cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Construction of fuzzy radial basis function neural network model for diagnosing prostate cancer Agus Maman Abadi; Dhoriva Urwatul Wutsqa; Nurlia Ningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.20398

Abstract

In this paper, we propose a construction of fuzzy radial basis function neural network model for diagnosing prostate cancer. A fuzzy radial basis function neural network (fuzzy RBFNN) is a hybrid model of logical fuzzy and neural network. The fuzzy membership function of the fuzzy RBFNN model input is developed using the triangle function. The fuzzy C-means method is applied to estimate the center and the width parameters of the radial basis function. The weight estimation is performed by various ways to gain the most accurate model. A singular value decomposition (SVD) is exploited to address this process. As a comparison, we perform other ways including back propagation and global ridge regression. The study also promotes image preprocessing using high frequency emphasis filter (HFEF) and histogram equalization (HE) to enhance the quality of the prostate radiograph. The features of the textural image are extracted using the gray level co-occurrence matrix (GLCM) and gray level run length matrix (GLRLM). The experiment results of fuzzy RBFNN are compared to those of RBFNN model. Generally, the performances of fuzzy RBFNN surpass the RBFNN in all accuracy calculation. In addition, the fuzzy RBFNN-SVD demonstrates the most accurate model for prostate cancer diagnosis.
Handover evaluation of UMTS-WiMAX networks Saif A. Abdulhussein; Riyadh A. Abdulhussein
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.20411

Abstract

Recently, data traffic movement through a wireless channel is assisted by suggesting and implementing many mechanisms, to achieve the speedy increasing importunity and popularity of the wireless networks. Various wireless technologies can be copulated to develop a heterogeneous network, which is a candidate towards (4G) networks. OPNET modeler (14.5) is used to design simulation modules of the heterogeneous network. During device connection between the worldwide interoperability for microwave access (WiMAX) and universal mobile telecommunication system (UMTS) networks, Performance metrics such as; Jitter end-to-end delay (E-2-E) Throughput is used. The results of the simulation are measured to determine the efficiency of the transfer using WiMAX-UMTS according to the selected metrics. The WiMAX-UMTS has shown valuable improvement in Process Durability, reduction of E-2-E delay, and Jitter. The maximum amount of data transfer and the least amount of delay and Jitter is at 250 sec. Because of the handover operations and data transfer momentum, the worst-case passes in the network when 618 sec is the minimum amount. The efficiency of throughput for WiMAX equal to 0.092666% as for the efficiency of throughput for UMTS equal to 4.633333*10-6 % whereas the E-2-E efficiency a delay equal to 0.5466%.
From cloud computing security towards homomorphic encryption: A comprehensive review Saja J. Mohammed; Dujan B. Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.16875

Abstract

“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing.
A numerical-analytical iterative method for solving an electrical oscillator equation Sudi Mungkasi; Damar Widjaja
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i4.18987

Abstract

Self-excited oscillation problem occurring from a triode electrical circuit has been modelled by van der Pol. Until now, the exact solution to the van der Pol equation is not available. This paper focuses on finding a new method for solving the van der Pol equation simply and accurately. There exists several approximate iterative methods available in the literature for solving the van der Pol equation, such as, the successive approximation method. The successive approximation method is simple, but inaccurate for large time values. In this paper, we propose a new variant of numerical-analytical method, which is simple but accurate, for solving the van der Pol equation. Our new variant of numerical-analytical method solves the van der Pol equation from its equivalent system of first order ordinary differential equations. Our strategy leads to a simple implementation of the numerical-analytical method in the multistage way. Furthermore, computational experiments show that our proposed method is accurate for large sizes of time domain in solving the van der Pol equation.
Rule-based lip-syncing algorithm for virtual character in voice chatbot Felicia Priscilla Lovely; Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i5.19824

Abstract

Virtual characters changed the way we interact with computers. The underlying key for a believable virtual character is accurate synchronization between the visual (lip movements) and the audio (speech) in real-time. This work develops a 3D model for the virtual character and implements the rule-based lip-syncing algorithm for the virtual character's lip movements. We use the Jacob voice chatbot as the platform for the design and implementation of the virtual character. Thus, audio-driven articulation and manual mapping methods are considered suitable for real-time applications such as Jacob. We evaluate the proposed virtual character using hedonic motivation system adoption model (HMSAM) with 70 users. The HMSAM results for the behavioral intention to use is 91.74%, and the immersion is 72.95%. The average score for all aspects of the HMSAM is 85.50%. The rule-based lip-syncing algorithm accurately synchronizes the lip movements with the Jacob voice chatbot's speech in real-time.
Solving software project scheduling problem using grey wolf optimization Marrwa Abd-AlKareem Alabajee; Dena Rafaa Ahmed; Taghreed Riyadh Alreffaee
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.16758

Abstract

In this paper, we will explore the application of grey wolf optimization (GWO) methodology in order to solve the software project scheduling problem (SPSP) to seek an optimum solution via applying different instances from two datasets. We will focus on the effects of the quantity of employees as well as the number of tasks which will be accomplished. We concluded that increasing employee number will decrease the project’s duration, but we could not find any explanation for the cost values for all instances that studied. Also, we concluded that, when increasing the number of the tasks, both the cost and duration will be increased. The results will compare with a max-min ant system hyper cube framework (MMAS-HC), intelligent water drops algorithm (IWD), firefly algorithm (FA), ant colony optimization (ACO), intelligent water drop algorithm standard version (IWDSTD), and intelligent water drop autonomous search (IWDAS). According to these study and comparisons, we would like to say that GWO algorithm is a better optimizing tool for all instances, except one instance that FA is outperform the GWO.
Research on 4-dimensional Systems without Equilibria with Application Ruibin Hao; Lequan Min; Hongyan Zang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8507

Abstract

Recently chaos-based encryption has been obtained more and more attention. Chaotic systems without equilibria may be suitable to be used to design pseudorandom number generators (PRNGs) because there does not exist corresponding chaos criterion theorem on such systems. This paper proposes two propositions on 4-dimensional systems without equilibria. Using one of the propositions introduces a chaotic system without equilibria. Using this system and the generalized chaos synchronization (GCS) theorem constructs an 8-dimensional discrete generalized chaos synchronization (8DBDGCS) system. Using the 8DBDGCS system designs a 216-word chaotic PRNG. Simulation results show that there are no significant correlations between the key stream and the perturbed key streams generated via the 216-word chaotic PRNG. The key space of the chaotic PRNG is larger than 21275. As an application, the chaotic PRNG is used with an avalanche-encryption scheme to encrypt an RGB image. The results demonstrate that the chaotic PRNG is able to generate the avalanche effects which are similar to those generated via ideal chaotic PRNGs.
Suport visual details of X-ray image with plain information Nashwan Jasim Hussein; Sabah Khudhair Abbas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.21592

Abstract

The objective of content-based image retrival (CBIR) is to retrieve relevant medical images from the medical database with reference to the query image in a shorter span of time. All the proposed approaches are different, yet the research goal is to attain better accuracy in a reasonable amount of time. The initial phase of this research presents a feature selection technique that aims to improvise the medical image diagnosis by selecting prominent features. The second phase of the research extracts features and the association rules are formed by the proposed classification based on highly strong association rules (CHiSAR). Finally, the rule subset classifier is employed to classify between the images. The last pert of our work extracts the features from the kidney images and the association rules are reduced for better performance. The image relevance inference is performed and finally, binary and the best first search classification is employed to classify between the images.
Machine learning-based approaches for tomato pest classification Gayatri Pattnaik; Kodimala Parvathy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 2: April 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i2.19740

Abstract

Insect pests are posing a significant threat to agricultural production. They live in different places like fruits, vegetables, flowers, and grains. It impacts plant growth and causes damage to crop yields. We presented an automatic detection and classification of tomato pests using image processing with machine learning-based approaches. In our work, we considered texture features of pest images extracted by feature extraction algorithms like gray level co-occurrence matrix (GLCM), local binary pattern (LBP), histogram of oriented gradient (HOG), and speeded up robust features (SURF). The three standard classification methods, including support vector machine (SVM), k-nearest neighbour (k-NN), and decision tree (DT) are used for classification operation. The three classifiers have undergone a comprehensive analysis to present which classifier with which feature yields the best accuracy. The experiment results showed that the SVM classifier's precision using the feature extracted by local binary patterns (LBP) algorithm achieves the highest value of 81.02%. MATLAB software used for feature extraction and waikato environment for knowledge analysis (WEKA) graphical user interface for classification.
An LMI approach to Mixed H_∞/H_- fault detection observer design for linear fractional-order systems Mohammad Azimi; Heydar Toossian Shandiz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.18741

Abstract

This study deals with the problem of robust fault detection for linear time-invariant fractional-order systems (FOSs) assumed to be affected by sensor, actuator and process faults as well as disturbances. The observer-based method was employed to solve the problem, where the detector is an observer. The problem was transformed into the mixed  robust optimization problem to make the system disturbance-resistant on one hand and fault-sensitive on the other hand. Then, sufficient conditions were obtained to solve the problem in the linear matrix inequality (LMI) mode. Finally, the effectiveness and superiority of the method were demonstrated by simulating the solutions on a single-input multi-output thermal testing bench.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue