cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 42 Documents
Search results for , issue "Vol 13, No 2: June 2015" : 42 Documents clear
Guaranteed Cost Control for Uncertain Neutral Systems with a Minimal Order Observer Erwin Susanto; Junartho Halomoan; Mitsuaki Ishitobi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.875

Abstract

This paper presents a design scheme of a minimal order observer-based guaranteed cost controller for uncertain neutral systems, in which some state variables can not be measured. The uncertainties are assumed to be norm-bounded. The initial state is assumed unknown but their mean and covariance are assumed known. A sufficient condition for robust stability analysis and robust stabilization are derived via linear matrix inequalities (LMIs). To show the advantage of the proposed method, a numerical example is given.
Test Generation Algorithm Based on SVM with compressing Sample Space Methods Ting Long; Jiang Shiqi; Hang Luo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1473

Abstract

Test generation algorithm based on the SVM (support vector machine) generates test signals derived from the sample space of the output responses of the analog DUT. When the responses of the normal circuits are similar to those of the faulty circuits (i.e., the latter have only small parametric faults), the sample space is mixed and traditional algorithms have difficulty distinguishing the two groups. However, the SVM provides an effective result. The sample space contains redundant data, because successive impulse-response samples may get quite close. The redundancy will waste the needless computational load. So we propose three difference methods to compress the sample space. The compressing sample space methods are Equidistant compressional method, k-nearest neighbors method and maximal difference method. Numerical experiments prove that maximal difference method can ensure the precision of the test generation.
Adaptive Energy-aware Cluster Based Routing Protocol for Mobile Ad Hoc Networks Fatemeh Hakimifar; Seyed-Amin Hosseini-Seno; Mohammad Hossein Moattar; Thair Al-Dala’in; Rahmat Budiarto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1438

Abstract

Due to the downside characteristics of Mobile Ad hoc Networks (MANETs) such as dynamic topology and energy consumption and control overhead, network clustering is one of the promising solutions. Cluster Based Routing Protocol (CBRP) is a robust and scalable routing protocol for MANETs. Clustering formation algorithm used in CBRP is a variation of simple lowest-ID algorithm in which the node with a lowest ID among its neighbors is elected as the Cluster head. Neglecting mobility and energy for selecting cluster head is one of the weakness points of the algorithm. In order to increase stability of the network and to prevent re-clustering an adaptive energy-aware Cluster Based Routing Protocol (AECBRP) is proposed. Two algorithms have been introduced in AECBRP as enhancement to the CBRP: improving the cluster formation algorithm by considering relative mobility, residual energy and connectivity degree metrics, and add in an efficient cluster maintenance algorithm based on the aggregate energy metric of cluster head. Using NS-2 we evaluate the rate of cluster-head changes, the normalization routing overhead and the packet delivery ratio. Comparisons denote that the proposed AECBRP has better performances with respect to the original CBRP and Cross-CBRP.
Iris Image Recognition Based on Independent Component Analysis and Support Vector Machine Muhammad Fachrurrozi; Muhammad Mujtahid
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1171

Abstract

Iris has a very unique texture and pattern, different for each individual and the pattern will remain stable, making it possible as biometric technology called iris recognition. In this paper, 150 iris image from Dept. Computer Science, Palacky University in Olomouc iris database used for iris recognition based on independent component analysis and support vector machine. There are three steps for developing this research namely, image preprocessing, feature extraction and recognition. First step is image preprocessing in order to get the iris region from eye image. Second is feature extraction by using independent component analysis in order to get the feature from iris image. Support vector machine (SVM) is used for iris classification and recognition. In the end of this experimental, the implement method will evaluated based upon Genuine Acceptance Rate (GAR). Experimental result shown that the recognize rate from variation of training data is 52% with one data train, 73% with two data train and 90% three data train. From experimental result also shows that this technique produces good performance.  
International Telecommunication Union-Radiocommunication Sector (ITU-R) P.837-6 and P.837-7 performance to estimate Indonesian rainfall Yonghua Wang; Pin Wan; Qin Deng; Yuli Fu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1431

Abstract

The cognitive radio technology can improve the efficiency of spectrum utilization byproviding dynamic spectrum access to unoccupied frequency bands. Spectrum sensing is one of the key technologies of cognitive radio networks. The spectrum sensing performance of cognitive radio networks will be greatly reduced in the low SNR environment, especially when using energy detection. Because the stochastic resonance system can improve the energy detection system output SNR .To improve the spectrum sensing performance of cognitive radio networks in the low SNR environment, the stochastic resonance of the single-mode nonlinear optical system is applied to spectrum sensing based on the energy detection method in this paper. The simulation results show that in the low SNR environment, the energy detection based on stochastic resonance of the single-mode nonlinear optical system has better performance than traditional energy detection.
Battery State-of-Charge Estimation with Extended Kalman-Filter using Third-Order Thevenin Model Low Wen Yao; Wirun A/l Prayun; Mohd Junaidi Bin Abdul Aziz; Tole Sutikno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1467

Abstract

Lithium-ion battery has become the mainstream energy storage element of the electric vehicle. One of the challenges in electric vehicle development is the state-of-charge estimation of battery. Accurate estimation of state-of-charge is vital to indicate the remaining capacity of the battery and it will eventually maximize the battery performance and ensures the safe operation of the battery. This paper studied on the application of extended Kalman-filter and third order Thevenin equivalent circuit model in state-of-charge estimation of lithium ferro phosphate battery. Random test and pulse discharge test are conducted to obtain the accurate battery model. The simulation and experimental results are compared to validate the proposed state-of-charge estimation method.
Basal Study on Power Control Strategy for Fuel Cell/Battery Hybrid Vehicle Dingyue Chen; Xia Li; Lihao Chen; Yonghui Zhang; Li Yang; Songsong Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.987

Abstract

In order to enhance the fuel economy of hybrid vehicle and increase the mileage of continuation of journey, the power control strategy (PCS) is as significant as component sizing in achieving optimal fuel economy of the fuel cell/battery hybrid vehicle (FCBHV). The models of FCBHV structure and optimal power control strategy are developed by electric vehicle simulation software ADVISOR which uses a hybrid backward/forward approach. The results demonstrate that the proposed control strategy can satisfy the power requirement for two standard driving cycles and achieve the power distribution among various power sources. The comprehensive comparisons with the power tracking controller (PTC) which is wide adopted in ADVISOR verify that the proposed control strategy has better rationality and validity in terms of fuel economy and dynamic property in two standard driving cycles. Therefore, the proposed strategy will provide a novel approach for the advanced power control system of FCBHV.
Flicker Measurement and Grey Disaster Prediction of Grid-connected Wind Turbines Zhanqiang Zhang; Keqilao Meng; Li Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.993

Abstract

Grid-connected operation of large-scale wind turbines(WTs) will have an impact on power quality of electric power systems. Therefore, on the basis of analyzing the International Electrotechnical standard IEC 61400-21, we described the measurement, evaluation method of the flicker of WTs and proposed the method of grey disaster prediction.Active power, reactive power, flicker coefficient and flicker severity of the WTs were tested on the actual wind farm according to the IEC 61400-21 standard. We believed that the flicker severity was a disaster, so used the grey disaster prediction to predict the occurrence time of excessive flicker.Analysis of the test data of flicker was necessary,which could determine the Upper disaster threshold of the flicker.The disaster sequence was made up of the excessive flicker values. The date sequence was extracted from the disaster sequence. Establishing GM (1,1) model for the date sequence was to predict the future disaster date sequence.The experimental results showed that the relative accuracy of the disaster prediction model reached 94.87%, which was suitable for long-term flicker disaster prediction.
Determining Trust Scope Attributes Using Goodness of Fit Test: A Survey Titin Pramiyati; Iping Supriana; Ayu Purwarianti
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.649

Abstract

Indonesian, as one of the countries with high number of internet users has the potential to serve as the place with great information resources. However, these resources must be accompanied by the availability of dependable information. Information trustworthiness can be obtained by assessing the confidence level (trust) of the source of information. This can be determined by using trust scope attributes. Hence, in this study, we intended to establish the trust scope attributes by means of utilizing the ones contained in the User Profile provided by social media; in this case Facebook, Google+, Twitter, and Linkedin. We carried out the research by conducting four stages namely data collection, attributes grouping, attribute selection, and surveys. A survey was then distributed to 257 randomly selected respondents (divided into two clusters: civilians and military officers) to seek for their opinions in terms of what attributes were considered to be crucial in defining the believability of an information source. Chi-square Goodness of fit Test was conducted to compare observed data with data we would expect to obtain. The results of the research suggested that there was similar judgment in terms of dictating source of information trustworthiness chosen by the research participants with the attributes provided by trust scope category. In this research, both civilians and military officer clusters concurrently perceived that educational background was the most dependable attribute.
Effect of Underlap and its Soft Error Performance in 30 nm Junctionless-based 6T-SRAM Cell Chitra Pandy; Ramakrishnan Narayanan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1298

Abstract

As CMOS device is scaling down significantly, the sensitivity of Integrated Circuits (ICs) to Single Event Upset (SEU) radiation increases. The Sensitivity of ICs to  soft errors emerge as reliability threat which motivates  significant interest in the development of various techniques both at the device and circuit level for SEU hardness in SRAM memories. To facilitate the scaling the concept of underlap Gate-Source/Drain (G-S/D) was suggested in the literature. Lun is one of the sensitive geometrical parameter considered to differ from 1 nm to 5 nm in a SEU radiating environment. The effect of Gate-Source/Drain underlap (Lun) on soft error performance in 30 nm Junctionless Transistor (JLT) based on 6T-SRAM cell has been examined through extensive mixed mode-device and circuit simulations using TCAD. The critical dose observed in JLT based 6T-SRAM with Lun ranging from 1 nm to 5 nm to flip the cell is given by Linear Energy Transfer (LET) between 0.05 to 0.06 pC/µm. The simulation result analyzes electrical and SEU radiation parameters to study its impact on JLT based 6T-SRAM cell.

Filter by Year

2015 2015


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue