cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 63 Documents
Search results for , issue "Vol 17, No 3: June 2019" : 63 Documents clear
Markerless motion capture for 3D human model animation using depth camera Maulahikmah Galinium; Jason Yapri; James Purnama
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.8939

Abstract

3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to the long time interval and the need of high expertise in 3D animation, motion capture devices were used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time (only 2.6%) and cost (30%) in the long run (10 minutes of animation) compare to keyframe-based system, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system.
Lightweight IoT middleware for rapid application development A. Karim Mohamed Ibrahim; Rozeha A. Rashid; A. Hadi Fikri A. Hamid; M. Adib Sarijari; Muhammad Ariff Baharudin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11793

Abstract

Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
Multicast routing protocol for advanced vehicular ad hoc networks Omar Saeed Al Mushayt; Wajeb Gharibi; Nasrullah Armi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10240

Abstract

Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, vehicular ad hoc networks (VANETs), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS) awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
Formal expansion method for solving an electrical circuit model Tjendro Tjendro; Sudi Mungkasi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10318

Abstract

We investigate the validity of the formal expansion method for solving a second order ordinary differential equation raised from an electrical circuit problem. The formal expansion method approximates the exact solution using a series of solutions. An approximate formal expansion solution is a truncated version of this series. In this paper, we confirm using simulations that the approximate formal expansion solution is valid for a specific interval of domain of the free variable. The accuracy of the formal expansion approximation is guaranteed on the time-scale 1.
Clustering analysis of learning style on anggana high school student Siti Lailiyah; Ekawati Yulsilviana; Reza Andrea
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9101

Abstract

The inability of students to absorb the knowledge conveyed by the teacher is’nt caused by the inability of understanding and by the teacher which isn’t able to teach too, but because of the mismatch of learning styles between students and teachers, so that students feel uncomfortable in learning to a particular teacher. It also happens in senior high school (SHS/SMAN) 1 Anggana, so it is necessary to do this research, to analyze cluster (group) of student learning style by applying data mining method that is k-Means and Fuzzy C-Means. The purpose was to know the effectiveness of this learning style cluster on the development of absorptive power and improving student achievement. The method used to cluster the learning style with data mining process starts from the data cleaning stage, data selection, data transformation, data mining, pattern evolution, and knowledge development.
Lung diseases detection caused by smoking using support vector machine Sri Widodo; Ratnasari Nur Rohmah; Bana Handaga; Liss Dyah Dewi Arini
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9799

Abstract

Type of lung disease is very much manifold, but type of lung disease caused by smoking there are only 4, namely Bronchitis, Pneumonia, Emphysema and Lung Cancer. Doctors usually diagnose lung disease from CT scans using the naked eye, then interpret data one by one.This procedure is not effective. The aim of this research is improvement accuracy of lung diseases detection caused by smoking using support vector machine on computed tomography scan (CT scan) images. This study includes 4 (four) main points. First is the development of software for segmentation of lung organ automatically using Active Shape Model (ASM) method. Second is the segmentation of candidates who are considered illness by using Morphology Mathematics. The third process of lung disease detection using Support Vector Machine (SVM). Fourth is visualization of disease or lung disorder using Volume Rendering.
Performance analysis of tunnel broker through open virtual private network Rendy Munadi; Danu Dwi Sanjoyo; Doan Perdana; Fidar Adjie
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12231

Abstract

Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker development is done in BCN Telkom Laboratory Network. The measurement results show that TCP and UDP throughput of IPv6 is slightly higher than IPv4. The research using OpenVPN as a server Tunnel Broker for client access to the server is still rarely done, especially in the field of the network based on Internet Protocol.
Wireless sensor network based monitoring system for precision agriculture in Uzbekistan Farruh Muzafarov; Abdimurod Eshmuradov
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11513

Abstract

The last decades the WSN technology has been adopted by more and more scientific fields for accurate and effective monitoring of climate phenomena like air pollution, destruction phenomena like landslides, etc. It has been widely used in agriculture for field monitoring. WSN is an emerging technology, which through the research in the labs and the real deployments has been proved to be a significant and valuable tool for scientists to explore another world which is behind the various environmental phenomena using tiny sensor nodes In this article, "Expert Advisory System" was developed to improve the productivity of farmers, save their time and improve the efficiency of the crops. The system monitors real-time crop fields using wireless sensor networks and provides the necessary information to farmers via the Internet. The farmer will be required to undertake the necessary remedial action on the basis of the information received. It’s also provided that the simulation of WSN in Contiki Simulator tool. Moreover, the queing model for WSN to also considered in this work.
Parallel random projection using R high performance computing for planted motif search Lala Septem Riza; Tyas Farrah Dhiba; Wawan Setiawan; Topik Hidayat; Mahmoud Fahsi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11750

Abstract

Motif discovery in DNA sequences is one of the most important issues in bioinformatics. Thus, algorithms for dealing with the problem accurately and quickly have always been the goal of research in bioinformatics. Therefore, this study is intended to modify the random projection algorithm to be implemented on R high performance computing (i.e., the R package pbdMPI). Some steps are needed to achieve this objective, ie preprocessing data, splitting data according to number of batches, modifying and implementing random projection in the pbdMPI package, and then aggregating the results. To validate the proposed approach, some experiments have been conducted. Several benchmarking data were used in this study by sensitivity analysis on number of cores and batches. Experimental results show that computational cost can be reduced, which is that the computation cost of 6 cores is faster around 34 times compared with the standalone mode. Thus, the proposed approach can be used for motif discovery effectively and efficiently.
A new agglomerative hierarchical clustering to model student activity in online learning Agung Triayudi; Iskandar Fitri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9425

Abstract

In this paper, a new technique of agglomerative hierarchical clustering (AHC), which is known as SLG (single linkage dissimilarity increment distribution, global cumulative score standard), can work well in analyzing students' activity in online learning as evidenced by obtaining the highest score in testing the validity index of cophenetic correlation coefficient (CPCC) ie 0.9237, 0.9015, 0.9967, 0.8853, 0.9875 of the five datasets compared with conventional agglomerative hierarchical clustering methods.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue