{"title":"Evolutionary programming approach for securing medical images using genetic algorithm and standard deviation","authors":"Shihab A. Shawkat, Najiba Tagougui, M. Kherallah","doi":"10.12928/telkomnika.v21i6.25231","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i6.25231","url":null,"abstract":"ABSTRACT","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"110 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138622979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Umi Nabilah Badrol Said, M. R. Baharon, M. Z. Mas'ud, Ariff Idris, Noor Azurati Ahmad Salleh
{"title":"Blockchain-IoT supply chain: systematic literature review","authors":"Umi Nabilah Badrol Said, M. R. Baharon, M. Z. Mas'ud, Ariff Idris, Noor Azurati Ahmad Salleh","doi":"10.12928/telkomnika.v21i5.24699","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24699","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45200029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Iftikhar, Bandar Alluhaybi, M. Suliman, Ammar Saeed, Kiran Fatima
{"title":"Amazon products reviews classification based on machine learning, deep learning methods and BERT","authors":"S. Iftikhar, Bandar Alluhaybi, M. Suliman, Ammar Saeed, Kiran Fatima","doi":"10.12928/telkomnika.v21i5.24046","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24046","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45811039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boualem Mansouri, Abdelkader Khobzaoui, M. Damou, M. Chetioui, A. Boudkhil
{"title":"Adaptive segmentation algorithm based on level set model in medical imaging","authors":"Boualem Mansouri, Abdelkader Khobzaoui, M. Damou, M. Chetioui, A. Boudkhil","doi":"10.12928/telkomnika.v21i5.22365","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.22365","url":null,"abstract":",","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48246144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zachaeus K. Adeyemo, Emmanuel B. Ajulo, Damilare O Akande, Hammed O. Lasisi, Samson I. Ojo
{"title":"Improving the detection of intrusion in vehicular ad-hoc networks with modified identity-based cryptosystem","authors":"Zachaeus K. Adeyemo, Emmanuel B. Ajulo, Damilare O Akande, Hammed O. Lasisi, Samson I. Ojo","doi":"10.12928/telkomnika.v21i5.22207","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.22207","url":null,"abstract":"Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135063726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Januar Al Amien, Hadhrami Ab Ghani, Nurul Izrin Md Saleh, Edi Ismanto, Rahmad Gunawan
{"title":"Intrusion detection system for imbalance ratio class using weighted XGBoost classifier","authors":"Januar Al Amien, Hadhrami Ab Ghani, Nurul Izrin Md Saleh, Edi Ismanto, Rahmad Gunawan","doi":"10.12928/telkomnika.v21i5.24735","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24735","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45422433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Waleed A. Hammood, Afrig Aminuddin, Omar A. Hammood, Khairul Hafezad Abdullah, Davi Sofyan, Majid Rahardi
{"title":"Conceptual model of internet banking adoption with perceived risk and trust factors","authors":"Waleed A. Hammood, Afrig Aminuddin, Omar A. Hammood, Khairul Hafezad Abdullah, Davi Sofyan, Majid Rahardi","doi":"10.12928/telkomnika.v21i5.24581","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24581","url":null,"abstract":"Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135063725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Grace Mary Kanaga Edward, Angela Esther Rajakumar, K. Raimond, Anitha Jeevanayagam
{"title":"Automatic channel selection using shuffled frog leaping algorithm for EEG based addiction detection","authors":"Grace Mary Kanaga Edward, Angela Esther Rajakumar, K. Raimond, Anitha Jeevanayagam","doi":"10.12928/telkomnika.v21i5.23172","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.23172","url":null,"abstract":"","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46679544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation of a LoRa-based system for warning of forest fire","authors":"Tuyen Phong Truong, Quang Thien Tran, Phat Tan Le","doi":"10.12928/telkomnika.v21i5.24712","DOIUrl":"https://doi.org/10.12928/telkomnika.v21i5.24712","url":null,"abstract":"This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO 2 ) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.","PeriodicalId":38281,"journal":{"name":"Telkomnika (Telecommunication Computing Electronics and Control)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135010331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}