cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Noise Removal in Microarray Images Using Variational Mode Decomposition Technique G. Sai Chaitanya Kumar; Reddi Kiran Kumar; G. Apparao Naidu; J. Harikiran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.5375

Abstract

Microarray technology allows the simultaneous monitoring of thousands of genes in parallel. Based on the gene expression measurements, microarray technology have proven powerful in gene expression profiling for discovering new types of diseases and for predicting the type of a disease. Enhancement, Gridding, Segmentation and Intensity extraction are important steps in microarray image analysis. This paper presents a noise removal method in microarray images based on Variational Mode Decomposition (VMD). VMD is a signal processing method which decomposes any input signal into discrete number of sub-signals (called Variational Mode Functions) with each mode chosen to be its band width in spectral domain. First the noisy image is processed using 2-D VMD to produce 2-D VMFs. Then Discrete Wavelet Transform (DWT) thresholding technique is applied to each VMF for denoising.  The denoised microarray image is reconstructed by the summation of VMFs.  This method is named as 2-D VMD and DWT thresholding method. The proposed method is compared with DWT thresholding and BEMD and DWT thresholding methods. The qualitative and quantitative analysis shows that 2-D VMD and DWT thresholding method produces better noise removal than other two methods.
Metamodel-based Optimization of a PID Controller Parameters for a Coupled-tank System Marwan Nafea; Abdul Rasyid Mohammad Ali; Jeevananthan Baliah; Mohamed Sultan Mohamed Ali
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.9069

Abstract

Liquid flow and level control are essential requirements in various industries, such as paper manufacturing, petrochemical industries, waste management, and others. Controlling the liquids flow and levels in such industries is challenging due to the existence of nonlinearity and modeling uncertainties of the plants. This paper presents a method to control the liquid level in a second tank of a coupled-tank plant through variable manipulation of a water pump in the first tank. The optimum controller parameters of this plant are calculated using radial basis function neural network metamodel. A time-varying nonlinear dynamic model is developed and the corresponding linearized perturbation models are derived from the nonlinear model. The performance of the developed optimized controller using metamodeling is compared with the original large space design. In addition, linearized perturbation models are derived from the nonlinear dynamic model with time-varying parameters.
Integrating fuzzy logic and genetic algorithm for upwelling prediction in Maninjau Lake Muhammad Rofiq; Yogie Susdyastama Putra; Wayan Firdaus Mahmudy; Herman Tolle; Ida Wahyuni; Philip Faster Eka Adipraja; Hafrijal Syandri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.11605

Abstract

Upwelling is a natural phenomenon related with the increase in water mass that also occurs in Maninjau Lake, West Sumatra. The upwelling phenomenon resulted in considerable losses for freshwater fish farming because make mass mortalities of fish in farming using the method of floating net cages (karamba jaring apung/KJA). It takes a system that can predict the possibility of upwelling as an early warning to the community, especially fish farming to immediately prepare early anticipation of upwelling prevention. With historical water quality monitoring data at six sites in Maninjau Lake for 17 years, a prediction model can be made. There are three input criteria for Tsukamoto FIS that is water temperature, pH, and dissolve oxygen (DO). The model is built with fuzzy logic integration with the genetic algorithm to optimize the membership function boundaries of input and output criteria. After the optimization, hybrid Tsukamoto FIS and genetic algorithm successfully make a correct upwelling prediction on of 16 data with 94% accuracy.
Understanding user intention in image retrieval: generalization selection using multiple concept hierarchies Abdelmadjid Youcefa; Mohammed Lamine Kherfi; Belal Khaldi; Oussama Aiadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.10202

Abstract

Image retrieval is the technique that helps Users to find and retrieve desired images from a huge image database. The user has firstly to formulate a query that expresses his/her needs.  This query may appear in textual form as in semantic retrieval (SR), in visual example form as in query by visual example (QBVE), or as a combination of these two forms named query by semantic example (QBSE). The focus of this paper lies in the techniques of analysing queries composed of multiple semantic examples. This is a very challenging task due to the different interpretations that can be drawn from the same query. To solve such a problem, we introduce a model based on Bayesian generalization. In cognitive science, Bayesian generalization, which is the base of most works in literature, is a method that tries to find, in one hierarchy of concepts, the parent concept of a given set of concepts. In addition and instead of using one single concept hierarchy, we propose a generalization so it can be used with multiple hierarchies where each one has a different semantic context and contains several abstraction levels. Our method consists in finding the optimal generalization by, firstly, determining the appropriate concept hierarchy, and then determining the appropriate level of generalization. Experimental evaluations demonstrate that our method, which uses multiple hierarchies, yields better results than those using only one single hierarchy.
Application of recommendation system with AHP method and sentiment analysis Ira Prasetyaningrum; Kholid Fathoni; Tri Tangguh Jiwo Priyantoro
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14778

Abstract

Over time, people needs are increasing. Needs that must be met, often cause problems in the people in determining a choice. People must make the right choice and according to their needs. Not an easy thing for people to make these choices. Therefore, a recommendation system is needed to support people in making decisions that fit their criteria. This research provides a system that can provide recommendations for decision support people according to their criteria, which are web-based. The decision-making system in this research uses the analytical hierarchy process (AHP) method. AHP is a multi-criteria decision-making method, which in this research one of the criteria is using sentiment analysis. Sentiment analysis is the process of understanding, extracting, and processing textual data to get sentiment information from an opinion sentence. The opinion sentiment value of each alternative will be included in the AHP calculation to get the best alternative recommendations according to the criteria of people. The result of this research is that the system can provide recommendations to people or users according to their criteria and alternatives as well as public opinion about each alternative.
A new clustering technique based on replication for MANET routing protocols Salma S. Mohammed; A. I. Abd-Elfattah; Mohamed A. Mohamed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15998

Abstract

The cluster head nodes in most mobile ad hoc networks (MANET) clustering protocols take on an extraordinary role in managing routing information. The reliability, efficiency and scalability of the clustering in MANET will ultimately be dramatically impacted. In this work we establish a new approach to form the clusters in MANET called the square cluster-based routing protocol (SCBRP). That protocol is based on the theory of replication. The goal of the protocol is to achieve reliability, availability and scalability with in the MANET. The proposed protocol is evaluated by caring the performance analysis using the NS-3 simulator. The performance shows 50% improvementin data delivering ratio in large network size, also shows an improvement in network stability and availability which is reflected in energy consumption measurements and increase in the system lifetime to 20%.
Implementing the Payment Card Industry (PCI) Data Security Standard (DSS) Enda Bonner; John O' Raw; Kevin Curran
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 9, No 2: August 2011
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v9i2.709

Abstract

Underpinned by the rise in online criminality, the payment card industry (PCI) data security standards (DSS) were introduced which outlines a subset of the core principals and requirements that must be followed, including precautions relating to the software that processes credit card data. The necessity to implement these requirements in existing software applications can present software owners and developers with a range of issues. We present here a generic solution to the sensitive issue of PCI compliance where aspect orientated programming (AOP) can be applied to meet the requirement of masking the primary account number (PAN).  Our architecture allows a definite amount of code to be added which intercepts all the methods specified in the aspect, regardless of future additions to the system thus reducing the amount of work required to the maintain aspect. We believe that the concepts here will provide an insight into how to approach the PCI requirements to undertake the task. The software artefact should also serve as a guide to developers attempting to implement new applications, where security and design are fundamental elements that should be considered through each phase of the software development lifecycle and not as an afterthought.
A New Control Curve Method for Image Deformation Hong-an Li; Jie Zhang; Lei Zhang; Baosheng Kang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 1: March 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i1.23

Abstract

Different from the direct deformation on the image,we propose a deformation method using wavelet filter and control curves. Firstly, the original image is filtered into a high-frequency subimage and a low-frequency subimage by the wavelet, and the low-frequency subimage is deformed use the moving least squares and the control curves.Then, the key points are set to create control curves according to shape information or deformation requirement, and moved to new position to deform the image using moving least squares. At last, the final deformation image can be obtained by adding the deformed low-frequency part to the high-frequency part. Experiments show that the proprosed method performs very well to preserve high-frequency detail information and describe the image shape and contour, so can obtain the satisfactory and realistic deformation results.
IMPLEMENTASI KUNCI PINTU ELEKTRONIS BERBASIS PLC OMRON CPM1 20CDR Sarif Syahrudin; Tole Sutikno; Wahyu Sapto Aji
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 5, No 3: December 2007
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v5i3.1365

Abstract

Penggunaan kunci manual yang beredar di pasaran sudah tidak terlalu aman lagi, karena kunci manual mempunyai beberapa kekurangan, antara lain kunci tidak praktis karena  terlalu berat sehingga menjadi mudah hilang, mudah dicuri dan mudah diduplikat. Karena kekurangan tersebut maka penggunaan kunci manual semakin tidak disukai orang dan kembali beralih ke penggunaan kunci yang bekerja secara pintu elektronis. Kelebihan kunci pintu elektronis dibandingkan dengan kunci manual  yaitu kunci tidak mudah hilang karena hanya dengan menghafalkan sandinya saja, pengoperasiannya lebih mudah dan lebih halus, kunci tidak bisa dicuri, tidak bisa diduplikat dan tidak mungkin tertinggal disembarang tempat. Berdasarkan perbandingan antara kunci manual dan kunci yang bekerja secara elektronis, maka diambillah topik perancangan kunci pintu yang bekarja secra elektronis terprogram, agar diperoleh sebuah bentuk yang lebih terjamin keamanannya dibandingkan dengan kunci manual. Tipe kunci pintu elektronis yang diterapkan adalah kunci pintu yang menggunakan PLC OMRON CPM1 sebagai basis utamanya.
Analysis of Stemming Influence on Indonesian Tweet Classification Ahmad Fathan Hidayatullah; Chanifah Indah Ratnasari; Satrio Wisnugroho
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 2: June 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i2.3113

Abstract

Stemming has been commonly used by some researchers in natural language processing area such as text mining, text classification, and information retrieval. In information retrieval, stemming may help to raise retrieval performance. However, there is an indication that stemming does not hand over significant influence toward the accuracy in text classification. Therefore, this paper analyzes further research about the influence of stemming on tweet classification in Bahasa Indonesia. This work examines about the accuracy result between two conditions by involving stemming and without involving stemming in pre-processing task for tweet classification. The contribution of this research is to find out a better pre-processing task in order to obtain good accuracy in text classification. According to the experiments, it is observed that all accuracy results in tweet classification tend to decrease. Stemming task does not raise the accuracy either using SVM or Naive Bayes algorithm. Therefore, this work summarized that stemming process does not affect significantly towards the accuracy performance.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue