Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,922 Article Results

Characterization of Respiratory Conditions Using Labview and Digital Spirometer

10.11591/ijeecs.v10.i1.pp66-73
S. Noorjannah Ibrahim , A. Z. Jusoh , N. Abdul Malik , A. L. Asnawi , S. Mazalan
One of the effective ways to diagnose various respiratory diseases is using spirometry test. Good spirometer comes with excellent graphical user interface. Spirometer is used to measure lung parameters such as Forced Expiratory Volume in the first second and the sixth seconds (FEV1 and FEV6). This paper presents an algorithm with Graphical User Interface (GUI) for characterization of respiratory conditions using LabVIEW Software. The whole spirometry system consists of a breathing circuitry with pressure sensor and a data acquisition board (NI sbRIO FPGA board). Results obtained from three different volunteers with different health performances are also presented in this paper. The FEV1/FEV6 ratio of a healthy volunteer is 81.1%, an asthma volunteer is 72.04%, and suspected bronchitis volunteer is 33.4%. Based on these results, the unhealthy volunteers tend to have smaller value of FEV1 with lower area under the curve when compared to healthy volunteer.
Volume: 10
Issue: 1
Page: 66-73
Publish at: 2018-04-01

Trash Basket Sensor Notification Using Arduino with Android Application

10.11591/ijeecs.v10.i1.pp120-128
Adel ALFoudery , Abdulrahman Abdullah Alkandari , Nayfah Mohsen Almutairi
The protection of society and environment from garbage accumulation and its polluting effects is carried by waste management companies, the services provided by these companies are improving life overall quality. By preserving raw materials, proper collecting and elimination of trash have reduced pollution and environmental impact. On the other hand, areas which are suffered from inappropriate negative service appreciate the garbage collector’s valuable efforts. Appropriate garbage collection and management facilities have made a recycling process improvement which caused a reduction in waste generation. Also controlling the released contaminators and pollutants has decreased the impact on landfills and protected the environment from the pollution negative effects. Using mobile and electronic technology to enable waste management companies to finish its work and make it easier for collecting trash in a simple and an easy way. We introduce Trash Sensor Android Application to help waste management companies detect trash levels to collect it and help citizens from undesired odours.
Volume: 10
Issue: 1
Page: 120-128
Publish at: 2018-04-01

Real Time Face Recognition Based on Face Descriptor and Its Application

10.12928/telkomnika.v16i2.7418
I Gede Pasek Suta; Mataram University Wijaya , Ario Yudo; Mataram University Husodo , I Wayan Agus; Mataram University Arimbawa
This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second).
Volume: 16
Issue: 2
Page: 739-746
Publish at: 2018-04-01

Tree Physiology Optimization in Constrained Optimization Problem

10.12928/telkomnika.v16i2.9021
A. Hanif; Universiti Teknologi PETRONAS Halim , I.; Universiti Teknologi PETRONAS Ismail
Metaheuristic algorithms are proven to be more effective on finding global optimum in numerous problems including the constrained optimization area. The algorithms have the capacity to prevail over many deficiencies in conventional algorithms. Besides of good quality of performance, some metaheuristic algorithms have limitations that may deteriorate by certain degree of difficulties especially in real-world application. Most of the real-world problems consist of constrained problem that is significantly important in modern engineering design and must be considered in order to perform any optimization task. Therefore, it is essential to compare the performance of the algorithm in diverse level of difficulties in constrained region. This paper introduces Tree Physiology Optimization (TPO) algorithm for solving constrained optimization problem and compares the performance with other existing metaheuristic algorithms. The constrained problems that are included in the comparison are three engineering design and nonlinear mathematic problems. The difficulties of each proposed problem are the function complexity, number of constraints, and dimension of variables. The performance measure of each algorithm is the statistical results of finding the global optimum and the convergence towards global optimum.
Volume: 16
Issue: 2
Page: 876-882
Publish at: 2018-04-01

Secure E-voting System by Utilizing Homomorphic Properties of the Encryption Algorithm

10.12928/telkomnika.v16i2.8420
Rifki; Telkom University Suwandi , Surya Michrandi; Telkom University Nasution , Fairuz; Telkom University Azmi
The use of cryptography in the e-voting system to secure data is a must to ensure the authenticity of the data. In contrast to common encryption algorithms, homomorphic encryption algorithms had unique properties that can perform mathematical operations against ciphertext. This paper proposed the use of the Paillier and Okamoto-Uchiyama algorithms as two homomorphic encryption algorithms that have the additional properties so that it can calculate the results of voting data that has been encrypted without having to be decrypted first. The main purpose is to avoid manipulation and data falsification during vote tallying process by comparing the advantages and disadvantages of each algorithm.
Volume: 16
Issue: 2
Page: 862-867
Publish at: 2018-04-01

Cyber Threat Intelligence – Issue and Challenges

10.11591/ijeecs.v10.i1.pp371-379
Md Sahrom Abu , Siti Rahayu Selamat , Aswami Ariffin , Robiah Yusof
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before. Cyber Threat Intelligence (CTI) has become a hot topic and being under consideration for many organization to counter the rise of cyber-attacks. The aim of this paper is to review the existing research related to CTI. Through the literature review process, the most basic question of what CTI is examines by comparing existing definitions to find common ground or disagreements. It is found that both organization and vendors lack a complete understanding of what information is considered to be CTI, hence more research is needed in order to define CTI. This paper also identified current CTI product and services that include threat intelligence data feeds, threat intelligence standards and tools that being used in CTI. There is an effort by specific industry to shared only relevance threat intelligence data feeds such as Financial Services Information Sharing and Analysis Center (FS-ISAC) that collaborate on critical security threats facing by global financial services sector only. While research and development center such as MITRE working in developing a standards format (e.g.; STIX, TAXII, CybOX) for threat intelligence sharing to solve interoperability issue between threat sharing peers. Based on the review for CTI definition, standards and tools, this paper identifies four research challenges in cyber threat intelligence and analyses contemporary work carried out in each. With an organization flooded with voluminous of threat data, the requirement for qualified threat data analyst to fully utilize CTI and turn the data into actionable intelligence become more important than ever. The data quality is not a new issue but with the growing adoption of CTI, further research in this area is needed.
Volume: 10
Issue: 1
Page: 371-379
Publish at: 2018-04-01

A Technical Review of BMS Performance Standard for Electric Vehicle Applications in Indonesia

10.12928/telkomnika.v16i2.7930
Wahyudi; Sebelas Maret University Sutopo , Budhy; Sebelas Maret University Rahmawatie , Fakhrina; Sebelas Maret University Fahma , Muhammad; Sebelas Maret University Nizam , Agus; Sebelas Maret University Purwanto , B.B; BSN, Jakarta Louhenapessy , Evizal; Universitas Islam Riau Abdul Kadir
The development of Battery Management System (BMS) standards in Indonesia has been carried out causing the FACTS approach. That's approach makes it possible to accommodate all stakeholder requirements. However, the approach has not yet considered a technical review of the regulated standards. Based on this, this study undertook a comprehensive review of BMS performance parameters set out in the standard. In order that the regulated standards not only accommodate the needs of stakeholders but also consider BMS technical studies in order not to impede the future development of BMS.
Volume: 16
Issue: 2
Page: 544-549
Publish at: 2018-04-01

Identification of Canaries Bird’s Chirp Quality Using Statistic Analysis, Sound Analysis and Fuzzy Mamdani Method

10.12928/telkomnika.v16i2.8537
Suhartono; UIN Maulana Malik Ibrahim Malang Suhartono
Research about sound processing by computer using fuzzy logic has been known since 1970. One of approach logic fuzzy method is fuzzy mamdani method. Fuzzy mamdani method is the method to give conclusion from groupof rules of fuzzy. There have to be minimum of two rules, input rule and output rule. Sound processing in canaries bierd’s chirp quality can be explained as measurement standar for canary’s bird’s chirp to the point of song variant and volume. The background of this research is to create a sound identification system that uses dynamic data, the pattern of canary’s bird’s chirp obtained from dynamic data.Dynamic data is difficult to approach with certain formulas. The purpose of this research is to create indentification system to measure Canaries bird’s chirp quality pre-contest. The method used in this research was statistic analysis, sound analysis and fuzzy Mamdani method. Statistic analysis was used to look for important features from Canarie’s chirp sample. This analysis results Max amplitude variable, Min amplitude variable, Root-mean square. Then sound analysis results Autocorrelation time, Zero cross and Energy. Then those values were used as the input in fuzzy Mamdani method process. As for the output variables were the judges score result about the quality of bird’ chirp. The results from identification system of bird’s chirp quality from 6 samples are (1). Accuration level 81,67%. (2) Error sytemrate 18,33%. (3). Based on system performance and error rate that have been known can be concluded that the system can indentifyCanarie’s chirp quality well.
Volume: 16
Issue: 2
Page: 690-702
Publish at: 2018-04-01

Comparative Analysis of Power Quality Indices for Different Lighting Techniogies in Public Lightning

10.11591/ijece.v8i2.pp880-887
Jurica Perko , Srete Nikolovski , Ljubomir Majdandžić
As with any other product, having electricity of a certain quality is very important for consumers. Its quality has become the key feature that can be disturbed by loads based on power electronic devices. Electricity producers are striving to provide reliable and quality electricity supply to consumers. Public lighting systems that are based on LED lighting technology can potentially positively or negatively affect the power quality because they contain power electronics components in LED drivers. Because of that, two 7-day measurements were conducted on the same public lighting branch but with different lighting technologies (high pressure sodium, known as HPS and LED technology). Results of the measurements were analysed and compared. By analysing the results, other problems were also identified by using LED lighting technology. These problems are addressed in the conclusion of the paper.
Volume: 8
Issue: 2
Page: 880-887
Publish at: 2018-04-01

Evaluation of Flashover Voltage Levels of Contaminated Hydrophobic Polymer Insulators Using Regression Trees, Neural Networks, and Adaptive Neuro-Fuzzy

10.12928/telkomnika.v16i2.5103
Farag K.; Assiut University, Assiut Abo-Elyousr , L. S.; Aswan University Nassrat
Polluted insulators at high voltages has acquired considerable importance with the rise of voltage transmission lines. The contamination may lead to flashover voltage. As a result, flashover voltage could lead to service outage and affects negatively the reliability of the power system. This paper presents a dynamic model of ac 50Hz flashover voltages of polluted hydrophobic polymer insulators. The models are constructed using the regression tree method, artificial neural network (ANN), and adaptive neuro-fuzzy (ANFIS). For this purpose, more than 2000 different experimental testing conditions were used to generate a training set. The study of the ac flashover voltages depends on silicone rubber (SiR) percentage content in ethylene propylene diene monomer (EPDM) rubber. Besides, water conductivity (μS/cm), number of droplets on the surface, and volume of water droplet (ml) are considered. The regression tree model is obtained and the performance of the proposed system with other intelligence methods is compa ed. It can be concluded that the performance of the least squares regression tree model outperforms the other intelligence methods, which gives the proposed model better generalization ability.
Volume: 16
Issue: 2
Page: 495-512
Publish at: 2018-04-01

Property Exhibition Decision Support System Based on Web Application

10.12928/telkomnika.v16i2.7601
Violitta; Bina Nusantara University Yesmaya , Angry; Bina Nusantara University Ronald , Monica; Bina Nusantara University Hidajat
Complexity in finding property on property exhibition which consider many related constraints is quite high. Customers need to spend much time to analyse the right property to buy depends on their constraints whether salary, distance to work, facility, etc. According to the problem, this research will collect the information from customer on property exhibition to find out the constraint. Also, this research will focus on design and analyses the decision support system for property exhibition. Software development life cycle that will be used is scrum which is divided into several processes like backlog, sprints, scrum meetings, and demos. The result of this research is a web application that help customer to collect the information of the property according to their constraints.
Volume: 16
Issue: 2
Page: 766-770
Publish at: 2018-04-01

Reduced-reference Video Quality Metric Using Spatio-temporal Activity Information

10.12928/telkomnika.v16i2.9044
Farah Diyana Abdul; Department of Electrical and Computer Engineering, International Islamic University Malaysia Rahman , Ahmad Imran; Department of Electrical and Computer Engineering, International Islamic University Malaysia Ibrahim , Dimitris; Department of Electrical and Electronic Engineering, University of Bristol Agrafiotis
Monitoring and maintaining acceptable Quality of Experience is of great importance to video service providers.  Perceived visual quality of transmitted video via wireless networks can be degraded by transmission errors. This paper presents a reduced-reference video quality metric of very low complexity and overhead that makes use of frame based spatial (SI) and temporal (TI) activity levels to monitor the effect of channel errors on video transmitted over error prone networks. The performance of the metric is evaluated relative to that of a number of full and reduced reference metrics. The proposed metric outperforms some of the most popular full reference metrics whilst requiring very little overhead.
Volume: 16
Issue: 2
Page: 909-914
Publish at: 2018-04-01

New Methodology for Asynchronous Motor the Adaptive-Sliding-Mode-Control Capable of High Performance Regulation

10.12928/telkomnika.v16i2.7057
Mahfoudh Mohamed; Mohammadia Engineering School Abderrahmane Hbib , Ouissam; Mohammadia Engineering School Belghazi , Moulay Rachid; Mohammadia Engineering School Douiri , Mohamed; Mohammadia Engineering School Cherkaoui
A new methodology for the design of adaptive sliding mode control (ASMC) for Asynchronous motor control will be presented in this paper. The sliding mode control (SMC) has become one of the most active branches of control theory that has found successful applications in a variety of engineering systems, such an the electrical motors. The new Adaptive sliding mode control method is compared to other existing techniques. The pros and cons of ASMC controller will be demonstrated by intensive simulation results. It will be shown that the presented controller is with fast tracking capability, less steady state error, and robust to load disturbance.
Volume: 16
Issue: 2
Page: 558-566
Publish at: 2018-04-01

Towards Improving Road Safety using Advanced Vehicular Networks

10.12928/telkomnika.v16i2.8210
Wajeb; Jazan University Gharibi , Nasrullah; Indonesian Institute of Sciences Armi
Vehicular Ad-hoc Networks (VANETs) are advanced network technologies applied to improve safety on roads and to offer suitable solutions for Intelligent Transportation Systems (ITS). The goal of VANETs is to assistdrivers and to act as a smart co-pilot that can alret about accidents and help avoiding them while prodivding high-end infotainment systems for both the driver and passengers. Consequently, VANETs can save millions of lives around the world, especially in Saudi Arabia, which has a very high rate of road accidents annualy. In this paper, we introduce and discuss VANETs, related routing protocols, challenging problems, and the existing solutions. This work is a part of a bigger project that aims to enhance VANETs technologies and to updapteITS to significantly promote road safety in general and Saudi Arabia’s roads in particular.
Volume: 16
Issue: 2
Page: 624-628
Publish at: 2018-04-01

Notice of Retraction Digital Image Steganography Using Bit Flipping

10.11591/ijict.v7i1.pp1-7
Aditya Kumar Sahu , Gandharba Swain
Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Volume: 7
Issue: 1
Page: 1-7
Publish at: 2018-04-01
Show 1467 of 1995

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration