cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 28 Documents
Search results for , issue "Vol 12, No 3: September 2014" : 28 Documents clear
A Cognitive Radio Spectrum Sensing Algorithm to Improve Energy Detection at Low SNR Agus Subekti; Sugihartono Sugihartono; Nana Rachmana S; Andriyan B.Suksmono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.101

Abstract

Energy detection is among the most popular spectrum sensing method for spectrum sensing due its low complexity. Unfortunately, its performance is poor at low SNR. In this paper we proposed a spectrum sensing method for cognitive radio network that improves the performance of energy detection. The proposed method based on distribution analysis using kurtosis as test statistic. This comes from the fact that distribution of received signal when a channel is occupied will be different from vacant channel. Noise tends to have a Gaussian distribution. Signal which faces multipath fading during the transmission way will have non Gaussian distribution. Sensing algorithm was tested using captured DTV signal. Result shows that our method performs well at low SNR. It achieves probability of detection of 90 % for 10 % Probability of false alarm for low SNR, below -20 dB.
Simple HAWT Prototype Efficiency at Small Scale Wind Speed Melda Latif; Mumuh Muharam; Yonggi Puriza; Gusriwandi Gusriwandi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.91

Abstract

Nowadays, the wind energy research for alternatif anergy has been progress. Wind energy can be found if the wind turbine is available. Based on rotation axis, wind turbin has been classified to Horizontal Axis Wind Turbine (HAWT) and Vertical Axis Wind Turbine (VAWT). This paper explains  simple HAWT prototype to 200 ohm resistor and LED at small scale wind speed. The blade material is acrilic. This material property is light, no easy broken, no corrosive and easy to find it. The blade model is flat plate section. Rotor diameter is 1 meter. The research was did at the beach. Permanent magnet synchronous generator is used to change wind energy to electric energy. The result shows that the generator increase linearly with wind speed. Measured wind speed was 1.9 m/s to 3.9 m/s. Average efficiency of HAWT prototype was 6.2% at delta connected load and 3.7% at wye connected load.
Performance of Chaos-Based Encryption Algorithm for Digital Image Suryadi MT; Eva Nurpeti
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.106

Abstract

Presentation of information in digital form is highly vulnerable againts information abusing. Digital image is one of digital information which is frequently becomes a target of crime. Therefore, reliable, secure, and fast security technique are required in digital image information. In this study, chaos-based encryption algorithm for digital image is built to improve endurance from brute force and known plaintext attack. The algorithm using logistic map as a random number generator for key stream. According to test and analysis, this algorithm has key space of , key sensitivity up to , the key stream is proved random, and the distribution of pixels value from encrypted image is proved uniform. So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack and also known plaintext attack.
Matrix Mask Overlapping and Convolution Eight Directions for Blood Vessel Segmentation on Fundus Retinal Image Arif Muntasa; Indah Agustien Sirajudin; Moch Kautsar Sophan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.97

Abstract

Diabetic Retinopathy is one of the diseases that have the effect of a high mortality rate after heart disease and cancer.  However, the disease can be early detected through blood vessels and the optic nerve head in Fundus images. Blood vessels separation of the optic nerve head required high effort when it is conducted manually, therefore it is necessary that the appropriate method to perform segmentation of the object. Level Set method is well-known as object segmentation method based on object deformable. However, the methods have the disadvantage; it requires initialization before the segmentation process. In this research, segmentation method without initialization process is proposed. The segmentation is conducted by using the maximum value selection results of convolution 8 directions. Experimental results show that, proposed method has obtained 89.48% accuracy. Segmentation errors are caused by small branches, where they are not connected, so that the objects are supposed as noises
Batik Image Retrieval Based on Color Difference Histogram and Gray Level Co-Occurrence Matrix Agus Eko Minarno; Nanik Suciati
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.80

Abstract

Study in batik images retrieval is still challenging until today. One of the methods for this problem is using Color Difference Histogram (CDH) which is based on the difference of color features and edge orientation features. However, CDH is only utilizing local features instead of global features; consequently it cannot represent images globally. We suggest that by adding global features for batik images retrieval, the precision will increase. Therefore, in this study, we combine the use of modified CDH to define local features and the use of Gray Level Co-occurrence Matrix (GLCM) to define global features. The modified CDH is performed by changing the size of image quantization, so it can reduce the number of features. Features that detected by GLCM are energy, entropy, contrast and correlation. In this study, we use 300 batik images which are consisted of 50 classes and 6 images in each class. The experiment result shows that the proposed method is able to raise 96.5% of precision rate which is 3.5% higher than the use of CDH only. The proposed method is extracting a smaller number of features; however it performs better for batik images retrieval. This indicates that the use of GLCM is effective combined with CDH.
Maximization Network Throughput based on Maximal Flow for Single-Source Two-Destinations Multicast Huanlin Liu; Ruiyan Li; Liang Qin; Sheng Huang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.102

Abstract

For guaranteeing all multicast destination nodes receiving the source information with their maximal flow respectively and obtaining the network maximal throughput, a heuristic algorithm based on network coding, Maximal Flow for Single-source Two-destinations Multicast (MFSTM) is proposed to maximize the network throughput. By calculating the each destination’s maximal flow, the number of link-disjoint paths which equals to destination’s maximal flow, are searched for each destination to construct the network coding graph. A heuristic algorithm based on network coding is designed to delete the redundant link in the network coding graph and guarantee the network throughput maximization. Comparing the traditional maximal multicast stream algorithm based on network coding, the simulation results show that the MFSTM algorithm makes two destinations receive the information at the speed of their maximal flow respectively, and decode the source node information at each destination node successfully.
Wireless Power Transfer by Using Solar Energy M. Fareq; M. Fitra; M. Irwanto; Syafruddin HS; N. Gomesh; M. Rozailan; M. Arinal; Y.M. Irwan; J. Zarinatul
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.93

Abstract

This project is based on how to transmit electrical power without wires, using solar energy as source. The power is transferred wirelessly through an inductive coupling method. With this new discovery, we no longer need complicated with the cable passing around us, with Power without Wires (Wireless Electricity) we can use our electronic equipment such as TV, MP3 Player, HiFi Headset; everything works without the use of batteries or electrical wiring. In fact, mobile devices such as laptop batteries, mobile phone, or digital camera filled automatically, so once you enter the house, of course without having to plug in the cable. The project is offer to study and fabricate wireless power transfer by using inductive coupling. Experiments have been conducted and the wireless power transfer using inductive coupling can be transfer energy up to 10 cm.
Failure Mechanism Analysis and Failure Number Prediction of Wind Turbine Blades Yu Chun-yu; Guo Jian-ying; Xin Shi-guang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.76

Abstract

Pertinent to the problems that wind turbine blades operate in complicated conditions, frequent failures and low replacement rate as well as rational inventory need, this paper, we build a fault tree model based on in-depth analysis of the failure causes. As the mechanical vibration of the wind turbine takes place first on the blades, the paper gives a detailed analysis to the Failure mechanism of blade vibration. Therefore the paper puts forward a dynamic prediction model of wind turbine blade failure number based on the grey theory. The relative error between its prediction and the field investigation data is less than 5%, meeting the actual needs of engineering and verifying the effectiveness and applicability of the proposed algorithm. It is of important engineering significance for it to provide a theoretical foundation for the failure analysis, failure research and inventory level of wind turbine blades.
Strain Transfer and Test Research of Stick-up Fiber Bragg Grating Sensors Wang Bing; Wang Xiaoli
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.107

Abstract

Because of the flaws of fiber Bragg grating, needs to set up protective layer between the structure and fiber layer to protect the fiber grating. Firstly the strain transferring rules of the FBG sensors is analyzed, carefully analyze the main factors influencing the fiber Bragg grating strain sensor transfer, and analyze concretely effect of each factor, the fiber Bragg grating sensors embedded angle deviation is analyzed and influence on the measured results. Finally, by a series of repeated, coherent, dynamic and fatigue characteristic test, it is proved that the FBG sensor has applied value
The use of ON-OFF and ANN Controllers for Automated Irrigation System Model Based on Penman-Monteith Evapotranspiration Susilo Adi Widyanto; Achmad Widodo; Achmad Hidayatno; Suwoko Suwoko
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.440

Abstract

The climate change tends to be extreme condition that directly affects on decreasing agriculture production.  Therefore, application of automated system in agriculture activities is the potential issue which must be considered. This paper presents ON-OFF and ANN controllers which are applied to the automated irrigation system. Controlling irrigation system used a calculated Penman-Monteith evapotranspiration and a reference of soil moisture as the compared input. Input parameters of the evapotranspiration included temperature, heat radiation, atmosphere pressure and wind speed. The use of feed forward ANN included 1 input layer with 15 neurons and 2 hidden layers with 10 and 5 neurons and 1 output layer and 1 input layer, 2 hidden layers with 96 and 1 neurons and 1 output layer, errors are 14.3% and 3.9%, respectively. Error of the ON-OFF controller with sampling time of 0.05 second is equal to the error of ANN controller. The performance of such controllers were evaluated and compared based on error of both controllers.  The simulation result of ON-OFF controller was used as the reference of controller development based on ATmega 8 microcontroller. The simulation results show that the error of the ON-OFF controller can be easily adjusted by setting the sampling time of the dead zone discretization.

Page 1 of 3 | Total Record : 28


Filter by Year

2014 2014


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue