Vol. 20, No. 1 2022
Dublin Core
Title
Vol. 20, No. 1 2022
Collection Items
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Characteristic's analysis of associative switching system
This paper introduced new method and model of telecommunication
switching system design which can be applied to wavelength-division
multiplexing (WDM) optical networks, circuit-switching networks or virtual channel/path connections in an…
switching system design which can be applied to wavelength-division
multiplexing (WDM) optical networks, circuit-switching networks or virtual channel/path connections in an…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Enhancement detection distributed denial of service attacks using hybrid n-gram techniques
Distributed denial of service (DDoS) attacks have always been a concern of cyber experts. To detect DDoS attacks, several methods can be used. One of the methods used in this research is the n-gram technique. The n-gram approach analyzes the payload…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Design and analysis of single layer quantum dot-cellular automata based 1- bit comparators
Quantum dot-cellular automata (QCA) technology has recently emerged as a potential candidate for the design of nanometer-scale computational circuits. In digital logic circuits, the comparator is the basic building block for comparing two binary…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Natural language processing and machine learning based cyberbullying detection for Bangla and Romanized Bangla texts
The popularity of social media has been increasing tremendously in recent times and thus cyberbullying towards people has also increased at an alarming rate. Many cyberbullying texts can be found in the comment sections of many well-known Bangladeshi…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Improving the usability of faceted exploratory search tools
For some years now, the faceted exploratory search has faced tremendous challenges to devise a simple, instantly understandable, and usable user interface to explore the vast amount of data and information available on the Internet. In our previous…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Comparative analysis of various machine learning algorithms for ransomware detection
Recently, the ransomware attack posed a serious threat that targets a wide range of organizations and individuals for financial gain. So, there is a real need to initiate more innovative methods that are capable of proactively detect and prevent this…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Agriculture data visualization and analysis using data mining techniques: application of unsupervised machine learning
Unsupervised machine learning is one of the accepted platforms for applying a broad data analytics challenge that involves the way to identify secret trends, unexplained associations, and other significant data from a wide dispersed dataset. The…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Exploiting performance gap among two users in reconfigurable intelligent surfaces-aided wireless systems
In this work, we study the outage performance of a reconfigurable intelligent surfaces (RIS)-aided wireless systems in the presence of non-orthogonal multiple access (NOMA). In particular, different power factors are allocated to users which belong a…
TELKOMNIKA Telecommunication, Computing, Electronics and Control
Design of multiple-input and multiple-output antenna for modern wireless applications
In this paper, multiple-input and multiple-output (MIMO) antennas are
designed and simulated. The designed antennas are compact double-sided printed microstrip patch antennas and fed by a microstrip line. These antennas are designed for 3.5 to 10…
designed and simulated. The designed antennas are compact double-sided printed microstrip patch antennas and fed by a microstrip line. These antennas are designed for 3.5 to 10…