cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked Fingerprint Images Mandy Douglas; Karen Bailey; Mark Leeney; Kevin Curran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 3: September 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i3.6437

Abstract

Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
New Trends in Internet of Things, Applications, Challenges, and Solutions Yousra Abdul Alsahib S.aldeen; Kashif Naseer Qureshi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.8483

Abstract

Internet of things (IoT) refers to an innovation and advance field to introduce a new concept of technologies with various potential advantages. In IoT, different types of diverse smart devices and gadgets with smart communication interfaces are connected with each other and offers the plethora of services in our daily life. IoT has gained attention in all fields of life like e-home, e-commerce, e-health, smart grids, intelligent transportation systems, and e-governance. The objects in IoT increasing preponderance of entities and transform objects into new and real-world objects. In this review paper, we discuss the new trend in IoT, its applications and recent challenges and their solutions. In addition, the paper also elaborates the existing systems, IoT architecture and technical aspects with future trends in the field. This review will be helpful to new researchers to find the existing technologies and challenges in order to continue their research in the field.
New design of lightweight authentication protocol in wearable technology Galih Bangun Santosa; Setiyo Budiyanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10344

Abstract

Today, the use of wearable devices is becoming a thing inherent in the daily activities of urban communities. In practice, wearable communications may contain sensitive information regarding a user's health record, so authentication and confidentiality of data exchanged must be guaranteed. In addition, the success of authentication between users, wearable devices and smartphones is very important because there are various threats of attack on the authentication process. Based on previous studies, it was found that the security functionality of user impersonation attack is not owned by lightweight authentication protocols in the current wearable communication environment. So this research undertakes the design of a lightweight authentication protocol to be immune to user impersonation attacks to supplement the lack of security functionality in previous protocols with the support of performing a formal analysis using the Scyther Tool. The research method used is a Research Library supported by conducting protocol security test experiment. The developed protocol utilizes a modified and customized S-NCI key establishment protocol scheme to meet all targeted security functionality. The research resulted that the lightweight authentication protocol generated was immune to the impersonation attacks of users, then was able to add two new functionalities that added wearable devices and added smartphones.
Fingerprint indoor positioning based on user orientations and minimum computation time Firdaus Firdaus; Noor Azurati Ahmad; Shamsul Sahibuddin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12774

Abstract

Indoor Positioning System (IPS) has an important role in the field of Internet of Thing. IPS works based on many existing radio frequency technologies. One of the most popular methods is WLAN Fingerprint because this technology has been installed widely inside buildings and it provides a high level of accuracy. The performance is affected by people who hold mobile devices (user) and also people around the users. This research aimed to minimize the computation time of kNN searching process. The results showed that when the value of k in kNN was greater, the computation time increased, especially when using Cityblock and Minkowski distance function. The smallest average computation time was 2.14 ms, when using Cityblock. Then the computational time for Euclidean and Chebychev were relatively stable, i.e. 2.2 ms and 2.23 ms, respectively.
A proposed java forward slicing approach Rana Bader; Basem Alukosh; Mohammad Abdallah; Khalil Awad; Amir Ngah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.12655

Abstract

Many organization, programmers, and researchers need to debug, test and make maintenance for a segment of their source code to improve their system. Program slicing is one of the best techniques to do so. There are many slicing techniques available to solve such problems such as static slicing, dynamic slicing, and amorphous slicing. In our paper, we decided to develop a tool that supports many slicing techniques. Our proposed tool provides new flexible ways to process simple segments of Java code, and it generates needed slicing according to the user needs, our tool will provide the user with direct and indirect dependencies for each variable in the code segments. This tool can work under various operating systems and does not need particular environments. Thus, our tool is helpful in many aspects such as debugging, testing, education, and many other elements.
Hidden Markov model technique for dynamic spectrum access Jayant P Pawar; Prashant V. Ingole
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.14470

Abstract

Dynamic spectrum access is a paradigm used to access the spectrum dynamically. A hidden Markov model (HMM) is one in which you observe a sequence of emissions, but do not know the sequence of states the model went through to generate the emissions. Analysis of hidden Markov models seeks to recover the sequence of states from the observed data. In this paper, we estimate the occupancy state of channels using hidden Markov process. Using Viterbi algorithm, we generate the most likely states and compare it with the channel states. We generated two HMMs, one slowly changing and another more dynamic and compare their performance. Using the Baum-Welch algorithm and maximum likelihood algorithm we calculated the estimated transition and emission matrix, and then we compare the estimated states prediction performance of both the methods using stationary distribution of average estimated transition matrix calculated by both the methods.
Particle swarm optimization for solving thesis defense timetabling problem Gilbert Christopher; Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18792

Abstract

The thesis defense timetabling problem is a fascinating and original NP-hard optimization problem. The problem involves assigning the participants to defense sessions, composing the relevant committees, satisfying the constraints, and optimizing the objectives. This study defines the problem formulation that applies to Universitas Multimedia Nusantara (UMN) and use the particle swarm optimization (PSO) algorithm to solve it. As a demonstration of concept and viability, the proposed method is implemented in a web-based platform using Python and Flask. The implementation is tested and evaluated using real-world instances. The results show that the fastest timetable generation is 0.18 seconds, and the slowest is 21.88 minutes for 25 students and 18 department members, without any violation of the hard constraints. The overall score of the EUCS evaluation for the application is 4.3 out of 6.
A Lighting Control System in Buildings based on Fuzzy Logic Seno D. Panjaitan; Aryanto Hartoyo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 3: December 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i3.732

Abstract

Lighting generally consumed 25%-50% of total electricity consumption in a building. Nowadays, the building lighting source is dominated by the use of fluorescent lamps. The previous technical papers by other researchers had focused on power density control of incandescent lamps, which is now rarely used, unconsidered national standard as control reference value, and required a high-cost in investment. By these reasons, this paper proposes a building lighting system based on fuzzy logic scheme to automate fluorescent lamps in order to achieve illumination according to Indonesian National Standard (SNI). The input variables were indoor lighting, inference from outdoor lighting, and occupancy. The output variable was the required illumination to achieve the standard. The required illumination determined the number of lamps that had to be turned on. In the experiment result, a classroom illumination of lighting without controller in workdays was about 350 lux, while with the proposed controller it varied between 250–300 lux close to the SNI, i.e. 250 lux. Meanwhile, with the proposed controller the electricity consumption for a classroom was 75% lower than the lighting without controller. 
Pornographic Image Recognition Based on Skin Probability and Eigenporn of Skin ROIs Images I Gede Pasek Suta Wijaya; IBK Widiartha; Sri Endang Arjarwani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 3: September 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i3.1476

Abstract

The paper proposed a pornographic image recognition using skin probability and principle component analysis (PCA) on YCbCr color space. The pornographic image recognition is defined as a process to classify the image containing and showing genital elements of human body from any kinds of images. This process is hard to be performed because the images have large variability due to poses, lighting, and background variations. The skin probability and holistic feature, which is extracted by YCbCr skin segmentation and PCA, is employed to handle those variability problems. The function of skin segmentation is to determine skin ROI image and skin probability. While the function of PCA is to extract eigenporn of the skin ROIs images and by using the eigenporns the holistic features are determined. The main aim of this research is to optimize the accuracy and false rejection rate of the skin probability and fusion descriptor based recognition system. The experimental result shows that the proposed method can increase the accuracy by about 12% and decrease the FPR and FNR by about 16%, respectively. The proposed method also works fast for recognition, which requires 1.3.second per image. 
Evaluation Research of Traction Motor Performance for Mine Dump Truck Based on Rough Set Theory HuiLai Sun; Chun Jin; Shuyang Zheng; Haiyong Tian
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.46

Abstract

This paper presents the traction motor evaluation method depending on the electric transmission energy transfer characteristics and different source of supply, including motor manufactures, diesel turbine manufacturers, wheel side reducer manufacturers and electric drive system integrated manufacturers. 9 evaluations are proposed in 3 levels from the motor body and control performance, electric drive system coordinate index, driving conditions and specific cycle. Motor performance evaluation system is published by the means of electric transmission tests and computer simulation platform, using rough set theory. Experimental results show that the model can accurate evaluation of state of the traction motor, Evaluation of the accuracy is better than the subjective weighting analysis, verifying the integrity and usefulness of this valuation method. At the same time, the comprehensive evaluations index of permanent magnet synchronous motors is high, it has important research value. 

Page 41 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue