cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 63 Documents
Search results for , issue "Vol 17, No 6: December 2019" : 63 Documents clear
Evaluation of the quality of an image encrytion scheme Osemwegie Omoruyi; Chinonso Okereke; Kennedy Okokpujie; Etinosa Noma-Osaghae; Obinna Okoyeigbo; Samuel John
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.10488

Abstract

Encryption systems have been developed for image viewing applications using the Hill Cipher algorithm. This study aims to evaluate the image encryption quality of the Hill Cipher algorithm. Several traditional metrics are used to evaluate the quality of the encryption scheme. Three of such metrics have been selected for this study. These include, the Colour Histogram, the Maximum Deviation (comparing the original image) and the Entropy Analysis of the encrypted image. Encryption quality results from all three schemes using a variety of images show that a plain Hill Cipher approach gives a good result for all kinds of images but is more suited for colour dense images.
Clarification of the optimum silica nanofiller amount for electrical treeing resistance Z. Nawawi; M. A. B. Sidik; M. I. Jambak; C. L. G. Pavan Kumar; Aulia Aulia; M. H. Ahmad; A. A. Abd Jamil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.10605

Abstract

This paper aims to clarify the optimum amount of fumed silica (SiO2) nanofiller in resisting the initiation and propagation of electrical treeing in silicone rubber (SiR). Unlike other works, SiR/SiO2 nanocomposites containing seven different weight percentages of SiO2 nanofiller were prepared for this purpose. To achieve the objective, the electrical tree characteristics of the SiR/SiO2 nanocomposites were investigated by comparing the tree initiation voltage, tree breakdown time, tree propagation length and tree growth rate with its equivalent unfilled SiR. Moreover, the structural and morphological analyses were conducted on the SiR/SiO2 nanocomposite samples. The results showed that the SiR, when added with an appropriate amount of SiO2 nanofiller, could result in an improved electrical tree resistance. It implies that the 5 wt% of silica is the optimum amount to achieve the optimal electrical tree resistance such that above 5 wt%, the tree resistance performance has been abruptly reduced, subjected to the agglomeration issue.
Cognitive radio for TVWS usage Diego Pineda; Cesar Hernandez
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.13111

Abstract

Spectrum scarcity is an emerging issue in wireless communication systems due to the increasing demand of broadband services like mobile communications, wireless internet access, IoT applications, among others. The migration of analog TV to digital systems (a.k.a. digital TV switchover) has led to the release of a significant spectrum share that can be used to support said additional services. Likewise, TV white spaces emerge as spectral opportunities that can also be explored. Hence, cognitive radio (CR) presents itself as a feasible approach to efficiently use resources and exploit gaps within the spectrum. The goal of this paper is to unveil the state of the art revolving around the usage of TV white spaces, including some of the most important methods developed to exploit such spaces, upcoming opportunities, challenges for future research projects, and suggestions to improve current models.
Classifying confidential data using SVM for efficient cloud query processing Huda Kadhim Tayyeh; Ahmed Sabah Ahmed Al-Jumaili
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.13059

Abstract

Nowadays, organizations are widely using a cloud database engine from the cloud service providers. Privacy still is the main concern for these organizations where every organization is strictly looking forward more secure environment for their own data. Several studies have proposed different types of encryption methods to protect the data over the cloud. However, the daily transactions represented by queries for such databases makes encryption is inefficient solution. Therefore, recent studies presented a mechanism for classifying the data prior to migrate into the cloud. This would reduce the need of encryption which enhances the efficiency. Yet, most of the classification methods used in the literature were based on string-based matching approach. Such approach suffers of the exact match of terms where the partial matching would not be considered. This paper aims to take the advantage of N-gram representation along with Support Vector Machine classification. A real-time data will used in the experiment. After conducting the classification, the Advanced Encryption Standard algorithm will be used to encrypt the confidential data. Results showed that the proposed method outperformed the baseline encryption method. This emphasizes the usefulness of using the machine learning techniques for the process of classifying the data based on confidentiality.
Recognition system for facial expression by processing images with deep learning neural network Holman Montiel Ariza; Henry Hernández Martínez; Luz Andrea Gaviria Roa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12948

Abstract

The recognition systems of patterns in images are mechanisms that filter the information that provides an image to highlight the area of interest for the user. Usually, these mechanisms are based on mathematical transformations that allow the processor to perform interpretations based on the geometry or shape of the image. However, the strategies that implement mathematical transformations are limited, since the effectiveness of these techniques is reduced by changing the morphology or resolution of the image. This paper presents a partial solution to this limitation with a digital image processing technique based on a deep learning neural network (DNN). This technique incorporates a mechanism that allows the DNN to determine the facial expression of a person, based on the segmented information of the image of their face. By segmenting the image and processing its characteristics in parallel, the proposed technique increases the effectiveness of recognizing facial gestures in different images even when modifying their characteristics.
Batik image retrieval using convolutional neural network Heri Prasetyo; Berton Arie Putra Akardihas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12701

Abstract

This paper presents a simple technique for performing Batik image retrieval using the Convolutional Neural Network (CNN) approach. Two CNN models, i.e. supervised and unsupervised learning approach, are considered to perform end-to-end feature extraction in order to describe the content of Batik image. The distance metrics measure the similarity between the query and target images in database based on the feature generated from CNN architecture. As reported in the experimental section, the proposed supervised CNN model achieves better performance compared to unsupervised CNN in the Batik image retrieval system. In addition, image feature composed from the proposed CNN model yields better performance compared to that of the handcrafted feature descriptor. Yet, it demonstrates the superiority performance of deep learning-based approach in the Batik image retrieval system.
First order parallel coupled BPF with wideband rejection based on SRR and CSRR Zaid A. Abdul Hassain; Amer Abbood AL-Behadili; Adham R. Azeez
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.10790

Abstract

In this paper a new approach for first order Chebyshev parallel coupled Bandpass filter resonant at 1 GHz is presented to obtain better results (wideband rejection, high selectivity and low bandpass insertion loss) compared to conventional design. The proposed filter (a tri-formation consisting of CSRR, SRR and stubs of stepped impedance are loaded microstrip resonator) can be configured, by laying split ring resonator (SRR) and complementary split ring resonator (CSRR) with 50 Ω microstrip lines, in addition to effect of loading two stubs of stepped impedance around center of midline microstrip with impedance line 55.36 Ω of parallel coupled. The proposed filter produces high selectivity from passband to stopband transition equals to 307.5 dB/GHz and an excellent wide stopband performance extend from 1.22 GHz to 5 GHz (harmonics repression till for 5 ƒ0); all are bellow -20 dB excepting one transmission zero of -19 dB, that can be eliminate the harmonic superior frequencies without using any external Bandstop filter. Also, enhancement low bandpass insertion loss level, where it reaches 0.25 dB at fundamental centered frequency (ƒ0 = 0.96 GHz) with 21% bandwidth. The proposed filter is designed and simulated with computer aided of Ansoft HFSS software package which ordinarily used in microwave application.
Modified RSA-based algorithm: a double secure approach Israa Al_Barazanchi; Shihab A. Shawkat; Moayed H. Hameed; Khalid Saeed Lateef Al-badri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.13201

Abstract

Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.
Integrated smart door system in apartment room based on internet Muchammad Husni; Henning Titi Ciptaningtyas; Ridho Rahman Hariadi; Irzal Ahmad Sabilla; Siska Arifiani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12322

Abstract

Internet of Things (IoT) is technology which provides communication between machines without human intervention. There are many applications that implement IoT technology e.g. smart power, smart home, transportation management, and smart city. This paper proposes the usage of IoT to develop electronic key that can help to improve the security in apartment. Electronic key uses Android smart phone to access and control the door. Electronic key uses Raspberry pii, motor DC, webcam, microswitch, and Arduino GSM. Raspberry is used to get command from server and instruct the Arduino GSM to open or close the door and webcam is used to take picture from the environment for documentation. This research uses three steps to verify the user who want to open or close the door i.e. using username and password, bluetooth, and QR code scanner.
A novel model for solar radiation prediction Ibrahim S. Madugu; B. J. Olufeagba; Yinusa A. Adediran; F. Abdulkadir; A. Abdulkarim; James U. Inaku; A. U. Lawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12729

Abstract

Energy for fulfilling basic community/individual needs has come to constitute the first article of expectation in all contemporary societies. The exploitation of renewables notably solar in electricity generation has brought relief to the fulfilment of energy demand especially among susceptible communities. In this paper yearly minimum solar radiation of Kano (12.05°N; 08.2°E; altitude 472.5 m; 3 air density 1.1705 kg/m3) for 46 years is used to generate a prediction model that fits the data using autoregressive moving average (ARMA) and a new model termed autoregressive moving average process (ARMAP). Comparison between the ARMA and ARMAP models showed a tremendous improve in the sum of square error reduction between the actual data and the forecasted data by 47%.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue