cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 65 Documents
Search results for , issue "Vol 18, No 2: April 2020" : 65 Documents clear
Physical security with power beacon assisted in half-duplex relaying networks over Rayleigh fading channel: performance analysis Phu Tran Tin; Duy-Hung Ha; Luu Gia Thien; Tran Thanh Trang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.15857

Abstract

In this research, we proposed and investigated physical security with power beacon assisted in half-duplex relaying networks over a Rayleigh fading channel. In this model, the source (S) node communicates with the destination (D) node via the helping of the intermediate relay (R) node. The D and R nodes harvest energy from the power beacon (PB) node in the presence of a passive eavesdropper (E) node. Then we derived the integral form of the system outage probability (OP) and closed form of the intercept probability (IP). The correctness of the analytical of the OP and IP is verified by the Monte Carlo simulation. The influence of the main system parameters on the OP and IP also is investigated. The research results indicated that the analytical results are the same as the simulation ones.
Plant species identification based on leaf venation features using SVM Agus Ambarwari; Qadhli Jafar Adrian; Yeni Herdiyeni; Irman Hermadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14062

Abstract

The purpose of this study is to identify plant species using leaf venation features. Leaf venation features were obtained through the extraction of leaf venation features. The leaf image segmentation was performed to obtain the binary image of the leaf venation which is then determined the branching point and ending point. From these points, the extraction of leaf venation feature was performed by calculating the value of straightness, a different angle, length ratio, scale projection, skeleton length, number of segments, total skeleton length, number of branching points and number of ending points. So that from the extraction of leaf venation features 19 features were obtained. Identification of plant species was carried out using Support Vector Machine (SVM) with RBF kernel. The learning model was built using 75% of the training data. The testing results using 25% of the data on the training model, obtained an accuracy of 82.67%, with an average of precision of 84% and recall of 83%. 
Development of triangular array eight patches antennas for circularly-polarized synthetic aperture radar sensor Muhammad Fauzan Edy Purnomo; Vita Kusumasari; Edi Supriana; Rusmi Ambarwati; Akio Kitagawa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14759

Abstract

In this paper, we obtain the left-handed circularly polarized (LHCP) and right-handed circularly polarized (RHCP) of triangular array eight patches antennas using corporate feeding-line for circularly polarized-synthetic aperture radar (CP-SAR) sensor embedded on unmanned aerial vehicle (UAV) with compact, simple, and efficient configuration. Although the corporate feeding-line design has already been developed, its design was for the side antenna view of 0° and only produced one of LHCP or RHCP instead of both. Here, the design for LHCP and RHCP eight patches array fed by corporate feeding-line having the side antenna view of 36° at f=1.25 GHz for CP-SAR are discussed. We use the 2016 version of computer simulation technology (CST) to realize the method of moments (MoM) for analyzing. The performance results, especially for gain and axial ratio (Ar) at resonant frequency are consecutively 13.46 dBic and 1.99 dB both of LHCP and RHCP. Moreover, the 12-dBic gain-bandwidth and the 3-dB Ar-bandwidth of them are consecutively around 38 MHz (3.04%) and 6 MHz (0.48%). Furthermore, the two-beams appeared at boresight in elevation plane for average beamwidth of 12 dBic-gain and the 3 dB-Ar LHCP and RHCP have similar values of around 12° and 46°, respectively.
Rogowski coil sensor in the digitization process to detect partial discharge Eka Putra Waldi; Asri Indah Lestari; Rudy Fernandez; Syaifa Mulyadi; Yoshinobu Murakami; Naohiro Hozumi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14282

Abstract

This paper presents the construction of a Rogowski Coil sensor with an air core to detect partial discharge using a digital oscilloscope. Two types of sensors are used. The first is the primary sensor winding with back wire, and the second is without back wire, labeled BW and WBW, respectively. The numbers of primary-turn in the sensors are 5, 10, 20, and 40 turns. The performance of the sensors is tested using two types of tests. First, the wave response test with a fixed imitation partial discharge magnitude input is used to select the optimum sensitivity with the lower sampling rate, aims to select the peak or valley value as a magnitude partial discharge value. The second test is using an imitation partial discharge ramp to check the linearity of the sensors. The imitation of the partial discharge inputs is generated by a commercial charge calibrator. The wave response test results show an increase in the number of turns that corresponds to an increase of the sensor output for both sensors in a non-linear trend. In determining the sampling rate, the detection of magnitude in the valley is better than the peak. All sensors act linear toward the imitation partial discharge ramp either in BW or WBW conditions.
Matching algorithm performance analysis for autocalibration method of stereo vision Raden Arief Setyawan; Rudy Soenoko; Moch Agus Choiron; Panca Mudjirahardjo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14842

Abstract

Stereo vision is one of the interesting research topics in the computer vision field. Two cameras are used to generate a disparity map, resulting in the depth estimation. Camera calibration is the most important step in stereo vision. The calibration step is used to generate an intrinsic parameter of each camera to get a better disparity map. In general, the calibration process is done manually by using a chessboard pattern, but this process is an exhausting task. Self-calibration is an important ability required to overcome this problem. Self-calibration required a robust and good matching algorithm to find the key feature between images as reference. The purpose of this paper is to analyze the performance of three matching algorithms for the autocalibration process. The matching algorithms used in this research are SIFT, SURF, and ORB. The result shows that SIFT performs better than other methods.
Qualitative assessment of image enhancement algorithms for mammograms based on minimum EDV Mazin N. Farhan; Mohammed G. Ayoub; Hassan M. Qassim; Abdulrahman K. Eesee
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14085

Abstract

Breast cancer is one of the leading reason of death among women. Nevertheless, medications for this fatal disease are still away of ambitions. Patients (thought to have breast cancer) should go through several advanced medical diagnostic procedures like mammography, biopsy analysis, ultrasound imaging, etc. Mammography is one of the medical imaging techniques used for detecting breast cancer. However, its resulted images may not be clear enough or helpful for physician to diagnose each case correctly. This fact has pushed researchers towards developing effective ways to enhance images throughout using various enhancement algorithms. In this paper, a comparison amongst these applied algorithms was done to evaluate the optimum enhancement technique. A morphology enhancement, which is resulted from combining top-hat operation and bottom-hat operation, was used as a proposed enhancement algorithm. The proposed enhancement algorithm was compared to three other well-known enhancement algorithms, specifically histogram equalization, logarithmic transform, and gamma correction with different gamma values. Twenty-five mammographic images were taken from the mammography image analysis society (MIAS) database samples. The minimum entropy difference value (EDV) was used as metric to evaluate the best enhancement algorithm. Results has approved that the proposed enhancement algorithm gave the best-enhanced images in comparison to the aforementioned algorithms.
PID controller for microsatellite yaw-axis attitude control system using ITAE method Ajiboye A. T.; Popoola J. O.; Oniyide O.; Ayinla S. L.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14303

Abstract

The need for effective design of satellite attitude control (SAC) subsystem for a microsatellite is imperative in order to guarantee both the quality and reliability of the data acquisition. A proportional-integral-derivative (PID) controller was proposed in this study because of its numerous advantages. The performance of PID controller can be greatly improved by adopting an integral time absolute error (ITAE) robust controller design approach. Since the system to be controlled is of the 4th order, it was approximated by its 2nd order version and then used for the controller design. Both the reduced and higher-order pre-filter transfer functions were designed and tested, in order to improve the system performance. As revealed by the results, three out of the four designed systems satisfy the design specifications; and the PD-controlled system without pre-filter transfer function was recommended out of the three systems due to its structural simplicity, which eventually enhances its digital implementation.
DWT-SMM-based audio steganography with RSA encryption and compressive sampling Fikri Adhanadi; Ledya Novamizanti; Gelar Budiman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14833

Abstract

Problems related to confidentiality in information exchange are very important in the digital computer era. Audio steganography is a form of a solution that infuses information into digital audio, and utilizes the limitations of the human hearing system in understanding and detecting sound waves. The steganography system applies compressive sampling (CS) to the process of acquisition and compression of bits in binary images. Rivest, Shamir, and Adleman (RSA) algorithms are used as a system for securing binary image information by generating encryption and decryption key pairs before the process is embedded. The insertion method uses statistical mean manipulation (SMM) in the wavelet domain and low frequency sub-band by dividing the audio frequency sub-band using discrete wavelet transform (DWT) first. The optimal results by using our system are the signal-to-noise ratio (SNR) above 45 decibel (dB) and 5.3833 bit per second (bps) of capacity also our system has resistant to attack filtering, noise, resampling and compression attacks.
A new multi-level key block cypher based on the Blowfish algorithm Suhad Muhajer Kareem; Abdul Monem S. Rahma
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.13556

Abstract

Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and for determining the state table numbers. These tables are formed from the addition in a Galois field GF (2n) based on block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughout, and histogram, and show that the original Blowfish, those modified by other scholars, and our proposed algorithm are similar in time computation. Our algorithm is demonstrated to be the most complex compared with other well-known and modified algorithms. This increased complexity score for our proposed Blowfish makes it more resistant against attempts to break the keys.
Scheme for motion estimation based on adaptive fuzzy neural network Fredy Martinez; Cristian Penagos; Luis Pacheco
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14752

Abstract

Many applications of robots in collaboration with humans require the robot to follow the person autonomously. Depending on the tasks and their context, this type of tracking can be a complex problem. The paper proposes and evaluates a principle of control of autonomous robots for applications of services to people, with the capacity of prediction and adaptation for the problem of following people without the use of cameras (high level of privacy) and with a low computational cost. A robot can easily have a wide set of sensors for different variables, one of the classic sensors in a mobile robot is the distance sensor. Some of these sensors are capable of collecting a large amount of information sufficient to precisely define the positions of objects (and therefore people) around the robot, providing objective and quantitative data that can be very useful for a wide range of tasks, in particular, to perform autonomous tasks of following people. This paper uses the estimated distance from a person to a service robot to predict the behavior of a person, and thus improve performance in autonomous person following tasks. For this, we use an adaptive fuzzy neural network (AFNN) which includes a fuzzy neural network based on Takagi-Sugeno fuzzy inference, and an adaptive learning algorithm to update the membership functions and the rule base. The validity of the proposal is verified both by simulation and on a real prototype. The average RMSE of prediction over the 50 laboratory tests with different people acting as target object was 7.33.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue