cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Qualitative assessment of image enhancement algorithms for mammograms based on minimum EDV Mazin N. Farhan; Mohammed G. Ayoub; Hassan M. Qassim; Abdulrahman K. Eesee
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 2: April 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i2.14085

Abstract

Breast cancer is one of the leading reason of death among women. Nevertheless, medications for this fatal disease are still away of ambitions. Patients (thought to have breast cancer) should go through several advanced medical diagnostic procedures like mammography, biopsy analysis, ultrasound imaging, etc. Mammography is one of the medical imaging techniques used for detecting breast cancer. However, its resulted images may not be clear enough or helpful for physician to diagnose each case correctly. This fact has pushed researchers towards developing effective ways to enhance images throughout using various enhancement algorithms. In this paper, a comparison amongst these applied algorithms was done to evaluate the optimum enhancement technique. A morphology enhancement, which is resulted from combining top-hat operation and bottom-hat operation, was used as a proposed enhancement algorithm. The proposed enhancement algorithm was compared to three other well-known enhancement algorithms, specifically histogram equalization, logarithmic transform, and gamma correction with different gamma values. Twenty-five mammographic images were taken from the mammography image analysis society (MIAS) database samples. The minimum entropy difference value (EDV) was used as metric to evaluate the best enhancement algorithm. Results has approved that the proposed enhancement algorithm gave the best-enhanced images in comparison to the aforementioned algorithms.
FLC based on static var compensator for power system transient stability enhancement Mojeebalrhman M. A. Hassan; Xiuyun Sun; Abdelrahim Ate
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.15605

Abstract

Transient Stability is the capability of a system to be able to return to its normal state after experiencing large disturbances. The static var compensator (SVC) is a shunt device of the flexible AC transmission systems (FACTS) family using power electronics to improve transient stability in power system. For the SVC control, it is usually used a PI controller, although PI controller is simpler and cheaper but not suitable when power system is subjected to transient stability since power system become non-linear system. In order to overcome this problem, the PI controller combined with Fuzzy controller is designed. Two types of faults were considered for this study to examine the effect of the fuzzy-SVC controller on system transient stability, the proposed fault types are single line to ground fault and three lines to ground fault. The performance and behavior of the designed fuzzy controller compared with that of the conventional PI controller in term of terminal voltage, rotor angle, and transmission line active power.
Analysis Characteristics of On/Off Grid Tie Inverter and Implementation in Microgrid Rudy Setiabudy; Hartono BS Hartono BS; Budiyanto Budiyanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 3: September 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i3.947

Abstract

                One characteristic of microgrid is possible to be integrated with the public electricity network (PLN/grid) or work independently of the public network. Additionally on microgrid is also possible to supply excess power to the grid and still be able to supply power to local load even when disconnected from grid. Not all inverter devices can be used on a microgrid, associated with some of the criteria that must be met. How do the characteristics of on-off grid tie inverter (GTI on-off) and how to build microgrid using on-off GTI became topic of this research activity. Based on results of testing, on-off GTI can be used on microgrid, with ability to supply power to network when excess power or supplied from network at the time of power shortage. As well as on-off GTI is able to work independently when there is no power from network.
Distributed Monitoring and Controlling Using Microcontroller and Virtual Internet Protocol Ahmad Ashari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 8, No 3: December 2010
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v8i3.630

Abstract

Nowadays, the applications based on TCP/IP (transmission control protocol/internet protocol) network are growing rapidly. By this application monitoring and control functions are easily and widely accessible through networks. Every PC (Personal Computer) can be connected to several microcontroller, but there are difficulties to access microcontroller directly through TCP/IP networks. This research study the use of virtual IP on a PC that connected with several microcontrollers, where each microcontroller is connected to a sensor device to monitoring temperature and a relay for controlling. In this method, each set of the microcontroller can be accessed directly using the IP. The results show that this system can be a distributed monitoring and controlling system which has the ability to record and display the results in the form of graphs. 
Multi-Domain Authentication Protocol Based on Dual-Signature Zengyu Cai; Qikun Zhang; Ming Li; Yong Gan; Junsong Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1164

Abstract

Today most multi-domain networks authentication systems provide data security and mutual authentication with asymmetric and traditional public key cryptography., there exist some problems, such as the overhead of passing certificates, the more complexity of management certificates and network bottlenecks and so on. These schemes can’t protect the safety of multi-domain interoperability in distributed network effectively. Aiming at these problems, the paper proposes an identity-based multi-domain authentication protocol among domains in large-scale distributed collaborative computing network. It adopts bilinear mapping and short signature technology to achieve mutual authentication between entities in different domains, which overcome the complexity of certificate transmission and bottlenecks in the scheme of PKI-based.  Analyzed shows that this scheme has anonymity, security and supporting mutual anonymous authentication and it is suitable to use in security alliance authentication mechanism in large distributed network.
Energy Management of Context-aware Cold Chain Vehicle Nodes Ronling Hu; Xiang Li; Yang Lou; Wei Yan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 1: March 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i1.2744

Abstract

In view of the question that the energy-constrained sensor nodes affect the normal operation of the whole system due to the short survival period, in this paper we present a new solution of adaptive energy management from the angle of context-aware computing. In different scenario modes, we take different environment acquisition and communication strategy according to scenario parameters, and thus build the context-aware energy management model. Finally, we extend the whole system life by lowering energy consumption of single internet of things vehicle node. Experimental data show that the energy management plan of context-aware wireless sensor nodes effectively reduces the energy consumption of nodes and extends the system life under the premise of providing reliable services.
QFD and Fuzzy AHP for Formulating Product Concept of Probiotic Beverages for Diabetic Imam Santoso; Miftahus Sa’adah; Susinggih Wijana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3555

Abstract

In Indonesia, the number of diabetics is increasing. In term of age, people suffered diabetes at the age of 20-79 years old in the past, but now young people also suffer it. Some of the attempts to contain uncontrollable effects of diabetes are to implement healthy lifestyle and to control type or amount of consumed foods. One type of product to ease the risks of Type 2 Diabetes Mellitus is dairy product, and its derivatives.  One example of the product is probiotic. This research is intended to design yoghurt product for diabetic consumption, using quality function deployment (QFD) and fuzzy Analythical hierarchy process (fuzzy AHP) methods. This research shows that the technical responses, that serve the priority to develop probiotic product for diabetics, are the use of low-calorie sugar and skimmed milk, and the addition of high-fiber ingredients.
Development of air quality monitoring system in closed environment Bochen Li; Xibo Ding; Qingyao Cai
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.5995

Abstract

For closed environment, the characteristic is that the confined space is small and it doesn't flow with the outside world, it will produce nausea, dizziness, weakness and other symptoms if one stayed in that environment for long time. For this, developing a monitoring system of air quality in closed environment has theoretical significance and great value. In this paper, a modular design method is used to design a closed air quality monitoring system, The air quality monitoring system is composed of a main board and detection modules. When the measured closed environment is changed, it is only necessary to add or reduce the corresponding detection module, which increases the flexibility of the system and the convenience of later maintenance, and evaluation algorithm based on fuzzy mathematics is established. The measurement and air quality evaluation experiments are carried out using the developed monitoring system, The results show that the air quality evaluation algorithm can effectively evaluate the environmental air quality, and the measurement accuracy of the environmental parameters can meet the relevant standards.
Usability of BLESS-implemented class room: a case study of mixtio Desita Mustikaningrum; Astari Retnowardhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.8999

Abstract

Conventional learning system and e-learning have their own strengths and weaknesses. To combine both systems, blended learning is created. In Extention Program of Informatics Engineering Faculty at XYZ university most of the students already have jobs. As much 47.5 % of students who take this program have a job in daily office hours. Then, to facilitate the learning process the XYZ university develop learning management system (LMS) by Moodle. XYZ university want to make a learning process with blended learning concept. However, the Moodle sytem has limited function to adapt the blended learning system (BLS). In the aim to improve the class usability in BLS, then this study proposes to apply to Blended Learning System Structure (BLESS) into LMS design. BLESS is offered as a framework which matches to learning and uses a top-down approach. Then, the system design maed it “Mixtio”. At the end of this study, it can be seen the analysis result of the use of BLESS can improve system usability of LMS.
Effect of kernel size on Wiener and Gaussian image filtering Zayed M. Ramadan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11192

Abstract

In this paper, the effect of the kernel size of Wiener and Gaussian filters on their image restoration qualities has been studied and analyzed. Four sizes of such kernels, namely 3x3, 5x5, 7x7 and 9x9 were simulated. Two different types of noise with zero mean and several variances have been used: Gaussian noise and speckle noise. Several image quality measuring indices have been applied in the computer simulations. In particular, mean absolute error (MAE), mean square error (MSE) and structural similarity (SSIM) index were used. Many images were tested in the simulations; however the results of three of them are shown in this paper. The results show that the Gaussian filter has a superior performance over the Wiener filter for all values of Gaussian and speckle noise variances mainly as it uses the smallest kernel size. To obtain a similar performance in Wiener filtering, a larger kernel size is required which produces much more blur in the output mage. The Wiener filter shows poor performance using the smallest kernel size (3x3) while the Gaussian filter shows the best results in such case. With the Gaussian filter being used, similar results of those obtained with low noise could be obtained in the case of high noise variance but with a higher kernel size.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue