cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 66 Documents
Search results for , issue "Vol 18, No 6: December 2020" : 66 Documents clear
A new clustering technique based on replication for MANET routing protocols Salma S. Mohammed; A. I. Abd-Elfattah; Mohamed A. Mohamed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15998

Abstract

The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
Wireless control system for spy devices based dual tone multi frequency technology Jabbar Shatti Jahlool; Mohammed Abdulla Abdulsada
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15846

Abstract

Obtaining information is one of the most important requirements for  intelligence works, spy surveillance cameras and listening devices are among the important means for this. One problem of using these means is a mechanism of controlling them to sustain their work efficiently for the perpetuating of achieving the purpose of their installation. In this research, the problem of controlling these devices has been overcome, by designing asystem dependent on the dual tone multi frequency (DTMF) and global system for mobile(GSM) networks. In the proposed work, designing and  implementing a system to remotely and wirelessly control of the movement of spy cameras in all directions as well as the ability to control the on/off listing audio device anytime and anywhere. The proposed mechanism is implementedby dividing the work into nine modes, with each one performing one specificfunction. These work modes are used to control all system activities such as control the horizontal directional motor (HDM) to change the spy camera in different horizontal directions, control the vertical directional motor (VDM) to change the camera in vertical directions and control the working status of the listening device.
Using position control to improve the efficiency of wind turbine Roshen Tariq Ahmedhamdi; Salam Waley Shneen
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16171

Abstract

Wind energy is one of the renewable energies that can be using to generate electricity. Increasing demand for this type of renewable energy for sustainability and accessibility. Environmentally as it does not cause any pollution in addition to the abundance of required equipment and lessmaintenance and long operation life of its parts despite the high cost of the system at its installation but at long term, become cheaper. Wind power generators depend on their operation on wind speed and direction. Therefore,it should be installing in places where the wind speed is adequate and sufficient to rotate its rotor, it knows that wind speed is variable in its speed and direction they change every hour and every season. In this design, many practical and theoretical (simulation) experiments have been done which will be mentioned and explained in details in this research shows that this mechanism raises the efficiency of wind power generators by 80% when the rotor of the wind turbine directed towards the wind than if they were fixed direction.
Power saving and optimal hybrid precoding in millimeter wave massive MIMO systems for 5G Abdul Haq Nalband; Mrinal Sarvagy; Mohammed Riyaz Ahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15952

Abstract

The proliferation of wireless services emerging from use cases offifth-generation(5G) technology is posing many challenges on cellular communicationinfrastructure. They demand to connect a massive number of devices withenhanced data rates. The massive multiple-input multiple-output (MIMO)technology at millimeter-wave (mmWave) in combination with hybrid precodingemerges as a concrete tool to address the requirements of 5G networkdevelopments. But Massive MIMO systems consume significant power fornetwork operations. Hence the prior role is to improve the energy efficiency byreducing the power consumption. This paper presents the power optimizationmodels for massive MIMO systems considering perfect channel state information(CSI) and imperfect CSI. Further, this work proposes an optimal hybrid precodingsolution named extended simultaneous orthogonal matchingpursuit (ESOMP).Simulation results reveal that a constant sum-rate can be achieved in massiveMIMO systems while significantly reducing the power consumption. Theproposed extended SOMPhybrid precoder performsclose to the conventionaldigital beamforming method. Further, modulation schemes compatible withmassive MIMO systems are outlined and their bit error rate (BER) performance isinvestigated
Design of a controller for wheeled mobile robots based on automatic movement sequencing Holman Montiel Ariza; Fredy H. Martínez S.; Fernando Martínez S.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16431

Abstract

There are many kinds of robots and among them the wheeled mobile robots (WMR) stand out, because they are relatively cheap and easy to build. These features make WMRs the test prototypes for control strategies or motion generation. In general, the controllers developed are based on sensory schemes that give an WMR the ability to travel through flat or obstructed environments. However, these strategies are highly reactive, i.e. they are based on the control-action scheme and are not adaptive; or, they are motion schemes built from simulations that assume the environmental conditions to determine the robot's path. In both cases, WMRs do not adapt perfectly to the change of environment, since the controller does not find appropriate movements for the  robot to move from one point to another. Therefore, this article proposesapartial solution to this problem, with a controller that generates sets of adaptive movements for an WMR to travel around its environment from the sensory perception information.
Authentication system for e-certificate by using RSA’s digital signature Kritsanapong Somsuk; Mongkhon Thakong
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.17278

Abstract

Online learning and teaching become the popular channel for all participants, because they can access the courses everywhere with the high-speed internet. E-certificate is being prepared for everyone who has participated or passed the requirements of the courses. Because of many benefits frome-certificate, it may become the demand for intruders to counterfeit the certificate. In this paper, Rivest-Shamir-Adleman (RSA)’s digital signature is chosen to signe-certificate in order to avoid being counterfeited by intruders. There are two applications to managee-certificate. The first application is the signing application to sign the sub image including only participant’s name in e-certificate. In general, the file of digital signature is divided frome-certificate. That means, both of them must be selected to compare each other in checking application. In fact, the solution will be approved when each pixel of participant’s name is equal to each part from the decrypted message at the same position. In experimental session, 40 e-certificatesare chosen for the implementation. The results reveal that the accuracy is 100% and both of signing and checking processes are completed rapidly fast, especially when signing application is applied with Chinese remainder theorem (CRT) or the special technique of CRT. Therefore, the proposed method is one of the best solutions to protect e-certificate from the forgery by intruders.
Predictions on wheat crop yielding through fuzzy set theory and optimization techniques Julio Barón Velandia; Norbey Danilo Muñoz Cañón; Brayan Leonardo Sierra Forero
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15870

Abstract

Agricultural field’s production is commonly measured through the performance of the crops in terms of sow amount, climatology, and the type of crop, among other. Therefore, prediction on the performance of the crops canaid cultivators to make better informed decisions and help the agricultural field. This research work presents a prediction on wheat crop using the fuzzy set theory and the use of optimization techniques, in both; traditional methods and evolutionary meta-heuristics. The performance prediction in this research has its core on the following parameters: biomass, solar radiation, rainfall, and infield’s water extractions. Besides, the needed standards and the efficiency index (EFI) used come from already developed models; such standards include: the root-mean-square error (RMSE), the standard deviation, and the precision percentage. The applicationof a genetic algorithm on a Takagi-Sugeno system requires and highly precise prediction on wheat cropping;being, 0.005216 the error estimation, and 99,928 the performance percentage.
A beamforming comparative study of least mean square, genetic algorithm and grey wolf optimization algorithms for multipath smart antenna system Asma Issa Mohsin; Asaad S. Daghal; Adheed Hasan Sallomi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16970

Abstract

Multipath environment is a limitation fact in optimized usage of wireless networks. Using smart antenna and beamforming algorithms contributed to that subscribers get a higher-gain signal and better directivity as well as reduce the consumed power for users and the mobile base stations by adjusting the appropriate weights for each element in the antenna array that leads to reducing interference anddirecting the main beam to wanted user. In this paper, the performance of three of beamforming algorithms in multipath environment in terms of directivity and side lobe level reduction has been studied and compared, which are least mean square (LMS), genetic algorithm (GA) and grey wolf optimization (GWO) technique. The simulation result appears that LMS algorithm aids us to get the best directivity followed by the GWO, and we may get most sidelobe level reduction by using the GA algorithm, followed by LMS algorithm in second rank.  
Raised cosine/NRZ line coding techniques for upgrading free space optical communication systems through various levels of fog Aadel M. Alatwi; Ahmed Nabih Zaki Rashed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16236

Abstract

This study examines raised cosine/NRZ line coding techniques for upgrading free space optical (FSO) communication systems through various levels of fog.The max. Q factors are simulated and estimated for clear air, light fog, and moderate fog weather conditions at a data rate of 20 Gb/s. The optical signal to noise ratio is also measured for different weather conditions. The total power after both FSO channel and avalanche photodiode (APD) photo-detector receiver is estimated by an optical power meter for max. distances.The study shows that the max. propagation distance is extended to 50 kmthrough clear air, 2.25 km through light fog, and 1.6 km through moderate fog with acceptable max. Q factor
The quality of image encryption techniques by reasoned logic Marwah Kamil Hussein; Kareem Radhi Hassan; Haider M. Al-Mashhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.14340

Abstract

One form of data is digital images, because of their widespread of frequent exchange over the internet it is necessary to preserve the security and privacy of the images transmitted.There are many image encryption techniques that have different security levels and there are many standards and protocols fortesting the quality of encryption security. The cipher images can be evaluated using various quality measuring criteria, these measures quantify certain features of the image. If there are many methods that can be applied to secure images; the question is what is the most powerful scheme that can be use damong these methods? This research try to answer this question by taking three different encryption methods (rivest cipher 5 (RC5), chaotic and permutation) and measure their quality using the peek signal to noise ratio (PSNR),correlation, entropy, number of pixels changes rate (NPCR) and unified average changing intensity (UACI), the results of these criteria were input to a fuzzy logic system that was used to find the best one among them.

Filter by Year

2020 2020


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue