cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Classification of EEG signals for facial expression and motor execution with deep learning Areej Hameed Al-Anbary; Salih Mahdi Al-Qaraawi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.19850

Abstract

Recently, algorithms of machine learning are widely used with the field of electroencephalography (EEG) brain-computer interfaces (BCI). The preprocessing stage for the EEG signals is performed by applying the principle component analysis (PCA) algorithm to extract the important features and reducing the data redundancy. A model for classifying EEG, time series, signals for facial expression and some motor execution processes had been designed. A neural network of three hidden layers with deep learning classifier had been used in this work. Data of four different subjects were collected by using a 14 channels Emotiv EPOC+ device. EEG dataset samples including ten action classes for the facial expression and some motor execution movements are recorded. A classification results with accuracy range (91.25-95.75%) for the collected samples were obtained with respect to: number of samples for each class, total number of EEG dataset samples and type of activation function within the hidden and the output layer neurons. A time series EEG signal was taken as signal values not as image or histogram, analysed and classified with deep learning to obtain the satisfied results of accuracy.
Robust interference cancellation for differential quadrature phase-shift keying modulation with band limiting and adaptive filter Rahmad Hidayat; Ahmad Sujana; Andrew Ghea Mahardika; Herawati Herawati; Givy Devira Ramady; Ninik Sri Lestari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.19178

Abstract

Differential quadrature phase-shift keying (DQPSK) modulation techniques and their variants are widely applied in digital communication, such as for high-speed optical fiber, bluetooth, or satellite communication. In its implementation, DQPSK cannot be separated from the potential harmful interference. In this research, a system model has been made for observation and analysis of the interference cancellation process. Discrete finite-duration impulse response (FIR) filters for band limiting and adaptive filter are the key components of the supporting block for this system model. Robust Simulink results have shown a significant increase in system performance in the existence of these key components. The indication has been shown by the best bit error rate (BER) of 3.3e-05. Constellation and eye pattern diagrams have supported the BER.
A new block cipher for image encryption based on multi chaotic systems Donia Fadhil Chalob; Amal Abdulbaqi Maryoosh; Zainab Mohammed Esa; Elaf Nassir Abbud
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.13746

Abstract

In this paper, a new algorithm for image encryption is proposed based on three chaotic systems which are Chen system,logistic map and two-dimensional (2D) Arnold cat map. First, a permutation scheme is applied to the image, and then shuffled image is partitioned into blocks of pixels. For each block, Chen system is employed for confusion and then logistic map is employed for generating subsititution-box (S-box) to substitute image blocks. The S-box is dynamic, where it is shuffled for each image block using permutation operation. Then, 2D Arnold cat map is used for providing diffusion, after that XORing the result using Chen system to obtain the encrypted image.The high security of proposed algorithm is experimented using histograms, unified average changing intensity (UACI), number of pixels change rate (NPCR), entropy, correlation and keyspace analyses. 
Online 3D path planning for Tri-copter drone using GWO-IBA algorithm Sadiq Jawad R.; Muna H. Saleh
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18697

Abstract

Robots at present are involved in many parts of life, especially mobile robots, which are two parts, ground robots and flying robots, and the best example of a flying robot is the drone. Path planning is a fundamental part of UAVs because the drone follows the path that leads it to goal with obstacle avoidance. Therefore, this paper proposes a hybrid algorithm (grey wolf optimization - intelligent bug algorithm GWO-IBA) to determine the best, shortest and without obstacles path. The hybrid algorithm was implemented and tested in the MATLAB program on the Tri-copter model, and it gave different paths in different environments. The paths obtained were characterized by being free of obstacles and the shortest paths available to reach the target.
A maximum entropy classification scheme for phishing detection using parsimonious features Emmanuel O. Asani; Adebayo Omotosho; Paul A. Danquah; Joyce A. Ayoola; Peace O. Ayegba; Olumide B. Longe
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.15981

Abstract

Over the years, electronic mail (e-mail) has been the target of several malicious attacks. Phishing is one of the most recognizable forms of manipulation aimed at e-mail users and usually, employs social engineering to trick innocent users into supplying sensitive information into an imposter website. Attacks from phishing emails can result in the exposure of confidential information, financial loss, data misuse, and others. This paper presents the implementation of a maximum entropy (ME) classification method for an efficient approach to the identification of phishing emails. Our result showed that maximum entropy with parsimonious feature space gives a better classification precision than both the Naïve Bayes and support vector machine (SVM).
Hardware implementation of series DC arc fault protection using fast Fourier transform Dirhamsyah Dirhamsyah; Diana Alia; Dimas Okky Anggriawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.20521

Abstract

This paper proposes method of series DC arc fault protection using low cost microcontroller. Series DC arc fault occurs when gap between conductor or wire flows a current. Series DC arc fault can cause fire hazard if do not detected and protected. However, Series DC arc fault is difficult to detected using conventional protection. To detect series DC arc fault accurately using fast Fourier transform (FFT). FFT is used to transform signal in time domain to frequency domain. Series DC arc fault has different characteristic compared by normal current in frequency domain. Therefore, the proposed algorithm for protection of series DC arc fault based on magnitudes of the current in frequency domain. Hardware system is implemented by 100 V DC power supply and DC arc fault generator. Test result is conducted experimentally under varying of load current such as 2 A, 2.5 A, 3 A, 3.5 A, 4 A and 5 A. Experimental testing results show that Series DC arc fault protection has time for trip of 0.48 s, 0.26 s, 1.04 s, 0.68 s, 0.44 s and 0.48, respectively. The fastest time for trip is 0.26 s with current of 2.5 A. Therefore, the proposed algorithm for series DC arc fault protection can operate to trip accurately and have the good performance.
Experimental study of capacity and electrode structure of six cell dynamic lead acid battery Kurriawan Budi Pranata; Yuni Triasari; Nur Khairati; Istiroyah Istiroyah; Mauludi Ariesto Pamungkas; Muhammad Ghufron
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.17845

Abstract

The six cells of the dynamic lead acid battery (DLAB) series have been made to resemble the accumulator with sulfuric acid single electrolyte. The tank was filled with 1200 mL of 30% sulfuric acid and circulated through each unit cell by a minipump during charge-discharge process. Experiments were carried out by providing a charging current of 2A, while the discharge current was varied at 0.5 A, 0.6 A, 0.7 A, 0.8 A for 10 continuous cycle to obtain the battery with the best characteristics. The experimental results show that all batteries have a working voltage of 10.8-14.4 volt. The discharging current is inversely proportional to the discharging duration. The resulting capacity has an efficiency ranging from 80.1-81.1%. DLAB with 0.5 A discharging current shows the best performance based on the length of duration and the average capacity with value of 109.61 h and 6168 mAh while for the ideal performance stability is obtained by DLAB with 0.7 A discharging current. The electrochemical reaction produces angelsite and plattnerite phases on the positive electrode. Meanwhile, angelsite and lead phases are formed on the negative electrode.
A machine learning approach for the recognition of melanoma skin cancer on macroscopic images Jairo Hurtado; Francisco Reales
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20292

Abstract

In the last years, computer vision systems for the detection of skin cancer have being proposed, specially using machine learning techniques for the classification of the disease and features based on the ABCD dermatology criterion, which gives information on the status of the skin lesion based on static properties such as geometry, color and texture, making it an appropriate criterion for medical diagnosis systems that work through images. This paper proposes a novel skin cancer classification system that works on images taken from a standard camera and studies the impact on the results of the smoothed bootstrapping, which was used to augment the original dataset. Eight classifiers with different topologies (KNN, ANN and SVM) were compared, with and without data augmentation, showing that the classifier with the highest performance as well as the must balanced one was the ANN with data augmentation, achieving an AUC of 87.1%, which saw an improvement from an AUC of 84.3% of the ANN trained with the original dataset.
Improvement security in e-business systems using hybrid algorithm L. Sumaryanti; Dedy Hidayat Kusuma; Rosmala Widijastuti; Muhammad Najibulloh Muzaki
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.20403

Abstract

E-business security becomes an important issue in the development of technology, to ensure the safety and comfort of transactions in the exchange of information is privacy. This study aims to improve security in e-business systems using a hybrid algorithm that combines two types of keys, namely symmetric and asymmetric keys. Encryption and decryption of messages or information carried by a symmetric key using the simple symmetric key algorithm and asymmetric keys using the Rivest Shamir Adleman (RSA) algorithm. The proposed hybrid algorithm requires a high running time in the decryption process compared to the application of a single algorithm. The level of security is stronger because it implements the process of message encryption techniques with two types of keys simultaneously.
Smartphone’s off grid communication network by using Arduino microcontroller and microstrip antenna Yaqdhan Mahmood Hussain; H. O. Hanoosh; Z. Zakaria; Fahad Taha Al-Dhief; Murtaja Ali Saare; Mustafa Muhammad Jawad; Alaa Hamza Omran; Ali Abdulateef Abdulbari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.15949

Abstract

After a major disaster, the present communication system fails in providing the services in the affected area. No means of communication proves to be more dangerous as the rescue and relief operations become more difficult. Our current research is about establishing a network in such a disaster-prone area, which would facilitate to communicate and carry out the rescue missions. This research project used Java to create a fire-chat application and used it with the smartphone android system. It used Bluetooth model HC-05 linked with Arduino UNO by the SPI interface to connect Arduino with the smartphone. The FR-model HCW69 connected with Arduino by using UART to transceiver the message. The microstrip antenna 915 MHz connected with the FR-model HCW69 to give us more distance. The maximum effective range of the transceiver was 1 kilometer, to communicate by forming a mesh network. This application is helpful in the case when the smartphone is out of service; it (smartphone) can be communicated connected to the other nearby users with a message.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue