Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,325 Article Results

Zakah Management System Using Approach Classification

10.12928/telkomnika.v15i4.5640
Zulfajri Basri; Hasanuddin University, Indonesia Hasanuddin , Syafruddin; Hasanuddin University, Indonesia Syarif , Darniati; Hasanuddin University, Indonesia Darniati
The often problematic faced by Muslims are lack of understanding in calculating Zakah and determining the feasibility of compliant recipients based on Islamic Shari'a. This study aimed to establish Zakah management system to support calculation process based on Al Qaradhawi method, helping Board of Zakah in distributing Zakah funds to mustahik. The algorithm used for the classification of Zakah recipients is Naive Bayes. The classification was combination of discrete and continuous data which is conducted by experiments using feasible and unfeasible data as a novelty approach. The results have shown that the Naive Bayes method could solve the problem with 85% of average.
Volume: 15
Issue: 4
Page: 1852-1857
Publish at: 2017-12-01

A Good Performance OTP Encryption Image based on DCT-DWT Steganography

10.12928/telkomnika.v15i4.5883
Wellia Shinta; Dian Nuswantoro University (UDINUS), Indonesia Sari , Eko Hari; Dian Nuswantoro University (UDINUS), Indonesia Rachmawanto , De Rosal Ignatius Moses; Dian Nuswantoro University (UDINUS), Indonesia Setiadi , Christy Atika; Dian Nuswantoro University (UDINUS), Indonesia Sari
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
Volume: 15
Issue: 4
Page: 1982-1989
Publish at: 2017-12-01

Design and Evaluation of Submersible 11/0.415kV Distribution Substation for Flood Prone Areas

10.12928/telkomnika.v15i4.7232
M.; Kawasan Institusi Penyelidikan, Malaysia D. M. Amir , S.; Kawasan Institusi Penyelidikan, Malaysia Ishak , A.; Kawasan Institusi Penyelidikan, Malaysia Raj Gopal
Flood levels exceeding 2 metres above ground level has been observed causing electrical equipment in the 11/0.415kV substation to be fully submerged. This caused widespread supply disruption as the equipment need to be switched off due to safety reasons and prevention of further equipment damage. The use of submersible equipment and accessories has been identified as one of the mitigation methods to ensure continuous electrical supply during flood events. A research project was undertaken to develop the design criteria of the selection of submersible equipment and accessories as well as to develop the test method and evaluate the selected submersible equipment and accessories in a substation configuration. All the equipment could continuously operate in ON condition during the wet test. However, design improvements are suggested for the submersible switchgear and feeder pillar for better performance during and after flood events.
Volume: 15
Issue: 4
Page: 1540-1546
Publish at: 2017-12-01

Sentiment Mining of Community Development Program Evaluation Based on Social Media

10.12928/telkomnika.v15i4.4633
Siti; Bogor Agricultural University, Indonesia Yuliyanti , Taufik; Bogor Agricultural University, Indonesia Djatna , Heru; Bogor Agricultural University, Indonesia Sukoco
It is crucial to support community-oriented services for youth awareness in the social media with knowledge extraction, which would be useful for both government agencies and community group of interest for program evaluation. This work provided to formulate effective evaluation on community development program and addressing them to a correct action. By using classification based SVM, evaluation of the achievement level conducted in both quantitative and qualitative analysis, particularly to conclude which activities has high success rate. By using social media based activities, this study searched the sentiment analysis from every activities comments based on their tweet. First, we kicked off preprocessing stage, reducing feature space by using principle of component analysis and estimate parameters for classification purposes. Second, we modeled activity classification by using support vector machine. At last, set term score by calculating term frequency, which combined with term sentiment scores based on lexicon.The result shows that models provided sentiment summarization that point out the success level of positive sentiment.
Volume: 15
Issue: 4
Page: 1858-1864
Publish at: 2017-12-01

Hierarchy Process Mining from Multi-Source Logs

10.12928/telkomnika.v15i4.6326
Riyanarto; Institut Teknologi Sepuluh Nopember, Indonesia Sarno , Yutika Amelia; Institut Teknologi Sepuluh Nopember, Indonesia Effendi
Nowadays, large-scale business processes is growing rapidly; in this regards process mining is required to discover and enhance business processes in different departments of an organization. A process mining algorithm can generally discover the process model of an organization without considering the detailed process models of the departments, and the relationship among departments. The exchange of messages among departments can produce asynchronous activities among department process models. The event logs from departments can be considered as multi-source logs, which cause difficulties in mining the process model. Discovering process models from multi-source logs is still in the state of the art, therefore this paper proposes a hierarchy high-to-low process mining approach to discover the process model from a complex multi-source and heterogeneous event logs collected from distributed departments. The proposed method involves three steps; i.e. firstly a high level process model is developed; secondly a separate low level process model is discovered from multi-source logs; finally the Petri net refinement operation is used to integrate the discovered process models. The refinement operation replaced the abctract transitions of a high level process model with the corresponding low level process models. Multi-source event logs from several departments of a yarn manufacturing were used in the computational study, and the results showed that the proposed method combined with the modified time-based heuristics miner could discover a correct parallel process business model containing XOR, AND, and OR relations.
Volume: 15
Issue: 4
Page: 1955-1970
Publish at: 2017-12-01

IMC Based Fractional Order Controller for Three Interacting Tank Process

10.12928/telkomnika.v15i4.5784
Abdul Wahid; NIT Jamshedpur, India Nasir , Idamakanti; NIT Jamshedpur, India Kasireddy , Arun Kumar; NIT Jamshedpur, India Singh
In model based control, performance of the controlled plant considerably depends on the accuracy of real plant being modelled. In present work, an attempt has been made to design Internal Model Control (IMC), for three interacting tank process for liquid level control. To avoid complexities in controller design, the third order three interacting tank process is modelled to First Order Plus Dead Time (FOPDT) model. Exploiting the admirable features of Fractional Calculus, the higher order model is also modelled to Fractional Order First Order Plus Dead Time (FO-FOPDT) model, which further reduces the modelling error. Moving to control section, different IMC schemes have been proposed, where the fractional order filter is introduced along with the conventional integer order filter. Various simulations have been performed to show the greatness of Fractional order modelled system & fractional order filters over conventional integer order modelled system & integer order filters respectively. Both for parameters estimation of reduced order model and filter tuning, Genetic Algorithm (GA) is being applied.  
Volume: 15
Issue: 4
Page: 1723-1732
Publish at: 2017-12-01

Determining the Optimum Number of Paths for Realization of Multi-path Routing in MPLS-TE Networks

10.12928/telkomnika.v15i4.6597
Mohammad; Philadelphia University, Jordan Alhihi , Mohammad Reza; Shiraz University of Technology, Iran Khosravi , Hani; Philadelphia University, Jordan Attar , Mohammad; Philadelphia University, Jordan Samour
Multi-Protocol Label Switching for Traffic Engineering (MPLS-TE) technology is an intelligent and advanced tool for handling traffic through the core networks and implementing new services based on virtual transport. Since MPLS-TE combines channel and network layer mechanisms, network administrators can optimally integrate and allocate the traffic loads while maintaining the speed of technologies such as Asynchronous Transfer Mode (ATM) technology. In this paper, the problem of the developed algorithm of multi-path routing which allows us to determine the optimum number of independent shortest paths is theoretically solved. In details, the article proposes a way for finding the set of shortest paths using Dijkstra's algorithm, and then determination of the maximum flow for each of the shortest paths based on the mathematical concepts and finally, introducing the solution of the multi-criteria optimization problem for a set of shortest paths. According to our approach, optimizing the use of resources in the core networks is possible with using the MPLS-TE technology.
Volume: 15
Issue: 4
Page: 1701-1709
Publish at: 2017-12-01

Immensely Discriminate Routing in Wireless Networks

10.11591/ijeecs.v8.i3.pp712-714
Sujatha V , E. A. Mary Anitha
Wireless networks are predictable to grant essential Internet access multimedia traffic service also increasingly such networks have been emerged in real life. However, the application scenarios is indeterminate as well as largely scalable routing is very difficult. Thus require efficient routing schemes in wireless network. In this paper, we propose Immensely Discriminate Routing protocol is used for multihop routing in wireless network. Here, node distance, node link, node trust and node quality of service is evaluated the next hop. This parameters are determined an efficient path in the wireless network.
Volume: 8
Issue: 3
Page: 712-714
Publish at: 2017-12-01

NFC Based Digital Innovation Technique to Eliminate Coin Shortage Problem

10.11591/ijeecs.v8.i3.pp651-653
Paramasivam E , D. Arivazhaga
India has an issue with little change in Restaurants, Auto-Taxi drivers, Retail Shops, Public Busses, and Markets wherever individuals experience the ill effects of coin lack issue. Yet at the same time, the regular man confronts lack of progress and frequently being paid in éclairs, mints and biting gums. This venture proposes an inventive arrangement called Byte-COIN; to take care of the coin lack issue that we are confront in our nation. The arrangement included a secured advanced payment framework that has reason assembled margins on the sum required in the exchange. Every exchange includes the support of the vendor and customer. In spite of the fact that there is no instant contact with the bank at the time of year of exchange, a base support of banks is important to effectively execute this. There is no need of a web association, in this way making it available to all aspects of the nation.
Volume: 8
Issue: 3
Page: 651-653
Publish at: 2017-12-01

WareWise: Business Development Management Framework based on Device-to-Device Industrial Internet of Things

10.11591/ijeecs.v8.i3.pp747-750
Ramesh P. , V. Mathivanan
Internet of Things (IoT) - empowered data framework arrangements are developing in different spaces, for example, remote social insurance, keen coordination’s, farming et cetera. In the mean time, Business Development Management Frameworks (BDMF) has turned out to be promising instruments for driving and overseeing gadgets inside IoT frameworks. Be that as it may, past works have not completely tended to how the IoT-based BDMF can proceed with their execution when the included IoT gadgets don't have a dependable Internet association. In this paper, we propose a framework outline for decentralized device to device (D2D) - based BD execution, where versatile hubs have the ability of both executing BDs additionally moving BD execution to different hubs amid runtime. We apply this plan to the field of shrewd coordination’s, keeping in mind the end goal to empower savvy products checking. The exhibited merchandise observing arrangement empowers responding to occasions when they happen, while likewise producing a hint of the checking execution history. A model concentrating on the movement usefulness of the stage has been actualized and tried to assess its execution with regards to the specified savvy coordination’s situation.
Volume: 8
Issue: 3
Page: 747-750
Publish at: 2017-12-01

A Portable Insole Pressure Mapping System

10.12928/telkomnika.v15i4.7227
Kian; Universiti Tun Hussein Onn Malaysia Sek Tee , Yogindra; Universiti Tun Hussein Onn Malaysia Syam Hari Javahar , Hashim; Universiti Tun Hussein Onn Malaysia Saim , Wan; Universiti Tun Hussein Onn Malaysia Nurshazwani Wan Zakaria , Safinaz; University Kebangsaan Malaysia Binti Mohd Khialdin , Hazlita; University Kebangsaan Malaysia Isa , M.; Ain Shams University I. Awad , Chin; Universiti Tun Hussein Onn Malaysia Fhong Soon
The human locomotion is studied through gait analysis and is best observed instrumentally rather than observing visually. Thus, a portable insole pressure mapping system is built to assist in studying the human gait cycle. The pressure distribution is determined by instrumentally mapping the insole using force sensitive resistive sensors that are connected to Arduino UNO via cables. The values are saved into a secure digital card that could be post processed. Hardware and software design phase are executed for the development of this project. The outcomes match to the knowledge of human gait definitions in static posture and normal walking.
Volume: 15
Issue: 4
Page: 1493-1500
Publish at: 2017-12-01

An Optimal LFC in Two-Area Power Systems Using a Meta-heuristic Optimization Algorithm

10.11591/ijece.v7i6.pp3217-3225
Mushtaq Najeeb , Muhamad Mansor , Hameed Feyad , Esam Taha , Ghassan Abdullah
In this study, an optimal meta-heuristic optimization algorithm for load frequency control (LFC) is utilized in two-area power systems. This meta-heuristic algorithm is called harmony search (HS), it is used to tune PI controller parameters ( ) automatically. The developed controller (HS-PI) with LFC loop is very important to minimize the system frequency and keep the system power is maintained at scheduled values under sudden loads changes. Integral absolute error (IAE) is used as an objective function to enhance the overall system performance in terms of settling time, maximum deviation, and peak time. The two-area power systems and developed controller are modelled using MATLAB software (Simulink/Code). As a result, the developed control algorithm (HS-PI) is more robustness and efficient as compared to PSO-PI control algorithm under same operation conditions.
Volume: 7
Issue: 6
Page: 3217-3225
Publish at: 2017-12-01

A Load-Balanced Parallelization of AKS Algorithm

10.12928/telkomnika.v15i4.6049
Ardhi Wiratama; Universitas Gadjah Mada, Indonesia Baskara Yudha , Reza; Universitas Gadjah Mada, Indonesia Pulungan
The best known deterministic polynomial-time algorithm for primality testing right now is due to Agrawal, Kayal, and Saxena. This algorithm has a time complexity O(log^{15/2}(n)). Although this algorithm is polynomial, its reliance on the congruence of large polynomials results in enormous computational requirement. In this paper, we propose a parallelization technique for this algorithm based on message-passing parallelism together with four workload-distribution strategies. We perform a series of experiments on an implementation of this algorithm in a high-performance computing system consisting of 15 nodes, each with 4 CPU cores. The experiments indicate that our proposed parallelization technique introduce a significant speedup on existing implementations. Furthermore, the dynamic workload-distribution strategy performs better than the others. Overall, the experiments show that the parallelization obtains up to 36 times speedup. 
Volume: 15
Issue: 4
Page: 1883-1894
Publish at: 2017-12-01

Investigating Maturity State and Internal Properties of Fruits Using Non-destructive Techniques-a Review

10.12928/telkomnika.v15i4.7236
Mohd; Universiti Tun Hussein Onn, Malaysia Fadzli Abd Shaib , Ruzairi; Universiti Tun Hussein Onn, Malaysia Abdul Rahim , S.; Universiti Tun Hussein Onn, Malaysia Z. M. Muji , Azian; Universiti Teknologi Malaysia, Malaysia Abd Aziz Ahmad
The evaluation of internal condition of the fruit via destructive techniques mostly damaged the internal and external fruit structure. However, there are several non-destructive techniques available could be applied in the agricultural industry, specifically for observing internal fruit conditions. Different kinds of internal conditions of fruits are evaluated in terms of their quality and ripeness levels. These non-destructive techniques include fruit evaluation via ultrasonic measurement techniques, light spectroscopy, imaging via Magnetic Resonance Imaging (MRI) and X-Ray, computer vision, electric nose and also vibration. The capabilities and the effectiveness of these techniques towards fruit monitoring are thoroughly discussed. Besides, the drawback of these non-destructive technique has been analysed.
Volume: 15
Issue: 4
Page: 1574-1584
Publish at: 2017-12-01

Investigation of the Optimal Position of Wind Sensors and Wind Turbines on a Building: A Computational Fluid Dynamics Study

10.11591/ijeecs.v8.i3.pp756-761
Leon Chan , Mohd Eqwan Bin Mohd Roslan , Hassan Bin Mohamed
Most numerical studies on flow over buildings simplify the geometry of the roof and assume that it is flat. This may lead to misrepresentation of the flow as the roof of actual buildings contains some sort of roughness. In this study, the flow over the administrative building of Universiti Tenaga Nasional is investigated for multidirectional flow conditions. The actual topology of the building is gridded and simulated using the steady-state Reynolds-averaged Navier-Stokes equation. Four points at the top of the building are identified and the wind statistics at these designated locations at three different heights are investigated. The optimal location with the highest average wind speed and consistent wind speeds for all wind angles is identified and is earmarked as a potential location to install the wind turbine. 
Volume: 8
Issue: 3
Page: 756-761
Publish at: 2017-12-01
Show 1470 of 1955

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration