TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
67 Documents
Search results for
, issue
"Vol 18, No 4: August 2020"
:
67 Documents
clear
Incident and reflected two waves correlation with cancellous bone structure
Muhamad Amin Abd Wahab;
Rubita Sudirman;
Mohd Azhar Abdul Razak;
Fauzan Khairi Che Harun;
Nurul Ashikin Abdul Kadir;
Nasrul Humaimi Mahmood
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14828
The correlation in bone microstructure for ultrasound pulse echo technique is still less accurate compared to through transmission technique. Previous works demonstrated, reflected two modes wave has significant association with bone porosity. The paper aims is to conduct simulation using pulse echo technique to examine the relationship between fast and slow waves with porosity of 2-dimensional cancellous bone models by comparing the result to through transmission technique. The “incident” and “reflected” waves were separated using bandlimited deconvolution method by estimating time threshold of fast and slow waves' transfer function. The parameters of the waves were computed, plotted versus porosity for six different thicknesses and the correlation coefficients between them were compared. The incident and reflected fast wave attenuations show marginally significant correlation with porosity for both bone models orientations. Wave propagation for parallel orientation dominated by incident and reflected fast wave, meanwhile, perpendicular orientation dominated by incident slow wave. The thickness factor affected wave amplitude but less affected the attenuation. Because of propagation loss, reflected wave shows lower correlation to porosity compared to incident wave. Hence, analyzing fast and slow waves might improve the measurement accuracy of pulse echo technique compared to using single mode wave to estimate bone quality.
A principal component analysis-based feature dimensionality reduction scheme for content-based image retrieval system
Oluwole A Adegbola;
Ismail A Adeyemo;
Folasade A Semire;
Segun I. Popoola;
Aderemi A Atayero
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.11176
In Content-Based Image Retrieval (CBIR) system, one approach of image representation is to employ combination of low-level visual features cascaded together into a flat vector. While this presents more descriptive information, it however poses serious challenges in terms of high dimensionality and high computational cost of feature extraction algorithms to deployment of CBIR on platforms (devices) with limited computational and storage resources. Hence, in this work a feature dimensionality reduction technique based on Principal Component Analysis (PCA) is implemented. Each image in a database is indexed using 174 dimensional feature vector comprising of 54-dimensional Colour Moments (CM54), 32-bin HSV-histogram (HIST32), 48-dimensional Gabor Wavelet (GW48) and 40-dimensional Wavelet Moments (MW40). The PCA scheme was incorporated into a CBIR system that utilized the entire feature vector space. The k-largest Eigenvalues that yielded a not more than 5% degradation in mean precision were retained for dimensionality reduction. Three image databases (DB10, DB20 and DB100) were used for testing. The result obtained showed that with 80% reduction in feature dimensions, tolerable loss of 3.45, 4.39 and 7.40% in mean precision value were achieved on DB10, DB20 and DB100.
Identification of paddy leaf diseases based on texture analysis of Blobs and color segmentation
Alex Wenda;
Inggih Permana;
Yusmar Yusmar;
Nunik Noviana Kurniawati
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14614
There are three types of paddy leaf diseases that have similar symptoms, making it difficult for farmers to identify them, namely blast, brown-spot, and narrow brown-spot. This study aims to identification paddy plant diseases based on texture analysis of Blobs and color segmentation. Blobs analysis is used to get the number of objects, area and perimeter. Color segmentation is used to find out some color parameters of paddy leaf disease such as the color of the lesion boundary, the color of the spot of the lesion, and the color of the paddy leaf lesion. To get the best results, four methods have been chosen to obtained the threshold value, Otsu threshold value, variable threshold value, local threshold value and global threshold value. The best accuracy of the four methods using threshold variables is 90.7%. The results of this study indicate that the method used has been very satisfactory in identifying paddy plant disease.
The usage of thermoelectric generator as a renewable energy source
Cekmas Cekdin;
Zainuddin Nawawi;
Muhammad Faizal
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.13072
Currently thermoelectric generators (TEG) are widely used in biomedical, military and space satellite power applications. TEG of high power plants are mostly used in automobile and industrial engines. This paper discusses TEG as a renewable energy source. Here the TEG in the application is used in the thermoelectric generator power plant. The working principle of this thermoelectric generator is on the heat side of the TEG peltier which is coated in metal in the form of aluminum, which is heated by a heater. And the cold side of the TEG Peltier is placed on the heat sink (as a heat dissipation metal). Heatsinks are submerged in water which are submerged about half or more. If the temperature of the metal being heated and the temperature of heat dissipation metal have a certain difference, then the temperature difference causes TEG to start working. The greater the temperature difference, the greater the electrical energy produced will be. However, if the temperature difference is too large it will damage the bismuth semiconductor material used. After TEG starts working it will produce voltage and current.
Encrypting an audio file based on integer wavelet transform and hand geometry
Zeena N. Al-Kateeb;
Saja J. Mohammed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14216
A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
QR code based two-factor authentication to verify paper-based documents
Maysaa Abd Ulkareem Naser;
Eman Talib Jasim;
Haider M. Al-Mashhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14339
Important paper-based documents Exposed to forgery such as: official certificates, birth, marriage, death certificates, selling and buying documents and other legal documents is more and more serious and sophisticated. With the purposes of fraud, appropriation of property, job application and assignment in order to swindle public authorities, this forgery has led to material loss, belief deterioration as well as social instability. There are many techniques has been proposed to overcome this issues such as: ink stamps, live signatures, documented the transaction in third party like the court or notary. In this paper, it’s proposed a feasible solution for forgery prevention for paper-based documents using cloud computing application. With the application of Quick Response bidirectional barcode and the usage of hash algorithm. The study aims at developing an electronic verification system for official and issued books (documents, endorsements, and other official books) to/from different sections of the Institute using QR technology.
Optimal cost allocation algorithm of transmission losses to bilateral contracts
Conny K. Wachjoe;
Hermagasantos Zein;
Fitria Yulistiani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14226
One of the trends in electricity reform is the involvement of bilateral contracts that will participate in electricity business development. Bilateral agreements require fair transmission loss costs compared with the integrated power system. This paper proposes a new algorithm in determining the optimal allocation of transmission loss costs for bilateral contracts based on the direct method in economic load dispatch. The calculation for an optimal power flow applies fast decoupled methods. At the same time, the determination of a fair allocation of transmission losses uses the decomposition method. The simulation results of the optimal allocation of power flow provide comparable results with previous studies. This method produces a fair allocation of optimal transmission loss costs for both integrated and bilateral parties. The proportion allocation of the transmission lines loss incurred by the integrated system and bilateral contracts reflects a fair allocation of R. 852.589 and R. 805.193, respectively.
SWANSTAT: a user-friendly web application for data analysis using shinydashboard package in R
Rizal Bakri;
Bagus Sartono;
Hazan Azhari Zainuddin;
Laode Ahmad Sabil
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14182
SWANSTAT is a user-friendly web application and free license that developed from the R programming language using shinydashboard Package. This research aims to create SWANSTAT was to streamline the routine workflow of data analysis so that users who are unfamiliar with R can perform the analysis interactively in a web browser with a cloud computing using a shiny server. The software development method used in this study is the SDLC with the waterfall model. The result of this research is the SWANSTAT software was developed using R by combining various packages and can be accessed online through various types of browsers on http://apps.swanstatistics.com. Besides, SWANSTAT consist of various features including the best visualization, the basis of statistical methods, help documents and tutorials. This research will continuously develop this application by enriching the latest statistical method, as well as improving the quality of features for data science needs.
RPL routing protocol performance under sinkhole and selective forwarding attack: experimental and simulated evaluation
Bimal H. Patel;
Parth Shah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.15768
To make possible dream of connecting 30 billion smart devices assessable from anywhere, anytime and to fuel the engine growth of Internet of things (IoT) both in terms of physical and virtual things, Internet Engineering Task Force (IETF) came up with a concept of 6LoWPAN possessing characteristics like low power, bandwidth and cost. To bridge the routing gap and to collaborate between low power private area network and the outside world, IETF ROLL group proposed IPv6 based lightweight standard RPL (Routing protocol for low power and lossy networks). Due to large chunks of random data generated on daily basis security either externally or internally always remain bigger threat which may lead to devastation and eventually degrades the quality of service parameters affecting network resources. This paper evaluates and compare the effect of internal attacks like sinkhole and selective forwarding attacks on routing protocol for low power and lossy network topology. Widely known IoT operating system Contiki and Cooja as the simulator are used to analyse different consequences on low power and lossy network.
Analysis sentiment about islamophobia when Christchurch attack on social media
Windu Gata;
Achmad Bayhaqy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v18i4.14179
Islamophobia is formed by "Islam" with "-phobia" which means "fear of Islam". This shows the view of Islam as "other" and can threaten Western culture. The recent horrific terror attack that took place at the Christchurch mosque in New Zealand, is the result of allowing an attitude of hatred towards Islam in the West. Twitter is social media that allows users send real-time messages and can be used for sentiment analysis because it has a large amount of data. The lexical based method using VADER is used for automatic labeling of crawling data from Twitter. And then compare Supervised Machine Learning Naïve Bayes and SVM algorithm. Addition of SMOTE for Imbalanced Data. As result, SVM with SMOTE is proven the highest performance value and short processing time.