cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
ATLAS: Adaptive Text Localization Algorithm in High Color Similarity Background LihFong Wong; Mohd Yazid Idris
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 3: September 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i3.1474

Abstract

One of the major problems that occur in text localization process is the issue of color similarity between text and background image. The limitation of localization algorithms due to high color similarity is highlighted in several research papers. Hence, this research focuses towards the improvement of text localizing capability in high color background image similarity by introducing an adaptive text localization algorithm (ATLAS). ATLAS is an edge-based text localization algorithm that consists of two parts.  Text-Background Similarity Index (TBSI) being the first part of ATLAS, measures the similarity index of every text region while the second, Multi Adaptive Threshold (MAT), performs multiple adaptive thresholds calculation using size filtration and degree deviation for locating the possible text region. In this research, ATLAS is verified and compared with other localization techniques based on two parameters, localizing strength and precision. The experiment has been implemented and verified using two types of datasets, generated text color spectrum dataset and Document Analysis and Recognition dataset (ICDAR). The result shows ATLAS has significant improvement on localizing strength and slight improvement on precision compared with other localization algorithms in high color text-background image.
Paper-based Verification Design of Trade Business License in Indonesia Pizaini Pizaini; Sugi Guritman; Heru Sukoco
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 4: December 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i4.2915

Abstract

The trade business license certificate (SIUP) is a paper-based license to conduct trade businesses in Indonesia issued by the government. Until today, there is no mechanism for verifying the validity of document unless to verify it manually. The current paper presents a design that allows paper-based verification of the printed trade business license. It aims to provide the verification mechanism and ensure the document validity. Our design implemented digital signature with QR Code image that placed into the document and the digital certificate issued by a certification authority (CA). The proposed scheme generated 442Bytes of data and version 14 of QR Code to scan easily by a reader device. The experimental result indicates that our scheme is easy and feasible to implement in Indonesia with guaranteed the document integrity, authentication, and nonrepudiation.
Intelligent Image Capturing Alarm System Using Raspberry Pi K.A.M. Annuar; N.A. Ab Hadi; S.K. Subramaniam; M. F. Mohd Ab Halim; M.B. N. Shah; A.F. Kadmin; M.S. Amri; A. Abdul Salam
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6532

Abstract

Home surveillance system assumes an essential part in this present day living style to help recognizing illegal activities. In this proposed paper, an intelligent image capturing alarm system to protect locker was developed. Raspberry Pi 2 is used as the main controller (server). At the point when any conceivable intrusion is identified, a webcam installed to Raspberry Pi 2 will capture the picture of the intruder. In the meantime, the spotlight or light of the house which represented by an LED will be turned "ON" alongside an alarm sound from a buzzer which is fixed as an output. Taking everything into account, this improvement offers reasonable and easy to use surveillance alarm system.
Design of Dual Band Stacked RDRA for 5G Applications A. I. Bugaje; M. H. Jamaluddin; R. Selvaraju; M. N. Hafiz; AdulKadir Bello Shallah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.9037

Abstract

This paper focuses on the investigation and discussion of three different designs of stacked Rectangular Dielectric Resonator Antenna (RDRA) at dual bands of 25 GHz and 32 GHz for 5G applications. First, basic stacked RDRA. Second, basic stacked RDRA with a single notch. Third, basic stacked RDRA with double notches. All the proposed structure consists of two stacked DRA of dielectric permittivity of 10 which mounted on a Duriod dielectric substrate of dielectric permittivity of 2.2 and feed by Microstrip aperture slot feeding technique (MSA) for 50 Ω characteristic impedance. Authentication of all the proposed designs comparison is completed using 3D simulation tool by observing the performance of reflection coefficient, bandwidth, and gain. All the proposed RDRA are demonstrated simulated reflection coefficient lower than 20 dB for both bands and simulated gain more than 6 dBi. Meanwhile, for simulated bandwidth, only the proposed basic stacked RDRA with single and double notches are demonstrated simulated bandwidth more than 1 GHz, which fulfill the requirement for 5G applications.
Using Alpha-cuts and Constraint Exploration Approach on Quadratic Programming Problem Yosza Dasril; Zahriladha Zakaria; Ismail Bin Mohd
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.11584

Abstract

In this paper, we propose a computational procedure to find the optimal solution of quadratic programming problems by using fuzzyalpha-cuts and constraint exploration approach. We solve the problems in the original form without using any additional information such as Lagrange’s multiplier, slack, surplus and artificial variable. In order to find the optimal solution, we divide the calculation in two stages. In the first stage, we determine the unconstrained minimization of the quadratic programming problem (QPP) and check its feasibility. By unconstrained minimization we identify the violated constraints and focus our searching in these constraints. In the second stage, we explored the feasible region along side the violated constraintsuntil the optimal point is achieved. A numerical example is included in this paper to illustrate the capability of alpha-cuts and constraint exploration to find the optimal solution of QPP.
Real interpolation method for transfer function approximation of distributed parameter system Phu Tran Tin; Minh Tran; Le Anh Vu; Nguyen Quang Dung; Tran Thanh Trang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.11088

Abstract

Distributed parameter system (DPS) presents one of the most complex systems in the control theory. The transfer function of a DPS possibly contents: rational, nonlinear and irrational components. This thing leads that studies of the transfer function of a DPS are difficult in the time domain and frequency domain. In this paper, a systematic approach is proposed for linearizing DPS. This approach is based on the real interpolation method (RIM) to approximate the transfer function of DPS by rational-order transfer function. The results of the numerical examples show that the method is simple, computationally efficient, and flexible.
A new multi-level key block cypher based on the Blowfish algorithm Suhad Muhajer Kareem; Abdul Monem S. Rahma
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.13556

Abstract

Blowfish is a block cypher algorithm used in many applications to enhance security, but it includes several drawbacks. For example, the mix between the key and data is limited. This paper presents a new modification to the Blowfish algorithm to overcome such problems realised through a multi-state operation instead of an XOR. Our proposed algorithm uses three keys in the encryption and decryption processes instead of one for controlling the variable block bits sizes (1, 2, 4, and 8) bits and for determining the state table numbers. These tables are formed from the addition in a Galois field GF (2n) based on block bit size to increase the complexity of the proposed algorithm. Results are evaluated based on the criteria of complexity, time encryption, throughout, and histogram, and show that the original Blowfish, those modified by other scholars, and our proposed algorithm are similar in time computation. Our algorithm is demonstrated to be the most complex compared with other well-known and modified algorithms. This increased complexity score for our proposed Blowfish makes it more resistant against attempts to break the keys.
A novel method for digital data encoding-decoding Amjad Y. Hindi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.14279

Abstract

Cryptography is one of the paramount and most vital data treatment processes, it allows us to be secure in our electronic transactions. The process of cryptography protects our valuable data such as private account numbers and transaction amounts, electronic signatures replace handwritten signatures or credit card authorizations, and public-key encryption provides confidentiality. The objective of data encryption is to keep digital data confidentiality save as it is stored on computer systems and transferred using the internet or other computer networks. In this paper we will focus in enhancing security level of the encryption-decryption process by introducing a novel method, which uses any digital color image to encode-decode secret message, the using of a special key to encrypt-decrypt the encoded-decoded message, the color image will be known only by the transmitter and receiver to keep the process of data treatment confidential, the obtained experimental results by the proposed method will be analyzed to prove the enhancement in process efficiency and confidentiality.
Statistical MOSFET Parameter Extraction with Parameter Selection for Minimal Point Measurement Marga Alisjahbana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 3: September 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i3.1129

Abstract

A method to statistically extract MOSFET model parameters from a minimal number of transistor I(V) characteristic curve measurements, taken during fabrication process monitoring. It includes a sensitivity analysis of the model, test/measurement point selection, and a parameter extraction experiment on the process data. The actual extraction is based on a linear error model, the sensitivity of the MOSFET model with respect to the parameters, and Newton-Raphson iterations. Simulated results showed good accuracy of parameter extraction and I(V) curve fit for parameter deviations of up 20% from nominal values, including for a process shift of 10% from nominal.
Augmented Reality Prototype for Visualising Large Sensors’ Datasets Folorunso Olufemi A.; Mohd Shahrizal S. Mohd Shahrizal S.; Ikotun Abiodun M.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 1: April 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i1.684

Abstract

This paper addressed the development of an augmented reality (AR) based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil leakages sensors datasets. Sensors generates significant amount of multivariate datasets during normal and leak situations which made data exploration and visualisation daunting tasks. Therefore a model to manage such data and enhance computational support needed for effective explorations are developed in this paper. A challenge of this approach is to reduce the data inefficiency. This paper presented a model for computing information gain for each data attributes and determine a lead attribute.The computed lead attribute is then used for the development of an AR-based scientific visualization interface which automatically identifies, localises and visualizes all necessary data relevant to a particularly selected region of interest (ROI) on the network. Necessary architectural system supports and the interface requirements for such visualizations are also presented.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue