cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Image Processing of Panoramic Dental X-Ray for Identifying Proximal Caries Jufriadif Na'am; Johan Harlan; Sarifuddin Madenda; Eri Prasetyo Wibowo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.6856

Abstract

This study aims to facilitate the identification of proximal caries in the Panoramic Dental X-Ray  image. Twenty-seven X-Ray images of proximal caries were elaborated. The images in digital form were processed using Matlab and Multiple Morphological Gradient. The process produced sharper images and clarifies the edges of the objects in the images. This makes the characteristics of the proximal caries and the caries severity can be identified precisely.
Varying Effects of Temperature and Path-length on Ozone Absorption Cross-Section Enenche Patrick; Michael David; A.O. Caroline; Mohd Haniff Ibrahim; Sevia Mahdaliza Idrus; Tay Ching En Marcus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8577

Abstract

Inconsistencies in the absorption cross section of ozone have been observed. Hence, for accurate measurement, we have reported the combined effects of varying optical path-length and temperature on the ozone gas absorption cross section (OACS) at 334.15nm. Adopting optical absorption spectroscopy, results of the (OACS) have been simulated using spectralcalc simulator with HITRAN 12 has the latest line list. OACS increased by 52.27% as the temperature increased from 100K to 350K while it was slightly affected by a 0.007% decrease varying the path-length from 0.75cm-130cm.
2FYSH: two-factor authentication you should have for password replacement Sunderi Pranata; Hargyo Tri Nugroho
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.9187

Abstract

Password has been the most used authentication system these days. However, strong passwords are hard to remember and unique to every account. Unfortunately, even with the strongest passwords, password authentication system can still be breached by some kind of attacks. 2FYSH is two tokens-based authentication protocol designed to replace the password authentication entirely. The two tokens are a mobile phone and an NFC card. By utilizing mobile phones as one of the tokens, 2FYSH is offering third layer of security for users that lock their phone with some kind of security. 2FYSH is secure since it uses public and private key along with challenge-response protocol. 2FYSH protects the user from usual password attacks such as man-in-the-middle attack, phishing, eavesdropping, brute forcing, shoulder surfing, key logging, and verifier leaking. The secure design of 2FYSH has made 90% of the usability test participants to prefer 2FYSH for securing their sensitive information. This fact makes 2FYSH best applied to secure sensitive data needs such as bank accounts and corporate secrets.
Analyzing the deformation of copper conductor from a fire impact Didik Notosudjono; Tatang Kukuh Wibawa; Bagus Dwi Ramadhon
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.10116

Abstract

Fire is an oxidation reaction of the three elements (fuel, oxygen, heat) that can result in loss of property, injury, even death. Electricity potential that may results on fire is the short circuit current that occurs on the equipments and electrical installation cables. The remaining wires at the first fire location are subject to fire damage and can cause electrical short circuit. The purpose of this study is to analyze the short-circuit electrical deformation of copper cable using SEM EDS and MICRO XRF instrument. Based on the study result, there is a dominant change of oxygen elements in single cable and fiber sample causing fire that is 35,96% and 21,24%, those values are higher than Oxygen on a burned short circuited cable that is 19,54% and 12,1%. The microstructure of the cable that causes fire looks like irregular clumps whereas the burned cable looks like a clump of clumps.
Study on outage performance gap of two destinations on CR-NOMA network Hong-Nhu Nguyen; Chi-Bao Le; Nhat-Tien Nguyen; Dinh-Thuan Do
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13271

Abstract

Non-orthogonal multiple access (NOMA) and cognitive radio (CR) are promising for solving the severe spectral scarcity problem encountered by the next generation of wireless communication systems. This study aims to improve spectral efficiency at two secondary destinations by investigating a CR-NOMA network under situation of the perfect successive interference cancellation (SIC). We also derive the exact outage probability for secondary users. Furthermore, an approximate computation method is applied to indicate more insights. It is confirmed that the performance achieved together with performance gap among two users can be obtained due to different power allocation factors assigned to users.
A rigorous user needs experience evaluation method based on software quality standards Mohammad Zarour
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.16061

Abstract

Our lives, nowadays, are digital. We, as humans, are using software applications in all our life aspects to meet our daily objectives and fulfill our needs. Software solutions that comprise mobile apps are widely spread, users can select from hundreds of available software solutions that fit their needs. Accordingly, user needs are becoming intricate and the software organizations are competing high to satisfy user requirements and the desires for better quality. This competition is not about satisfying the functional requirements but also satisfy user experience as well. Accordingly, studying, measuring, and improving user experience is crucial for the success of any software product. This research focuses on evaluating user experience needs by developing user experience needs evaluation method based on three main disciplines the user experience framework, the evaluation theory concept, and the ISOsoftware quality standards ISO/IEC 25022 and ISO/IEC 25023. Although these disciplines are available in the literature, they are not linked together to complete the mosaic picture of developing a UX evaluation method. Linking there three disciplines led to systematically identify the necessary evaluation criteria to evaluate user needs experience.
An efficient method for stamps recognition using Haar wavelet sub-bands Maha A. Rajab; Loay E. George
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18763

Abstract

The problem facing certain organizations such as insurance companies and government institutions where a huge amount of documents is handled every day, hence an automated stamp recognition system is required. The image of the stamp may be on a different background, with different sizes, and suffers from rotating in different directions, also, the appearance of soft areas (patches) or small points as noise. Thus, the main objective of this paper is to extract and recognize the color stamp image. This paper proposed a method to recognize stamps, by using a technique named Haar wavelet sub-bands. The devised method has four stages: 1) extracts the stamp image; 2) preprocessing the image; 3) feature extraction; and 4) matching. This paper is implemented using C sharp (Microsoft Visual Studio 2012) programming language. The experiments conducted on a stamp dataset showed that the proposed method has a great capability to recognize stamps when using Haar wavelet transform with two sets of features (i.e., 100% recognition rate for energy features and 99.93% recognition rate for low order moment).
Wearable Conformal Antennas for 2.4 GHz Wireless Body Area Networks Emad Shehab Ahmed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 1: March 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i1.902

Abstract

 Microstrip fed inset patch antennas embedded in planar and cylindrically curved surfaces are introduced to be used in Body Area Networks (BANs) presented. These antennas are designed as wearable antennas for industrial, scientific and medical (ISM) band wireless communication networking. The proposed antennas consist of 50 Ω microstrip line feeding inset patch printed on the front face of dielectric substrate and a rectangular ground plane on the bottom face. The proposed planar antenna is conformed on finite cylindrical substrates of radii 2.5, 5 and 7.5 cm corresponding approximately to the typical size of human wrist, humerus and shoulder of a human body respectively. Modeling and performance evaluation of the cylindrical structures has been carried out using the commercially available electromagnetic software CST Studio Suite2009. Simulation results, obtained for the return losses, current distribution, and radiation pattern of the antennas are presented. Furthermore, results show that the designed conformal antennas are resonating at the designed frequency with reasonable gain and field pattern characteristics.
APLIKASI MIKROKONTROLER AT89C51 PADA MODEL ALAT PEMBERSIH LANTAI Sunardi Sunardi; Wahyu S Aji; Rifkan Firdaus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 3, No 3: December 2005
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v3i3.1230

Abstract

Teknologi elektronika telah banyak diterapkan dalam kehidupan, dimana hal tersebut sangat membantu pekerjaan. Hanya saja peralatan tersebut banyak yang masih bersifat semi otomatis (lebih 50 % dijalankan/dioperasikan oleh manusia), sehingga masih memerlukan tenaga dan waktu dalam pengerjaannya. Penelitian ini merancang aplikasi mikrokontroler AT89C51 pada model alat pembersih lantai. Alat ini berjalan pada lantai karpet membentuk kotak yang semakin lama akan semakin mengecil. Hasil penelitian menunjukan bahwa telah dapat dirancang suatu mobil yang berfungsi sebagai model alat pembersih lantai berbasis mikrokontroler AT89C51, baik perangkat lunak maupun keras, dengan sensor inframerah sebagai pendeteksi putaran ban. Alat yang dirancang dapat bekerja dengan baik.
Transmission of Real-time Video Signal with Interference Density and Human Traffic Rizal Broer Bahaweres; Oki Teguh Karya; Mudrik Alaydrus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2738

Abstract

The use of mobile phone as a communication tool so rapidly increase, as well as various types of functions therein. Among of the many applications on the mobile phone, which are used skype android-based for teleconferencing via mobile phone. Things can not be separated from these applications is the need of qualified internet network access for these applications can be felt up function. One of the network access to the Internet is widely used today's society is a wi-fi network. Access to the Internet does not always provide the best performance, this is due to many factors, one of which is the presence of interference. In this study, we tested transmission of video signals in real-time using an application skype on the mobile phone. Skype run on wi-fi network, which is influenced by the presence of interference or objects such as human traffic in the network. Wireshark were used to obtain data reliability wi-fi network, known as QoS. While evalvid used to obtain the data QoE restricted only get the data PSNR (Peak Signal To Noise Ratio) and MSE (Mean Square Error).

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue