Articles

Access the latest knowledge in applied science, electrical engineering, computer science and information technology, education, and health.

Filter Icon

Filters article

Years

FAQ Arrow
0
0

Source Title

FAQ Arrow

Authors

FAQ Arrow

29,939 Article Results

A numerical-analytical iterative method for solving an electrical oscillator equation

10.12928/telkomnika.v19i4.18987
Sudi; Sanata Dharma University Mungkasi , Damar; Sanata Dharma University Widjaja
Self-excited oscillation problem occurring from a triode electrical circuit has been modelled by van der Pol. Until now, the exact solution to the van der Pol equation is not available. This paper focuses on finding a new method for solving the van der Pol equation simply and accurately. There exists several approximate iterative methods available in the literature for solving the van der Pol equation, such as, the successive approximation method. The successive approximation method is simple, but inaccurate for large time values. In this paper, we propose a new variant of numerical-analytical method, which is simple but accurate, for solving the van der Pol equation. Our new variant of numerical-analytical method solves the van der Pol equation from its equivalent system of first order ordinary differential equations. Our strategy leads to a simple implementation of the numerical-analytical method in the multistage way. Furthermore, computational experiments show that our proposed method is accurate for large sizes of time domain in solving the van der Pol equation.
Volume: 19
Issue: 4
Page: 1218-1225
Publish at: 2021-08-01

From cloud computing security towards homomorphic encryption: A comprehensive review

10.12928/telkomnika.v19i4.16875
Saja J.; University of Mosul Mohammed , Dujan B.; University of Mosul Taha
“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing.
Volume: 19
Issue: 4
Page: 1152-1161
Publish at: 2021-08-01

Construction of fuzzy radial basis function neural network model for diagnosing prostate cancer

10.12928/telkomnika.v19i4.20398
Agus Maman; Yogyakarta State University Abadi , Dhoriva Urwatul; Yogyakarta State University Wutsqa , Nurlia; Yogyakarta State University Ningsih
In this paper, we propose a construction of fuzzy radial basis function neural network model for diagnosing prostate cancer. A fuzzy radial basis function neural network (fuzzy RBFNN) is a hybrid model of logical fuzzy and neural network. The fuzzy membership function of the fuzzy RBFNN model input is developed using the triangle function. The fuzzy C-means method is applied to estimate the center and the width parameters of the radial basis function. The weight estimation is performed by various ways to gain the most accurate model. A singular value decomposition (SVD) is exploited to address this process. As a comparison, we perform other ways including back propagation and global ridge regression. The study also promotes image preprocessing using high frequency emphasis filter (HFEF) and histogram equalization (HE) to enhance the quality of the prostate radiograph. The features of the textural image are extracted using the gray level co-occurrence matrix (GLCM) and gray level run length matrix (GLRLM). The experiment results of fuzzy RBFNN are compared to those of RBFNN model. Generally, the performances of fuzzy RBFNN surpass the RBFNN in all accuracy calculation. In addition, the fuzzy RBFNN-SVD demonstrates the most accurate model for prostate cancer diagnosis.
Volume: 19
Issue: 4
Page: 1273-1283
Publish at: 2021-08-01

The future of software engineering: Visions of 2025 and beyond

10.11591/ijece.v11i4.pp3443-3450
Firoz Khan , R. Lakshmana Kumar , Seifedine Kadry , Yunyoung Nam
In the current technological scenario of the industry and businesses, there has been increasing need of software within systems and also an increasing demand being put onto software-intensive systems. This in effect will lead to a significant evolution of software engineering processes over the next twenty years. This is due to the fact of emerging technological advancements like Industry 4.0 and Internet of Things in the IT field, among other new developments. This paper addresses and tries to analyses the key research challenges being faced by the software engineering field and articulates information that is derived from the key research specializations within software engineering. The paper analyses the past and current trends in software engineering. The future of software engineering is also looked with respect to Industry 4.0 which including emerging technological platforms like Internet of Things. The societal impact aspect of future trends in software engineering is also addressed in this paper.
Volume: 11
Issue: 4
Page: 3443-3450
Publish at: 2021-08-01

Denoising electromyogram and electroencephalogram signals using improved complete ensemble empirical mode decomposition with adaptive noise

10.11591/ijeecs.v23.i2.pp829-836
S. Elouaham , A. Dliou , N. Elkamoun , R. Latif , S. Said , H. Zougagh , K. Khadiri
The health of the brain and muscles depends on the proper analysis of electroencephalogram and electromyogram signals without noise. The latter blends into the recording of biomedical signals for external or internal reasons of the human body. Therefore, to obtain a more accurate signal, it is needed to select filtering techniques that minimize the noise. In this study, the techniques used are empirical mode decomposition and its variants. Among the new versions of variants is the improved complete ensemble empirical mode decomposition with adaptive noise. These methods are applied to electroencephalogram and electromyogram signals corrupted by natural noise and white Gaussian noise. The obtained results through the use of the improved complete ensemble empirical mode decomposition with adaptive noises how the high performance that includes minimizing the noise and the effectiveness of the components of the signals used in the present research. This method has low values of the mean square error and high values of signal-to-noise ratio compared to other methods used in this study.
Volume: 23
Issue: 2
Page: 829-836
Publish at: 2021-08-01

Data delivery performance on MongoDB generated by WSN over high data load

10.12928/telkomnika.v19i4.18358
Mochammad Hannats Hanafi; Brawijaya University Ichsan , Buce Trias; Brawijaya University Hanggara , Rakhmadhany; Brawijaya University Primananda
Wireless sensor networks (WSN) Environment is a collection of nodes that sensing and sending data to other nodes in a large number of nodes. One of the WSN concepts is continuous or periodic data collection, then the data obtained can be further processed. From this process, it is possible to produce large data, so the process of sending and storing data becomes a high load. Data obtained from WSN nodes vary greatly, which affects on sending and storing of data. Therefore, a study is needed to analyze WSN's ability to send and store large amounts of data. Message query telemetry protocol (MQTT) is used because it could save resources on communication and MongoDB used because it does not have the concept of tables and rows, this is very suitable for variations in data generated by WSN. In this study, it can be concluded that the performance of MongoDB on high data amount is acceptable, so MongoDB is highly recommended for WSN implementation.
Volume: 19
Issue: 4
Page: 1169-1176
Publish at: 2021-08-01

A transfer learning with deep neural network approach for diabetic retinopathy classification

10.11591/ijece.v11i4.pp3492-3501
Mohammed Al-Smadi , Mahmoud Hammad , Qanita Bani Baker , Sa’ad A. Al-Zboon
Diabetic retinopathy is an eye disease caused by high blood sugar and pressure which damages the blood vessels in the eye. Diabetic retinopathy is the root cause of more than 1% of the blindness worldwide. Early detection of this disease is crucial as it prevents it from progressing to a more severe level. However, the current machine learning-based approaches for detecting the severity level of diabetic retinopathy are either, i) rely on manually extracting features which makes an approach unpractical, or ii) trained on small dataset thus cannot be generalized. In this study, we propose a transfer learning-based approach for detecting the severity level of the diabetic retinopathy with high accuracy. Our model is a deep learning model based on global average pooling (GAP) technique with various pre-trained convolutional neural net- work (CNN) models. The experimental results of our approach, in which our best model achieved 82.4% quadratic weighted kappa (QWK), corroborate the ability of our model to detect the severity level of diabetic retinopathy efficiently.
Volume: 11
Issue: 4
Page: 3492-3501
Publish at: 2021-08-01

Cloud-based architecture for face identification with deep learning using convolutional neural network

10.11591/ijeecs.v23.i2.pp811-820
Aditya Herlambang , Putu Wira Buana , I Nyoman Piarsa
The use of a face as a biometric to identify a person in order to keep the system safe from an unauthorized person has advantages over other biometric characteristics. The face as a biometric has more structure and a wider area than other biometrics, while can be retrieved in a non-invasive manner. We proposed a cloud-based architecture for face identification with deep learning using convolutional neural network. Face identification in this study used a cloud-based engine with four stages, namely face detection with histogram of oriented gradients (HOG), image enhancement, feature extraction using convolutional neural network, and classification using k-nearest neighbor (KNN), SVM, as well as random forest algorithm. This study conducted a classification experiment with cloud-based architecture using three different datasets, namely Faces94, Faces96 and University of Manchester Institute of Science and Technology (UMIST) face dataset. The results from this study are with the proposed cloud-based architecture, the best accuracy is obtained by KNN algorithm with an accuracy of 99% on Faces94 dataset, 99% accuracy on Faces96 dataset, 97% on UMIST face dataset, and performance of the three algorithms decreased in UMIST face dataset with facial variations from various angles from left to right profile.
Volume: 23
Issue: 2
Page: 811-820
Publish at: 2021-08-01

Performance evaluation of NB-IoT in-band deployment mode in suburban area

10.11591/ijeecs.v23.i2.pp855-862
Karina Turzhanova , Sergey Konshin , Valery Tikhvinskiy , Alexandr Solochshenko
There given to discuss the study results about one of three deployment scenarios performance (in-band deployment mode) of the narrow-band internet of things (NB-IoT) technology. The study is carrying out with help of simulation modeling and experimental testing of the main network parameters, namely: radio coverage, network capacity, user experience, and their dependencies on each other. Comparison of the results of a physical experiment and simulation modeling shows their high convergence and confirms the adequacy of the applied testing methodology. As a case scenario provided an example of NB-IoT implementation on a 4G mobile network in the 800 MHz band, in a suburban area for remote metering applications. The article presents the applying testing methodology of NB-IoT that adapted to the local conditions of radio network planning. Based on the obtained data, adducing the main conclusions about the feasibility of using an in-band scenario for deploying NB-IoT on a 4G network in a suburban environment.
Volume: 23
Issue: 2
Page: 855-862
Publish at: 2021-08-01

A novel fast time jamming analysis transmission selection technique for radar systems

10.11591/ijece.v11i4.pp3241-3254
Kamal Hussein , Mohamed Mabrouk , Bahaaeldin M. F. Elsor , Ahmed Alieldin , Walid M. Saad
The jamming analysis transmission selection (JATS) sub-system is used in radar systems to detect and avoid the jammed frequencies in the available operating bandwidth during signal transmission and reception. The available time to measure the desired frequency spectrum and select the non-jammed frequency for transmission is very limited. A novel fast time (FAT) technique that measures the channel spectrum, detects the jamming sub-band and selects the non-jammed frequency for radar system transmission in real time is proposed. A JATS sub-system has been designed, simulated, fabricated and implemented based on FAT technique to verify the idea. The novel FAT technique utilizes time-domain analysis instead of the well-known fast Fourier transform (FFT) used in conventional JATS sub-systems. Therefore, the proposed fast time jamming analysis transmission selection (FAT-JATS) sub-system outperforms other reported JATS sub-systems as it uses less FPGA resources, avoids time-delay occurred due to complex FFT calculations and enhances the real time operation. This makes the proposed technique an excellent candidate for JATS sub-systems.
Volume: 11
Issue: 4
Page: 3241-3254
Publish at: 2021-08-01

Image encryption under spatial domain based on modify 2D LSCM chaotic map via dynamic substitution-permutation network

10.11591/ijece.v11i4.pp3070-3083
Rana Saad Mohammed , Khalid Kadhim Jabbar , Hussien Abid Hilal
Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color image under the spatial domain in this filed is considered as another challenge added to the proposed method that make it sensitivity and difficulty. The proposed method aims to encode a color image by dealing with the main color components of the red (R), green (G), and blue (B) components of a color image to strengthen the dependence of each component by modifying a two dimensional logistic- sine coupling map (2D- LSCM). This is to satisfy the statistical features and reduce time-consumption, and benefit from a mixing step of the second of advanced encryption standard (AES) candidates (serpent block cipher) and modified it to achieve in addition of confusion and diffusion processes. The experimental results showed that our proposed method had the ability to resist against statistical attacks and differential attacks. It also had a uniform histogram, a large key space, complex and faster, closer Shannon entropy to 8, and low correlation values between two adjacent pixels compared with other methods.
Volume: 11
Issue: 4
Page: 3070-3083
Publish at: 2021-08-01

Design and implementation of a broad-band high gain low noise amplifier for 3G/4G applications

10.11591/ijeecs.v23.i2.pp725-732
Ahmed M. Abdelmonem , Ahmed S. I. Amar , Amir Almslmany , Ibrahim L. Abdalla , Fathi A. Farag
The main aim of the paper is designing and implementing a broadband low-noise-amplifier (LNA) based on compensated matching network techniquein order to get high stable gain, low noise figure, low cost and smaller sizefor 3G/4G communication system applications at 2 GHz with bandwidth 600MHz. The Advanced Design System simulates the proposed circuit (ADS).The implementation was done with a class A bias circuit and a low noise transistor BFU 730F with a lower Noise Figure (NFmin) 0.62 dB. Collectorcurrent is measured to be 5.8mA and base current is 19.1μA with a supply voltage of 2.25V. The new design proposed a (NFmin) of 0.62 dB with a 17.8dB high stable amplifier gain. The microstrip lines (MSL) and compensated matching network techniques were used to improve the LNA’s stability and achieve a good result. The LNA board is implemented and assembled on the FR4 botton layer material. The results are virtually non existence equivalent between the simulated and the measured results.
Volume: 23
Issue: 2
Page: 725-732
Publish at: 2021-08-01

Characterizing user behavior in online social networks: Analysis of the regular use of Facebook

10.11591/ijece.v11i4.pp3329-3337
Jaafar Idrais , Yassine El Moudene , Abderrahim Sabour
The analysis of user behaviour in online social networks (OSNs) is one of the important research interests related to human-computer interactions. OSNs gives a large space to share news with no limits around the world and allows user to benefit from properties of this interactive and dynamic system. The study of user behaviour on a social and popular platform characterized by the use of new technologies requires to understand and the analysis of collective behaviour on Facebook. This paper aims to analyse the usage patterns in OSNs using the visible interactions of Facebook, by studying the time of activity and the evolution of human behaviour through a process of detection of visible and non-volatile interactions. In the first step, we perform a data collection process based on breadth first search algorithm (BFS) and semi-supervised crawler agent. In the second step, we build an interaction quantification process to measure users’ activities and analysis related time series. The study of the frequency of periodic use has shown that the communities monitored follow a weekly rhythm that decreases over time to reach a frequency of daily use, which reflects a stability of activities and a case of dependency of use.
Volume: 11
Issue: 4
Page: 3329-3337
Publish at: 2021-08-01

AlertNet: Deep convolutional-recurrent neural network model for driving alertness detection

10.11591/ijece.v11i4.pp3529-3538
P. C. Nissimagoudar , A. V. Nandi , Aakanksha Patil , Gireesha H. M.
Drowsy driving is one of the major problems which has led to many road accidents. Electroencephalography (EEG) is one of the most reliable sources to detect sleep on-set while driving as there is the direct involvement of biological signals. The present work focuses on detecting driver’s alertness using the deep neural network architecture, which is built using ResNets and encoder-decoder based sequence to sequence models with attention decoder. The ResNets with the skip connections allow training the network deeper with a reduced loss function and training error. The model is built to reduce the complex computations required for feature extraction. The ResNets also help in retaining the features from the previous layer and do not require different filters for frequency and time-invariant features. The output of ResNets, the features are input to encoder-decoder based sequence to sequence models, built using Bi-directional long-short memories. Sequence to Sequence model learns the complex features of the signal and analyze the output of past and future states simultaneously for classification of drowsy/sleepstage-1 and alert stages. Also, to overcome the unequal distribution (class-imbalance) data problem present in the datasets, the proposed loss functions help in achieving the identical error for both majority and minority classes during the raining of the network for each sleep stage. The model provides an overall-accuracy of 87.92% and 87.05%, a macro-F1-core of 78.06%, and 79.66% and Cohen's-kappa score of 0.78 and 0.79 for the Sleep-EDF 2013 and 2018 data sets respectively.
Volume: 11
Issue: 4
Page: 3529-3538
Publish at: 2021-08-01

Augmented binary multi-labeled CNN for practical facial attribute classification

10.11591/ijeecs.v23.i2.pp973-979
Mohammed Berrahal , Mostafa Azizi
Both human face recognition and generation by machines are currently an active area of computer vision, drawing curiosity of researchers, capable of performing amazing image analysis, and producing applications in multiple domains. In this paper, we propose a new approach for face attributes classification (FAC) taking advantage from both binary classification and data augmentation. With binary classification we can reach high prediction scores, while augmented data prevent overfitting and overcome the lack of data for sketched photos. Our approach, named Augmented binary multilabel CNN (ABM-CNN), consists of three steps: i) splitting data; ii) transformed-it to sketch (simplification process); iii) train separately each attribute with two convolutional neural networks; the whole process includes two networks: the first (resp. the second) one is to predict attributes on real images (resp. sketches) as inputs. Through experimentation, we figure out that some attributes give high prediction rates with sketches rather than with real images. On the other hand, we build a new face dataset, more consistent and complete, by generating images using Style-GAN model, to which we apply our method for extracting face attributes. As results, our proposal demonstrates more performances compared to those of related works.
Volume: 23
Issue: 2
Page: 973-979
Publish at: 2021-08-01
Show 942 of 1996

Discover Our Library

Embark on a journey through our expansive collection of articles and let curiosity lead your path to innovation.

Explore Now
Library 3D Ilustration