cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 67 Documents
Search results for , issue "Vol 18, No 4: August 2020" : 67 Documents clear
Incident and reflected two waves correlation with cancellous bone structure Muhamad Amin Abd Wahab; Rubita Sudirman; Mohd Azhar Abdul Razak; Fauzan Khairi Che Harun; Nurul Ashikin Abdul Kadir; Nasrul Humaimi Mahmood
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14828

Abstract

The correlation in bone microstructure for ultrasound pulse echo technique is still less accurate compared to through transmission technique. Previous works demonstrated, reflected two modes wave has significant association with bone porosity. The paper aims is to conduct simulation using pulse echo technique to examine the relationship between fast and slow waves with porosity of 2-dimensional cancellous bone models by comparing the result to through transmission technique. The “incident” and “reflected” waves were separated using bandlimited deconvolution method by estimating time threshold of fast and slow waves' transfer function. The parameters of the waves were computed, plotted versus porosity for six different thicknesses and the correlation coefficients between them were compared. The incident and reflected fast wave attenuations show marginally significant correlation with porosity for both bone models orientations. Wave propagation for parallel orientation dominated by incident and reflected fast wave, meanwhile, perpendicular orientation dominated by incident slow wave. The thickness factor affected wave amplitude but less affected the attenuation. Because of propagation loss, reflected wave shows lower correlation to porosity compared to incident wave. Hence, analyzing fast and slow waves might improve the measurement accuracy of pulse echo technique compared to using single mode wave to estimate bone quality.
A principal component analysis-based feature dimensionality reduction scheme for content-based image retrieval system Oluwole A Adegbola; Ismail A Adeyemo; Folasade A Semire; Segun I. Popoola; Aderemi A Atayero
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.11176

Abstract

In Content-Based Image Retrieval (CBIR) system, one approach of image representation is to employ combination of low-level visual features cascaded together into a flat vector. While this presents more descriptive information, it however poses serious challenges in terms of high dimensionality and high computational cost of feature extraction algorithms to deployment of CBIR on platforms (devices) with limited computational and storage resources. Hence, in this work a feature dimensionality reduction technique based on Principal Component Analysis (PCA) is implemented. Each image in a database is indexed using 174 dimensional feature vector comprising of 54-dimensional Colour Moments (CM54), 32-bin HSV-histogram (HIST32), 48-dimensional Gabor Wavelet (GW48) and 40-dimensional Wavelet Moments (MW40). The PCA scheme was incorporated into a CBIR system that utilized the entire feature vector space. The k-largest Eigenvalues that yielded a not more than 5% degradation in mean precision were retained for dimensionality reduction. Three image databases (DB10, DB20 and DB100) were used for testing. The result obtained showed that with 80% reduction in feature dimensions, tolerable loss of 3.45, 4.39 and 7.40% in mean precision value were achieved on DB10, DB20 and DB100.
Identification of paddy leaf diseases based on texture analysis of Blobs and color segmentation Alex Wenda; Inggih Permana; Yusmar Yusmar; Nunik Noviana Kurniawati
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14614

Abstract

There are three types of paddy leaf diseases that have similar symptoms, making it difficult for farmers to identify them, namely blast, brown-spot, and narrow brown-spot. This study aims to identification paddy plant diseases based on texture analysis of Blobs and color segmentation. Blobs analysis is used to get the number of objects, area and perimeter. Color segmentation is used to find out some color parameters of paddy leaf disease such as the color of the lesion boundary, the color of the spot of the lesion, and the color of the paddy leaf lesion. To get the best results, four methods have been chosen to obtained the threshold value, Otsu threshold value, variable threshold value, local threshold value and global threshold value. The best accuracy of the four methods using threshold variables is 90.7%. The results of this study indicate that the method used has been very satisfactory in identifying paddy plant disease.
The usage of thermoelectric generator as a renewable energy source Cekmas Cekdin; Zainuddin Nawawi; Muhammad Faizal
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.13072

Abstract

Currently thermoelectric generators (TEG) are widely used in biomedical, military and space satellite power applications. TEG of high power plants are mostly used in automobile and industrial engines. This paper discusses TEG as a renewable energy source. Here the TEG in the application is used in the thermoelectric generator power plant. The working principle of this thermoelectric generator is on the heat side of the TEG peltier which is coated in metal in the form of aluminum, which is heated by a heater. And the cold side of the TEG Peltier is placed on the heat sink (as a heat dissipation metal). Heatsinks are submerged in water which are submerged about half or more. If the temperature of the metal being heated and the temperature of heat dissipation metal have a certain difference, then the temperature difference causes TEG to start working. The greater the temperature difference, the greater the electrical energy produced will be. However, if the temperature difference is too large it will damage the bismuth semiconductor material used. After TEG starts working it will produce voltage and current.
Encrypting an audio file based on integer wavelet transform and hand geometry Zeena N. Al-Kateeb; Saja J. Mohammed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14216

Abstract

A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
QR code based two-factor authentication to verify paper-based documents Maysaa Abd Ulkareem Naser; Eman Talib Jasim; Haider M. Al-Mashhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14339

Abstract

Important paper-based documents Exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issues such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of Quick Response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
Optimal cost allocation algorithm of transmission losses to bilateral contracts Conny K. Wachjoe; Hermagasantos Zein; Fitria Yulistiani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14226

Abstract

One of the trends in electricity reform is the involvement of bilateral contracts that will participate in electricity business development. Bilateral agreements require fair transmission loss costs compared with the integrated power system. This paper proposes a new algorithm in determining the optimal allocation of transmission loss costs for bilateral contracts based on the direct method in economic load dispatch. The calculation for an optimal power flow applies fast decoupled methods. At the same time, the determination of a fair allocation of transmission losses uses the decomposition method. The simulation results of the optimal allocation of power flow provide comparable results with previous studies. This method produces a fair allocation of optimal transmission loss costs for both integrated and bilateral parties. The proportion allocation of the transmission lines loss incurred by the integrated system and bilateral contracts reflects a fair allocation of R. 852.589 and R. 805.193, respectively.
SWANSTAT: a user-friendly web application for data analysis using shinydashboard package in R Rizal Bakri; Bagus Sartono; Hazan Azhari Zainuddin; Laode Ahmad Sabil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14182

Abstract

SWANSTAT is a user-friendly web application and free license that developed from the R programming language using shinydashboard Package. This research aims to create SWANSTAT was to streamline the routine workflow of data analysis so that users who are unfamiliar with R can perform the analysis interactively in a web browser with a cloud computing using a shiny server. The software development method used in this study is the SDLC with the waterfall model. The result of this research is the SWANSTAT software was developed using R by combining various packages and can be accessed online through various types of browsers on http://apps.swanstatistics.com. Besides, SWANSTAT consist of various features including the best visualization, the basis of statistical methods, help documents and tutorials. This research will continuously develop this application by enriching the latest statistical method, as well as improving the quality of features for data science needs.
RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation Bimal H. Patel; Parth Shah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.15768

Abstract

To make possible dream of connecting 30 billion smart devices assessable from anywhere, anytime and to fuel the engine growth of Internet of things (IoT) both in terms of physical and virtual things, Internet Engineering Task Force (IETF) came up with a concept of 6LoWPAN possessing characteristics like low power, bandwidth and cost. To bridge the routing gap and to collaborate between low power private area network and the outside world, IETF ROLL group proposed IPv6 based lightweight standard RPL (Routing protocol for low power and lossy networks). Due to large chunks of random data generated on daily basis security either externally or internally always remain bigger threat which may lead to devastation and eventually degrades the quality of service parameters affecting network resources. This paper evaluates and compare the effect of internal attacks like sinkhole and selective forwarding attacks on routing protocol for low power and lossy network topology. Widely known IoT operating system Contiki and Cooja as the simulator are used to analyse different consequences on low power and lossy network.
Analysis sentiment about islamophobia when Christchurch attack on social media Windu Gata; Achmad Bayhaqy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14179

Abstract

Islamophobia is formed by "Islam" with "-phobia" which means "fear of Islam". This shows the view of Islam as "other" and can threaten Western culture. The recent horrific terror attack that took place at the Christchurch mosque in New Zealand, is the result of allowing an attitude of hatred towards Islam in the West. Twitter is social media that allows users send real-time messages and can be used for sentiment analysis because it has a large amount of data. The lexical based method using VADER is used for automatic labeling of crawling data from Twitter. And then compare Supervised Machine Learning Naïve Bayes and SVM algorithm. Addition of SMOTE for Imbalanced Data. As result, SVM with SMOTE is proven the highest performance value and short processing time.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue