TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
64 Documents
Search results for
, issue
"Vol 17, No 2: April 2019"
:
64 Documents
clear
Electronically controlled radiation pattern leaky wave antenna array for (C band) application
Mowafak K. Mohsen;
M. S. M. Isa;
Z. Zakaria;
A. A. M. Isa;
M. K. Abdulhameed;
Mothana L. Attiah;
Ahmed M. Dinar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.11126
This paper provides an insight of a new, leaky-wave antenna (LWA) array. It holds the ability to digitally steer its beam at a fixed frequency by utilizing only two state of bias voltage. This is done with acceptable impedance matching while scanning and very little gain variation. Investigation is carried out on LWAs’ control radiation pattern in steps at a fixed frequency via PIN diodes switches. This study also presents a novel half-width microstrip LWA (HWMLWA) array. The antenna is made up of the following basic structures: two elements and reconfigurable control cell with each being comprised of two diodes and two triangle patches. A double gap capacitor in each unit cell is independently disconnected or connected via PIN diode switch to achieve fixed-frequency control radiation pattern. The reactance profile at the microstrip’s free edge and thus the main beam direction is changed once the control-cell states are changed. The main beam may be directed by the antenna between 61o and 19o at 4.2 GHz. C band achieved the measured peak gain of the antenna of 15 dBi at 4.2 GHz beam scanning range.
Face recognition smart cane using haar-like features and eigenfaces
Gita Indah Hapsari;
Giva Andriana Mutiara;
Husein Tarigan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.11772
Visually impaired has the limitation in interacting with another human. They usually use the sense of hearing and touching their face to recognize human. Face recognition is a technology that can be used to solve this problem. This paper develops a smart cane function by integrated face recognition feature on the cane using Haar-Like features and Eigenfaces. This paper proposed a portable, real time, and wearable product. Raspberry Pi supports portability that affects the delay and computing speed of face recognition algorithms. Utilization of Raspi camera on the eyes glasses is for wearable purposes. Voice output provides information on whether the face is caught on camera or not. This prototype works well during the face detection and recognition process. It needs 3 seconds for one-face recognized in range 0.25 until 1.5 meters from the camera, until the sound and information are generated. It needs is me 5 second for two faces recognized and 10 seconds for 3 faces recognized by a system in the same range between face and the camera. The accuracy reaches 91.67% for the up-right position face but for other position the accuracy is only 18% until 32%.
Nonlinearity compensation of low-frequency loudspeaker response using internal model controller
Erni Yudaningtyas;
Achsanul Khabib;
Waru Djuriatno;
Dionysius J. D. H. Santjojo;
Adharul Muttaqin;
Ponco Siwindarto;
Zakiyah Amalia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.11761
This paper presents the nonlinearity compensation of low-frequency loudspeaker response. The loudspeaker is dedicated to measuring the response of Electret Condenser Microphone which operated in the arterial pulse region. The nonlinearity of loudspeaker has several problems which cause the nonlinearity behaviour consists of the back electromagnetic field, spring, mass of cone and inductance. Nonlinearity compensation is done using the Internal Model Controller with voltage feedback linearization. Several signal tests consist of step, impulse and sine wave signal are examined on different frequencies to validate the effectiveness of the design. The result showed that the Internal Mode Controller can achieve the high-speed response with a small error value.
Usability of BLESS-implemented class room: a case study of mixtio
Desita Mustikaningrum;
Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.8999
Conventional learning system and e-learning have their own strengths and weaknesses. To combine both systems, blended learning is created. In Extention Program of Informatics Engineering Faculty at XYZ university most of the students already have jobs. As much 47.5 % of students who take this program have a job in daily office hours. Then, to facilitate the learning process the XYZ university develop learning management system (LMS) by Moodle. XYZ university want to make a learning process with blended learning concept. However, the Moodle sytem has limited function to adapt the blended learning system (BLS). In the aim to improve the class usability in BLS, then this study proposes to apply to Blended Learning System Structure (BLESS) into LMS design. BLESS is offered as a framework which matches to learning and uses a top-down approach. Then, the system design maed it “Mixtio”. At the end of this study, it can be seen the analysis result of the use of BLESS can improve system usability of LMS.
K-band waveguide T-junction diplexer for satellite communication
H. Setti;
A. Tribak;
A. El Hamichi;
J. Zbitou;
A. Mediavilla
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9205
Design and measurement of two waveguide diplexers on H-plane T-junction, are presented. The two diplexers structures consist of a waveguide H-plane T-junction and two waveguide obtained cavity filters. The two diplexers operate in the same frequency bands (17 GHz-19.5 GHz). The simulation results show that over the operating band of two filters, the return losses are better than 18 dB and insertion losses are lower than 0.05 dB. The proposed diplexers have been simulated using Mician μ Wave Wizard simulator based on the mode matching method (MMM). The diplexers have been validated experimentally and results are presented. Simulated and measured results show good agreement.
2FYSH: two-factor authentication you should have for password replacement
Sunderi Pranata;
Hargyo Tri Nugroho
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9187
Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets.
Adomian decomposition method for analytical solution of a continuous arithmetic Asian option pricing model
S. O. Edeki;
G. O. Akinlabi;
O. González-Gaxiola
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9179
One of the main issues of concern in financial mathematics has been a viable method for obtaining analytical solutions of the Black-Scholes model associated with Arithmetic Asian Option (AAO). In this paper, a proposed semi-analytical technique: Adomian Decomposition Method (ADM) is applied for the first time, for analytical solution of a continuous arithmetic Asian option model. The ADM gives the solution in explicit form with few iterations. The computational work involved is less. However, high level of accuracy is not neglected. The obtained solution conforms with those of Rogers and Shi (J. of Applied Probability 32: 1995, 1077-1088), and Elshegmani and Ahmad (ScienceAsia, 39S: 2013, 67–69). Thus, the proposed method is highly recommended for analytical solution of other versions of Asian option pricing models such as the geometric form for puts and calls, even in their time-fractional forms.
Analysis and investigation of a novel microwave sensor with high Q-factor for liquid characterization
Ammar Alhegazi;
Zahriladha Zakaria;
Noor Azwan Shairi;
Tole Sutikno;
Rammah A. Alahnomi;
Ahmed Ismail Abu-Khadrah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.11901
In this paper, a new design of microwave sensor with high Q-factor for liquid characterization is analyzed and investigated. The new microwave sensor is based on a gap waveguide cavity resonator (GWCR). The GWCR consists of upper plate, lower plate and array of pins on the lower plate. The liquid under test (LUT) is characterized by placing it inside the GWCR where the electric field concentrates using a quartz capillary that is passing through microfluidic channels. The results show that the proposed sensor has a high Q-factor of 4832. Moreover, the proposed sensor has the ability to characterize different types of liquids such as oils, ethanol, methanol and distilled water. The polynomial fitting method is used to extract the equation of the unknown permittivity of the LUT. The results show that the evaluated permittivity using the proposed sensor has a good agreement with the reference permittivity. Therefore, the proposed sensor is a good candidate for food and pharmaceutical applications.
A rapid classification of wheat flour protein content using artificial neural network model based on bioelectrical properties
Sucipto Sucipto;
Maffudhotul Anna;
Muhammad Arwani;
Yusuf Hendrawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9450
A conventional technique of protein analysis is laborious and costly. One rapid method used to estimate protein content is near infrared spectroscopy (NIRS), but the cost is relatively expensive. Therefore, it is necessary to find a cheaper alternative measurement such as measuring the bioelectrical properties. This preliminary study is a new rapid method for classified modeling of wheat flour protein content based on the bioelectrical properties. A backpropagation artificial neural network (ANN) was developed to classify the protein content of wheat flour. ANN input were bioelectrical properties, namely capacitance, and resistance and output was a type of the flour, namely hard, medium and soft flour. The result showed that the ANN model could classify the various type of flour. The best ANN model produces a mean square error (MSE) and regression correlation (R) of 0.0399 and 0.9774 respectively. This ANN model could classify the protein content of wheat flour based on the bioelectrical properties and have the potential to be used as a basic instrument to estimate the protein content.
Image forgery detection using error level analysis and deep learning
Ida Bagus Kresna Sudiatmika;
Fathur Rahman;
Trisno Trisno;
Suyoto Suyoto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.8976
Many images are spread in the virtual world of social media. With the many editing software that allows so there is no doubt that many forgery images. By forensic the image using Error Level Analysis to find out the compression ratio between the original image and the fake image, because the original image compression and fake images are different. In addition to knowing whether the image is genuine or fake can analyze the metadata of the image, but the possibility of metadata can be changed. In this case the authors apply Deep Learning to recognize images of manipulations through the dataset of a fake image and original images via Error Level Analysis on each image and supporting parameters for error rate analysis. The result of our experiment is that we get the best accuracy of training 92.2% and 88.46% validation by going through 100 epoch.