TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
23 Documents
Search results for
, issue
"Vol 11, No 2: June 2013"
:
23 Documents
clear
Attack and Vulnerability Penetration Testing: FreeBSD
Deris Stiawan;
Mohd. Yazid Idris;
Abdul Hanan Abdullah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.942
Computer system security has become a major concern over the past few years. Attacks, threats or intrusions, against computer system and network have become commonplace events. However, there are some system devices and other tools that are available to overcome the threat of these attacks. Currently, cyber attack is a major research and inevitable. This paper presents some steps of penetration in FreeBSD operating system, some tools and new steps to attack used in this experiment, probes for reconnaissance, guessing password via brute force, gaining privilege access and flooding victim machine to decrease availability. All these attacks were executed and infiltrate within the environment of Intrusion Threat Detection Universiti Teknologi Malaysia (ITD UTM) data set. This work is expected to be a reference for practitioners to prepare their systems from Internet attacks.
Low Complexity Selective Adaptive Multicarrier DS-CDMA Receiver
Ahmed El-Sayed El-Mahdy;
Maged Ahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.933
In this paper, selective adaptive (SA) receiver for Multicarrier Direct Sequence Code Division Multiple Access (MC DS-CDMA) system is presented. This receiver has high performance and at the same time reduces the multiple access interference (MAI) of the MC DS-CDMA) system with low computational complexity. The performance of SA receiver is measured in terms of the bit error rate (BER). An upper bound expression of the BER for the SA receiver under Rayleigh fading channel condition is derived and validated by computer simulations. Moreover, the implementation complexities of the SA receiver is compared with the Adaptive Parallel Interference Cancellation (APIC) receiver.
Fault-tolerant and QoS based Network Layer for Security Management
Kais Mekki;
Ahmed Zouinkhi;
Mohamed Naceur Abdelkrim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.938
Wireless sensor networks have profound effects on many application fields like security management which need an immediate, fast and energy efficient route. In this paper, we define a fault-tolerant and QoS based network layer for security management of chemical products warehouse which can be classified as real-time and mission critical application. This application generate routine data packets and alert packets caused by unusual events which need a high reliability, short end to end delay and low packet loss rate constraints. After each node compute his hop count and build his neighbors table in the initialization phase, packets can be routed to the sink. We use FELGossiping protocol for routine data packets and node-disjoint multipath routing protocol for alert packets. Furthermore, we utilize the information gathering phase of FELGossiping to update the neighbors table and detect the failed nodes, and we adapt the network topology changes by rerun the initialization phase when chemical units were added or removed from the warehouse. Analysis shows that the network layer is energy efficient and can meet the QoS constraints of unusual events packets.
RS-485 Bus Design of a Missile Simulation Training System
Xinjie Ji Xinjie Ji;
GuozhouWang GuozhouWang;
FangLiu FangLiu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.928
In a missile simulation training system with one-master and multi-slaves distributed system structure, a universal controller is necessary due to the system composed with several controllers. In this research, the designed controllers communicate with each other and upper control computer through RS-485 field bus. RS-485 bus including interface circuits, transmission protocol, Cyclic Redundancy Check (CRC) method and upper control test software is designed and proposed. The universal controller adopting the designed RS-485 interface circuits is connected through twisted-pair and makes the simulation system, then the controller is tested in line. The results show that the RS-485 bus communicates effectively using the protocol and CRC method, data transmission rates reaches 115.2 kbps, and has a good stability.
A Bidirectional Generalized Synchronization Theorem -Based Chaotic Pseudorandom Number Generator
Han Shuangshuang;
Min Lequan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.943
In order to design good pseudorandom number generator, using a bidirectional generalized synchronization theorem for discrete chaos system, this paper introduces a new 5-dimensional bidirectional generalized chaos synchronization system (BGCSDS), whose prototype is a novel chaotic system. Numerical simulation showed that two pair variables of the BGCSDS achieve generalized chaos synchronization via a transform H. A chaos-based pseudorandom number generator (CPNG) was designed by the new BGCSDS. Using the FIPS-140-2 tests issued by the National Institute of Standard and Technology (NIST) verified the randomness of the 1000 binary number sequences generated via the CPNG and the RC4 algorithm respectively. The results showed all the tested sequences passed the FIPS-140-2 tests. The confidence interval analysis showed the statistical properties of the randomness of the sequences generated via the CPNG and the RC4 algorithm do not have significant differences. So, the CPNG is suitable to be used in the information security filed.
Lung Nodule Detection in CT Images using Neuro Fuzzy Classifier
Anam Tariq;
M. Usman Akram
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.934
Automated lung cancer detection using computer aided diagnosis (CAD) is an important area in clinical applications. As the manual nodule detection is very time consuming and costly so computerized systems can be helpful for this purpose. In this paper, we propose a computerized system for lung nodule detection in CT scan images. The automated system consists of two stages i.e. lung segmentation and enhancement, feature extraction and classification. The segmentation process will result in separating lung tissue from rest of the image, and only the lung tissues under examination are considered as candidate regions for detecting malignant nodules in lung portion. A feature vector for possible abnormal regions is calculated and regions are classified using neuro fuzzy classifier. It is a fully automatic system that does not require any manual intervention and experimental results show the validity of our system.
A New Hybrid Power Configuration In HEV and Its Driving BLDC Development
Yanliang Xu Yanliang Xu;
Changfeng Li Changfeng Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.918
Hybrid electric vehicle (HEV) that has the advantages of high performance, high fuel efficiency, low emission, and long operating range is focused on nowadays. A new hybrid power configuration used in HEV is presented with different control strategies and HEV performances when equipping different weight of fuel power and battery one. In order to realize the new hybrid power configuration especially in the refitted HEV, fractional-slot concentrated-winding BLDC with higher rated spinning speed is given and the prototyped one is developed and fabricated which satisfies successfully the requirements of high performance and demission restriction for the refitted HEV.
Interference Potential of FSS and BWA on the Extended C-Band
Lydia Sari;
V. Windha Mahyastuty
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.939
The Indonesian government has allocated the 3.3-3.4 GHz band, which is adjacent to the extended C-band 3.4-3.7 GHz, for Broadband Wireless Access (BWA) services. The country has been using the extended C-band for Fixed Satellite Service (FSS). This research shows the interference potential between the two systems if an adjacent band is allocated for them. Using a clutter loss of 10 dB and site shielding of 40 dB, a BWA network consisting of 57 base-stations will potentially intefere an FSS with probability 56.16% if the protection distance used is 1.55 km. The interference potential will decrease to 0% if the protection distance is increased to 3 km. With a BWA network consisting of 20 base-stations, the interference probability is 10.72% and 0% for a protection distance of 1.55 km and 2 km, respectively. With this interference potential it is urgent that Indonesia enforces interference mitigation techniques to protect FSS from disruptive interference.
Modeling And Control Of Excitation And Governor Based On Particle Swarm Optimization For Micro Hydro Power Plant
Muhamad Haddin;
Soebagio Soebagio;
Adi Soeprijanto;
Mauridhi Hery Purnomo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.929
This paper presents the modeling and control of the excitation system via the automatic voltage regulator (AVR) and governor system through the automatic generation control (AGC) or frequency load control (FLC) to improve stability on a micro hydro power plant (MHPP). Three main parts of the generation system are synchronous generator, AVR-excitation, AGC modelled linearly. Generator is modelled by a single machine connected to infinite bus (SMIB) which is equipped by AVR and excitation linear model. Excitation control system made by optimizing the gain of the AVR (KA) and the governor with the gain of the AGC (Ki). Optimization is done using the method improved particle swarm optimization (IPSO). The main purpose of setting the gain of the AVR-AGC is to stabilize the oscillation frequency of the MHPP which is connected to an infinite bus. Simulations are conducted by inputting step function with 5% load fluctuations as a representation of dynamic load. The simulation results show that the proposed method effectively raises the level of electromechanical damping oscillations the SMIB by generating the comprehensive damping index (CDI) is minimum.
Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks
Yong Chen;
Wei-zhong Xiao;
Huan-lin Liu;
Long-zhao Sun
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.909
Locating content in unstructured peer-to-peer networks is a challenging problem. This paper presents a novel semantic small world resource search mechanism to address the problem. By using vector space model to compute the semantic relevance and applying small world properties such as low average hop distance and high clustering coefficient to construct a cluster overlay. In semantic small world system, the search mechanism is divided into two parts, searching at cluster and outside cluster through inner link and short link, so that it can achieve the incremental research. It significantly reduces the average path length and query cost. Meanwhile, the simulation results show that semantic small world scheme outperforms K-random walks and flooding scheme than higher query hit rate and lower query latency.