cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Real time ear recognition using deep learning Ahmed M. Alkababji; Omar H. Mohammed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 2: April 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i2.18322

Abstract

Automatic identity recognition of ear images represents an active area of interest within the biometric community. The human ear is a perfect source of data for passive person identification. Ear images can be captured from a distance and in a covert manner; this makes ear recognition technology an attractive choice for security applications and surveillance in addition to related application domains. Differing from other biometric modalities, the human ear is neither affected by expressions like faces are nor do need closer touching like fingerprints do. In this paper, a deep learning object detector called faster region based convolutional neural networks (Faster R-CNN) is used for ear detection. A convolutional neural network (CNN) is used as feature extraction. principal component analysis (PCA) and genetic algorithm are used for feature reduction and selection respectively and a fully connected artificial neural network as a matcher. The testing proved the accuracy of 97.8% percentage of success with acceptable speed and it confirmed the accuracy and robustness of the proposed system.
Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices Teddy Mantoro; Andri Zakariya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 4: December 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i4.870

Abstract

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.
IMPLEMENTASI MIKROKONTROLER SEBAGAI PENCACAH FREKUENSI BERBASIS PENGUKURAN PERIODE ISYARAT MASUKAN Freddy Kurniawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 7, No 1: April 2009
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v7i1.577

Abstract

One of the main components from frequency counter is a processor. This processor must have ability to conduct counting and arithmetical calculation. To get competitive price, in this research a microcontroller is applied as a processor. This paper presents design of frequency counter based on microcontroller AT89S51 which has two independent timers. The input frequency counter is conducted by using facilities inside microcontroller e.g. T0 and external interruption. Counter method used in this research is by measuring input signal period. This method is proven effectively to count frequency especially low frequency. As the result, the frequency counter has successfully measured frequency from 0.1 until 10 kHz with maximum error 1%. This device is possible to be the next frequency counter with competitive price.
MOBIL ROBOT ANTI MENABRAK BERBASIS MIKROKONTROLER 68HC11 Nuryono Satya Widodo; Balza Achmad; Darmawan Sutanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 3, No 1: April 2005
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v3i1.1218

Abstract

Tujuan penelitian ini adalah pertama, merancang prototip mobil robot anti menabrak, baik perangkat keras maupun perangkat lunaknya. Kedua, menentukan kesalahan perjalanan mobil robot anti menabrak dalam menghindari dinding khusus atau dinding yang memenuhi kriteria tertentu. Subjek penelitian ini adalah mobil robot anti menabrak berbasis mikrokontroler 68HC11. Transdusernya adalah sensor inframerah dengan fototransistor menggunakan penguat operasional LM 324. Bagian-bagian yang dirancang adalah untai penguat instrumen  sebagai penguat tegangan, rangkaian penguatan sensor inframerah, badan (body) mobil, tombol pemilih dan program untuk mengatur kerja rangkaian. Alat yang diperlukan untuk mengumpulkan data  adalah perangkat mobil yang telah jadi dengan sensor inframerah sebagai transduser, penggaris untuk mengukur jarak respon mobil  mulai membelok, berbagai macam bentuk benda penghalang yang dibuat dari karton dengan warna yang berbeda. Data diperoleh dengan melihat perbedaan jarak pada saat mobil mulai membelok ketika didepan mobil diberi benda penghalang yang bermacam-macam bentuk dan warna berbeda, juga respon sensor inframerah pada mobil robot terhadap penghalang dengan sudut yang berbeda-beda. Hasil penelitian menunjukkan, telah dapat dirancang mobil robot anti menabrak berbasis mikrokontroler  68HC11, baik perangkat keras maupun perangkat lunaknya, dengan sensor inframerah sebagai pendeteksi dinding penghalang. Mobil robot dapat menghindari penghalang dengan baik pada posisi sudut 35 terhadap  penghalang dengan  0% kegagalan, mulai menunjukkan kesalahan pada sudut 30  terhadap penghalang dengan 10% kegagalan dan mulai gagal 100% pada sudut 20terhadap penghalang. Bentuk penghalang yang paling sensitif dideteksi oleh sensor inframerah adalah bentuk balok dan segitiga sama sisi, sedangkan yang paling tidak sensitif adalah bentuk tabung dan prisma sama sisi. Warna penghalang yang paling sensitif dideteksi oleh sensor inframerah adalah warna perak, kemudian diikuti warna putih dan hitam.
Influence of Sensor Nodes on the Invulnerability of Tree Network Lifeng Jiang; Fengming Zhang; Rennong Yang; Kun Xu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.3104

Abstract

In the transformation process from the complex system of great industrial era to the information era, the component having sensing function plays an important role in the evolution of complex system. To abstract the complex system of “tree” structure as “tree” network, To abstract the components include the component having sensing function as nodes, and how the sensor nodes in the network affect network invulnerability is studied quantitatively in this paper. Firstly, the experimental program for network invulnerability is designed; secondly, the indicators for measuring the network invulnerability and the importance of node are proposed; then, the invulnerability experiments are carried out in two conditions-with or without sensor nodes in “tree” network; finally the experimental data are statistically analyzed. Results show that after the addition of sensor nodes, the invulnerability of “tree” network is promoted when subject to random attack and particular attack. The research results are of reference significance for improving self-invulnerability in the transformation process from complex system to information. The experimental program and the relevant conclusions obtained by experiment in this paper have certain innovation.
A Designing Dairy Cattle Facilities Based on Statics and Dynamic Zoometry by Using Artificial Neural Network Sugiono Sugiono; Rudy Soenoko; Rio L Lukodono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.4677

Abstract

The dairy cattle productivity is very depending on the quality of their facilities and their environment condition. A lot of researches have been done in this area, but it is not developing the knowledge of animal dimensions and behaviours correlated with their facilities design. Complexities of dynamics zoometry is very depending on cow behaviours that it forced to use neural network (NN) approaching. Hence, the purposes of the paper  is to create the concept of static and dynamic zoometry approach to guide the ergonomics facilities design and the modern of dairy cattle house based on zoometry data by using artificial neural network. The research is started with study literature of anthropometry, CAD design, dairy cattle, facility design and neural network. The next step is collecting the data of cow dimensions for static zoometry (17 variables) and cow behaviours for developing the concept of dynamics zoometry (5 variables). The static data is used as input factor and dynamic data as desire of Back Propagation NN model. The result of BPNN training is used to design the dairy cattle facilities, e.g. 3D CAD house with minimal length = 357.67 cm, minimal width = 132.03 cm (per tail) and minimal height = 205.28 cm. Finally, the paper is successfully developed the concept of zoometry approach and BPNN model as pioneer of implementing comfort knowledge.
Videoconference System for Rural Education: Issues, Challenges, and Solutions a Title is Fewest Possible Words Kusprasapta Mutijarsa; Yoanes Bandung; Luki Bangun Subekti
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6291

Abstract

In this paper, we presented issues, challenges, and solutions of videoconference system for rural education. First, we discussed several issues on the implementation of videoconference system for education, particulary in rural area in Indonesia, which covered videoconference requirement, rural condition, and education needs. Second, we presented several challenges consisted of choosing videoconference technology, choosing compression method, system and application development, ensuring quality of services, and ensuring quality of experiences. Based on the issues and challenges, we proposed a solution of videoconference system which is specifically deployed in rural education. The solution was based on WebRTC technology implemented in Intel i5 core miniPC choosen to increase portability of the system. A STUN server was built on Javascript to facilitate communication between each client terminal. A simple and intuitive user interface was designed to facilitate the use of application by rural people. The system was deployed at two elementary schools in Cianjur, West Java, representing rural education in Indonesia. From the experiment, we obtained video sent data rate 82 kbit/s, video received data rate 245 kbit/s, average delay 316 ms and packet lost rate 1.32%. The experiment results showed that the audio and video quality can be accepted by users to implement distance learning.
Integrated Social Media Knowledge Capture in Medical Domain of Indonesia Kridanto Surendro; Dicky Prima Satya; Farrell Yodihartomo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.8320

Abstract

The Social Media Platforms, as the one of largest part of today data traffic on the Internet, disseminate a vast volume of information, including medical information in it. Knowledge management system (KMS) approach is applied with purpose to capture, maintain, and manage tacit or explicit knowledge available and collected within the social media platforms, organization’s database, knowledge base, or document repository. By adding Indonesian Natural Language Processing (InaNLP), Machine Learning and Data Mining approach, our research has proposed a framework which is theoretically designed to improve the previous research related to social media knowledge capture model and enhance its accuracy and reliability of knowledge retrieved compared to previous knowledge capture model. This system mainly aimed for medical practitioner to give a quick suggestion of the diseases regarding to the early diagnose which has been taken in the first place. On this current research state, the pre-processing phase of the framework implementation and knowledge presentation is our main concernto maximize the information value for the knowledge users and also to reduce the language issues in texts such as ambiguity, inconsistency, use of slang vocabulary, etc.According to this research’s goal, we have designed an algorithm to extract feature from dataset.
Smart taxi security system design with internet of things (IoT) Indrianto Indrianto; Meilia Nur Indah Susanti; Riki Ruli A. Siregar; Purwati Putri J.; Yudhi Purwanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10167

Abstract

Safety is an important thing in driving. Security in driving is aimed at the way of driving the vehicle or the security on the vehicle itself. Vehicle assets, especially cars, that are quite expensive or luxurious assets Therefore, safety protections for such vehicles are necessary. Taxi is a valuable asset for the company. To maintain the asset, a good security system is needed. With a good security system, the asset will be protected and the investments invested will not be reduced. By using the prototype method, a tool will be made in accordance to the wishes of the user. The Encludean distance method is used to calculate the distance of the incident and the nearest police station. By using the progress of technology, the progress can be utilized to help the security of taxi owned by a company or personal (online). The purpose of this study is to create a tool that can secure the taxi and its driver of crimes that might occur. IoT (internet of things) can help to secure a taxi since it is able to locate the incident’s location precisely and accurately.
Blind multi-signature scheme based on factoring and discrete logarithm problem Duc Nguyen Tan; Hai Nguyen Nam; Minh Nguyen Hieu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.10525

Abstract

One of the important objectives of information security systems is providing authentication of the electronic documents and messages. In that, blind signature schemes are an important solution to protect the privacy of users in security electronic transactions by highlighting the anonymity of participating parties. Many studies have focused on blind signature schemes, however, most of the studied schemes are based on single computationally difficult problem. Also digital signature schemes from two difficult problems were proposed but the fact is that only finding solution to single hard problem then these digital signature schemes are breakable. In this paper, we propose a new signature schemes base on the combination of the RSA and Schnorr signature schemes which are based on two hard problems: IFP and DLP. Then expanding to propose a single blind signature scheme, a blind multi-signature scheme, which are based on new baseline schemes.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue