cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 40 Documents
Search results for , issue "Vol 19, No 4: August 2021" : 40 Documents clear
Customized sorting and packaging machine Ashish Bhatnagar; Rachit Patel; Manan Gupta; Mayank Pal; Lakshay Kumar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.16786

Abstract

India is a country which has a cornerstone of agriculture. And as it comes to fruit/vegetable sorting and packaging in India, human labor has been a vital part. With manual hand picking, it is a very laborious task to classify the quality of fruits/vegetables and simultaneously pack them. One leading-edge technology for the fulfilment of this purpose is ‘Image Processing’ technology which is extremely fast and cost-efficient. Our whole idea revolves around the fact that each fruit will be inspected, sort and simultaneously packed. For the same, a low cost automated mechatronic system has designed consisting of a solitary mechanical arrangement, which is controlled and synchronized through electronic components. Fruits/vegetables are sorted as high-quality and low-quality on the basis of physical appearance and weight. For this, a suitable algorithm is designed using the Open CV library. And the sorting is done using Arduino Uno and Raspberry pi. Hence the aim is to develop a sorting and packaging facility that can be established at the very root level itself which will be economically compact and accurate and will give more justice to farmers.
Neural network technique with deep structure for improving author homonym and synonym classification in digital libraries Firdaus Firdaus; Siti Nurmaini; Varindo Ockta Keneddi Putra; Annisa Darmawahyuni; Reza Firsandaya Malik; Muhammad Naufal Rachmatullah; Andre Herviant Juliano; Tio Artha Nugraha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18878

Abstract

Author name disambiguation (AND), also recognized as name-identification, has long been seen as a challenging issue in bibliographic data. In other words, the same author may appear under separate names, synonyms, or distinct authors may have similar to those referred to as homonyms. Some previous research has proposed AND problem. To the best of our knowledge, no study discussed specifically synonym and homonym, whereas such cases are the core in AND topic. This paper presents the classification of non-homonym-synonym, homonym-synonym, synonym, and homonym cases by using the DBLP computer science bibliography dataset. Based on the DBLP raw data, the classification process is proposed by using deep neural networks (DNNs). In the classification process, the DBLP raw data divided into five features, including name, author, title, venue, and year. Twelve scenarios are designed with a different structure to validate and select the best model of DNNs. Furthermore, this paper is also compared DNNs with other classifiers, such as support vector machine (SVM) and decision tree. The results show DNNs outperform SVM and decision tree methods in all performance metrics. The DNNs performances with three hidden layers as the best model, achieve accuracy, sensitivity, specificity, precision, and F1-score are 98.85%, 95.95%, 99.26%, 94.80%, and 95.36%, respectively. In the future, DNNs are more performing with the automated feature representation in AND processing.
A detailed review of blockchain-based applications for protection against pandemic like COVID-19 Mousa Mohammed Khubrani; Shadab Alam
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18465

Abstract

The recent corona virus disease (COVID-19) pandemic has brought the issues of technological deficiencies and challenges of security and privacy, validating and maintaining anonymity, user control over records while fully utilizing the available records etc., that can be encountered in an emergency or pandemic condition. Blockchain technology has evolved as a promising solution in conditions that necessitate immutability, record integrity, and proper records authentication. Blockchain can effectively resolve the technical barriers and effectively utilize the available resources and infrastructure in pandemic situations like the current COVID-19. This paper provides an extensive review of various possible use cases of blockchain and available solutions for protection against the COVID-19 like situation. It gives an insight into the benefits and shortcomings of available solutions. It further provides the issues and challenges of adopting blockchain in a situation like COVID-19 and suggest future directions that can offer a platform for further improved and better solutions.
Lower and upper bound form of outage probability in one-way AF full-duplex relaying network under impact of direct link Phu Tran Tin; Van-Duc Phan; Le Anh Vu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.17683

Abstract

This paper proposed and investigated the one-way amplify-and-forward (AF) full-duplex relaying network under impact of direct link. For the system performance analysis, the exact and lower and upper bound form of the system outage probability (OP) are investigated and derived. In this system model, authors assume that the E uses the MRC (maximal ratio combining) technique. Finally, we can see that the analytical and the simulation values overlap to verify the analytical section using the Monte Carlo simulation. Also, we investigate the influence of the system primary parameters on the proposed system OP.
Dynamic mobile anchor path planning for underwater wireless sensor networks Mohammad Hafiz Mohamed; Kamalrulnizam Abu Bakar; Ismail Fauzi Isnin; M. Zulkifli M. Zaki; Herman Herman; Fatima Tul Zuhra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.19016

Abstract

In an underwater wireless sensor network (UWSN), the location of the sensor nodes plays a significant role in the localization process. The location information is obtained by using the known positions of anchor nodes. For underwater environments, instead of using various static anchor nodes, mobile anchor nodes are more efficient and cost-effective to cover the monitoring area. Nevertheless, the utilization of these mobile anchors requires adequate path planning strategy. Mzost of the path planning algorithms do not consider irregular deployment, caused by the effects of water currents. Consequently, this leads towards the inefficient energy consumption by mobile anchors due to unnecessary transmission of beacon messages at unnecessary areas. Therefore, an efficient dynamic mobile path planning (EDMPP) algorithm to tackle the irregular deployment and non-collinear virtual beacon point placement, targeting the underwater environment settings is presented in this paper. In addition, EDMPP controls the redundant beacon message deployment and overlapping, for beacon message distribution in mobile assistant localization. The simulation results show that the performance of the EDMPP is improved by increasing the localization accuracy and decreasing the energy consumption with optimum path length.
Smart antenna design alimented by a 4x4 butler matrix S. Almorabeti; H. Terchoune; M. Rifi; H. Tizyi; S. Smihily
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18788

Abstract

In the last decades, the development of efficient antennas for wireless power transfer applications has gained great attention from researchers worldwide and has become a vital research topic. In this paper, we propose the optimum design and implementation in microstrip technology of a switched beam smart antenna alimented by a 4x4 butler matrix (BM) for a microwave wireless power transmission system (MPT) at 5.8 GHz. The proposed smart antenna consists of a four linear microstrip patch antenna array and a 4x4 butler matrix beamforming network. It was able to form and steer four orthogonal beams in the four directions (±39°, and ±15°). Furthermore, it exhibited a high gain of 17.98 dB and good simulated and measured return losses. The design, optimization and simulation of the smart antenna components were performed using advanced design system (ADS).
Data delivery performance on MongoDB generated by WSN over high data load Mochammad Hannats Hanafi Ichsan; Buce Trias Hanggara; Rakhmadhany Primananda
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18358

Abstract

Wireless sensor networks (WSN) Environment is a collection of nodes that sensing and sending data to other nodes in a large number of nodes. One of the WSN concepts is continuous or periodic data collection, then the data obtained can be further processed. From this process, it is possible to produce large data, so the process of sending and storing data becomes a high load. Data obtained from WSN nodes vary greatly, which affects on sending and storing of data. Therefore, a study is needed to analyze WSN's ability to send and store large amounts of data. Message query telemetry protocol (MQTT) is used because it could save resources on communication and MongoDB used because it does not have the concept of tables and rows, this is very suitable for variations in data generated by WSN. In this study, it can be concluded that the performance of MongoDB on high data amount is acceptable, so MongoDB is highly recommended for WSN implementation.
Construction of fuzzy radial basis function neural network model for diagnosing prostate cancer Agus Maman Abadi; Dhoriva Urwatul Wutsqa; Nurlia Ningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20398

Abstract

In this paper, we propose a construction of fuzzy radial basis function neural network model for diagnosing prostate cancer. A fuzzy radial basis function neural network (fuzzy RBFNN) is a hybrid model of logical fuzzy and neural network. The fuzzy membership function of the fuzzy RBFNN model input is developed using the triangle function. The fuzzy C-means method is applied to estimate the center and the width parameters of the radial basis function. The weight estimation is performed by various ways to gain the most accurate model. A singular value decomposition (SVD) is exploited to address this process. As a comparison, we perform other ways including back propagation and global ridge regression. The study also promotes image preprocessing using high frequency emphasis filter (HFEF) and histogram equalization (HE) to enhance the quality of the prostate radiograph. The features of the textural image are extracted using the gray level co-occurrence matrix (GLCM) and gray level run length matrix (GLRLM). The experiment results of fuzzy RBFNN are compared to those of RBFNN model. Generally, the performances of fuzzy RBFNN surpass the RBFNN in all accuracy calculation. In addition, the fuzzy RBFNN-SVD demonstrates the most accurate model for prostate cancer diagnosis.
From cloud computing security towards homomorphic encryption: A comprehensive review Saja J. Mohammed; Dujan B. Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.16875

Abstract

“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing.
A numerical-analytical iterative method for solving an electrical oscillator equation Sudi Mungkasi; Damar Widjaja
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18987

Abstract

Self-excited oscillation problem occurring from a triode electrical circuit has been modelled by van der Pol. Until now, the exact solution to the van der Pol equation is not available. This paper focuses on finding a new method for solving the van der Pol equation simply and accurately. There exists several approximate iterative methods available in the literature for solving the van der Pol equation, such as, the successive approximation method. The successive approximation method is simple, but inaccurate for large time values. In this paper, we propose a new variant of numerical-analytical method, which is simple but accurate, for solving the van der Pol equation. Our new variant of numerical-analytical method solves the van der Pol equation from its equivalent system of first order ordinary differential equations. Our strategy leads to a simple implementation of the numerical-analytical method in the multistage way. Furthermore, computational experiments show that our proposed method is accurate for large sizes of time domain in solving the van der Pol equation.

Page 4 of 4 | Total Record : 40


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue