Vol. 20, No. 1 2022

Dublin Core

Title

Vol. 20, No. 1 2022

Collection Items

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Characteristic&#039;s analysis of associative switching system
This paper introduced new method and model of telecommunication
switching system design which can be applied to wavelength-division
multiplexing (WDM) optical networks, circuit-switching networks or virtual channel/path connections in an…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Enhancement detection distributed denial of service attacks using hybrid n-gram techniques
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect DDoS attacks, several methods can be used. One of the methods used in this research is the n-gram technique. The n-gram approach analyzes the payload…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Design and analysis of single layer quantum dot-cellular automata based 1- bit comparators
Quantum dot-cellular automata (QCA) technology has recently emerged as a potential candidate for the design of nanometer-scale computational circuits. In digital logic circuits, the comparator is the basic building block for comparing two binary…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Natural language processing and machine learning based cyberbullying detection for Bangla and Romanized Bangla texts
The popularity of social media has been increasing tremendously in recent times and thus cyberbullying towards people has also increased at an alarming rate. Many cyberbullying texts can be found in the comment sections of many well-known Bangladeshi…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Improving the usability of faceted exploratory search tools
For some years now, the faceted exploratory search has faced tremendous challenges to devise a simple, instantly understandable, and usable user interface to explore the vast amount of data and information available on the Internet. In our previous…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Comparative analysis of various machine learning algorithms for ransomware detection
Recently, the ransomware attack posed a serious threat that targets a wide range of organizations and individuals for financial gain. So, there is a real need to initiate more innovative methods that are capable of proactively detect and prevent this…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Agriculture data visualization and analysis using data mining techniques: application of unsupervised machine learning
Unsupervised machine learning is one of the accepted platforms for applying a broad data analytics challenge that involves the way to identify secret trends, unexplained associations, and other significant data from a wide dispersed dataset. The…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Exploiting performance gap among two users in reconfigurable intelligent surfaces-aided wireless systems
In this work, we study the outage performance of a reconfigurable intelligent surfaces (RIS)-aided wireless systems in the presence of non-orthogonal multiple access (NOMA). In particular, different power factors are allocated to users which belong a…

TELKOMNIKA Telecommunication, Computing, Electronics and Control <br /><br />
Design of multiple-input and multiple-output antenna for modern wireless applications
In this paper, multiple-input and multiple-output (MIMO) antennas are
designed and simulated. The designed antennas are compact double-sided printed microstrip patch antennas and fed by a microstrip line. These antennas are designed for 3.5 to 10…
View all 26 items

Collection Tree