cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 53 Documents
Search results for , issue "Vol 16, No 1: February 2018" : 53 Documents clear
Modified Discrete Firefly Algorithm Combining Genetic Algorithm for Traveling Salesman Problem Ling Teng; Hang Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.4752

Abstract

The Firefly Algorithm (FA) has a few disadvantages in solving the constrained global optimization problem, including that it is difficult to produce initial population, the size of relative attractiveness has nothing to do with the absolute brightness of fireflies, the inertia weight does not take full advantage of the information of objective function, and it cannot better control and constrain the mobile distance of firefly. In this paper, we propose a novel method based on discrete firefly algorithm combining genetic algorithm for traveling salesman problem. We redefine the distance of firefly algorithm by introducing swap operator and swap sequence to avoid algorithm easily falling into local solution and accelerate convergence speed. In addition, we adopt dynamic mechanism based on neighborhood search algorithm. Finally, the comparison experiment results show that the novel algorithm can search perfect solution within a short time, and greatly improve the effectiveness of solving the traveling salesman problem, it also significantly improves computing speed and reduces iteration number.
Comparative Study of Indoor Navigation Systems for Autonomous Flight Muhammad Ayaz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6814

Abstract

Recently, Unmanned Aerial Vehicles (UAVs) have attracted the society and researchers due to the capability to perform in economic, scientific and emergency scenarios, and are being employed in large number of applications especially during the hostile environments. They can operate autonomously for both indoor and outdoor applications mainly including search and rescue, manufacturing, forest fire tracking, remote sensing etc. For both environments, precise localization plays a critical role in order to achieve high performance flight and interacting with the surrounding objects. However, for indoor areas with degraded or denied Global Navigation Satellite System (GNSS) situation, it becomes challenging to control UAV autonomously especially where obstacles are unidentified. A large number of techniques by using various technologies are proposed to get rid of these limits. This paper provides a comparison of such existing solutions and technologies available for this purpose with their strengths and limitations. Further, a summary of current research status with unresolved issues and opportunities is provided that would provide research directions to the researchers of the similar interests.
Structural and Optical properties of Multiwalled Carbon Nanotubes Modified by DBD Plasma at Atmospheric Pressure Norain Sahari; Zolkafle Buntat; Zulkifli Azman; Zainuddin Nawawi; Muhammad Abu Bakar Sidik; Muhammad Irfan Jambak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.5945

Abstract

Structure, chemical, and physical properties of Multiwalled Carbon Nanotubes (MWCNTs) after modification by dielectric barrier discharge (DBD) at atmospheric pressure is investigated using Transmission Electron Microscopy (TEM), Raman and Uv-vis-NIR spectroscopy. Effects of plasma treatment time on MWCNTs are analyzed. TEM result shows that during the short period of plasma treatment time of 5 minutes, the tube surface experienced a few damages. With increase in plasma treatment time, the tube surface is damaged to a certain extent. Intensity ratio, ID/IG through Raman analysis shows a good agreement with TEM. The values of ID/IG of the modified MWCNTs are larger than those of pristine MWCNTs. An increase of ID/IG indicates that considerable defects are produced on the surfaces of MWCNTs. The treated MWCNTs has energy band gap compared to zero band gap of untreated MWCNTs. It is believed that the defect site of MWCNTs can modify the electronics properties of MWCNTs from being metallic to semiconducting structure, which is applicable for almost all electronics device applications.
Capacity Improvement and Protection of LTE Network on Ethernet Based Technique Fadli Sirait; Akhmad Wahyu Dani; Triyanto Pangaribowo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.7674

Abstract

High demands for data rates in mobile communications is the reason for developing broadband wireless access technologies. Long Term Evolution (4G LTE) networks which offer significantly higher data rates and require suitably higher capacity backhaul networks. To prepare for the high data rates usage in 4G LTE, operators are using ethernet services in terms of backhaul connectivity. Protection packet switching developed to anticipated network failure on ethernet based network technology. The failures in the network include the link fails to connect to each network element, the network element fails to transfer the data to the destination, or the quality drops below the standard. In this paper we used two ethernet based technique, namely Ethernet over SDH and MPLS-TP with ring protection to anticipated network failure on these techniques. Furthermore, we measured performance of network by measuring and comparing the throughput, latency and jitter between Ethernet over SDH and MPLS-TP. We used bandwidth capacity 240 Mbps as plant bandwidth link and worked in MIMO 2 2. The results of measurements indicated that MPLS-TP with ring protection is the best technique to enhanced the performance of LTE network.
Wireless Sensor Network over High Altitude Platform Veronica Windha Mahyastuty; Iskandar Iskandar; Hendrawan Hendrawan; M. Sigit Arifianto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.8391

Abstract

One of Machine Type Communication (MTC) applications is Wireless Sensor Network (WSN). WSN is an intelligent network application system to collect, integrate, and transmit data autonomously. Sensor nodes in WSN, communicate over short distance via a wireless medium and collaborate to accomplish a common task, such as enviroment monitoring, military surveillance and industrial process control. The constraining aspect of WSN usage is the limited power of each sensor node, so energy efficiency becomes an important issue in WSN. Routing is a function in WSN, which consumes a substantial amount of energy. One of the routing protocols that can increase the energy efficiency of WSN is Low Energy Adaptive Clustering Hierarchy (LEACH). In this paper, High Altitude Platform (HAP) is used to replace Base Station (BS) as sink node in WSN. HAP is designed at altitudes of 17, 20 and 22 km. Then WSN over HAP using the LEACH routing protocol evaluated its performance. Performance indicators that we evaluated are engergy consumption, number of dead nodes and total average packets which is sent to HAP. From a series of simulations conducted, the results obtained that the higher the laying of HAP, then the coverage area will be greater. So that the energy consumption will be smaller, the number of dead node less and the avarage of total packet delivered to the HAP will be greater.
A New Compact CPW-Fed Dual-Band Uniplanar Antenna for RFID Applications Ahmed El Hamraoui; El Hassane Abdelmounim; Jamal Zbitou; Laarbi Elabdellaoui; Hamid Bennis; Mohamed Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.7560

Abstract

In this paper a new dual-band uniplanar monopole antenna fed by Coplanar Waveguide (CPW) line is proposed for Radio Frequency Identification (RFID) applications. The antenna structure includes a CPW fed line and the dual-band operation is achieved from the G-shaped folded antenna. The antenna parameters have been investigated and optimized by using CST Microwave Studio. To validate the CST Microwave Studio results before the antenna achievement, we have conducted another study by using ADS. The final circuit was achieved, measured and validated. Experimental results show that the proposed antenna with compact size of 30*45 mm2 is simple in design and compact in size. It exhibits broadband impedance matching, consistent omnidirectional radiation patterns and appropriate gain characteristics suitable for the microwave RFID applicartions.
A Multiband Printed Antenna Suitable for Wireless Applications S. El Kilani; L. El Abdellaouib; J. Zbitou; J. Terhzaz; A. Errkik; M. Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.7059

Abstract

This study deals with a new research work on a low cost multiband printed antenna which can be used for three operating frequency bands GSM900/PCS/WIFI/Bluetooth. The achieved antenna is mounted on an FR-4 substrate. In this study, the solts technique is used to obtain the multiband behavior. The different solts are inserted in the radiator face and the back face that is the ground. The whole circuit is optimized taking into account the good matching of the input impedance in the operating frequency bands with a stable radiation pattern. In order to optimize the proposed antenna structure we have used CST-MW and to compare the obtained simulation results we have conducted another electromagnetic simulation by using HFSS solver. The final circuit validated into simulation has been fabricated and tested which permits to validate the proposed multiband antenna.
Analysis of S2 (Spherical) Geometry Library Algorithm for GIS Geocoding Engineering Risma Ekawati; Untung Suprihadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6985

Abstract

Geocoding is a common technique to transform address information into digital latitude/longitude format. One of the engineering conversions can be used is Google Maps based on S2 (Spherical) Geometry Library algorithm. This journal explains the quality analysis of the algorithm using geocoding quality matrix testing from hundreds of address data samples particularly on three cities in Indonesia-Jakarta, Bandung, and Balikpapan. However, the result of this research concludes that completeness of address information will affect its overall fourth matrix quality and the linkages of it such as transform success rate, landmark exactness, the score of accuracy and range of radius in meter.
A Survey on Knowledge Transfer between Knowledge-based Systems Nyoman Karna; Iping Supriana; Nur Maulidevi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6517

Abstract

The paper aims to clarify differences in knowledge sharing mechanisms between Knowledge-based Systems, including knowledge management system, web page-based knowledge, and expert system, in the hope that we can establish an automatic knowledge transfer between autonomous systems. This study lays the foundation for knowledge transfer mechanism where an autonomous Knowledge-based System may enhance its knowledge by using other system's knowledge. To design a knowledge transfer mechanism, the paper do a literature study by comparing three well-known protocols for knowledge sharing, OAI-PMH for knowledge management system, SPARQL for web page-based knowledge, and KQML for the expert system. The object of comparison is within three aspects, first is the ability to find another system, the second is knowledge retrieval from chosen system and third is how to add new knowledge into the system. The paper suggests that each protocol has its own strength and weakness, but when it comes to knowledge transfer, KQML covers more features. Therefore, based on this finding, the paper proposes a new model for autonomous knowledge transfer using KQML to enhance one Knowledge-based System's own knowledge.
File Encryption and Hiding Application Based on AES and Append Insertion Steganography G. C. Prasetyadi; R. Refianti; A. B. Mutiara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6409

Abstract

Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue