cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Comparative and analysis of evaluation of several direction of arrival estimation methods Aya Ahkam Kamil; Marwa Moutaz Ismail; Bashar Sami Bashar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.18744

Abstract

Modern-day, global, and clever array systems have several distinguished approaches with regard to a wireless device.  In this paper, a comparative analysis has been carried out amongst nine (DOA) algorithms: Capon, MUSIC, Bartlett, Pisarenko, Linear prediction, Maximum entropies, and Min-norm, Root-MUSIC, and ESPRIT. in this paper reduces the number of antennas and snaps necessary to observe six targets without interference for several DOA estimation methods. After comparing and analyzing all the algorithms, it has been shown that the music algorithm is the best algorithm that reduces interference and detects the desired sources. MATLAB [R2019b] was used in the simulation process.
Physical cyber-security algorithm for wireless sensor networks Dhuha Dheyaa Khudhur; Muayad Sadik Croock
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18464

Abstract

Today, the wireless sensor network (WSN) plays an important role in our daily life. In addition, it is used in many applications such as military, medical, greenhouse, and transport. Due to the sending data between its nodes or to the base station requires a connection link, the sensor nodes can be exposed to the many attacks that exploit the weaknesses of the network. One of the most important types of these attacks is the denial of service (DoS). DoS attack exhausts the system's resources that lead the system to be out of service. In this paper, a cyber-security algorithm is proposed for physical level of WSN that adopts message queuing telemetry transport (MQTT) protocol for data transmission and networking. This algorithm predicts the DoS attacks at the first time of happening to be isolated from the WSN. It includes three stages of detecting the attack, predicting the effects of this attack and preventing the attacks by excluding the predicted nodes from the WSN. We applied a type of DoS attack that is a DoS injection attack (DoSIA) on the network protocol. The proposed algorithm is tested by adopting three case studies to cover the most common cases of attacks. The experiment results show the superior of the proposed algorithm in detecting and solving the cyber-attacks.
Online traffic classification for malicious flows using efficient machine learning techniques Ying Yenn Chan; Ismahani Bt Ismail; Ban Mohammed Khammas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20402

Abstract

The rapid network technology growth causing various network problems, attacks are becoming more sophisticated than defenses. In this paper, we proposed traffic classification by using machine learning technique, and statistical flow features such as five tuples for the training dataset. A rule-based system, Snort is used to identify the severe harmfulness data packets and reduce the training set dimensionality to a manageable size. Comparison of performance between training dataset that consists of all priorities malicious flows with only has priority 1 malicious flows are done. Different machine learning (ML) algorithms performance in terms of accuracy and efficiency are analyzed. Results show that Naïve Bayes achieved accuracy up to 99.82% for all priorities while 99.92% for extracted priority 1 of malicious flows training dataset in 0.06 seconds and be chosen to classify traffic in real-time process. It is demonstrated that by taking just five tuples information as features and using Snort alert information to extract only important flows and reduce size of dataset is actually comprehensive enough to supply a classifier with high efficiency and accuracy which can sustain the safety of network.
Go-Ethereum for electronic voting system using clique as proof-of-authority Basilius Bias Astho Christyono; Moeljono Widjaja; Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.20415

Abstract

Current advances in information technology have brought about significant changes, including ways to carry out elections using computer technology known as e-voting. Blockchain underlies the popularity of the digital currency Bitcoin and some other digital money, sparking the start of a new era of Internet use, including electronic voting (e-voting) system. In this work, we proposed designing and implementing an evoting system powered by the Ethereum blockchain. We used real-world data from the Indonesian Election Commission (KPU) with 26 candidates and 15,725 voters from the Jelupang sub-district. The testing and evaluation results using three miners in the blockchain show that the system could commit around 23 transactions per second. All 15,725 votes are committed to the blockchain successfully within 12.75 minutes. The total time required for creating all blockchain accounts is 13.4 hours. 
Performance analysis for three cases of outage probability in one-way DF full-duplex relaying network with presence of direct link Phu Tran Tin; Van-Duc Phan; Le Anh Vu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.17477

Abstract

In this paper, the one-way decode-and-forward (DF) full-duplex relaying network system with presence of direct link is investigated. In the analysis section, we derived the exact, lower, and upper bound for outage probability (OP) with maximal ratio combining (MRC) at the receiver. Furthermore, the system performance's analytical expressions are verified by using the Monte Carlo simulation. In addition, we investigated the effect of the main parameters on the OP of the proposed system. Finally, we can sate that the simulation curves overlap the analytical curves to convince the analysis section. This research can provide a novel recommendation for the communication network.
An adaptive IoT architecture using combination of concept-drift and dynamic software product line engineering I Made Murwantara; Pujianto Yugopuspito
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.19012

Abstract

Internet of things (IoT) architecture needs to adapt autonomously to the environment and operational to maintain their supreme services. One common problem in the IoT architecture is to manage the reliability of data services, such as sensors’ data, that only sending data to the collector via gateway. If there is a disruption of services, then it is not easy to manage the system reliability. To this, an adaptive environment which is based on software reconfiguration creates a great challenge to provide better services. In this work, the software product line engineering (SPLE) reconfigures the edge devices via rules and software architecture. To identify disruption of data services which can be detected based on anomaly and truncated data. Our work makes use of concept drift to provide a recommendation to the system manager. This is important to avoid misconfiguration in the system We demonstrate our method using an open-source internet of things portal system that integrated to a cluster of sensors which is attached to specific gateway before the data are collected into a cloud storage for further processes. In identifying drifting data, the adaptive sliding window (ADWIN) method outperforms the Page-Hinkley (PH) with more selective identification and sensitive reading.
Implantable slot antenna with substrate integrated waveguide for biomedical applications Mustafa Mohammed Jawad; Nik Noordini Nik Abd Malik; Noor Asniza Murad; Mona Riza Mohd Esa; Mohd Riduan Ahmad; Anwer Sabah Mekki; Fahad Taha Al- Dhief; Yaqdhan Mahmood Hussein
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.19952

Abstract

This work presents a new design of capsule slot antenna with substrate integrated waveguide (SIW) for wireless body area networks (WBANs) operating at the range of (2.5-4 GHz) which is located in the body area networks (BAN) standard in IEEE802.15.6. The proposed antenna was designed for WBANs. The substrate is assumed to be from Rogers 5880 with relative permittivity of 2.2, and thickness of 0.787 mm. The ground and the patch are created from annealed copper while the capsule is assumed to be a plastic material of medical grade polycarbonate. The antenna designed and summited using computer simulation technology (CST) software. A CST voxel model was used to study the performance of SIW capsule antenna and the ability of the band (2.5-4 GHz). Results indicated a wide bandwidth of 1.5 GHz between the range of (2.5-4) GHz at 3.3 GHz as center frequency, with return loss with more than -24.52 dB, a gain of -18.2 dB, voltage standing wave ratio (VSWR) of 1.17, and front-to-back ratio (FBR) of 10.07 dB. Through simulation, all considerable parameters associated with the proposed antenna including return loss, bandwidth, operating frequency, VSWR less than 2, radiation pattern were examined. Regarding size, gain, and frequency band, the proposed antenna is located with the standards of implantable medical devices (IMDs).
Improved anti-noise attack ability of image encryption algorithm using de-noising technique Mohanad Najm Abdulwahed; Ali Kamil Ahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16384

Abstract

Information security is considered as one of the important issues in the information age used to preserve the secret information through out transmissions in practical applications. With regard to image encryption, a lot of schemes related to information security were applied. Such approaches might be categorized into 2 domains; domain frequency and domain spatial. The presented work develops an encryption technique on the basis of conventional watermarking system with the use of singular value decomposition (SVD), discrete cosine transform (DCT), and discrete wavelet transform (DWT) together, the suggested DWT-DCT-SVD method has high robustness in comparison to the other conventional approaches and enhanced approach for having high robustness against Gaussian noise attacks with using denoising approach according to DWT. MSE in addition to the peak signal-to-noise ratio (PSNR) specified the performance measures which are the base of this study’s results, as they are showing that the algorithm utilized in this study has high robustness against Gaussian noise attacks.
Measure extendibility/extensibility quality attribute using object oriented design metric Taghreed Riyadh Alreffaee; Marwah M. A. Dabdawb; Dujan B. Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.19278

Abstract

Software design is one of the very important phases of the software engineering. The costs of software can be minimized if improvements or corrections made during this stage. Several of the current computer aided software engineering (CASE) tools like enterprise architect (EA) v12 do not have the capability to improve the design. This work aims to develop an algorithm that helps the software engineers evaluating the design quality utilizing one of the object-oriented (OO) design models namely quality metrics for object-oriented design (QMOOD) which represents as hierarchical model that describes the relationship between quality attributes such as reusability, extendibility and properties of the design of OO design. This algorithm describesed how the assessment of the extendibility/ extensibility using the software metrics has been done and the impact of the involved metrics in the extendibility value. Results obtained demonstrate the effect of OO design metrics such as inheritance, polymorphism, abstraction and coupling in quality characteristics like extensibility. The results show that lower values of abstraction and coupling, obtain higher value of extendibility which means the class diagram is ready to accept additional improvements. The proposed algorithm has been tested on two different systems (test cases) that vary in their class diagrams, functionalities, and complexities.
Lower and upper bound intercept probability analysis in amplifier-and-forward time switching relaying half-duplex with impact the eavesdropper Phu Tran Tin; Van-Duc Phan; Tan N. Nguyen; Nguyen Thai Bao; Nguyen Ngoc Diem; Nguyen Duc Thinh; Minh Tran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.17681

Abstract

In this paper, we proposed and investigated the amplifier-and-forward (AF) time switching relaying half-duplex with impact the eavesdropper. In this system model, the source (S) and the destination (D) communicate with each other via a helping of the relay (R) in the presence of the eavesdropper (E). The R harvests energy from the S and uses this energy for information transferring to the D. For deriving the system performance, the lower and upper bound system intercept probability (IP) is proposed and demonstrated. Furthermore, the Monte Carlo simulation is provided to justify the correctness of the mathematical, analytical expression of the lower and upper bound IP. The results show that the analytical and the simulation curves are the same in connection with the primary system parameters.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue