cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 40 Documents
Search results for , issue "Vol 13, No 1: March 2015" : 40 Documents clear
Overview of Custom Microcontroller using Xilinx Zynq XC7Z020 FPGA Bayu Kanigoro; Ricky Efraim Lie; M. Fitra Kacamarga
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1122

Abstract

This paper presents an overview of customizable microcontroller using a Xilinx Zynq XC7Z020 FPGA as an alternative to increase its performance as user need. This alternative arises due to many of the systems, which developed mostly by using microcontroller are not giving any room for customization to increase its performance or I/O ports. There is any possibility that the system designed to be used by using general processor such as PC to increase its performance but it will give another problem such as interface difficulty for high speed I/O, real time processing, increases complexity, and many more. Customization is introduced by combining hard IP processor and FPGA in one chip instead of practicing two separate devices, processor and FPGA, which is commonly use in high performance embedded design. This approach allows seamless design development and development time reduction for customization.
Image Edge Feature Extraction and Refining Based on Genetic-Ant Colony Algorithm Xing Zhang; Shuai Liu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1264

Abstract

Edge is composed by a collection of its nearby pixels which has a step change or changes in roof, an image is an information system and most of its information comes from the edges. This paper gives a brief overview of the status and the importance of image edge detection and introduces the research status of the image edge detection. After that, it introduces the basic principle and the main steps of the genetic algorithm and ant colony algorithm. On the basis of these, the paper proposed a new hybrid algorithm for the image edge extraction and refining, which combined the genetic algorithm and ant colony algorithm. Through the analysis of the time-speed graph of the genetic algorithm and the ant colony algorithm, we can find the best fusion point between the genetic algorithm and the ant colony algorithm. The experiment indicated the proposed hybrid algorithm can make the full use of the image information, the simulation time is shorter, the image edge is more continuous, and preserved the outline of original image more completely.
Ultrasonic Tomography of Immersion Circular Array by Hyperbola Algorithm Liu Yang; Chunguang Xu; Xianghui Guo; Liping Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1320

Abstract

This paper presents a development and research of a non-invasive ultrasonic tomography for imaging gas/liquid two-phase flow. Ultrasonic transmitting and receiving are implemented using a circular array model that consists of 36 transducers. COMSOL Multiphysics® software is adopted for the simulation of the ultrasonic propagation in the detecting zone. Various two-phase flows with different gas distributions are radiated by ultrasonic waves and the reflection mode approach is utilized for detecting the scattering waves after the generation of fan-shaped beam. Ultrasonic attenuation and sound speed are both taken into consideration while reconstructing the two-phase flow images under the inhomogeneous medium conditions. The inversion procedure of the image reconstruction is realized using the hyperbola algorithm, which in return demonstrates the feasibility and validity of the proposed circular array model.
Multi-Domain Authentication Protocol Based on Dual-Signature Zengyu Cai; Qikun Zhang; Ming Li; Yong Gan; Junsong Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1164

Abstract

Today most multi-domain networks authentication systems provide data security and mutual authentication with asymmetric and traditional public key cryptography., there exist some problems, such as the overhead of passing certificates, the more complexity of management certificates and network bottlenecks and so on. These schemes can’t protect the safety of multi-domain interoperability in distributed network effectively. Aiming at these problems, the paper proposes an identity-based multi-domain authentication protocol among domains in large-scale distributed collaborative computing network. It adopts bilinear mapping and short signature technology to achieve mutual authentication between entities in different domains, which overcome the complexity of certificate transmission and bottlenecks in the scheme of PKI-based.  Analyzed shows that this scheme has anonymity, security and supporting mutual anonymous authentication and it is suitable to use in security alliance authentication mechanism in large distributed network.
Fuzzy Clustering Image Segmentation Based on Particle Swarm Optimization Zhanshen Feng; Boping Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1269

Abstract

Image segmentation refers to the technology to segment the image into different regions with different characteristics and to extract useful objectives, and it is a key step from image processing to image analysis. Based on the comprehensive study of image segmentation technology, this paper analyzes the advantages and disadvantages of the existing fuzzy clustering algorithms; integrates the particle swarm optimization (PSO) with the characteristics of global optimization and rapid convergence and fuzzy clustering (FC) algorithm with fuzzy clustering effects starting from the perspective of particle swarm and fuzzy membership restrictions and gets a PSO-FC image segmentation algorithm so as to effectively avoid being trapped into the local optimum and improve the stability and reliability of clustering algorithm. The experimental results show that this new PSO-FC algorithm has excellent image segmentation effects.
Countering Node Misbehavior Attacks using Trust Based Secure Routing Protocol Adnan Ahmed; Kamalrulnizam Abu Bakar; Muhammad Ibrahim Channa; Khalid Haseeb
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1181

Abstract

Wireless sensor networks have gained remarkable appreciation over the last few years. Despite significant advantages and tremendous applications, WSN is vulnerable to variety of attacks. Due to resource constraint nature of WSN, applicability of traditional security solutions is debatable. Although cryptography, authentication and confidentiality measures help in preventing specific types of attacks but they cannot safeguard against node misbehavior attacks and come at significant cost. To address this problem, we propose a Trust Based Secure Routing Protocol (TBSRP) which adopts on-demand routing principle and relies on distributed trust model for the detection and isolation of misbehaving nodes. The TBSRP aims to establish shortest path that contain all trusted nodes, identify packet forwarding misbehavior caused by malicious and faulty nodes and reroute the traffic to other reliable paths. The performance of TBSRP is evaluated in terms of packet delivery ratio, average end-to-end delay, normalized routing load and average throughput. Simulations results show that TBSRP can achieve both high delivery ratio and throughput in presence of various numbers of misbehaving and faulty nodes.
Design an Adaptive E-learning Application Architecture based on IEEE LTSA reference model Andharini Dwi Cahyani; Ari Basuki; Eka Mala Sari Rohman; Yeni Kustiyahningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.112

Abstract

Adaptivity in the field of e-learning and an innovative framework for personalised adaptive e-learning is often considered to be new or in an early development stage. In this paper, we propose an architecture for development of adaptive e-learning system. This architecture is based on the IEEE 1484 LTSA (Learning Technology System Architecture) reference model. The learner model is based on the learners’ preference and knowledge level. According to these profiles, the learners are served with learning material that best matches their educational needs. Furthermore, we also accomodate the learner feeback regarding to difficulty level of learning material. The design of our proposed models is prepared using UML notation. Our goal is to assist the instructional designers in developing adaptive e-learning system based on the IEEE LTSA models efficiently.
Raptor Code for Energy-Efficient Wireless Body Area Network Data Transmission Lydia Sari; Antonius Aditya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.924

Abstract

Wireless Body Area Network (WBAN) is a device developed mainly for the purpose of monitoring the medical condition of a human. WBAN is worn on the surface or in the human body, and it contains a wireless communication device.  A WBAN device is required to be small-sized, with limited power and high data reliability. The data reliability can be obtained by using a carefully designed channel coding scheme so that the energy consumed can be maintained at a low level.  In this paper, data transmission in Rayleigh, Rician, and Nakagami-m fading channels using Raptor and BCH codes is simulated.  Simulation results show that Raptor-coded data transmission consumes lower energy compared to BCH-coded transmission for various fading channels if the transmission distance exceeds 10 meters.  Therefore, Raptor code is a good candidate for the channel coding scheme for WBAN.
Family Health Monitoring System Based on the Four Sessions Internet of Things Yang Jingjing; Hao Shangfu; Zhang Xiao; Guo Benzhen; Liu Yu; Dong Beibei; Liu Yun
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1265

Abstract

The accelerating pace of modern life results in the lack of effective care of people’s health status. Nowadays, resorting to the technology of the Internet of Things, we can provide home health monitoring services to minimize the impact of the disease brought to people. In this article, we proposed the realization method for the architecture of the four sections of the Internet of Things oriented to home health monitoring service, furthermore, the secondary the smoothness index method is applied to the monitoring of human health index, data from body temperature detection experiments verified the feasibility of the four sessions system, which laid firm foundations for the requirement of real-time and accuracy of the Internet of Things based home health monitoring system with a common reference significance and value in use.
Analysis and Identification the Complexity of Data Heterogeneity on Learning Environment Using Ontology Arda Yunianta; Mohd Shahizan Othman; Norazah Yusof; Lizawati Mi Yusuf; Juwairiah Juwairiah; Nurul Syazana Selamat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1321

Abstract

Distributed and various systems on learning environment are the current issues to produce big data and heterogeneity data problem. Heterogeneity on learning environment is about numerous learning applications and various learning information to support a learning process in educational institutions. There are a lot of relationships are formed between elements on learning environment. The elements on learning environment consist of learning data, learning applications, data sources, learning concept, and data heterogeneity aspect on learning environment. These elements are interrelated and produce complex relationship between each other. A complex relationship problem between elements on learning environment makes a process of analysis and identification difficult to be done. Existing method to drawing this heterogeneity problem make confuse and misunderstanding readers. To solved this problem, researcher using ontology knowledge to describe and draw a semantic relationship that represent the complexity of data relationship on learning environment. The result of this analysis is to develop ontology knowledge to solve heterogeneity data problem specific in complexity relationship on learning environment. This result can give better understanding to the readers about complex relationship between elements on learning environment.

Page 3 of 4 | Total Record : 40


Filter by Year

2015 2015


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue