TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
63 Documents
Search results for
, issue
"Vol 17, No 4: August 2019"
:
63 Documents
clear
Dominated destinations of tourist inside Iraq using personal information and frequency of travel
Rula Amjed;
Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11956
Tourism today is one of the most important economic and social sectors in the world, which plays a prominent role in the development of countries. This importance has grown as an industry through the social media networks.In this paper, a proposed method has been introduced distinguish the main factors that impact the Frequency of Travel (FoT) among Iraq local tourists. Application (API) graphics and scrapy are utilized to collect information from TripAdvisor social network in a period of (2015-2018). The collected information are reprocessed and coded for the specified nominal data using tied rank. It is important to note that the adopted technique does not lose any data about the attribute and brings different properties beforehand obscure. Data mining ordinal logistic regression is used to extract user's behavior upon local tourism in Iraq. The expected outcome of this work is to discover out the effect of personal information and the type of places on the selection of the local touristic places in Iraq. The collected information was exploited to know the preferred local touristic trends, because there are no statistics on the number of domestic tourists in Iraq. The proposed model was used for analyzing personal information and types of preferred tourism places as a factors affecting frequency of travel in Iraq. The obtained results show the prediction of preferred touristic places by tourists in Iraq.
Automatic face and VLP’s recognition for smart parking system
Reivind P. Persada;
Suci Aulia;
Burhanuddin D.;
Sugondo H.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11746
One of the concerning issues regarding smart city is Smart Parking. In Smart Parking, some researchers try to provide solutions and breakthroughs on several research topics among security systems, the availability of single space, an IoT framework, etc. In this study, we proposed a security system on Smart Parking based on face recognition and VLP’s (Vehicle License Plates) identification. In this research, SSIM (Structural Similarity) method as part of IQA has been applied due to its reliability and simple computation for face detection and recognition process. From the test results of 30 data, obtained the highest SSIM value 0.83 with the highest accuracy rate of 76.67%. That level of accuracy still has not reached the implementation standard of 99.9%. So that it still needs to be improved in the future studies, especially in the filtering noise section.
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array
Noorlindawaty Md. Jizat;
Nazihah Ahmad;
Zubaida Yusoff;
Nuramirah Mohd Nor;
Mursyidul Idzam Sabran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12777
In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam forming network is produced using SIW directional coupler perform as 2×2 Butler Matrix (BM) fed with SIW slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed between the adjacent output ports with 90 degree constant phase shift. The compact size of directional coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the promising outcome of the beam steering make proposed design suitable for 5G communications especially with tracking capabilities.
Preliminary study of wireless balloon network using adaptive position tracking technology for post disaster event
Irawan Dwi Wahyono;
Irham Fadlika;
A. N. Afandi;
M. Rodhi Faiz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11955
Limited resources in post-disaster areas, one of which is a communication where coordination needed for aid distribution in disaster areas. Wireless balloon technology as a solution for use in post-disaster areas. Bandwidth limitations and high delay in communication systems on wireless balloons create limitations in aid coordination, especially mobile device tracking on BPBD volunteers or officers. This research develops an effective communication system at the wireless balloon to track personal device officers in disaster areas that use cellular devices. This mobile device tracking system utilizes a wireless balloon using a publish-subscribe system on their mobile devices, namely volunteers as publishers and those responsible for disasters or communities as subscribers. To overcome the limitations of communication resources on cellular devices and wireless balloons using the Adaptive method on publish-subscribe called UM-Disaster. The results of this study, the UM-Disaster system for multi-cell tracking has an average efficiency of 40-63% for bandwidth and processor use on mobile devices at 51-70%.
Clustering and data aggregation scheme in underwater wireless acoustic sensor network
Vani Krishnaswamy;
Sunil Kumar S. Manvi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.11379
Underwater Wireless Acoustic Sensor Networks (UWASNs) are creating attentiveness in researchers due to its wide area of applications. To extract the data from underwater and transmit to watersurface, numerous clustering and data aggregation schemes are employed. The main objectives of clustering and data aggregation schemes are to decrease the consumption of energy and prolong the lifetime of the network. In this paper, we focus on initial clustering of sensor nodes based on their geographical locations using fuzzy logic. The probability of degree of belongingness of a sensor node to its cluster, along with number of clusters is analysed and discussed. Based on the energy and distance the cluster head nodes are determined. Finally using using similarity function data aggregation is analysed and discussed. The proposed scheme is simulated in MATLAB and compared with LEACH algorithm. The simulation results indicate that the proposed scheme performs better in maximizing network lifetime and minimizing energy consumption.
Minimizing harmonic distortion impact cause by CS using meta heuristic technique
S. N. Syed Nasir;
J. J. Jamian;
M. W. Mustafa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12768
Non-linear load in the distribution system has caused negative impact to its power quality especially on harmonic distortion. Charging Station (CS) is a non-linear load that widely promoted with the aim to support the continuous usage of Electric Vehicle (EV). This research is focusing on optimal placement and sizing of multiple passive filter to mitigate harmonic distortion due to CS usage at distribution system. There are 6 units of CS which being placed in low voltage buses which indirectly will inject harmonic to the system during charging. Power system harmonic flow, passive filter, CS, battery and the analysis will be model in MATLAB. Multi-objective function which are weight summation approach (WSA) and Pareto Front are used to assist meta heuristic technique which is Modified Lightning Search Algorithm (MLSA) to identify optimum location and sizing of passive filter based on improvement on propose five parameters. From the result, the optimal placements and sizing of passive filter able to reduce the maximum Total Harmonic Distortion (THD) for voltage, current and apparent losses respectively. Therefore, the propose method is suitable to reduce harmonic distortion as well as apparent losses at distribution system with present of CS.
Asynchronous agent-based simulation and optimization of parallel business
Aziz Fajar;
Riyanarto Sarno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.10846
A Port Container Terminal (PCT) involves complex business processes which are carried out by at least four organizations, namely PCT Operator, Customer, Quarantine and Customs. Each organization produces event log data from the activities. The event log data from the four organizations contain synchronous and asynchronous activities. In this research, the four organizations are represented by four agents. By simulating this log data using agent based simulation, we get the performance of the current business process. The performance indicators gathered are time and cost which are needed to do the activity (task). After the simulation is complete, we found Asynchronous Waiting Time (AWT). AWT is waiting time which happens because the agent in the simulation cannot do the newly assigned task because the agent is still working on the other task. Therefore, we parallelize the task performed by the agent so that the agent can do multiple tasks at a time. After we parallelize the task, we perform an optimization process using Stochastic Multicriteria Adaptability Analysis 2 (SMAA-2). Thus, the optimal amount of task an agent can do simultaneously is analyzed. This study result shows that parallelization can reduce AWT of the current system and the optimization process using SMAA-2 shows the most optimal number of multiple tasks an agent can do simultaneously.
Online video-based abnormal detection using highly motion techniques and statistical measures
Ahlam Al-Dhamari;
Rubita Sudirman;
Nasrul Humaimi Mahmood;
Nor Hisham Khamis;
Azli Yahya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12753
At the essence of video surveillance, there are abnormal detection approaches, which have been proven to be substantially effective in detecting abnormal incidents without prior knowledge about these incidents. Based on the state-of-the-art research, it is evident that there is a trade-off between frame processing time and detection accuracy in abnormal detection approaches. Therefore, the primary challenge is to balance this trade-off suitably by utilizing few, but very descriptive features to fulfill online performance while maintaining a high accuracy rate. In this study, we propose a new framework, which achieves the balancing between detection accuracy and video processing time by employing two efficient motion techniques, specifically, foreground and optical flow energy. Moreover, we use different statistical analysis measures of motion features to get robust inference method to distinguish abnormal behavior incident from normal ones. The performance of this framework has been extensively evaluated in terms of the detection accuracy, the area under the curve (AUC) and frame processing time. Simulation results and comparisons with ten relevant online and non-online frameworks demonstrate that our framework efficiently achieves superior performance to those frameworks, in which it presents high values for he accuracy while attaining simultaneously low values for the processing time.
Pre-filters in-transit malware packets detection in the network
Ban Mohammed Khammas;
Ismahani Ismail;
M. N. Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12065
Conventional malware detection systems cannot detect most of the new malware in the network without the availability of their signatures. In order to solve this problem, this paper proposes a technique to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a combination of known malware sub-signature and machine learning classification. This network-based malware detection is achieved through a middle path for efficient processing of non-malware packets. The proposed technique has been tested and verified using multiple data sets (metamorphic malware, non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in the network-based before they reached the host better than the previous works which detect malware in host-based. Experimental results showed that the proposed technique can speed up the transmission of more than 98% normal packets without sending them to the slow path, and more than 97% of malware packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic malware packets in the test dataset could be detected. The proposed technique is 37 times faster than existing technique.
FPGA-based implementation of speech recognition for robocar control using MFCC
Bayuaji Kurniadhani;
Sugondo Hadiyoso;
Suci Aulia;
Rita Magdalena
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i4.12615
This research proposes a simulation of the logic series of speech recognition on the MFCC (Mel Frequency Spread Spectrum) based FPGA and Euclidean Distance to control the robotic car motion. The speech known would be used as a command to operate the robotic car. MFCC in this study was used in the feature extraction process, while Euclidean distance was applied in the feature classification process of each speech that later would be forwarded to the part of decision to give the control logic in robotic motor. The test that has been conducted showed that the logic series designed was precise here by measuring the Mel Frequency Warping and Power Cepstrum. With the achievement of logic design in this research proven with a comparison between the Matlab computation and Xilinx simulation, it enables to facilitate the researchers to continue its implementation to FPGA hardware.