TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
53 Documents
Search results for
, issue
"Vol 16, No 1: February 2018"
:
53 Documents
clear
Modified Discrete Firefly Algorithm Combining Genetic Algorithm for Traveling Salesman Problem
Ling Teng;
Hang Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.4752
The Firefly Algorithm (FA) has a few disadvantages in solving the constrained global optimization problem, including that it is difficult to produce initial population, the size of relative attractiveness has nothing to do with the absolute brightness of fireflies, the inertia weight does not take full advantage of the information of objective function, and it cannot better control and constrain the mobile distance of firefly. In this paper, we propose a novel method based on discrete firefly algorithm combining genetic algorithm for traveling salesman problem. We redefine the distance of firefly algorithm by introducing swap operator and swap sequence to avoid algorithm easily falling into local solution and accelerate convergence speed. In addition, we adopt dynamic mechanism based on neighborhood search algorithm. Finally, the comparison experiment results show that the novel algorithm can search perfect solution within a short time, and greatly improve the effectiveness of solving the traveling salesman problem, it also significantly improves computing speed and reduces iteration number.
Comparative Study of Indoor Navigation Systems for Autonomous Flight
Muhammad Ayaz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.6814
Recently, Unmanned Aerial Vehicles (UAVs) have attracted the society and researchers due to the capability to perform in economic, scientific and emergency scenarios, and are being employed in large number of applications especially during the hostile environments. They can operate autonomously for both indoor and outdoor applications mainly including search and rescue, manufacturing, forest fire tracking, remote sensing etc. For both environments, precise localization plays a critical role in order to achieve high performance flight and interacting with the surrounding objects. However, for indoor areas with degraded or denied Global Navigation Satellite System (GNSS) situation, it becomes challenging to control UAV autonomously especially where obstacles are unidentified. A large number of techniques by using various technologies are proposed to get rid of these limits. This paper provides a comparison of such existing solutions and technologies available for this purpose with their strengths and limitations. Further, a summary of current research status with unresolved issues and opportunities is provided that would provide research directions to the researchers of the similar interests.
Structural and Optical properties of Multiwalled Carbon Nanotubes Modified by DBD Plasma at Atmospheric Pressure
Norain Sahari;
Zolkafle Buntat;
Zulkifli Azman;
Zainuddin Nawawi;
Muhammad Abu Bakar Sidik;
Muhammad Irfan Jambak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.5945
Structure, chemical, and physical properties of Multiwalled Carbon Nanotubes (MWCNTs) after modification by dielectric barrier discharge (DBD) at atmospheric pressure is investigated using Transmission Electron Microscopy (TEM), Raman and Uv-vis-NIR spectroscopy. Effects of plasma treatment time on MWCNTs are analyzed. TEM result shows that during the short period of plasma treatment time of 5 minutes, the tube surface experienced a few damages. With increase in plasma treatment time, the tube surface is damaged to a certain extent. Intensity ratio, ID/IG through Raman analysis shows a good agreement with TEM. The values of ID/IG of the modified MWCNTs are larger than those of pristine MWCNTs. An increase of ID/IG indicates that considerable defects are produced on the surfaces of MWCNTs. The treated MWCNTs has energy band gap compared to zero band gap of untreated MWCNTs. It is believed that the defect site of MWCNTs can modify the electronics properties of MWCNTs from being metallic to semiconducting structure, which is applicable for almost all electronics device applications.
Capacity Improvement and Protection of LTE Network on Ethernet Based Technique
Fadli Sirait;
Akhmad Wahyu Dani;
Triyanto Pangaribowo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.7674
High demands for data rates in mobile communications is the reason for developing broadband wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in 4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet switching developed to anticipated network failure on ethernet based network technology. The failures in the network include the link fails to connect to each network element, the network element fails to transfer the data to the destination, or the quality drops below the standard. In this paper we used two ethernet based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network failure on these techniques. Furthermore, we measured performance of network by measuring and comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the performance of LTE network.
Wireless Sensor Network over High Altitude Platform
Veronica Windha Mahyastuty;
Iskandar Iskandar;
Hendrawan Hendrawan;
M. Sigit Arifianto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.8391
One of Machine Type Communication (MTC) applications is Wireless Sensor Network (WSN). WSN is an intelligent network application system to collect, integrate, and transmit data autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium and collaborate to accomplish a common task, such as enviroment monitoring, military surveillance and industrial process control. The constraining aspect of WSN usage is the limited power of each sensor node, so energy efficiency becomes an important issue in WSN. Routing is a function in WSN, which consumes a substantial amount of energy. One of the routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then WSN over HAP using the LEACH routing protocol evaluated its performance. Performance indicators that we evaluated are engergy consumption, number of dead nodes and total average packets which is sent to HAP. From a series of simulations conducted, the results obtained that the higher the laying of HAP, then the coverage area will be greater. So that the energy consumption will be smaller, the number of dead node less and the avarage of total packet delivered to the HAP will be greater.
A New Compact CPW-Fed Dual-Band Uniplanar Antenna for RFID Applications
Ahmed El Hamraoui;
El Hassane Abdelmounim;
Jamal Zbitou;
Laarbi Elabdellaoui;
Hamid Bennis;
Mohamed Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.7560
In this paper a new dual-band uniplanar monopole antenna fed by Coplanar Waveguide (CPW) line is proposed for Radio Frequency Identification (RFID) applications. The antenna structure includes a CPW fed line and the dual-band operation is achieved from the G-shaped folded antenna. The antenna parameters have been investigated and optimized by using CST Microwave Studio. To validate the CST Microwave Studio results before the antenna achievement, we have conducted another study by using ADS. The final circuit was achieved, measured and validated. Experimental results show that the proposed antenna with compact size of 30*45 mm2 is simple in design and compact in size. It exhibits broadband impedance matching, consistent omnidirectional radiation patterns and appropriate gain characteristics suitable for the microwave RFID applicartions.
A Multiband Printed Antenna Suitable for Wireless Applications
S. El Kilani;
L. El Abdellaouib;
J. Zbitou;
J. Terhzaz;
A. Errkik;
M. Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.7059
This study deals with a new research work on a low cost multiband printed antenna which can be used for three operating frequency bands GSM900/PCS/WIFI/Bluetooth. The achieved antenna is mounted on an FR-4 substrate. In this study, the solts technique is used to obtain the multiband behavior. The different solts are inserted in the radiator face and the back face that is the ground. The whole circuit is optimized taking into account the good matching of the input impedance in the operating frequency bands with a stable radiation pattern. In order to optimize the proposed antenna structure we have used CST-MW and to compare the obtained simulation results we have conducted another electromagnetic simulation by using HFSS solver. The final circuit validated into simulation has been fabricated and tested which permits to validate the proposed multiband antenna.
Analysis of S2 (Spherical) Geometry Library Algorithm for GIS Geocoding Engineering
Risma Ekawati;
Untung Suprihadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.6985
Geocoding is a common technique to transform address information into digital latitude/longitude format. One of the engineering conversions can be used is Google Maps based on S2 (Spherical) Geometry Library algorithm. This journal explains the quality analysis of the algorithm using geocoding quality matrix testing from hundreds of address data samples particularly on three cities in Indonesia-Jakarta, Bandung, and Balikpapan. However, the result of this research concludes that completeness of address information will affect its overall fourth matrix quality and the linkages of it such as transform success rate, landmark exactness, the score of accuracy and range of radius in meter.
A Survey on Knowledge Transfer between Knowledge-based Systems
Nyoman Karna;
Iping Supriana;
Nur Maulidevi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.6517
The paper aims to clarify differences in knowledge sharing mechanisms between Knowledge-based Systems, including knowledge management system, web page-based knowledge, and expert system, in the hope that we can establish an automatic knowledge transfer between autonomous systems. This study lays the foundation for knowledge transfer mechanism where an autonomous Knowledge-based System may enhance its knowledge by using other system's knowledge. To design a knowledge transfer mechanism, the paper do a literature study by comparing three well-known protocols for knowledge sharing, OAI-PMH for knowledge management system, SPARQL for web page-based knowledge, and KQML for the expert system. The object of comparison is within three aspects, first is the ability to find another system, the second is knowledge retrieval from chosen system and third is how to add new knowledge into the system. The paper suggests that each protocol has its own strength and weakness, but when it comes to knowledge transfer, KQML covers more features. Therefore, based on this finding, the paper proposes a new model for autonomous knowledge transfer using KQML to enhance one Knowledge-based System's own knowledge.
File Encryption and Hiding Application Based on AES and Append Insertion Steganography
G. C. Prasetyadi;
R. Refianti;
A. B. Mutiara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.6409
Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.