cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 23 Documents
Search results for , issue "Vol 11, No 2: June 2013" : 23 Documents clear
Attack and Vulnerability Penetration Testing: FreeBSD Deris Stiawan; Mohd. Yazid Idris; Abdul Hanan Abdullah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.942

Abstract

 Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
Low Complexity Selective Adaptive Multicarrier DS-CDMA Receiver Ahmed El-Sayed El-Mahdy; Maged Ahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.933

Abstract

In this paper, selective adaptive (SA) receiver for Multicarrier Direct Sequence Code Division Multiple Access (MC DS-CDMA) system is presented. This receiver has high performance and at the same time reduces the multiple access interference (MAI) of the MC DS-CDMA) system with low computational complexity. The performance of SA receiver is measured in terms of the bit error rate (BER). An upper bound expression of the BER for the SA receiver under Rayleigh fading channel condition is derived and validated by computer simulations. Moreover, the implementation complexities of the SA receiver is compared with the Adaptive Parallel Interference Cancellation (APIC) receiver. 
Fault-tolerant and QoS based Network Layer for Security Management Kais Mekki; Ahmed Zouinkhi; Mohamed Naceur Abdelkrim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.938

Abstract

Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.
RS-485 Bus Design of a Missile Simulation Training System Xinjie Ji Xinjie Ji; GuozhouWang GuozhouWang; FangLiu FangLiu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.928

Abstract

In a missile simulation training system with one-master and multi-slaves distributed system structure, a universal controller is necessary due to the system composed with several controllers. In this research, the designed controllers communicate with each other and upper control computer through RS-485 field bus. RS-485 bus including interface circuits, transmission protocol, Cyclic Redundancy Check (CRC) method and upper control test software is designed and proposed. The universal controller adopting the designed RS-485 interface circuits is connected through twisted-pair and makes the simulation system, then the controller is tested in line. The results show that the RS-485 bus communicates effectively using the protocol and CRC method, data transmission rates reaches 115.2 kbps, and has a good stability.
A Bidirectional Generalized Synchronization Theorem -Based Chaotic Pseudorandom Number Generator Han Shuangshuang; Min Lequan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.943

Abstract

In order to design good pseudorandom number generator, using a bidirectional generalized synchronization theorem for discrete chaos system, this paper introduces a new 5-dimensional bidirectional generalized chaos synchronization system (BGCSDS), whose prototype is a novel chaotic system. Numerical simulation showed that two pair variables of the BGCSDS achieve generalized chaos synchronization via a transform H. A chaos-based pseudorandom number generator (CPNG) was designed by the new BGCSDS. Using the FIPS-140-2 tests issued by the National Institute of Standard and Technology (NIST) verified the randomness of the 1000 binary number sequences generated via the CPNG and the RC4 algorithm respectively. The results showed all the tested sequences passed the FIPS-140-2 tests. The confidence interval analysis showed the statistical properties of the randomness of the sequences generated via the CPNG and the RC4 algorithm do not have significant differences. So, the CPNG is suitable to be used in the information security filed.
Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier Anam Tariq; M. Usman Akram
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.934

Abstract

Automated lung cancer detection using computer aided diagnosis (CAD) is an important area in clinical applications. As the manual nodule detection is very time consuming and costly so computerized systems can be helpful for this purpose. In this paper, we propose a computerized system for lung nodule detection in CT scan images. The automated system consists of two stages i.e. lung segmentation and enhancement, feature extraction and classification. The segmentation process will result in separating lung tissue from rest of the image, and only the lung tissues under examination are considered as candidate regions for detecting malignant nodules in lung portion. A feature vector for possible abnormal regions is calculated and regions are classified using neuro fuzzy classifier. It is a fully automatic system that does not require any manual intervention and experimental results show the validity of our system.
A New Hybrid Power Configuration In HEV and Its Driving BLDC Development Yanliang Xu Yanliang Xu; Changfeng Li Changfeng Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.918

Abstract

Hybrid electric vehicle (HEV) that has the advantages of high performance, high fuel efficiency, low emission, and long operating range is focused on nowadays. A new hybrid power configuration used in HEV is presented with different control strategies and HEV performances when equipping different weight of fuel power and battery one. In order to realize the new hybrid power configuration especially in the refitted HEV, fractional-slot concentrated-winding BLDC with higher rated spinning speed is given and the prototyped one is developed and fabricated which satisfies successfully the requirements of high performance and demission restriction for the refitted HEV.
Interference Potential of FSS and BWA on the Extended C-Band Lydia Sari; V. Windha Mahyastuty
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.939

Abstract

The Indonesian government has allocated the 3.3-3.4 GHz band, which is adjacent to the extended C-band 3.4-3.7 GHz, for Broadband Wireless Access (BWA) services. The country has been using the extended C-band for Fixed Satellite Service (FSS). This research shows the interference potential between the two systems if an adjacent band is allocated for them. Using a clutter loss of 10 dB and site shielding of 40 dB, a BWA network consisting of 57 base-stations will potentially intefere an FSS with probability 56.16% if the protection distance used is 1.55 km. The interference potential will decrease to 0% if the protection distance is increased to 3 km. With a BWA network consisting of 20 base-stations, the interference probability is 10.72% and 0% for a protection distance of 1.55 km and 2 km, respectively.  With this interference potential it is urgent that Indonesia enforces interference mitigation techniques to protect FSS from disruptive interference.
Modeling And Control Of Excitation And Governor Based On Particle Swarm Optimization For Micro Hydro Power Plant Muhamad Haddin; Soebagio Soebagio; Adi Soeprijanto; Mauridhi Hery Purnomo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.929

Abstract

This paper presents the modeling and control of the excitation system via the automatic voltage regulator (AVR) and governor system through the automatic generation control (AGC) or frequency load control (FLC) to improve stability on a micro hydro power plant (MHPP). Three main parts of the generation system are synchronous generator, AVR-excitation, AGC modelled linearly. Generator is modelled by a single machine connected to infinite bus (SMIB) which is equipped by AVR and excitation linear model. Excitation control system made by optimizing the gain of the AVR (KA) and the governor with the gain of the AGC (Ki). Optimization is done using the method improved particle swarm optimization (IPSO). The main purpose of setting the gain of the AVR-AGC is to stabilize the oscillation frequency of the MHPP which is connected to an infinite bus. Simulations are conducted by inputting step function with 5% load fluctuations as a representation of dynamic load. The simulation results show that the proposed method effectively raises the level  of electromechanical damping oscillations the SMIB by generating the comprehensive damping index (CDI) is minimum. 
Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks Yong Chen; Wei-zhong Xiao; Huan-lin Liu; Long-zhao Sun
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.909

Abstract

        Locating content in unstructured peer-to-peer networks is a challenging problem. This paper presents a novel semantic small world resource search mechanism to address the problem. By using vector space model to compute the semantic relevance and applying small world properties such as low average hop distance and high clustering coefficient to construct a cluster overlay. In semantic small world system, the search mechanism is divided into two parts, searching at cluster and outside cluster through inner link and short link, so that it can achieve the incremental research. It significantly reduces the average path length and query cost. Meanwhile, the simulation results show that semantic small world scheme outperforms K-random walks and flooding scheme than higher query hit rate and lower query latency.

Page 2 of 3 | Total Record : 23


Filter by Year

2013 2013


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue