TELKOMNIKA (Telecommunication Computing Electronics and Control)
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles
2,614 Documents
Construction of fuzzy radial basis function neural network model for diagnosing prostate cancer
Agus Maman Abadi;
Dhoriva Urwatul Wutsqa;
Nurlia Ningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.20398
In this paper, we propose a construction of fuzzy radial basis function neural network model for diagnosing prostate cancer. A fuzzy radial basis function neural network (fuzzy RBFNN) is a hybrid model of logical fuzzy and neural network. The fuzzy membership function of the fuzzy RBFNN model input is developed using the triangle function. The fuzzy C-means method is applied to estimate the center and the width parameters of the radial basis function. The weight estimation is performed by various ways to gain the most accurate model. A singular value decomposition (SVD) is exploited to address this process. As a comparison, we perform other ways including back propagation and global ridge regression. The study also promotes image preprocessing using high frequency emphasis filter (HFEF) and histogram equalization (HE) to enhance the quality of the prostate radiograph. The features of the textural image are extracted using the gray level co-occurrence matrix (GLCM) and gray level run length matrix (GLRLM). The experiment results of fuzzy RBFNN are compared to those of RBFNN model. Generally, the performances of fuzzy RBFNN surpass the RBFNN in all accuracy calculation. In addition, the fuzzy RBFNN-SVD demonstrates the most accurate model for prostate cancer diagnosis.
Handover evaluation of UMTS-WiMAX networks
Saif A. Abdulhussein;
Riyadh A. Abdulhussein
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i5.20411
Recently, data traffic movement through a wireless channel is assisted by suggesting and implementing many mechanisms, to achieve the speedy increasing importunity and popularity of the wireless networks. Various wireless technologies can be copulated to develop a heterogeneous network, which is a candidate towards (4G) networks. OPNET modeler (14.5) is used to design simulation modules of the heterogeneous network. During device connection between the worldwide interoperability for microwave access (WiMAX) and universal mobile telecommunication system (UMTS) networks, Performance metrics such as; Jitter end-to-end delay (E-2-E) Throughput is used. The results of the simulation are measured to determine the efficiency of the transfer using WiMAX-UMTS according to the selected metrics. The WiMAX-UMTS has shown valuable improvement in Process Durability, reduction of E-2-E delay, and Jitter. The maximum amount of data transfer and the least amount of delay and Jitter is at 250 sec. Because of the handover operations and data transfer momentum, the worst-case passes in the network when 618 sec is the minimum amount. The efficiency of throughput for WiMAX equal to 0.092666% as for the efficiency of throughput for UMTS equal to 4.633333*10-6 % whereas the E-2-E efficiency a delay equal to 0.5466%.
From cloud computing security towards homomorphic encryption: A comprehensive review
Saja J. Mohammed;
Dujan B. Taha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.16875
“Cloud computing” is a new technology that revolutionized the world of communications and information technologies. It collects a large number of possibilities, facilities, and developments, and uses the combining of various earlier inventions into something new and compelling. Despite all features of cloud computing, it faces big challenges in preserving data confidentiality and privacy. It has been subjected to numerous attacks and security breaches that have prompted people to hesitate to adopt it. This article provided comprehensive literature on the cloud computing concepts with a primary focus on the cloud computing security field, its top threats, and the protection against each one of them. Data security/privacy in the cloud environment is also discussed and homomorphic encryption (HE) was highlighted as a popular technique used to preserve the privacy of sensitive data in many applications of cloud computing. The article aimed to provide an adequate overview of both researchers and practitioners already working in the field of cloud computing security, and for those new in the field who are not yet fully equipped to understand the detailed and complex technical aspects of cloud computing.
A numerical-analytical iterative method for solving an electrical oscillator equation
Sudi Mungkasi;
Damar Widjaja
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 4: August 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i4.18987
Self-excited oscillation problem occurring from a triode electrical circuit has been modelled by van der Pol. Until now, the exact solution to the van der Pol equation is not available. This paper focuses on finding a new method for solving the van der Pol equation simply and accurately. There exists several approximate iterative methods available in the literature for solving the van der Pol equation, such as, the successive approximation method. The successive approximation method is simple, but inaccurate for large time values. In this paper, we propose a new variant of numerical-analytical method, which is simple but accurate, for solving the van der Pol equation. Our new variant of numerical-analytical method solves the van der Pol equation from its equivalent system of first order ordinary differential equations. Our strategy leads to a simple implementation of the numerical-analytical method in the multistage way. Furthermore, computational experiments show that our proposed method is accurate for large sizes of time domain in solving the van der Pol equation.
Rule-based lip-syncing algorithm for virtual character in voice chatbot
Felicia Priscilla Lovely;
Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 5: October 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i5.19824
Virtual characters changed the way we interact with computers. The underlying key for a believable virtual character is accurate synchronization between the visual (lip movements) and the audio (speech) in real-time. This work develops a 3D model for the virtual character and implements the rule-based lip-syncing algorithm for the virtual character's lip movements. We use the Jacob voice chatbot as the platform for the design and implementation of the virtual character. Thus, audio-driven articulation and manual mapping methods are considered suitable for real-time applications such as Jacob. We evaluate the proposed virtual character using hedonic motivation system adoption model (HMSAM) with 70 users. The HMSAM results for the behavioral intention to use is 91.74%, and the immersion is 72.95%. The average score for all aspects of the HMSAM is 85.50%. The rule-based lip-syncing algorithm accurately synchronizes the lip movements with the Jacob voice chatbot's speech in real-time.
Solving software project scheduling problem using grey wolf optimization
Marrwa Abd-AlKareem Alabajee;
Dena Rafaa Ahmed;
Taghreed Riyadh Alreffaee
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i6.16758
In this paper, we will explore the application of grey wolf optimization (GWO) methodology in order to solve the software project scheduling problem (SPSP) to seek an optimum solution via applying different instances from two datasets. We will focus on the effects of the quantity of employees as well as the number of tasks which will be accomplished. We concluded that increasing employee number will decrease the project’s duration, but we could not find any explanation for the cost values for all instances that studied. Also, we concluded that, when increasing the number of the tasks, both the cost and duration will be increased. The results will compare with a max-min ant system hyper cube framework (MMAS-HC), intelligent water drops algorithm (IWD), firefly algorithm (FA), ant colony optimization (ACO), intelligent water drop algorithm standard version (IWDSTD), and intelligent water drop autonomous search (IWDAS). According to these study and comparisons, we would like to say that GWO algorithm is a better optimizing tool for all instances, except one instance that FA is outperform the GWO.
Research on 4-dimensional Systems without Equilibria with Application
Ruibin Hao;
Lequan Min;
Hongyan Zang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v16i2.8507
Recently chaos-based encryption has been obtained more and more attention. Chaotic systems without equilibria may be suitable to be used to design pseudorandom number generators (PRNGs) because there does not exist corresponding chaos criterion theorem on such systems. This paper proposes two propositions on 4-dimensional systems without equilibria. Using one of the propositions introduces a chaotic system without equilibria. Using this system and the generalized chaos synchronization (GCS) theorem constructs an 8-dimensional discrete generalized chaos synchronization (8DBDGCS) system. Using the 8DBDGCS system designs a 216-word chaotic PRNG. Simulation results show that there are no significant correlations between the key stream and the perturbed key streams generated via the 216-word chaotic PRNG. The key space of the chaotic PRNG is larger than 21275. As an application, the chaotic PRNG is used with an avalanche-encryption scheme to encrypt an RGB image. The results demonstrate that the chaotic PRNG is able to generate the avalanche effects which are similar to those generated via ideal chaotic PRNGs.
Suport visual details of X-ray image with plain information
Nashwan Jasim Hussein;
Sabah Khudhair Abbas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i6.21592
The objective of content-based image retrival (CBIR) is to retrieve relevant medical images from the medical database with reference to the query image in a shorter span of time. All the proposed approaches are different, yet the research goal is to attain better accuracy in a reasonable amount of time. The initial phase of this research presents a feature selection technique that aims to improvise the medical image diagnosis by selecting prominent features. The second phase of the research extracts features and the association rules are formed by the proposed classification based on highly strong association rules (CHiSAR). Finally, the rule subset classifier is employed to classify between the images. The last pert of our work extracts the features from the kidney images and the association rules are reduced for better performance. The image relevance inference is performed and finally, binary and the best first search classification is employed to classify between the images.
Machine learning-based approaches for tomato pest classification
Gayatri Pattnaik;
Kodimala Parvathy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 2: April 2022
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v20i2.19740
Insect pests are posing a significant threat to agricultural production. They live in different places like fruits, vegetables, flowers, and grains. It impacts plant growth and causes damage to crop yields. We presented an automatic detection and classification of tomato pests using image processing with machine learning-based approaches. In our work, we considered texture features of pest images extracted by feature extraction algorithms like gray level co-occurrence matrix (GLCM), local binary pattern (LBP), histogram of oriented gradient (HOG), and speeded up robust features (SURF). The three standard classification methods, including support vector machine (SVM), k-nearest neighbour (k-NN), and decision tree (DT) are used for classification operation. The three classifiers have undergone a comprehensive analysis to present which classifier with which feature yields the best accuracy. The experiment results showed that the SVM classifier's precision using the feature extracted by local binary patterns (LBP) algorithm achieves the highest value of 81.02%. MATLAB software used for feature extraction and waikato environment for knowledge analysis (WEKA) graphical user interface for classification.
An LMI approach to Mixed H_∞/H_- fault detection observer design for linear fractional-order systems
Mohammad Azimi;
Heydar Toossian Shandiz
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.12928/telkomnika.v19i6.18741
This study deals with the problem of robust fault detection for linear time-invariant fractional-order systems (FOSs) assumed to be affected by sensor, actuator and process faults as well as disturbances. The observer-based method was employed to solve the problem, where the detector is an observer. The problem was transformed into the mixed robust optimization problem to make the system disturbance-resistant on one hand and fault-sensitive on the other hand. Then, sufficient conditions were obtained to solve the problem in the linear matrix inequality (LMI) mode. Finally, the effectiveness and superiority of the method were demonstrated by simulating the solutions on a single-input multi-output thermal testing bench.