cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 33 Documents
Search results for , issue "Vol 19, No 6: December 2021" : 33 Documents clear
Improved fuzzy miner algorithm for business process discovery Yutika Amelia Effendi; Riyanarto Sarno; Danica Virlianda Marsha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.19015

Abstract

Return material authorization (RMA) is a process in which a company decides to repair or replace customer’s defect product during the warranty period. To execute RMA, both company and customer obliged to follow standard operating procedure (SOP) which usually consists of many business processes of a company well. As the business process could cause inefficiencies, a company should improve their business process regularly. The best way is using process discovery. This research proposes a new improved fuzzy miner algorithm to represent binary correlation between activities. This new algorithm utilizes binary significance and binary correlation equally to acquire fuzzy model. While the original fuzzy miner algorithm uses various binary correlation metrics, the improved fuzzy miner algorithm uses only one metric and could capture the fuzzy model, accurately based on the event logs to capture more accurate business process model. In this research, ProM fuzzy miner is used as a comparison to the proposed improved time-based fuzzy miner. The results showed that the improved algorithm has higher value on conformance checking and able to capture business process model based on time interval, by using only time-interval significance as a binary correlation metrics.
An implentation of IoT for environmental monitoring and its analysis using k-NN algorithm Eko Prayitno; Nurul Fahmi; M. Udin Harun Al Rasyid; Amang Sudarsono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.15724

Abstract

Environmental monitoring is a process for observing around with various conditions. Recently, internet of things (IoT) and wireless sensor network (WSN) technologies support to solve these problems. In this paper, we implemented a system to monitor environmental conditions using IoT and WSN technology. The data measure is temperature, humidity, carbon monoxide (CO) and carbon dioxide (CO2) sensors. All sensor data will be sent and stored to the cloud through the internet in real-time. We provide applications for monitoring website and mobile phone-based environmental conditions, so users can access wherever and whenever. Furthermore, we also confirm the evaluation of analyst data that usedk-NN method is better than other methods with an accuracy rate of 99.0657%.
Human activity recognition for static and dynamic activity using convolutional neural network Agus Eko Minarno; Wahyu Andhyka Kusuma; Yoga Anggi Kurniawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.20994

Abstract

Evaluated activity as a detail of the human physical movement has become a leading subject for researchers. Activity recognition application is utilized in several areas, such as living, health, game, medical, rehabilitation, and other smart home system applications. An accelerometer was popular sensors to recognize the activity, as well as a gyroscope, which can be embedded in a smartphone. Signal was generated from the accelerometer as a time-series data is an actual approach like a human actifvity pattern. Motion data have acquired in 30 volunteers. Dynamic actives (walking, walking upstairs, walking downstairs) as DA and static actives (laying, standing, sitting) as SA were collected from volunteers. SA and DA it's a challenging problem with the different signal patterns, SA signals coincide between activities but with a clear threshold, otherwise the DA signal is clearly distributed but with an adjacent upper threshold. The proposed network structure achieves a significant performance with the best overall accuracy of 97%. The result indicated the ability of the model for human activity recognition purposes.
Extraction of object image features with gradation contour Fachruddin Fachruddin; Saparudin Saparudin; Errissya Rasywir; Yovi Pratama; Beni Irawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.19491

Abstract

Image retrieval using features has been used in previous studies including shape, color, texture, but these features are lagging. With the selection of high-level features with contours, this research is done with the hypothesis that images on objects can also be subjected to representations that are commonly used in natural images. Considering the above matters, we need to research the feature extraction of object images using gradation contour. From the results of the gradation contour test results, there is linearity between the results of accuracy with the large number of images tested. Therefore, it can be said that the influence of the number of images will affect the accuracy of classification. The use of contour gradation can be accepted and treated equally in all image types, so there is no more differentiation between image features. The complexity of the image does not affect the method of extracting features that are only used uniquely by an image. From the results of testing the polynomial coefficient savings data as a result of the gradation contour, the highest result is 81.40% with the highest number of categories and the number of images tested in the category is also higher.
5G NOMA user grouping using discrete particle swarm optimization approach Hadhrami Ab. Ghani; Farah Najwa Roslim; Muhammad Akmal Remli; Eissa Mohammed Mohsen Al-Shari; Nurul Izrin Md Saleh; Azizul Azizan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.18580

Abstract

Non-orthogonal multiple access (NOMA) technology meets the increasing demand for high-seed cellular networks such as 5G by offering more users to be accommodated at once in accessing the cellular and wireless network. Moreover, the current demand of cellular networks for enhanced user fairness, greater spectrum efficiency and improved sum capacity further increase the need for NOMA improvement. However, the incurred interference in implementing NOMA user grouping constitutes one of the major barriers in achieving high throughput in NOMA systems. Therefore, this paper presents a computationally lower user grouping approach based on discrete particle swarm intelligence in finding the best user-pairing for 5G NOMA networks and beyond. A discrete particle swarm optimization (DPSO) algorithm is designed and proposed as a promising scheme in performing the user-grouping mechanism. The performance of this proposed approach is measured and demonstrated to have comparable result against the existing state-of-the art approach.
Sensing and analysis of spectrum holes in ISM band using USRP testbed Nur Syahirah Binti Hamdan; Mas Haslinda Binti Mohamad; Aduwati Binti Sali
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.19888

Abstract

The spectrum frequency in the wireless communication industry is getting great attention due to the internet of things (IoT) technology's growth. However, the radio spectrum's frequency band use is limited because the primary user for specific services can cause spectrum interference as multiple users use the same spectrum frequency. Meanwhile, at each spectrum frequency, the number of users and utilization time are distinct. These will create vacancies for spectrum frequency assigned to the primary user. A new alternative in using the cognitive radio (CR) spectrum is accessible to these vacancies. This paper analyzed the frequency spectrum in the industrial, scientific and medical (ISM) band and identified spectrum holes for transmission by the secondary users. This work employed a realistic approach by measuring the spectrum using Universal Software Radio Peripheral (USRP) devices. Thus, the spectrum holes in the frequency spectrum had distinguished by using an energy detection technique. In the energy detection technique, the threshold energy level is set and then compared with the energy detector output to identify the primary user's existence (PU). The result indicates that 0.61% of spectrum holes have been detected in the 2.43-2.44 GHz range. This range is sufficient for home appliances, radio frequency peripherals (RF), and bluetooth devices.
Performance gap of two users in downlink full-duplex cooperative NOMA Tu-Trinh Nguyen; Dinh-Thuan Do
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.19034

Abstract

A full-duplex non-orthogonal multiple access (FD-NOMA) systems are expected to play a significant role in fifth generation (5G) networks, addressing spectrum efficiency and massive connections. In this regard, the feasibility of FD communications to improve spectrum utilization is main consideration in term of outage performance. Specifically, we derive exact formulas of outage probability for FD-NOMA, over Nakagami-m fading channels. Extensive analysis revealed that higher quality of channel leads to better performance. We verify expressions throughout Monte-Carlo simulations.
Quality control in GNSS reflectometry method for tide observations Agung Syetiawan; Dudy Darmawan Wijaya; Irwan Meilano
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.21670

Abstract

Recently, the reflected signals from global navigation satellite systems (GNSS) have been utilized to observe coastal tides, and it has been found that this method provides promising results. Although this method is promising, there remain problems related to accuracy of the observed tides. The purpose of this study was to improve the accuracy by employing an optimal spectral method in the quality control scheme. The quality control process is carried out by setting parameters to achieve the best possible frequency correlated with sea levels such as estimation of the noise frequency range, frequency amplitude power selection, and selection of peak frequency to noise ratio. The results using the data at Morotai station showed that the amplitude power less than 5 comes from low-frequency signals and hence it is an indicator that the Lomb-Scargle periodogram (LSP) fails to determine the dominant frequency. In addition, the result of the peak frequency to noise ratio shows a value of 2.7, meaning that the peak frequency of the LSP signal is at least 2.7 times greater than the signal noise. Quality control sensitivity settings are very effective in determining the reflectors height coming from the sea level. The periodogram visualization can be used to decide which LSP is significant.
A secured data transform-and-transfer algorithm for energy internet-of-things applications Abbas M. Al-Ghaili; Hairoladenan Kasim; Naif Mohammed Al-Hada
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.21665

Abstract

Digital transformation (DT) is one of the key technologies with effective impacts on many traditional processes towards a digital world. DT influences the way other digital services behave. Hence, there is a need to consider DT-related processes carefully specifically while designing phase. DT contributes to many services. It can, for example, contribute to implement security tasks applied to digital contents and therefore can be applied to change contents being secured. One of the transformation ways applied in security is to consider the way those digital contents are being stored or transferred. This paper proposes a DT algorithm (DTA) for energy internet-of-things (EIOT) contents. DTA consists of two steps, to convert original contents to another digital form and to transfer that form utilizing IOT. This paper utilizes DT in term of security. EIOT contents are converted to increase security. It is aimed to transfer EIOT contents to destination safely and efficiently. Thus, EIOT contents are transformed first to hide original contents. To make sure that the transferring process is done safely, DTA is evaluated in terms of efficiency, accuracy, and robustness. Results confirm that DTA is efficient, accurate, and robust against loss of bits caused by transferring.
Performance improvement of fractional N-PLL synthesizers for digital communication applications Nour Zaid Naktal; A. Z. Yonis; Khalid Khalil Mohammed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 6: December 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i6.21929

Abstract

Loop filter with two order was designed to improve the performance of the fractional N-phase locked loop (PLL) circuit (reference spurs noise and switching time), decreasing these two factors give good characteristic to fractional N-PLL circuit, the second order and third order loop filters are widely used in frequency synthesizer because they give good stability tolerance and for their simple architecture. They are designed at bandwidth B=125 KHz and its multipoles, at two values of the phase margin (pm)= 35°, 57°. MATLAB program was used to find the lock time, the component values for each element in the loop filter, also the filter impedance T(s), the bode plot of frequency response for close loop (CL) and open loop gain (OL). It is found by comparing the result of the frequency response for the 2nd order loop filter and 3rd order loop filter, that increasing the order of the filter will reduce the spurs noise that destroy the received signal at receiving side.

Page 3 of 4 | Total Record : 33


Filter by Year

2021 2021


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue