cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Journal of Telematics and Informatics
ISSN : -     EISSN : -     DOI : -
Journal of Telematics and Informatics (e-ISSN: 2303-3703, p-ISSN: 2303-3711) is an interdisciplinary journal of original research and writing in the wide areas of telematics and informatics. The journal encompasses a variety of topics, including but not limited to: The technology of sending, receiving and storing information via telecommunication devices in conjunction with affecting control on remote objects; The integrated use of telecommunications and informatics; Global positioning system technology integrated with computers and mobile communications technology; The use of telematic systems within road vehicles, in which case the term vehicle telematics may be used; The structure, algorithms, behavior, and interactions of natural and artificial systems that store, process, access and communicate information; Develops its own conceptual and theoretical foundations and utilizes foundations developed in other fields; and The social, economic, political and cultural impacts and challenges of information technologies (advertising and the internet, alternative community networks, e-commerce, e-finance, e–governance, globalization and security, green computing, ICT for sustainable development, ICT in healthcare and education, management and policymaking, mobile and wireless communications, peer-to-peer learning, regulation of digital technologies, social networking, special user groups, the 2.0 paradigm, the WWW, etc). The journal is a collaborative venture between Universitas Islam Sultan Agung (UNISSULA), Universitas Ahmad Dahlan (UAD) and Institute of Advanced Engineering and Science (IAES) Indonesia Section.
Arjuna Subject : -
Articles 141 Documents
Facial Expression Recognition Using Euclidean Distance Method Anagha Sharad Dhavalikar; Ramesh K. Kulkarni
Journal of Telematics and Informatics Vol 2, No 1: March 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1294.821 KB) | DOI: 10.12928/jti.v2i1.1-6

Abstract

Facial expression recognition is found to be useful for emotion science, clinical psychology and pain assessment. In the proposed method, the face detection algorithm involves lighting compensation for getting uniformity on face and morphological operations for retaining the required face portion. After retaining the face portion in the image, the facial features like eyes, nose, and mouth are extracted using AAM (Active Appearance Model) method. For automatic facial expression recognition, simple Euclidean Distance method is used. In this method, the Euclidean distance between the feature points of the training images and that of the query image is compared. Based on minimum Euclidean distance, output image expression is decided.
Biometric Personal Identification based on Iris Patterns Yogesh Sharad Pandit; Chandan Singh D Rawat
Journal of Telematics and Informatics Vol 2, No 1: March 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (418.427 KB) | DOI: 10.12928/jti.v2i1.7-14

Abstract

This paper discusses an analysis of human iris patterns for recognition of biometric system which consists of a segmentation system that is based on the Hough transform, and is able to localize the circular iris and pupil region, occluding eyelids and eyelashes, and reflections. The extracted iris region is then normalized into a rectangular block with constant dimensions to account for imaging inconsistencies. To encode the unique pattern of the iris into a bit-wise biometric template, 1D Log-Gabor filter is used.Finally to match two iris templates hamming distance is used as matching metric. The system performance is analyzed on 312 iris images taken from standard CASIA Iris Interval database version 4. To establish the verification accuracy of iris representation and matching approach, each iris image in the database is matched with all the other iris images in the database and genuine and imposter distribution is found .The performance of the system is implemented by evaluating the Decidability Index (DI), False match rate (FMR), False Non-match rate (FNMR), Genuine Accept Rate (GAR) and Equal error rate (EER).
A Study on Android Application Development Rajkumar A. Soni
Journal of Telematics and Informatics Vol 1, No 2: September 2013
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (153.764 KB) | DOI: 10.12928/jti.v1i2.89-96

Abstract

As and when the world moves towards the hand-held devices, there should be an innovation as well as awareness of such kind of application development used for the hand-held device. As time elapses the world started moves on the fingers using such kind of developed applications. In this paper we discuss the most fundamental attributes and crucial steps followed to create a robust application using Android OS. This kind of contribution will help a lot to the initiators who want to switch-over from other technologies to the mobile application development.
Study on the License Mode of Value-Added Exploitation of Public Sector information Haiying Hua; Shuren Zhu
Journal of Telematics and Informatics Vol 1, No 2: September 2013
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (76.533 KB) | DOI: 10.12928/jti.v1i2.97-100

Abstract

How to license PSI (public sector information) to those commercial reusers has become so urgent and important issue. The paper discussed the different license mode of value-added exploitation of Public Sector Information in UK and United States. Based on the investigation and comparison, the paper proposed some valuable suggestions on the construction of license mode of value-added exploitation of PSI in China:  A clear attribution  of property of public sector information and  a clear range of Public sector information that can be accessed and be commercial reused and exploited; A diversification license based on clear classification of Public Sector Information; To  establish unified management institute and supervisory body and so on.  
Automated Home Appliances Control using Embedded Web Server Abdul Ahad; Y. Mahesh; G. Sukanya; N. Harika; A. Uma Sri
Journal of Telematics and Informatics Vol 2, No 1: March 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (423.733 KB) | DOI: 10.12928/jti.v2i1.15-21

Abstract

In modern construction in industrialized nations, most homes have been wired for TV, lights and fans etc...  Many household tasks were automated by the development of specialized automated appliances. In this project we are going to create the embedded web server so that we can control the electrical devices through online by using either computer or by using smart phone. The purpose of this project is to design a control system that able to control a system device remotely from distance and monitoring condition of the system in real-time as well. This project shows how to set up an Arduino with Ethernet shield as a web server. The web servers in this Project are used to serve up web pages that can be accessed from a web browser and allows our hardware to be controlled from web browser. Starting from basic, our example for this project is simple. We want to access our device by switching ON-OFF LED and monitor analog input data acquisition from web server, which are the computer and Arduino connected to the same network.
Information Security Behavioral Model: Towards Employees’ Knowledge and Attitude Saurabh Mishra; Snehlata Snehlata; Anjali Srivastava
Journal of Telematics and Informatics Vol 2, No 1: March 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (101.915 KB) | DOI: 10.12928/jti.v2i1.22-28

Abstract

Information Security has become a significant concern for today’s organizations. The internal security threats acts as the most curtail type of security threat within an organization. These internal security threats are a result of poor conduct of security behavior by the employees within an organization. If not deal properly, it may hamper the auditing of organization. Auditing plays an important role in the business environment. Before conducting auditing it is essential to examine the behavioral aspect of the employees. The objective of this paper is to take out this internal threat that acts as a security slack, out of an organization by using a well-structured approach to develop a security behavior model. To validate the proposed model a survey method is used. The survey method measures the knowledge and attitude of an individual employee towards information security to analyze the behavioral security aspect of the employee’s. Statistical Analysis of the result of survey indicates that the employees’ knowledge and his attitude towards information security derive his behavior towards achieving ultimate organizational goal and thus validates the proposed security model.
Efficient Hybrid Genetic Based Multi Dimensional Host Load Aware Algorithm for Scheduling and Optimization of Virtual Machines T. Thiruvenkadam; V. Karthikeyani
Journal of Telematics and Informatics Vol 2, No 1: March 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (686.704 KB) | DOI: 10.12928/jti.v2i1.29-42

Abstract

Mapping the virtual machines to the physical machines cluster is called the VM placement. Placing the VM in the appropriate host is necessary for ensuring the effective resource utilization and minimizing the datacenter cost as well as power. Here we present an efficient hybrid genetic based host load aware algorithm for scheduling and optimization of virtual machines in a cluster of Physical hosts. We developed the algorithm based on two different methods, first initial VM packing is done by checking the load of the physical host and the user constraints of the VMs. Second optimization of placed VMs is done by using a hybrid genetic algorithm based on fitness function. Our simulation results show that the proposed algorithm outperforms existing methods and enhances the rate of resource utilization through accommodating more number of virtual machines in a physical host
Application of MFFC and Edge Detection for Remote Driven Vehicles through Matlab T Ravi; K Pradeep Reddy; K Eepsita Saranya
Journal of Telematics and Informatics Vol 2, No 2: September 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (681.892 KB) | DOI: 10.12928/jti.v2i2.43-49

Abstract

Speech recognition is a rapidly emerging technology in Human Computer Interaction HCI. It has many applications as we use it from search engines to the device control it serves many areas we interact every day from dawn to dusk. Along with the uses we have many limitations in speech processing such as Language barrier, Accent and Noise, so to implement the speech processing we have many challenges. To enable the advantages of this speech processing most of the leading software companies like Apple, Microsoft and Google are continuously evolving their speech enabled applications. The speech processing eases the physically challenged people’s interaction with the devices and makes them productive. The Idea of the automatically driven cars is introduced by Google and Audi, but they are not acceptable in most of the cases because of lacking trust in current technology. Thus we here worked on the remote driven vehicle in a more secured method using the Mel Frequency cepstral Coefficient. The secure driving of the vehicle can be ensured by the remote driver. This technique is very rapid and more reliable for the speech detection thus the remote driver can use the MFCC and the video from the vehicle needed to be broadcasted to the remote driver that can be done an IP camera running on a data network. And the instructions can from the remote driver can be sent to the vehicle by an app created with python that connected to a micro controller.  To minimize the limitations in the remote drive the vehicle must be enabled with automatic braking when obstacle approaches which can be done by the Ultrasonic sensors that do the distance estimation. The remote drivers usually have a very limited view of road they drive and they must get the precise edges of the road this can be achieved by processing the stream of images to calculate the edge in Matlab.
Significance of Weighted-Type Fractional Fourier Transform in FIR Filters P. Bobitha; P.V. Muralidhar
Journal of Telematics and Informatics Vol 2, No 2: September 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (180.878 KB) | DOI: 10.12928/jti.v2i2.50-56

Abstract

The desired frequency response of a filter is periodic in frequency and can be expanded in Fourier series. One possible way of obtaining FIR filter is to truncate the infinite Fourier series. But abrupt truncation of the Fourier series results in oscillation in the pass band and stop band. These oscillations are due to slow convergence of the Fourier series by the Gibb’s phenomenon. To reduce these oscillations the Fourier coefficients of the filter are modified by multiplying the infinite impulse response with a finite weighing sequence called a window. The Fourier transform (FT) of a window consists of a central lobe and side lobes. The central lobe contains most of the energy of the window. To get an FIR filter, the desired impulse response and window function are multiplied, which results to give finite length non-causal sequence. Since Fractional Fourier Transform (FrFT) is generalization of FT. Here an attempt is to implement filters using window by using  Weighted Type Fractional Fourier Transform (WFrFt),  differentiator and integrator using weighted FrFt is also present.
Facilitating Image and Document Retrieval Using Image Content and Querying Keyword M.R. Narasinga Rao; J. Srinija; P.Krishna Chaitanya; Y. Chanukya; T. Sabhareesh
Journal of Telematics and Informatics Vol 2, No 2: September 2014
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1282.54 KB) | DOI: 10.12928/jti.v2i2.57-66

Abstract

Evolution of ubiquitous computing in the areas of personal computing technology has produced staggeringly large data It is difficult to search mainly the image data by understanding   users objective only by keywords and phrases and this leads to uncertain outcomes. For producing these outcomes effectively, this paper introduces a new approach to the problem of image learning to enable search engines to learn about visual content over time based on user feedback through one click activity and images from a pool recovered by text based query are re-ranked depending on both visual and text based query. Content Based Image Retrieval (CBIR) techniques are used for accessing semantically-relevant images from an image data source depending on automatically-derived image functions for features like Geometric moments, Global histogram, Color Moments, Local histogram. Documents can also be retrieved using the text based query by the user.

Page 2 of 15 | Total Record : 141