Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,188 Article Results

Virtual Stability Estimator Model for Three Phase Power System Network

10.11591/ijeecs.v4.i3.pp520-525
K. Nithiyananthan , Simson Samson Raja , R Sundar , A Amudha
The main objective of this research work is to develop a simple power systems steady state stability estimator in LabView for three phase power system network. LabVIEW based power systems stability estimator has been chosen as the main platform because it is a user friendly and easy to apply in power systems. This research work is intended to simultaneously acclimate the power system engineers with the utilization of LabVIEW with electrical power systems. This proposed work will discuss about the configuration and the improvement of the intelligent instructional VI (virtual instrument) modules in power systems for power systems stability solutions. In the proposed model power systems stability has been carried out and model has been developed such that it can accommodate the latest versions of power systems stability algorithms.
Volume: 4
Issue: 3
Page: 520-525
Publish at: 2016-12-01

Multichannel Data Aquisition System for Monitoring Supercapacitor Module And Cells

10.12928/telkomnika.v14i4.3994
Nirwan; Universitas Sriwijaya Syarif , Assaidah; Universitas Sriwijaya Assaidah
This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexThe monitoring system is needed to observe changes in the voltage of supercapacitor module and cells so that their performance can be assessed. A multichannel data acquisition system was needed to implement because a module of supercapacitor consists of several individual cells. The system can be implemented in a computer program using data acquisition board and computer programming. The computer program acts as computer and user interface was created by using Labview symbolic programming software, while the data acquisition board was Labjack. The test showed that the monitoring system can receive eight channel of input signal (voltage) of the module and cells simultaneously. The voltage of the module which has a wider range, 0-20 volts, rather than the normal input, 0 to 2.44 volts, can be overcome by adding a voltage divider circuit.
Volume: 14
Issue: 4
Page: 1307-1312
Publish at: 2016-12-01

Distributed Searchable Asymmetric Encryption

10.11591/ijeecs.v4.i3.pp684-694
Shoulin Yin , Lin Teng , Jie Liu
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria—Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security.
Volume: 4
Issue: 3
Page: 684-694
Publish at: 2016-12-01

GRPW-MuS: Geographic Routing to Multiple Sinks in Connected Wireless Sensor Networks

10.11591/ijeecs.v4.i3.pp487-498
Yassine Sabri
Multiple sinks routing is envisioned as a possible solution to the bottleneck research problem in Wireless Sensor Networ ks (WSN). In addition to focusing on minimizing the energy consumption in a WSN, it is also equally impor tant to design routing protocols that fair ly and evenly distr ibute the networ k traffic; in order to prolong the networ k life time and improve its scalability.In this paper we present an enhancement to the GRPW algor ithm for wireless sensor networ ks. Perfor mance of GRPW algor ithm algor ithm depends heavily on single sink position , we propose a protocol called GRPW-MuS ( Geographic Routing to Multiple Sinks in connected wireless sensor networ ks) based on Multiple Static Sinks, we modified the existing sink location pr ivacy protection scheme by dividing nodes in the networ k containing multiple sink into different levels in which real packets are forwarded to sink belong to corresponding logical levels and the inter mediate node generating fake packets and sending it to fake sinks. Using OMNET++ simulation and the MiXiM framewor k, it is shown that proposed protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption.
Volume: 4
Issue: 3
Page: 487-498
Publish at: 2016-12-01

Examining the Security Issues of Automated Teller Machine Based on Revised Technology Acceptance Model

10.12928/telkomnika.v14i4.2920
Aida; Bina Nusantara University Fitriyani , Sfenrianto; Bina Nusantara University Sfenrianto , Gunawan; Bina Nusantara University Wang , Aries; Syarif Hidayatullah State Islamic University Susanto
Trust of using automated teller machine (ATM) is a daunting task for many Indonesians, where the security issues associated with it, still haunting them. The paper examines the collaborative issues related to the ATM security such as: perceived usefulness and ease of use, perceived security, trust, intention to use and actual system use, by using revised technical acceptance model (TAM) according to the banking purposes. The study takes customer samples of major leading banks in Indonesia and expected to present the current situation faced by many Indonesians when dealing with the ATM security. The outcome will be valuable inputs for the policy makers of the banks to establish further strategy to cope with integrated security issues related to ATM use.
Volume: 14
Issue: 4
Page: 1521-1526
Publish at: 2016-12-01

Digital Image Watermarking Algorithm Using the Intermediate Frequency

10.12928/telkomnika.v14i4.4064
Hong-an; Xi'an University of Science and Technology Li , Zhanli; Xi'an University of Science and Technology Li , Zhuoming; Jiangsu University of Technology Du , Qi; Northwest University Wang
Digital image watermarking is one of the proposed solutions for copyright protection of multimedia data. This technique is better than Digital Signatures and other methods because it does not increase overhead. Watermarking adds the additional requirement of robustness. To improve the robustness of digital image watermarking method based on the image frequency, this paper adopts the intermediate frequency to embed the watermarking and proposes an digital image watermarking algorithm based on robust principal component analysis (RPCA) and discrete cosine transform (DCT). Firstly, the high frequency part and the low frequency part of the image are extracted by the RPCA algorithm. Because the high frequency part has complex statistical characteristics, this paper processes the high frequency part with "8×8" DCT method to obtain intermediate frequency coefficients and then the watermarking information is embedded into the obtained intermediate frequency coefficients. The experimental results show that the proposed algorithm leads to satisfactory robustness to the attacks of impulse noise and cropping.
Volume: 14
Issue: 4
Page: 1424-1431
Publish at: 2016-12-01

Research on Batch Scheduling in Cloud Computing

10.12928/telkomnika.v14i4.3539
Jiao; NO.16 Wuyi Avenue Wuyishan Fujian Province China Jintao , Yu; Wuyi University Wensen , Guo; Wuyi University Lei
In the existing cloud computing environment, batch scheduling strategies mainly focus on the management of resources allocation. This paper provides the task scheduling algorithm based on service quality which fully considers priority and scheduling deadline. The improved algorithm combines the advantages of Min-min algorithm with higher throughput and linear programming with global optimization, considers not only all the tasks but also the high priority tasks. The experiment result shows that compared with the Min-min and DBCT the completed tasks of the improved algorithm increase about 10.6% and 22.0%, on the other hand the completed high priority tasks also increases approximately 20% and 40%.
Volume: 14
Issue: 4
Page: 1454-1461
Publish at: 2016-12-01

Iteration Methods for Linear Systems with Positive Definite Matrix

10.12928/telkomnika.v14i4.4238
Longquan; Shaanxi Sci-Tech University Yong , Shouheng; Shaanxi Sci-Tech University Tuo , Jiarong; Xi’an University of Architecture and Technology Shi
Two classical first order iteration methods, Richardson iteration and HSS iteration for linear systems with positive definite matrix, are demonstrated. Theoretical analyses and computational results show that the HSS iteration has the advantages of fast convergence speed, high computation efficiency, and without requirement of symmetry.
Volume: 14
Issue: 4
Page: 1586-1597
Publish at: 2016-12-01

Reverse Conversion of Signed-Digit Number Systems: Transforming Radix-Complement Output

10.11591/ijeecs.v4.i3.pp665-669
Madhu Sudan Chakraborty , Abhoy Chand Mondal
Although the speed advantage of using signed – digit number systems seemed to have been reduced significantly by reverse conversion owing to the carry – propagation, in this paper, it was shown that if typical reverse conversion algorithms were employed for signed – digit number systems, then no further carry propagation needed to transform the output from radix – complement form to other conventional forms. As a result the instantaneous delay caused by the reverse conversion of signed – digit number systems might be compensated by speed gain at later stages.
Volume: 4
Issue: 3
Page: 665-669
Publish at: 2016-12-01

Mitigating Broadcast Storm on Metro Ethernet Network Using PVST+

10.12928/telkomnika.v14i4.3880
Beny; Mercu Buana University Nugraha , Bayu; Mercu Buana University Fitrianto , Fahraini; Mercu Buana University Bacharuddin
Broadcast storm attack on the layer 2 networks included looping and duplicate packets that are transmitted continuously in order to prevent the service of the network, thus, it is the type of attack that is against availability. In this research, a Spanning Tree Protocol method, namely PVST+ (Per VLAN Spanning Tree Plus), is used to overcome the problem caused by the broadcast storm attack on Metro Ethernet Network. The PVST+ serves as a redundant network management and it prevented looping on the network. The result obtained from this research is PVST+ is able to mitigate broadcast strom that is shown by the decrease of number of packets and the decrease of the average packet per-second. The average packets per-second on VLAN 1 decrease to 274,041 and the average packets on VLAN 10 decrease to 267,794 packets per-second.
Volume: 14
Issue: 4
Page: 1559-1564
Publish at: 2016-12-01

Least Mean Error Algorithm for Determining the Radome Dimension of Planar Antenna

10.12928/telkomnika.v14i4.4019
Adya; Atma Jaya University Pramudita , Yuyu; Lembaga Ilmu Pengetahuan Indonesia Wahyu
Antennas are generally contructed from metallic materials; therefore it is prone to corrosion when installed outdoors. Radome is an important part of an outdoor antenna that serves to protect the antenna from environmental conditions. Radome structure is not expected to have a significant influence on the characteristics of the antenna. Parametric study is generaly applied in finding the optimum antenna dimenssion included radome. A method for guiding a parametric study proses in finding the optimum antenna dimensions has investigated and proposed in this paper. In this study, a method for determining the optimum radome dimension for planar antenna by applying the algorithm Least Mean Error (LME) has investigated. LME algorithm is used to find the optimum dimensions of the radome. The simulation results show that the proposed method can be applied to determine the dimensions of a planar antenna.
Volume: 14
Issue: 4
Page: 1356-1361
Publish at: 2016-12-01

Designing Multi-Dimensional User Interaction for a Virtual Museum System

10.11591/ijeecs.v4.i3.pp649-654
Tengku Siti Meriam Tengku Wook , Noraidah Sahari @ Ashaari , Normala Rahim
The focus of this study is to improve the display platform for the State of Terengganu Virtual Museum System (muziummaya.terengganu.gov.my). The existing virtual museum can be displayed via desktop computing system where information is displayed on-line using features for searching, browsing, and manipulating artifacts and galleries. However, presentation of information on mobile device screens cannot be viewed effectively and is difficult to navigate due to the user's cognitive load. Therefore, this study will establish effective interaction design, taking into account the multi-dimensional context for the design of a user interface via a mobile device in the hopes that users who are students, curators, researchers, and the public can access the virtual museum system via desktop as well as from their mobile devices. This study was conducted in three stages i.e. user requirements analysis, interface design, and usability evaluation. The results of this research is the design of a multi-dimensional user interaction context that meets the display requirements and navigation information for mobile devices.
Volume: 4
Issue: 3
Page: 649-654
Publish at: 2016-12-01

Rectangular Patch Antenna Array for Radar Application

10.12928/telkomnika.v14i4.4742
Yudi; Research Center for Electronics and Telecommunications - Indonesian Institutes of Sciences (LIPI) Yuliyus Maulana , Yuyu; Research Center for Electronics and Telecommunications - Indonesian Institutes of Sciences (LIPI) Wahyu , Folin; Research Center for Electronics and Telecommunications - Indonesian Institutes of Sciences (LIPI) Oktafiani , Yussi; Research Center for Electronics and Telecommunications - Indonesian Institutes of Sciences (LIPI) Perdana Saputra , Arie; Research Center for Electronics and Telecommunications - Indonesian Institutes of Sciences (LIPI) Setiawan
This paper deals with the characterization of Rectangular Patch Antenna Arrays numerically and experimentally. This antenna is designed to work around frequency of 9.4GHz for radar applications. In the design process, the Computer Simulation Technology (CST) simulator software is utilized to determine the value of the antenna parameters such as gain, radiation pattern, and voltage standing wave ratio (VSWR). The Rectangular Patch Antenna Arrays realized by using the 1x16 patch antenna array, while the patch antenna is implemented using microstrip lines. The Duroid/RT5880 substrate with a dielectric constant of 2.2 and a thickness of 1.57mm applied for implementation. The characterization results show that the VSWR of realized antenna is 1.052, and the gain is 15,26dB which is 1.4dB lower than the design result, while the radiation pattern is unidirectional and elliptical polarization.
Volume: 14
Issue: 4
Page: 1345-1350
Publish at: 2016-12-01

Urban Traffic Simulators

10.11591/ijict.v5i3.pp124-128
Harshita Chitla H
Computer traffic simulation is a widely used technique in modeling, coming up with and development of traffic networks and systems. It contains a various applications, like traffic forecasting, vehicle navigation devices and so on. This paper discusses about the various types of traffic simulators. Another drawback is that the factors like accidents, public events, and road closures. In addition, we are introducing algorithmic concepts, quantifiable metrics and data structural approaches that might be applied to the simulation systems.
Volume: 5
Issue: 3
Page: 124-128
Publish at: 2016-12-01

A Methodology for Characterizing Real-Time Multimedia Quality of Service in Limited Bandwidth Network

10.12928/telkomnika.v14i4.3295
Yoanes; Institut Teknologi Bandung Bandung , Idi; Institut Teknologi Bandung Sumardi
This paper presents how to characterize the quality of multimedia which consists of audio and video that are transmitted in real-time communication through the Internet with limited bandwidth. We developed a methodology of characterizing the multimedia Quality-of-Service (QoS) by measuring network parameters (i.e., bandwidth capacity, packet loss rate (PLR), and end-to-end delay) of testbed network and simulating the audio-video delivery according to the measured network parameters. The analysis of network parameters was aimed to describe the network characteristics. Multimedia QoS was characterized by conducting a simulation using data which was collected from the previous network characterization. A simulation network model was built using OMNet++ representing a delivery of audio-video in real-time while a background traffic was generated to represent a real condition of the network. Apllying the methodology in a network testbed in Indonesia’s rural area, the simulation results showed that audio-video could be delivered with accepted level of user satisfaction.
Volume: 14
Issue: 4
Page: 1534-1544
Publish at: 2016-12-01
Show 1495 of 1880

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration