cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 63 Documents
Search results for , issue "Vol 17, No 3: June 2019" : 63 Documents clear
Risk assessment of information production using extended risk matrix approach Jaka Sembiring; Fitasari Wiharni
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10050

Abstract

In many cases poor information quality appears mainly due to in-effectiveness of information management including information production and delivery. Where this situation poses a certain risk. A holistic information risk management model has been previously proposed. But the model has some limitations especially on risk calculation and risk priority ranking as the model does not consider existing control effectiveness. In this paper, a new risk assessment method is proposed in order to improve the model of total impact of risks and to improve the accuracy of risk priority ranking by modifying the extended risk matrix approach (RMA) where we take into account the existing control effectiveness. Using our approach by adding a new dimension on extended RMA. We are able to improve the accuracy (7.15%) and reduced the ambiguity (1.34) of assessment results on real cases illustration.
Bandwidth enhancement of compact microstrip rectangular antennas for UWB applications S. Elajoumi; A. Tajmouati; J. Zbitou; A. Errkik; A. M. Sanchez; M. Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9184

Abstract

In this paper design of microstrip patch antennas are presented for ultra wideband (UWB) applications. The designed antennas have good matching input impedance in a wide frequency band covering the UWB frequency band which is defined by the FCC. The proposed antennas consist of rectangular patch which is fed by 50Ω microstrip line. These antennas are investigated and optimized by using CST microwave studio, they are validated by using another electromagnetic solver HFSS. The proposed antennas are designed and optimized taking into account the optimized of the ground by using Defected Ground Structure (DGS) in order to improve the frequency band of microstrip antenna. Hence, the impedance and surface current of the antenna structures are affected by DGS. As will be seen, the operation bandwidth of the proposed antennas is from 3 to 15 GHz (return loss≤-10 dB), corresponding to wide input impedance bandwidth (133.33%), with stable omnidirectional radiation patterns and important gain. A good agreement has been obtained between simulation and measurement results in term of bandwidth clearly show the validity of the proposed structures. These antennas are useful for UWB applications, may be able to potentially minimize frequency interference from many wireless technologies i.e WLAN, WiMAX. Details of the antennas have been investigated numerically and experimentally.
K-Nearest neighbor algorithm on implicit feedback to determine SOP Muhammad Yusril Helmi Setyawan; Rolly Maulana Awangga; Nadia Ayu Lestari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12436

Abstract

The availability of a lot of existing Standard Operating Procedures (SOP) document information, users often need time to find SOPs that fit their preference. Therefore, this requires a recommendation system based on user content consumption by personalized usage logs to support the establishment of SOP documents managed according to user preferences. The k-nearest neighbor (KNN) algorithm is used to identify the most relevant SOP document for the user by utilizing implicit feedback based on extraction data by monitoring the document search behavior. From the research results obtained 5 classifications as parameters, with a final value of 3:2 ratio that shows the best distance value with the majority of labels according to the concept of calculation KNN algorithm that sees from the nearest neighbor in the dataset. This shows the precision of applying the KNN algorithm in determining SOP documents according to user preferences based on implicit feedback resulting in 80% presentation for SOPs corresponding to profiles and 20% for SOPs that do not fit the user profile. To establish SOP documents to show more accurate results, it should be used in a broad SOP management system and utilize implicit feedback with parameters not only in search logs and more on performance evaluation evaluations.
Cladding effects on silica directional couplers Ary Syahriar; Ahmad Husin Lubis; Jusman Syafii Jamal; Anwar Mujadin; Ahmad Juang Pratama
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.8705

Abstract

Directional couplers are widely used as passive and active optical devices in fibre and integrated optics, and form the basis of components such as switches, modulators and wavelength filters. They consist of two closely-spaced parallel waveguides, whose separation is sufficiently small that power may be transferred between the modes propagating in the two guides through an interaction involving their evanescent fields. In this paper results are presented for a range of near infrared single mode silica directional couplers fabricated by electron beam irradiation. The effects of over cladding layers will be highlighted. Changes on coupling coefficient due to different cladding refractive indexes will also be examined. The coupled mode theory will be employed to fit the experimental results with prediction by theory. It is found that over cladding layer alters the transmission characteristics of silica directional couplers.
Hiding data in images using steganography techniques with compression algorithms Osama F. AbdelWahab; Aziza I. Hussein; Hesham F. A. Hamed; Hamdy M. Kelash; Ashraf A. M. Khalaf; Hanafy M. Ali
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12230

Abstract

Steganography is the science and art of secret communication between two sides that attempt to hide the content of the message. It is the science of embedding information into the cover image without causing a loss in the cover image after embedding.Steganography is the art and technology of writing hidden messages in such a manner that no person, apart from the sender and supposed recipient, suspects the lifestyles of the message. It is gaining huge attention these days as it does now not attract attention to its information's existence. In this paper, a comparison of two different techniques is given. The first technique used Least Significant Bit (LSB) with no encryption and no compression. In the second technique, the secret message is encrypted first then LSB technique is applied. Moreover, Discrete Cosine Transform (DCT) is used to transform the image into the frequency domain. The LSB algorithm is implemented in spatial domain in which the payload bits are inserted into the least significant bits of cover image to develop the stego-image while DCT algorithm is implemented in frequency domain in which the stego-image is transformed from spatial domain to the frequency domain and the payload bits are inserted into the frequency components of the cover image.The performance of these two techniques is evaluated on the basis of the parameters MSE and PSNR.
Analysis of color image features extraction using texture methods Aws AlQaisi; Mokhled AlTarawneh; Ziad A. Alqadi; Ahmad A. Sharadqah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9922

Abstract

A digital color images are the most important types of data currently being traded; they are used in many vital and important applications. Hence, the need for a small data representation of the image is an important issue. This paper will focus on analyzing different methods used to extract texture features for a color image. These features can be used as a primary key to identify and recognize the image. The proposed discrete wave equation DWE method of generating color image key will be presented, implemented and tested. This method showed that the percentage of reduction in the key size is 85% compared with other methods.
Region of interest and color moment method for freshwater fish identification Gibtha Fitri Laxmi; Fitrah Satrya Fajar Kusumah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11749

Abstract

One of the important features in content based image retrieval is color feature. The color feature is the most widely used visual features. Extracting feature image depends on the problem to identify the region or object of interest that is complex in content. This paper presents a methodology to recognize certain freshwater images using region of interest and color feature. In this work, we have considered 7 varieties of freshwater fish, Gourami, Mas/Common carper, Mas Orange, Mas Kancra, Mujair/Java Tilapia, Nila/Nile Tilapia, and Patin. Each variety consists of 20 images. We deployed Color Moment Feature after Region of Interest process to extract the feature. Euclid is used for recognition. Considering only a feature, the classification accuracy of 89% is obtained using color moment. The research technique shows promise for eventually being able to do so, and for the future will help to get important information from the image.
Enhance interval width of crime forecasting with ARIMA model-fuzzy alpha cut Yaya Sudarya Triana; Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12233

Abstract

With qualified data or information a better decision can be made. The interval width of forecasting is one of data values to assist in the selection decision making process in regards to crime prevention. However, in time series forecasting, especially the use of ARIMA model, the amount of historical data available can affect forecasting result including interval width forecasting value. This study proposes a combination technique, in order to get get a better interval width crime forecasting value. The propose combination technique between ARIMA model and Fuzzy Alpha Cut are presented. The use of variation alpha values are used, they are 0.3, 0.5, and 0.7. The experimental results have shown the use of ARIMA-FAC with alpha=0.5 is appropriate. The overall results obtained have shown the interval width crime forecasting with ARIMA-FAC is better than interval width crime forecasting with 95% CI ARIMA model.
Significant variables extraction of post-stroke EEG signal using wavelet and SOM kohonen Esmeralda C. Djamal; Deka P. Gustiawan; Daswara Djajasasmita
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11776

Abstract

Stroke patients require a long recovery. One success of the treatment given is the evaluation and monitoring during recovery. One device for monitoring the development of post-stroke patients is Electroencephalogram (EEG). This research proposed a method for extracting variables of EEG signals for post-stroke patient analysis using Wavelet and Self-Organizing Map Kohonen clustering. EEG signal was extracted by Wavelet to obtain Alpha, beta, theta, gamma, and Mu waves. These waves, the amplitude and asymmetric of the symmetric channel pairs are features in Self Organizing Map Kohonen Clustering. Clustering results were compared with actual clusters of post-stroke and no-stroke subjects to extract significant variable. These results showed that the configuration of Alpha, Beta, and Mu waves, amplitude together with the difference between the variable of symmetric channel pairs are significant in the analysis of post-stroke patients. The results gave using symmetric channel pairs provided 54-74% accuracy.
Two-port network model of fixed-speed wind turbine generator for distribution system load flow analysis Rudy Gianto; Kho Hie Khwee; Hendro Priyatman; Managam Rajagukguk
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11866

Abstract

Load flow analysis has always been used in determining the steady-state operation of an electric power or distribution system. For conventional power system without wind turbine generator, the method for load flow analysis has been well established. However, for modern system embedded with wind turbine generator, the investigation of analysis method is still an active research area. This paper proposed a new method to integrate fixed-speed wind turbine generator into distribution system load flow analysis. The proposed method is derived based on two-port network theory where the parameters of induction generator of the wind turbine generator are embedded in general constants of the two-port network. The proposed method has been tested and verified using a representative electric distribution system.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue