Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

28,451 Article Results

The Optimal High Performance Computing Infrastructure for Solving High Complexity Problem

10.12928/telkomnika.v14i4.3586
Yuliant; Telkom University Sibaroni , Fitriyani; Telkom University Fitriyani , Fhira; Telkom University Nhita
The high complexity of the problems today requires increasingly powerful hardware performance. Corresponding economic laws, the more reliable the performance of the hardware, it will be comparable to the higher price. Associated with the high-performance computing (HPC) infrastructures, there are three hardware architecture that can be used, i.e. Computer Cluster, Graphical Processing Unit (GPU), and Super Computer. The goal of this research is to determine the most optimal of HPC infrastructure to solve high complexity problem. For this reason, we chose Travelling Salesman Problem (TSP) as a case study and Genetic Algorithm as a method to solve TSP. Travelling Salesman Problem is belong often the case in real life and has a high computational complexity. While the Genetic Algorithm (GA) is belong a reliable algorithm to solve complex cases, but has the disadvantage that the time complexity level is very high. In some research related to HPC infrastructure comparison, the performance of multi-core CPU single node for data computation has not been done. Whereas the current development trend leads to the development of PCs with higher specifications like this. Based on the experiments results, we conclude that the use of GA is very effective to solve TSP. the use of multi-core single-node in parallel for solving high complexity problems as far as this is still better than the two other infrastructure but slightly below compare to multi-core single-node serially, while GPU deliver the worst performance compared to others infrastructure. The utilization of a super computer PC for data computation is still quite promising considering the ease of implementation, while the GPU utilization for the purposes of data computing is profitable if we only utilize GPU to support CPU for data computing.
Volume: 14
Issue: 4
Page: 1545-1551
Publish at: 2016-12-01

Email Classification Using Adaptive Ontologies Learning

10.12928/telkomnika.v14i4.4026
Suma; JJT University, Rajasthan T , Kumara; Nagarjuna College of Engg. & Technology, Visvesvaraya Technological University (VTU) Swamy Y S
Email is a way of communication for the today’s internet world, private and government sector or public sector all are used email for communication with their clients. They can freely send number of mail to their client without disturbing them. Now a day email communication is also a way of advertising, some mail is also spam, lots of social mails are there. Categorization and handling lots of email is an important task for the researches, as they all are working in this field by using the Natural language processing and ontology extraction process. User get frustrated for handling lots of mails and reading those for finding there is any important mail, sometime user delete lots of mail without reading and in that case may be some important mail which contain the important information may be about meeting, seminar etc. is also deleted. For avoiding these scenarios here auto updation of schedule calendar procedure is proposed by the author. Concept extraction and clustering of concept is done based on fuzzy logic, similar mail pattern is grouped in a same cluster if similarity is less than threshold value a new cluster is defined for that. From the extracted concept author establish the relationship between them and generate the result. Computation overhead is also calculated for different set of mails and finds that it takes very less time in computing large email data set.
Volume: 14
Issue: 4
Page: 1472-1479
Publish at: 2016-12-01

Novel Design of LLC Resonant Converter with Peak Gain Adjustment

10.12928/telkomnika.v14i4.3306
P.; Chaitanya Bharathi Institute of Technology Kowstubha , K.; Chaitanya Bharathi Institute of Technology Krishnaveni , K. Ramesh; G.Narayanamma Institute of Technology and Science Reddy
The main advantages of a half-bridge LLC resonant DC/DC converter having two inductors (LL) and a single capacitor (C) compared to the other load resonant converters are its less amount of circulating currents and large bandwidth for Zero Voltage Switching (ZVS). It also has the advantage of limited tuning of operating frequency to get the regulated output when variable frequency control method is implemented on the converter. This DC/DC converter is widely used in server and telecom applications due its higher efficiency and reliability. In this paper, a novel design using peak gain adjustment is proposed for a LLC resonant DC/DC converter with a design example of 400V/12V-5A used in server based applications. For the specifications of the converter mentioned, an experimental set up is built and evaluated with the Texas instruments power switch FSFR 2100 IC in closed loop configuration. The experimental results proved an improved efficiency of 94% for the converter with the novel design proposed.
Volume: 14
Issue: 4
Page: 1242-1252
Publish at: 2016-12-01

Laser-Induced Color Marking of Titanium Alloy

10.12928/telkomnika.v14i4.4177
Li; Shandong University Chunling , Lu; Shandong University Changhou
A Nd:YAG nanosecond laser was utilized in the laser color marking of  titanium alloy substrates. It was focused on how several laser parameters, such as pumping current, delay between the effective vector step, laser line spacing, Q-switch frequency and focal plane offset, affected the resulting colors, and the influence of the resulting colors on the substrate. Firstly, single-factor experiments were carried out. Then the dark blue square pattern and two samples were analyzed using an environmental scanning electron microscope (ESEM) and X-ray diffractometer (XRD) respectively. Results clearly showed that the Nd:YAG nanosecond laser can induce multiple colors on titanium alloy substrates and all the five parameters had an effect on the resulting colors significantly. The dark blue square pattern didn’t induce internal stresses within the substrate material, so  the influence of the resulting colors on the substrate is negligible.
Volume: 14
Issue: 4
Page: 1313-1320
Publish at: 2016-12-01

Analysis of Transmission Lightning Arrester Locations Using Tflash

10.12928/telkomnika.v14i4.3792
M. I.; Universitas Sriwijaya Jambak , Z.; Universitas Sriwijaya Nawawi , R.F.; Universitas Sriwijaya Kurnia , Z.; Universiti Teknologi Malaysia Buntat , M. A. B.; Universitas Sriwijaya Sidik , Y. Z.; Universiti Teknologi Malaysia Arief , A. A.; Tenaga Nasional Berhad Wahab , Z.; Tenaga Nasional Berhad Ramli , M. E.; Tenaga Nasional Berhad Ramly
Tropical countries with extensive lightning activity, such as Malaysia, encounter numerous problems on their electrical transmission and distribution systems. Many overhead lines trip because of back flashover of lightning and shielding failures of the grounding system. To overcome the problem and improve transmission line performance, a detailed lightning study is required to analyse the corresponding lines and determine the best location for transmission line arrester (TLA) installation. We used TFlash to analyse a TLA installation on a 132-kV SSWW-BBST overhead transmission line system located in Selangor, Malaysia. Based on the results, the installation of the TLA at the optimum quantity and at appropriate towers have reduced the number of lines that trip.
Volume: 14
Issue: 4
Page: 1228-1234
Publish at: 2016-12-01

Heterogeneous Information Knowledge Construction Based on Ontology

10.12928/telkomnika.v14i4.4787
Jianhou; Kunming University of Science and Technology Gan , Gang; Kunming University of Science and Technology Xie , Yongzheng; North China University of Technology Yan , Wanquan; Curtin University of Technology Liu
Describing and representing multi-source and heterogeneous knowledge is a popular research topic in recent years. After investigating knowledge forming process based on multi-source heterogeneous information resources, we present a new approach in which different information resources are put into a mutual RDF(S) data model, and semantic reasoning of RDF(S) is conducted. Moreover, a knowledge base construction framework for multi-source heterogeneous information source with combination of Ontology knowledge model is put forward, and an algorithm of knowledge base construction is also proposed, in which the core issues are knowledge inclusion and updating. Then the time complexity of our algorithm is analyzed. Finally, in order to solve the heterogeneous, and uneven horizontal of geographical distribution of ethnic minority information resources in Yunnan Province, we use the proposed method to construct a domain knowledge base for ethnic minority information resources, and use this model to evaluate the efficiency for the knowledge inclusion algorithm in responding time and indexing responding time for different data resources in our experiments.
Volume: 14
Issue: 4
Page: 1617-1628
Publish at: 2016-12-01

Virtual Stability Estimator Model for Three Phase Power System Network

10.11591/ijeecs.v4.i3.pp520-525
K. Nithiyananthan , Simson Samson Raja , R Sundar , A Amudha
The main objective of this research work is to develop a simple power systems steady state stability estimator in LabView for three phase power system network. LabVIEW based power systems stability estimator has been chosen as the main platform because it is a user friendly and easy to apply in power systems. This research work is intended to simultaneously acclimate the power system engineers with the utilization of LabVIEW with electrical power systems. This proposed work will discuss about the configuration and the improvement of the intelligent instructional VI (virtual instrument) modules in power systems for power systems stability solutions. In the proposed model power systems stability has been carried out and model has been developed such that it can accommodate the latest versions of power systems stability algorithms.
Volume: 4
Issue: 3
Page: 520-525
Publish at: 2016-12-01

Multichannel Data Aquisition System for Monitoring Supercapacitor Module And Cells

10.12928/telkomnika.v14i4.3994
Nirwan; Universitas Sriwijaya Syarif , Assaidah; Universitas Sriwijaya Assaidah
This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexThe monitoring system is needed to observe changes in the voltage of supercapacitor module and cells so that their performance can be assessed. A multichannel data acquisition system was needed to implement because a module of supercapacitor consists of several individual cells. The system can be implemented in a computer program using data acquisition board and computer programming. The computer program acts as computer and user interface was created by using Labview symbolic programming software, while the data acquisition board was Labjack. The test showed that the monitoring system can receive eight channel of input signal (voltage) of the module and cells simultaneously. The voltage of the module which has a wider range, 0-20 volts, rather than the normal input, 0 to 2.44 volts, can be overcome by adding a voltage divider circuit.
Volume: 14
Issue: 4
Page: 1307-1312
Publish at: 2016-12-01

Distributed Searchable Asymmetric Encryption

10.11591/ijeecs.v4.i3.pp684-694
Shoulin Yin , Lin Teng , Jie Liu
Searchable asymmetric encryption (SAE) can also be called Public Key Encryption with Keyword Search (PEKS), which allows us to search the keyword on the data of having been encrypted. The essence of Asymmetric searchable encryption is that users exchange the data of encryption, one party sends a ciphertext with key encryption, the other party with another key receives the ciphertext. Encryption key is not the same as the decryption key, and cannot deduce another key from any one of the key, thus it greatly enhances the information protection, and can prevent leakage the user's search criteria—Search Pattern. Secure schemes of SAE are practical, sometimes, however the speed of encryption/decryption in Public-key encryption is slower than private key. In order to get higher efficiency and security in information retrieval, in this paper we introduce the concept of distributed SAE, which is useful for security and can enable search operations on encrypted data. Moreover, we give the proof of security.
Volume: 4
Issue: 3
Page: 684-694
Publish at: 2016-12-01

GRPW-MuS: Geographic Routing to Multiple Sinks in Connected Wireless Sensor Networks

10.11591/ijeecs.v4.i3.pp487-498
Yassine Sabri
Multiple sinks routing is envisioned as a possible solution to the bottleneck research problem in Wireless Sensor Networ ks (WSN). In addition to focusing on minimizing the energy consumption in a WSN, it is also equally impor tant to design routing protocols that fair ly and evenly distr ibute the networ k traffic; in order to prolong the networ k life time and improve its scalability.In this paper we present an enhancement to the GRPW algor ithm for wireless sensor networ ks. Perfor mance of GRPW algor ithm algor ithm depends heavily on single sink position , we propose a protocol called GRPW-MuS ( Geographic Routing to Multiple Sinks in connected wireless sensor networ ks) based on Multiple Static Sinks, we modified the existing sink location pr ivacy protection scheme by dividing nodes in the networ k containing multiple sink into different levels in which real packets are forwarded to sink belong to corresponding logical levels and the inter mediate node generating fake packets and sending it to fake sinks. Using OMNET++ simulation and the MiXiM framewor k, it is shown that proposed protocol significantly improves the robustness and adapts to rapid topological changes with multiple mobile sinks, while efficiently reducing the communication overhead and the energy consumption.
Volume: 4
Issue: 3
Page: 487-498
Publish at: 2016-12-01

Examining the Security Issues of Automated Teller Machine Based on Revised Technology Acceptance Model

10.12928/telkomnika.v14i4.2920
Aida; Bina Nusantara University Fitriyani , Sfenrianto; Bina Nusantara University Sfenrianto , Gunawan; Bina Nusantara University Wang , Aries; Syarif Hidayatullah State Islamic University Susanto
Trust of using automated teller machine (ATM) is a daunting task for many Indonesians, where the security issues associated with it, still haunting them. The paper examines the collaborative issues related to the ATM security such as: perceived usefulness and ease of use, perceived security, trust, intention to use and actual system use, by using revised technical acceptance model (TAM) according to the banking purposes. The study takes customer samples of major leading banks in Indonesia and expected to present the current situation faced by many Indonesians when dealing with the ATM security. The outcome will be valuable inputs for the policy makers of the banks to establish further strategy to cope with integrated security issues related to ATM use.
Volume: 14
Issue: 4
Page: 1521-1526
Publish at: 2016-12-01

Digital Image Watermarking Algorithm Using the Intermediate Frequency

10.12928/telkomnika.v14i4.4064
Hong-an; Xi'an University of Science and Technology Li , Zhanli; Xi'an University of Science and Technology Li , Zhuoming; Jiangsu University of Technology Du , Qi; Northwest University Wang
Digital image watermarking is one of the proposed solutions for copyright protection of multimedia data. This technique is better than Digital Signatures and other methods because it does not increase overhead. Watermarking adds the additional requirement of robustness. To improve the robustness of digital image watermarking method based on the image frequency, this paper adopts the intermediate frequency to embed the watermarking and proposes an digital image watermarking algorithm based on robust principal component analysis (RPCA) and discrete cosine transform (DCT). Firstly, the high frequency part and the low frequency part of the image are extracted by the RPCA algorithm. Because the high frequency part has complex statistical characteristics, this paper processes the high frequency part with "8×8" DCT method to obtain intermediate frequency coefficients and then the watermarking information is embedded into the obtained intermediate frequency coefficients. The experimental results show that the proposed algorithm leads to satisfactory robustness to the attacks of impulse noise and cropping.
Volume: 14
Issue: 4
Page: 1424-1431
Publish at: 2016-12-01

Research on Batch Scheduling in Cloud Computing

10.12928/telkomnika.v14i4.3539
Jiao; NO.16 Wuyi Avenue Wuyishan Fujian Province China Jintao , Yu; Wuyi University Wensen , Guo; Wuyi University Lei
In the existing cloud computing environment, batch scheduling strategies mainly focus on the management of resources allocation. This paper provides the task scheduling algorithm based on service quality which fully considers priority and scheduling deadline. The improved algorithm combines the advantages of Min-min algorithm with higher throughput and linear programming with global optimization, considers not only all the tasks but also the high priority tasks. The experiment result shows that compared with the Min-min and DBCT the completed tasks of the improved algorithm increase about 10.6% and 22.0%, on the other hand the completed high priority tasks also increases approximately 20% and 40%.
Volume: 14
Issue: 4
Page: 1454-1461
Publish at: 2016-12-01

Iteration Methods for Linear Systems with Positive Definite Matrix

10.12928/telkomnika.v14i4.4238
Longquan; Shaanxi Sci-Tech University Yong , Shouheng; Shaanxi Sci-Tech University Tuo , Jiarong; Xi’an University of Architecture and Technology Shi
Two classical first order iteration methods, Richardson iteration and HSS iteration for linear systems with positive definite matrix, are demonstrated. Theoretical analyses and computational results show that the HSS iteration has the advantages of fast convergence speed, high computation efficiency, and without requirement of symmetry.
Volume: 14
Issue: 4
Page: 1586-1597
Publish at: 2016-12-01

Reverse Conversion of Signed-Digit Number Systems: Transforming Radix-Complement Output

10.11591/ijeecs.v4.i3.pp665-669
Madhu Sudan Chakraborty , Abhoy Chand Mondal
Although the speed advantage of using signed – digit number systems seemed to have been reduced significantly by reverse conversion owing to the carry – propagation, in this paper, it was shown that if typical reverse conversion algorithms were employed for signed – digit number systems, then no further carry propagation needed to transform the output from radix – complement form to other conventional forms. As a result the instantaneous delay caused by the reverse conversion of signed – digit number systems might be compensated by speed gain at later stages.
Volume: 4
Issue: 3
Page: 665-669
Publish at: 2016-12-01
Show 1512 of 1897

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration