TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
40 Documents
Search results for
, issue
"Vol 19, No 4: August 2021"
:
40 Documents
clear
Proposed different relay selection schemes for improving the performance of cooperative wireless networks
Dheyaa Jasim Kadhim;
Saba Qasim Jabbar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.18327
Relay selection is a new method currently used to develop and improve cooperative wireless networks. One of the main advantages of this new technology is that it can achieve cooperative diversity gain without installing multiple antennas in the transmitter or receiver. Relay selection algorithms can be used to select one node to become a relay node from a set of N candidate relays with optimization criteria as the outage probability or frame error rate. The selection process is preferable to operate in a distributed fashion and offers only reasonable costs in terms of manufacturing complexity and flexible handling over wireless cooperative networks. In this work, different relay selection schemes are proposed to enhance the cooperative wireless networks in terms of different approaches including: 1) Relay selection-based destination feedback scheme, 2) Relay selection based a ready-to-send/clear-to-send (RTS/CTS) messages scheme, 3) Relay selection-based identification messages (IDM) table scheme, and 4) Relay selection-based relay power consuming scheme. The experimental results via suggested case study show that the performance of overall cooperative network is enhanced in terms of increasing throughput, energy saving (efficiency maximization), blocking reduction and outage reduction (PER minimization).
An optimized power allocation algorithm for cognitive radio NOMA communication
Madan H. T.;
P. I. Basarkod
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.20366
The primary objective of cognitive radio network is to effectively utilize the unused spectrum bands. In cognitive radio networks, spectrum sharing between primary and secondary users is accomplished using either underlay or interweave cognitive radio approach. Non orthogonal multiple access (NOMA) is the proven technology in the present wireless developments, which allows the coexistence of multiple users in the same orthogonal block. The new paradigm cognitive radio NOMA (CR-NOMA) is one of the potential solutions to fulfill the demands of future wireless communication. This paper emphasizes on practical implementation of NOMA in cognitive radio networks to enhance the spectral efficiency. The goal is to increase the throughput of the secondary users satisfying the quality of service (QOS) requirements of primary users. To achieve this, we have presented the optimized power allocation strategy for underlay downlink scenario to support the simultaneous transmission of primary and secondary users. Furthermore, we have proposed QOS based power allocation scheme for CR-NOMA interweave model to support the coexistence of multiple secondary networks. Also, the changes adopted in implementing superposition coding (SC) and successive interference cancellation (SIC) for CR-NOMA are highlighted. Finally, simulation results validate the mathematical expressions that are derived for power allocation coefficient and outage probability.
Application of big data for distribution and consumption of power
Olagunju Mukaila;
Adeniyi Abidemi Emmanuel;
Ogundokun Roseline Oluwaseun;
Ojo Olufemi Samuel;
Kolawole Paul Oluwatoba
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.16285
The exponentially growing and tremendous collection of data stored in the power sector, combined with the need for data analysis, has produced an urgent need for powerful tools to extract hidden data as to effectively distribute the power for proper consumption for the household. This research work was embarked on to show the business value of big data analytics in Energy and utilities with a focus on how analytics can help solve problems of inefficiency and wastages in electricity generation, production and distribution and how raw energy datasets can be converted into insights that can be used by energy policy makers to make major business decisions. To explicitly show how raw data can be turned into insights, the study deploys the use of the Hadoop on Hortonworks’ open-source apache-Hive licensed data warehousing framework run on a windows operating system to turn raw datasets (in excel formats converted to .csv format) gotten from the prepaid meters of 196,000 consumers (households and businesses) in 11 business units of Ikeja Electricity Distribution Company (IKEDC, Nigeria) to analyze the distribution and consumption of power.
Lung cancer classification based on CT scan image by applying FCM segmentation and neural network technique
Ahmad Zoebad Foeady;
Siti Ria Riqmawatin;
Dian Candra Rini Novitasari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.18874
The number of people with lung cancer has reached approximately 2.09 million people worldwide. Out of 9.06 million cases of death, 1.76 million people die due to lung cancer. Lung cancer can be automatically identified using a computer-aided diagnosis system (CAD) such as image processing. The steps taken for early detection are pre-processing feature extraction, and classification. Pre-processing is carried out in several stages, namely grayscale images, noise removal, and contrast limited adaptive histogram equalization. This image feature extracted using GLCM and classified using 2 method of neural network which is feed forward neural network (FFNN) dan feed backward neural network (FBNN). This research aims to obtain the best neural network model to classify lung cancer a. Based on training time and accuracy, the best method of FFNN is kernel extreme learning machine (KELM), with a training time of 12 seconds and an accuracy of 93.45%, while the best method of FBNN is Backpropagation with a training time of 18 minutes 04 seconds and an accuracy of 97.5%.
Physical cyber-security algorithm for wireless sensor networks
Dhuha Dheyaa Khudhur;
Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.18464
Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the system to be out of service. In this paper, a cyber-security algorithm is proposed for physical level of WSN that adopts message queuing telemetry transport (MQTT) protocol for data transmission and networking. This algorithm predicts the DoS attacks at the first time of happening to be isolated from the WSN. It includes three stages of detecting the attack, predicting the effects of this attack and preventing the attacks by excluding the predicted nodes from the WSN. We applied a type of DoS attack that is a DoS injection attack (DoSIA) on the network protocol. The proposed algorithm is tested by adopting three case studies to cover the most common cases of attacks. The experiment results show the superior of the proposed algorithm in detecting and solving the cyber-attacks.
Online traffic classification for malicious flows using efficient machine learning techniques
Ying Yenn Chan;
Ismahani Bt Ismail;
Ban Mohammed Khammas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.20402
The rapid network technology growth causing various network problems, attacks are becoming more sophisticated than defenses. In this paper, we proposed traffic classification by using machine learning technique, and statistical flow features such as five tuples for the training dataset. A rule-based system, Snort is used to identify the severe harmfulness data packets and reduce the training set dimensionality to a manageable size. Comparison of performance between training dataset that consists of all priorities malicious flows with only has priority 1 malicious flows are done. Different machine learning (ML) algorithms performance in terms of accuracy and efficiency are analyzed. Results show that Naïve Bayes achieved accuracy up to 99.82% for all priorities while 99.92% for extracted priority 1 of malicious flows training dataset in 0.06 seconds and be chosen to classify traffic in real-time process. It is demonstrated that by taking just five tuples information as features and using Snort alert information to extract only important flows and reduce size of dataset is actually comprehensive enough to supply a classifier with high efficiency and accuracy which can sustain the safety of network.
Performance analysis for three cases of outage probability in one-way DF full-duplex relaying network with presence of direct link
Phu Tran Tin;
Van-Duc Phan;
Le Anh Vu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.17477
In this paper, the one-way decode-and-forward (DF) full-duplex relaying network system with presence of direct link is investigated. In the analysis section, we derived the exact, lower, and upper bound for outage probability (OP) with maximal ratio combining (MRC) at the receiver. Furthermore, the system performance's analytical expressions are verified by using the Monte Carlo simulation. In addition, we investigated the effect of the main parameters on the OP of the proposed system. Finally, we can sate that the simulation curves overlap the analytical curves to convince the analysis section. This research can provide a novel recommendation for the communication network.
An adaptive IoT architecture using combination of concept-drift and dynamic software product line engineering
I Made Murwantara;
Pujianto Yugopuspito
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.19012
Internet of things (IoT) architecture needs to adapt autonomously to the environment and operational to maintain their supreme services. One common problem in the IoT architecture is to manage the reliability of data services, such as sensors’ data, that only sending data to the collector via gateway. If there is a disruption of services, then it is not easy to manage the system reliability. To this, an adaptive environment which is based on software reconfiguration creates a great challenge to provide better services. In this work, the software product line engineering (SPLE) reconfigures the edge devices via rules and software architecture. To identify disruption of data services which can be detected based on anomaly and truncated data. Our work makes use of concept drift to provide a recommendation to the system manager. This is important to avoid misconfiguration in the system We demonstrate our method using an open-source internet of things portal system that integrated to a cluster of sensors which is attached to specific gateway before the data are collected into a cloud storage for further processes. In identifying drifting data, the adaptive sliding window (ADWIN) method outperforms the Page-Hinkley (PH) with more selective identification and sensitive reading.
Social welfare maximization based optimal energy and reactive power dispatch using ant lion optimization algorithm
Surender Reddy Salkuti;
P. Sravanthi;
Seong-Cheol Kim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.18351
In this paper an optimal energy and reactive power dispatch problem is solved by using the ant lion optimization (ALO) algorithm by considering the total cost minimization and social welfare maximization (SWM) objectives. Two different market models are proposed in this work, i.e., conventional/sequential market clearing and the proposed/simultaneous market clearing. In each market model, two objectives, i.e., total cost minimization and SWM are considered. The conventional social welfare (SW) consists the benefit function of consumers and the cost function of active power generation. In this paper, the conventional SW is modified by including the reactive power cost function. The reactive power cost calculation is exactly same as that in the conventional practice. The most important difference is that instead of doing cost calculation in post-facto manner as in conventional practice, simultaneous approach is proposed in this work. The scientificity and suitability of the proposed simultaneous active and reactive power methodology has been examined on standard IEEE 30 bus test system.
Enhancing text classification performance by preprocessing misspelled words in Indonesian language
Reza Setiabudi;
Ni Made Satvika Iswari;
Andre Rusli
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.20369
Supervised learning using shallow machine learning methods is still a popular method in processing text, despite the rapidly advancing sector of unsupervised methodologies using deep learning. Supervised text classification for application user feedback sentiments in Indonesian Language is one of the applications which is quite popular in both the research community and industry. However, due to the nature of shallow machine learning approaches, various text preprocessing techniques are required to clean the input data. This research aims to implement and evaluate the role of Levenshtein distance algorithm in detecting and preprocessing misspelled words in Indonesian language, before the text data is then used to train a user feedback sentiment classification model using multinomial Naïve Bayes. This research experimented with various evaluation scenarios, and found that preprocessing misspelled words in Indonesian language using the Levenshtein distance algorithm could be useful and showed a promising 8.2% increase on the accuracy of the model’s ability to classify user feedback text according to their sentiments.