TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
63 Documents
Search results for
, issue
"Vol 17, No 6: December 2019"
:
63 Documents
clear
Evaluation of the quality of an image encrytion scheme
Osemwegie Omoruyi;
Chinonso Okereke;
Kennedy Okokpujie;
Etinosa Noma-Osaghae;
Obinna Okoyeigbo;
Samuel John
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.10488
Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images.
Clarification of the optimum silica nanofiller amount for electrical treeing resistance
Z. Nawawi;
M. A. B. Sidik;
M. I. Jambak;
C. L. G. Pavan Kumar;
Aulia Aulia;
M. H. Ahmad;
A. A. Abd Jamil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.10605
This paper aims to clarify the optimum amount of fumed silica (SiO2) nanofiller in resisting the initiation and propagation of electrical treeing in silicone rubber (SiR). Unlike other works, SiR/SiO2 nanocomposites containing seven different weight percentages of SiO2 nanofiller were prepared for this purpose. To achieve the objective, the electrical tree characteristics of the SiR/SiO2 nanocomposites were investigated by comparing the tree initiation voltage, tree breakdown time, tree propagation length and tree growth rate with its equivalent unfilled SiR. Moreover, the structural and morphological analyses were conducted on the SiR/SiO2 nanocomposite samples. The results showed that the SiR, when added with an appropriate amount of SiO2 nanofiller, could result in an improved electrical tree resistance. It implies that the 5 wt% of silica is the optimum amount to achieve the optimal electrical tree resistance such that above 5 wt%, the tree resistance performance has been abruptly reduced, subjected to the agglomeration issue.
Cognitive radio for TVWS usage
Diego Pineda;
Cesar Hernandez
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.13111
Spectrum scarcity is an emerging issue in wireless communication systems due to the increasing demand of broadband services like mobile communications, wireless internet access, IoT applications, among others. The migration of analog TV to digital systems (a.k.a. digital TV switchover) has led to the release of a significant spectrum share that can be used to support said additional services. Likewise, TV white spaces emerge as spectral opportunities that can also be explored. Hence, cognitive radio (CR) presents itself as a feasible approach to efficiently use resources and exploit gaps within the spectrum. The goal of this paper is to unveil the state of the art revolving around the usage of TV white spaces, including some of the most important methods developed to exploit such spaces, upcoming opportunities, challenges for future research projects, and suggestions to improve current models.
Classifying confidential data using SVM for efficient cloud query processing
Huda Kadhim Tayyeh;
Ahmed Sabah Ahmed Al-Jumaili
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.13059
Nowadays, organizations are widely using a cloud database engine from the cloud service providers. Privacy still is the main concern for these organizations where every organization is strictly looking forward more secure environment for their own data. Several studies have proposed different types of encryption methods to protect the data over the cloud. However, the daily transactions represented by queries for such databases makes encryption is inefficient solution. Therefore, recent studies presented a mechanism for classifying the data prior to migrate into the cloud. This would reduce the need of encryption which enhances the efficiency. Yet, most of the classification methods used in the literature were based on string-based matching approach. Such approach suffers of the exact match of terms where the partial matching would not be considered. This paper aims to take the advantage of N-gram representation along with Support Vector Machine classification. A real-time data will used in the experiment. After conducting the classification, the Advanced Encryption Standard algorithm will be used to encrypt the confidential data. Results showed that the proposed method outperformed the baseline encryption method. This emphasizes the usefulness of using the machine learning techniques for the process of classifying the data based on confidentiality.
Recognition system for facial expression by processing images with deep learning neural network
Holman Montiel Ariza;
Henry Hernández Martínez;
Luz Andrea Gaviria Roa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.12948
The recognition systems of patterns in images are mechanisms that filter the information that provides an image to highlight the area of interest for the user. Usually, these mechanisms are based on mathematical transformations that allow the processor to perform interpretations based on the geometry or shape of the image. However, the strategies that implement mathematical transformations are limited, since the effectiveness of these techniques is reduced by changing the morphology or resolution of the image. This paper presents a partial solution to this limitation with a digital image processing technique based on a deep learning neural network (DNN). This technique incorporates a mechanism that allows the DNN to determine the facial expression of a person, based on the segmented information of the image of their face. By segmenting the image and processing its characteristics in parallel, the proposed technique increases the effectiveness of recognizing facial gestures in different images even when modifying their characteristics.
Batik image retrieval using convolutional neural network
Heri Prasetyo;
Berton Arie Putra Akardihas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.12701
This paper presents a simple technique for performing Batik image retrieval using the Convolutional Neural Network (CNN) approach. Two CNN models, i.e. supervised and unsupervised learning approach, are considered to perform end-to-end feature extraction in order to describe the content of Batik image. The distance metrics measure the similarity between the query and target images in database based on the feature generated from CNN architecture. As reported in the experimental section, the proposed supervised CNN model achieves better performance compared to unsupervised CNN in the Batik image retrieval system. In addition, image feature composed from the proposed CNN model yields better performance compared to that of the handcrafted feature descriptor. Yet, it demonstrates the superiority performance of deep learning-based approach in the Batik image retrieval system.
First order parallel coupled BPF with wideband rejection based on SRR and CSRR
Zaid A. Abdul Hassain;
Amer Abbood AL-Behadili;
Adham R. Azeez
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.10790
In this paper a new approach for first order Chebyshev parallel coupled Bandpass filter resonant at 1 GHz is presented to obtain better results (wideband rejection, high selectivity and low bandpass insertion loss) compared to conventional design. The proposed filter (a tri-formation consisting of CSRR, SRR and stubs of stepped impedance are loaded microstrip resonator) can be configured, by laying split ring resonator (SRR) and complementary split ring resonator (CSRR) with 50 Ω microstrip lines, in addition to effect of loading two stubs of stepped impedance around center of midline microstrip with impedance line 55.36 Ω of parallel coupled. The proposed filter produces high selectivity from passband to stopband transition equals to 307.5 dB/GHz and an excellent wide stopband performance extend from 1.22 GHz to 5 GHz (harmonics repression till for 5 ƒ0); all are bellow -20 dB excepting one transmission zero of -19 dB, that can be eliminate the harmonic superior frequencies without using any external Bandstop filter. Also, enhancement low bandpass insertion loss level, where it reaches 0.25 dB at fundamental centered frequency (ƒ0 = 0.96 GHz) with 21% bandwidth. The proposed filter is designed and simulated with computer aided of Ansoft HFSS software package which ordinarily used in microwave application.
Modified RSA-based algorithm: a double secure approach
Israa Al_Barazanchi;
Shihab A. Shawkat;
Moayed H. Hameed;
Khalid Saeed Lateef Al-badri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.13201
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.
Integrated smart door system in apartment room based on internet
Muchammad Husni;
Henning Titi Ciptaningtyas;
Ridho Rahman Hariadi;
Irzal Ahmad Sabilla;
Siska Arifiani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.12322
Internet of Things (IoT) is technology which provides communication between machines without human intervention. There are many applications that implement IoT technology e.g. smart power, smart home, transportation management, and smart city. This paper proposes the usage of IoT to develop electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or close the door and webcam is used to take picture from the environment for documentation. This research uses three steps to verify the user who want to open or close the door i.e. using username and password, bluetooth, and QR code scanner.
A novel model for solar radiation prediction
Ibrahim S. Madugu;
B. J. Olufeagba;
Yinusa A. Adediran;
F. Abdulkadir;
A. Abdulkarim;
James U. Inaku;
A. U. Lawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i6.12729
Energy for fulfilling basic community/individual needs has come to constitute the first article of expectation in all contemporary societies. The exploitation of renewables notably solar in electricity generation has brought relief to the fulfilment of energy demand especially among susceptible communities. In this paper yearly minimum solar radiation of Kano (12.05°N; 08.2°E; altitude 472.5 m; 3 air density 1.1705 kg/m3) for 46 years is used to generate a prediction model that fits the data using autoregressive moving average (ARMA) and a new model termed autoregressive moving average process (ARMAP). Comparison between the ARMA and ARMAP models showed a tremendous improve in the sum of square error reduction between the actual data and the forecasted data by 47%.