cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Forkloader Position Control for A Mini Heavy Loaded Vehicle using Fuzzy Logic-Antiwindup Control Wan Mohd Nafis Wan Lezaini; Addie Irawan; Sheikh Norhasmadi Sheikh Ali
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.6110

Abstract

This paper presents a proposed integrated Takagi-Sugeno-Kang (TSK) type Fuzzy Logic control (TSK-FLC) with Antiwindup elements for a forkloader position control of a Mini Heavy Loaded Forklift Autonomous Guided Vehicle (MHeLFAGV). The study was carried out by modeling TSK-FLC as a close-loop control for the each axis of the fork-lift’s movement. The degree of membership is designed with reference to the system response, in which ultrasonic sensor with 1cm resolution is used. Moreover, the rule base is determined and optimized to deal with microcontroller processing speed. In order to cater for the windup phenomenon, a proportional and integrated antiwindup elements are integrated into the TSK-FLC model. This control strategy consumes less memory and is expected to increase the time response of the control system. The experiment and analysis is done on the actual forkloader unit of MHeLFAGV system. The experiment was done on the vertical axis motion since horizontal motion will have the same characteristic pattern of implementation and characteristic of tuning. The experiment shows that the proposed integrated TSK-FLC with antiwindup elements is able to speed up the time response of the system and eliminate the overshoot as well as oscillation on the forkloader movement.  
File Encryption and Hiding Application Based on AES and Append Insertion Steganography G. C. Prasetyadi; R. Refianti; A. B. Mutiara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6409

Abstract

Steganography is a method of hiding secret message in other innocuous looking object so that its presence is not revealed. In this paper, a message, which is a computer file of any type and size, is hidden in a selected cover or carrier, which is a computer file of certain types. The steganography method used in this paper is called append insertion steganography method. This method is chosen as an attempt to remove the limitation of message format, which appears in many popular steganography methods. To scramble the meaning of the hidden message, AES-256 (Rijndael algorithm) is used to encrypt the message with a secret passphrase. A special block of bytes is used to identify and verify the original message so it can be recovered while retaining its integrity. The C# programming language and .NET Framework are chosen to implement the algorithm into a Windows application. In this paper, one cover file contains exactly one message file. In the testing, five random files are used as secret message. Their integrity is calculated using SHA-256 before hiding and after recovery. In the testing, they all retain their integrity, proven by exact hash values. Thus, the application as the implementation of proposed algorithm is proven feasible but only for personal use as some improvements still have to be implemented.
Digital book for assessment and evaluation courses based on Kvisoft-kelase asynchronous pattern Dewa Gede Hendra Divayana; Nyoman Santiyadnya; I Gede Ratnaya; I Gede Sudirtha; Suratmin Suratmin; I Putu Darmayasa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9764

Abstract

This study was conducted with the aim of obtaining information about the design of assessment and evaluation digital book as well as deployment process of the digital book through asynchronous patterns. This study uses development method with the 4D design which focuses only on define and design phase. Parties involved in conducting design trial consist of two experts namely expert of education evaluation and expert of informatics engineering education, with a trial tool in the form of questionnaires. The technique was used to analyze the trial results data from those experts was descriptive quantitative with descriptive percentages calculation. In this research, the design result of assessment and evaluation digital book with Kvisoft Flipbook Maker and the initial design of deployment with an kelase asynchronous pattern are included in the good category with a percentages of 89.38% based on experts review.
KANSA: high interoperability e-KTP decentralised database network using distributed hash table Rolly Maulana Awangga; Nisa Hanum Harani; Muhammad Yusril Helmi Setyawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11758

Abstract

e-KTP is an Indonesian Identity Card based on Near Field Communicator technology. This technology was embedded in every e-KTP card for every Indonesian citizen. Until this research, e-KTP technology never to be utilized by any stack-holder neither government agencies nor nongovernment organization or company. e-KTP Technology inside the card never been used and go with conventional with manual copy it with photocopy machine or take a photograph with it. This research was proposing an open standard to utilized e-KTP Technology. The open standard will bring e-KTP technology used as is and used broadly in many government agencies or much commercial company. This research was proposing decentralized network model especially for storing e-KTP data without breaking privacy law. Besides providing high specs of the server, a decentralized model can reduce the cost of server infrastructure. The model was proposing using Distributed Hast Table which was used for peer-to-peer networks. The decentralized model promised high availability and the more secure way to save and access the data. The result of this model can be implemented in many network topology or infrastructure also applicable to implement on Small Medium Enterprise Company.
A design of radial line slot array antennas using the specification of panel antennas Teddy Purnamirza; Muhammad Ralibi; Imran M. Bin Ibrahim; Rika Susanti; Halim Mudia; Depriwana Rahmi; Sutoyo Sutoyo; Mulyono Mulyono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12679

Abstract

RLSA antennas were suggested by several researches as Wi-Fi antennas in addition to panel antennas. Therefore, this paper researched the possibility of this suggestion. We used the size of an available in market 16 dBi panel antenna (225 mm2) as the size for our developed RLSA antenna. Based on this size, we developed 60 RLSA models using extreme beamsquint technique and simulated them. We then chose a best model with a best performance. The best model was then fabricated and measured. The simulation and measurement results show that the developed RLSA antenna has better performance compared to the 16 dBi panel antenna in term of gain (0.25 dB higher) and bandwidth (570 MHz wider). The RLSA antenna also tested as antenna for a Wi-Fi device and it showed good performance.
Intercept probability analysis in DF time switching full-duplex relaying network with impact of Co-channel interference at the eavesdropper Pham Minh Nam; Phu Tran Tin; Minh Tran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.13861

Abstract

In this research, we propose and investigate intercept probability analysis in DF time switching relaying full-duplex with impact of Co-channel interference at the eavesdropper. In the beginning stage, we present the DF time switching relaying full-duplex with the Impact of Co-channel interference at the eavesdropper. Furthermore, the closed-form expression of the intercept probability (IP) is analyzed and derived in connection with the primary system parameters. Finally, the Monte Carlo simulation is performed for verifying the correctness of the analytical section. From the research results, a novel solution and some recommendations can be proposed for the communication network in the near future.
Performance of multi-hop cognitive MIMO relaying networks with joint constraint of intercept probability and limited interference Phu Tran Tin; Duy-Hung Ha; Pham Minh Quang; Nguyen Thanh Binh; Nguyen Luong Nhat
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 1: February 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i1.18006

Abstract

In this paper, we propose a multi-hop multiple input multiple output (MIMO) decode-and-forward relaying protocol in cognitive radio networks. In this protocol, a multi-antenna secondary source attempts to send its data to a multi-antenna secondary destination with assistance of multiple intermediate multi-antenna nodes, in presence of a multi-antenna secondary eavesdropper. A primary network includes a primary transmitter and a primary receiver which are equipped with multiple antennas, and use transmit antenna selection (TAS) and selection combining (SC) to communicate with each other. Operating on the underlay spectrum sharing method, the secondary source and relay nodes have to adjust their transmit power so that the outage performance of the primary network is not harmful and satisfy the quality of service (QoS). Moreover, these secondary nodes also reduce their transmit power so that the intercept probability (IP) at the eavesdropper at each hop is below a desired value. To improve the outage performance of the secondary network under the joint constraint of IP and limited interference, the TAS/SC method is employed to relay the source data hop-by-hop to the destination. We derived exact closed-form expressions of the end-to-end (e2e) outage probability (OP) and IP of the proposed protocol over Rayleigh fading channels. Monte Carlo simulations are then performed to verify the theoretical derivations.
Nonlinear Model Predictive Controller Design for Identified Nonlinear Parameter Varying Model Jiangang Lu Jiangang Lu; Jie You Jie You; Qinmin Yang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 3: September 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i3.831

Abstract

In this paper, a novel nonlinear model predictive controller (MPC) is proposed based on an identified nonlinear parameter varying (NPV) model. First, an NPV model scheme is present for process identification, which is featured by its nonlinear hybrid Hammerstein model structure and varying model parameters. The hybrid Hammerstein model combines a normalized static artificial neural network with a linear transfer function to identify general nonlinear systems at each fixed working point. Meanwhile, a model interpolating philosophy is utilized to obtain the global model across the whole operation domain. The NPV model considers both the nonlinearity of transition dynamics due to the variation of the working-point and the nonlinear mapping from the input to the output at fixed working points. Moreover, under the new NPV framework, the control action is computed via a multistep linearization method aimed for nonlinear optimization problems. In the proposed scheme, only low cost tests are needed for system identification and the controller can achieve better output performance than MPC methods based on linear parameter varying (LPV) models. Numerical examples validate the effectiveness of the proposed approach.
Sparsity Properties of Compressive Video Sampling Generated by Coefficient Thresholding Ida Wahidah Hamzah; Tati Latifah R. Mengko; Andriyan B. Suksmono; Hendrawan Hendrawan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.296

Abstract

We study the compressive sampling (CS) and its application in video encoding framework. The video input is firstly transformed into suitable domain in order to achieve sparser configuration of coefficients. Then, we apply coefficient thresholding to classify which frames to be sampled compressively or conventionally. For frames chosen to undergo compressive sampling, the coefficient vectors will be projected into smaller vectors using random measurement matrix. As CS requires two main conditions, i.e. sparsity and matrix incoherence, this research is emphasized on the enhancement of sparsity property of the input signal. It was empirically proven that the sparsity enhancement could be reached by applying motion compensation and thresholding to the non-significant coefficient count. At the decoder side, the reconstruction algorithm can employ basis pursuit or L1 minimization algorithm.
Analytical Calculation of Coupled Magnetothermal Problem in Gas Insulated Transmission Lines Guoxia Sun; Xiangchao Jin; Zhiyang Xie
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 4: December 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i4.1150

Abstract

Gas insulated transmission lines (GIL) are a new technology for transmitting power over long distances. In this paper, an analytical method (AM) is proposed to investigate the coupled magnetothermal problem in GIL. Kelvin functions are employed to calculate the skin effect coefficients of the conductor and the enclosure. The calculated power losses are used as heat source input for the thermal analysis. Considering the convective and radiation heat transfer effects, the heat balance equations on the surface of the conductor and the enclosure are established, respectively. Temperature rise of the GIL at different operation conditions are investigated. The proposed method is validated against the finite element method (FEM). The simplicity of the approach makes it attractive for self-made software implementation in the thermal design and the condition monitoring of GIL.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue