TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
2,614 Documents
IEEE 802.11n Physical Layer Implementation on Field Programmable Gate Array
Hendra Setiawan;
Yuhei Nagao;
Masayuki Kurosaki;
Hiroshi Ochi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 1: March 2012
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v10i1.761
Register transfer level (RTL) development is a time cost step that requires high diligence and fidelity to get the valid interpretation of abstraction function of digital circuit. In this research, we introduce and prove that Model-Based Design Process (MBDP) is an effective and efficient way to develop a RTL complex system such as wireless communication. Using MBDP flow, we interpret, develop, and verify the physical layer RTL of a new standard that ratified on the end 2009, i.e. IEEE 802.11n wireless local area network (WLAN). The result of this research is a prototyping FPGA StratixII EP2S180 that has properly worked as a 2x2 MIMO WLAN with maximum throughput 144 Mbps.
Searching and Visualization of References in Research Documents
Firnas Nadirman;
Ahmad Ridha;
Annisa Annisa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v12i2.74
This research aims to develop a module for information retrieval that can trace references from bibliography entries of research documents, specifically those based on Bogor Agricultural University (IPB)’s writing guidelines. A total of 242 research documents in PDF from the Department of Computer Science IPB were used to generate parsing patterns to extract the bibliography entries. With modified ParaTools, automatic extraction of bibliography entries was performed on text files generated from the PDF files. The entries are stored in a database that is used to visualize author relationship as graphs. This module is supplemented by an information retrieval system based on Sphinx search system and also provides information of authors’ publications and citations. Evaluation showed that (1) bibliography entry extraction missed only 5.37% bibliography entries caused by incorrect bibliography formatting, (2) 91.54% bibliography entry attributes could be identified correctly, and (3) 90.31% entries were successfully connected to other documents.
Critical Data Routing (CDR) for Intra Wireless Body Sensor Networks
Javed Iqbal Bangash;
Abdul Hanan Abdullah;
Mohammad Abdur Razzaque;
Abdul Waheed Khan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v13i1.365
Recently, Wireless Body Sensor Network (WBSN) has been emerged as a promising technology to provide medical and healthcare monitoring. It can significantly reduce the health-care cost by providing continuous health monitoring facility to the elderly people suffering from chronic diseases. The life critical and real time medical application of WBSNs requires the assurance of the demanded Quality of Service (QoS) both in terms delay and reliability. This paper proposes Critical Data Routing (CDR) that categorizes the sensory data packets as critical and non-critical data packets. Along with the heterogeneous natured data, it also addresses the high and dynamic path loss and the temperature rise issues caused by postural movement of the human body and electromagnetic waves absorption respectively. The simulation results show that the proposed CDR scheme achieves its designed objective of forwarding the critical data packets within certain time limits and with highest reliability while reducing the temperature rise of the in-body sensor nodes.
An Improved Image Contrast Assessment Method
Yuanyuan Fan;
Yingjun Sang;
Guang Hu Guang Hu;
Zaijin Zhou;
Yunrong Hao
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v11i2.930
Contrast is an important factor affecting the image quality. In order to overcome the problems of local band-limited contrast, a novel image contrast assessment method based on the property of HVS is proposed. Firstly, the image by low-pass filter is performed fast wavelet decomposition. Secondly, all levels of band-pass filtered image and its corresponding low-pass filtered image are obtained by processing wavelet coefficients. Thirdly, local band-limited contrast is calculated, and the local band-limited contrast entropy is calculated according to the definition of entropy. Finally, the contrast entropy of image is obtained by averaging the local band-limited contrast entropy weighed using CSF coefficient. The experiment results show that the best contrast image can be accurately identified in the sequence images obtained by adjusting the exposure time and stretching gray respectively, the assessment results accord with human visual characteristics and make up the lack of local band-limited contrast.
SEBUAH ALGORITMA POHON KEPUTUSAN UNTUK KLASIFIKASI CITRA SATELIT AQUA MODIS
Rina Luciane Manuhutu;
Riana Debora Hutagalung
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 8, No 2: August 2010
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v8i2.614
The satellite image processing for the environmental eksploration requires data accuracy which implied in every pixel of image so that required an appropriate technique of classification. The suitable classification is decition tree classification technique. Research about decition tree classification for classification data of satellite image have done and also research about Aqua MODIS satellite image processing for environmental exploration, but the decition tree classification technique is not developed yet for the classification of Aqua MODIS satellite data image. In this research, an algorithm decition tree classification method for data processing of Aqua MODIS satellite image to determine sea surface temperature classification is developed. A case study conducted at territorial Moluccas waters. The result of this research show that mean of accuration data classification of sea surface temperature is 97.6%
An Optimum Database for Isolated Word in Speech Recognition System
Syifaun Nafisah;
Oyas Wahyunggoro;
Lukito Edi Nugroho
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 2: June 2016
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v14i2.2353
Speech recognition system (ASR) is a technology that allows computers receive the input using the spoken words. This technology requires sample words in the pattern matching process that is stored in the database. There is no reference as the fundamental theory to develop database in ASR. So, the research of database development to optimize the performance of the system is required. Mel-scale frequency cepstral coefficients (MFCCs) is used to extract the characteristics of speech signal and backpropagation neural network in quantized vector is used to evaluate likelihood the maximum log values to the nearest pattern in the database. The results shows the robustness of ASR is optimum using 140 samples of data reference for each word with an average of accuracy is 99.95% and duration process is 27.4 msec. The investigation also reported the gender doesn’t have significantly influence to the accuracy. From these results it concluded that the performance of ASR can be increased by optimizing the database.
Human Re-identification with Global and Local Siamese Convolution Neural Network
K. B. Low;
U. U. Sheikh
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v15i2.6121
Human re-identification is an important task in surveillance system to determine whether the same human re-appears in multiple cameras with disjoint views. Mostly, appearance based approaches are used to perform human re-identification task because they are less constrained than biometric based approaches. Most of the research works apply hand-crafted feature extractors and then simple matching methods are used. However, designing a robust and stable feature requires expert knowledge and takes time to tune the features. In this paper, we propose a global and local structure of Siamese Convolution Neural Network which automatically extracts features from input images to perform human re-identification task. Besides, most of the current human re-identification task in single-shot approaches do not consider occlusion issue due to lack of tracking information. Therefore, we apply a decision fusion technique to combine global and local features for occlusion cases in single-shot approaches.
High-precision Ultrasonic Flowmeter for Mining Applications based on Velocity-area
Lili Zhang;
Lenian Xu;
Laxmisha Rai
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i1.5185
The flowmeter is widely used in coal mining because of its higher measurement precision and simple installation without channel project modification. In this paper, a flow measurement method based on velocity-area is investigated, and a functional flowmeter for mining applications with higher precision is designed. The two key parameters, the liquid level and flow velocity are required to be obtained for achieving the proposed method. The proposed flowmeter is composed of three main functional modules: (1) flow velocity detection module based on ultrasonic time difference method, (2) liquid level detection module, and (3) mud level detection module based on ultrasonic pulse echo method. All the measured data are transferred to the monitoring station for analysis and displayed in real-time through M-BUS. The flowmeter is designed focusing on mining applications, and has higher benefits for preventing water disasters in coal mines
Detection of immovable objects on visually impaired people walking aids
Abdurrasyid Abdurrasyid;
Indrianto Indrianto;
Rakhmat Arianto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i2.9933
One consequence of a visually impaired (blind) person is a lack of ability in the activities related to the orientation and mobility. Blind person uses a stick as a tool to know the objects that surround him/her.The objective of this research is to develop a tool for blind person which is able to recognize what object in front of him/her when he/she is walking. An attached camera will obtain an image of an object which is then processed using template matching method to identify and trace the image of the object. After getting the image of the object, furthermore calculate and compare it with the data training. The output is produced in the form of sound that in accordance with the object. The result of this research is that the best slope and distance for the template matching method to properly detect silent objects is 90 degrees and 2 meters.
Hiding data in images using steganography techniques with compression algorithms
Osama F. AbdelWahab;
Aziza I. Hussein;
Hesham F. A. Hamed;
Hamdy M. Kelash;
Ashraf A. M. Khalaf;
Hanafy M. Ali
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v17i3.12230
Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.