cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 67 Documents
Search results for , issue "Vol 18, No 4: August 2020" : 67 Documents clear
Voronoi diagram with fuzzy number and sensor data in an indoor navigation for emergency situation Nanna Suryana; Fandy Setyo Utomo; Mohd Fairuz Iskandar Othman; Mohd Nazrin Muhammad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14905

Abstract

Finding shortest and safest path during emergency situation is critical. In this paper, an indoor navigation during an emergency time is investigated using the combination of Voronoi Diagram and fuzzy number. The challenge in indoor navigation is to analyses the network when the shortest path algorithm does not work as always expected. There are some existing methods to generate the network model. First, this paper will discuss the feasibility and accuracy of each method when it is implemented on building environment. Next, this paper will discuss selected algorithms that determine the selection of the best route during an emergency situation. The algorithm has to make sure that the selected route is the shortest and the safest route to the destination. During a disaster, there are many uncertainties to deal with in determining the shortest and safest route. Fuzzy logic can be hardly called for to deal with these uncertainties. Based on sensor data, this paper will also discuss how to solve shortest path problem using a fuzzy number.
QR code based authentication method for IoT applications using three security layers Abbas M. Al-Ghaili; Hairoladenan Kasim; Marini Othman; Wahidah Hashim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14748

Abstract

A quick response code-based authentication method (QRAM) is proposed. QRAM is applicable for lots of internet of things (IoT) applications. QRAM aims to verify requests of such an access to IoT applications. Requests are made using a quick response code (QRC). To authenticate contents of QRC, users will scan QRC to access IoT applications. To authenticate contents of QRC, three procedures are applied. QRAM contributes to IoT automatic access systems or smart applications in terms of authentication and safety of access. QRAM is evaluated in term of security factors (e.g., authentication). Computation time of authentication procedures for several IoT applications has become a considerable issue. QRAM aims to reduce computation time consumed to authenticate each QRC. Some authentication techniques still face difficulties when an IoT application requires fast response to users; therefore, QRAM aims to enhance so to meet real-time applications. Thus, QRAM is compared to several competitive methods used to verify QRC in term of computation time. Results confirmed that QRAM is faster than other competitive techniques. Besides, results have shown a high level of complexity in term of decryption time needed to deduce private contents of QRC. QRAM also is robust against unauthorized requests of access.
A progressive domain expansion method for solving optimal control problem Olalekan Ogunbiyi; Oludare Y. Ogundepo; Madugu I. Sani; Cornelius Thomas; Benjamin J. Olufeagba
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.15047

Abstract

Electricity generation at the hydropower stations in Nigeria has been below the expected value. While the hydro stations have a capacity to generate up to 2,380 MW, the daily average energy generated in 2017 was estimated at around 846 MW. A factor responsible for this is the lack of a proper control system to manage the transfer of resources between the cascaded Kainji-Jebba Hydropower stations operating in tandem. This paper addressed the optimal regulation of the operating head of the Jebba hydropower reservoir in the presence of system constraints, flow requirement and environmental factors that are weather-related. The resulting two-point boundary value problem was solved using the progressive expansion of domain technique as against the shooting or multiple shooting techniques. The results provide the optimal inflow required to keep the operating head of the Jebba reservoir at a nominal level, hence ensuring that the maximum number of turbo-alternator units are operated.
Optimal power scheduling of renewable energy sources in micro-grid via distributed energy storage system Ibrahim Alhamrouni; Firdaus Ramli; Mohamed Salem; Bazilah Ismail; Awang Jusoh; Tole Sutikno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.15159

Abstract

This research is mainly focusing on the optimal power management by controlling the charging and discharging modes of the battery storage of the micro-grid (MG). A droop-based controller or battery controller is proposed for this work in order to optimize the power management of the battery. Charging and discharging modes are controlled by the droop-based characteristic where it will perform as a battery controller for the battery storage. Furthermore, the charging and discharging rates will depend on the signal from the MG at power secondary and its signal will be read by the battery controller and choose either to charge or discharge the battery storage where it will suffice the energy demand by loads in the micro-grid. The simulation results show the effectiveness of the controller to control sharing the power based on the desired energy from the battery storage to the loads at the MG. Moreover, all the critical cases have been advised, such as sudden decrease or disturbance of any generating unit. The result has been observed that due to sudden decrease or disturbance of any generating unit, the battery controller manages to control the charging and discharging rate based on the insufficient energy caused by the disturbance to fulfil the demand at MG.
Developing barcode scan system of a small-scaled reverse vending machine to sorting waste of beverage containers Erikson Ferry Sinaga; Richard Irawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14776

Abstract

Reduce, Reuse, and Recycle is a campaign which aims to reduce the production of waste. Industry used plastic bottle and cans to store the beverage. A research was done by University of Georgia, United States and was published by Wall Street Journal stated that Indonesia is the second predicate country which produced and mismanaged plastic waste in the world. This condition shoud be overcome and this research project was intended to develop reverse vending machine (RVM) to sorting waste of beverage containers either plastic bottles or cans as a campaign to reduce the production of waste. This RVM machine uses barcode scanning as the sorting system to determine whether the plastic bottle or can could be recycled or not. In order to check the weight of the beverage container, a load cell sensor is used to check whether the beverage container is empty or not. The machine will receive the container from the conveyor station, check the weight, and finally transfer it to the sorting station. The container will be sorted as cans or plastic bottle by the aid of barcode scanning and compare it to database. Furthermore, the plastic bottle will be sorted as clear or colored plastic bottle. Unrecyclable plastic or can container or any unemptied container will be classified as rejected container and be returned to the user through the outlet passage. The performance testing was done with 12 different types of plastic bottle and can and 10 samples for each type, so there were total 120 items tested and the result showed that the success rate was 94% while the processing time was varying in between 8 to 13 seconds.
Detection of uveal melanoma using fuzzy and neural networks classifiers Daniel F. Santos; Helbert Eduardo Espitia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14228

Abstract

The use of image processing is increasingly utilized for disease detection. In this article, an algorithm is proposed to detect uveal melanoma (UM) which is a type of intraocular cancer. The proposed method integrates algorithms related to iris segmentation and proposes a novel algorithm for the detection of UM from the approach of fuzzy logic and neural networks. The study case results show 76% correct classification in the fuzzy logic system and 96.04% for the artificial neural networks.
The design of a smart home controller based on ADALINE Puji Catur Siswipraptini; Rosida Nur Aziza; Iriansyah Sangadji; Indrianto Indrianto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14893

Abstract

This paper proposes a prototype of an improved smart home controller that implements a neural network-based algorithm for enabling the controller to make decisions and act based on the current condition. Unlike previous approaches, this design also utilizes the use of IoT (internet of thing) technology and neural network based-algorithm for developing the controller. Since a smart home is equipped with various sensors, actuators, smart appliances, and mobile terminals, all of these devices need to be connected to the Internet to be able to communicate and provide services for its occupants. The construction of the proposed controller is carried out through several procedures, i.e. the implementation of the ADALINE (adaptive linear) as the neural network method, the design of the smart home controller prototype, and the validation process using mean average percentage error (MAPE) calculation. This prototype integrates functionalities of several household appliances into one application controlled by a smartphone. ADALINE is applied as an algorithm to predict output when the controller is in automatic mode. Although the obtained accuracy value is still not satisfactory, the value is bound to change when testing on more data. The work published in this paper may encourage the implementation of smart technology in more households in Indonesia. 
Image transmission using visible light communication in data communication Alfajri Tsaqifurrosyid; Mia Rosmiati; Moch. Fachru Rizal
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14892

Abstract

The development of network communication technology is currently developing rapidly, one of which is the use of LED lights that are not only used as lighting in the room but can also be used as a medium of data communication between users through light media. VLC is the latest innovation in the field of data communication that is currently being developed where the process of sending data used light media.. The simulation  of sending data using VLC can be done on the transmitter and receiver side by using Visual Studio application as an application that can visualize the process of sending data. By using this system the process of sending data every bit from transmiiter to the receiver can be seen so that the success rate of sending data can be easily seen by the user. system used arduino Uno as microprocessor. From the test results obtained the success rate of displaying images sent by the transmitter is 100% with a maximum distance of 50 cm with an image capacity of 20 KB with a delivery time of approximately 30 minutes.
Ant-colony and nature-inspired heuristic models for NOMA systems: a review Law Poh Liyn; Hadhrami Ab. Ghani; Farah Najwa Roslim; Nur Asyiqin Amir Hamzah; Saeed Mohammed Abdulghani Mohammed; Nor Hidayati Abdul Aziz; Azlan Abd. Aziz; Tan Kim Geok; Azizul Azizan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14995

Abstract

The increasing computational complexity in scheduling the large number of users for non-orthogonal multiple access (NOMA) system and future cellular networks lead to the need for scheduling models with relatively lower computational complexity such as heuristic models. The main objective of this paper is to conduct a concise study on ant-colony optimization (ACO) methods and potential nature-inspired heuristic models for NOMA implementation in future high-speed networks. The issues, challenges and future work of ACO and other related heuristic models in NOMA are concisely reviewed. The throughput result of the proposed ACO method is observed to be close to the maximum theoretical value and stands 44% higher than that of the existing method. This result demonstrates the effectiveness of ACO implementation for NOMA user scheduling and grouping.
Vulnerabilities detection using attack recognition technique in multi-factor authentication Noor Afiza Mohd Ariffin; Fiza Abdul Rahim; Aziah Asmawi; Zul-Azri Ibrahim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14898

Abstract

Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue