cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 46 Documents
Search results for , issue "Vol 12, No 4: December 2014" : 46 Documents clear
Application of Chaotic Particle Swarm Optimization in Wavelet Neural Network Cuijie Zhao; Guozhen Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.533

Abstract

Currently, the method of optimizing the wavelet neural network with particle swarm plays a certain role in improving the convergence speed and accuracy; however, it is not a good solution for problems of turning into local extrema and poor global search ability. To solve these problems, this paper, based on the particle swarm optimization, puts forward an improved method, which is introducing the chaos mechanism into the algorithm of chaotic particle swarm optimization. Through a series of comparative simulation experiments, it proves that applying this algorithm to optimize the wavelet neural network can successfully solve the problems of turning into local extrema, and improve the convergence speed of the network, in the meantime, reduce the output error and improve the search ability of the algorithm. In general, it helps a lot to improve the overall performance of the wavelet neural network.
Face Recognition Using Invariance with a Single Training Sample Qian Tian
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.810

Abstract

For the limits of memories and computing performance of current intelligent terminals, it is necessary to develop some strategies which can keep the balance of the accuracy and running time for face recognition. The purpose of the work in this paper is to find the invariant features of facial images and represent each subject with only one training sample for face recognition. We propose a two-layer hierarchical model, called invariance model, and its corresponding algorithms to keep the balance of accuracy, storage and running time. Especially, we take advantages of wavelet transformations and invariant moments to obtain the key features as well as reduce dimensions of feature data based on the cognitive rules of human brains. Furthermore, we improve usual pooling methods, e.g. max pooling and average pooling, and propose the weighted pooling method to reduce dimensions with no effect on accuracy, which let storage requirement and recognition time greatly decrease. The simulation results show that the proposed method does better than some typical and nearly-proposed algorithms in balancing the accuracy and running time.
Optimization Research of the OLAP Query Technology Based on P2P Chunfeng Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.436

Abstract

With the increasing data of the application system, the fast and efficient access to the information of support decision-making analysis has become more and more difficult and the original OLAP technology have also revealed many shortcomings. Using the method of P2P network technology and OLAP storage query and query method, the paper has constructed a distributed P2P-OLAP network model and put forward the storage and sharing scheme of multidimensional data, OLAP query scheme based on collaboration support. Finally, the paper has shown that the scheme can effectively improve the performance of decision analysis by the experiment.
Image Tamper Detection and Recovery by Intersecting Signatures Chun-Hung Chen; Yuan-Liang Tang; Wen-Shyong Hsieh; Min-Shiang Hwang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.1009

Abstract

In this paper, we propose an exact image authentication scheme that can, in the best case, detect image tampering with the accuracy of one pixel. This method is based on constructing blocks in the image in such a manner that they intersect with one another in different directions. Such a technique is very useful to identify whether an individual image pixel has been tampered with. Moreover, the tampered region can be well recovered with the embedded recover data.
Fortifying Big Data infrastructures to Face Security and Privacy Issues Tole Sutikno; Deris Stiawan; Imam Much Ibnu Subroto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.957

Abstract

The explosion of data available on the internet is very increasing in recent years. One of the most challenging issues is how to effectively manage such a large amount of data and identify new ways to analyze large amounts of data and unlock information. Organizations must find a way to manage their data in accordance with all relevant privacy regulations without making the data inaccessible and unusable. Cloud Security Alliance (CSA) has released that the top 10 challenges, which are as follows: 1) secure computations in distributed programming frameworks, 2) security best practices for non-relational data stores, 3) secure data storage and transactions logs, 4) end-point input validation/filtering, 5) real-time security monitoring, 6) scalable and composable privacy-preserving data mining and analytics, 7) cryptographically enforced data centric security, 8) granular access control, 9) granular audits, 10) data Provenance. The challenges themselves can be organized into four distinct aspects of the Big Data ecosystem.
Sparsity Properties of Compressive Video Sampling Generated by Coefficient Thresholding Ida Wahidah Hamzah; Tati Latifah R. Mengko; Andriyan B. Suksmono; Hendrawan Hendrawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.296

Abstract

We study the compressive sampling (CS) and its application in video encoding framework. The video input is firstly transformed into suitable domain in order to achieve sparser configuration of coefficients. Then, we apply coefficient thresholding to classify which frames to be sampled compressively or conventionally. For frames chosen to undergo compressive sampling, the coefficient vectors will be projected into smaller vectors using random measurement matrix. As CS requires two main conditions, i.e. sparsity and matrix incoherence, this research is emphasized on the enhancement of sparsity property of the input signal. It was empirically proven that the sparsity enhancement could be reached by applying motion compensation and thresholding to the non-significant coefficient count. At the decoder side, the reconstruction algorithm can employ basis pursuit or L1 minimization algorithm.
Wireless Sensor Based Hybrid Architecture for Vehicular Ad hoc Networks Kashif Naseer Qureshi; Abdul Hanan Abdullah; Raja Waseem Anwar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.537

Abstract

A vehicular Ad hoc network is an emerging and widely adopted technology because of their potentiality for innovative applications in transportation sector. Recently, the technology has been faced various challenges and rely on expensive architecture. The implementation of Wireless Sensor Network (WSN) in vehicular networks reduces the required investment and improves intelligent applications performance for driving safety and traffic efficiency. In this paper, we propose a wireless sensor based hybrid architecture for navigation systems for vehicular Ad hoc networks. The architecture is suitable for mountain range roads, where vehicles cannot communication properly. The propose architecture is used to exchange and perceive roadside information and helpful in navigation decision process and for alert messages.
Information Support Technology of Ship Survey Based on Case-based Reasoning Jiyin Cao; Shidong Fan; Wen Lu; Haiyun Liu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.367

Abstract

Recently, the significance of ship inspections hasbeen increasingly recognized because sea pollution andsafety problems are occurring more and more frequently. However, current ship inspections rely on the experience ofthe workers. Therefore, it is difficult to understand, and hence to improve, the state of ship inspections. The present problemsare that the ship inspection technical support level in China is not balanced, especially as to the current situation with low level, poor technologyin under-developed areas. In this paper, the case technology about the case-based reasoning to the ship inspection is proposed. The methods of normative inspection case representation are discussed.This is considered to be the basis of case-based reasoning. Then the tertiary case structure with the index is defined, in which the K-nearest neighbor method to calculate the similarity between caseswas used so that the ship’s inspection information can be searched effectively. In addition, animproved retrievalstrategy of the nearest neighbor method is introduced. Therefore, in the inspection site,the inspectors can acquire support information by the case bases, and then the new cases are calculated automatically. Further, a ship inspection case managementwereintroduced to improve the stability of the system. By carrying the case-based reasoning into an inspection, an inspector can generate fault information and inspection information simply and easily. Some examples of the organization and retrieval are shown at the end of the paper.
High Recognition Ratio Image Processing Algorithm of Micro Electrical Components in Optical Microscope Wu Jie; Zuren Feng; Lei Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.304

Abstract

In order to process small components of original image under the microscope, firstly, this paper adopts median filtering algorithm to enhance targets; and the targets are sharpened by using lateral inhibition algorithm, the edge of targets is outlined. In order to get reliable target region, adaptive threshold segmentation algorithm is used to extract need target region, and characteristics of target is used to distinguish multiple targets. Based on the chip resistor, one tiny component, in the captured image, we judge if the chip resistor is qualified by calculating the pixels area values. The experimental results show that, the image processing algorithm and qualified detection algorithm is reasonable, which provides the theoretical basis and implementation method of effective target extraction and further qualified test.
System Identification and LMI Based Robust PID Control of a Two-Link Flexible Manipulator M. Khairudin; Z. Mohamed; A.R. Husain
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.293

Abstract

This paper presents investigations into the development of a linear matrix inequalities (LMI) based robust PID control of a nonlinear Two-Link Flexible Manipulator (TLFM) incorporating payload. A set of linear models of a TLFM is obtained by using system identification method in which the linear model represents the operating ranges of the dynamic system. Thus, the LMI constraints permit to robustly guarantee a certain perturbation rejection level and a region of pole location.  To study the effectiveness of the controller, initially a PID control is developed for TLFM with varying payloads. The performances of the controllers are assessed in terms of the input tracking controller capability of the system as compared to the response with PID control. Moreover, the robustness of the LMI based robust PID control schemes is discussed. Finally, a comparative assessment of the control strategies is presented.

Filter by Year

2014 2014


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue