TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
64 Documents
Search results for
, issue
"Vol 17, No 2: April 2019"
:
64 Documents
clear
Indonesian license plate recognition based on area feature extraction
Fitri Damayanti;
Sri Herawati;
Imamah Imamah;
Fifin Ayu M;
Aeri Rachmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9017
The main principle of license plate recognition is to recognize the characters in the license plate which indicates the identity of the vehicle. This research will provide a system which can be implemented to the automatic payment in highway. Indonesian license plate consists of two parts, every of which has certain characters. These characters may become problem in the recognition process. Another problem is on the type of the license plate since Indonesia applies different color for every type of vehicle. In this research, different approaches are employed in the recognition of license plate; that is using character area as the feature value, also known as feature area, and K-Nearest Neighbor (KNN) as classification method. In addition, another method that has been used in our previous research is also employed to detect the character of license plate. The result shows very significant accuracy of 99.44%. In the process of recognition, scenario 1 gives the best accuracy at the K-1 value; that is 68.57% on the license plate and 92.72% on the characters of license plate. In the scenario 2 was obtained the license plate accuracy of 52% and license plate character accuracy of 89.36% with K-5. The system ran in a relatively short computational time.
Application of gabor transform in the classification of myoelectric signal
Jingwei Too;
A. R. Abdullah;
N. Mohd Saad;
N. Mohd Ali;
T. N. S. Tengku Zawawi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9257
In recent day, Electromyography (EMG) signal are widely applied in myoelectric control. Unfortunately, most of studies focused on the classification of EMG signals based on healthy subjects. Due to the lack of study in amputee subject, this paper aims to investigate the performance of healthy and amputee subjects for the classification of multiple hand movement types. In this work, Gabor transform (GT) is used to transform the EMG signal into time-frequency representation. Five time-frequency features are extracted from GT coefficient. Feature extraction is an effective way to reduce the dimensionality, as well as keeping the valuable information. Two popular classifiers namely k-nearest neighbor (KNN) and support vector machine (SVM) are employed for performance evaluation. The developed system is evaluated using the EMG data acquired from the publicy available NinaPro Database. The results revealed that the extracting GT features can achieve promising performance in the classification of EMG signals.
Comparative study of 940 nm and 1450 nm near infrared sensor for glucose concentration monitoring
Kiki Prawiroredjo;
Engelin Shintadewi Julian
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.10149
In order to manage their blood glucose level, diabetics have to test their blood glucose level regularly. Unfortunately, the current blood glucose measurement device is uncomfortable, painful, event costly for the diabetics; therefore, a lot of effort is given to develop a noninvasive blood glucose meter. We studied the potential of two near infrared wavelength i.e. 1450 and 940 nm as glucose sensor. Each sensor consists of a light emitting diode (LED) as light source, a photodiode that is sensitive to that wavelength, transimpedance amplifier, and filters. An acrylic box size 5cmx1cmx5cm was used as glucose solution container. The LED and photodiode were located at each side of box width, at 1 cm distance. The container was than filled with various concentrations of glucose solution, and the sensor output voltages were measured. The results show that for glucose concentration 0 to 500 mg/dl, the output voltages of the 1450 nm sensor tend to lower when the glucose concentration is higher, therefore it has the potential to be used as glucose sensor. Different result is obtained from the 940 nm sensor where the output voltages were remained the same when the glucose concentration was varied.
Auto purchase order system between retailer and distributor
Teguh Andriyanto;
Ary Permatadeny Nevita
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9948
Uncertainty of goods inventory often triggers the occurrence of Bullwhip Effect, where there is accumulation of goods on a stage or lack of goods at another stage in the supply chain. Bullwhip Effect is caused by an error in ordering the amount of goods, error in the time of ordering or delivery of goods. The problem can be solved using information sharing. This research utilizing information sharing between two retailers and one distributors used for the ordering process of goods. The process of ordering goods retailers to distributors is done automatically based on sales data retailers. The order quantity is calculated based on the final stock and the maximum stock value of the goods.
Security risk analysis of bring your own device system in manufacturing company at Tangerang
Astari Retnowardhani;
Raziv Herman Diputra;
Yaya Sudarya Triana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.10165
Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. XYZ company as a manufacturing company in Tangerang, Indonesia has been used BYOD system in their company. They want to improve the security of the system with do risk analysis, with the aim to protect the internal data. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system. The analysist results obtained by the use of cybersecurity analysis on BYOD system in XYZ company are found some improvement need to develop in terms of security system recommended. According to the stages of respond with the analysis using Cybersecurity NIST framework and ISO/IEC 27002:2013.
Influence of input power in Ar/H2 thermal plasma with silicon powder by numerical simulation
Yulianta Siregar;
Yasunori Tanaka;
Yoshihiko Uesugi;
Tatsuo Ishijima
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.10533
Numerical simulation in inductively coupled thermal plasma was made on the temperature distribution in argon (Ar)+hydrogen (H2) induction thermal plasma torch with silicon (Si) powder injection to obtain the temperature distribution and gas flow fields. The ICTP model was used in this research because it has benefit of good repeatability and no contamination process. Interactions between ICTP and injected powder are very complicated to be understood only by related experiments. Influence of input power in ICTP was numerically investigated on thermal plasma temperature fields and powder evaporation. The temperature distributions of thermal plasma and Si vapor distribution were compared at input powers of 20 kW, 30 kW, and 40 kW. Results indicated that higher input power increases the temperature of the thermal plasma with doughnut shape but it slightly enhances evaporation of the powder at the center axis of the plasma torch.
Dashboard settings design in SVARA using user-centred design method
Muhammad Yusril Helmi Setyawan;
Rolly Maulana Awangga;
Rezka Afriyanti
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.8762
SVARA is the first Social Media audio application in Indonesia developed by PT. Zamrud Teknologi Khatulistiwa. At present, this application does not have feature settings to display content and other basic settings on the user's side. This situation results in users not having the role to manage the appearance of the dashboard according to their preferences. Settings are done entirely by administrators using scripts and must take APIs with regular PHP scripts. And this is very troublesome. So to give a role to the view of user management, the application needs to be made a dashboard setting feature as a follow-up. Through this paper, the researchers propose designing this dashboard feature using the User-Centered Design (UCD) method. The design results show that this method has a positive correlation with user involvement support in the application development process.
Guillou-quisquater protocol for user authentication based on zero knowledge proof
Kevin Kusnardi;
Dennis Gunawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.11754
Authentication is the act of confirming the validity of someone’s personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms were used: file-based certificate with key and local storage. Testing phase was carried out based on the Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the medium level.
State-space averaged modeling and transfer function derivation of DC-DC boost converter for high-brightness led lighting applications
Muhammad Wasif Umar;
Norzaihar Yahaya;
Zuhairi Baharudin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.10272
This paper presents dynamic analysis of a boost type DC-DC converter for high-brightness LED (HBLED) driving applications. The steady state operation in presence of all system parasitics has been discussed for continuous conduction mode (CCM). The state-space averaging, energy conservation principle and standard linearization are used to derive ac small signal control to inductor current open-loop transfer function of the converter. The derived transfer function can be further used in designing a robust feed-back control network for the system. In the end frequency and transient responses of the derived transfer function are obtained for a given set of component values, hence to provide a useful guide for control design engineers.
A decentralized paradigm for resource-aware computing in wireless Ad hoc networks
Heerok Banerjee;
S. Murugaanandam;
V. Ganapathy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9621
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacy-critical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.