TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
63 Documents
Search results for
, issue
"Vol 17, No 4: August 2019"
:
63 Documents
clear
Real interpolation method for transfer function approximation of distributed parameter system
Phu Tran Tin;
Minh Tran;
Le Anh Vu;
Nguyen Quang Dung;
Tran Thanh Trang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11088
Distributed parameter system (DPS) presents one of the most complex systems in the control theory. The transfer function of a DPS possibly contents: rational, nonlinear and irrational components. This thing leads that studies of the transfer function of a DPS are difficult in the time domain and frequency domain. In this paper, a systematic approach is proposed for linearizing DPS. This approach is based on the real interpolation method (RIM) to approximate the transfer function of DPS by rational-order transfer function. The results of the numerical examples show that the method is simple, computationally efficient, and flexible.
Space charges analysis on insulator with uniform layer contamination effect
Mohd Haris Asyraf Shee Kandar;
Nor Akmal Mohd Jamail;
Qamarul Ezani Kamarudin;
Nordiana Azlin Othman;
Nor Asiah Muhamad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12765
High voltage direct current (HVDC) transmission provides an attractive alternative for bulk power transfer. However, HVDC transmission may have loss about half per unit length of high voltage alternating current (HVAC) at the same amount of power carried. This is due to the space charge formation around the conductor in HVDC cables. It is known that the presence of space charge inside an insulator may distort the local electric field and surface energy. This paper investigates the effect of electrostatics for space charge, electric field and surface energy in the HVDC cable in clean and contaminated conditions. The effect of uniform layer contamination from oil, sandstone and fresh water was conducted on 11 kV XLPE cable using finite element software under electrostatics study. The contamination layer was created around the XLPE cable by multifarious the radius of layer contamination from the conductor. The simulation results show that enlargement of contamination layer radius by 1.0 mm (light), 1.5 mm (medium) and 2.0 mm (heavy) resulted in the reduction of surface energy by 20% and electric field by 22% but increase the space charge amplitude by 76%. The study also found that fresh water can be considered as the worst contamination compared to oil and sandstone.
Solving one-dimensional unconstrained global optimization problem using parameter free filled function method
Ismail Bin Mohd;
Yosza Dasril;
Ridwan Pandiya;
Herlina Napitupulu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.10885
It is generally known that almost all filled function methods for one-dimensional unconstrained global optimization problems have computational weaknesses. This paper introduces a relatively new parameter free filled function, which creates a non-ascending bridge from any local isolated minimizer to other first local isolated minimizer with lower or equal function value. The algorithm’s unprecedented function can be used to determine all extreme and inflection points between the two considered consecutive local isolated minimizers. The proposed method never fails to carry out its job. The results of the several testing examples have shown the capability and efficiency of this algorithm while at the same time, proving that the computational weaknesses of the filled function methods can be overcomed.
Depression and anxiety detection through the closed-loop method using DASS-21
Setiyo Budiyanto;
Harry Candra Sihombing;
Fajar Rahayu I. M.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12619
The change of information and communication technology has brought many changes in daily life. The way humans interacting is changing. It is possible to express each form of communication directly and instantly. Social media has contributed data in size, diversity and capacity and quality. Based on it, the idea was to see and measure the tendency of depression and anxiety through social media using the Closed-Loop method using Facebook text mining posts. Through the stages of pre-processing including text extraction using the Naïve Bayes machine learning model for text classification, the early signs of depression and anxiety are measured using DASS-21 parameter. In total, 22,934 Facebook posts were contributed as training and learning data collected from July 2017 until July 2018. As a results, analysis and mapping of social demographics of users that are usually as a trigger of depression, and anxiety, such as grief, illness, household affairs, children education and others are available.
Signal processing with frequency and phase shift keying modulation in telecommunications
Juliy Boiko;
Volodymyr Tolubko;
Oleg Barabash;
Oleksander Eromenko;
Yevhen Havrylko
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12168
In this paper represents research improving effectiveness of signal processing in telecommunication devices especially for its part, which relates to providing its noise resistance in conditions of noise and interference. This objective has been achieved through development of methods and means for optimization of filtering devices and semigraphical interpretation of clock synchronization systems in telecommunications with frequency shift keying on the base of stochastic models what determines relevance of the subject. Separately, in an article considered the urgent task is using of modified synchronization methods based on the interference influence of adjacent symbols on the phase criterion tract, in particular the use of the modified synchronization scheme, in order to get a formalized outlook representation of the synchronization schemas based on the polyphase structures with using a bank of filters, that allows to improve the characteristics of digital telecommunication channels. This work is devoted to the examination and modeling of these ways. The proposed ideas and results for the construction of synchronization systems can be used in modern means of telecommunication.
Designing a constellation for AIS mission based on data acquisition of LAPAN-A2 and LAPAN-A3 satellites
Mohammad Mukhayadi;
Abdul Karim;
Wahyudi Hasbi;
Rizki Permala
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12048
Indonesia requires a maritime surveillance system that's capable to monitor its extensive waters territorial. One of the maritime standard navigation systems named AIS (Automatic Identification System), which is based on GPS and VHF digital communication, have enabled the ship monitoring in a real-time. By placing AIS receiver on the satellite, its coverage will be larger compared to the one usually placed on the seashore by maritime authority. Orbiting the AIS receiver prompted appearing the limitation of Time Division Multiple Access (TDMA) technology so the probability of ship detection would decrease drastically due to a huge number of heard ship signal simultaneously. This paper describes the design of satellite constellation for Indonesian maritime surveillance based on the result of the AIS data acquisition by LAPAN-A2 and LAPAN-A3 satellites that operate in both equatorial and polar orbit.
Live forensics of tools on android devices for email forensics
Rusydi Umar;
Imam Riadi;
Bashor Fauzan Muthohirin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11748
Email is one communication technology that can be used to exchange information, data, and etc. The development of email technology not only can be opened using a computer but can be opened using an smartphone. The most widely used smartphone in Indonesian society is Android. Within a row, the development technology of higher cybercrime such as email fraud catching cybercrime offenders need evidence to be submitted to a court, for obtain evidence can use tools like Wireshark and Networkminer to analyzing network traffic on live networks. Opportunity, we will do a comparison of the forensic tools it to acquire digital evidence. The subject of this research focused on Android-based email service to get as much digital evidence as possible on both tools. This process uses National Institute of Standards and Technology method. The results of this research that networkminer managed to get the receiving port, while in Wireshark not found.
Machine vision based smart parking system using Internet of Things
Daniel Ng Chiu Loong;
Suhaila Isaak;
Yusmeeraz Yusof
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12772
It is expected that in the next decade, majority of world population will be living in cities. Better public services and infrastructures in the city are needed to cope with the booming population. City vehicles that cruising for parking have indirectly causing traffic, making one harder to travel around the city. Thus, a smart parking system can certainly lays the foundation to build a smart city. This paper proposed a cost-effective IoT smart parking system to monitor city parking space and provide real-time parking information to drivers. Moreover, instead of the conventional approach that uses embedded sensors to detect vehicles in the parking area, camera image and machine vision technology are used to obtain the parking status. In the prototype, twenty outdoor parking lots are covered using a 5 megapixel camera connected to Raspberry Pi 3 installed at the 5th floor of the nearby building. Machine vision in this project that involved motion tracking and Canny edge detection are programmed in Python 2 using OpenCV technology. Corresponding data is uploaded to an IoT platform called Ubidots for possible monitoring activity. An Android mobile application is designed for user to download real-time data of parking information. This paper introduces a low cost smart parking system with the overall detection accuracy of 96.40%. Also, the mobile application allows users to alert other car owners for any emergency incidents and double parking blockage. The developed system can provide a platform for users to search for empty car parking with ease and reduce the traffic issues such as illegal double parking especially in the urban area.
Imperceptible and secure image watermarking using DCT and random spread technique
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi;
Christy Atika Sari;
Nova Rijati
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.9227
Watermarking is a copyright protection technique, while cryptography is a message encoding technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking. Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is widely used in spread spectrum watermarking technique. Based on the experimental results and testing of the proposed method proved that imperceptibility and watermark security are increased. Improved imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness aspect is also maintained which has been proven by the excellent value of NCC.
Graphene field-effect transistor simulation with TCAD on top-gate dielectric influences
Muhamad Amri Ismail;
Khairil Mazwan Mohd Zaini;
Mohd Ismahadi Syono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12760
This paper presents the influence of top-gate dielectric material for graphene field-effect transistor (GFET) using TCAD simulation. Apart from silicon-based dielectric that is typically used for top-gate structure, other high-dielectric constant (high-k) dielectric materials namely aluminum oxide and hafnium oxide are also involved in the analysis deliberately to improve the electrical properties of the GFET. The unique GFET current-voltage characteristics against several top-gate dielectric thicknesses are also investigated to guide the wafer fabrication engineers during the process optimization stage. The improvement to critical electrical parameters of GFET in terms of higher saturation drain current and greater on/off current ratio shows that the use of high-k dielectric material with very thin oxide layer is absolutely necessary.