cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 42 Documents
Search results for , issue "Vol 13, No 2: June 2015" : 42 Documents clear
An Introduction to Journal Phishings and Their Detection Approach Mehdi Dadkhah; Tole Sutikno; Mohammad Davarpanah Jazi; Deris Stiawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1436

Abstract

Nowadays, the most important risk and challenge in online system are online scam and phishing attacks. Phishing attacks have been always used to steal important information of users. In this kind of scam, attacker direct victim to fake pages using social engineering techniques, then, starts stealing users` important information such as passwords. In order to confronting these attacks, numerous techniques have been invented which have the ability to confront different kinds of these attacks. Our goal in this paper is to introducing new kind of phishing attacks which are not identifiable by techniques and methods which have been invented to confronting phishing attacks. Unlike other kinds of phishing attacks which target all kinds of users, researchers are the victims of these kinds of journal phishing attacks. Finally, we`ll introduce an approach based on classification algorithms to identify these kind of journal phishing attacks and then we`ll check our suggested approach in error rate.
A method of Trajectory Restoration at Intersection Ke Zheng; Xiangbo Song; Dunyao Zhu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.980

Abstract

Floating car data (FCD) is vechiel’s position trace that is comes from Global Positioning System receivers.collected at the discrete time. FCD contains much information of traffic and road-network. But there are different level of trajectory shape damages because of the affection of sample frequency and running speed. So before the FCD mining, the first thing should be done is to restore track to make up for the loss. This paper analyzes the spatial-temporal characteristics of floating car trajectory at intersection, and build an error recognition model and a adjust algorithm. Experiments showed that this method can improve accuracy of trajectory restoration, and set a solid foundation for further data mining.
Integrated System Design for Broadcast Program Infringement Detection Sukmawati Nur Endah; Satriyo Adhy; Sutikno Sutikno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1124

Abstract

Supervision of television and radio broadcast programs by the “Komisi Penyiaran Indonesia (KPI)” Central Java was still performed manually i.e. direct supervision by humans. It certainly had some weaknesses related to the human error such as tiredness and weary eyes. Therefore, we needed intelligent software that could automatically detect broadcast infringement. Currently, research in this area had not been studied. This research was to design an integrated system to detect broadcast infringement including data design, architecture design and main module interface design. Two main stages in this system are the Indonesian language speech recognition and detection of infringements of the broadcast program. With the method of Mel Frequency cepstral Coefficients (MFCC) and Hidden Markov Model (HMM) speech recognition application that used the 1050 sample data produces about 70% accuracy rate. This research would continue to implement the plan that had been created using speech recognition applications that had been built.
An Ant Colony-based Heuristic Algorithm for Joint Scheduling of Post-earthquake Road Repair and Relief Distribution Bei Xu; Yuanbin Song
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1437

Abstract

Emergency road repair and distribution of relief goods are crucial for post-earthquake response. However, interrelationships between those two tasks are not adequately considered in their work schedules, especially in cases with very limited repair resources, leading to unnecessary delay and expenditure. A time-space network model is constructed to better describe the constraints arising from the interrelationships in joint scheduling of road repair and relief distribution works. An ant colony-based heuristic algorithm is developed to solve the NP-hard model efficiently for practical use, followed by a case study of Wenchuan earthquake to validate the planning tool and to demonstrate its feasibility for resolving real world problem.
An Image Registration Method Based on Wavelet Transform and Ant Colony Optimization Dapeng Zhang; Jiayan Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1432

Abstract

Image registration, as one of the basic tasks of image processing, is the process to register two images about the same objective or background which are acquired in different times, different sensors, different perspectives and different shooting conditions. In the image registration, because of the problems that the image information is complicated, they have strong correlation and incompleteness, inaccuracy and non-construction occur in different levels in the processing, to apply the method of computational intelligence information processing in the image registration can have better results than the traditional computation methods. This paper proposes an image registration method based on wavelet decomposition and ant colony optimization, which divides the process of image registration into coarse registration and refined registration through wavelet decomposition technique. In the coarse registration, the transformation parameter value of the image approximation component is acquired through ant colony optimization while the changing parameter value of the original image is obtained by the ant colony search method in the refined registration. The simulation experiment shows that this registration method has the characteristics of anti-noise, fast speed, high accuracy and high registration success rate.
Object Detector on Coastal Surveillance Radar Using Two-Dimensional Order-Statistic Constant-False Alarm Rate Algoritm Dayat Kurniawan; Purwoko Adhi; Arif Suryadi; Iqbal Syamsu; Teguh Praludi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1189

Abstract

This paper describes the development of radar object detection using two dimensional constant false alarm rate (2D-CFAR). Objective of this development is to minimize noise detection if compared with the previous algorithm that uses one dimensional constant false alarm rate (1D-CFAR) algorithm such as order-statistic (OS) CFAR, cell-averaging (CA) CFAR, AND logic (AND) CFAR and variability index (VI) CFAR where has been implemented on coastal surveillance radar. The optimum detection result in coastal surveillance radar testing when Pfa set to 1e-2, Kth set to 3/4*Nwindow and Guard Cell set to 0. Principle of 2D-CFAR algorithm is combining of two CFAR algorithms for each array data of azimuth and range. Order statistic (OS) CFAR algoritm is implemented on this 2D-CFAR by fusion rule of AND logic.The algorithm of 2D-CFAR is developed using Microsoft Visual C++ 2008 and the output of 2D-CFAR is plotted on PPI scope radar using GDI+ library. The result of 2D-CFAR development shows that 2D-CFAR can minimize noise detected if compared with 1D-CFAR with the same parameter of CFAR. Best performance of 2D-CFAR in object detection when Nwindow set to 128. The time of software processing of 2D-CFAR is about two times longer than the 1D-CFAR.
Design and Simulation of Small Space Parallel Parking Fuzzy Controller Qiulin Sheng; Jie Min; Xing Zhang; Zhengwen Zhang; Yi Li; Guangya Liu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1258

Abstract

Based on the nonlinearity and time-variation of automatic parking path tracking control system, we use fuzzy control theories and methods to explore the control rules to improve fuzzy controllers and design an automobile steering controller. Then we build the simulation experiment platform of an automobile in Simulink to simulate the reversing settings of parallel parking. This paper adopts the Mamdani control rules; the membership function is the Gauss function. This paper verifies the fuzzy controller's kinematic model and the advantages of fuzzy control rules. Simulation results show that the design of the controller allows the automobile to stop into the parking space smaller than the space obtained by planning path, and automatic parking becomes possible in the parking plot. The control system is characterized by small tracking error, fast response and high reliability.
Analysis and Simulation on Torque Ripples of Brushless DC Motor Qian Weikang; Shi Yutao
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.991

Abstract

Because of its small size, high reliability, efficiency, and its output torque characteristics, brushless DC motor (BLDCM) had been widely used in many field of robotics, precision instruments and equipment, etc. However, its inherent electromagnetic torque ripple limited the scope of its application, which was the focus and difficulty of its research in recent years. This article first described the causes of brushless DC motor torque ripple, and then torque ripple generated by four PWM modulations was analyzed to get optimum control scheme, finally the MATLAB / SIMULINK simulation model verified the analysis of the results. This paper provided the most intuitionistic exhibition.
Optimization of Sensor Network Topology in Deployed in Inhomogeneous Lossy Media Rony Teguh; Hajime Igarashi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.961

Abstract

This paper presents optimization of wireless sensor network (WSN) topology for forest fire detection. The sensors for this purpose are deployed in forest, grassland and open space, which have different attenuation properties in electromagnetic waves. For this reason, routers which receive signals from sensors and send them to the base station must be deployed considering these differences. In this work, we develop an optimization method for WSN topology based on simulated annealing considering the differences in the attenuation property. The vegetation data are taken from Landsat data. Using the present method, the necessary number of routers for full connection of the sensors deployed in diverse, irregular environments can be estimated.
High Available VoIP Server Failover Mechanism in Wide Area Network Hery Dian Septama; Ardian Ulvan; Jiri Hlavacek; Robert Bestak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1741

Abstract

The development of telecommunication technology specified the Internet Protocol (IP) based technology for the next generation network. Voice over Internet Protocol (VoIP) has been introduced to overcome future telephony demand. However, these rapid changes encountered some issues, and the most critical is how to provide the services availability and reliability equally to circuit based telephony. Virtualization is widely used not only for hardware efficiency and maintenance, but also for High Availability support. Virtualized environment provides the ability among servers to migrate or replicate into another machine, even when they are running their services, which is known as Live Migration. In this paper, the ability of virtualization failover mechanism over WAN and voice quality of VoIP service when running on the High Availability system in virtualized environment is studied and examined. The objective analysis by using quality of services (QoS) attributes is conducted as well as the subjective analysis using Mean Opinion Score (MOS). The work utilizes Xen® Hypervisor with modified Remus extensions to provide the High Availability environment with GRE tunnelling and newtwork virtualization. Remus approach using checkpoint based is deployed to copy the primary server to the backup server. A range of 40ms – 900ms has been applied as time interval of checkpoint. The results show that the the failover downtime is 1.4 s and mean jitter is 9,98 ms, packet loss 3,12% and MOS 3.61 for Remus 400ms checkpoint. MOS with different checkpoint time interval is also presented.

Filter by Year

2015 2015


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue