cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 54 Documents
Search results for , issue "Vol 16, No 2: April 2018" : 54 Documents clear
File Reconstruction in Digital Forensic Opim Salim Sitompul; Andrew Handoko; Romi Fadillah Rahmat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8230

Abstract

File recovery is one of the stages in computer forensic investigative process to identify an acquired file to be used as digital evident. The recovery is performed on files that have been deleted from a file system. However, in order to recover a deleted file, some considerations should be taken. A deleted file is potentially modified from its original condition because another file might either partly or entirely overriding the file content. A typical approach in recovering deleted file is to apply Boyer-Moore algorithm that has rather high time complexity in terms of string searching. Therefore, a better string matching approach for recovering deleted file is required. We propose Aho-Corasick parsing technique to read file attributes from the master file table (MFT) in order to examine the file condition. If the file was deleted, then the parser search the file content in order to reconstruct the file. Experiments were conducted using several file modifications, such as 0% (unmodified), 18.98%, 32.21% and 9.77%. From the experimental results we found that the file reconstruction process on the file system was performed successfully. The average successful rate for the file recovery from four experiments on each modification was 87.50% and for the string matching process average time on searching file names was 0.32 second.
Alternative Grounding Method Using Coconut Shell Charcoal as Media of Mesh Electrodes Moch Dhofir; Rini Nur Hasanah; Hadi Suyono; Avrizal Riva Belan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8700

Abstract

The utilization of coconut charcoal as alternative media of grounding was investigated. The mesh-electrode was made of stainless steel of 8-mm diameter, whereas its lattice dimension was 50cmx50cm. Four variations of lattice number were considered, i.e. 1-, 2-, and 4-lattice structures. Dry and wet charcoal media were considered. Mesh location was fixed in the depth of 80cm under the ground, while the 10cm of medium thickness variation was chosen. The resistance obtained using 10-cm thickness of charcoal layer in a mesh consisting of 1-, 2-, and 4-lattices were 268, 131, and 78 ohms consecutively. The addition of layer up to 80-cm resulted in a resistance decrease of 48%, 33%, and 44%. Using wet charcoal, the 10-cm layer produced 26.5, 17.5, and 14.8 ohms of grounding resistance and a reduction of 25%, 10%, and 3.6% subsequently for 1-, 2-, and 4-lattice mesh structure if the layer thickness was 80 cm.
A Review of Methods Employed to Identify Flicker Producing Sources Jeevan Inamdar; K. Iyswarya Annapoorani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.6678

Abstract

Because of increasing requirements of the present consumers and industrial units utilizing sensitive loads, there is need of good power quality in order to retain the power quality standards. Nowadays the study of the voltage flicker is becoming essential part of power quality studies. The flicker is typically the effect of a rapidly changing load which is large with respect to the short circuit ability of an electrical supply system. The inferior effects of voltage flicker include malfunctioning of power electronic equipment. Also it causes annoying effects to human. Hence detection of the flicker source is an essential step in the power quality assessment process. This paper delivers a review about methods used to identify flicker producing loads in accordance with IEC 61000-4-15. Once the report related to the disturbance place is known, an investigation and corrective action can be accordingly carried out. Also a method based upon Discrete Wavelet Transform and Artificial Neural Network is proposed to detect initial instance of occurrence of flicker.
Design and Analysis of Ku/K-band Circular SIW Patch Antenna using 3D EM-based Artificial Neural Networks Mohammed Chetioui; Abdelhakim Boudkhil; Nadia Benabdellah; Nasreddine Benahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8011

Abstract

Substrate Integrated Waveguide (SIW) antennas are considered as main radiators for RF and microwave wireless systems due to their low profile, low cost and soft integration with the other devices. The gain of a SIW patch antenna may be enhanced using different techniques such as Artificial Neural Networks (ANN) by modifying the antenna’s geometry with high efficiency comparing to electromagnetic techniques that take more time. This paper describes a novel structure of a circular SIW patch antenna design using a tree-dimensional electromagnetic (3D-EM) simulation based on ANN model which is developed as an accurate tool for synthesizing the forward side and then analyzing the reverse side of the problem. In this work, ANN algorithms are used for training the samples to provide precise geometrical dimensions of the SIW patch antenna with high accuracy for the target requirements. The antenna is designed to operate in Ku and K frequency bands, resonate at 16.10 GHz and 19.81 GHz respectively and show good performance resulting in low return losses of less than -10dB to -29dB for the selective frequency bands.
Improved Routing Protocol in Mobile Ad Hoc Networks Using Fuzzy Logic Seyed Amin Hosseini Seno; Ali Abdi Seyedkolaei
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.6426

Abstract

In mobile ad hoc networks, route selection is one of the most important issues that is studied in these networks as a field of research. Many articles trying to provide solutions to choose the best path in which the important parameters such as power consumption, bandwidth and mobility are used. In this article, in order to improve the solutions presented in recent papers parameters such as power remaining, mobility, degree node and available bandwidth are used by taking the factors for each parameter in proportion to its influence in choosing the best path. Finally, we compare the proposed solution with the three protocols IAOMDV-F, AODVFART and FLM-AODV with the help of OPNET simulation program based on network throughput, routing discovery time, the average number of hops per route, network delay.
Finite Element Simulation of Microfluidic Biochip for High Throughput Hydrodynamic Single Cell Trapping Amelia Ahmad Khalili; Mohd Ariffanan Mohd Basri; Mohd Azhar Abdul Razak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.9023

Abstract

In this paper, a microfluidic device capable of trapping a single cell in a high throughput manner and at high trapping efficiency is designed simply through a concept of hydrodynamic manipulation. The microfluidic device is designed with a series of trap and bypass microchannel structures for trapping individual cells without the need for microwell, robotic equipment, external electric force or surface modification. In order to investigate the single cell trapping efficiency, a finite element model of the proposed design has been developed using ABAQUS-FEA software. Based on the simulation, the geometrical parameters and fluid velocity which affect the single cell trapping are extensively optimized. After optimization of the trap and bypass microchannel structures via simulations, a single cell can be trapped at a desired location efficiently.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Microcontroller Arduino Magdin Martin; Koprda Štefan; Ferenczy Ľubor
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.7572

Abstract

The idea of security is as old as humanity itself. Between oldest methods of security were included simple mechanical locks whose authentication element was the key. At first, a universal–simple type, later unique for each lock. A long time had mechanical locks been the sole option for protection against unauthorized access. The boom of biometrics has come in the 20th century, and especially in recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create a system that is capable of recognizing fingerprints from a user and then processing them. The main part of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint with a name Adafruit R305 (special reader). This microcontroller communicates with the external database, which ensures the exchange of data between Arduino Yun and user application. This application was created for (currently) most widespread mobile operating system-Android.
A Hybrid Formulation between Differential Evolution and Simulated Annealing Algorithms for Optimal Reactive Power Dispatch Farida Laouafi; Ahcene Boukadoum; Salah Leulmi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8434

Abstract

The aim of this paper is to solve the optimal reactive power dispatch (ORPD) problem. Metaheuristic algorithms have been extensively used to solve optimization problems in a reasonable time without requiring in-depth knowledge of the treated problem. The performance of a metaheuristic requires a compromise between exploitation and exploration of the search space. However, it is rarely to have the two characteristics in the same search method, where the current emergence of hybrid methods. This paper presents a hybrid formulation between two different metaheuristics: differential evolution (based on a population of solution) and simulated annealing (based on a unique solution) to solve ORPD. The first one is characterized with the high capacity of exploration, while the second has a good exploitation of the search space. For the control variables, a mixed representation (continuous/discrete), is proposed. The robustness of the method is tested on the IEEE 30 bus test system.
Driver Behaviour State Recognition based on Speech Norhaslinda Kamaruddin; Abdul Wahab Abdul Rahman; Khairul Ikhwan Mohamad Halim; Muhammad Hafiq Iqmal Mohd Noh
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8416

Abstract

Researches have linked the cause of traffic accident to driver behavior and some studies provided practical preventive measures based on different input sources. Due to its simplicity to collect, speech can be used as one of the input. The emotion information gathered from speech can be used to measure driver behavior state based on the hypothesis that emotion influences driver behavior. However, the massive amount of driving speech data may hinder optimal performance of processing and analyzing the data due to the computational complexity and time constraint. This paper presents a silence removal approach using Short Term Energy (STE) and Zero Crossing Rate (ZCR) in the pre-processing phase to reduce the unnecessary processing. Mel Frequency Cepstral Coefficient (MFCC) feature extraction method coupled with Multi-Layer Perceptron (MLP) classifier are employed to get the driver behavior state recognition performance. Experimental results demonstrated that the proposed approach can obtain comparable performance with accuracy ranging between 58.7% and 76.6% to differentiate four driver behavior states, namely; talking through mobile phone, laughing, sleepy and normal driving. It is envisaged that such approach can be extended for a more comprehensive driver behavior identification system that may acts as an embedded warning system for sleepy driver.
Reduced-reference Video Quality Metric Using Spatio-temporal Activity Information Farah Diyana Abdul Rahman; Ahmad Imran Ibrahim; Dimitris Agrafiotis
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.9044

Abstract

Monitoring and maintaining acceptable Quality of Experience is of great importance to video service providers.  Perceived visual quality of transmitted video via wireless networks can be degraded by transmission errors. This paper presents a reduced-reference video quality metric of very low complexity and overhead that makes use of frame based spatial (SI) and temporal (TI) activity levels to monitor the effect of channel errors on video transmitted over error prone networks. The performance of the metric is evaluated relative to that of a number of full and reduced reference metrics. The proposed metric outperforms some of the most popular full reference metrics whilst requiring very little overhead.

Filter by Year

2018 2018


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue