cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 28 Documents
Search results for , issue "Vol 12, No 2: June 2014" : 28 Documents clear
A New Clustering Algorithm Using Links' Weight to Decrease Consumed Energy in MANETs Abbas Afsharfarnia; Abbas Karimi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.59

Abstract

One of the most important problems of clustering algorithms in mobile ad-hoc networks (MANETs) is the relatively low stability in generated clusters which are resulted by rapid clusters destruction and high energy consumption in performing the re-clustering processes. Many algorithms have been provided to increase the clusters stability of which the most significant are weight-based algorithms. In weight-based algorithms, only limited information of each node is used to determine its weight and it causes that the best possible option for cluster-head is not selected. The purpose of this paper is providing one weight-based algorithm in which each node's weight determination is performed not only by using its node information but also its neighbor’s nodes information and this work is performed by determining the links' weight between nodes that provide connections between nodes. Via this method, the best possible options can be selected as cluster-head. In simulations and performed experiments, it is revealed that the generated clusters by our proposed algorithms have very high stability.
Low Mutual Coupling Dualband MIMO Microstrip Antenna with Air Gap Parasitic Yuli Kurnia Ningsih; Rastanto Hadinegoro
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.50

Abstract

Long Term Evolution (LTE) is a standard for wireless communication of high-speed data for mobile phones and data terminals. Due to the LTE standard covers a range of many different bands in each country, therefore an antenna with more than one frequency bands become one of the most important needs in LTE antenna. In this paper, a novel triangular dual band MIMO (2x2) antenna with coplanar waveguide (CPW) fed is proposed to be used for LTE application. The proposed MIMO antenna is able to work in dual frequency that will be implemented in Indonesia at 1.8GHz and 2.35GHz. To obtain the optimum design, the characteristic of proposed antenna are numerically investigated through the physical parameters of antenna. The results show that proposed antenna has a compact size and a bandwidth of 100 MHz which is suitable for LTE application
Searching and Visualization of References in Research Documents Firnas Nadirman; Ahmad Ridha; Annisa Annisa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.74

Abstract

This research aims to develop a module for information retrieval that can trace references from bibliography entries of research documents, specifically those based on Bogor Agricultural University (IPB)’s writing guidelines. A total of 242 research documents in PDF from the Department of Computer Science IPB were used to generate parsing patterns to extract the bibliography entries. With modified ParaTools, automatic extraction of bibliography entries was performed on text files generated from the PDF files. The entries are stored in a database that is used to visualize author relationship as graphs. This module is supplemented by an information retrieval system based on Sphinx search system and also provides information of authors’ publications and citations. Evaluation showed that (1) bibliography entry extraction missed only 5.37% bibliography entries caused by incorrect bibliography formatting, (2) 91.54% bibliography entry attributes could be identified correctly, and (3) 90.31% entries were successfully connected to other documents.
Measuring Information Security Awareness of Indonesian Smartphone Users Puspita Kencana Sari; Candiwan Candiwan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.64

Abstract

One of information security management elements is information security awareness program. Usually, this programs only involve the employees within the organization. Some organizations also consider security awareness for some parties outside the organization like providers, vendors, and contractors. This paper add consumers as variable to be considered in information security awareness program as there are also some threats for organization through them. Information security awareness will be measured from user’s knowledge, behavior, and attitude of five information security focus areas in telecommunication, especially related with smartphone users as one segment of telecommunication provider. For smartphone users, information security threats not only from Internet, but also by phone call or texting. Therefore, focus area in this research consist of adhere to security policy, protect personal data, fraud/spam SMS, mobile application, and report for security incident. This research use analytic hierarcy process (AHP) method to measure the information security awareness level from smartphone users. In total, the result indicated that awareness level is good (80%). Although knowledge and attitude dimension are in good criteria of awareness level, but behaviour dimension is average. It can be a reason why there are still many information security breach against smartphone user despite good awareness level.
Additional Resource Allocation for improving Fairness in WiMAX Khalid Mahmood Awan; Abdul Hanan Abdullah; Khalid Hussain
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.55

Abstract

IEEE 802.16 standard provides resources to both service classes Constant Bit Rate (CBR) and Variable Bit Rate (VBR). Both of these services required enough resources to transmit data efficiently.Considering available literature there is a gap to provide additional resources for fulfillment of the required service class.In this paper we propose a Service Based Fair Resource Allocation (SBFRA) Mechansim, for evaluating the required service from Subscriber (SS) along with the channel condition. Our proposed model evaluates, for providing the required service to SS how much additional resource will be required. In this model we introduced Priority Queue Scheduling Methodology for providing additional resources as per channel condition. In this paper we made comparison with and without proposed model on both traffic, CBR and VBR. We experiment that our proposed model manages the user request by providing them additional resources as required for satisfaction. Their request handled in Priority Queue Scheduling based mechanism. Results shows, that we achieve improvement by providing the additional resource on fair scheduling basis. To achieve the required performance for fairness we have to compromise on with delay.
Evaluation Research of Traction Motor Performance for Mine Dump Truck Based on Rough Set Theory HuiLai Sun; Chun Jin; Shuyang Zheng; Haiyong Tian
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.46

Abstract

This paper presents the traction motor evaluation method depending on the electric transmission energy transfer characteristics and different source of supply, including motor manufactures, diesel turbine manufacturers, wheel side reducer manufacturers and electric drive system integrated manufacturers. 9 evaluations are proposed in 3 levels from the motor body and control performance, electric drive system coordinate index, driving conditions and specific cycle. Motor performance evaluation system is published by the means of electric transmission tests and computer simulation platform, using rough set theory. Experimental results show that the model can accurate evaluation of state of the traction motor, Evaluation of the accuracy is better than the subjective weighting analysis, verifying the integrity and usefulness of this valuation method. At the same time, the comprehensive evaluations index of permanent magnet synchronous motors is high, it has important research value. 
Information Interchange Layer based on Classification of Information Use (IU) Albarda Albarda; Suhono Harso Supangkat; Kuspriyanto Kuspriyanto; Jaka Sembiring
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.70

Abstract

Information characteristics in classification of IU directly related to aspects of information usage by user in enterprise to accomplish their activities. Feature extraction from information usage in three layer of enterprise management used as parameter for this characteristic. Characteristics and dimension applied to develop middle-ware system (called Information Interchange Layer) that bridges a common issue ie information silo, to optimize a services of information resources in enterprise
Availability Analysis of Predictive Hybrid M-Out-of-N Systems Abbas Karimi; Faraneh Zarafshan; S.A.R Al-Hadad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.60

Abstract

In m-out-of-n system, if m-out-of-n modules agree, system can report consensus; otherwise, the system fails. On the other hand, in predictive hybrid system if there is no agreement, a history record of previous successful result(s) is used to predict the output. In order to analyze the availability of predictive hybrid redundancy system, Markov modeling is utilized. By using Markov model of the system in steady state, the availability is derived and compared with m-out-of-n system. The results of simulation demonstrated that the availability of predictive hybrid system is higher than m-out-of-n system especially for large m.
Information Technology Governance Framework in the Public Sector Organizations Lanto Ningrayati Amali; M. Mahmuddin; Mazida Ahmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.51

Abstract

This paper discusses the framework of IT (Information Technology) governance in the public sector organizations and the factors that contribute to the implementation of IT governance in the province of Gorontalo, Indonesia. The problem that occurs is the absence of such a framework which can provide the basis, functions and limits for the efficient use of IT resources, IT strategic alignment and the management of risk in public organizations. Descriptive approach used to identify the processes and the factors that contribute to the implementation of IT governance. This study shows that the form of the IT governance framework ensuring success is related to achieving organizational goals, strategic alignment, resource management, and risk management in the Indonesian public sector, especially to the province of Gorontalo. The strategic role of IT governance can be an effective solution for making more consistent and transparent decisions about strategies and IT investments in public sectors.
Multi-focus Image Fusion with Sparse Feature Based Pulse Coupled Neural Network Yongxin Zhang; Li Chen; Zhihua Zhao; Jian Jia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.66

Abstract

In order to better extract the focused regions and effectively improve the quality of the fused image, a novel multi-focus image fusion scheme with sparse feature based pulse coupled neural network (PCNN) is proposed. The registered source images are decomposed into principal matrices and sparse matrices by robust principal component analysis (RPCA). The salient features of the sparse matrices construct the sparse feature space of the source images. The sparse features are used to motivate the PCNN neurons. The focused regions of the source images are detected by the output of the PCNN and integrated to construct the final fused image. Experimental results show that the proposed scheme works better in extracting the focused regions and improving the fusion quality compared to the other existing fusion methods in both spatial and transform domain.

Page 1 of 3 | Total Record : 28


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue