cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 63 Documents
Search results for , issue "Vol 17, No 3: June 2019" : 63 Documents clear
Smart taxi security system design with internet of things (IoT) Indrianto Indrianto; Meilia Nur Indah Susanti; Riki Ruli A. Siregar; Purwati Putri J.; Yudhi Purwanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10167

Abstract

Safety is an important thing in driving. Security in driving is aimed at the way of driving the vehicle or the security on the vehicle itself. Vehicle assets, especially cars, that are quite expensive or luxurious assets Therefore, safety protections for such vehicles are necessary. Taxi is a valuable asset for the company. To maintain the asset, a good security system is needed. With a good security system, the asset will be protected and the investments invested will not be reduced. By using the prototype method, a tool will be made in accordance to the wishes of the user. The Encludean distance method is used to calculate the distance of the incident and the nearest police station. By using the progress of technology, the progress can be utilized to help the security of taxi owned by a company or personal (online). The purpose of this study is to create a tool that can secure the taxi and its driver of crimes that might occur. IoT (internet of things) can help to secure a taxi since it is able to locate the incident’s location precisely and accurately.
AHP-TOPSIS for analyzing job performance with factor evaluation system and process mining Gabriel Sophia; Riyanarto Sarno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.10408

Abstract

Job performance is a type of assessments which refers to scalable actions, behaviour and outcomes that employees engage in or bring out linked with and contribute to organizational goals.This research employed the Factor Evaluation System (FES) method to analyze the job performance due to the common usage of the method. In analyzing employees, FES consists of nine factors; however, those nine factors are considered to be insufficient. Hence, the researchers used the process mining method to improve FES. Process mining analyzes job performance in details. The steps taken in process mining consist of time stamp, case, activity, and resources of employee. This means that the method can be continuously used, since the researcher provides weight for each factor. The weight of each factor is obtained from Analytic Hierarchy Process-Technique for Order Preference by Similarity to Ideal Solution. The result shows that FES with process mining are good for job performance but AHP-TOPSIS is considered to be incompatible for usage compared to the real work because the priority of the FES factors from the method is inconsistent with the priority factor made by manager of the warehouse officer.
VRLA battery state of health estimation based on charging time Akhmad Zainuri; Unggul Wibawa; Mochammad Rusli; Rini Nur Hasanah; Rosihan Arby Harahap
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.12241

Abstract

Battery state of health (SoH) is an important parameter of the battery’s ability to store and deliver electrical energy. Various methods have been so far developed to calculate the battery SoH, such as through the calculation of battery impedance or battery capacity using Kalman Filter, Fuzzy theory, Probabilistic Neural Network, adaptive hybrid battery model, and Double Unscented Kalman Filtering (D-UKF) algorithm. This paper proposes an approach to estimate the value of battery SoH based on the charging time measurement. The results of observation and measurements showed that a new and used batteries would indicate different charging times. Unhealthy battery tends to have faster charging and discharging time. The undertaken analysis has been focused on finding out the relationship between the battery SoH and the charging time range. To validate the results of this proposed approach, the use of battery capacity method has been considered as comparison. It can be concluded that there is a strong correlation between the two discussed SoH estimation methods, confirming that the proposed method is feasible as an alternative SoH estimation method to the widely known battery capacity method. The correlation between the charging-disharging times of healthy and unhealthy batteries is very prospective to develop a battery charger in the future with a prime advantage of not requiring any sensor for the data acquisition.

Filter by Year

2019 2019


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue