for Journals by Title or ISSN
for Articles by Keywords
help

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

       | Last   [Sort by number of followers]   [Restore default list]

  Subjects -> ELECTRONICS (Total: 175 journals)
Showing 1 - 200 of 277 Journals sorted alphabetically
Acta Electronica Malaysia     Open Access  
Advances in Biosensors and Bioelectronics     Open Access   (Followers: 7)
Advances in Electrical and Electronic Engineering     Open Access   (Followers: 5)
Advances in Electronics     Open Access   (Followers: 76)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 8)
Advances in Microelectronic Engineering     Open Access   (Followers: 13)
Advances in Power Electronics     Open Access   (Followers: 33)
Advancing Microelectronics     Hybrid Journal  
Aerospace and Electronic Systems, IEEE Transactions on     Hybrid Journal   (Followers: 305)
American Journal of Electrical and Electronic Engineering     Open Access   (Followers: 24)
Annals of Telecommunications     Hybrid Journal   (Followers: 9)
APSIPA Transactions on Signal and Information Processing     Open Access   (Followers: 9)
Archives of Electrical Engineering     Open Access   (Followers: 13)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 8)
Bell Labs Technical Journal     Hybrid Journal   (Followers: 28)
Bioelectronics in Medicine     Hybrid Journal  
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 19)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 35)
Biomedical Instrumentation & Technology     Hybrid Journal   (Followers: 6)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 12)
BULLETIN of National Technical University of Ukraine. Series RADIOTECHNIQUE. RADIOAPPARATUS BUILDING     Open Access   (Followers: 1)
Bulletin of the Polish Academy of Sciences : Technical Sciences     Open Access   (Followers: 1)
Canadian Journal of Remote Sensing     Full-text available via subscription   (Followers: 44)
China Communications     Full-text available via subscription   (Followers: 8)
Chinese Journal of Electronics     Hybrid Journal  
Circuits and Systems     Open Access   (Followers: 15)
Consumer Electronics Times     Open Access   (Followers: 5)
Control Systems     Hybrid Journal   (Followers: 253)
Edu Elektrika Journal     Open Access   (Followers: 1)
Electrica     Open Access  
Electronic Design     Partially Free   (Followers: 104)
Electronic Markets     Hybrid Journal   (Followers: 7)
Electronic Materials Letters     Hybrid Journal   (Followers: 4)
Electronics     Open Access   (Followers: 85)
Electronics and Communications in Japan     Hybrid Journal   (Followers: 10)
Electronics For You     Partially Free   (Followers: 91)
Electronics Letters     Hybrid Journal   (Followers: 26)
Elkha : Jurnal Teknik Elektro     Open Access  
Embedded Systems Letters, IEEE     Hybrid Journal   (Followers: 50)
Energy Harvesting and Systems     Hybrid Journal   (Followers: 4)
Energy Storage Materials     Full-text available via subscription   (Followers: 2)
EPJ Quantum Technology     Open Access  
EURASIP Journal on Embedded Systems     Open Access   (Followers: 11)
Facta Universitatis, Series : Electronics and Energetics     Open Access  
Foundations and Trends® in Communications and Information Theory     Full-text available via subscription   (Followers: 6)
Foundations and Trends® in Signal Processing     Full-text available via subscription   (Followers: 10)
Frequenz     Hybrid Journal   (Followers: 1)
Frontiers of Optoelectronics     Hybrid Journal   (Followers: 1)
Geoscience and Remote Sensing, IEEE Transactions on     Hybrid Journal   (Followers: 185)
Haptics, IEEE Transactions on     Hybrid Journal   (Followers: 4)
IACR Transactions on Symmetric Cryptology     Open Access  
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 96)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 77)
IEEE Journal of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 46)
IEEE Journal of the Electron Devices Society     Open Access   (Followers: 9)
IEEE Journal on Exploratory Solid-State Computational Devices and Circuits     Hybrid Journal   (Followers: 1)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 65)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 69)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 55)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 19)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 39)
IEEE Transactions on Electron Devices     Hybrid Journal   (Followers: 19)
IEEE Transactions on Information Theory     Hybrid Journal   (Followers: 26)
IEEE Transactions on Power Electronics     Hybrid Journal   (Followers: 70)
IEEE Transactions on Signal and Information Processing over Networks     Full-text available via subscription   (Followers: 11)
IEICE - Transactions on Electronics     Full-text available via subscription   (Followers: 12)
IEICE - Transactions on Information and Systems     Full-text available via subscription   (Followers: 5)
IET Cyber-Physical Systems : Theory & Applications     Open Access   (Followers: 1)
IET Microwaves, Antennas & Propagation     Hybrid Journal   (Followers: 35)
IET Nanodielectrics     Open Access  
IET Power Electronics     Hybrid Journal   (Followers: 45)
IET Smart Grid     Open Access  
IET Wireless Sensor Systems     Hybrid Journal   (Followers: 18)
IETE Journal of Education     Open Access   (Followers: 4)
IETE Journal of Research     Open Access   (Followers: 11)
IETE Technical Review     Open Access   (Followers: 13)
IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)     Open Access   (Followers: 3)
Industrial Electronics, IEEE Transactions on     Hybrid Journal   (Followers: 57)
Industry Applications, IEEE Transactions on     Hybrid Journal   (Followers: 24)
Informatik-Spektrum     Hybrid Journal   (Followers: 2)
Instabilities in Silicon Devices     Full-text available via subscription   (Followers: 1)
Intelligent Transportation Systems Magazine, IEEE     Full-text available via subscription   (Followers: 12)
International Journal of Advanced Research in Computer Science and Electronics Engineering     Open Access   (Followers: 18)
International Journal of Advances in Telecommunications, Electrotechnics, Signals and Systems     Open Access   (Followers: 10)
International Journal of Antennas and Propagation     Open Access   (Followers: 11)
International Journal of Applied Electronics in Physics & Robotics     Open Access   (Followers: 5)
International Journal of Computational Vision and Robotics     Hybrid Journal   (Followers: 6)
International Journal of Control     Hybrid Journal   (Followers: 12)
International Journal of Electronics     Hybrid Journal   (Followers: 7)
International Journal of Electronics and Telecommunications     Open Access   (Followers: 13)
International Journal of Granular Computing, Rough Sets and Intelligent Systems     Hybrid Journal   (Followers: 2)
International Journal of High Speed Electronics and Systems     Hybrid Journal  
International Journal of Image, Graphics and Signal Processing     Open Access   (Followers: 14)
International Journal of Microwave and Wireless Technologies     Hybrid Journal   (Followers: 8)
International Journal of Nano Devices, Sensors and Systems     Open Access   (Followers: 12)
International Journal of Nanoscience     Hybrid Journal   (Followers: 1)
International Journal of Numerical Modelling: Electronic Networks, Devices and Fields     Hybrid Journal   (Followers: 4)
International Journal of Power Electronics     Hybrid Journal   (Followers: 24)
International Journal of Review in Electronics & Communication Engineering     Open Access   (Followers: 4)
International Journal of Sensors, Wireless Communications and Control     Hybrid Journal   (Followers: 10)
International Journal of Systems, Control and Communications     Hybrid Journal   (Followers: 4)
International Journal of Wireless and Microwave Technologies     Open Access   (Followers: 6)
International Transaction of Electrical and Computer Engineers System     Open Access   (Followers: 2)
JAREE (Journal on Advanced Research in Electrical Engineering)     Open Access  
Journal of Biosensors & Bioelectronics     Open Access   (Followers: 3)
Journal of Advanced Dielectrics     Open Access   (Followers: 1)
Journal of Artificial Intelligence     Open Access   (Followers: 10)
Journal of Circuits, Systems, and Computers     Hybrid Journal   (Followers: 4)
Journal of Computational Intelligence and Electronic Systems     Full-text available via subscription   (Followers: 1)
Journal of Electrical and Electronics Engineering Research     Open Access   (Followers: 23)
Journal of Electrical Bioimpedance     Open Access   (Followers: 2)
Journal of Electrical Engineering & Electronic Technology     Hybrid Journal   (Followers: 7)
Journal of Electrical, Electronics and Informatics     Open Access  
Journal of Electromagnetic Analysis and Applications     Open Access   (Followers: 7)
Journal of Electromagnetic Waves and Applications     Hybrid Journal   (Followers: 8)
Journal of Electronic Design Technology     Full-text available via subscription   (Followers: 6)
Journal of Electronics (China)     Hybrid Journal   (Followers: 4)
Journal of Energy Storage     Full-text available via subscription   (Followers: 4)
Journal of Field Robotics     Hybrid Journal   (Followers: 2)
Journal of Guidance, Control, and Dynamics     Hybrid Journal   (Followers: 162)
Journal of Information and Telecommunication     Open Access   (Followers: 1)
Journal of Intelligent Procedures in Electrical Technology     Open Access   (Followers: 3)
Journal of Low Power Electronics     Full-text available via subscription   (Followers: 7)
Journal of Low Power Electronics and Applications     Open Access   (Followers: 9)
Journal of Microelectronics and Electronic Packaging     Hybrid Journal  
Journal of Microwave Power and Electromagnetic Energy     Hybrid Journal  
Journal of Microwaves, Optoelectronics and Electromagnetic Applications     Open Access   (Followers: 10)
Journal of Nuclear Cardiology     Hybrid Journal  
Journal of Optoelectronics Engineering     Open Access   (Followers: 4)
Journal of Physics B: Atomic, Molecular and Optical Physics     Hybrid Journal   (Followers: 28)
Journal of Power Electronics & Power Systems     Full-text available via subscription   (Followers: 11)
Journal of Semiconductors     Full-text available via subscription   (Followers: 5)
Journal of Sensors     Open Access   (Followers: 26)
Journal of Signal and Information Processing     Open Access   (Followers: 9)
Jurnal Rekayasa Elektrika     Open Access  
Jurnal Teknik Elektro     Open Access  
Kinetik : Game Technology, Information System, Computer Network, Computing, Electronics, and Control     Open Access  
Learning Technologies, IEEE Transactions on     Hybrid Journal   (Followers: 12)
Magnetics Letters, IEEE     Hybrid Journal   (Followers: 7)
Majalah Ilmiah Teknologi Elektro : Journal of Electrical Technology     Open Access   (Followers: 2)
Metrology and Measurement Systems     Open Access   (Followers: 5)
Microelectronics and Solid State Electronics     Open Access   (Followers: 18)
Nanotechnology Magazine, IEEE     Full-text available via subscription   (Followers: 33)
Nanotechnology, Science and Applications     Open Access   (Followers: 6)
Nature Electronics     Hybrid Journal  
Networks: an International Journal     Hybrid Journal   (Followers: 6)
Open Journal of Antennas and Propagation     Open Access   (Followers: 8)
Optical Communications and Networking, IEEE/OSA Journal of     Full-text available via subscription   (Followers: 15)
Paladyn. Journal of Behavioral Robotics     Open Access   (Followers: 1)
Power Electronics and Drives     Open Access   (Followers: 1)
Problemy Peredachi Informatsii     Full-text available via subscription  
Progress in Quantum Electronics     Full-text available via subscription   (Followers: 7)
Pulse     Full-text available via subscription   (Followers: 5)
Radiophysics and Quantum Electronics     Hybrid Journal   (Followers: 2)
Recent Advances in Communications and Networking Technology     Hybrid Journal   (Followers: 3)
Recent Advances in Electrical & Electronic Engineering     Hybrid Journal   (Followers: 9)
Research & Reviews : Journal of Embedded System & Applications     Full-text available via subscription   (Followers: 5)
Security and Communication Networks     Hybrid Journal   (Followers: 2)
Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal of     Hybrid Journal   (Followers: 53)
Semiconductors and Semimetals     Full-text available via subscription   (Followers: 1)
Sensing and Imaging : An International Journal     Hybrid Journal   (Followers: 2)
Services Computing, IEEE Transactions on     Hybrid Journal   (Followers: 4)
Software Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 75)
Solid-State Circuits Magazine, IEEE     Hybrid Journal   (Followers: 13)
Solid-State Electronics     Hybrid Journal   (Followers: 9)
Superconductor Science and Technology     Hybrid Journal   (Followers: 2)
Synthesis Lectures on Power Electronics     Full-text available via subscription   (Followers: 3)
Technical Report Electronics and Computer Engineering     Open Access  
TELE     Open Access  
Telematique     Open Access  
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)     Open Access   (Followers: 8)
Universal Journal of Electrical and Electronic Engineering     Open Access   (Followers: 6)
Visión Electrónica : algo más que un estado sólido     Open Access   (Followers: 1)
Wireless and Mobile Technologies     Open Access   (Followers: 6)
Wireless Power Transfer     Full-text available via subscription   (Followers: 4)
Women in Engineering Magazine, IEEE     Full-text available via subscription   (Followers: 11)
Електротехніка і Електромеханіка     Open Access  

       | Last   [Sort by number of followers]   [Restore default list]

Journal Cover
TELKOMNIKA (Telecommunication, Computing, Electronics and Control)
Journal Prestige (SJR): 0.265
Citation Impact (citeScore): 1
Number of Followers: 8  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1693-6930 - ISSN (Online) 2302-9293
Published by Universitas Ahmad Dahlan Homepage  [18 journals]
  • Healthcare Receivers’ Acceptance of Telecardiology in Malaysia

    • Authors: Kee Jiar Yeo, Rania Hussien Ahmed Al-Ashwal, Lina Handayani, Shih Hui Shih Lee
      Abstract: This quantitative study investigates acceptance towards implementation of telecardiology in Malaysia. The purpose of this study is to explore and understand the potential factors that could be key elements in cultivating positive behaviour towards telecardiology adoption in Malaysia. Data was gathered by using survey method from 149 patients and publics who use internet service in their daily lives. The questionnaire was developed by integrating Technology Readiness Index (TRI), Technology Acceptance Model (TAM) and Theory of Planned Behaviour (TPB) which consists of 42 items. Descriptive statistics, exploratory analysis and one-way ANOVA were conducted to analyse the data. The analysis reveals that Malaysians generally hold a positive perception towards implementation of telecardiology with some reservations. Besides that, gender and income of the respondents were found to influence the variables in telecardiology readiness, hence suggesting these two variables be taken into considerations in the adoption of telecardiology. It is our hope that the result of this study provide some useful information for the policy makers and implementers to develop effective implementation strategies that could reduce users’ resistance and adoption barriers in telecardiology adoption.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12212
      Issue No: Vol. 17, No. 3 (2019)
       
  • Outage Probability Based on Telecommunication Range for Multi-hop HALE
           UAVs

    • Authors: mohammadreza tarihi
      Abstract: Cooperative relaying extends the range, improves the connectivity, and increases the reliability of data transmission; however, the transmitted power does not change. This paper analyzes the extended range of a multi-hop cascaded network comprising N–cooperative relaying high-altitude long endurance (HALE) unmanned aerial vehicles (UAVs) under ambient conditions.  A notable ambient condition is rain, which causes signals to scatter in different directions; hence, one should model the communication channel for HALE UAV as a Rayleigh channel. This paper proposes a statistical model that is based on the effect of the telecommunication range on the outage probability in an N-Rayleigh fading channel. The simulation results show that as the telecommunication range increases, the outage probability (Poutage) also increases, whereas when both the communication range and the number of relays increase, Poutage decreases. An issue that has been highlighted in this paper is that, by increasing number of relays from N=1 to N=5 the telecommunication range increases and Poutage about 40% decreases. Moreover, in rainy conditions and with a fixed number of relays, when both the intensity of rainfall and telecommunication range increases, Poutage increases. For example by increasing rate of rain (Rr) from 1mm/h to 100 mm/h, Poutage increases around 30% in 100 Km with two relays.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10782
      Issue No: Vol. 17, No. 3 (2019)
       
  • Approximated compunting for low power Neural Networks

    • Authors: Gian Carlo Cardarilli, Luca Di Nunzio, Rocco Fazzolari, Daniele Giardino, Marco Matta, Mario Patetta, Marco Re, Sergio Spanò
      Abstract: This paper investigates about the possibility to reduce power consumption in Neural Network using approximated computing techniques.
      Authors compare a traditional fixed-point neuron with an approximated neuron composed of approximated multipliers and adder. Experiments show that in the proposed case of study (a wine classifier) the approximated neuron allows to save up to the 43% of the area, a power consumption saving of 35% and an improvement in the maximum clock frequency of 20%
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12409
      Issue No: Vol. 17, No. 3 (2019)
       
  • Two-Port Network Model of Fixed-Speed Wind Turbine Generator for
           Distribution System Load Flow Analysis

    • Authors: Rudy Gianto, Kho Hie Khwee, Hendro Priyatman, Managam Rajagukguk
      Abstract: Load flow analysis has always been used in determining the steady-state operation of an electric power or distribution system. For conventional power system without wind turbine generator, the method for load flow analysis has been well established. However, for modern power system embedded with wind turbine generator, the investigation of analysis method is still an active research area. This paper proposed a new method to integrate fixed-speed wind turbine generator into distribution load flow analysis. The proposed method is derived based on two-port network theory where the parameters of induction generator of the wind turbine generator are embedded in general constants of the two-port network. The proposed method has been tested and verified using a representative electric distribution system.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11866
      Issue No: Vol. 17, No. 3 (2019)
       
  • Authentication Techniques in Smart Grids: A Systematic Review

    • Authors: Malik Qasaimeh, Rawan Turab, Raad S Al-Qassas
      Abstract: Smart Grid (SG) provides enhancement to existing grids with two-way communication between the utility, sensors, and consumers, by deploying smart sensors to monitor and manage power consumption. However due to the vulnerability of SG, secure component authenticity necessitates robust authentication approaches relative to limited resource availability (i.e. in terms of memory and computational power). SG communication entails optimum efficiency of authentication approaches to avoid any extraneous burden. This systematic review analyses 27 papers on SG authentication techniques and their effectiveness in mitigating certain attacks. This provides a basis for the design and use of optimized SG authentication approaches
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11437
      Issue No: Vol. 17, No. 3 (2019)
       
  • Optimization of Steganography in FLV Files Using ‘Injected at End of All
           Video Tags’ Method with Additional Compression and Encryption

    • Authors: Endi Sailul Haq
      Abstract: The steganography process on FLV often encounters constraints due to large stego file capacity. This makes it difficult to embed into video files with a small capacity and makes it easy for others to extract stego files. The capacity of large stego files can be minimized by compressing them using the Huffman compression method. And extraction of stego files by others can be avoided by encrypting such files using the AES encryption method. The compressed and encrypted stego files can then be distributed evenly using the Injected at End of All Video Tags method, which makes it more difficult for others to extract stego files. Based on test results on 10 (ten) stego files consisting of Test.txt, Test.java, Test.cs, Test.pdf, Test.rtf, Test.xls, Test.properties, Test.vb, Test.exe, and Test .doc, the stego file can be fully compressed using the proposed compression method. The result of this proposed method is a reduction of up to 57% in average bytes of data embedded by each frame tag (video), compared to the previous method performed by [1] .  The proposed encryption method is quite effective at encrypting stego files that have been compressed. The Injected at End of All Video Tags method provides a higher level of security than the method proposed by[1]. because a file is compressed, encrypted, and divided into sections before being embedded. In addition, there is no distortion of stego FLV files, whether they are video or audio files
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i1.9513
      Issue No: Vol. 17, No. 3 (2019)
       
  • K-Nearest Neighbor Algorithm on Implicit Feedback to Determine Standard
           Operational Procedures

    • Authors: Muhammad Yusril Helmi Setyawan, Rolly Maulana Awangga, and Nadia Ayu Lestari
      Abstract: The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12436
      Issue No: Vol. 17, No. 3 (2019)
       
  • Investigating customers' acceptance of e− Purchasing in the Social
           Commerce Era: Integrating UTAUT with TAM

    • Authors: Maryam Ali Kashoob, Mansour Naser AlRaja
      Abstract: This research aims to identify critical factors that affect the intention of Omanis to adopt electronic purchase in Sultanate of Oman. However, there are some businesses are using traditional ways of selling. Whereas, there are many consumers prefer electronic shopping (e-shopping).
      This research had been funded by The Research Council (TRC) in Sultanate of Oman. The data had been collected by using survey. The survey had been collected through distributing the questionnaires manually to the respondents, who are from different areas in Oman exactly from Muscat and Dhofar governorate. Moreover, we integrated between TAM and UTAUT model to investigate the factors that affect the Omanis' intention to adopt online shopping. The variables that had been adopted in this study are perceived ease of use, perceived usefulness, facilitating conditions, and social influence. The data was analysed by using multiple linear regression analysis to identify the effect of adopted factors on The Omanis' intention to adopt online shopping. Also, cronbach's alpha was conducted to make sure of the reliability of study tool. Based on the findings, the research model explained 74.1% of the variance in behavioural intention to adopt online shopping. Furthermore, the results demonstrated that three out of four variables of the research model are significant which are perceived ease of use, usefulness and facilitating conditions have positive influence on Omanis' intention to adopt online shopping. On the other hand, social influence has negative effect on the adoption of online shopping.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.9390
      Issue No: Vol. 17, No. 3 (2019)
       
  • Exploration of genetic network programming with two-stage reinforcement
           learning for mobile robot

    • Authors: Siti Sendari, Arif Nur Afandi, Ilham Ari Elbaith Zaeni, Yogi Dwi Mahandi, Kotaro Hirasawa, Hsien-I Lin
      Abstract: This paper observes the exploration of Genetic Network Programming Two-Stage Reinforcement Learning for mobile robot navigation. The proposed method aims to observe its exploration when inexperienced environments used in the implementation. In order to deal with this situation, individuals are trained firstly in the training phase, that is, they learn the environment with ϵ-greedy policy and learning rate α parameters. Here, two cases are studied, i.e., case A for low exploration and case B for high exploration.  In the implementation, the individuals implemented to get experience and learn a new environment on-line. Then, the performance of learning processes are observed due to the environmental changes.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12232
      Issue No: Vol. 17, No. 3 (2019)
       
  • Dissemination of technology information through YouTube: A case of
           renewable energy technology

    • Authors: Muhammad Kunta Biddinika, Mochamad Syamsiro, Srikandi Novianti, Bakhtiyor Nakhshiniev, Muhammad Aziz, Fumitake Takahashi
      Abstract: Internet video sharing has been used by scholars for two main purposes. First, it is for informal scholarly communication including teaching and academic conferences. Second, it is for engagement tool by contemporary society. Renewable energy technology has also been utilizing internet video sharing technology for those purposes. It is a promotional tool to disseminate information about the technology as well as a media for public engagement with renewable energy issues. This paper reviews how YouTube, the most popular internet video sharing website whose content is created and accessed publicly for free of charge, has been elaborated in scholarly publication in the various fields prior to showing how renewable energy is portrayed in YouTube. By using a hundred YouTube most viewed videos, this paper presents an in-depth and systematic measurement study on the characteristics of YouTube videos on renewable energy issues.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10124
      Issue No: Vol. 17, No. 3 (2019)
       
  • Benchmarking Medium Voltage Feeders Using Data Envelopment Analysis: A
           Case Study

    • Authors: K.T.M.U Hemapala, H.M.J.N Herath, O.V. Gnana Swathika
      Abstract: Feeder performance evaluation is a key component in improving the power system network. Currently there is no proper method to find the performance of Medium Voltage Feeders (MVF) except the number of feeder failures. Performance benchmarking may be used to identify actual performance of feeders. The results of such benchmarking studies allow the organization to compare feeders with themselves and identify poorly performing feeders. This paper focuses on prominent benchmarking techniques used in international regulatory regime and analyses the applicability to MVFs. Data Envelopment Analysis (DEA) method is selected to analyze the MVFs. Correlation analysis and DEA analysis are carried out on different models and then the base model is selected for the analysis. The relative performance of the 32 MVFs of Western Province, Sri Lanka is evaluated using the DEA. Relative efficiency scores are identified for each feeder. Also the feeders are classified according to the sensitivity analysis. The results indicate that the DEA analysis may be conveniently employed to evaluate the performance of the MVFs. The evaluation is carried out once or twice a year with the MV distribution development plan in order to identify the performance of the feeders and to utilize the available limited resources efficiently.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i1.9288
      Issue No: Vol. 17, No. 3 (2019)
       
  • Stress Detection and Relief Using Wearable Physiological Sensors

    • Authors: Kriti Sethi
      Abstract: The aim is to design a combination of physiological sensors that work in concert to detect high stress levels in an adult and at the same time provide instant stress relief with solutions to cater to stress in the future. The parameters for stress detection are Beats per Minute and Electroencephalogram. The two parameters give accurate stress levels. Auditory Simulation and Scalp Massage are used to relieve stress.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.9719
      Issue No: Vol. 17, No. 3 (2019)
       
  • MIMO CHANNELS: Optimizing Throughput and Reducing Outage by Increasing
           Multiplexing Gain

    • Authors: Oboyerulu Agboje, Nsikan Nkordeh, Stanley Idiake Uzairue, Ololade Oladoyin, Kennedy Okokpujie, Bob-Manuel Ibinabo, Olaitan Alashiri
      Abstract: The two main aims of deploying Multiple Input Multiple out (MIMO) are to achieve spatial diversity (improves channel reliability) and spatial multiplexing (increase data throughput). Achieving both in a given system is impossible for now, and a trade-off has to be reached as they may be conflicting objectives. The basic concept of multiplexing: divide (multiplex) transmit a data stream several branches and transmit via several (independent) channels. In this paper, we focused mainly on achieving spatial multiplexing by modeling the channel using the diagonal Bell Labs space time scheme (D-BLAST) and the vertical Bell Labs space time architecture (V-BLAST) Matlab simulations results were also given to further compare the advantages of spatial multiplexing.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i1.8720
      Issue No: Vol. 17, No. 3 (2019)
       
  • Rain Attenuation Statistics for Mobile Satellite Communications Estimated
           from Radar Measurements in Malaysia

    • Authors: Mohammad Ibrahim Abozeed, Manhal Alhilali, Lam Hong Yin, Jafri Din
      Abstract: Mobile satellite communications will play a significant role in the next 5th generation mobile services. The use of high-frequency bands will be the enabler of this advancement. However, at high frequencies, excess rain attenuation causes severe signal losses and presents a major threat for the system availability, especially in the tropical region. To that end, this study presents the rain attenuation impact on mobile satellite communications estimated using long-term radar measurements in Malaysia, by exploiting the horizontal structure of rain from the radar database and simulating inner-city and highway mobile terminals scenarios. Additionally, a scaling factor was presented to scale available fixed satellite terminals measurements to mobile terminals operating at the same locality under similar conditions. In comparison to the available link measurements, the radar database was reliable enough to provide highly accurate estimates. In all simulation scenarios, the mobile terminal will depart the rainy area soon enough and experience lower attenuation statistics in comparison with the
      fixed terminal. The provided results will help determine the overall future system performance, especially in tropical regions.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12040
      Issue No: Vol. 17, No. 3 (2019)
       
  • Design and optimization of a new compact bandpass filter using DGS
           technique and U-shaped resonators for WLAN applications

    • Authors: Abdelhafid Belmajdoub, Ahmed Boutejdar, Ali El Alami, Saad Bennani, Mohammed Jorio
      Abstract: In this paper we present a design and optimisation of a new integrated compact structure bandpass filter using DGS technique and coupled line technology for WLAN application. The new topology consists of coupled parallel resonators, which are electric coupled to DGS slots. The DGS arrowheads are etched in the ground plane and the microstrip lines are placed on the top layer.a new U-deformation has been used in order to improve the filter results and to reduce the size of the structure. The proposed filters have been designed simulated, and optimized. The design procedure is validated using the commercial full-wave aid of Computer Simulation Technology Microwave Studio Software CST and Agilent Advanced Design System ADS. The simulated results of bandpass filter exhibit sharp roll-off (ξ) of 80 dB/GHz and show an insertion losse less than -0.45dB. The combination of the arrowhead defected ground structures and the feed microstrip line leads to suppress the undesired harmonics at high frequency range and thus an improvement of the reject band. The rejection is better than -20dB from 2.8 GHz up to 6 GHz. The proposed topology is designed and simulated on a RO4003 substrate of a dielectric constant of 3.38. The size of the whole structure is less as (43.5mm x 34.3mm). Such compact bandpass filters with broadband features are highly demanded in a wireless and microwave applications.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10913
      Issue No: Vol. 17, No. 3 (2019)
       
  • A New Configuration of A Printed Diplexer Designed for DCS and ISM bands

    • Authors: Setti Hicham
      Abstract:  This work presents a new study on the design of a microstrip diplexer configuration optimized and validated for ISM and DCS frequency bands. The achieved structure is based on microstrip technology, the goal was to design two printed bandpass filters one for ISM band and the other one for DCS frequency band.The two microstrip filters are associated by using a T-junction which permits to validate a diplexer in the frequency bands DCS-Band receiver [1.74GHz – 2GHz] and ISM-Band transmitter [2.3GHz – 2.55GHz]. The whole size of the final circuit is 130 x50 mm2. After the validation of the proposed diplexer into simulation we have fabricated and tested it by using VNA which permits to have a good agremment between simulation and measurements.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.9991
      Issue No: Vol. 17, No. 3 (2019)
       
  • Bandwidth Enhancement of Compact Mocrostrip Rectangular Antennas for UWB
           Applications

    • Authors: saida Elajoumi, Abdelali Tajmouati, Jamal Zbitou
      Abstract: In this paper design of microstrip patch antennas are presented for ultra wideband (UWB) applications. The designed antennas have good matching input impedance in a wide frequency band covering the UWB frequency band which is defined by the FCC. The proposed antennas consist of rectangular patch which is fed by 50Ω microstrip line. These antennas are investigated and optimized by using CST microwave studio, they are validated by using another electromagnetic solver HFSS. The proposed antennas are designed and optimized taking into account the optimized of the ground by using Defected Ground Structure (DGS) in order to improve the frequency band of microstrip antenna. Hence, the impedance and surface current of the antenna structures are affected by DGS. As will be seen, the operation bandwidth of the proposed antennas are from 3 to 15 GHz (return loss ≤ -10 dB), corresponding to wide input impedance bandwidth (133.33%), with stable omnidirectional radiation patterns and important gain. A good agreement has been obtained between simulation and measurement results in term of bandwidth clearly show the validity of the proposed structures. These antennas are useful for UWB applications, may be able to potentially minimize frequency interference from many wireless technologies i.e WLAN, WiMAX. Details of the antennas have been investigated numerically and experimentally.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.9184
      Issue No: Vol. 17, No. 3 (2019)
       
  • Multicast Routing Protocol for Advanced Vehicular Ad Hoc Networks

    • Authors: Omar Saeed Al Mushayt, Wajeb Gharibi, Nasrullah Armi
      Abstract: Transport sector has great impact on our daily life. Despite the huge number of vehicular models, driving process still faces many challenges due to the lack information about the roads and the surrounding sudden events, which can result in high number of accidents globally and especially in Saudi Arabia. A new technology, Vehicular Ad hoc Network (VANET), has emerged to support Intelligent Transport System (ITS) and to offer advanced solutions for drivers to avoid different hazard events that occur on the road. In this paper, we discuss the multicast and broadcast communications in VANETs, Quality of Sevice (QoS)-awaregroup addressing/managing solutions to VANETs which help inclassifying different application that explore and design a new cross-layer framework, aware of high mobility and efficiency.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10240
      Issue No: Vol. 17, No. 3 (2019)
       
  • Hybrid Multi-independent mmWave MNOs Assessment Utilising Spectrum Sharing
           Paradigm for 5G Networks

    • Authors: Mothana L. Attiah
      Abstract: Spectrum sharing paradigm (SSP) has recently emerged as an attractive solution to provide capital expenditure (CapEx) and operating expenditure (OpEx) savings and to enhance spectrum utilization (SU). However, practical issues concerning the implementation of such paradigm are rarely addressed (e.g., the mutual interference, fairness, and mmWave base station density). Therefore, in this paper, we proposed ultra-reliable and proportionally fair hybrid spectrum sharing access strategy that aims to address the aforementioned aspects as a function of coverage probability (CP), average rate distributions (ARD), and the number of mmWave base stations (mBSs). In this strategy, the spectrum is sliced into three parts (exclusive, semi-pooled, and fully pooled). A typical user that belongs to certain operator has the right to occupy a part of the spectrum available in the high and low frequencies (28 and 73 GHz) based on an adaptive hybrid multi-state mmWave cell selection scheme (AHMMC-S) which associates the user with the tagged mBS that offers a highest SINR to maintain more reliable connection and enrich the user experience. Numerical results show that significant improvement in terms of ARD, CP, fairness among operators, and maintain an acceptable level of mBSs density. 
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11131
      Issue No: Vol. 17, No. 3 (2019)
       
  • WIRELESS SENSOR NETWORK BASED MONITORING SYSTEM FOR PRECISION AGRICULTURE
           IN UZBEKISTAN

    • Authors: Farruh Adhamovich Muzafarov
      Abstract: Currently, information and communication technologies (ICT) used in all sphere. Moreover, ICT  is widely used to increase agricultural productivity. In this article, "Expert Advisory System" was developed to improve the productivity of farmers, save their time and improve the efficiency of the crops. The system monitors real-time crop fields using wireless sensor networks and provides the necessary information to farmers via the Internet. The farmer will be required to undertake the necessary remedial action on the basis of the information received.  
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11513
      Issue No: Vol. 17, No. 3 (2019)
       
  • Effect of Kernel Size on Wiener and Gaussian Image Filtering

    • Authors: Zayed M. Ramadan
      Abstract: In this paper, the effect of the kernel size of the Wiener filter and the Gaussian filter on the image restoration quality has been studied and analyzed. Four sizes of such sizes, namely 3x3, 5x5, 7x7 and 9x9 were simulated. Two different types of noise of zero mean and several variances have been used: Gaussian noise and speckle noise. Several image quality measuring indices have been applied in the computer simulation. In particular, mean absolute error (MAE), mean square error (MSE) and structural similarity (SSIM) index were applied. Many images were used in the computer simulations for testing; however the results of three of them are shown in this paper. The results show that the Gaussian filter has a superior performance over  the Wiener filter for all values of Gaussian and speckle noise variances mainly as it uses the smallest kernel size. To obtain a similar performance in Wiener filtering a larger kernel size is required which produces much more blur in the output mage. The Wiener filter shows poor performance using the smallest kernel size (3x3) while the Gaussian filter shows the best results in such case. Using Gaussian filter, similar results of those obtained with low noise could be obtained in the high noise variance but with a higher kernel size.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11192
      Issue No: Vol. 17, No. 3 (2019)
       
  • An implementation of novel genetic based clustering algorithm for color
           image segmentation

    • Authors: Varshali Jaiswal, Varsha Sharma, Sunita Varma
      Abstract: The color image segmentation is one of most crucial application in image processing. It can apply to medical image segmentation for a brain tumor and skin cancer detection or color object detection on CCTV traffic video image segmentation and also for face recognition, fingerprint recognition etc. The color image segmentation has faced the problem of multidimensionality. The color image is considered in five-dimensional problems, three dimensions in color (RGB) and two dimensions in geometry (luminosity layer and chromaticity layer). In this paper the, L*a*b color space conversion has been used to reduce the one dimension and geometrically it converts in the array hence the further one dimension has been reduced. The*b space is clustered using genetic algorithm process, which minimizes the overall distance of the cluster which is randomly placed at the start of the segmentation process. The segmentation results of this method give clear segments based on the different color and it can be applied to any application.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10072
      Issue No: Vol. 17, No. 3 (2019)
       
  • Prototype of Multifunctional Transmitter with Rejection of Disturbances

    • Authors: Holman Montiel Ariza
      Abstract: The industrial instruments found in the different industrial processes allow supervisory and control actions to be carried out. These elements are usually composed of an electronic circuit, which varies according to the specifications given by the manufacturer. Another factor that influences the design of a circuit for elements of this type is cost, since, at a lower cost, electronic elements are susceptible to fail for reasons such as electric fields, motor interference or environmental conditions. This problem limits the operation of the instrument and reduces its useful life, which causes unnecessary stops of the automated processes increasing the cost of producing a product. Some partial solutions to this problem have been obtained by means of the implementation of additional circuits such as protections or filters, although the number of unexpected stops of the process is reduced, even this type of failures occur. This paper proposes an alternative solution to the problem through a low cost prototype, which has a mechanism for rejection of disturbances that increases the accuracy and precision of an instrument compared to the low-cost instrument technology developed so far.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12204
      Issue No: Vol. 17, No. 3 (2019)
       
  • Comparison of Parameter-Free Agglomerative Hierarchical Clustering Methods
           a New Agglomerative Hierarchical Clustering to Model Student Activity in
           Online Learning

    • Authors: Agung Triayudi, Iskandar Fitri
      Abstract: In this paper, a new technique of agglomerative hierarchical clustering (AHC), which is known as SLG (single linkage dissimilarity increment distribution, global cumulative score standard), can work well in analyzing students' activity in online learning as evidenced by obtaining the highest score in testing the validity index of cophenetic correlation coefficient (CPCC) ie 0.9237, 0.9015, 0.9967, 0.8853, 0.9875 of the five datasets compared with conventional agglomerative hierarchical clustering methods.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.9425
      Issue No: Vol. 17, No. 3 (2019)
       
  • Analysis of Color Image Features Extraction using Texture Methods

    • Authors: aws AlQaisi, Mokhled AlTarawneh, Ziad A. Alqadi, Ahmad A. Sharadqah
      Abstract: A digital color images are the most important types of data currently being traded; they are used in many vital and important applications. Hence, the need for a small data representation of the image is an important issue. This paper will focus on analyzing different methods used to extract texture features for a color image. These features can be used as a primary key to identify and recognize the image. The proposed discrete wave equation DWE method of generating color image key will be presented, implemented and tested. This method showed that the percentage of reduction in the key size is 85% compared with other methods. 
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.9922
      Issue No: Vol. 17, No. 3 (2019)
       
  • Low cost nodemcu based development water rocket measurement system applied
           to STEM education

    • Authors: Andi Susilo, Yasmiati Yasmiati, Ahmad Apandi
      Abstract: Water rockets have become one of learning tools for STEM Education in schools. Generally water rockets make in school activity have no parachute load, altitude, and velocity measurement. Rocket can go any direction and also will cause hard collision to the ground that break the high speed rocket. It will take time and need more cost to make a new one for students. This study propose the low cost NodeMcu based water rocket measurement system to solve the problem. Altitude and velocity measurement are added and deployment system to release the parachute to make water rocket fall to the ground smoothly. Smartphone application used to monitor altitude and velocity of water rocket. Variables consist of water volume and air pressure. Five experiments had been conducted and recorded. The result found that the system could calculate Altitude, Velocity, and Deployment System also could release the parachute automatically in Coasting Descent position.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12227
      Issue No: Vol. 17, No. 3 (2019)
       
  • Measuring the quality of e-commerce websites using analytical hierarchy
           process

    • Authors: Umar Abdul Aziz, Arif Wibisono, Amna Shifia Nisafani
      Abstract: Improving website quality for e-commerce website is indispensable since it affects customer satisfaction. There are several aspects of website quality that should be considered. Unfortunately, what criteria that should be prioritized is still under research. This research aims to identify the priority of website quality criteria and incorporate these criteria to measure the quality of ten e-commerce websites in Indonesia using Analytical Hierarchical Process (AHP). This study interviews two experts to assign priority for each criterion. In the end, this study has found that availability is the uttermost aspect to consider. Furthermore, this study also found that OLX.com is the best Customer-to-Customer (C2C) e-commerce in Indonesia in terms of website quality. This research is useful for any e-commerce technical developer to improve his/her website in twofold: 1) criteria priority to improve the quality of C2C e-commerce websites and 2) website quality ranking of C2C e-commerce.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12228
      Issue No: Vol. 17, No. 3 (2019)
       
  • Bridging iot infrastructure and cloud application using cellular-based
           internet gateway device

    • Authors: Eko Sakti Pramukantoro, Maxi Luckies, Fariz Andri Bakhtiar
      Abstract: An Internet of Things (IoT) middleware can solve interoperability problem among “things” in IoT infrastructure by collecting data. However, the sensor nodes’ data that is collected by the middleware cannot be directly delivered to cloud applications since the sensor nodes and the middleware are located in intranet. A solution to this problem is an Internet Gateway Device (IGD) that retrieves data from the middleware in intranet then forwards them to cloud applications in the internet. In this study, an IGD based on cellular network is proposed to provide wide-coverage internet connectivity. Two test scenarios were conducted to measure delay and throughput between the IGD and the cloud application; using data from DHT22 sensor and image sensor respectively. The results of the first test scenario using DHT22 sensor show that the average delay is under 5 seconds and the maximum throughput is 120 bps, while the second one using image sensor concludes that the average delay is 595 seconds and the maximum throughput is 909 bps.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12229
      Issue No: Vol. 17, No. 3 (2019)
       
  • Hiding data in images using DCT steganography techniques with compression
           algorithms

    • Authors: Osama Fouad Abdel Wahab, Aziza I. Hussein, Hesham F. A. Hamed, Hamdy M. Kelash, Ashraf A. M. Khalaf, Hanafy M. Ali
      Abstract: Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, DCT is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12230
      Issue No: Vol. 17, No. 3 (2019)
       
  • Performance analysis of tunnel broker through open virtual private network

    • Authors: Rendy Munadi, Danu Dwi Sanjoyo, Doan Perdana, Fidar Adjie
      Abstract: Tunnel Broker uses automatic configuration tunneling mechanism for IPv6 clients connected to IPv4 internet. Connectivity between clients and service providers in IPv6 is urgently needed. Open VPN as a provider implemented configures it by a VPN network, so IPv6 and IPv4 public IP clients can easily connect to the server. In this research focused on the performance of tunnel broker mechanism by utilizing open VPN as access to the network. IPv6 tunnel broker is developed by installing Open VPN and providing IPv6 IPs. Implementation of public IP usage in observing the performance of tunnel broker development is done in BCN Telkom Laboratory Network. The measurement results show that TCP and UDP throughput of IPv6 is slightly higher than IPv4. The research using OpenVPN as a server Tunnel Broker for client access to the server is still rarely done, especially in the field of the network based on Internet Protocol.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12231
      Issue No: Vol. 17, No. 3 (2019)
       
  • Suitability analysis of rice varieties using learning vector quantization
           and remote sensing images

    • Authors: Annisa Apriliani, Retno Kusumaningrum, Sukmawati Nur Endah, Yudo Prasetyo
      Abstract: Rice (Oryza Sativa) is the main food for Indonesian people, thus maintaining the stability of rice production in Indonesia becomes an important issue for further study.  A strategy to overcome the issue is to apply precision agriculture (PA) using remote sensing images as a reference due to its effectiveness.  The initial stage of PA is suitability analysis of rice varieties, including INPARA, INPARI, and INPAGO.  While the representative features that can be extracted from remote sensing images and related to agriculture field are NDVI, NDWI, NDSI, and BI.  Therefore, the aim of this study is to identify the best model for analyzing the most suitable superior rice varieties using Learning Vector Quantization.  The results show that  the best LVQ model is obtained at learning rate value of 0.001, epsilon value of 0.1, and the features combination of NDWI and BI values (in standard deviation). The architecture generates accuracy value of 56%.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12234
      Issue No: Vol. 17, No. 3 (2019)
       
  • Fuzzy sequential model for strategic planning of small and medium scale
           industries

    • Authors: Imam Santoso, Puspa Ayu Indah Prameswari, Aulia Bayu Yushila, Muhammad Arwani
      Abstract: The use of strategic planning can be an alternative solution to improve industrial performance. In small and medium scale industries especially in apple chips industries, strategic planning helps to know the current industry situation and the steps that must be taken to overcome the existing problems. This study aimed to develop an improvement strategies using Fuzzy Sequential Modeling (FSM) model. FSM model was consisted a SWOT analysis, Root Cause Analysis (RCA), Bolden’s Taxonomy and fuzzy AHP. Based on SWOT analysis, the external factors of threats was the similar business competition and low purchasing power. RCA described the issues that needed to be fixed using Bolden’s Taxonomy as the reference for determining the action plans and produce four OIA (Open Improvement Area) there are old technology machines and equipment, difficulty of enterprise development, ineffective marketing media and low market share. The strategic planning was determined using Fuzzy AHP based on OIA and ABC enterprise needs to improve the low market share and ineffective marketing strategy.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12239
      Issue No: Vol. 17, No. 3 (2019)
       
  • Cyst and tumor classifications on human dental panoramic images using
           statistical modeling approach

    • Authors: Nur Chamidah, Kinanti Hanugera Gusti, Eko Tjahjono, Budi Lestari
      Abstract: Cyst and tumor in oral cavity are seriously noticed by health experts along with increasing death cases of oral cancer in developing country. Early detection of cyst and tumor using dental panoramic image is needed since it initial growth does not cause any complaints. Image processing is done by mean for distinguishing the classification of cyst and tumor. The results in previous studies about classification of cyst and tumor were done by using mathematical computation approach have still not satisfied and they have not been validated.Therefore, in this study we propose methods to classify cyst and tumor by using statistical modeling approach with logit link function based on parametric model, i.e., generalized linear model, and nonparametric model, i.e., generalized additive model by using local polynomial estimator.  Based on the proposed methods, we get the classification accuracy of 90.91% for nonparametric model approach and 63.64%  for parametric model approach. In addition, to validate the classification accuracy we obtain that the nonparametric model approach gives significant Press’s Q statistical testing value. So, we conclude that the nonparametric model approach gives better outcome to classify cyst and tumor using dental panoramic image than the parametric model approach.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12240
      Issue No: Vol. 17, No. 3 (2019)
       
  • VRLA battery state-of-health estimation based on charging time

    • Authors: Akhmad Zainuri, Unggul Wibawa, Mochammad Rusli, Rini Nur Hasanah, Rosihan Arby Harahap
      Abstract: Battery State-of-Health (SoH) is an important parameter of the battery’s ability to store and deliver electrical energy. Various methods have been so far developed to calculate the battery SoH, such as through the calculation of battery impedance or battery capacity using Kalman Filter, Fuzzy theory, Probabilistic Neural Network, adaptive hybrid battery model, and Double Unscented Kalman Filtering (D-UKF) algorithm. This paper proposes an approach to estimate the value of battery SoH based on the charging time measurement. The results of observation and measurements showed that a new and used batteries would indicate different charging times. Unhealthy battery tends to have faster charging and discharging time. The undertaken analysis has been focused on finding out the relationship between the battery SoH and the charging time range. To validate the results of this proposed approach, the use of battery capacity method has been considered as comparison. It can be concluded that there is a strong correlation between the two discussed SoH estimation methods, confirming that the proposed method is feasible as an alternative SoH estimation method to the widely known battery capacity method. The correlation between the charging-disharging times of healthy and unhealthy batteries is very prospective to develop a battery charger in the future with a prime advantage of not requiring any sensor for the data acquisition.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12241
      Issue No: Vol. 17, No. 3 (2019)
       
  • Enhance interval width of crime forecasting with ARIMA model-fuzzy alpha
           cut

    • Authors: Yaya Sudarya Triana, Astari Retnowardhani
      Abstract: With qualified data or information a better decision can be made. The interval width of forecasting is one of data values to assist in the selection decision making process in regards to crime prevention. However, in time series forecasting, especially the use of ARIMA model, the amount of historical data available can affect forecasting result including interval width forecasting value. This study proposes a combination technique, in order to get get a better interval width crime forecasting value.  The propose combination technique between ARIMA model and Fuzzy Alpha Cut are presented. The use of variation alpha values are used, they are 0.3, 0.5, and 0.7. The experimental results have shown the use of ARIMA-FAC with alpha=0.5 is appropriate. The overall results obtained have shown the interval width crime forecasting with ARIMA-FAC is better than interval width crime forecasting with 95 % CI ARIMA model.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.12233
      Issue No: Vol. 17, No. 3 (2019)
       
  • Implementation Model Arcitecture Software Defined Network Using Raspberry
           Pi: A Review Paper

    • Authors: Oki Marzuqi, Agus Virgono, Ridha Muldina Negara
      Abstract: In general, technology is used by everyone to facilitate all activities and needs. Software Defined Network created with different basic concept with traditional network. The separator between control and forwarding layer in different devices allows the adminstrator to customize the control plan. With the implementation of OpenFlow protocol on SDN, then there is an opportunity to apply a routing in the SDN network from source to destination. Different with traditional network, control and forwarding layer located in one infrastructure where is network administrator should arrange one by one device from different vendor to manage network. Research using single board computers on network technology provides an opportunity to apply the network architecture model. Raspberry Pi has enough ability to implement SDN model. Therefore one of the problems that occur in traditional networks is difficulty to compiling a complex network to be managed easily in accordance with desire of the adminstrator. And to solve the problem, Network Defined Software method is used to make network management more centralized and efficient.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.8859
      Issue No: Vol. 17, No. 3 (2019)
       
  • Cladding effects on Silica Directional Couplers

    • Authors: Ary - Syahriar, Nabil Rayhan Syahriar, Jusman Syafii Jamal
      Abstract: Directional couplers are widely used as passive and active optical devices in fibre and integrated optics, and form the basis of components such as switches, modulators and wavelength filters. They consist of two closely-spaced parallel waveguides, whose separation is sufficiently small that power may be transferred between the modes propagating in the two guides through an interaction involving their evanescent fields. In this paper results are presented for a range of near infrared single mode silica directional couplers fabricated by electron beam irradiation. The effects of over cladding layers will be highlighted. Changes on coupling coefficient due to different cladding refractive indexes will also be examined. The coupled mode theory will be employed to fit the experimental results with prediction by theory. It is found that over cladding layer alters the transmission characteristics of silica directional couplers.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.8705
      Issue No: Vol. 17, No. 3 (2019)
       
  • Significant Variables Extraction of Post-Stroke EEG Signal Using Wavelet
           and SOM Kohonen

    • Authors: Esmeralda C. Djamal, Deka P. Gustiawan, Daswara Djajasasmita
      Abstract: Stroke patients require a long recovery. One success of the treatment given is the evaluation and monitoring during recovery. One device for monitoring the development of post-stroke patients is Electroencephalogram (EEG). This research proposed a method for extracting variables of EEG signals for post-stroke patient analysis using Wavelet and Self-Organizing Map Kohonen clustering. EEG signal was extracted by Wavelet to obtain Alpha, beta, theta, gamma, and Mu waves. These waves, the amplitude and asymmetric of the symmetric channel pairs are features in Self Organizing Map Kohonen Clustering. Clustering results were compared with actual clusters of post-stroke and no-stroke subjects to extract significant variable. These results showed that the configuration of Alpha, Beta, and Mu waves, amplitude together with the difference between the variable of symmetric channel pairs are significant in the analysis of post-stroke patients. The results gave using symmetric channel pairs provided 54-74% accuracy.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11776
      Issue No: Vol. 17, No. 3 (2019)
       
  • GNSS Interference Reduction Method For CORS Site Planning

    • Authors: Reza Septiawan, Agung Syetiawan, Arief Rufiyanto, Nashrullah Taufik, Budi Sulistya, Erik Madyo Putro
      Abstract: Precision, Navigation, and Timing (PNT) system based on Global Navigation Satellite System (GNSS) becomes significant in the air, land, and sea traffic management. Integrity of GNSS is significant to provide a reliable real time PNT system such as CORS (Continuously Operating Reference Stations). GNSS Interference due to intentional or unintentional surrounding signal source may decrease the integrity of GNSS signal. Monitoring and identification of potential GNSS interference sources in the surrounding environment of CORS is significant. This paper proposed a methodology to reduce potential GNSS interference in a planned CORS site by first simulating the radiation pattern of potential source of interference to GNSS signal in the planned CORS sites. Thereafter ambient noise levels in the location of CORS may be measured to provide a reference point for analyzing the other potential sources of interferences. Based on these results, optimal location of CORS is chosen with the lowest possible unintentional interference signal from their surrounding. Measurement has been conducted in the location of CORS owned by BIG (Indonesian Agency for Geospatial Information), which is located in the rooftop of a building neara telecommunication tower.This method is necessary for CORS site planning to reduce potential GNSS interference sources in the environment of alternative sites.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11744
      Issue No: Vol. 17, No. 3 (2019)
       
  • Design of Radar Display of Indonesian Airspace Monitoring Application

    • Authors: Sulistyaningsih Sulistyaningsih, Yussi Perdana Saputera, Mashury Wahab, Yudi Yulius Maulana
      Abstract: In this research, the design and manufacture of radar display software using Plan Position Indicator (PPI) format for air surveillance radar application are presented. The PPI display shows interpretations of echo detections of radar signal reflected from the flying objects/targets. The detection results will be displayed on a circular 360ᵒ area, where the radar position is at the center. System configuration is done via interface from the display, by adjusting the level of transmit signal, by setting the gain for threshold, and by enabling moving target indicator (MTI) mode. The MTI mode only displays moving objects and no non-moving objects are shown such as mountains and buildings. Based on the results of this research, the PPI display shows the targets on the display according to its position, some desired targets can also be tracked, information on target, GPS location, target ID, required parameters, and some settings.  The radar display fulfills all the required capabilities for air surveillance Radar.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11778
      Issue No: Vol. 17, No. 3 (2019)
       
  • “Magic Boosed” an Elementary School Geometry Textbook with
           Marker-Based Augmented Reality

    • Authors: Reza Andrea, Siti Lailiyah, Fahrul Agus, Ramadiani Ramadiani
      Abstract: Recently media that is used on mathematic study is just board and printed book. Usually teacher uses, modelling tool to visualize study objects like geometry, but students must be in alternatively to fulfill that demand requires application which can deliver 3-dimension geometry to emphasize students understanding of volume and surface area. This research will implement based tracking marker method on textbook and develop geometry study application based on augmented reality, it is called “Magic Boosed”. The existence of AR combination technology, then geometry which will be taught by teacher to elementary school student will be more interesting and make students are easier to learn shape and geometry formulas, this is evident from data analysis test on student learning improvement using kolmogorov-smirnov testing.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v16i6.11559
      Issue No: Vol. 17, No. 3 (2019)
       
  • Smart Taxi Security System Design with Internet of Things (IOT)

    • Authors: Indrianto Indrianto, Meilia Nur Indah susanti, Riki Ruli Affandi Siregar, Max Teja Ajie Cipta Widiyanto, Purwati Putri, Yudhi Purwanto
      Abstract: Safety is an important thing in driving. Security here is meant in terms of the way of driving the vehicle or the security on the vehicle itself. Vehicle assets, especially cars, that are quite expensive or luxurious assets Therefore, safety protectionsfor such vehicles are necessary. Taxi is a valuable asset for the company. For that we need a good security system to maintain the asset.  The euclidean distance method is used to calculate the distance of the incident and the nearest police station. By using the progress of technology, then the progress can be utilized to help the security of taxi owned by a company or personal (online). The purpose of this study is to create a tool that can secure the taxi and its driver of crimes that might occur. The help from IoT (internet of thing) to secure a taxi is necessary because so that it can be known where the incident case happened.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10167
      Issue No: Vol. 17, No. 3 (2019)
       
  • Software Development of Lung Disease Detector Caused by Cigarettes

    • Authors: Sri Widodo, Ratnasari Nur Rohmah, Bana Handaga, Liss Dyah Dewi Arini
      Abstract: Type of  lung disease is very much manifold. But the type of lung disease caused by smoking there are only 4, namely Bronchitis, Pneumonia, Emphysema and Lung Cancer. This method is used to diagnose lung disease from a CT Scan image using the naked eye, then performing an interpretation of the data one by one. This procedure is not effective. The aim of this research is to develop an automatic lung disease detection software caused by smoking on Computed Tomography Scan (CT-Scan) images.  This study includes 4 (four) main points. First is the development of software for segmentation of lung organ automatically using Active Shape Model (ASM) method. Second is the segmentation of candidates who are considered illness by using morphological math. The third process of lung disease detection using Support Vector Machine (SVM). Fourth is visualization of disease or lung disorder using Volume Rendering.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.9799
      Issue No: Vol. 17, No. 3 (2019)
       
  • Optimal SVC Allocation via Symbiotic Organisms Search for Voltage Security
           Improvement

    • Authors: Mohamad Khairuzzaman Mohamad Zamani, Ismail Musirin, Sharifah Azma Syed Mustaffa, Saiful Izwan Suliman
      Abstract: It is desirable that a power system operation is in a normal operating condition. However, the increase of load demand in a power system has forced the system to operate near to its stability limit whereby increase in load poses a threat to the power system security. In solving this issue, optimal reactive power support via SVC allocation in a power system has been proposed. In this paper, Symbiotic Organisms Search (SOS) algorithm is implemented to solve for optimal allocation of SVC in the power system. IEEE 26-Bus Reliability Test System is used as the test system. Comparative studies are also conducted concerning Particle Swarm Optimization (PSO) and Evolutionary Programming (EP) techniques based on several case studies. Based on the result, SOS has proven its superiority by producing higher quality solutions compared to PSO and EP which can benefit the power system operators in planning for optimal power system operations.Optimal SVC Allocation via Symbiotic Organisms Search for Voltage Security Improvement
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.9905
      Issue No: Vol. 17, No. 3 (2019)
       
  • Design of Electro Cardiograph Machine

    • Authors: Bambang Guruh Irianto, Budhiaji Budhiaji, Dwi Herry Andayani
      Abstract: The price of ECG machine on the market is very expensive. The technology used is still very complicated and ineffective, and the display of ECG machine cannot be connected to other devices. In this study, the researchers design an ECG machine 12 channels by utilizing ATMEGA microcontroller technology, graphic LCD 64x12, that are available on the market at low prices. So portable ECG machines can be produced and connected to other devices. The objective of this study is to design an ECG machine using ARMEGA microcontroller technology, by making an ECG bio amplifier circuit, measuring bio amplifier’s amplitude and frequency responses, and making ECG signal processor circuit with microcontroller, which can be displayed on a 128x64 graphic LCD or PC. To answer the research objective, the research design used is pure experimental research, i.e. series experimental design. The independent variable is ECG phantom or human and the dependent variable is the ECG machine. The design of ECG machine steps are as follows: circuit design, circuit testing, and output calibration. The conclusions of the study are: the result of ATMEGA microcontroller program listing design can be used to run the program of ECG machine with ATMEGA microcontroller by displaying heartbeats, beep sounds of each R wave and ECG signal, which are displayed on graphic LCD and PC, and can be printed trough a computer or stored in a computer.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.8558
      Issue No: Vol. 17, No. 3 (2019)
       
  • Power Analysis Attack Against Encryption Devices: a Comprehensive Analysis
           of AES, DES, and BC3

    • Authors: Septafiansyah Dwi Putra, Mario Yudhiprawira, Sarwono Sutikno, Yusuf Kurniawan, Adang Suwandi Ahmad
      Abstract: Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.9384
      Issue No: Vol. 17, No. 3 (2019)
       
  • Markerless Motion Capture for 3D Human Model Animation using Depth Camera

    • Authors: Maulahikmah Galinium, Jason Yapri, James Purnama
      Abstract: 3D animation is created using keyframe based system in 3D animation software such as Blender and Maya. Due to long time interval and the need of high expertise in 3D animation, motion capture devices was used as an alternative and Microsoft Kinect v2 sensor is one of them. This research analyses the capabilities of the Kinect sensor in producing 3D human model animations using motion capture and keyframe based animation system in reference to a live motion performance. The quality, time interval and cost of both animation results were compared. The experimental result shows that motion capture system with Kinect sensor consumed less time and cost in the long run, but it produced lower quality animation. This was due to the lack of body detection accuracy when there is obstruction. Moreover, the sensor’s constant assumption that the performer’s body faces forward made it unreliable to be used for a wide variety of movements. Furthermore, standard test defined in this research covers most body parts’ movements to evaluate other motion capture system. Also, there are some research findings attempting to process raw data from the Kinect SDK and to produce motion data from positional and rotational data
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i2.8939
      Issue No: Vol. 17, No. 3 (2019)
       
  • Filter Technique of Medical Image on Multiple Morphological Gradient (MMG)
           Method

    • Authors: Jufriadif Na'am, Johan Harlan, Rosda Syelly, Agung Ramadhanu
      Abstract: Filter technique is supportive for reducing image noise. This paper presents a study on filtering medical images, i.e., CT-Scan, Chest X-ray and Panoramic X-ray collected from two of the most prominent public hospitals in Padang City, Indonesia. The aim of this study preserved to facilitate in diagnosing objects in x-ray medical images. This study used filter technique, i.e. Blur, Emboss, Gaussian, Laplacian, Roberts, Sharpen, or Sobel techniques as pre-processing step. The filter process performed before edge detection and edge clarification. MMG method used in this study to clarify the edge detection. Thus, this research showed the hesitation decline (confidence increase) of the diagnosis of objects contained in medical images.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v16i6.9722
      Issue No: Vol. 17, No. 3 (2019)
       
  • Information Quality Risk Assessment using Threat Scenario Dependency Model
           and Extended Risk Matrix Approach

    • Authors: Jaka Sembiring, Fitasari Wiharni
      Abstract: Information has become a strategic asset for any organization so that every organization needs high quality information. Nevertheless, in many cases poor information quality appears mainly due to in-effectiveness of information management (information production and delivery). It is easily understood that this condition poses a certain risk. A holistic information risk management model has been previously proposed, but the model has some limitations especially on risk calculation and risk priority ranking as the model does not consider existing control effectiveness. In this paper, a new risk assessment method is proposed in order to improve the modelling of total impact of risks through taking into account the effectiveness of existing control and to improve the accuracy of risk priority ranking using extended risk matrix approach and Borda method. The proposed method is then implemented in a government institution as a real case illustration. 
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i1.10050
      Issue No: Vol. 17, No. 3 (2019)
       
  • Formal Expansion Method for Solving an Electrical Circuit Model

    • Authors: Tjendro Tjendro, Sudi Mungkasi
      Abstract: We investigate the validity of the formal expansion method for solving a second order ordinary differential equation raised from an electrical circuit problem. The formal expansion method approximates the exact solution using a series of solutions. An approximate formal expansion solution is a truncated version of this series. In this paper, we confirm using simulations that the approximate formal expansion solution is valid for a specific interval of domain of the free variable. The accuracy of the formal expansion approximation is guaranteed on the time-scale 1.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10318
      Issue No: Vol. 17, No. 3 (2019)
       
  • AHP-TOPSIS for Analyze Job Performance with Factor Evaluation System and
           Process Mining

    • Authors: Gabriel Sophia, Riyanarto Sarno
      Abstract: Job performance is a combination of ability, effort and opportunity that can be judged based on work of employee.This research using  Factor Evaluation System method to analyze the job performance because this is one of popular method. FES has nine factor to analyze the employee, but the reality just nine factor is not enough. So we use process mining to improved the FES. Process mining help analysis of job performance becomes more details. In process mining there are event that has history of time stamp, case, activity, and resources of employee. So this method can be used continuously if we add weight for each factor. The weight are get from the Analytic Hierarchy Process-Technique for Order Preference by Similitary to Ideal Solution. The result show that AHP-TOPSIS is not compatible to use in this case when compared with the real work.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v16i6.10408
      Issue No: Vol. 17, No. 3 (2019)
       
  • Region of Interest and Color Moment Method for Freshwater Fish
           Identification

    • Authors: Gibtha Fitri Laxmi, Fitrah Satrya Fajar Kusumah
      Abstract: One of the important feature in content based image retrieval is color feature. The color feature is the most widely used visual features. Extracting feature image depends on the problem to identify the region or object of interest that are complex in content.  This paper presents a methodology to recognize certain freshwater images using region of interest and color feature. In this work, we have considered 7 varieties of freshwater fish, Gourami (Osphronemus goramy), Mas/Common carper (Cyprinus carpio), Mas Orange, Mas Kancra, Mujair/Java Tilapia (Oreochromis mosambicus), Nila/Nile Tilapia (Oreochromis niloticus), Patin (Pangasius sp). Each variety consists of 20 images. We deployed Color Moment Feature after Region of Interest process to extract the feature. Euclid is used for recognition. Considering only as feature, classification accuracy of 89% is obtained using color moment. The work is helpful common people for identification of freshwater fish easily. The research technique shows promise for eventually being able to do so, and for the future will help to get important information from the image.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11749
      Issue No: Vol. 17, No. 3 (2019)
       
  • Parallel Random Projection Using R High Performance Computing for Planted
           Motif Search

    • Authors: Lala Septem Riza, Tyas Farrah Dhiba, Wawan Setiawan, Topik Hidayat, Mahmoud Fahsi
      Abstract: Motif discovery in DNA sequences is one of the most important issues in bioinformatics. Thus, algorithms for dealing with the problem accurately and quickly have always been the goal of research in bioinformatics. Therefore, this study is intended to modify the random projection algorithm to be implemented on R high performance computing (i.e., the R package pbdMPI). Some steps are needed to achieve this objective, ie preprocessing data, splitting data according to number of batches, modifying and implementing random projection in the pbdMPI package, and then aggregating the results. To validate the proposed approach, some experiments have been conducted. Several benchmarking data were used in this study by sensitivity analysis on number of cores and batches. Experimental results show that computational cost can be reduced, which is that the computation cost of 6 cores is faster around 34 times compared with the standalone mode. Thus, the proposed approach can be used for motif discovery effectively and efficiently.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11750
      Issue No: Vol. 17, No. 3 (2019)
       
  • KANSA: High Interoperability e-KTP Decentralised Database Network using
           Distributed Hash Table

    • Authors: Rolly Maulana Awangga, Nisa Hanum Harani, Muhammad Yusril Helmi Setyawan
      Abstract: e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11758
      Issue No: Vol. 17, No. 3 (2019)
       
  • Comparison of Exponential Smoothing and Neural Network Method to Forecast
           Rice Production in Indonesia

    • Authors: Gregorius Airlangga, Agatha Rachmat, Dodisutarma Lapihu
      Abstract: Rice is the most important food commodity in Indonesia. In order to achieve affordability, and the fulfillment of the national food consumption according to the Indonesia law no. 18 of 2012, Indonesia needs information to support the government's policy regarding the collection, processing, analyzing, storing, presenting and disseminating. One manifestation of the Information availability to support the government’s policy is forecasting. Exponential smoothing and neural network methods are commonly used to forecasting because it provides a satisfactory result. Our study are comparing the variants of exponential and backpropagation model as a neural network to forecast rice production. The evaluation is summarized by utilizing Mean Square Percentage Error (MAPE), Mean Square Error (MSE). The results show that neural network method is preferable than the statistics method since it has lower MSE and MAPE values than statistics method.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11768
      Issue No: Vol. 17, No. 3 (2019)
       
  • Cluster-based Water Level Patterns Detection

    • Authors: Friska Natalia Ferdinand, Yustinus Soelistio, Ferry Vincenttius Ferdinand, I Made Murwantara
      Abstract: Indonesian Disaster Data and Information in 2016 showed that flood has reached a soaring 32.2% overall. In one of the common flood region (2016), Tangerang, the flood had impacted 30,949, and destroys more than 400 residentials. In spite of this dreadful fact, Tangerang has no systematically ways of detecting the flood patterns. Therefore, there is urgency for a system that is able to detect potential flood risks in Tangerang. This study explores a mean to systematically find flood patterns in Tangerang and attempt to visualize the risks based on 11 years of data on four major river stations within Tangerang vicinity. All the data obtained from Ciliwung Cisadane River Basin Center (BBWS) between 2009 until 2017 with total data of 368,184 rows. This study proposes an interactive dashboard based on the water level data covering rivers of Angke, Pesanggrahan, and Cisadane. Three clustering methods are implemented, the K-Medoids, DBScan, and x-means, to segregate the water level data, taken from four stations obtained from Ciliwung Cisadane River Basin Center (BBWS), into meaningfull periodic flood patterns. The output of this research is an interactive dashboard created based on the newly found patterns. The dashboard is designed to be simple and easy to use for non-technical persons. We believe that the output of this research could be implemented into the decision-making process taken by the Ciliwung Cisadane River Basin Center (BBWS) in order to improve countermeasure attempts on the potentially flooded areas.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11774
      Issue No: Vol. 17, No. 3 (2019)
       
  • Lightweight IoT Middleware for Rapid Application Development

    • Authors: A.karim Mohamed Ibrahim, Rozeha A. Rashid, A. Hadi Fikri A. Hamid, M. Adib Sarijari, Muhammad Ariff Baharudin
      Abstract: Sensors connected to the cloud services equipped with data analytics has created a plethora of new type of applications ranging from personal to an industrial level forming to what is known today as Internet of Things (IoT). IoT-based system follows a pattern of data collection, data analytics, automation, and system improvement recommendations. However, most applications would have its own unique requirements in terms of the type of the smart devices, communication technologies as well as its application provisioning service. In order to enable an IoT-based system, various services are commercially available that provide services such as backend-as-a-service (BaaS) and software-as-a-service (SaaS) hosted in the cloud. This, in turn, raises the issues of security and privacy. However there is no plug-and-play IoT middleware framework that could be deployed out of the box for on-premise server. This paper aims at providing a lightweight IoT middleware that can be used to enable IoT applications owned by the individuals or organizations that effectively securing the data on-premise or in remote server. Specifically, the middleware with a standardized application programming interface (API) that could adapt to the application requirements through high level abstraction and interacts with the application service provider is proposed. Each API endpoint would be secured using Access Control List (ACL) and easily integratable with any other modules to ensure the scalability of the system as well as easing system deployment. In addition, this middleware could be deployed in a distributed manner and coordinate among themselves to fulfil the application requirements. A middleware is presented in this paper with GET and POST requests that are lightweight in size with a footprint of less than 1 KB and a round trip time of less than 1 second to facilitate rapid application development by individuals or organizations for securing IoT resources.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11793
      Issue No: Vol. 17, No. 3 (2019)
       
  • Vehicle Detection Using Background Subtraction And Clustering Algorithms

    • Authors: Puguh Budi Prakoso, Yuslena Sari
      Abstract:  Intelligent Transportation System originated from problems caused by congestion then cross and synergy technology information with real-time and network simulation communication. Congestion then passes increasing worldwide as the effect of enhancement motorization, urbanization, growing population, and density residents. Congestion reduces efficiency or transportation infrastructure and improving time travel, pollution air and consumption ingredients burn. Video cameras play an important role in achieving the potential promised by Intelligent Transportation Systems. In particular, video tracking systems have been widely used in traffic data collection and event detection with tracking and analysis trajectory vehicle through processing image move. Focused on current vehicle tracking methods, this is limited to circumstances then mixed traffic. Research this propose OTSU, FCM and K-means methods in processing video image. OTSU is the algorithm used classically in segmentation picture then clustered pixels into two foreground and background groups. The clustering algorithm does not use supervision has successfully applied to some problems in pixels are FCM (Fuzzy C-Means) and K-means. So that will get the value of MSE on the clustering algorithm for the threshold in the background subtraction to perform tracking on moving objects  with varyinvariedg environmental conditions.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10144
      Issue No: Vol. 17, No. 3 (2019)
       
  • Architectural Design of IoT-Cloud Platform For Iot and Cloud Computing
           Integration

    • Authors: Adhitya Bhawiyuga, Dany Primanita Kartikasari, Kasyful Amron, Ocki Bagus Pratama, Moch. Wildan Habibi
      Abstract: An integration between the Internet of Things (IoT) and cloud computing can potentially leverage the utilization of both sides. As the IoT based system is mostly composed by the interconnection of pervasive and constrained devices, it can take a benefit of virtually unlimited resources of cloud entity i.e storage and computation services to store and process its sensed data. On the other hand, the cloud computing system may get benefit from IoT by broadening its reach to real world environment applications. In order to realize this idea, a cloud software platform is needed to provide an integration layer between the IoT and cloud computing taking into account the heterogenity of network communication protocols as well as the security and data management issues. In this study, an architectural design of IoT-cloud platform for IoT and cloud computing integration is presented. The proposed software platform can be decomposed into five main components namely cloud-to-device interface, authentication, data management, and cloud-to-user interface component. In general, the cloud-to-device interface acts as a data transmission endpoint between the whole cloud platform system and its IoT devices counterpart. Before a session of data transmission established, the communication interface contact the authentication component to make sure that the corresponding IoT device is legitimate before it allowed for sending the sensor data to cloud environment. Notice that a valid IoT device can be registered to the cloud system through web console component. The received sensor data are then collected in data storage component. Any stored data can be further analyzed by data processing component. User or any developed applications can then retrieve collected data, either raw or processed data, through API data access and web console.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.11786
      Issue No: Vol. 17, No. 3 (2019)
       
  • The Clustering Analysis of Learning Style on High School Student with
           Implementation Data Mining Method: k-Means and Fuzzy C-Means (Case Study:
           SMAN 1 Anggana)

    • Authors: Siti Lailiyah, Ekawati Yulsilviana, Reza Andrea
      Abstract: The inability of students to absorb the knowledge conveyed by the teacher is’nt caused by the inability of understanding and by the teacher which is’nt able to teach too, but because of the mismatch of learning styles between students and teachers, so that students feel uncomfortable in learning to a particular teacher. It also happens in senior high school (SHS/SMAN) 1 Anggana, so it is necessary to do this research, to analyze cluster (group) of student learning style by applying data mining method that is k-Means and Fuzzy C-means. The purpose was to know the effectiveness of this learning style cluster on the development of absorptive power and improving student achievement. The method used to cluster the learning style with data mining process starts from the data cleaning stage, data selection, data transformation, data mining, pattern evolution, and knowledge development.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v16i6.9101
      Issue No: Vol. 17, No. 3 (2019)
       
  • Design on Lung TB Detection System Based on Statistical Features of X-ray
           Image Histogram

    • Authors: Ratnasari Nur Rohmah
      Abstract: This paper presented the research result on the design of lung TB detection systems. The design consists of: image segmentation method, statistical feature image feature dan feature selection method, classifier design and training, and systems performance evaluation. We defined ROI template for image segmentation, examined two feature selection methods, and two minimum distance classifier. Based on experimental result, system purposed in this research consists of: image segmentation process using predefined ROI template, feature extraction using PCA transformation, and Mahalanobis distance classifier. This method worked fine for our dataset. Results also shown that bicubic interpolation in resizing image to get ROI image, have no significant effect on statistical histogram features. In the other hand, the shape of ROI image gave the significant effect in system accuracy. The best ROI template produced the best image feature measured to be used in classification process.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10546
      Issue No: Vol. 17, No. 3 (2019)
       
  • Internet of Things: Smart Garbage Monitoring System with Real Time
           Database

    • Authors: Riyan Hadi Putra, Feri Teja Kusuma, Tri Nopiani Damayanti, Dadan Nur Ramadan
      Abstract: Every single day, garbage is always produced and sometimes, due to the unbalance between high volume produced and the garbage volume transported to the landfill; it then leads to the buildup. To prevent any negative impact on environment, a system is needed to support the waste management process. Smart Garbage Monitoring System consists of two parts: portable garbage can and monitoring application using android smartphone. The use of ultrasonic sensor, GPS and GSM Module on the garbage can aims to provide the data on the garbage and send it to the real time database, in which the data will be processed by the monitoring application on smartphone to determine the time of garbage transport purposely to prevent any buildup. Test results showed the capability of the system in monitoring the garbage can with the minimum distance between the wastes by three meters. The information on the height level of garbage can be synchronized in real time to smartphone, with an average delay on the EDGE network of 4.57 seconds, HSPA + of 4.52 seconds and LTE of 3.85 seconds. 
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10121
      Issue No: Vol. 17, No. 3 (2019)
       
  • Adaptive Super-Twisting Nonsingular Terminal Sliding-Mode-Control:
           Application to Unmanned Aerial Manipulator

    • Authors: Samah Riache, Madjid Kidouche, Amar Rezoug
      Abstract: In this paper, a novel adaptive control approach for Unmanned Aerial Manipulators (UAMs) is proposed. The UAMs are a new configuration of the Unmanned Arial Vehicles (UAVs) which are characterized by several inhered nonlinearities, uncertainties and coupling.The studied UAM is a Quadrotor endowed with two degrees of freedom robotic arm. The main objectives of our contribution are to achieve both a tracking error convergence by avoiding any singularity problem and also the chattering amplitude attenuation in the presence of perturbations. Therefore, the proposed Adaptive Nonsingular Terminal Super Twisting controller (ANTSTW) consists of the hybridization of a Nonsingular Terminal Sliding Mode Control and an Adaptive Super Twisting. The adaptive law, which adjust the Super Twisting’s parameters, is obtained by using stability Lyapunov theorem. Simulation experiments in trajectory tracking mode were realized and compared with Nonsingular Terminal Super Twisting control to prove the superiority and the effectiveness of the proposed approach.
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10470
      Issue No: Vol. 17, No. 3 (2019)
       
  • Real-time Systems for Monitoring and Warning on Water Urban Rivers

    • Authors: Sabam Parjuangan, Rionaldi Ali, Ari Purnama
      Abstract: Currently, changes of the quality of river water occur quickly. The river is a place for garbage and waste disposal from various sources. One of the impacts provided by this is the poor health of river water users, such as poisoning, diarrhea, itching, and flooding. Addressing these issues it requires real-time monitoring. This study reveals the supervision of river water in urban areas by real-time systems utilizing pH sensors, turbidity sensors, and ultrasonic sensors (water level elevation detection) to determine urban river water quality. Sensory readings are transmitted via mobile networks, and displayed in web and sms applications. As a result, the system is able to monitor the pH, turbidity, and water levels100% accurate. While the information is received by the end-users more real-time via sms than web pages. The delay time of sensor reading to the web applications and SMS was 2295 seconds (pH), 1770nseconds (turbidity), and 392 seconds (ultrasonic).
      PubDate: 2019-06-01
      DOI: 10.12928/telkomnika.v17i3.10397
      Issue No: Vol. 17, No. 3 (2019)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
Home (Search)
Subjects A-Z
Publishers A-Z
Customise
APIs
Your IP address: 18.212.206.217
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-