cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
A Mamdani Fuzzy Model to Choose Eligible Student Entry Agus Nursikuwagus; Agis Baswara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.4893

Abstract

This paper presented about study that have been created a new student choosing system by using fuzzy mamdani inference systems method. Fuzzy mamdani is used because it has characteristics such as human perceptions on choosing of students with some specified criteria. The choosing studens who want entry to the school have been difficult if it is manually process. With the fuzzy mamdani, the process can be possible completed execute and can be reduced the time of choose. To accomplish the process, the fuzzy variable is created by the national final exam scores, report grade, general competency test, physical test, interview and psychological test. Based on testing 270 data, the fuzzy mamdani has been reached 75.63% accuracy.
Adjustment Delay Scheme to Improve Performance IEEE 802.15.4 Networks Eppy Yundra; Bih-Hwang Lee
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6092

Abstract

The challenges of CSMA/CA as following: first, when the device nodes detect the channel in busy condition, the device nodes have to increase the value of backoff exponent which cause range of blind backoff process also increase. Second, the blind backoff process will cause lower channel utilization and more energy consumptions. This article proposes a scheme to improve IEEE 802.15.4 medium access control, called adjustment delay scheme (ADES). This article also presents a comprehensive Markov chain analysis to predict the probability of successful transmission, network goodput, bandwidth utilization and total network energy consumption. The validity of the model analysis is proven by precisely matching the simulation experiments. ADES performs better than those of other algorithms in term of the probability of successful packet transmission, network goodput, bandwidth utilization as well as energy consumption in the networks.
Cost implication of Line Voltage variation on Three Phase Induction Motor operation Aderibigbe Israel Adekitan; Bukola Adetokun; Tobi Shomefun; Alex Aligbe
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.9628

Abstract

Globally, there is a drive toward ensuring energy efficiency in all aspect of production operations and power supply systems. Industries are the backbone of our modern word, and a significant percentage of industrial operations are motor driven. Three Phase Induction Motor is massively deployed in industries due to its ruggedness, reasonable cost and ease of maintenance. The energy efficiency of the induction motor is affected by the internal configurations of the motor and the nature of the supply. Power supply fluctuations result in power quality issues and its attendant negative effects on equipment operation. This research, studies the cost and performance implication of the effects of balanced over voltage, balanced voltage, balanced under voltage and unbalance voltage on the operation of the three phase induction motor using the peculiarities of Nigeria. The result shows that, there is an increase in operational cost due to increased energy loss in the windings as a result of voltage variations from the balanced state, with balanced over voltage operation showing more cost severity among the voltage variations considered.
Adomian decomposition method for analytical solution of a continuous arithmetic Asian option pricing model S. O. Edeki; G. O. Akinlabi; O. González-Gaxiola
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.9179

Abstract

One of the main issues of concern in financial mathematics has been a viable method for obtaining analytical solutions of the Black-Scholes model associated with Arithmetic Asian Option (AAO). In this paper, a proposed semi-analytical technique: Adomian Decomposition Method (ADM) is applied for the first time, for analytical solution of a continuous arithmetic Asian option model. The ADM gives the solution in explicit form with few iterations. The computational work involved is less. However, high level of accuracy is not neglected. The obtained solution conforms with those of Rogers and Shi (J. of Applied Probability 32: 1995, 1077-1088), and Elshegmani and Ahmad (ScienceAsia, 39S: 2013, 67–69). Thus, the proposed method is highly recommended for analytical solution of other versions of Asian option pricing models such as the geometric form for puts and calls, even in their time-fractional forms.
Mitigation of high voltage induction effect on ICCP system of gas pipelines: a field case study Rohana Ismail; Arnawan Hasibuan; Muzamir Isa; Faizar Abdurrahman; Nurul Islami
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.12493

Abstract

An analysis of the high voltage induction effect on the impressed current cathodic protection (ICCP) system on pipelines parallel toward high voltage power lines was employed in this research. Mitigation of high voltage effect throught human and environment is necessary to implemented. Direct current induction was used to increase the electrical potential of the gas pipeline, from Klumpang to sicanang area, Indonesia. During the mitigation process, the highest induction value was obtained 0.00574 KV which is previously was 0.01732 KV, and occurred at the limit of the allowable secure touch tension value of 0.015 KV. The data that acquire from the measurement of test point of ICCP underneath the transmission line revealed a comparison data between field measurements occurred of mitigation process. The direct current induction method is found to be safe for ICCP system and environment.
Vision: a web service for face recognition using convolutional network Akino Archilles; Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14790

Abstract

This paper proposes a face recognition module built as a web service. We introduce a novel design and mechanism for face recognition on a web platform and to memorize most recent users for the user. This web service is called Vision and developed using the Flask and TensorFlow deep learning framework. The face recognition process is powered by FaceNet deep convolutional network model. The face recognition process done by Vision could also be utilized for user authentication and user memorization, both done in on a web platform. As a demonstration of concept and viability, in this study, Vision is integrated into a web-based voice chatbot. The testing and evaluation of Vision’s face recognition process show an overall F-score of one for all test scenarios.
Recognizing emotional state of user based on learning method and conceptual memories Maytham N. Meqdad; Fardin Abdali-Mohammadi; Seifedine Kadry
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16756

Abstract

With the increased use of computers, electronic devices and human interaction with computer in the broad spectrum of human life, the role of controlling emotions and increasing positive emotional states becomes more prominent. If a user's negative emotions increase, his/her efficiency will decrease greatly as well. Research has shown that colors are to be considered as one of the most influential basic functions in sight, identification, interpretation, perception and senses. It can be said that colors have impact on individuals' emotional states and can change them. In this paper, by learning the reactions of users with different personality types against each color, communication between the user's emotional states and personality and colors were modeled for the variable "emotional control". For the sake of learning, we used a memory-based system with the user’s interface color changing in accordance with the positive and negative experiences of users with different personalities. The end result of comparison of the testing methods demonstrated the superiority of memory-based learning in all three parameters of emotional control, enhancement of positive emotional states and reduction of negative emotional states. Moreover, the accuracy of memory- based learning method was almost 70 percent.
Isolated Word Recognition Using Ergodic Hidden Markov Models and Genetic Algorithm Nyoman Rizkha Emillia; Suyanto Suyanto; Warih Maharani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 1: March 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i1.769

Abstract

Speech to text was one of speech recognition applications which speech signal was processed, recognized and converted into a textual representation. Hidden Markov model (HMM) was the widely used method in speech recognition. However, the level of accuracy using HMM was strongly influenced by the optimalization of extraction process and modellling methods. Hence in this research, the use of genetic algorithm (GA) method to optimize the Ergodic HMM was tested. In Hybrid HMM-GA, GA was used to optimize the Baum-Welch method in the training process. It was useful to improve the accuracy of the recognition result which is produced by the HMM parameters that generate the low accuracy when the HMM are tested. Based on the research, the percentage increases the level of accuracy of 20% to 41%. Proved that the combination of GA in HMM method can gives more optimal results when compared with the HMM system that not combine with any method.
Designing Comprehensive Independent Learning Interactive Multimedia and its Resources Demands Enjang Akhmad Juanda; Ali Ibnun Nurhadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.82

Abstract

Generally, multimedia project refers to a combination of  two or three types of media, such as texts, images, animations, applications, and videos, and is easily decompiled. This research produces interactive multimedia with five types of media using ActionScript. Using an external XML file as the connector between interface and contents, this interactive multimedia becomes reusable and developable. This multimedia project is flash based with the extensions *.swf and *.exe. To protect from decompiling, the project uses layered encryption combined with As3Crypto encryption. Based on test results, Sothink SWF Decompiler software cannot decompile and display all the properties of the project. In this research ,the analysis highlights multiplatform, standalone, media types, content types, exercises system, responsive, reusability, developability, energy efficiency, layered encryption and independent learning. Based on test results, the project has been tested and participants declared that they can use all contents and navigations easily and it ran normally on the devices used. 
Object Detector on Coastal Surveillance Radar Using Two-Dimensional Order-Statistic Constant-False Alarm Rate Algoritm Dayat Kurniawan; Purwoko Adhi; Arif Suryadi; Iqbal Syamsu; Teguh Praludi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1189

Abstract

This paper describes the development of radar object detection using two dimensional constant false alarm rate (2D-CFAR). Objective of this development is to minimize noise detection if compared with the previous algorithm that uses one dimensional constant false alarm rate (1D-CFAR) algorithm such as order-statistic (OS) CFAR, cell-averaging (CA) CFAR, AND logic (AND) CFAR and variability index (VI) CFAR where has been implemented on coastal surveillance radar. The optimum detection result in coastal surveillance radar testing when Pfa set to 1e-2, Kth set to 3/4*Nwindow and Guard Cell set to 0. Principle of 2D-CFAR algorithm is combining of two CFAR algorithms for each array data of azimuth and range. Order statistic (OS) CFAR algoritm is implemented on this 2D-CFAR by fusion rule of AND logic.The algorithm of 2D-CFAR is developed using Microsoft Visual C++ 2008 and the output of 2D-CFAR is plotted on PPI scope radar using GDI+ library. The result of 2D-CFAR development shows that 2D-CFAR can minimize noise detected if compared with 1D-CFAR with the same parameter of CFAR. Best performance of 2D-CFAR in object detection when Nwindow set to 128. The time of software processing of 2D-CFAR is about two times longer than the 1D-CFAR.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue