cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 63 Documents
Search results for , issue "Vol 17, No 4: August 2019" : 63 Documents clear
Dominated destinations of tourist inside Iraq using personal information and frequency of travel Rula Amjed; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11956

Abstract

Tourism today is one of the most important economic and social sectors in the world, which plays a prominent role in the development of countries. This importance has grown as an industry through the social media networks.In this paper, a proposed method has been introduced distinguish the main factors that impact the Frequency of Travel (FoT) among Iraq local tourists. Application (API) graphics and scrapy are utilized to collect information from TripAdvisor social network in a period of (2015-2018). The collected information are reprocessed and coded for the specified nominal data using tied rank. It is important to note that the adopted technique does not lose any data about the attribute and brings different properties beforehand obscure. Data mining ordinal logistic regression is used to extract user's behavior upon local tourism in Iraq. The expected outcome of this work is to discover out the effect of personal information and the type of places on the selection of the local touristic places in Iraq. The collected information was exploited to know the preferred local touristic trends, because there are no statistics on the number of domestic tourists in Iraq. The proposed model was used for analyzing personal information and types of preferred tourism places as a factors affecting frequency of travel in Iraq. The obtained results show the prediction of preferred touristic places by tourists in Iraq.
Automatic face and VLP’s recognition for smart parking system Reivind P. Persada; Suci Aulia; Burhanuddin D.; Sugondo H.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11746

Abstract

One of the concerning issues regarding smart city is Smart Parking. In Smart Parking, some researchers try to provide solutions and breakthroughs on several research topics among security systems, the availability of single space, an IoT framework, etc. In this study, we proposed a security system on Smart Parking based on face recognition and VLP’s (Vehicle License Plates) identification. In this research, SSIM (Structural Similarity) method as part of IQA has been applied due to its reliability and simple computation for face detection and recognition process. From the test results of 30 data, obtained the highest SSIM value 0.83 with the highest accuracy rate of 76.67%. That level of accuracy still has not reached the implementation standard of 99.9%. So that it still needs to be improved in the future studies, especially in the filtering noise section.
5G beam-steering 2×2 butler matrix with slotted waveguide antenna array Noorlindawaty Md. Jizat; Nazihah Ahmad; Zubaida Yusoff; Nuramirah Mohd Nor; Mursyidul Idzam Sabran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12777

Abstract

In this research paper, substrate integrated waveguide (SIW) was proposed as a technique by realizing bilateral edge walls to produce a compact 5G beam-steering antenna at 24 GHz. The beam forming network is produced using SIW directional coupler perform as 2×2 Butler Matrix (BM) fed with SIW slotted waveguide antenna array. The output signal is steered from -29 degrees and +29 degrees when the signal is fed to the respective input ports. If one of the input ports is fed, the signal is evenly distributed between the adjacent output ports with 90 degree constant phase shift. The compact size of directional coupler was designed by longitude slots on the surface of SIW substrate with bandwith of 16.85% at the operating frequency. The proposed antenna produce gain of 6.34 dB at operating frequency and the promising outcome of the beam steering make proposed design suitable for 5G communications especially with tracking capabilities.
Preliminary study of wireless balloon network using adaptive position tracking technology for post disaster event Irawan Dwi Wahyono; Irham Fadlika; A. N. Afandi; M. Rodhi Faiz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11955

Abstract

Limited resources in post-disaster areas, one of which is a communication where coordination needed for aid distribution in disaster areas. Wireless balloon technology as a solution for use in post-disaster areas. Bandwidth limitations and high delay in communication systems on wireless balloons create limitations in aid coordination, especially mobile device tracking on BPBD volunteers or officers. This research develops an effective communication system at the wireless balloon to track personal device officers in disaster areas that use cellular devices. This mobile device tracking system utilizes a wireless balloon using a publish-subscribe system on their mobile devices, namely volunteers as publishers and those responsible for disasters or communities as subscribers. To overcome the limitations of communication resources on cellular devices and wireless balloons using the Adaptive method on publish-subscribe called UM-Disaster. The results of this study, the UM-Disaster system for multi-cell tracking has an average efficiency of 40-63% for bandwidth and processor use on mobile devices at 51-70%.
Clustering and data aggregation scheme in underwater wireless acoustic sensor network Vani Krishnaswamy; Sunil Kumar S. Manvi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11379

Abstract

Underwater Wireless Acoustic Sensor Networks (UWASNs) are creating attentiveness in researchers due to its wide area of applications. To extract the data from underwater and transmit to watersurface, numerous clustering and data aggregation schemes are employed. The main objectives of clustering and data aggregation schemes are to decrease the consumption of energy and prolong the lifetime of the network. In this paper, we focus on initial clustering of sensor nodes based on their geographical locations using fuzzy logic. The probability of degree of belongingness of a sensor node to its cluster, along with number of clusters is analysed and discussed. Based on the energy and distance the cluster head nodes are determined. Finally using using similarity function data aggregation is analysed and discussed. The proposed scheme is simulated in MATLAB and compared with LEACH algorithm. The simulation results indicate that the proposed scheme performs better in maximizing network lifetime and minimizing energy consumption.
Minimizing harmonic distortion impact cause by CS using meta heuristic technique S. N. Syed Nasir; J. J. Jamian; M. W. Mustafa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12768

Abstract

Non-linear load in the distribution system has caused negative impact to its power quality especially on harmonic distortion. Charging Station (CS) is a non-linear load that widely promoted with the aim to support the continuous usage of Electric Vehicle (EV). This research is focusing on optimal placement and sizing of multiple passive filter to mitigate harmonic distortion due to CS usage at distribution system. There are 6 units of CS which being placed in low voltage buses which indirectly will inject harmonic to the system during charging. Power system harmonic flow, passive filter, CS, battery and the analysis will be model in MATLAB. Multi-objective function which are weight summation approach (WSA) and Pareto Front are used to assist meta heuristic technique which is Modified Lightning Search Algorithm (MLSA) to identify optimum location and sizing of passive filter based on improvement on propose five parameters. From the result, the optimal placements and sizing of passive filter able to reduce the maximum Total Harmonic Distortion (THD) for voltage, current and apparent losses respectively. Therefore, the propose method is suitable to reduce harmonic distortion as well as apparent losses at distribution system with present of CS.
Asynchronous agent-based simulation and optimization of parallel business Aziz Fajar; Riyanarto Sarno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.10846

Abstract

A Port Container Terminal (PCT) involves complex business processes which are carried out by at least four organizations, namely PCT Operator, Customer, Quarantine and Customs. Each organization produces event log data from the activities. The event log data from the four organizations contain synchronous and asynchronous activities. In this research, the four organizations are represented by four agents. By simulating this log data using agent based simulation, we get the performance of the current business process. The performance indicators gathered are time and cost which are needed to do the activity (task). After the simulation is complete, we found Asynchronous Waiting Time (AWT). AWT is waiting time which happens because the agent in the simulation cannot do the newly assigned task because the agent is still working on the other task. Therefore, we parallelize the task performed by the agent so that the agent can do multiple tasks at a time. After we parallelize the task, we perform an optimization process using Stochastic Multicriteria Adaptability Analysis 2 (SMAA-2). Thus, the optimal amount of task an agent can do simultaneously is analyzed. This study result shows that parallelization can reduce AWT of the current system and the optimization process using SMAA-2 shows the most optimal number of multiple tasks an agent can do simultaneously.
Online video-based abnormal detection using highly motion techniques and statistical measures Ahlam Al-Dhamari; Rubita Sudirman; Nasrul Humaimi Mahmood; Nor Hisham Khamis; Azli Yahya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12753

Abstract

At the essence of video surveillance, there are abnormal detection approaches, which have been proven to be substantially effective in detecting abnormal incidents without prior knowledge about these incidents. Based on the state-of-the-art research, it is evident that there is a trade-off between frame processing time and detection accuracy in abnormal detection approaches. Therefore, the primary challenge is to balance this trade-off suitably by utilizing few, but very descriptive features to fulfill online performance while maintaining a high accuracy rate. In this study, we propose a new framework, which achieves the balancing between detection accuracy and video processing time by employing two efficient motion techniques, specifically, foreground and optical flow energy. Moreover, we use different statistical analysis measures of motion features to get robust inference method to distinguish abnormal behavior incident from normal ones. The performance of this framework has been extensively evaluated in terms of the detection accuracy, the area under the curve (AUC) and frame processing time. Simulation results and comparisons with ten relevant online and non-online frameworks demonstrate that our framework efficiently achieves superior performance to those frameworks, in which it presents high values for he accuracy while attaining simultaneously low values for the processing time.
Pre-filters in-transit malware packets detection in the network Ban Mohammed Khammas; Ismahani Ismail; M. N. Marsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12065

Abstract

Conventional malware detection systems cannot detect most of the new malware in the network without the availability of their signatures. In order to solve this problem, this paper proposes a technique to detect both metamorphic (mutated malware) and general (non-mutated) malware in the network using a combination of known malware sub-signature and machine learning classification. This network-based malware detection is achieved through a middle path for efficient processing of non-malware packets. The proposed technique has been tested and verified using multiple data sets (metamorphic malware, non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in the network-based before they reached the host better than the previous works which detect malware in host-based. Experimental results showed that the proposed technique can speed up the transmission of more than 98% normal packets without sending them to the slow path, and more than 97% of malware packets are detected and dropped in the middle path. Furthermore, more than 75% of metamorphic malware packets in the test dataset could be detected. The proposed technique is 37 times faster than existing technique.
FPGA-based implementation of speech recognition for robocar control using MFCC Bayuaji Kurniadhani; Sugondo Hadiyoso; Suci Aulia; Rita Magdalena
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12615

Abstract

This research proposes a simulation of the logic series of speech recognition on the MFCC (Mel Frequency Spread Spectrum) based FPGA and Euclidean Distance to control the robotic car motion. The speech known would be used as a command to operate the robotic car. MFCC in this study was used in the feature extraction process, while Euclidean distance was applied in the feature classification process of each speech that later would be forwarded to the part of decision to give the control logic in robotic motor. The test that has been conducted showed that the logic series designed was precise here by measuring the Mel Frequency Warping and Power Cepstrum. With the achievement of logic design in this research proven with a comparison between the Matlab computation and Xilinx simulation, it enables to facilitate the researchers to continue its implementation to FPGA hardware.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue