TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
42 Documents
Search results for
, issue
"Vol 13, No 2: June 2015"
:
42 Documents
clear
An Introduction to Journal Phishings and Their Detection Approach
Mehdi Dadkhah;
Tole Sutikno;
Mohammad Davarpanah Jazi;
Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1436
Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
A method of Trajectory Restoration at Intersection
Ke Zheng;
Xiangbo Song;
Dunyao Zhu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.980
Floating car data (FCD) is vechiel’s position trace that is comes from Global Positioning System receivers.collected at the discrete time. FCD contains much information of traffic and road-network. But there are different level of trajectory shape damages because of the affection of sample frequency and running speed. So before the FCD mining, the first thing should be done is to restore track to make up for the loss. This paper analyzes the spatial-temporal characteristics of floating car trajectory at intersection, and build an error recognition model and a adjust algorithm. Experiments showed that this method can improve accuracy of trajectory restoration, and set a solid foundation for further data mining.
Integrated System Design for Broadcast Program Infringement Detection
Sukmawati Nur Endah;
Satriyo Adhy;
Sutikno Sutikno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1124
Supervision of television and radio broadcast programs by the “Komisi Penyiaran Indonesia (KPI)” Central Java was still performed manually i.e. direct supervision by humans. It certainly had some weaknesses related to the human error such as tiredness and weary eyes. Therefore, we needed intelligent software that could automatically detect broadcast infringement. Currently, research in this area had not been studied. This research was to design an integrated system to detect broadcast infringement including data design, architecture design and main module interface design. Two main stages in this system are the Indonesian language speech recognition and detection of infringements of the broadcast program. With the method of Mel Frequency cepstral Coefficients (MFCC) and Hidden Markov Model (HMM) speech recognition application that used the 1050 sample data produces about 70% accuracy rate. This research would continue to implement the plan that had been created using speech recognition applications that had been built.
An Ant Colony-based Heuristic Algorithm for Joint Scheduling of Post-earthquake Road Repair and Relief Distribution
Bei Xu;
Yuanbin Song
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1437
Emergency road repair and distribution of relief goods are crucial for post-earthquake response. However, interrelationships between those two tasks are not adequately considered in their work schedules, especially in cases with very limited repair resources, leading to unnecessary delay and expenditure. A time-space network model is constructed to better describe the constraints arising from the interrelationships in joint scheduling of road repair and relief distribution works. An ant colony-based heuristic algorithm is developed to solve the NP-hard model efficiently for practical use, followed by a case study of Wenchuan earthquake to validate the planning tool and to demonstrate its feasibility for resolving real world problem.
An Image Registration Method Based on Wavelet Transform and Ant Colony Optimization
Dapeng Zhang;
Jiayan Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1432
Image registration, as one of the basic tasks of image processing, is the process to register two images about the same objective or background which are acquired in different times, different sensors, different perspectives and different shooting conditions. In the image registration, because of the problems that the image information is complicated, they have strong correlation and incompleteness, inaccuracy and non-construction occur in different levels in the processing, to apply the method of computational intelligence information processing in the image registration can have better results than the traditional computation methods. This paper proposes an image registration method based on wavelet decomposition and ant colony optimization, which divides the process of image registration into coarse registration and refined registration through wavelet decomposition technique. In the coarse registration, the transformation parameter value of the image approximation component is acquired through ant colony optimization while the changing parameter value of the original image is obtained by the ant colony search method in the refined registration. The simulation experiment shows that this registration method has the characteristics of anti-noise, fast speed, high accuracy and high registration success rate.
Object Detector on Coastal Surveillance Radar Using Two-Dimensional Order-Statistic Constant-False Alarm Rate Algoritm
Dayat Kurniawan;
Purwoko Adhi;
Arif Suryadi;
Iqbal Syamsu;
Teguh Praludi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1189
This paper describes the development of radar object detection using two dimensional constant false alarm rate (2D-CFAR). Objective of this development is to minimize noise detection if compared with the previous algorithm that uses one dimensional constant false alarm rate (1D-CFAR) algorithm such as order-statistic (OS) CFAR, cell-averaging (CA) CFAR, AND logic (AND) CFAR and variability index (VI) CFAR where has been implemented on coastal surveillance radar. The optimum detection result in coastal surveillance radar testing when Pfa set to 1e-2, Kth set to 3/4*Nwindow and Guard Cell set to 0. Principle of 2D-CFAR algorithm is combining of two CFAR algorithms for each array data of azimuth and range. Order statistic (OS) CFAR algoritm is implemented on this 2D-CFAR by fusion rule of AND logic.The algorithm of 2D-CFAR is developed using Microsoft Visual C++ 2008 and the output of 2D-CFAR is plotted on PPI scope radar using GDI+ library. The result of 2D-CFAR development shows that 2D-CFAR can minimize noise detected if compared with 1D-CFAR with the same parameter of CFAR. Best performance of 2D-CFAR in object detection when Nwindow set to 128. The time of software processing of 2D-CFAR is about two times longer than the 1D-CFAR.
Design and Simulation of Small Space Parallel Parking Fuzzy Controller
Qiulin Sheng;
Jie Min;
Xing Zhang;
Zhengwen Zhang;
Yi Li;
Guangya Liu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1258
Based on the nonlinearity and time-variation of automatic parking path tracking control system, we use fuzzy control theories and methods to explore the control rules to improve fuzzy controllers and design an automobile steering controller. Then we build the simulation experiment platform of an automobile in Simulink to simulate the reversing settings of parallel parking. This paper adopts the Mamdani control rules; the membership function is the Gauss function. This paper verifies the fuzzy controller's kinematic model and the advantages of fuzzy control rules. Simulation results show that the design of the controller allows the automobile to stop into the parking space smaller than the space obtained by planning path, and automatic parking becomes possible in the parking plot. The control system is characterized by small tracking error, fast response and high reliability.
Analysis and Simulation on Torque Ripples of Brushless DC Motor
Qian Weikang;
Shi Yutao
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.991
Because of its small size, high reliability, efficiency, and its output torque characteristics, brushless DC motor (BLDCM) had been widely used in many field of robotics, precision instruments and equipment, etc. However, its inherent electromagnetic torque ripple limited the scope of its application, which was the focus and difficulty of its research in recent years. This article first described the causes of brushless DC motor torque ripple, and then torque ripple generated by four PWM modulations was analyzed to get optimum control scheme, finally the MATLAB / SIMULINK simulation model verified the analysis of the results. This paper provided the most intuitionistic exhibition.
Optimization of Sensor Network Topology in Deployed in Inhomogeneous Lossy Media
Rony Teguh;
Hajime Igarashi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.961
This paper presents optimization of wireless sensor network (WSN) topology for forest fire detection. The sensors for this purpose are deployed in forest, grassland and open space, which have different attenuation properties in electromagnetic waves. For this reason, routers which receive signals from sensors and send them to the base station must be deployed considering these differences. In this work, we develop an optimization method for WSN topology based on simulated annealing considering the differences in the attenuation property. The vegetation data are taken from Landsat data. Using the present method, the necessary number of routers for full connection of the sensors deployed in diverse, irregular environments can be estimated.
High Available VoIP Server Failover Mechanism in Wide Area Network
Hery Dian Septama;
Ardian Ulvan;
Jiri Hlavacek;
Robert Bestak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i2.1741
The development of telecommunication technology specified the Internet Protocol (IP) based technology for the next generation network. Voice over Internet Protocol (VoIP) has been introduced to overcome future telephony demand. However, these rapid changes encountered some issues, and the most critical is how to provide the services availability and reliability equally to circuit based telephony. Virtualization is widely used not only for hardware efficiency and maintenance, but also for High Availability support. Virtualized environment provides the ability among servers to migrate or replicate into another machine, even when they are running their services, which is known as Live Migration. In this paper, the ability of virtualization failover mechanism over WAN and voice quality of VoIP service when running on the High Availability system in virtualized environment is studied and examined. The objective analysis by using quality of services (QoS) attributes is conducted as well as the subjective analysis using Mean Opinion Score (MOS). The work utilizes Xen® Hypervisor with modified Remus extensions to provide the High Availability environment with GRE tunnelling and newtwork virtualization. Remus approach using checkpoint based is deployed to copy the primary server to the backup server. A range of 40ms – 900ms has been applied as time interval of checkpoint. The results show that the the failover downtime is 1.4 s and mean jitter is 9,98 ms, packet loss 3,12% and MOS 3.61 for Remus 400ms checkpoint. MOS with different checkpoint time interval is also presented.