cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Computing Game and Learning State in Serious Game for Learning Ririn Dwi Agustin; Ayu Purwarianti; Kridanto Surendro; Iping S Suwardi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2248

Abstract

In order to support the adaptive SGfL, teaching materials must be represented in game component that becomes the target of adaptivity. If adaptive architecture of the game only use game state (GS) to recognize player's state, SGfL require another indicator -learning state (LS)- to identify the learning progress. It is a necessary to formulate computational framework for both states in SGfL.The computational framework was divided into two moduls, macro-strategy and micro-strategy. Macro-strategy control the learning path based on learning map in AND-OR Graph data stucture. This paper focus on the Macro-strategy modul, that using online, direct, and centralized adaptivity method. The adaptivity in game has five components as its target. Based on those targets, eight development models of SGfL concept was enumerated. With similarity and difference analysis toward possibility of united LS and GS in computational framework to implement the nine SGfL concept into design and application, there are three groups of the development models i.e. (1) better united GS and LS, (2) must manage LS and GS as different entity, and (3) can choose whether to be united or not. In the model which is united LS with GS, computing model at the macro-strategy modul use and-or graph and forward chaining. However, in the opposite case, macro-strategy requires two intelligent computing solutions, those are and-or graph with forward chaining to manage LS collaborated with Finite State Automata to manage GS. The proposed computational framework of SGfL was resulted from the similarity and difference analysis toward all possible representations of teaching materials into the adaptive components of the game. It was not dependent of type of learning domain and also of the game genre.
Modeling Text Independent Speaker Identification with Vector Quantization Syeiva Nurul Desylvia; Agus Buono; Bib Paruhum Silalahi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.4656

Abstract

Speaker identification is one of the most important technology nowadays. Many fields such as bioinformatics and security are using speaker identification. Also, almost all electronic devices are using this technology too. Based on number of text, speaker identification divided into text dependent and text independent. On many fields, text independent is mostly used because number of text is unlimited. So, text independent is generally more challenging than text dependent. In this research, speaker identification text independent with Indonesian speaker data was modelled with Vector Quantization (VQ). In this research VQ with K-Means initialization was used. K-Means clustering also was used to initialize mean and Hierarchical Agglomerative Clustering was used to identify K value for VQ. The best VQ accuracy was 59.67% when k was 5. According to the result, Indonesian language could be modelled by VQ. This research can be developed using optimization method for VQ parameters such as Genetic Algorithm or Particle Swarm Optimization.
A Literature Survey on Resource Management Techniques, Issues and Challenges in Cloud Computing Frederic Nzanywayingoma; Yang Yang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6574

Abstract

Cloud computing is a large scale distributed computing which provides on demand services for clients. Cloud Clients use web browsers, mobile apps, thin clients, or terminal emulators to request and control their cloud resources at any time and anywhere through the network. As many companies are shifting their data to cloud and as many people are being aware of the advantages of storing data to cloud, there is increasing number of cloud computing infrastructure and large amount of data which lead to the complexity management for cloud providers. We surveyed the state-of-the-art resource management techniques for IaaS (infrastructure as a service) in cloud computing. Then we put forward different major issues in the deployment of the cloud infrastructure in order to avoid poor service delivery in cloud computing.
Analysing Signal Strength and Connection Speed in Cloud Networks for Enterprise Business Intelligence Gananda Hayardisi; Kudang Boro Seminar; Arief Ramadhan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.8454

Abstract

Signal strength and speed connection data which are collected and available in a company have not been optimally and beneficially processed and stored for more added value business purposes. Therefore, the collected data need to be utilized in more strategic way for business intelligent in the company that enables management to conduct better and smarter decision making. This research is aimed to develop a business intelligence system based on cloud computing platform which is more flexible and manageable in terms of cost and resources. The developed system adopts the three tier architectures of data warehouse that provides data extraction, transform, and load (ETL) functions and the creation of dimensional models and visualization in dashboard forms. Business intelligence solutions have been created based on cloud computing using Microsoft Azure SQL Database as database storage of data warehouse and Power BI as a dimensional model and dashboard visualization. The developed system prototype has been implemented and tested for its functionalities and capabilities in a web platform.
Biometric identification using augmented database Regina Lionnie; Ellisa Agustina; Wahju Sediono; Mudrik Alaydrus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.11713

Abstract

Androgenic hair pattern is one of the newest soft biometric trait that can be used to identify criminals when their faces are covered in the evidences of criminal investigation. In real-life situation, sometimes the available evidence is limited thus creating problems for authorities to identify criminal based on the limited data. This research developed the recognition system to identify individuals based on their androgenic hair pattern in a limited data situation in such a way that the limited images were expanded by the augmentation process. There were 50 images studied and expanded into 2.000 images from the augmentation process of rotating, reflecting, adjusting color and intensity. Furthermore, the effect of human skin color extraction was investigated by employing HSV and YCbCr color spaces. The scale-space hierarchy was built among the images with Gaussian function and produced 70% recognition precision that was around more than 2 times higher compared to system of recognition with only limited data.
Solving one-dimensional unconstrained global optimization problem using parameter free filled function method Ismail Bin Mohd; Yosza Dasril; Ridwan Pandiya; Herlina Napitupulu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.10885

Abstract

It is generally known that almost all filled function methods for one-dimensional unconstrained global optimization problems have computational weaknesses. This paper introduces a relatively new parameter free filled function, which creates a non-ascending bridge from any local isolated minimizer to other first local isolated minimizer with lower or equal function value. The algorithm’s unprecedented function can be used to determine all extreme and inflection points between the two considered consecutive local isolated minimizers. The proposed method never fails to carry out its job. The results of the several testing examples have shown the capability and efficiency of this algorithm while at the same time, proving that the computational weaknesses of the filled function methods can be overcomed.
Insomnia analysis based on internet of things using electrocardiography and electromyography Novi Azman; Mohd Khanapi Bin Abd Ghani; S. R. Wicaksono; Barru Kurniawan; Viktor Vekky Ronald Repi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14897

Abstract

Insomnia is a disorder to start, maintain, and wake up from sleep, has many sufferers in the world. For patients in remote locations who suffer from insomnia, which requires testing, the gold standard performed requires patients to take the time and travel to the health care center. By making alternatives to remote sleep insomnia testing using electrocardiography and electromyography connected to the internet of things can solve the problem of patients' access to treatment. Delivery of patient data to the server is done to make observations from the visualization of patient data in real-time. Furthermore, using artificial neural networks was used to classify EMG, ECG, and combine patient data to determine patients who have Insomnia get resulted in patient classification errors around 0.2% to 2.7%.
Wireless control system for spy devices based dual tone multi frequency technology Jabbar Shatti Jahlool; Mohammed Abdulla Abdulsada
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.15846

Abstract

Obtaining information is one of the most important requirements for  intelligence works, spy surveillance cameras and listening devices are among the important means for this. One problem of using these means is a mechanism of controlling them to sustain their work efficiently for the perpetuating of achieving the purpose of their installation. In this research, the problem of controlling these devices has been overcome, by designing asystem dependent on the dual tone multi frequency (DTMF) and global system for mobile(GSM) networks. In the proposed work, designing and  implementing a system to remotely and wirelessly control of the movement of spy cameras in all directions as well as the ability to control the on/off listing audio device anytime and anywhere. The proposed mechanism is implementedby dividing the work into nine modes, with each one performing one specificfunction. These work modes are used to control all system activities such as control the horizontal directional motor (HDM) to change the spy camera in different horizontal directions, control the vertical directional motor (VDM) to change the camera in vertical directions and control the working status of the listening device.
Static Characterization of InAs/AlGaAs Broadband Self-Assembled Quantum Dot Lasers D. Ghodsi Nahri; H. Arabshahi H. Arabshahi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 1: March 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i1.759

Abstract

The static-characteristics of InAs/AlGaAs broadband self-assembled quantum-dot laser diodes (SAQD-LDs) have been studied to solve the rate equations numerically using fourth-order Runge-Kutta method. Energy level, size, and composition distributions of the InAs/AlGaAs broadband quantum-dots (QDs) are considered and their effects on Static-characteristics are investigated. Simulated results of static-characteristics show that nonlinearity appears in light-current characteristics whereas homogeneous broadening (HB) becomes equal to inhomogeneous broadening (IHB). Slope-efficiency increases as the HB heightens up to the IHB. Exceeding the HB from IHB results in degradation of light-current characteristics. In fact, InAs/AlGaAs broadband SAQD-LD has the best performance when HB is equal to IHB. Light-current characteristics degrade and threshold current increases as the IHB enhances. We also investigate the effects of QD coverage on the laser performance and show that there is an optimum QD coverage in which the SAQD-LD operates with lowest possible threshold current and maximum output power as whatever the QD coverage enhances from that optimum amount, the threshold current increases and slope efficiency decreases.  
Inferring Gene Regulatory Network from Bayesian Network Model Based on Re-Sampling Qian Zhang; Xuedong Zheng; Qiang Zhang; Changjun Zhou
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 1: March 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i1.907

Abstract

Nowadays, gene chip technology has rapidly produced a wealth of information about gene expression activities. But the time-series expression data present a phenomenon that the number of genes is in thousands and the number of experimental data is only a few dozen. For such cases, it is difficult to learn network structure from such data. And the result is not ideal. So it needs to take measures to expand the capacity of the sample. In this paper, the Block bootstrap re-sampling method is utilized to enlarge the small expression data. At the same time, we apply “K2+T” algorithm to Yeast cell cycle gene expression data. Seeing from the experimental results and comparing with the semi-fixed structure EM learning algorithm, our proposed method is successful in constructing gene networks that capture much more known relationships as well as several unknown relationships which are likely to be novel.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue