Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

27,404 Article Results

Iris Image Recognition Based on Independent Component Analysis and Support Vector Machine

10.12928/telkomnika.v13i2.1171
Muhammad; Sriwijaya University Fachrurrozi , Muhammad; Sriwijaya University Mujtahid
Iris has a very unique texture and pattern, different for each individual and the pattern will remain stable, making it possible as biometric technology called iris recognition. In this paper, 150 iris image from Dept. Computer Science, Palacky University in Olomouc iris database used for iris recognition based on independent component analysis and support vector machine. There are three steps for developing this research namely, image preprocessing, feature extraction and recognition. First step is image preprocessing in order to get the iris region from eye image. Second is feature extraction by using independent component analysis in order to get the feature from iris image. Support vector machine (SVM) is used for iris classification and recognition. In the end of this experimental, the implement method will evaluated based upon Genuine Acceptance Rate (GAR). Experimental result shown that the recognize rate from variation of training data is 52% with one data train, 73% with two data train and 90% three data train. From experimental result also shows that this technique produces good performance.  
Volume: 13
Issue: 2
Page: 597-603
Publish at: 2015-06-01

Optimal Two Dimensional Preventive Maintenance Policy Based on Asymmetric Copula Function

10.12928/telkomnika.v13i2.1455
Xinyue; Mechanical Engineering College, Shijiazhuang Li , Yunxian; Mechanical Engineering College, Shijiazhuang Jia , Zhen; Mechanical Engineering College, Shijiazhuang Li
For some kinds of products, the consumers have strict requirements to the reliability of these products in the based warranty period. Then the manufacturer is inclined to provide the two-dimensional preventive maintenance policy to take the usage degree of the product into account. As a result, two-dimensional preventive maintenance policy in the warranty period has recently obtained increasing attention from manufacturers and consumers. In this paper, we focused on the optimization of based warranty cost and proposed a new expected based warranty cost model considering the two-dimensional imperfect preventive maintenance policy from the perspective of the manufacture. Asymmetric copula function was applied to modeling the failure function of the product. And the optimal two-dimensional preventive maintenance period was obtained by minimizing based warranty cost. At last, numerical examples are given to illustrate the proposed models, of which the results prove the model effective and validate.
Volume: 13
Issue: 2
Page: 722-729
Publish at: 2015-06-01

Wireless Sensor Networks Node Localization-A Performance Comparison of Shuffled Frog Leaping and Firefly Algorithm in LabVIEW

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1504
Chandirasekaran D , T. Jayabarathi
Wireless sensor networks (WSN) have become popular in many applications area including environmental monitoring, military and offshore oil & gas industries. In WSN the sensors are randomly deployed in the sensor field and hence estimation of the localization of each deployed node has drawn more attention by the recent researchers, It’s a unique problem to identify and maximizing the coverage where the sensors need to be placed in a position so that the sensing capability of the network is fully utilized to ensure high quality of service. In order to keep the cost of sensor networks to a minimum, the use of additional hardware like global positioning system (GPS) can be avoided by the use of effective algorithms that can be used for the same. In this paper we attempted to use both the shuffled frog leaping (SFLA) and firefly algorithms (FFA) to estimate the optimal location of randomly deployed sensors. The results were compared and published for the usefulness of further research. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7861
Volume: 14
Issue: 3
Page: 516-524
Publish at: 2015-06-01

The Implementation of One Opportunistic Routing in Wireless Networks

10.12928/telkomnika.v13i2.132
Han; Nanjing University of Science & Technology Li , Huan-yan; Nanjing University of Science & Technology Qian
In the paper, it proposes an optimization framework addressing fairness issues for opportunity routing in wireless mesh networks, where we use network coding to ease the routing problem. We propose a distributed heuristic algorithm in the case when scheduling is determined by MAC, and discuss the suitability of our algorithm through simulations. It is found that in most situations our algorithm has better performances than the single-path algorithm and the classical network coding which is based opportunity algorithm MORE.
Volume: 13
Issue: 2
Page: 460-468
Publish at: 2015-06-01

An Image Compression Method Based on Wavelet Transform and Neural Network

10.12928/telkomnika.v13i2.1430
Suqing; Henan Vocational and Technical Institute Zhang , Aiqiang; Henan Vocational and Technical Institute Wang
Image compression is to compress the redundancy between the pixels as much as possible by using the correlation between the neighborhood pixels so as to reduce the transmission bandwidth and the storage space. This paper applies the integration of wavelet analysis and artificial neural network in the image compression, discusses its performance in the image compression theoretically, analyzes the multi-resolution analysis thought, constructs a wavelet neural network model which is used in the improved image compression and gives the corresponding algorithm. Only the weight in the output layer of the wavelet neural network needs training while the weight of the input layer can be determined according to the relationship between the interval of the sampling points and the interval of the compactly-supported intervals. Once determined, training is unnecessary, in this way, it accelerates the training speed of the wavelet neural network and solves the problem that it is difficult to determine the nodes of the hidden layer in the traditional neural network. The computer simulation experiment shows that the algorithm of this paper has more excellent compression effect than the traditional neural network method.
Volume: 13
Issue: 2
Page: 587-596
Publish at: 2015-06-01

High Available VoIP Server Failover Mechanism in Wide Area Network

10.12928/telkomnika.v13i2.1741
Hery; University of Lampung Dian Septama , Ardian; University of Lampung Ulvan , Jiri; Czech Technical University Hlavacek , Robert; Czech Technical University Bestak
The development of telecommunication technology specified the Internet Protocol (IP) based technology for the next generation network. Voice over Internet Protocol (VoIP) has been introduced to overcome future telephony demand. However, these rapid changes encountered some issues, and the most critical is how to provide the services availability and reliability equally to circuit based telephony. Virtualization is widely used not only for hardware efficiency and maintenance, but also for High Availability support. Virtualized environment provides the ability among servers to migrate or replicate into another machine, even when they are running their services, which is known as Live Migration. In this paper, the ability of virtualization failover mechanism over WAN and voice quality of VoIP service when running on the High Availability system in virtualized environment is studied and examined. The objective analysis by using quality of services (QoS) attributes is conducted as well as the subjective analysis using Mean Opinion Score (MOS). The work utilizes Xen® Hypervisor with modified Remus extensions to provide the High Availability environment with GRE tunnelling and newtwork virtualization. Remus approach using checkpoint based is deployed to copy the primary server to the backup server. A range of 40ms – 900ms has been applied as time interval of checkpoint. The results show that the the failover downtime is 1.4 s and mean jitter is 9,98 ms, packet loss 3,12% and MOS 3.61 for Remus 400ms checkpoint. MOS with different checkpoint time interval is also presented.
Volume: 13
Issue: 2
Page: 739-744
Publish at: 2015-06-01

Improvement of Power Quality for Microgrid using Fuzzy Based UPQC Controller

10.11591/ijai.v4.i2.pp37-44
Abdul Rasheed , G. Keshava Rao
Generally, the power systems are mainly effected by the continuous changes in operational requirement and increasing amount of distributed energy systems. This paper proposes a new concept of power-control strategies for a micro grid generation system for better transfer of power. The micro grids are obtained with the general renewable energy sources and this concept provides the maximum utilization of power at environmental free conditions with low losses; then the system efficiency is also improved. This paper proposes a single stage converter based micro grid to reduce the number of converters in an individual ac or dc grid. The proposed micro grid concept can work in both stand-alone mode and also in grid interfaced mode. The distortions that occur in power system due to changes in load or because of usage of non-linear loads, can be eliminated by using control strategies designed for shunt active hybrid filters such as series and shunt converters. A conventional Proportional Integral (PI) and Fuzzy Logic Controllers are used for power quality enhancement by reducing the distortions in the output power. The simulation results are compared among the two control strategies, that fuzzy logic controller and pi controller.
Volume: 4
Issue: 2
Page: 37-44
Publish at: 2015-06-01

Home Appliance Control with Publish Subscribe in Social Media

10.12928/telkomnika.v13i2.1309
Sabriansyah Rizqika; University of Brawijaya Akbar , Eko; University of Brawijaya Setiawan , Achmad; University of Brawijaya Basuki
 Nowadays, Internet social media has enriched the way people to communicate and interact each other. Will it be possible for people to interact with their home appliances around? This paper proposes a new approach in smart home system that made possible for people to remotely interact with their appliances using social media networks. In this paper, we present a smart home prototype system that leverages Twitter’s Application Program Interface (API) to remotely control home appliances over the Internet. Experiment results showed that the system immediately responds to remote commands sent over a social media account to control home appliances. The system responds the command in 3672.96 ms. Publish-subscribe method work better in mass announcement communication system. Home system could notice all householders in less than 6 s independenly from number of householder. Our proposed method gives alternative solution to build reliable, fast and simple control method.
Volume: 13
Issue: 2
Page: 678-685
Publish at: 2015-06-01

An Review of Power Factor Correction in SRM Drives Using Bridgeless Converters

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1496
M. Vishvanath , R. Balamurugan
This paper deals with a comparative analysis of various converter topologies for Power Factor Correction (PFC) in switched reluctance motor drives. Hence a power factor corrected converter required for obtaining the improved PQ at the AC mains for an inverter fed SRM drive has been analyzed. The SRM when fed by a DBR with a high value of DC-link capacitor results in highly distorted supply current and a poor power factor. A new bidirectional bridgeless LUO converter is used. The bridgeless LUO converter is a mixture of two dc-dc converters with one or two semiconductor switches in the current flowing path thereby reducing the current stresses in the active and passive switches. Circuit efficiency is further improved as compared to conventional Converters. LUO converters are new series of DC/DC Converters that have very low ripple of voltage and current and have output wave with high quality, high transfer voltage gain and high power density. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7781 
Volume: 14
Issue: 3
Page: 441-445
Publish at: 2015-06-01

Sensor Node Easy Moving Monitoring Region Location Algorithm in Internet of Things

10.12928/telkomnika.v13i2.1434
Donghua; Wuhan University of Technology Feng , Yahong; Nanyang Institute of Technology Li
Because of the influence from geographical location, weather and other kinds of circumstances in monitored areas, the shift of the node location and non-uniform distribution, this paper proposed an improved DV-Hop location algorithm. First of all, the package structure by changing the anchor nodes to reduce the number of hops data acquisition phase node data storage; introducing weights to the average hop distance calculation phase the original average hop distance calculation method was improved, and between the node and anchor node distance calculated on the basis of reference anchor nodes are different; then, iterative refinement of node localization stage through the use of multilateral measurement method and Taylor series. Finally, simulation experiment of this method, and compared with the existing methods, the results prove that the method in this paper can greatly reduce positioning errors without adding hardware equipment and network traffic, improve the positioning accuracy, a better solution to the problem of node localization networking monitoring area.
Volume: 13
Issue: 2
Page: 703-710
Publish at: 2015-06-01

Optimization of Sensor Network Topology in Deployed in Inhomogeneous Lossy Media

10.12928/telkomnika.v13i2.961
Rony; University of Palangkaraya Teguh , Hajime; Hokkaido University Igarashi
This paper presents optimization of wireless sensor network (WSN) topology for forest fire detection. The sensors for this purpose are deployed in forest, grassland and open space, which have different attenuation properties in electromagnetic waves. For this reason, routers which receive signals from sensors and send them to the base station must be deployed considering these differences. In this work, we develop an optimization method for WSN topology based on simulated annealing considering the differences in the attenuation property. The vegetation data are taken from Landsat data. Using the present method, the necessary number of routers for full connection of the sensors deployed in diverse, irregular environments can be estimated.
Volume: 13
Issue: 2
Page: 469-477
Publish at: 2015-06-01

Sampling Deviation Real-time Calibration Method for Wideband Simulator

10.12928/telkomnika.v13i2.1470
Song; Nanjing University of Aeronautics and Astronautics Bingbing , Pan; Nanjing University of Aeronautics and Astronautics Minghai , Hu; Nanjing University of Aeronautics and Astronautics Xiaohua
Hardware-in-the-loop simulation is an efficient method for research on radar system.Target’s echo which offered by the simulator should be synchronized with radar on frequency, time, and range bin. However, because simulator needs to take into account of the requirements of various types of radar, it is difficult to make the clock of simulator synchronized with the clock of radar. To solve the problem, synchronous sampling deviation model is established. Influence of sampling deviation on imaging is analyzed. An engineering method is put forward to eliminate the sampling deviation. This method not only provides a reference for simulation system, but also provides a reference for the design of radar system.
Volume: 13
Issue: 2
Page: 510-517
Publish at: 2015-06-01

Integrated System Design for Broadcast Program Infringement Detection

10.12928/telkomnika.v13i2.1124
Sukmawati Nur; Diponegoro University Endah , Satriyo; Diponegoro University Adhy , Sutikno; Diponegoro University Sutikno
Supervision of television and radio broadcast programs by the “Komisi Penyiaran Indonesia (KPI)” Central Java was still performed manually i.e. direct supervision by humans. It certainly had some weaknesses related to the human error such as tiredness and weary eyes. Therefore, we needed intelligent software that could automatically detect broadcast infringement. Currently, research in this area had not been studied. This research was to design an integrated system to detect broadcast infringement including data design, architecture design and main module interface design. Two main stages in this system are the Indonesian language speech recognition and detection of infringements of the broadcast program. With the method of Mel Frequency cepstral Coefficients (MFCC) and Hidden Markov Model (HMM) speech recognition application that used the 1050 sample data produces about 70% accuracy rate. This research would continue to implement the plan that had been created using speech recognition applications that had been built.
Volume: 13
Issue: 2
Page: 571-577
Publish at: 2015-06-01

Spectrum Sensing Based on Monostable Stochastic Resonance in Cognitive Radio Networks

10.12928/telkomnika.v13i2.1429
Yonghua; South China University of Technology Wang , Pin; Guangdong University of Technology Wan , Qin; Guangdong University of Technology Deng , Yuli; China University of Technology Fu
The cognitive radio technology can provide dynamic spectrum access and improve the efficiency of spectrum utilization. Spectrum sensing is one of the key technologies of cognitive radio networks. The spectrum sensing performance of cognitive radio networks will be greatly reduced in the low SNR environment, especially when using energy detection. Due to the monostable stochastic resonance system can improve the energy detection system output SNR, a monostable stochastic resonanceis applied to spectrum sensing based on the energy detection method of cognitive radio networks in this paper. The simulation results show that in the low SNR environment, when the false alarm probability is constant, the proposed spectrum sensing based on monostable stochastic resonance has better performance than traditional energy detection.
Volume: 13
Issue: 2
Page: 487-493
Publish at: 2015-06-01

Fuzzy Logic PSS Assisted by Neighboring Signals to Mitigate the Electromechanical Wave Propagation in Power Systems

https://ijeecs.iaescore.com/index.php/IJEECS/article/view/1487
Mahmoud N. Ali
This paper deals with the mitigation of electromechanical wave propagation in power systems. Different conventional controllers addressed this problem, such as the conventional PSS and the conventional fuzzy logic PSS. In this paper, the fuzzy logic PSS is assisted by auxiliary signals from the fuzzy logic PSS of the interconnected machines to augment the damping of electromechanical wave propagation and the associated oscillations. The neighboring machines speed deviation and its derivatives signals are exploited through the fuzzy logic PSS to assist the local fuzzy logic PSS. The disturbance propagation and reflection phenomena are considered in the design of the adopted strategy. The efficacy of the proposed assistance of the conventional fuzzy logic PSS are examined through different simulation results. DOI: http://dx.doi.org/10.11591/telkomnika.v14i3.7837
Volume: 14
Issue: 3
Page: 363-375
Publish at: 2015-06-01
Show 1553 of 1827

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration