TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
55 Documents
Search results for
, issue
"Vol 15, No 4: December 2017"
:
55 Documents
clear
A Good Performance OTP Encryption Image based on DCT-DWT Steganography
Wellia Shinta Sari;
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi;
Christy Atika Sari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5883
The security aspect is very important in data transmission. One way to secure data is with steganography and cryptography. Surely research on this should continue to be developed to improve security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for double protection during data transmission. The selected steganographic algorithm is the use of a combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed method of DCT transformation first, proceed with DWT transformation. From the experimental results obtained better imperceptibility quality, compared with existing methods. To add OTP message security applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all images is 1.
The Chaos and Stability of Firefly Algorithm Adjacent Individual
Wen Xin Yu;
Jun Nian Wang;
Yan Li;
Zheng Heng Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5015
In this paper, in order to overcome the defect of the firefly algorithm, for example, the slow convergence rate, low accuracy and easily falling into the local optima in the global optimization search, we propose a dynamic population firefly algorithm based on chaos. The stability between the fireflies is proved, and the similar chaotic phenomenon in firefly algorithm can be simulated.
Performance of Modified S-Transform for Power Quality Disturbance Detection and Classification
Faridah Hanim M. Noh;
Munirah Ab. Rahman;
M. Faizal Yaakub
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.7230
Detection and classification of power quality (PQ) disturbances are an important consideration to electrical utility companies and many industrial customers so that diagnosis and mitigation of such disturbance can be implemented quickly. Power quality signal consists of stationary and non-stationary events which need a robust signal processing technique to analyse the signals. In this paper, Modified STransform (MST) was used to analyse single and multiple power quality signals. MST is a modified version of S-transform with improved time-frequency resolution. The power quality signals that are considered in this study are voltage swell, sag, interruption, harmonic, interharmonic, transient, sag plus harmonic and swell plus harmonics. The performance of the proposed method has been studied under noisy and unnoisy condition. Hard thresholding technique has been applied with MST while analysing noisy PQ signals. The result shows that MST is able to give higher classification rate with better time and frequency distribution (TFD) spectrum of the PQ disturbances.
Improved Face Recognition Across Poses using Fusion of Probabilistic Latent Variable Models
Moh Edi Wibowo;
Dian Tjondronegoro;
Vinod Chandran;
Reza Pulungan;
Jazi Eko Istiyanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5731
Uncontrolled environments have often required face recognition systems to identify faces appearing in poses that are different from those of the enrolled samples. To address this problem, probabilistic latent variable models have been used to perform face recognition across poses. Although these models have demonstrated outstanding performance, it is not clear whether richer parameters always lead to performance improvement. This work investigates this issue by comparing performance of three probabilistic latent variable models, namely PLDA, TFA, and TPLDA, as well as the fusion of these classifiers on collections of video data. Experiments on the VidTIMIT+UMIST and the FERET datasets have shown that fusion of multiple classifiers improves face recognition across poses, given that the individual classifiers have similar performance. This proves that different probabilistic latent variable models learn statistical properties of the data that are complementary (not redundant). Furthermore, fusion across multiple images has also been shown to produce better perfomance than recogition using single still image.
Embedded Applications of MS-PSO-BP on Wind/Storage Power Forecasting
Jianhong Zhu;
Wen-xia Pan;
Zhi-ping Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.6720
Higher proportion wind power penetration has great impact on grid operation and dispatching, intelligent hybrid algorithm is proposed to cope with inaccurate schedule forecast. Firstly, hybrid algorithm of MS-PSO-BP (Mathematical Statistics, Particle Swarm Optimization, Back Propagation neural network) is proposed to improve the wind power system prediction accuracy. MS is used to optimize artificial neural network training sample, PSO-BP (particle swarm combined with back propagation neural network) is employed on prediction error dynamic revision. From the angle of root mean square error (RMSE), the mean absolute error (MAE) and convergence rate, analysis and comparison of several intelligent algorithms (BP, RBP, PSO-BP, MS-BP, MS-RBP, MS-PSO-BP) are done to verify the availability of the proposed prediction method. Further, due to the physical function of energy storage in improving accuracy of schedule pre-fabrication, a mathematical statistical method is proposed to determine the optimal capacity of the storage batteries in power forecasting based on the historical statistical data of wind farm. Algorithm feasibility is validated by application of experiment simulation and comparative analysis.
Influences of Buffer Size and Eb/No on Very Small Aperture Terminal (VSAT) Communictions
Debby Maureen Talumewo;
Heru Sukoco;
Fahren Bukhari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5788
In data communication of the signal transmitted from the transmitter (Tx) to receiver (Rx) stations is very influential. Buffer and Eb/No are two parameters that influence the quality of signal. This research measures those parameters and the relationship among them. This research employs data collected on the Link STM-1 side in Makassar and Timika operated by PT. Telkom Metra Bogor. The period of data is carried out for 56 days taken by using Simple Management Network Protocol (SNMP). To analyze the relationship among those two parameters, we use product moment correlation (PMC) method. The result correlation of the data buffer and Eb/No with a level of real is 0.05 and then buffer set in modem CDM 700 is 50% with threshold Eb/No 12.1 dB and the modulations used 64-QAM. That resulted correlation of side in Makassar is 0.648 and the p-value is 0.000. Correlation of side in Timika is 0.722 and the p-value is 0.000. These results suggest that the two parameters are correlated strong and significant.
Generating a Lighting System by Using Pico Hydro System
G. Subhashini;
Devindran Munandy;
Raed Abdulla
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.7235
The main aim of this research is to design and develop LED based lighting system by using Pico hydro power. The proposed system is to use renewable energy to generate power in remote areas. The system is designed in a small scale which capable of lighting up a LED and sustain power when turbine stop to rotate. Reaction turbine is selected to be the suitable model for this Pico Hydro System (PHS). The performance of the system is tested by changing the materials for the blades and determines the suitable number of blades for the system to perform at maximum efficiency. Additional features, such as displaying generated voltage and flow rate has been implemented. It is observed that, the system could generate maximum voltage of 5.46V at the head height of 65 cm with flow rate of 5.51 L/Min. A total of 4.62 watt of net electrical power generated from this PHS, the value is obtained by using theoretical calculation. Finally, the system proves to be efficient in terms of generated voltage and cost, as compared to the journals which is reviewed in the literature. The scale of the design has to be remodified to be implemented in river areas.
Bloom Filter Implementation in Cache with Low Level of False Positive
Andri Hidayat;
Fahren Bukhari;
Heru Sukoco
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.4447
Searching techniques significantly determine the speed of getting the information or objects. Finding an object in a set is related to membership checking. In the case of massive data, it needs an appropriate technique to search an object accurately and faster. This research implements searching methods, namely Bloom Filter and Sequential Search algorithms, to find objects in a set of data. It aims to improve our system getting a proper item. Due to the possibility of False-Positive existence as a result of Bloom filter technique, there is a potentially inaccurate representation to object sought. Some parameters are influencing False-Positive, namely the number of objects, available bits, and the number of mapped-bit. A Combination of those parameters could decrease the level of False-Positive and improve their accuracy and faster accessibility. In this research, we use three data object variations with the biggest object size of 2000000. Cached objects used in our experiments is between 2 – 20% of variation from the generated objects. The best results with the lowest False-Positive is a combination of bit = 8, mapped bit = 7, and 6% of cache size from 2000000 generated objects.
Pervasive Device and Service Discovery Protocol in Interoperability XBee-IP Network
Sabriansyah Rizqika Akbar;
Helmi Nizar;
Wijaya Kurniawan;
Mochammad Hannats Hanafi Ichsan;
Issa Arwani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.5725
The Internet of Things (IoT) communication protocol built over IP and non-IP environment. Therefore, a gateway device will be needed to bridge the IP and non-IP network transparently since an IoT user is more likely to concern on the service provided by the IoT device, rather than the complexity of the network or device configuration. Since today ubiquitous computing needs to hide the architectural level from it users, the data & information centric approach was proposed. However, the data & information centric protocol is having several issues and one of them is device and service discovery protocol over IP & non-IP network. This paper proposed a pervasive device and service discovery protocol that able to work in interoperability of the IP and non-IP network. The system environment consists of a smart device with XBee Communication as the non-IP network that will send the device and service description data to the IP network using WebSocket. The gateway will able to recognize the smart device and sent the data to the web-based user application. The user application displayed the discovered devices along the services and able to send the control data to each of the smart devices. Our proposed protocol also enriched with the smart device inoperability detection by using keep-alive tracking from the gateway to each of the smart devices. The result showed that the delay for the user application to detect the smart device in the XBee network is around 10.13 ms delay, and the service average delay requested by the user application to each of the devices is 2.13 ms.
The Toolkit of Success Rate Calculation of Broiler Harvest
Ahmad Sanmorino;
Rendra Gustriansyah;
Terttiaavini Terttiaavini;
Isabella Isabella
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i4.6744
Failed in the harvest should be avoided by the owners of broiler farms. Various ways are done to make the harvest successful and make a profit. Preparations made before the period of broiler development can be done optimally, with the hope that the harvest is successful. But the problem, on the field in fact not as smooth as had been planned at the beginning or before the development period. There is always a lack or inappropriate so that the harvest is not optimal or even harvest failure. Based on the background that has been described, we tried to create a toolkit that can be used to calculate success rate of the broiler harvest. With this toolkit, broiler farm owners are expected to have a guide and can make the right move in the period of broiler development. To calculate the success rate of broiler harvest, we used a model based on the performance index calculation. Toolkit that created running on local network environment using an Apache web server. The Toolkit uses JavaScript library to display the calculation results in the form of charts that are easier to understand. Based on the results of testing that has been done, this toolkit can perform calculations in a relatively short time. Can present the results of calculations with accurate information. The accuracy of success rate calculation toolkit reached 90%. It is obtained by comparing the performance index and the total weight of broiler that obtained when harvested.