mohamed Baslam , Mourad Nachaoui , And Mohamed Fakir
Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers.For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
Volume: 6
Issue: 3
Page: 146-154
Publish at: 2017-12-01

A Load-Balanced Parallelization of AKS Algorithm

10.12928/telkomnika.v15i4.6049
Ardhi Wiratama; Universitas Gadjah Mada, Indonesia Baskara Yudha , Reza; Universitas Gadjah Mada, Indonesia Pulungan
The best known deterministic polynomial-time algorithm for primality testing right now is due to Agrawal, Kayal, and Saxena. This algorithm has a time complexity O(log^{15/2}(n)). Although this algorithm is polynomial, its reliance on the congruence of large polynomials results in enormous computational requirement. In this paper, we propose a parallelization technique for this algorithm based on message-passing parallelism together with four workload-distribution strategies. We perform a series of experiments on an implementation of this algorithm in a high-performance computing system consisting of 15 nodes, each with 4 CPU cores. The experiments indicate that our proposed parallelization technique introduce a significant speedup on existing implementations. Furthermore, the dynamic workload-distribution strategy performs better than the others. Overall, the experiments show that the parallelization obtains up to 36 times speedup. 
Volume: 15
Issue: 4
Page: 1883-1894
Publish at: 2017-12-01

Design and Development of a Shortwave near Infrared Spectroscopy using NIR LEDs and Regression Model

10.11591/ijece.v7i6.pp3070-3075
Kim Seng Chia , Yit Peng Tan
Near infrared (NIR) spectroscopic technology has been getting more attention in various fields. The development of a low cost NIR spectroscopy is crucial to reduce the financial barriers so that more NIR spectroscopic applications will be investigated and developed by means of the NIR spectroscopic technology. This study proposes an alternative to measure shortwave NIR spectrum using one collimating lens, two slits, one NIR transmission grating, one linear array sensor, and one microcontroller. Five high precision narrow bands NIR light emitting diodes (LEDs) were used to calibrate the proposed spectroscopy. The effects of the proposed two slits design, the distance between the grating and linear array sensor, and three different regression models were investigated. The accuracy of the proposed design was cross-validated using leave-one-out cross-validation. Results show that the proposed two slits design was able to eliminate unwanted signals substantially, and the cross-validation was able to estimate the best model with root mean squared error of cross-validation of 3.8932nm. Findings indicate that the cross-validation approach is a good approach to estimate the final model without over-fitting, and the proposed shortwave NIR spectroscopy was able to estimate the peak value of the acquired spectrum from NIR LEDs with RMSE of 1.1616nm.
Volume: 7
Issue: 6
Page: 3070-3075
Publish at: 2017-12-01

Investigating Maturity State and Internal Properties of Fruits Using Non-destructive Techniques-a Review

10.12928/telkomnika.v15i4.7236
Mohd; Universiti Tun Hussein Onn, Malaysia Fadzli Abd Shaib , Ruzairi; Universiti Tun Hussein Onn, Malaysia Abdul Rahim , S.; Universiti Tun Hussein Onn, Malaysia Z. M. Muji , Azian; Universiti Teknologi Malaysia, Malaysia Abd Aziz Ahmad
The evaluation of internal condition of the fruit via destructive techniques mostly damaged the internal and external fruit structure. However, there are several non-destructive techniques available could be applied in the agricultural industry, specifically for observing internal fruit conditions. Different kinds of internal conditions of fruits are evaluated in terms of their quality and ripeness levels. These non-destructive techniques include fruit evaluation via ultrasonic measurement techniques, light spectroscopy, imaging via Magnetic Resonance Imaging (MRI) and X-Ray, computer vision, electric nose and also vibration. The capabilities and the effectiveness of these techniques towards fruit monitoring are thoroughly discussed. Besides, the drawback of these non-destructive technique has been analysed.
Volume: 15
Issue: 4
Page: 1574-1584
Publish at: 2017-12-01
Show 1459 of 1945

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration