TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
40 Documents
Search results for
, issue
"Vol 13, No 1: March 2015"
:
40 Documents
clear
Overview of Custom Microcontroller using Xilinx Zynq XC7Z020 FPGA
Bayu Kanigoro;
Ricky Efraim Lie;
M. Fitra Kacamarga
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1122
This paper presents an overview of customizable microcontroller using a Xilinx Zynq XC7Z020 FPGA as an alternative to increase its performance as user need. This alternative arises due to many of the systems, which developed mostly by using microcontroller are not giving any room for customization to increase its performance or I/O ports. There is any possibility that the system designed to be used by using general processor such as PC to increase its performance but it will give another problem such as interface difficulty for high speed I/O, real time processing, increases complexity, and many more. Customization is introduced by combining hard IP processor and FPGA in one chip instead of practicing two separate devices, processor and FPGA, which is commonly use in high performance embedded design. This approach allows seamless design development and development time reduction for customization.
Image Edge Feature Extraction and Refining Based on Genetic-Ant Colony Algorithm
Xing Zhang;
Shuai Liu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1264
Edge is composed by a collection of its nearby pixels which has a step change or changes in roof, an image is an information system and most of its information comes from the edges. This paper gives a brief overview of the status and the importance of image edge detection and introduces the research status of the image edge detection. After that, it introduces the basic principle and the main steps of the genetic algorithm and ant colony algorithm. On the basis of these, the paper proposed a new hybrid algorithm for the image edge extraction and refining, which combined the genetic algorithm and ant colony algorithm. Through the analysis of the time-speed graph of the genetic algorithm and the ant colony algorithm, we can find the best fusion point between the genetic algorithm and the ant colony algorithm. The experiment indicated the proposed hybrid algorithm can make the full use of the image information, the simulation time is shorter, the image edge is more continuous, and preserved the outline of original image more completely.
Ultrasonic Tomography of Immersion Circular Array by Hyperbola Algorithm
Liu Yang;
Chunguang Xu;
Xianghui Guo;
Liping Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1320
This paper presents a development and research of a non-invasive ultrasonic tomography for imaging gas/liquid two-phase flow. Ultrasonic transmitting and receiving are implemented using a circular array model that consists of 36 transducers. COMSOL Multiphysics® software is adopted for the simulation of the ultrasonic propagation in the detecting zone. Various two-phase flows with different gas distributions are radiated by ultrasonic waves and the reflection mode approach is utilized for detecting the scattering waves after the generation of fan-shaped beam. Ultrasonic attenuation and sound speed are both taken into consideration while reconstructing the two-phase flow images under the inhomogeneous medium conditions. The inversion procedure of the image reconstruction is realized using the hyperbola algorithm, which in return demonstrates the feasibility and validity of the proposed circular array model.
Multi-Domain Authentication Protocol Based on Dual-Signature
Zengyu Cai;
Qikun Zhang;
Ming Li;
Yong Gan;
Junsong Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1164
Today most multi-domain networks authentication systems provide data security and mutual authentication with asymmetric and traditional public key cryptography., there exist some problems, such as the overhead of passing certificates, the more complexity of management certificates and network bottlenecks and so on. These schemes can’t protect the safety of multi-domain interoperability in distributed network effectively. Aiming at these problems, the paper proposes an identity-based multi-domain authentication protocol among domains in large-scale distributed collaborative computing network. It adopts bilinear mapping and short signature technology to achieve mutual authentication between entities in different domains, which overcome the complexity of certificate transmission and bottlenecks in the scheme of PKI-based. Analyzed shows that this scheme has anonymity, security and supporting mutual anonymous authentication and it is suitable to use in security alliance authentication mechanism in large distributed network.
Fuzzy Clustering Image Segmentation Based on Particle Swarm Optimization
Zhanshen Feng;
Boping Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1269
Image segmentation refers to the technology to segment the image into different regions with different characteristics and to extract useful objectives, and it is a key step from image processing to image analysis. Based on the comprehensive study of image segmentation technology, this paper analyzes the advantages and disadvantages of the existing fuzzy clustering algorithms; integrates the particle swarm optimization (PSO) with the characteristics of global optimization and rapid convergence and fuzzy clustering (FC) algorithm with fuzzy clustering effects starting from the perspective of particle swarm and fuzzy membership restrictions and gets a PSO-FC image segmentation algorithm so as to effectively avoid being trapped into the local optimum and improve the stability and reliability of clustering algorithm. The experimental results show that this new PSO-FC algorithm has excellent image segmentation effects.
Countering Node Misbehavior Attacks using Trust Based Secure Routing Protocol
Adnan Ahmed;
Kamalrulnizam Abu Bakar;
Muhammad Ibrahim Channa;
Khalid Haseeb
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1181
Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of attacks but they cannot safeguard against node misbehavior attacks and come at significant cost. To address this problem, we propose a Trust Based Secure Routing Protocol (TBSRP) which adopts on-demand routing principle and relies on distributed trust model for the detection and isolation of misbehaving nodes. The TBSRP aims to establish shortest path that contain all trusted nodes, identify packet forwarding misbehavior caused by malicious and faulty nodes and reroute the traffic to other reliable paths. The performance of TBSRP is evaluated in terms of packet delivery ratio, average end-to-end delay, normalized routing load and average throughput. Simulations results show that TBSRP can achieve both high delivery ratio and throughput in presence of various numbers of misbehaving and faulty nodes.
Design an Adaptive E-learning Application Architecture based on IEEE LTSA reference model
Andharini Dwi Cahyani;
Ari Basuki;
Eka Mala Sari Rohman;
Yeni Kustiyahningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.112
Adaptivity in the field of e-learning and an innovative framework for personalised adaptive e-learning is often considered to be new or in an early development stage. In this paper, we propose an architecture for development of adaptive e-learning system. This architecture is based on the IEEE 1484 LTSA (Learning Technology System Architecture) reference model. The learner model is based on the learners’ preference and knowledge level. According to these profiles, the learners are served with learning material that best matches their educational needs. Furthermore, we also accomodate the learner feeback regarding to difficulty level of learning material. The design of our proposed models is prepared using UML notation. Our goal is to assist the instructional designers in developing adaptive e-learning system based on the IEEE LTSA models efficiently.
Raptor Code for Energy-Efficient Wireless Body Area Network Data Transmission
Lydia Sari;
Antonius Aditya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.924
Wireless Body Area Network (WBAN) is a device developed mainly for the purpose of monitoring the medical condition of a human. WBAN is worn on the surface or in the human body, and it contains a wireless communication device. A WBAN device is required to be small-sized, with limited power and high data reliability. The data reliability can be obtained by using a carefully designed channel coding scheme so that the energy consumed can be maintained at a low level. In this paper, data transmission in Rayleigh, Rician, and Nakagami-m fading channels using Raptor and BCH codes is simulated. Simulation results show that Raptor-coded data transmission consumes lower energy compared to BCH-coded transmission for various fading channels if the transmission distance exceeds 10 meters. Therefore, Raptor code is a good candidate for the channel coding scheme for WBAN.
Family Health Monitoring System Based on the Four Sessions Internet of Things
Yang Jingjing;
Hao Shangfu;
Zhang Xiao;
Guo Benzhen;
Liu Yu;
Dong Beibei;
Liu Yun
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1265
The accelerating pace of modern life results in the lack of effective care of people’s health status. Nowadays, resorting to the technology of the Internet of Things, we can provide home health monitoring services to minimize the impact of the disease brought to people. In this article, we proposed the realization method for the architecture of the four sections of the Internet of Things oriented to home health monitoring service, furthermore, the secondary the smoothness index method is applied to the monitoring of human health index, data from body temperature detection experiments verified the feasibility of the four sessions system, which laid firm foundations for the requirement of real-time and accuracy of the Internet of Things based home health monitoring system with a common reference significance and value in use.
Analysis and Identification the Complexity of Data Heterogeneity on Learning Environment Using Ontology
Arda Yunianta;
Mohd Shahizan Othman;
Norazah Yusof;
Lizawati Mi Yusuf;
Juwairiah Juwairiah;
Nurul Syazana Selamat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.1321
Distributed and various systems on learning environment are the current issues to produce big data and heterogeneity data problem. Heterogeneity on learning environment is about numerous learning applications and various learning information to support a learning process in educational institutions. There are a lot of relationships are formed between elements on learning environment. The elements on learning environment consist of learning data, learning applications, data sources, learning concept, and data heterogeneity aspect on learning environment. These elements are interrelated and produce complex relationship between each other. A complex relationship problem between elements on learning environment makes a process of analysis and identification difficult to be done. Existing method to drawing this heterogeneity problem make confuse and misunderstanding readers. To solved this problem, researcher using ontology knowledge to describe and draw a semantic relationship that represent the complexity of data relationship on learning environment. The result of this analysis is to develop ontology knowledge to solve heterogeneity data problem specific in complexity relationship on learning environment. This result can give better understanding to the readers about complex relationship between elements on learning environment.