cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Journal of Telematics and Informatics
ISSN : -     EISSN : -     DOI : -
Journal of Telematics and Informatics (e-ISSN: 2303-3703, p-ISSN: 2303-3711) is an interdisciplinary journal of original research and writing in the wide areas of telematics and informatics. The journal encompasses a variety of topics, including but not limited to: The technology of sending, receiving and storing information via telecommunication devices in conjunction with affecting control on remote objects; The integrated use of telecommunications and informatics; Global positioning system technology integrated with computers and mobile communications technology; The use of telematic systems within road vehicles, in which case the term vehicle telematics may be used; The structure, algorithms, behavior, and interactions of natural and artificial systems that store, process, access and communicate information; Develops its own conceptual and theoretical foundations and utilizes foundations developed in other fields; and The social, economic, political and cultural impacts and challenges of information technologies (advertising and the internet, alternative community networks, e-commerce, e-finance, e–governance, globalization and security, green computing, ICT for sustainable development, ICT in healthcare and education, management and policymaking, mobile and wireless communications, peer-to-peer learning, regulation of digital technologies, social networking, special user groups, the 2.0 paradigm, the WWW, etc). The journal is a collaborative venture between Universitas Islam Sultan Agung (UNISSULA), Universitas Ahmad Dahlan (UAD) and Institute of Advanced Engineering and Science (IAES) Indonesia Section.
Arjuna Subject : -
Articles 151 Documents
Introducing Adaptive filters Based on Shadow Concept for Speech Processing M. Koteswara Rao; I.Santhi Prabha
Journal of Telematics and Informatics Vol 2, No 2: September 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.362 KB) | DOI: 10.12928/jti.v2i2.67-73

Abstract

This paper presents the new approach to introducing adaptive Filter with LMS Algorithm based on Shadow concept. Which is useful for the cancellation of the noise component overlap with Speech signal in the same frequency range, but fixed LMS algorithm produces minimum convergence rate and fixed steady state error. So we presents design, implementation and performance  of adaptive FIR filter, based on  Shadow concept, which produces minimum mean square error compare to fixed LMS, and we also obtains denoised Speech signal at output, and also we propose to calculate SNR values of  Adaptive Filter with LMS algorithm with and without Shadow concept.
Provision of Relevant Results on web search Based on Browsing History G. Rama Krishna; G. Harika Priya; V. Sravani; Y. Sai Chandu; G. Sai Srikanth
Journal of Telematics and Informatics Vol 2, No 2: September 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.308 KB) | DOI: 10.12928/jti.v2i2.74-80

Abstract

Different users submit a query to a web search engine with different needs. The general type of search engines follows the "one size fits all" model which is not flexible to individual users resulting in too many answers for the query.  In order to overcome this drawback, in this paper, we propose a framework for personalized web search which considers individual's interest introducing intelligence into the traditional web search and producing only relevant pages of user interest. This proposed method is simple and efficient which ensures quality suggestions as well as promises for effective and relevant information retrieval. The framework for personalized web search engine is based on user past browsing history. This context is then used to make the web search more personalized. The results are encouraging.
Segmentation of Blood Vessels and Optic disc in Retinal Images T. Ravi; V.Venkata Sai Aditya; B.M.S. Rani; Manjeera Boppana
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.027 KB) | DOI: 10.12928/jti.v3i1.1-6

Abstract

Understanding of picture substance is one of the targets in PC vision particularly in picture transforming. In this period it has gotten much familiarity with analysts. In picture elucidation the segment of the picture into article and foundation is a serious step. Division differentiates a picture into its segment locales or articles. Picture division t needs to portion the article from the foundation to peruse the picture legitimately and recognize the substance of the picture painstakingly. In this setting, edge identification is a principal apparatus for picture division. In this paper an endeavor is made to study the execution of most usually utilized edge location strategies for picture division.
Comparison of Pipelined Floating Point Unit with Unpipelined Floating Point Unit M. Venkateswarao; J. Triveni; K. Bhargavee Latha; K. Naga Deepika; K.R. Pavan
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.027 KB) | DOI: 10.12928/jti.v3i1.7-14

Abstract

Floating-point numbers are broadly received in numerous applications due their element representation abilities. Floating-point representation has the capacity hold its determination and exactness contrasted with altered point representations. Any Digital Signal Processing (DSP) calculations utilization floating-point math, which obliges a huge number of figuring’s every second to be performed. For such stringent necessities, outline of quick, exact and effective circuits is the objective of each VLSI creator. This paper displays a correlation of pipelined floating-point snake dissention with IEEE 754 organization with an unpipelined viper additionally protests with IEEE 754 arrangement. It depicts the IEEE floating-point standard 754. A pipelined floating point unit in light of IEEE 754 configuration is produced and the outline is contrasted and that of an unpipelined floating point unit and an investigation is defeated speed, range, and force contemplations. It builds the rate as well as is vitality productive. Every one of these changes is at the expense of slight increment in the chip region. The basic methodology and approach used for VHDL (Very Large Scale Integration Hardware Descriptive Language) implementation of the floating-point unit are also described. Detailed synthesis report operated upon Xilinx ISE 11 software and Modelsim is given.
Encryption Based Access Control Model In Cloud: A Survey Rachana Chavda; Rajanikanth Aluvalu
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (63.051 KB) | DOI: 10.12928/jti.v3i1.15-21

Abstract

Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use thedata. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security.
A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing Kamliya, Vanraj; Aluvalu, Rajnikanth
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jti.v3i1.22-27

Abstract

Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security because of now a days companies going to put more essential and huge amount of data on cloud. That’s why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption (ASBE) with a hierarchical structure of users. HASBE provides Flexibility, scalability and fine-grained access control with efficient user revocation but the hierarchical structure of the domain hierarchy is to complex and there is no sub-domain level user hierarchy which increases systemresponse time and decreases the system performance. So we are proposing HASBE scheme by creating a sub domain in to the user level Hierarchy that reduce the complexity of the hierarchy and also improve the system performance
Retail Web System Upgrading with Strategic Customer Using Threshold Policy M. Karuna Sree; K. Subrahmanyam
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (82.293 KB) | DOI: 10.12928/jti.v3i1.28-32

Abstract

This paper mainly deals with the problems that online retailers are facing by some group of strategic customers by upgrading web system and goods pricing. A monopolist price of a product for which stylized dynamic pricing model is considered at the beginning and the price change is done on the product after considering some set of constraints based on the product availability. Due to some network issues sometimes website may get problems at that time there may be a chance of transaction failure for customer during online purchasing. To predict this probability and doing purchasing opinion depending on the belief of Transaction Success Probability (TSP).Considering this there will be a threshold policy for purchasing by customers here it is going to consider it as first one: Customers buy products only if his valuation for products is above threshold (total reduced profit) otherwise they will not take it into consideration. The threshold rises as TSP degrades, or customers turn out to be risk averse. Here we obtain the best cost of each phase and make out the best strategy for online shopping site customizing by threshold and upgrade the system when present TSP is less than threshold. The online trader turns to increase the price if he disregards strategic customer behavior. The value of disregarding strategic customer deeds is significant. The profit loss cost of disregarding strategic customer deeds grows as customer transaction cost rises.
Ortho Linear Feedback Shift Register Cryptographic System T Narendra Babu; D L Pravallika Kaja; B Mounika; K Tejaswi; Y Harish
Journal of Telematics and Informatics Vol 3, No 2: September 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (131.876 KB) | DOI: 10.12928/jti.v3i2.

Abstract

In this article, an encryption algorithm with an error detection technique is presented for highly secured reliable data transmission over unreliable communication channels. In this algorithm, an input data is mapped into orthogonal code first. After that the code is encrypted with the help of Linear Feedback Shift Register (LFSR). The technique has been successfully verified and synthesized using Xilinx by Spartan-3E FPGA. The results show that the error detection rate has been increased to 100% by proposed encryption scheme is effective and improves bandwidth efficiency.
Personalized Web Search Using Browsing History and Domain Knowledge Based on Enhanced User Profile Gajul Rohit
Journal of Telematics and Informatics Vol 3, No 2: September 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (300.871 KB) | DOI: 10.12928/jti.v3i2.

Abstract

Generic search engines are important for retrieving relevant information from web. However these engines follow the "one size fits all" model which is not adaptable to individual users. Personalized web search is an important field for tuning the traditional IR system for focused information retrieval. This paper is an attempt to improve personalized web search. User's Profile provides an important input for performing personalized web search. This paper proposes a framework for constructing an Enhanced User Profile by using user's browsing history and enriching it using domain knowledge. This Enhanced User Profile can be used for improving the performance of personalized web search. In this paper we have used the Enhanced User Profile specifically for suggesting relevant pages to the user. The experimental results show that the suggestions provided to the user using Enhanced User Profile ae better than those obtained by using a User Profile.
Deployment of Mobile Ad-hoc Network Ticket Based QoS Routing Protocol for Healthcare Mohammed Ali Hussain; Mohammad Mastan; U Ravi Babu
Journal of Telematics and Informatics Vol 3, No 2: September 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (74.115 KB) | DOI: 10.12928/jti.v3i2.

Abstract

A Mobile Adhoc Network comprises of set of portable hosts which are equipped for corresponding with one another with no aid of base stations. MANET are quick evolving topology, broad exploration is going ahead to outline directing conventions for MANETs. The Ad hoc On-Demand Distance Vector convention concerns with most limited way steering and changing the courses powerfully in work space. Quality of Service (QoS) prerequisite issues are less tended to in MANETs and the motivation behind this paper is to address QoS directing in a MANET domain and concentrate principally on ticket based QoS steering convention to figure out course fulfilling certain data transmission and delay obliges. The essential thought is to utilize tickets to keep the quantity of route searching packets to abstain from flooding and to make courses progressively to accomplish proficient Quality of Service.

Page 3 of 16 | Total Record : 151