for Journals by Title or ISSN
for Articles by Keywords

Publisher: Universitas Ahmad Dahlan   (Total: 18 journals)   [Sort by number of followers]

Showing 1 - 18 of 18 Journals sorted alphabetically
Ahmad Dahlan J. of English Studies     Open Access   (Followers: 2)
Bahastra     Open Access  
Berkala Fisika Indonesia     Open Access  
Bulletin of Electrical Engineering and Informatics     Open Access   (Followers: 8)
HUMANITAS (Jurnal Psikologi Indonesia)     Open Access   (Followers: 4)
Intl. J. of Advances in Intelligent Informatics     Open Access   (Followers: 7)
J. of Education and Learning     Open Access   (Followers: 11)
J. of Education, Health and Community Psychology     Open Access   (Followers: 7)
Jurnal Citizenship     Open Access   (Followers: 2)
Jurnal Hukum Novelty     Open Access  
Jurnal Ilmiah AdMathEdu     Open Access  
Jurnal Informatika     Open Access   (Followers: 1)
Kes Mas : Jurnal Fakultas Kesehatan Masyarakat     Open Access   (Followers: 2)
Media Farmasi     Open Access  
Pharmaciana     Open Access  
Psikopedagogia : Jurnal Bimbingan dan Konseling     Open Access   (Followers: 2)
Spektrum Industri : Jurnal Ilmiah Pengetahuan dan Penerapan Teknik Industri     Open Access  
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)     Open Access   (Followers: 8, SJR: 0.265, CiteScore: 1)
Journal Cover
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)
Journal Prestige (SJR): 0.265
Citation Impact (citeScore): 1
Number of Followers: 8  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1693-6930 - ISSN (Online) 2302-9293
Published by Universitas Ahmad Dahlan Homepage  [18 journals]
  • An artificial neural network approach for detecting skin cancer

    • Authors: Sugiarti Sugiarti, Yuhandri Yuhandri, Jufriadif Na`am, Dolly Indra, Julius Santony
      Abstract: This study aims to present diagnose of melanoma skin cancer at an early stage. It applies feature extraction method of the first order for feature extraction based on texture in order to get high degree of accuracy with method of classification using artificial neural network (ANN). The method used is training and testing phases with classification of Multilayer Perceptron (MLP) neural network. The results showed that the accuracy of test image with 4 sets of training for image not suspected of melanoma and melanoma with the lowest accuracy of 80% and the highest accuracy of 88,88%,respectively. The 4 sets of training used consisted of 23 images. of the 23 images used as a training consisted of 6 as not suspected of melanoma images and 17 as suspected melanoma images.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v16i6.9547
      Issue No: Vol. 17, No. 2 (2019)
  • RFID-based conveyor belt for improve warehouse operations

    • Authors: Syafrial Fachri Pane, Rolly Maulana Awangga, Bayu Rahmad Azhari, Gilang Romadhanu Tartila
      Abstract: The Government of the Republic of Indonesia is currently focusing on building logistics infrastructure to facilitate the distribution of logistics to all regions in Indonesia. The Distribution of logistics to each area requires an electronically connected warehouse so that information about goods in the warehouse can be monitored continuously. There are some problems with one of the logistics companies because the existing warehouse management technology is not sufficient enough, so the complex warehouse functions do not become dynamic. One of the solutions to solve the problem need to use RFID technology, conveyor belt, and robotic arm by using an Arduino microcontroller. This research uses Design Science Research Methodology which focuses on developing and improving the model performance of a system and using the prototyping model for system development. The test results state that the built system works well because it could lift, identify and sort goods by type. So, this research could answer the problem that happened at the warehouse.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11767
      Issue No: Vol. 17, No. 2 (2019)
  • Sequential order vs random order in operators of variable neighborhood
           descent method

    • Authors: Darmawan Satyananda, Sapti Wahyuningsih
      Abstract: Many optimization problems require heuristic methods to solve the problem. Variable Neighborhood Search (VNS) is a metaheuristic form that systematically changes its “neighborhood” in search of solutions. One method in VNS is Variable Neighborhood Descent (VND), which performs a deterministic neighborhood change. The change of the neighborhood in VND can be done in a random and sequential order. This paper compares sequential and random neighborhood selection methods in solving Capacitated Vehicle Routing Problem (CVRP) problems. There are 6 intra-route neighborhood structures and 4 inter-route structures used. CVRP problems are taken from several dataset providers. The initial solution is formed by Sequential Insertion method. The experimental results shows that the random selection of neighborhood operators can provide a more optimal route length (in 10 of 13 datasets used) than that of sequential selection (only better in 3 dataset). However, the random selection take more iterations to reach convergent state than the sequential one. For sequential selection, determination of the neighborhood structure’s order affects the speed to the convergent state. Hence, a random selection in VND method is more preferable than sequential selection.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11789
      Issue No: Vol. 17, No. 2 (2019)
  • Improved echocardiography segmentation using active shape model and
           optical flow

    • Authors: Riyanto Sigit, Calvin Alfa Roji, Tri Harsono, Son Kuswadi
      Abstract: Heart disease is one of the most dangerous diseases that threaten human life. The doctor uses echocardiography to analyze heart disease. The result of echocardiography test is a video that shows the movement of the heart rate. The result of echocardiography test indicates whether the patient’s heart is normal or not by identifying a heart cavity area. Commonly it is determined by a doctor based on his own accuracy and experience. Therefore, many methods to do heart segmentation is appearing. But, the methods are a bit slow and less precise. Thus, a system that can help the doctor to analyze it better is needed. This research will develop a system that can analyze the heart rate-motion and automatically measure heart cavity area better than the existing method. This paper proposes an improved system for cardiac segmentation using median high boost filter to increase image quality, followed by the use of an active shape model and optical flow. The segmentation of the heart rate-motion and auto measurement of the heart cavity area is expected to help the doctor to analyze the condition of the patient with better accuracy. Experimental result validated our approach.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11821
      Issue No: Vol. 17, No. 2 (2019)
  • Modeling and prediction of wetland rice production using support vector

    • Authors: Muhammad Alkaff, Husnul Khatimi, Wenny Puspita, Yuslena Sari
      Abstract: Food security is still one of the main issues faced by Indonesia due to its large population. Rice as a staple food in Indonesia has experienced a decline in production caused by unpredictable climate change. In dealing with climate change, adaptation to fluctuating rice productivity must be made. This study aims to build a prediction model of wetland rice production on climate change in South Kalimantan Province which is one of the national rice granary province and the number one rice producer in Kalimantan Island. This study uses monthly climatic data from Syamsudin Noor Meteorological Station and quarterly wetland rice production data from Central Bureau of Statistics of South Kalimantan. In this research, Support Vector Regression (SVR) method is used to model the effect of climate change on wetland rice production in South Kalimantan. The model is then used to predict the amount of wetland rice production in South Kalimantan. The results showed that the prediction model with the RBF kernel with the parameter of C = 1.0, epsilon = 0.002 and gamma = 0.2 produces good results with the RMSE value of 0.1392.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10145
      Issue No: Vol. 17, No. 2 (2019)
  • Guillou-Quisquater Guillou-quisquater protocol for user authentication
           based on zero knowledge proofProtocol for User Authentication based on
           Zero Knowledge Proof

    • Authors: Kevin Kusnardi, Dennis Gunawan
      Abstract: Authentication is the act of confirming the validity of someone’s personal data. In the traditional authentication system, username and password are sent to the server for verification. However, this scheme is not secure, because the password can be sniffed. In addition, the server will keep the user’s password for the authentication. This makes the system vulnerable when the database server is hacked. Zero knowledge authentication allows server to authenticate user without knowing the user’s password. In this research, this scheme was implemented with Guillou-Quisquater protocol. Two login mechanisms were used: file-based certificate with key and local storage. Testing phase was carried out based on the Open Web Application Security Project (OWASP) penetration testing scheme. Furthermore, penetration testing was also performed by an expert based on Acunetix report. Three potential vulnerabilities were found and risk estimation was calculated. According to OWASP risk rating, these vulnerabilities were at the medium level.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11754
      Issue No: Vol. 17, No. 2 (2019)
  • The Strategy of Enhancing Article Citation and H-Index on SINTA to Improve
           Tertiary Reputation

    • Authors: Untung Rahardja, Eka Purnama Harahap, Shylvia Ratna Dewi
      Abstract: Development of technology as it is today, most students or lecturers in education community write documents or articles digitally. However, there are still many obstacles when searching for a legitimate source of reference and to know whether it contains plagiarism or not. Until present, there are still many students and lecturers who seek references from sources that have not been valid and not yet trusted, but it is considered a fatal mistake for writing articles and also writing thesis or dissertation from untrusted resources. Therefore, Google Scholar system helps to alleviate this problem. Google also facilitates the use of citations or references. The purpose of this research is to identify the number of citation H-Index owned by lecturers at tertiary education and  score ranking achieved at tertiary education SINTA (Science and Technology Index) Ristekdikti. Citing an article from another publication is one form of scientific communication by the author or researcher. The large number of citations obtained from an article published in the publication indicates how significant the contributions of the author in improving the quality of the study field. In this study, citation analysis is used as an analysis of all citations which indicate the type of information sources used by students and lecturers in writing the journal as a result of their research. The following research use two methods of analysis: Mind Mapping methods and SWOT Analysis. 
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i1.9761
      Issue No: Vol. 17, No. 2 (2019)
  • Comparative study of 940 nm and 1450 nm near infrared sensor for glucose
           concentration monitoring

    • Authors: Engelin Shintadewi Julian, Kiki Prawiroredjo
      Abstract: In order to manage their blood glucose level, diabetics have to test their blood glucose level regularly. Unfortunately, the current blood glucose measurement device is uncomfortable, painful, event costly for the diabetics; therefore, a lot of effort is given to develop a noninvasive blood glucose meter. We studied the potential of two near infrared wavelength i.e. 1450 and 940 nm as glucose sensor. Each sensor consists of a light emitting diode (LED) as light source, a photodiode that is sensitive to that wavelength, transimpedance amplifier, and filters. An acrylic box size 5 cm x 1 cm x 5 cm was used as glucose solution container. The LED and photodiode were located at each side of box width, at 1 cm distance. The container was than filled with various concentrations of glucose solution, and the sensor output voltages were measured. The results show that for glucose concentration 0 to 500 mg/dl, the output voltages of the 1450 nm sensor tend to lower when the glucose concentration is higher, therefore it has the potential to be used as glucose sensor. Different result is obtained from the 940 nm sensor where the output voltages were remained the same when the glucose concentration was varied.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10149
      Issue No: Vol. 17, No. 2 (2019)
  • Analysis and investigation of a novel microwave sensor with high Q-factor
           for oil sensing

    • Authors: Ammar Alhegazi, Zahriladha Zakaria, Noor Azwan Shairi, Tole Sutikno, Rammah A. Alahnomi, Ahmed Ismail Abu-Khadrah
      Abstract: In this paper, a novel microwave sensor with high Q-factor for oil sensing is analyzed and investigated. The new design is based on a gap waveguide cavity resonator (GWCR). To characterize and evaluate the sample, the oil under tested (OUT) is injected into a Teflon tube, which is passing through the microfluidic channel that is located in the middle of the cavity where the electric field concentrates. The results show that the proposed sensor has a high Q-factor of 4832. Moreover, the proposed design has the ability to sense and detect different types of oils with a small variation of permittivities such as Fish oil, Coconut oil, Olive oil, Linseed oil and Castor oil. The permittivity equation is extracted using the polynomial fitting method to define unknown dielectric properties of the OUT. The results show that the evaluated permittivity using the proposed sensor has a good agreement with the ideal permittivity. Therefore, the proposed sensor is a good candidate for oil processing in food industries.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11901
      Issue No: Vol. 17, No. 2 (2019)
  • Air Pollution Monitoring System Using LoRa Modul as Transceiver System

    • Authors: Mia Rosmiati, Moch. Fachru Rizal, Fitri Susanti, Gilang Fahreza Alfisyahrin
      Abstract: Air pollution is a disaster that can indirectly interfere with human health, Indonesia is the third highest country in the world that has pollution levels, one of the types of pollution that threatens public health is the increase of CO, NO2 and SO2 level in the air. With the increasing level of air pollution in the city, it requires a device that can monitor air pollution in a real time. By integrating air sensor and Raspberry Pi as data processor and using LoRa module as transceiver module, then the process of transmitting data from transmitter to receiver can be done directly without connected internet. In a test, the system can transmit intensity data information by wireless system on Line Of Sight (LOS) scemes at a maximum distance of 1.7 Km and Non Line Of Sight (NLOS) scheme at a distance of 400 meters with a average delay is 2 second.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11760
      Issue No: Vol. 17, No. 2 (2019)
  • Low-Cost Communication System for Explorer-class Underwater Remotely
           Operated Vehicle

    • Authors: Simon Siregar, Muhammad Ikhsan Sani, Muhammad Muchlis Kurnia, Dzikri Hasbialloh
      Abstract: Disaster recovery from underwater earthquake, plane crashes into the sea, and monitoring underwater cables or piping for energy purpose are underwater missions for Remotely Operated Underwater Vehicle (ROV) in ASEAN MATE 2018 Competition. Two essentials factor to perform successfully in this ROV competition are design of an efficient communication protocol system and a low-cost communication hardware. In this research, an optimal communication system between RS-232 serial communication transmission and RS-485 serial communication transmission is developed to obtain the optimal solution. Both communication system is tested in Tech_SAS ROV-Telkom University Indonesia, a microcontroller underwater ROV based which used single microcontroller to control actuator, sensor and communication, and measured the Quality of Services(QoS) for end-to-end delay and packets loss. From the the experiment and evaluation for the two schemes, shows 12.57ms end-to-end delay, 0% data packet error and $6 RS-485 communication system are the optimal solution for Tech_SAS ROV.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11791
      Issue No: Vol. 17, No. 2 (2019)
  • KAFA: A Novel Interoperability Open Framework to Utilize Indonesian
           Electronic Identity Card

    • Authors: Rolly Maulana Awangga, Nisa Hanum Harani, Muhammad Yusril Helmi Setyawan
      Abstract: Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11755
      Issue No: Vol. 17, No. 2 (2019)
  • K-Means and Bayesian Networks to determine Building Damage Levels

    • Authors: Devni Prima Sari, Dedi Rosadi, Ronnie Effendie, Danardono Danardono
      Abstract: Many troubles in life require decision-making with convoluted processes because they are caused by uncertainty about the process of relationships that appear in the system. This problem leads to the creation of a model called the Bayesian Network. Bayesian Network is a Bayesian supported development supported by computing advancements. The Bayesian network has also been developed in various fields. At this time, information can implement Bayesian Networks in determining the extent of damage to buildings using individual building data. In practice, there is mixed data which is a combination of continuous and discrete variables. Therefore, to simplify the study it is assumed that all variables are discrete in order to solve practical problems in the implementation of theory. Discretization method used is the K-Means clustering because the percentage of validity obtained by this method is greater than the binning method.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11756
      Issue No: Vol. 17, No. 2 (2019)
  • Data Stream Mining Techniques: A Review

    • Authors: Eiman Alothali, Hany Alashwal, Saad Harous
      Abstract: A plethora of infinite data is generated from the Internet and other information sources.  Analyzing this massive data in real-time and extracting valuable knowledge using different mining applications platforms have been an area for research and industry as well. However, data stream mining has different challenges making it different from traditional data mining. Recently, many studies have addressed the concerns on massive data mining problems and proposed several techniques that produce impressive results. In this paper, we review real time clustering and classification mining techniques for data stream. We analyze the characteristics of data stream mining and discuss the challenges and research issues of data steam mining. Finally, we present some of the platforms for data stream mining.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11752
      Issue No: Vol. 17, No. 2 (2019)
  • The Architecture Social Media and Online Newspaper Credibility Measurement
           for Fake News Detection

    • Authors: Rakhmat Arianto, Harco Leslie Hendric Spits Warnars, Edi Abdurachman, Yaya Heryadi, Ford Lumban Gaol
      Abstract: Social media is one of the communication media favored by people in the world, especially in Indonesia. This is evidenced by the results of the APJII survey which shows that the majority of Indonesians use social media in their daily activities. One of the advantages of social media is the dissemination of information faster than conventional media so that the quality of information disseminated is lower than conventional media due to the process of disseminating information not through the filter process. By measuring the level of credibility of the online newspaper based on the time credibility, website credibility, and message credibility factors and measuring the level of credibility on social media based on the time credibility, Social Media Credibility, and Message Credibility factors with different levels of weight, it will produce a news likelihood level it's fake news or facts.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11779
      Issue No: Vol. 17, No. 2 (2019)
  • Wi-Fi Password Stealing Program Using USB Rubber Ducky

    • Authors: Hansen Edrick Harianto, Dennis Gunawan
      Abstract: A minute is all it takes for a hacker to gain informations from your computer, such as Wi-Fi password. Due to the limited capability of people to remember a lot of complex and unique password, people tend to use the same password for most of their account. This paper aimed to implement Wi-Fi password stealing program in USB Rubber Ducky using USB Rubber Ducky Scripting, Visual Basic Script, Web Server, Command Prompt, and Ducky Toolkit to obtain clear text Wi-Fi password that ever connected to the computer. In the testing phase, the success rate of Wi-Fi password stealing program reached 94.28% with 87.87% obtained personal password is still categorized as guessable password and the password reuse rate reached 81.81%. Thus, Wi-Fi password stealing program can be very dangerous as most of the personal password was used in lots of account and still categorized as guessable.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11775
      Issue No: Vol. 17, No. 2 (2019)
  • Security Risk of Bring Your Own Device (BYOD) System in Manufacturing
           Company at Tangerang

    • Authors: Astari Retnowardhani, Raziv Herman Diputra
      Abstract:  Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. The BYOD system could help the employees to efficiency the time for accessing the work to do.  BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10165
      Issue No: Vol. 17, No. 2 (2019)
  • A Scoring Rubric for Automatic Short Answer Grading System

    • Authors: Uswatun Hasanah, Adhistya Erna Permanasari, Sri Suning Kusumawardani, Feddy Setio Pribadi
      Abstract: During the past decades, researches about automatic grading have become an interesting issue. These studies focuses on how to make machines are able to help human on assessing students’ learning outcomes. Automatic grading enables teachers to assess student's answers with more objective, consistent, and faster. Especially for essay model, it has two different types, i.e. long essay and short answer. Almost of the previous researches merely developed automatic essay grading (AEG) instead of automatic short answer grading (ASAG). This study aims to assess the sentence similarity of short answer to the questions and answers in Indonesian without any language semantic's tool. This research uses pre-processing steps consisting of case folding, tokenization, stemming, and stopword removal. The proposed approach is a scoring rubric obtained by measuring the similarity of sentences using the string-based similarity methods and the keyword matching process. The dataset used in this study consists of 7 questions, 34 alternative reference answers and 224 student’s answers. The experiment results show that the proposed approach is able to achieve a correlation value between 0.65419 up to 0.66383 at Pearson's correlation, with Mean Absolute Error (MAE) value about 0.94994 until 1.24295. The proposed approach also leverages the correlation value and decreases the error value in each method.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11785
      Issue No: Vol. 17, No. 2 (2019)
  • MOS Gas Sensor of Meat Freshness Analysis on E-Nose

    • Authors: Budi Gunawan, Salman Alfarisi, Gunanjar Satrio, Arief Sudarmaji, Malvin Malvin, Krisyarangga Krisyarangga
      Abstract: The high demand of meat causes the seller mix the fresh and not-fresh meat. Electronic nose was used to detect the quality of the meat quickly and accurately. This research is proposed to test and analyze the sensitivity of MOS sensor in the electronic nose and simulate it using Matlab to identify meat classification using neural network. Test parameters based on Indonesian National Standard (SNI 3932-2008) requirement on the quality of carcass and meat. In this simulation, the number of neurons in the hidden layer was varied to find the most accurate identification. The sensitivity analysis of the MOS sensor was conducted by testing the meat sample aroma, calculate the sensitivity, identify the formation of input, hidden layer, outputs, and simulate the result of the varied formation. Then, found the number of the most optimal neurons. The result of the data training will be applied to the real instrument.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11787
      Issue No: Vol. 17, No. 2 (2019)
  • Time and Cost Optimization of Business Process RMA using PERT and Goal

    • Authors: Gita Intani Budiawati, Riyanarto Sarno
      Abstract: As a company engaged in the distribution of wireless devices, Return Material Authorization (RMA) is a mandatory service that must be owned by the company. RMA is a part of the process of returning a product to receive a refund, replacement, or repair during the product’s warranty period. The business process of RMA used functionally design, which is not considered to be effective in terms of time and cost for the company of 2880 minutes for IDR 348242. In this research, Project Evaluation and Review Technique (PERT) was used to select the optimal traces; to optimize time and cost, the researcher used goal programming. This technique allows the creation of a controlled and orderly activity because the schedule and budget of a job are predetermined prior to the implementation. The optimization results show that the process time is reduced by 50% and the cost is reduced by almost 55% which show improvement on the performance of the business processes.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11792
      Issue No: Vol. 17, No. 2 (2019)
  • Adomian Decomposition Method for Analytical Solution of a Continuous
           Arithmetic Asian Option Pricing Model

    • Authors: S.O. Edeki, G. O. Akinlabi, O. González-Gaxiola
      Abstract: One of the most issues of concern in financial mathematics has been a viable method for obtaining analytical solutions of the Black-Scholes model associated with Arithmetic Asian Option (AAO). In this paper, a proposed semi-analytical technique-Adomian Decomposition Method (ADM) is applied for the first time, for analytical solution of a continuous arithmetic Asian option model. The ADM gives the solution in explicit form with few iterations. The computational work involved is less. However, high level of accuracy is not neglected. The obtained solution conforms with those of Rogers & Shi (J. of Applied Probability 32: 1995, 1077-1088), and Elshegmani & Ahmad (ScienceAsia, 39S: 2013, 67–69). Thus, the proposed method is highly recommended for analytical solution of other versions of Asian option pricing models such as the geometric form for puts and calls, even in their time-fractional forms.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.9179
      Issue No: Vol. 17, No. 2 (2019)
  • An Electrical Power Control System for Explorer-class Remotely Operated
           Underwater Vehicle (ROV)

    • Authors: Muhammad Ikhsan Sani, Simon Siregar, Muhammad Muchlis Kurnia, Dzikri Hasbialloh
      Abstract: The importance of an optimal method for electric power transmission is crucial for ROV operation. Meanwhile, only few studies have shown the effect of electrical power system from power supply to ROV.This paper proposes a design and implementation of electrical power system for ROV that developed by Tech_SAS team from Telkom University, Bandung, Indonesia. This work aims to obtain the optimal power system to supply ROV’s electrical and electronic components. Tech_SAS ROV is developed to compete on 1st and 2nd ASEAN MATE Underwater Robotic Competition. The system has demonstrated that 48V electric voltage can be transmitted to ROV with negligible voltage drop when using 20 meter 12AWG cable. The voltage is converted to 12V using DC-DC converter in order to supply various ROV’s electronic devices ROV safely and efficiently. Meanwhile, the microcontroller was used to as thrust control to manage current flow to DC motor. The system has been evaluated and demonstrates optimal results and provides a design consideration about ROV’s power system especially on tether cable and power distribution scheme.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11757
      Issue No: Vol. 17, No. 2 (2019)
  • Prototype of Human Footstep Power Generator using Ultrasonic Sensor

    • Authors: Giva Andriana Mutiara, Andri Surya Dinata, Anang Sularsa
      Abstract: Nowadays, the human need for electrical energy is getting higher. Due to the declining supply fuel, many efforts have been studied to find renewable energy. One of the studies is building a power generator system that comes from daily human activities. This paper proposes a human footstep power generator using ultrasonic sensor HC-SR04. Only by doing a simply walking on the ground floor, electrical energy can trigger. An HC-SR04 sensor measuring the spring distance from the footstep and activates the motor drive relay and generator that converts mechanical energy into electrical energy and stored in a battery. The test results state that the deeper of a footing step on the floor surface, the greater distance produced and the higher voltage can be generated. The footstep can trigger 7.5 V – 8.8 V. Full battery condition can be used to turn on two pieces of 2-watt LED lamps for approximately 5 hours.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11751
      Issue No: Vol. 17, No. 2 (2019)
  • Nonlinearity Compensation of Low-Frequency Loudspeaker Response Using
           Internal Model Controller

    • Authors: Erni Yudaningtyas, Achsanul Khabib, Waru Djuriatno, Dionysius J.D.H. Santjojo, Adharul Muttaqin, Ponco Siwindarto, Zakiyah Amalia
      Abstract: This paper presents the nonlinearity compensation of low-frequency loudspeaker response.  The loudspeaker is dedicated to measuring the response of Electret Condenser Microphone which operated in the arterial pulse region. The nonlinearity of loudspeaker has several problems which cause the nonlinearity behaviour consists of the back electromagnetic field, spring, mass of cone and inductance. Nonlinearity compensation is done using the Internal Model Controller with voltage feedback linearization. Several signal tests consist of step, impulse and sine wave signal are examined on different frequencies to validate the effectiveness of the design.  The result showed that the Internal Mode Controller can achieve the high-speed response with a small error value.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11761
      Issue No: Vol. 17, No. 2 (2019)
  • Non-Intrusive Vehicle-based Measurement System for Drowsiness Detection

    • Authors: Ignatius Deradjad Pranowo, Dian Artanto, Muhammad Prayadi Sulistyanto
      Abstract: The purpose of this study is for prototyping a non-intrusive vehicle-based measurement system for drowsiness detection. The vehicle-based measurement system aims to achieve the non-intrusive drowsiness detection. The non-intrusive vehicle-based measurement achieved by placing sensors on the steering rod, gas pedal, and brake pedal. Drowsiness can be detected by comparing the position of the steering angle to the desired target angular position, especially when the difference in value of both is greater. Some sensors have been tested to obtain the actual steering angle position. From the test results, sensors that meet the criteria of accuracy are MPU6050 and HMC5883L. Both sensors have been tested in the prototyping of a vehicle-based drowsiness detection system with sufficient results. Furthermore, the prototype of non-intrusive vehicle-based drowsiness detection system has been integrated with interesting driving simulation software. The result has been able to show the actual condition of the steering position, the gas pedal and the brake pedal precisely. Moreover, this prototype opens opportunities to support the study of drowsiness detection using vehicle-based driving simulator.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11759
      Issue No: Vol. 17, No. 2 (2019)
  • Voice Recognition System for Controlling Electrical Appliances in Smart
           Hospital Room

    • Authors: Eva Inaiyah Agustin, Riky Tri Yunardi, Aji Akbar Firdaus
      Abstract: Nowadays, most hospitals have new problem that is lack of medical nurse due to the number of patient increas rapidly. The patient especially with physical disabilities are difficult to control the switch on electrical appliances in patient’s room. This research aims to develope voice recognition based home automation and being applied to patient room. A miniature of patient’s room are made to simulate this system. The patient's voice is received by the microphone and placed close to the patient to reduce the noise.V3 Voice recognition module is used to voice recognition process. Electrical bed of patient is represented by mini bed with utilising motor servo. The lighting of patient room is represented by small lamp with relay. And the help button to call the medical nurse is represented by buzzer. Arduino Uno is used to handle the controlling process. Six basic words with one syllable are used to command for this system. This system can be used after the patient's voice is recorded. This system can recognize voice commands with an accuracy 75%. The accuracy can be improved up to 85% by changing the voice command into two syllables with variations of vowels and identical intonation. Higher accuracy up to 95% can be reached by record all the subject’s voice.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11781
      Issue No: Vol. 17, No. 2 (2019)
  • Face Recognition Smart Cane using Haar-Like Features and Eigenfaces

    • Authors: Gita Indah Hapsari, Giva Andriana Mutiara, Husein Tarigan
      Abstract: Visually impaired has the limitation in interacting with another human. They usually use the sense of hearing and touching their face to recognize human. Face recognition is a technology that can be used to solve this problem. This paper develops a smart cane function by integrated face recognition feature on the cane using Haar-Like features and Eigenfaces. This paper proposed a portable, real time, and wearable product.  Raspberry Pi supports portability that affects the delay and computing speed of face recognition algorithms. Utilization of Raspi camera on the eyes glasses is for wearable purposes. Voice output provides information on whether the face is caught on camera or not. This prototype works well during the face detection and recognition process. It needs 3 seconds for one-face recognized in range 0.25 until 1.5 meters from the camera, until the sound and information are generated. It needs is me 5 second for two faces recognized and 10 seconds for 3 faces recognized by a system in the same range between face and the camera.  The accuracy reaches 91.67% for the up-right position face but for other position the accuracy is only 18% until 32%.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11772
      Issue No: Vol. 17, No. 2 (2019)
  • Comparison of Dynamic Performance between DFIG and FCWECS during Grid

    • Authors: A. M. Shiddiq Yunus, Makmur Saini, Ahmed Abu-Siada
      Abstract: Variable speed based wind turbine generator (WTG) is the most popular WTG type installed worldwide among the other types. This type of WTG could extract 5% more energy from the natural intermittent of wind speed compared to the fixed speed one. There are two kinds of variable speed based WTG; Doubly Fed Induction Generator (DFIG) and Full Converter Wind Energy Conversion System (FCWECS). DFIG and FCWECS are placed at the first and second top of the total WTG installation since 2004. However, both of them are very sensitive to the grid dip fault and may violate the constrain of International Fault Ride Through (FRT) such as FRT of Spain. This paper aims to investigate the responses of DFIG and FCWECS during certain level of grid dips and compared performances of each others.The results show some different responses of both DFIG and FCWECS, however when they are complied with the voltage profile at PCC, DFIG is much effective to be connected to the weak grid whilst FCWECS is preferably to be connected to the strong grid.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11747
      Issue No: Vol. 17, No. 2 (2019)
  • Influence of Input Power in Ar/H2 Thermal Plasma with Silicon Powder by
           Numerical Simulation

    • Authors: Yulianta Siregar
      Abstract: Numerical simulation was made on the temperature distribution in argon (Ar)+hydrogen (H2) induction thermal plasma torch with silicon (Si) powder injection to obtain the temperature distribution and gas flow fields. Influence of input power was investigated on thermal plasma temperature fields and powder evaporation. The temperature distributions of thermal plasma and Si vapor distribution were compared at input powers of 20 kW, 30kW, and 40 kW. Results indicated that higher input power increases the temperature of the thermal plasma but it slightly enhances evaporation of the powder at the center axis of the plasma torch.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10533
      Issue No: Vol. 17, No. 2 (2019)
  • UDP Protocol for Multi-Task Assignment in "Void Loop" Robot

    • Authors: Irma Damayanti, Simon Siregar, Muhammad Ikhsan Sani
      Abstract: The communication system is a very important part of the robot soccer. It is because the robots must be able to move together, alternate and individual. The communication system that would be discussed is about the process of sending data from one robot to another robot using coach computer. It started with the reception of data from coach computer to both robots that had been installed Wi-Fi Communication module that had been connected to the router. Then, the data is processed using Arduino Mega2560. After that, the robot would detect the existence of the ball. The protocol used for the communication system is a UDP protocol (User Datagram Protocol) because UDP has several characteristics that support the occurrence of communication robots such as connection-less and unreliable. Both of characteristics have a faster connection, they do not require handshaking and UDP protocol provides a mechanism for sending a message to a specific process. The result shows that the communication system between coach computer and both robots is successful. This is indicated by the start button and stop button is 100% with repeating data transfer system on UDP protocol.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11782
      Issue No: Vol. 17, No. 2 (2019)
  • Transport the Electrical Power with LFAC{Hz}

    • Authors: salam waley shneen
      Abstract:  In this work introduce the power system network to transport the electrical power for low frequency alternating current(LFAC) with {Hz} included, first generation side with used 50Hz one time and other time by used frequency converter (50Hz to  Hz) exactly special frequency for this work, second types of transmission line short 50km,made 150km and long 300km, finally comparative between transport the electrical power 50Hz with low frequency alternating current {Hz}. Simulation study was carried out by MATLAB/Simulink. The result showed the transport the electrical power with low frequency alternating current {Hz} beast than by 50Hz.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10353
      Issue No: Vol. 17, No. 2 (2019)
  • State-Space Averaged Modeling and Transfer Function Derivation of DC-DC
           Boost Converter for High-Brightness LED Lighting Applications

    • Authors: Muhammad Wasif Umar, Norzaihar Yahaya, Zuhairi Baharudin
      Abstract: This paper presents dynamic analysis of a boost type dc-dc converter for high-brightness LED (HBLED) driving applications. The steady state operation in presence of all system parasitics has been discussed for continuous conduction mode (CCM). The state-space averaging, energy conservation principle and standard linearization are used to derive ac small signal control to inductor current open-loop transfer function of the converter. The derived transfer function can be further used in designing a robust feed-back control network for the system. In the end frequency and transient responses of the derived transfer function are obtained for a given set of component values, hence to provide a useful guide for control design engineers. 
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10272
      Issue No: Vol. 17, No. 2 (2019)
  • Electrically Controlled Radiation Pattern Leaky Wave Antenna Array for (C
           Band) Application

    • Authors: Mowafak K. Mohsen
      Abstract: This paper provides an insight of a new, leaky-wave antenna (LWA) array. It holds the ability to digitally steer its beam at a fixed frequency by utilizing only two state of bias voltage. This is done with acceptable impedance matching while scanning and very little gain variation. Investigation is carried out on LWAs’ control radiation pattern in steps at a fixed frequency via PIN diodes switches. This study also presents a novel half-width microstrip LWA (HWMLWA) array. The antenna is made up of the following basic structures: two elements and reconfigurable control cell with each being comprised of two diodes and two triangle patches. A double gap capacitor in each unit cell is independently disconnected or connected via PIN diode switch to achieve fixed-frequency control radiation pattern. The reactance profile at the microstrip’s free edge and thus the main beam direction is changed once the control-cell states are changed. The main beam may be directed by the antenna between 61o and 19o at 4.2 GHz. C band achieved the measured peak gain of the antenna of 15 dBi at 4.2 GHz beam scanning range. 
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11126
      Issue No: Vol. 17, No. 2 (2019)
  • A Low-cost Fiber Based Displacement Sensor For Industrial Applications

    • Authors: Siti Mahfuza Saimon, Nor Hafizah Ngajikin, Muhammad Shafiq Omar, Mohd Haniff Ibrahim, Muhammad Yusof Mohd Noor
      Abstract: In this paper, a low-cost fiber optic displacement sensor (FODS) using a bundle of plastic optical fiber (POF) as a probe is developed and presented. The sensor consists of a high power light emitting diode (LED) as light source, a probe with multiple receiving plastic optical fiber and a photodiode detector. The sensor is characterized at millimeter distance and the sensor output is analyzed from 0 mm to 13 mm displacement. The sensitivity of the sensor is found to be 5.38 mV/mm over 2.6 mm sensing range. The sensor is very useful for close distance target since it is highly sensitive at the front slope. The low development cost, high degree of sensitivity and simplicity of the design make it suitable for wide range of industrial applications. 
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.9754
      Issue No: Vol. 17, No. 2 (2019)
  • Facial Image Retrieval on Semantic Features Using Adaptive Mean Genetic

    • Authors: Marwan Ali Shnan, Taha H. Rassem, Nor Saradatul Akmar Zulkifli
      Abstract: The emergence of larger databases has made image retrieval techniques an essential component, and has led to the development of more efficient image retrieval systems. Retrieval can either be content or text-based. In this paper, the focus is on the content-based image retrieval from the FGNET database. Input query images are subjected to several processing techniques in the database before computing the squared Euclidean distance (SED) between them. The images with the shortest Euclidean distance are considered as a match and are retrieved. The processing techniques involve the application of the median modified Weiner filter (MMWF), extraction of the low-level features using histogram-oriented gradients (HOG), discrete wavelet transform (DWT), GIST, and Local tetra pattern (LTrP). Finally, the features are selected using Adaptive Mean Genetic Algorithm(AMGA). In this study, the average PSNR value obtained after applying Wiener filter was 45.29. The performance of the AMGA was evaluated based on its precision, F-measure, and recall, and the obtained average values were respectively 0.75, 0.692, and 0.66. The performance matrix of the AMGA was compared to those of particle swarm optimization algorithm (PSO) and genetic algorithm (GA) and found to perform better; thus, proving its efficiency.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.3774
      Issue No: Vol. 17, No. 2 (2019)
  • A Novel Key Management Protocol for Vehicular Cloud Security

    • Authors: nayana hegde
      Abstract: Vehicular cloud computing (VCC) is a new hybrid technology which has become an outstanding area of research. VCC combines salient features of cloud computing and wireless communication technology to help drivers in network connectivity, storage space availability and applications. VCC is formed by dynamic cloud formation by moving vehicles. Security plays an important role in VCC communication. Key management is one of the important tasks for security of VCC. This paper proposes a novel key management protocol for VCC security. Proposed scheme is based on Elliptical Curve Cryptography (ECC). The simulation results demonstrated that the proposed scheme is efficient compared to Elgamal, RSA and DSA schemes in terms of key generation time, memory usage and cpu utilization.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.9278
      Issue No: Vol. 17, No. 2 (2019)
  • A Design of Radial Line Slot Array Antennas (RLSA) Using the Specification
           of Panel Antennas

    • Authors: Teddy Purnamirza
      Abstract: RLSA antennas were suggested by several researches as Wi-Fi antennas in addition to panel antennas. Therefore, this paper researched the possibility of this suggestion. We used the size of an available in market 16 dBi panel antenna (225 mm2) as the size for our developed RLSA antenna. Based on this size, we developed 60 RLSA models using extreme beamsquint technique and simulated them.  We then chose a best model with a best performance. The best model was then fabricated and measured. The simulation and measurement results show that the developed RLSA antenna has better performance compared to the 16 dBi panel antenna in term of gain (0.25 dB higher) and bandwidth (570 MHz wider). The RLSA antenna also tested as antenna for a Wi-Fi device and it showed good performance
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10412
      Issue No: Vol. 17, No. 2 (2019)
  • Security Vulnerabilities Related to Web-based Data

    • Authors: Mohammed Awad, Mohamad Ali, Maen Takruri, shereen ismail
      Abstract: In this digital era, organizations and industries are moving towards replacing websites with web applications for many obvious reasons. With this transition towards web-based applications, organizations and industries find themselves surrounded by several threats and vulnerabilities. One of the largest concerns is keeping their infrastructure safe from attacks and misuse. Web security entails applying a set of procedures and practices, by applying several security principles at various layers to protect web servers, web users, and their surrounding environment. In this paper, we will discuss several attacks that may affect web-based applications namely: SQL injection attacks, cookie poisoning, cross-site scripting, and buffer overflow. Additionally, we will discuss detection and prevention methods from such attacks.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i1.10484
      Issue No: Vol. 17, No. 2 (2019)
  • New Design of Lightweight Authentication Protocol in Wearable Technology
           to Prevent User Impersonation Attack

    • Authors: Galih Bangun Santosa, Setiyo Budiyanto
      Abstract: Today, the use of wearable devices is becoming a thing inherent in the daily activities of urban communities. In practice, wearable communications may contain sensitive information regarding a user's health record, so authentication and confidentiality of data exchanged must be guaranteed. In addition, the success of authentication between users, wearable devices and smartphones is very important because there are various threats of attack on the authentication process. Based on previous studies, it was found that the security functionality of user impersonation attack is not owned by lightweight authentication protocols in the current wearable communication environment. So this research undertakes the design of a lightweight authentication protocol to be immune to user impersonation attacks to supplement the lack of security functionality in previous protocols with the support of performing a formal analysis using the Scyther Tool. The research method used is a Research Library supported by conducting protocol security test experiment. The developed protocol utilizes a modified and customized S-NCI key establishment protocol scheme to meet all targeted security functionality. The research resulted that the lightweight authentication protocol generated was immune to the impersonation attacks of users, then was able to add two new functionalities that added wearable devices and added smartphones.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.10344
      Issue No: Vol. 17, No. 2 (2019)
  • Application of Gabor Transform in the Classification of Myoelectric Signal

    • Authors: Jingwei Too, Abdul Rahim Bin Abdullah, Norhashimah Binti Mohd Saad, Nursabillilah Binti Mohd Ali, Tengku Nor Shuhada Binti Tengku Zawawi
      Abstract: In recent day, Electromyography (EMG) signal has been widely used in myoelectric control. Unfortunately, most of studies focused on the classification of EMG signals based on intact subjects. Due to the lack of study in amputee subject, this paper aims to investigate the performance of intact and amputee subject in discriminating multiple hand movements. In this work, Gabor transform (GT) was utilized to transform the EMG signal into time-frequency representation. Five features were extracted from each GT to reduce the dimensional while keeping the valuable information. Two popular classifiers namely k-nearest neighbor (KNN) and support vector machine (SVM) were employed for performance evaluation. The develop system was evaluated by using the 17 hand and wrist movements performed by 10 intact and 11 amputee subjects acquired from the publicy available NinaPro Database. The results indicated the combination of GT and SVM offered the best performance in the classification of EMG signals.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.9257
      Issue No: Vol. 17, No. 2 (2019)
  • Switchable Dual-band Bandpass Filter Based on Stepped Impedance Resonator
           with U-Shaped Defected Microstrip Structure for Wireless Applications

    • Authors: Mussa Mabrok, Zahriladha Zakaria, Yully Erwanti Masrukin, Tole Sutikno, A.R. Othman, Nurhasniza Edward
      Abstract: This paper presents a new technique in designing the switchable dual-band bandpass filter at 2.4 GHz and 3.5 GHz for WLAN and WiMAX applications. Wideband bandpass filter designed based on stepped impedance resonator at frequency of 3 GHz. To eliminate the interference from existing system that operates in the same frequency band, a defected microstrip structure applied and implemented to produce the notch response. In order to generate the switchable characteristic, the PIN diode was introduced at the dual-band filter. It exhibits that the measured results for switchable attributes when the diode is at OFF state, the wide passband is produced with the fractional bandwidth of 62.1 % centered at 2.9 GHz. Meanwhile, for the diode in ON state, the dual-passband has produced which centered at 2.5 GHz and 3.45 GHz. The experimental results showed good agreement with the simulation results. This structure is very useful for wireless communication systems and its applications.
      PubDate: 2019-04-01
      DOI: 10.12928/telkomnika.v17i2.11637
      Issue No: Vol. 17, No. 2 (2019)
  • Regression Test Selection Model: A Comparison between ReTSE and Pythia

    • Authors: Amir Ngah, Malcolm Munro, Zailani Abdullah, Masita A. Jalil, Mohammad Abdallah
      Abstract: As software systems change and evolve over time regression tests have to be run to validate these changes. Regression testing is an expensive but essential activity in software maintenance. This paper is purposely to compare a new regression test selection model called ReTSE with Pythia. The ReTSE model is developed using decomposition slicing in order to identify the relevant regression tests. Decomposition slicing provides a technique that is capable of identifying the unchanged parts of a system. Pythia is a regression test selection technique based on textual differencing. Both techniques is compare using a Power program taken from Vokolos and Frankl’s paper. The analysis of this comparison has shown promising results in reducing the number of tests to be run after changes are introduced.
      PubDate: 2018-11-08
      DOI: 10.12928/telkomnika.v17i2.10332
      Issue No: Vol. 17, No. 2 (2018)
  • K-Band Waveguide T-junction Diplexer For Satellite Communication

    • Authors: Setti Hicham
      Abstract: Design and measurement of two waveguide diplexers on H-plane T-junction, are presented. The two diplexers structures consist of a waveguide H-plane T-junction and two waveguide obtained cavity filters. The two diplexers operate in the same frequency bands (17GHz-19.5GHz). The simulation results show that over the operating band of two filters, the return losses are better than 18 dB and insertion losses are lower than 0.05 dB. The proposed diplexers have been simulated using Mician µWave Wizard simulator based on the mode matching method (MMM). The diplexers have been validated experimentally and results are presented. Simulated and measured results show good agreement.

      PubDate: 2018-10-30
      DOI: 10.12928/telkomnika.v17i2.9205
      Issue No: Vol. 17, No. 2 (2018)
  • Wireless Power Transfer using the Concept of Magnetic Coil Resonant System

    • Authors: Muhammad Fitra Zambak, Irvan irvan, Elvy Sahnur Nasution
      Abstract: The design of low power wireless power transfer is using the concept of Magnetic Coil Resonant System (MCRS). The concept of MCRS is function like an antenna to transfer the power from one point to another point. The project will show the efficiency of the wireless power transfer based on differences diameter of coil and also the distance between the transmitter and receiver coil.
      PubDate: 2018-09-28
      DOI: 10.12928/telkomnika.v17i2.8640
      Issue No: Vol. 17, No. 2 (2018)
  • 2FYSH: Two-Factor Authentication You Should Have for Password Replacement

    • Authors: Hargyo Tri Nugroho
      Abstract: Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH (“two factor you should have”) is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets.
      PubDate: 2018-08-25
      DOI: 10.12928/telkomnika.v17i2.9187
      Issue No: Vol. 17, No. 2 (2018)
  • The Role of Government in Influence Creative Economy and Economic Growth
           and its Impact on Power Buying Community

    • Authors: Dedeh Maryani, Rossy Lambelanova
      Abstract: The main capital in facing the era of globalization is the keatifitas. To create a distinctive added value, there is a need for a positive economic performance. This research was conducted to find out whether the West Java provincial government has implemented the development of creative economy, by looking at the form of policy and budget support in APBD and the problem. The results show, West Java Provincial Government has made regional regulations and creative economic blueprints. It is suggested to be more committed to facilitate the marketing of results, facilitate business actors' access to banking, protection of intellectual property rights, and enhancement of cooperation between provinces and districts/municipalities for the sustainability of necessary raw materials.
      PubDate: 2018-08-24
      DOI: 10.12928/telkomnika.v17i2.9711
      Issue No: Vol. 17, No. 2 (2018)
  • A Preliminary Study on The Development Rapid Method to Classify Protein
           Content of Wheat Flour using Bioelectrical Properties and Artificial
           Neural Network

    • Authors: Sucipto Sucipto, Maffudhotul Anna, Muhammad Arwani, Yusuf Hendrawan
      Abstract: A conventional technique of protein analysis is laborious and costly. One rapid method used to estimate protein content is near infrared spectroscopy (NIRS), but the cost is relatively expensive. Therefore, it is necessary to find a cheaper alternative measurement such as measuring the bioelectrical properties. This preliminary study is a new rapid method for classified modelling of wheat flour protein content based on the bioelectrical properties. An artificial neural network (ANN) was developed to classify the protein content of wheat flour. ANN input were bioelectrical properties, namely capacitance and resistance and output was type of the flour, namely hard, medium and soft flour. The result showed that ANN model can classify the various type of flour. The best ANN model produce a mean square error (MSE) and regression correlation (R) of 0.0399 and 0.97743 respectively. This ANN model could classify the protein content of wheat flour based on the bioelectrical properties and have a potential to be used as basic of instrument to estimate the protein content.
      PubDate: 2018-08-20
      DOI: 10.12928/telkomnika.v17i2.9450
      Issue No: Vol. 17, No. 2 (2018)
  • Information Technology Investment Analysis of Hospitality Using
           Information Economics Approach

    • Authors: Eva Novianti, Ahmad Nurul Fajar
      Abstract: This study aims to determine the feasibility of IT investment in hospitality and determine the value and tangible/ intangible benefits from IT implementation. Problem arises from high investment without knowing the real impact and future investment to IT development. The scope of this research is information technology investment in 5 star hotel in Jakarta. The data were collected by distributing questionnaires to the research samples, are Grand Hyatt Hotel, Mandarin Oriental Hotel and Ayana Midplaza Hotel Jakarta. The analysis uses the information economics (IE) approach that combines financially and non-financial calculations to determine the feasibility of IT investment and the benefits of IT for 5-star hotels in Jakarta. From the analysis result, it can be concluded that 5 star hotel in Jakarta is feasible to make IT investment with ROI score more than 1 and scorecard value 28 which shows that IT investment in 5 star hotel is quite beneficial for hotel business process.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.7247
      Issue No: Vol. 17, No. 2 (2018)
  • The Classification of Type Cell Blast On Acute Myeloid Leukemia (AML)
           Based on Image Morphology of White Blood Cell

    • Authors: wiharto wiharto, Esti Suryani, Yuda Rizki Putra
      Abstract: Acute Myeloid Leukemia is one type of cancer of the blood and spinal cord. AML has a number of subtypes including M0 and M1. Both subtypes are distinguished by the dominant blast cell type in the WBC, the myeloblast cells, promyelocyte and myelocyte. This makes the diagnosis process of leukemia subtype requires identification of blast cells in WBC. Automatic blast cell identification is widely developed but is constrained by lack of data availability, and uneven distribution for each type of blast cell. This makes the system developed has poor performance. This study aims to classify blast cell types in WBC identified AML-M0 and AML-M1. The method used is divided into two stages, first preprocessing, image segmentation and feature extraction. The second stage, perform resample, which is continued oversampling with SMOTE. The process is done until the amount of data obtained is relatively the same for each blast cell, then the process of elimination of data duplication, randomize, classification and performance measurement. The validation method used is k-fold cross-validation with k=10. Performance parameters used are sensitivity, specificity, accuracy and AUC. The average performance resulting from classification of cell types in AML with Random Forest algorithm obtained 82.9% sensitivity, 92.1% specificity, 89.6% accuracy and 87.5% AUC. These results indicate a significant improvement compared to the system model without using SMOTE. The performance generated by reference to the AUC value, the proposed system model belongs to either category, so it can be used for further stages of leukemia subtype AML-M0 and AML-M1.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.8666
      Issue No: Vol. 17, No. 2 (2018)
  • Image Forgery Detection Using Error Level Analysis And Deep Learning

    • Authors: idabagus kresna sudiatmika
      Abstract:  Many images are spread in the virtual world of social media. With the many editing software that allows so there is no doubt that many forgery image. By forensic the image using Error Level Analysis to find out the compression ratio between the original image and the fake image, because the original image compression and fake images are different. In addition to knowing whether the image is genuine or fake can analyze the metadata of the image, but the possibility of metadata can be changed. In this case the authors apply Deep Learning to recognize images of manipulations through dataset of fake image and original images via Error Level Analysis on each image and supporting parameters for error rate analysis.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.8976
      Issue No: Vol. 17, No. 2 (2018)
  • Information Sharing System in Supply Chain With Pull System

    • Authors: Teguh Andriyanto, Ary Permatadeny Nevita
      Abstract: Uncertainty of goods inventory often triggers the occurrence of Bullwhip Effect, where there is accumulation of goods on a stage or lack of goods at another stage in the supply chain. Bullwhip Effect is caused by an error in ordering the amount of goods, error in the time of ordering or delivery of goods The problem can be solved using information sharing. Pull system inventory management in this research utilizing information sharing between two retailers and one distributors used for the ordering process of goods. The process of ordering goods retailers to distributors is done automatically based on sales data retailers. The order quantity is calculated based on the final stock and the maximum stock value of the goods. The automated purchasing order system uses applications ie php programming language, MySQL database, Nginx and Apache web server as well as Linux and Windows operating system.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.9948
      Issue No: Vol. 17, No. 2 (2018)
  • Technology Acceptance Model to Test GO-JEK Acceptance in Salatiga

    • Authors: Dhea Arvie, Andeka Rocky Tanaamah
      Abstract: GO-JEK finally establishes its ride-hailing service area in Salatiga, which brings up negative reactions such as protests from conventional transportation drivers in front of Salatiga Mayor’s office. Despite the online and conventional drivers dispute, GO-JEK does not retreat from Salatiga and recruits even more drivers. GO-JEK still offers its ride-hailing service and the recruited drivers number keeps growing. This study aims to determine the factors that influence GO-JEK resilience. The data were obtained from field observation, revealing the rising number of drivers as the major factor of GO-JEK resilience in Salatiga. Later on, Technology Acceptance Model was used to disclose the factors that influenced the increasing number of recruited drivers, which contributes to GO-JEK continuity in Salatiga. The results uncover that GO-JEK acceptance in Salatiga among the drivers were not only affected by trends and environmental changes, but also technological supports, external policies, market shares, and market rivalry.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.9634
      Issue No: Vol. 17, No. 2 (2018)
  • Autonomous Collaborative Decentralized-Community Networks for Security-and
           Privacy-Critical Domains

    • Authors: Heerok Banerjee, S Murugaanandam, Dr Vellappa Ganapathy
      Abstract: A key factor limiting the democratisation of networked systems is lack of trust, particularly in the wake of data-intensive applications that work on sensitive private data which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms and application design to compute on the network peripheries without moving data. In many security- and privacy-critical domains such as Home Automation IoT networks the existence of a centralised privileged node leads to an easy vulnerability for leakage of sensitive information. In this paper, we proposed a decentralised community oriented network architecture that performs within the spectrum of network reliability and performance. In such decentralised schemes, dynamically adapting the network topology and employing distributed resource management is key to achieve efficiency while being robust against load variations and malicious agents. We also investigated the design and sustainability of fully autonomous networked systems by adopting machine learning techniques and evaluated the efficiency of the scheme with the help of extensive simulations tools. We used omnet++ to conduct the simulation and GNU octave to plot the results.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.9621
      Issue No: Vol. 17, No. 2 (2018)
  • Electromagnetic Interference Shielding in Unmanned Aerial Vehicle Against
           Lightning Strike

    • Authors: Diah Permata, Menachem C. Gurning, Yul Martin, Henry B.H. Sitorus, Mona Arif Muda, Herman H. Sinaga
      Abstract: Electromagnetic interference (EMI) due to lightning strike in Unmanned Aerial Vehicle (UAV) became a critical issue, since it could cause a severe damaged to electronic equipment which was installed in UAV. This paper proposed a method to reduce EMI by creating shield over the body of UAV with aluminium foil with thickness 0.15 mm. A lightning impulse-voltage standard generated by impulse generator was delivered to the high voltage (HV) electrode at a particular distance from UAV. Indirect effect of lightning strike was investigated by measuring induced voltage inside the compartment of UAV fuselage during flashover between the HV electrode and UAV. Flashover between the HV electrode and UAV simulated the lightning strike. The result showed that the highest voltage only 1V at UAV compartment when 150kV impulse voltage supplied to the electrode with striking area on the wing. The measured voltage was far below 100V as the insulation level of low voltage equipment inside UAV. Although the direct effect of lightning has created a burning hole on the surface aluminium foil with thickness 0.15 mm, the effect was overcome by increasing the thickness to 0.3 mm. The application of aluminium foil over the surface of UAV repelled the electromagnetic interference which acted as a Faraday cage. The shielding method was successfully reduced the effect of EMI.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.9029
      Issue No: Vol. 17, No. 2 (2018)
  • Coordination of Blade Pitch Controller and BES using Firefly Algorithm for
           Frequency Stabilization in Wind Power System

    • Authors: Teguh Aryo Nugroho, Rahmat Septian Wijanarko, Herlambang Setiadi
      Abstract: Utilization of renewable energy sources (RESs) to generated electricity is increasing significantly in recent years due to global warming situation all over the world. Among RESs type, wind energy is becoming more favorable due to the sustainable and environmentally friendly characteristic. Although wind power system provides a promising solution to prevent the global warming, they also contribute instability on the power system, especially in frequency stability due to uncertainty characteristic of the sources (wind speed). Hence, coordinated controller between blade pitch controller and battery energy storage (BES) system to enhance the frequency performance of wind power system is proposed in this work. Firefly algorithm (FA) is used as optimization method for achieving better coordination. From the investigated test systems, the frequency performance of wind power system can be increase by applying the proposed method.
      PubDate: 2018-08-17
      DOI: 10.12928/telkomnika.v17i2.9162
      Issue No: Vol. 17, No. 2 (2018)
  • Detection of Immovable Objects on Visually Impaired People Walking Aids

    • Authors: Abdurrasyid Abdurrasyid, Indrianto Indrianto, Rakhmat Arianto
      Abstract: One consequence of a visually impaired (blind) person is a lack of ability in the activities related to the orientation and mobility. In general, blind person uses a stick as a tool to know the objects that surround him/her and expertise and structured training are needed to use it. An attached camera will obtain an image of an object which then processed using template matching method to identify and trace the image of the object. After getting the image of the object, furthermore calculate and compare it with the data training. The output is produced in the form of sound that in accordance with the object. The expected result from this research is an implementation of the template matching method on silent object detection camera model as a tool for blind person which is able to recognize what object in front of him/her when he/she is walking
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9933
      Issue No: Vol. 17, No. 2 (2018)
  • Analysis and Design of Feature Application Setting Dashboard on Svara
           Applications Using Ucd Method (User-Centred Design) at PT. Zamrud
           Khatulistiwa Technology

    • Authors: Muhammad Yusril Helmi Setyawan, Rolly Maulana Awangga, Rezka Afriyanti
      Abstract: SVARA application is a strategy developed by PT. Zamrud Khatulistiwa Technology. The backend side of the SVARA application is a vital part of a good reference by PT. Zamrud Khatulistiwa Technology. One of the features of the SVARA application dashboard is the application setting feature. Dashboard backend of SVARA application on App Settings feature is a dashboard that serves to manage the display of content and other basic settings. Currently, the dashboard on the SVARA application backend is still simple by taking the API with a regular PHP script. The design of this system is with UML modeling. The method used is the UCD (User Centered Design) method which will apply to the SVARA Dashboard Application Setting feature. In this research, the researcher produces the design of Application Setting feature and how the process of applying UCD Method on SVARA Application Setting feature dashboard.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.8762
      Issue No: Vol. 17, No. 2 (2018)
  • Number Plate Recognition Letters Used Vehicle Area Feature Extraction

    • Authors: Fitri Damayanti, Sri Herawati, Imamah Imamah, Fifin Ayu M, Aeri Rachmad
      Abstract: The main principle of the character recognition of vehicle number plate is to recognize the character of the license plate of the vehicle which is the identity of the vehicle. One of the benefits of this research is the introduction of vehicle license plate characters to be implemented on automatic toll payments. With the shape of the vehicle number plate is divided into 2 lines and each line there is an object or character is a problem in the process of recognition. In this study the authors make different approaches in detection of vehicle license plate characters by utilizing the area and the ratio of the characters. K-Nearest Neighbor (KNN) is selected as a method of classification and feature area extraction as a method of extracting image feature values in the introduction of vehicle license plate characters. The best accuracy is 92.72% on 10x10 area features with K-1 and 89.36% on 20x20 area features with K-5. The system runs with relatively fast computing time.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9017
      Issue No: Vol. 17, No. 2 (2018)
  • Recognition Facial Expression of 3d Image-based Using Facial Action Coding
           System (FACS)

    • Authors: Hardianto Wibowo, Fachrunnisa Firdausi, Wildan Suharso, Wahyu Andhyka Kusuma, Dani Harmanto
      Abstract: Facial expression or mimic is one of the results of muscle motion on the face. In a large Indonesian dictionary, the expression is a disclosure or process of declaring,
      i.e. showing or expressing intentions, ideas of feelings and so on. Facial expression is
      affected by the cranial nerve VII or Nervus Facialis. In research conducted Paul Ekman got a standardization of expression in the format of a movement called the Facial Action Coding System (FACS). In his research, Paul Ekman said six basic expressions of happiness, sadness, shock, fear, anger, and disgust [5]. In muscle anatomy, that every moving muscle must be contraction, and in the event of contraction, the muscle will expand or swell [3]. Muscles are divided into three parts of origo and insersio as the tip of muscle and belli as the midpoint of the muscle, so any movement occurs then the muscle part belli will expand or swell. Data retrieval technique that is by recording data in 3D, any contraction occurs then the belli part of the muscle will swell and this data will be processed and compared. From this data processing will be obtained the maximum strength of contraction that will be used as a reference for the magnitude of expression made by the model. In the detection of expression is ecluidience distance by comparing the initial data with movement data. The result of this research is a detection of expression and the amount of expression that occurs.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9304
      Issue No: Vol. 17, No. 2 (2018)
  • Classification of Breast Cancer Grade Using Combination of Physical
           Parameters by K-Nearest Neighbor Method

    • Authors: anak agung ngurah gunawan, S. Poniman, I Wayan Supardi
      Abstract: Breast cancer is a health problem in the world. To overcome this problem required early detection of breast cancer. The purpose of this study was to classify early breast cancer grade. Combination of physics parameters with K_Nearest Neighbor Method is proposed to detect early breast cancer grade. The experiments were performed on 87 mammograms consisting of 12 mammograms of grade 1, 41 mammograms of grade 2 and 34 mammogram of grade 3. The proposed method was effective to classify the grade of breast cancer by an accuracy of 64.36, 50 sensitivity and 73,5% specitifity. Physics parameters can be used to classify grade of breast cancer. The results of this study can be used as a complement to the diagnosis of breast mammography examination.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9797
      Issue No: Vol. 17, No. 2 (2018)
  • Usability of BLESS-implemented Class Room: A case study of Mixtio

    • Authors: Desita Mustikaningrum, Raziv Herman Diputra, Astari Retnowardhani
      Abstract: Conventional learning system and e-learning have their own strengths and weaknesses. To combine both systems, blended learning is created. However, the researches on e-learning and blended learning focus more on e-content and technology application than on their learning process. Even, the development of blended learning system mostly based on intuition not on a particular framework. Faculty of Informatics Engineering at XYZ University use conventional learning method.  In the aim to improve the class’ usability then this study propose to apply BLESS into blended learning system design called Mixtio. BLESS (Blended Learning Systems Structure) is offered as framework which matches to learning and uses top-down approach. BLESS framework consist of five layers design, started from blended learning course, course scenarios, blended learning patterns, web template, and learning platform. In the end of this study it can be seen the implementation of BLESS can improve system usability of Mixtio.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.8999
      Issue No: Vol. 17, No. 2 (2018)
  • A High Efficiency BPSK Receiver for Short Range Wireless Network

    • Authors: Mousa Yousefi, khalil Monfaredi
      Abstract: In this paper, a 910MHz high efficiency BPSK Receiver is presented with Colpitts oscillator for Short Range Wireless Network. In this research, with injection-lock technique and using Colpitts oscillator, the efficiency of receiver has been improved. And also, behavior of an oscillator under injection of another signal has been investigated. Also, variation of output signal amplitude versus injected signal phase variation, the effect of varying the amplitude of injected signal and quality factor of the oscillator has been investigated. The designed receiver has 0.474 mW dc power and -60 dBm sensitivity. Data rate of receiver is 5 Mbps. The FOM of receiver is 94 pJ/bit. This receiver was designed and simulated in 0.18 µm RFCMOS technology. This proposed receiver can be used in short range wireless network for example, Wireless Body array network and wireless sensor network.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.8616
      Issue No: Vol. 17, No. 2 (2018)
  • Development of the Internet of Things at Hydroponic System Using Raspberry

    • Authors: Rony Baskoro Lukito, Cahya Lukito
      Abstract: Hidroponik adalah salah satu teknologi bercocok tanam dengan menggunakan media air untuk pemenuhan kebutuhan nutrisi tanaman. Pemanfaatan air dalam sistem hidroponik lebih effisien dibandingan dengan sistem bercocok tanam dengan menggunakan media tanah. Air yang telah dicampur dengan nutrisi mineral yang dibutuhkan oleh tanaman dialirkan secara terus menerus ke akar-akar tanaman. Keuntungan lain dari methode ini adalah sangat cocok untuk diterapkan dalam lahan yang terbatas seperti lingkungan rumah perkotaan, yaitu dengan memanfaatkan ruangan yang ada di dalam rumah. Dalam kegiatan sehari-hari warga perkotaan banyak menghabiskan waktunya di luar rumah untuk bekerja, bersekolah, berbelanja dan aktifitas lainya. Dengan demikian pengamatan sistem hidroponik dari jarak jauh menjadi penting untuk bisa dilakukan dari manapun. Ketersediaan, suhu, dan PH air adalah beberapa faktor dalam sistem hidroponik yang perlu diamati secara berkala untuk menentukan tindakan yang tepat. Permasalahan ini dapat diselesaikan dengan mengembangkan teknologi Internet of Things pada sistem hidroponik agar fungsi pengamatan dapat dilakukan dari jarak jauh dan dilaporkan secara langsung melalui jaringan internet.  
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9265
      Issue No: Vol. 17, No. 2 (2018)
  • Fabrication of pH Sensor Based on Fiber Optic Coated Bromophenol Blue and
           Cresol Red Simultaneously

    • Authors: Fredy Kurniawan, Baginda Zulkarnain, Mohammad Teguh Hermanto, Hendro Juwono, Muhammad Rivai
      Abstract: Fabrication of pH sensor based on fiber optic coated bromophenol blue and cresol red has been done. Briefly, jacket in the middle part of the fiber optic was removed for 5 cm. Then the core of each of fiber optics was washed in ethanol. Nitric acid, demineralized water, and ethanol again consecutively. Then the cleaned core was coated using active material using sol-gel immobilization technique. Bromophenol blue will start change the color to yellow at below pH 3.0 and blue at above pH 4.6, while the cresol red will start change the color to yellow at below pH 7.2 and violet at above pH 8.8. The pH sensors which have been made show the sigmoidal response over pH from 1.0 to 11.0.
      PubDate: 2018-08-10
      DOI: 10.12928/telkomnika.v17i2.9993
      Issue No: Vol. 17, No. 2 (2018)
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-