Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,905 Article Results

Tree Physiology Optimization in Constrained Optimization Problem

10.12928/telkomnika.v16i2.9021
A. Hanif; Universiti Teknologi PETRONAS Halim , I.; Universiti Teknologi PETRONAS Ismail
Metaheuristic algorithms are proven to be more effective on finding global optimum in numerous problems including the constrained optimization area. The algorithms have the capacity to prevail over many deficiencies in conventional algorithms. Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. Most of the real-world problems consist of constrained problem that is significantly important in modern engineering design and must be considered in order to perform any optimization task. Therefore, it is essential to compare the performance of the algorithm in diverse level of difficulties in constrained region. This paper introduces Tree Physiology Optimization (TPO) algorithm for solving constrained optimization problem and compares the performance with other existing metaheuristic algorithms. The constrained problems that are included in the comparison are three engineering design and nonlinear mathematic problems. The difficulties of each proposed problem are the function complexity, number of constraints, and dimension of variables. The performance measure of each algorithm is the statistical results of finding the global optimum and the convergence towards global optimum.
Volume: 16
Issue: 2
Page: 876-882
Publish at: 2018-04-01

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

10.12928/telkomnika.v16i2.8420
Rifki; Telkom University Suwandi , Surya Michrandi; Telkom University Nasution , Fairuz; Telkom University Azmi
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique properties that can perform mathematical operations against ciphertext. This paper proposed the use of the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the additional properties so that it can calculate the results of voting data that has been encrypted without having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote tallying process by comparing the advantages and disadvantages of each algorithm.
Volume: 16
Issue: 2
Page: 862-867
Publish at: 2018-04-01

Cyber Threat Intelligence – Issue and Challenges

10.11591/ijeecs.v10.i1.pp371-379
Md Sahrom Abu , Siti Rahayu Selamat , Aswami Ariffin , Robiah Yusof
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Volume: 10
Issue: 1
Page: 371-379
Publish at: 2018-04-01

A Technical Review of BMS Performance Standard for Electric Vehicle Applications in Indonesia

10.12928/telkomnika.v16i2.7930
Wahyudi; Sebelas Maret University Sutopo , Budhy; Sebelas Maret University Rahmawatie , Fakhrina; Sebelas Maret University Fahma , Muhammad; Sebelas Maret University Nizam , Agus; Sebelas Maret University Purwanto , B.B; BSN, Jakarta Louhenapessy , Evizal; Universitas Islam Riau Abdul Kadir
The development of Battery Management System (BMS) standards in Indonesia has been carried out causing the FACTS approach. That's approach makes it possible to accommodate all stakeholder requirements. However, the approach has not yet considered a technical review of the regulated standards. Based on this, this study undertook a comprehensive review of BMS performance parameters set out in the standard. In order that the regulated standards not only accommodate the needs of stakeholders but also consider BMS technical studies in order not to impede the future development of BMS.
Volume: 16
Issue: 2
Page: 544-549
Publish at: 2018-04-01

Identification of Canaries Bird’s Chirp Quality Using Statistic Analysis, Sound Analysis and Fuzzy Mamdani Method

10.12928/telkomnika.v16i2.8537
Suhartono; UIN Maulana Malik Ibrahim Malang Suhartono
Research about sound processing by computer using fuzzy logic has been known since 1970. One of approach logic fuzzy method is fuzzy mamdani method. Fuzzy mamdani method is the method to give conclusion from groupof rules of fuzzy. There have to be minimum of two rules, input rule and output rule. Sound processing in canaries bierd’s chirp quality can be explained as measurement standar for canary’s bird’s chirp to the point of song variant and volume. The background of this research is to create a sound identification system that uses dynamic data, the pattern of canary’s bird’s chirp obtained from dynamic data.Dynamic data is difficult to approach with certain formulas. The purpose of this research is to create indentification system to measure Canaries bird’s chirp quality pre-contest. The method used in this research was statistic analysis, sound analysis and fuzzy Mamdani method. Statistic analysis was used to look for important features from Canarie’s chirp sample. This analysis results Max amplitude variable, Min amplitude variable, Root-mean square. Then sound analysis results Autocorrelation time, Zero cross and Energy. Then those values were used as the input in fuzzy Mamdani method process. As for the output variables were the judges score result about the quality of bird’ chirp. The results from identification system of bird’s chirp quality from 6 samples are (1). Accuration level 81,67%. (2) Error sytemrate 18,33%. (3). Based on system performance and error rate that have been known can be concluded that the system can indentifyCanarie’s chirp quality well.
Volume: 16
Issue: 2
Page: 690-702
Publish at: 2018-04-01

Evaluation of Flashover Voltage Levels of Contaminated Hydrophobic Polymer Insulators Using Regression Trees, Neural Networks, and Adaptive Neuro-Fuzzy

10.12928/telkomnika.v16i2.5103
Farag K.; Assiut University, Assiut Abo-Elyousr , L. S.; Aswan University Nassrat
Polluted insulators at high voltages has acquired considerable importance with the rise of voltage transmission lines. The contamination may lead to flashover voltage. As a result, flashover voltage could lead to service outage and affects negatively the reliability of the power system. This paper presents a dynamic model of ac 50Hz flashover voltages of polluted hydrophobic polymer insulators. The models are constructed using the regression tree method, artificial neural network (ANN), and adaptive neuro-fuzzy (ANFIS). For this purpose, more than 2000 different experimental testing conditions were used to generate a training set. The study of the ac flashover voltages depends on silicone rubber (SiR) percentage content in ethylene propylene diene monomer (EPDM) rubber. Besides, water conductivity (μS/cm), number of droplets on the surface, and volume of water droplet (ml) are considered. The regression tree model is obtained and the performance of the proposed system with other intelligence methods is compa ed. It can be concluded that the performance of the least squares regression tree model outperforms the other intelligence methods, which gives the proposed model better generalization ability.
Volume: 16
Issue: 2
Page: 495-512
Publish at: 2018-04-01

Avoidance of Over Speed Through Intelligent Speed Breaking System

10.11591/ijict.v7i1.pp13-15
M S Satyanarayana , Aruna T M , Divya G N
Accidents have become major issue in Developing countries like India now a day. As per the Surveys 60% of the accidents are happening due to over speed. Though the government has taken so many initiatives like Traffic Awareness & Driving Awareness Week etc.., but still the percentage of accidents are not getting reduced. In this paper a new technique has been introduced in order to reduce the percentage of accidents. The new technique is implemented using the concept of Intelligent Speed Braking System. The Intelligent Speed Braking systems can be implemented any where essential in order to avoid the accidents. The main objective of this system is to calculate the speed of the vehicle at three different locations based on the place where the vehicle speed has to be controlled and if the speed is greater than the designated speed in that road then it will automatically open up the speed breaker to control the speed of the vehicle. If the speed is less or equal to the designated speed in that road then the vehicle will be passed without any disturbance. This system though it won’t avoid 100% accidents at least it will reduce the percentage of accidents. This is system is not only to avoid accidents it will also intelligently controls the speed of the vehicles and creates awareness amongst the drivers.
Volume: 7
Issue: 1
Page: 13-15
Publish at: 2018-04-01

Property Exhibition Decision Support System Based on Web Application

10.12928/telkomnika.v16i2.7601
Violitta; Bina Nusantara University Yesmaya , Angry; Bina Nusantara University Ronald , Monica; Bina Nusantara University Hidajat
Complexity in finding property on property exhibition which consider many related constraints is quite high. Customers need to spend much time to analyse the right property to buy depends on their constraints whether salary, distance to work, facility, etc. According to the problem, this research will collect the information from customer on property exhibition to find out the constraint. Also, this research will focus on design and analyses the decision support system for property exhibition. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is a web application that help customer to collect the information of the property according to their constraints.
Volume: 16
Issue: 2
Page: 766-770
Publish at: 2018-04-01

Reduced-reference Video Quality Metric Using Spatio-temporal Activity Information

10.12928/telkomnika.v16i2.9044
Farah Diyana Abdul; Department of Electrical and Computer Engineering, International Islamic University Malaysia Rahman , Ahmad Imran; Department of Electrical and Computer Engineering, International Islamic University Malaysia Ibrahim , Dimitris; Department of Electrical and Electronic Engineering, University of Bristol Agrafiotis
Monitoring and maintaining acceptable Quality of Experience is of great importance to video service providers.  Perceived visual quality of transmitted video via wireless networks can be degraded by transmission errors. This paper presents a reduced-reference video quality metric of very low complexity and overhead that makes use of frame based spatial (SI) and temporal (TI) activity levels to monitor the effect of channel errors on video transmitted over error prone networks. The performance of the metric is evaluated relative to that of a number of full and reduced reference metrics. The proposed metric outperforms some of the most popular full reference metrics whilst requiring very little overhead.
Volume: 16
Issue: 2
Page: 909-914
Publish at: 2018-04-01

New Methodology for Asynchronous Motor the Adaptive-Sliding-Mode-Control Capable of High Performance Regulation

10.12928/telkomnika.v16i2.7057
Mahfoudh Mohamed; Mohammadia Engineering School Abderrahmane Hbib , Ouissam; Mohammadia Engineering School Belghazi , Moulay Rachid; Mohammadia Engineering School Douiri , Mohamed; Mohammadia Engineering School Cherkaoui
A new methodology for the design of adaptive sliding mode control (ASMC) for Asynchronous motor control will be presented in this paper. The sliding mode control (SMC) has become one of the most active branches of control theory that has found successful applications in a variety of engineering systems, such an the electrical motors. The new Adaptive sliding mode control method is compared to other existing techniques. The pros and cons of ASMC controller will be demonstrated by intensive simulation results. It will be shown that the presented controller is with fast tracking capability, less steady state error, and robust to load disturbance.
Volume: 16
Issue: 2
Page: 558-566
Publish at: 2018-04-01

Towards Improving Road Safety using Advanced Vehicular Networks

10.12928/telkomnika.v16i2.8210
Wajeb; Jazan University Gharibi , Nasrullah; Indonesian Institute of Sciences Armi
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Volume: 16
Issue: 2
Page: 624-628
Publish at: 2018-04-01

Availability Prediction Methods for Terrestrial Free-Space-Optical Link Under Tropical Climate

10.11591/ijeecs.v10.i1.pp224-229
Ahmed Basahel , Md Rafiqul Islam , Mohamed Habaebi , Suriza Ahmad
Free-space optical (FSO) links provide high speed point-to-point wireless communication, but its availability can easily be affected by weather conditions. In heavy rainfall regions, FSO links are relatively sensitive to rain. Availability prediction of FSO is indispensable part, especially in tropical areas. In this paper, methods to predict FSO link availability are presented. The overall performance of FSO link is described in terms of the availability that can be achieved over anticipated link distance. The availability prediction methods demonstrated for an FSO link ranges up to 5 km. The availability prediction methods are based on long-term statistics of atmospheric attenuations and FSO link budget under tropical climate condition. In tropical regions, for a terrestrial FSO link, carrier class availability can be achieved over a few hundred meters only; whereas enterprise class availability can be achieved over a few kilometers link distances. 
Volume: 10
Issue: 1
Page: 224-229
Publish at: 2018-04-01

A Review of Methods Employed to Identify Flicker Producing Sources

10.12928/telkomnika.v16i2.6678
Jeevan; VIT University, Chennai Inamdar , K. Iyswarya; VIT University, Chennai Annapoorani
Because of increasing requirements of the present consumers and industrial units utilizing sensitive loads, there is need of good power quality in order to retain the power quality standards. Nowadays the study of the voltage flicker is becoming essential part of power quality studies. The flicker is typically the effect of a rapidly changing load which is large with respect to the short circuit ability of an electrical supply system. The inferior effects of voltage flicker include malfunctioning of power electronic equipment. Also it causes annoying effects to human. Hence detection of the flicker source is an essential step in the power quality assessment process. This paper delivers a review about methods used to identify flicker producing loads in accordance with IEC 61000-4-15. Once the report related to the disturbance place is known, an investigation and corrective action can be accordingly carried out. Also a method based upon Discrete Wavelet Transform and Artificial Neural Network is proposed to detect initial instance of occurrence of flicker.
Volume: 16
Issue: 2
Page: 465-480
Publish at: 2018-04-01

Trend of NFC Technology for Payment Transaction

10.12928/telkomnika.v16i2.8441
Edi Purnomo; Bina Nusantara University Putra , Fifilia; Bina Nusantara University Fifilia , Hanny; Bina Nusantara University Juwitasary
Implementation of NFC Technology was developed to facilitate instant payment transaction such as purchase tickets, goods, or service to become one of the digital wallet besides to using credit cards. The high rate of mobile devices usage in Indonesia make many companies take advantage of this device as a media in electronic payment transactions, a lot of banking and financial product in Indonesia used this technology such as E-money, T-cash, Flazz, Ooredoo, Dompetku, XL-Tunaiku, Doku Wallet, Skye card, Artajasa MYNT and many more. The technique that used in this research to prove the hypotheses was Structural Equation Model (SEM) using Smart PLS software, we will used questionnaire and literature review method to found trend of NFC use. The population from which to draw conclusion was defined as all individual capable use NFC Technology for payment transaction .In this study, we will investigate NFC use in Indonesia, The proposed research model was develop by TAM Framework with some dimension from NFC study iterature that is Mobile Payment Knowledge, Technology, Trust, Behaviour and Compatibility into the model, in order to determine the significant factor that influence of NFC use in Indonesia.
Volume: 16
Issue: 2
Page: 795-802
Publish at: 2018-04-01

Wavelet-Based Weighted Median Filter For Image Denoising Of MRI Brain Images

10.11591/ijeecs.v10.i1.pp201-206
N. Rajalakshmi , K. Narayanan , P. Amudhavalli
Preliminary diagnosing of MRI images from the hospital cannot be relied on because of the chances of occurrence of artifacts resulting in degraded quality of image, while others may be confused with pathology. Obtained MRI image usually contains limited artifacts. It becomes complex one for doctors in analyzing them. By increasing the contrast of an image, it will be easy to analyze. In order to find the tumor part efficiently MRI brain image should be enhanced properly. The image enhancement methods mainly improve the visual appearance of MRI images. The goal of denoising is to remove the noise, which may corrupt an image during its acquisition or transmission, while retaining its quality. In this paper effectiveness of seven denoising algorithms viz. median filter, wiener filter, wavelet filter, wavelet based wiener, NLM, wavelet based NLM, proposed wavelet based weighted median filter(WMF) using MRI images in the presence of additive white Gaussian noise is compared. The experimental results are analyzed in terms of various image quality metrics.
Volume: 10
Issue: 1
Page: 201-206
Publish at: 2018-04-01
Show 1466 of 1994

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration