cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 40 Documents
Search results for , issue "Vol 19, No 4: August 2021" : 40 Documents clear
Proposed different relay selection schemes for improving the performance of cooperative wireless networks Dheyaa Jasim Kadhim; Saba Qasim Jabbar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18327

Abstract

Relay selection is a new method currently used to develop and improve cooperative wireless networks. One of the main advantages of this new technology is that it can achieve cooperative diversity gain without installing multiple antennas in the transmitter or receiver. Relay selection algorithms can be used to select one node to become a relay node from a set of N candidate relays with optimization criteria as the outage probability or frame error rate. The selection process is preferable to operate in a distributed fashion and offers only reasonable costs in terms of manufacturing complexity and flexible handling over wireless cooperative networks. In this work, different relay selection schemes are proposed to enhance the cooperative wireless networks in terms of different approaches including: 1) Relay selection-based destination feedback scheme, 2) Relay selection based a ready-to-send/clear-to-send (RTS/CTS) messages scheme, 3) Relay selection-based identification messages (IDM) table scheme, and 4) Relay selection-based relay power consuming scheme. The experimental results via suggested case study show that the performance of overall cooperative network is enhanced in terms of increasing throughput, energy saving (efficiency maximization), blocking reduction and outage reduction (PER minimization).
An optimized power allocation algorithm for cognitive radio NOMA communication Madan H. T.; P. I. Basarkod
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20366

Abstract

The primary objective of cognitive radio network is to effectively utilize the unused spectrum bands. In cognitive radio networks, spectrum sharing between primary and secondary users is accomplished using either underlay or interweave cognitive radio approach. Non orthogonal multiple access (NOMA) is the proven technology in the present wireless developments, which allows the coexistence of multiple users in the same orthogonal block. The new paradigm cognitive radio NOMA (CR-NOMA) is one of the potential solutions to fulfill the demands of future wireless communication. This paper emphasizes on practical implementation of NOMA in cognitive radio networks to enhance the spectral efficiency. The goal is to increase the throughput of the secondary users satisfying the quality of service (QOS) requirements of primary users. To achieve this, we have presented the optimized power allocation strategy for underlay downlink scenario to support the simultaneous transmission of primary and secondary users. Furthermore, we have proposed QOS based power allocation scheme for CR-NOMA interweave model to support the coexistence of multiple secondary networks. Also, the changes adopted in implementing superposition coding (SC) and successive interference cancellation (SIC) for CR-NOMA are highlighted. Finally, simulation results validate the mathematical expressions that are derived for power allocation coefficient and outage probability.
Application of big data for distribution and consumption of power Olagunju Mukaila; Adeniyi Abidemi Emmanuel; Ogundokun Roseline Oluwaseun; Ojo Olufemi Samuel; Kolawole Paul Oluwatoba
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.16285

Abstract

The exponentially growing and tremendous collection of data stored in the power sector, combined with the need for data analysis, has produced an urgent need for powerful tools to extract hidden data as to effectively distribute the power for proper consumption for the household. This research work was embarked on to show the business value of big data analytics in Energy and utilities with a focus on how analytics can help solve problems of inefficiency and wastages in electricity generation, production and distribution and how raw energy datasets can be converted into insights that can be used by energy policy makers to make major business decisions. To explicitly show how raw data can be turned into insights, the study deploys the use of the Hadoop on Hortonworks’ open-source apache-Hive licensed data warehousing framework run on a windows operating system to turn raw datasets (in excel formats converted to .csv format) gotten from the prepaid meters of 196,000 consumers (households and businesses) in 11 business units of Ikeja Electricity Distribution Company (IKEDC, Nigeria) to analyze the distribution and consumption of power.
Lung cancer classification based on CT scan image by applying FCM segmentation and neural network technique Ahmad Zoebad Foeady; Siti Ria Riqmawatin; Dian Candra Rini Novitasari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18874

Abstract

The number of people with lung cancer has reached approximately 2.09 million people worldwide. Out of 9.06 million cases of death, 1.76 million people die due to lung cancer. Lung cancer can be automatically identified using a computer-aided diagnosis system (CAD) such as image processing. The steps taken for early detection are pre-processing feature extraction, and classification. Pre-processing is carried out in several stages, namely grayscale images, noise removal, and contrast limited adaptive histogram equalization. This image feature extracted using GLCM and classified using 2 method of neural network which is feed forward neural network (FFNN) dan feed backward neural network (FBNN). This research aims to obtain the best neural network model to classify lung cancer a. Based on training time and accuracy, the best method of FFNN is kernel extreme learning machine (KELM), with a training time of 12 seconds and an accuracy of 93.45%, while the best method of FBNN is Backpropagation with a training time of 18 minutes 04 seconds and an accuracy of 97.5%.
Physical cyber-security algorithm for wireless sensor networks Dhuha Dheyaa Khudhur; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18464

Abstract

Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the system to be out of service. In this paper, a cyber-security algorithm is proposed for physical level of WSN that adopts message queuing telemetry transport (MQTT) protocol for data transmission and networking. This algorithm predicts the DoS attacks at the first time of happening to be isolated from the WSN. It includes three stages of detecting the attack, predicting the effects of this attack and preventing the attacks by excluding the predicted nodes from the WSN. We applied a type of DoS attack that is a DoS injection attack (DoSIA) on the network protocol. The proposed algorithm is tested by adopting three case studies to cover the most common cases of attacks. The experiment results show the superior of the proposed algorithm in detecting and solving the cyber-attacks.
Online traffic classification for malicious flows using efficient machine learning techniques Ying Yenn Chan; Ismahani Bt Ismail; Ban Mohammed Khammas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20402

Abstract

The rapid network technology growth causing various network problems, attacks are becoming more sophisticated than defenses. In this paper, we proposed traffic classification by using machine learning technique, and statistical flow features such as five tuples for the training dataset. A rule-based system, Snort is used to identify the severe harmfulness data packets and reduce the training set dimensionality to a manageable size. Comparison of performance between training dataset that consists of all priorities malicious flows with only has priority 1 malicious flows are done. Different machine learning (ML) algorithms performance in terms of accuracy and efficiency are analyzed. Results show that Naïve Bayes achieved accuracy up to 99.82% for all priorities while 99.92% for extracted priority 1 of malicious flows training dataset in 0.06 seconds and be chosen to classify traffic in real-time process. It is demonstrated that by taking just five tuples information as features and using Snort alert information to extract only important flows and reduce size of dataset is actually comprehensive enough to supply a classifier with high efficiency and accuracy which can sustain the safety of network.
Performance analysis for three cases of outage probability in one-way DF full-duplex relaying network with presence of direct link Phu Tran Tin; Van-Duc Phan; Le Anh Vu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.17477

Abstract

In this paper, the one-way decode-and-forward (DF) full-duplex relaying network system with presence of direct link is investigated. In the analysis section, we derived the exact, lower, and upper bound for outage probability (OP) with maximal ratio combining (MRC) at the receiver. Furthermore, the system performance's analytical expressions are verified by using the Monte Carlo simulation. In addition, we investigated the effect of the main parameters on the OP of the proposed system. Finally, we can sate that the simulation curves overlap the analytical curves to convince the analysis section. This research can provide a novel recommendation for the communication network.
An adaptive IoT architecture using combination of concept-drift and dynamic software product line engineering I Made Murwantara; Pujianto Yugopuspito
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.19012

Abstract

Internet of things (IoT) architecture needs to adapt autonomously to the environment and operational to maintain their supreme services. One common problem in the IoT architecture is to manage the reliability of data services, such as sensors’ data, that only sending data to the collector via gateway. If there is a disruption of services, then it is not easy to manage the system reliability. To this, an adaptive environment which is based on software reconfiguration creates a great challenge to provide better services. In this work, the software product line engineering (SPLE) reconfigures the edge devices via rules and software architecture. To identify disruption of data services which can be detected based on anomaly and truncated data. Our work makes use of concept drift to provide a recommendation to the system manager. This is important to avoid misconfiguration in the system We demonstrate our method using an open-source internet of things portal system that integrated to a cluster of sensors which is attached to specific gateway before the data are collected into a cloud storage for further processes. In identifying drifting data, the adaptive sliding window (ADWIN) method outperforms the Page-Hinkley (PH) with more selective identification and sensitive reading.
Social welfare maximization based optimal energy and reactive power dispatch using ant lion optimization algorithm Surender Reddy Salkuti; P. Sravanthi; Seong-Cheol Kim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18351

Abstract

In this paper an optimal energy and reactive power dispatch problem is solved by using the ant lion optimization (ALO) algorithm by considering the total cost minimization and social welfare maximization (SWM) objectives. Two different market models are proposed in this work, i.e., conventional/sequential market clearing and the proposed/simultaneous market clearing. In each market model, two objectives, i.e., total cost minimization and SWM are considered. The conventional social welfare (SW) consists the benefit function of consumers and the cost function of active power generation. In this paper, the conventional SW is modified by including the reactive power cost function. The reactive power cost calculation is exactly same as that in the conventional practice. The most important difference is that instead of doing cost calculation in post-facto manner as in conventional practice, simultaneous approach is proposed in this work. The scientificity and suitability of the proposed simultaneous active and reactive power methodology has been examined on standard IEEE 30 bus test system.
Enhancing text classification performance by preprocessing misspelled words in Indonesian language Reza Setiabudi; Ni Made Satvika Iswari; Andre Rusli
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20369

Abstract

Supervised learning using shallow machine learning methods is still a popular method in processing text, despite the rapidly advancing sector of unsupervised methodologies using deep learning. Supervised text classification for application user feedback sentiments in Indonesian Language is one of the applications which is quite popular in both the research community and industry. However, due to the nature of shallow machine learning approaches, various text preprocessing techniques are required to clean the input data. This research aims to implement and evaluate the role of Levenshtein distance algorithm in detecting and preprocessing misspelled words in Indonesian language, before the text data is then used to train a user feedback sentiment classification model using multinomial Naïve Bayes. This research experimented with various evaluation scenarios, and found that preprocessing misspelled words in Indonesian language using the Levenshtein distance algorithm could be useful and showed a promising 8.2% increase on the accuracy of the model’s ability to classify user feedback text according to their sentiments.

Page 3 of 4 | Total Record : 40


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue