TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
64 Documents
Search results for
, issue
"Vol 18, No 1: February 2020"
:
64 Documents
clear
Continuous speech segmentation using local adaptive thresholding technique in the blocking block area method
Roihan Auliya Ulfattah;
Sukmawati Nur Endah;
Retno Kusumaningrum;
Satriyo Adhy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.13958
Continuous speech is a form of natural human speech that is continuous without a clear boundary between words. In continuous speech recognition, a segmentation process is needed to cut the sentence at the boundary of each word. Segmentation becomes an important step because a speech can be recognized from the word segments produced by this process. The segmentation process in this study was carried out using local adaptive thresholding technique in the blocking block area method. This study aims to conduct performance comparisons for five local adaptive thresholding methods (Niblack, Sauvola, Bradley, Guanglei Xiong and Bernsen) in continuous speech segmentation to obtain the best method and optimum parameter values. Based on the results of the study, Niblack method is concluded as the best method for continuous speech segmentation in Indonesian language with the accuracy value of 95%, and the optimum parameter values for such method are window = 75 and k = 0.2.
A novel cross-coupled microstrip bandpass filter with hairpin-DGS resonators using coupling matrix technique
Chetioui Mohammed;
Bouasria Fatima;
Damou Mehdi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.12447
This paper introduces a new design of a cross-coupled microstrip bandpass filter (MBPF) based on hairpin defected ground structure (DGS) resonators using accurate coupling matrix (CM) technique for microwave communication systems. The paper describes the equivalent circuit of the proposed MBPF based on the DGS equivalent circuit model derived from the equivalent inductance and capacitance which occur due to the perturbation of the current in the ground plane by the presence of the slots. The paper investigates also the different external coupling mechanisms that the feed configuration affects significantly the filter response. In this paper, a four order Chebyshev topology has been adopted for designing the filter to suppress harmonics and achieve a very compact size and a wide stopband with two transmission zeros.
Iris images encryption based on QR code and chaotic map
Raniah Ali Mustafa;
Amal Abdulbaqi Maryoosh;
Dena Nadir George;
Waleed Rasheed Humood
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.13293
In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.
RST invariant watermarking technique for vector map based on LCA-transform
Saleh AL-ardhi;
Vijey Thayananthan;
Abdullah Basuhail
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.15020
The dangers of copyright protection can impact 2D vector maps, having a knock-on effect on the use of vector data. To achieve invariance property, uniform RST (rotation, scaling and translation) and disguising the digital vector map’s information by implementing distortion control, is all done by using watermarking schemes. Convert an original map, then engrain the watermark. An LCA algorithm is used in this study, as a newly proposed way to protect the vector maps under copyright. The procedure is operated in this order: 1) use an original map, altered by the LCA algorithm, 2) use the coefficient of the transformation to engrain the watermark, inserting the resulting frequency into the LSB wave, 3) the watermarked map is acquired by using the inverse LCA map transformation. Further investigations discovered that the necessary standards of fidelity and invisibility can be achieved using this technique. This procedure also gives out numerous frequency domains for digital watermarking; as well as being resilient to signal and geometric invasions.
Integrating millimeter wave with hybrid precoding multiuser massive MIMO for 5G communication
Mohammed Khudhur Hussein;
Nasser N. Khamiss
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.13674
Nowadays, there has been growing interest in the Massive MIMO as a result of improving throughput by leveraging spatial freedom and array gain. It is equipped with millimeter wave (mm Wave) bands to resolve the high path-loss. It is known from the literature that iterated algorithms are usually used to attain the hybrid precoders to accomplish a specific optimization objective. Thus, the complexity remains high because each iteration may include singular value decomposition, the matrix inversion, and so on that motivates us to split the hybrid precoding and combining problem into sub-problems. The proposed solution is a multi-user Massive MIMO hybrid beamforming based on a convex optimization problem that is applied and solved for estimating the digital precoding to eliminate inter-user interference while using codebooks to select analog beamformers. It is apparent in the majority of cases; the proposed beamforming performance is higher than only-analog beamforming, single-user (no interference), the ZF precoding, the MMSE precoding, and the Kalman precoding where the full digital solution is a considerable as the benchmark point with different scenarios due to the reduction of user interference. Thus, there is no consideration for complicated operations such as SVD or inversion matrices as well as no need for data estimation. Our proposed solution can serve a large number of users simultaneously due to more directive gain by using numerous antennas at BS. Based on its less complexity and keeping performance, our solution can be recommended.
Integrity verification for an optimized cloud architecture
Ahmed, Iqbal;
Alam, Fahim Irfan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.14105
Cloud computing has significantly benefited todays environment of IT industry through its mobility, sustainability, security, cost savings and several other important features. The risk of data loss on cloud in case of dealing with hardware and software is relatively small. However, the issue of data security becomes imminent when we are storing personal data on the cloud which is not transparent to users. In this paper, we introduce a new entity in terms of a virtual machine that provides services and assurance beyond service level agreement (SLA). In the proposed model, a role of data handling and security is assured with association of third party auditor (TPA) by the virtual machine. We further demonstrate the applied technique for encryption, decryption and integrity verification modules. We also upgrade the entropy of the advanced encryption standard (AES) with a variant of secret sharing scheme in the environment of cloud simulator.
The measurement of maturity level of information technology service based on COBIT 5 framework
Lanto Ningrayati Amali;
Muhammad Rifai Katili;
Sitti Suhada;
Lillyan Hadjaratie
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.10582
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
MIMO channels: optimizing throughput and reducing outage by increasing multiplexing gain
Oboyerulu Agboje;
Nsikan Nkordeh;
Uzairue Stanley Idiake;
Ololade Oladoyin;
Kennedy Okokpujie;
Ibinabo Bob-Manuel
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.8720
The two main aims of deploying multiple input multiple out (MIMO) are to achieve spatial diversity (improves channel reliability) and spatial multiplexing (increase data throughput). Achieving both in a given system is impossible for now, and a trade-off has to be reached as they may be conflicting objectives. The basic concept of multiplexing: divide (multiplex) transmit a data stream several branches and transmit via several (independent) channels. In this paper, we focused mainly on achieving spatial multiplexing by modeling the channel using the diagonal Bell Labs space time scheme (D-BLAST) and the vertical Bell Labs space time architecture (V-BLAST) Matlab simulations results were a lso given to further compare the advantages of spatial multiplexing.
Novel high functionality fault tolerant ALU
Shaveta Thakral;
Dipali Bansal
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.12645
Miniaturization, cost, functionality, complexity and power dissipation are important and necessary design traits which need attention in circuit designing. There is a trade off between miniaturization and power dissipation. Smart technology is always searching for new paradigms to continue improve power dissipation. Reversible logic is one of smart computing deployed to avoid power dissipation. Researchers have proposed many reversible logic-based arithmetic and logic units (ALU). However, the research in the area of fault tolerant ALU is still under progress. The aim of this paper is to bridge the knowledge gap for a new researcher in area of fault tolerance using parity preserving logic gates rather than searching huge data through various sources. This paper also presents a high functionality based novel fault tolerant arithmetic and logic unit architecture. A comparison on optimization aspects is presented in tabular form and results shows that proposed ALU architecture is optimum balance in terms of all aspects of reversible logic synthesis. The proposed ALU architecture is coded in Verilog HDL and simulated using Xilinx ISE design suit 14.2 tool. The quantum cost of all gates used in proposed architecture is verified using RCViewer + tool.
Buck converter controlled with ZAD and FPIC for DC-DC signal regulation
Fredy E. Hoyos Velasco;
Yeison Alberto Garcés Gómez;
John E. Candelo-Becerra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i1.14108
This paper presents the performance of a fixed-point induction control (FPIC) technique working in conjunction with the non-linear control technique called zero average dynamics (ZAD) to control chaos in a buck converter. The control technique consists of a sliding surface in which the error tends to zero at each sampling period. A switch is controlled by using centered pulse width modulation (CPWM) control signal. The converter controlled with ZAD-FPIC has been simulated in Matlab and implemented using rapid control prototyping (RCP) in a DSP to make comparisons between simulation and experimental tests. To perform this comparison, some variations in the control parameter and the voltage reference are made in order to evaluate the performance of the system. Results are obtained with errors lower than 1 % which demonstrates the good performance of the control techniques.