cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Radiation beam scanning for leaky wave antenna by using slots Jamal S. Kasim; M.S. M. Isa; Z. Zakaria; M. I. Hussein; Mowafak K. Mohsen
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.15720

Abstract

This paper provides an insight of a new, microstrip leaky wave antenna. It holds the ability to continue steer its beam at a swapping frequency. This is done with acceptable impedance matching while scanning and very little gain variation. Investigation is carried out on LWAs’ control radiation pattern in steps at a band frequency via vertical and horizontal slots. The enhancement is realized by etching horizontal and vertical slots on the radiation element. This study also presents a novel half-width microstrip leaky wave antenna (LWA). The antenna is made up of the following basic structures group’s vertical and horizontal slots. The reactance profile at the microstrip’s free edge and thus the main beam direction is changed once the control-cell states are changed. The radiation pattern direction changes by sweeping the operating frequency between 4 GHz to 6 GHz.The main beam may be directed by the antenna between 15o and 55o. C band achieved the measured peak gain of the antenna of 10 dBi at 4.3 GHz beam scanning range.
Coronal slice segmentation using a watershed method for early identification of people with Alzheimer's Retno Supriyanti; Anugerah Kevin Marchel; Yogi Ramadhani; Haris Budi Widodo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 1: February 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i1.15142

Abstract

One physical sign of a person who has Alzheimer's is the diminution of the area of the hippocampus and ventricles. A good quality magnetic resonance imaging (MRI) will provide a high-quality image so that the doctor will quickly analyze the abnormalities of the hippocampus and ventricle area. However, for low-quality MRI, this is difficult to do. This condition will be a significant problem for some regions in developing countries including Indonesia, where many hospitals have only low-quality MRI, and many hospitals do not have them at all. The primary purpose of this research is to develop simple tools to analyze morphological characteristics in Alzheimer's patients. In this paper, we focus only on coronal slice analysis. We will use watershed method segmentation, because of this method able to segment the boundaries automatically, so that parts of the hippocampus and ventricles can be identified in an MRI image. Analysis of morphological characteristics is also classified by age and gender. Then by referring to the value of the clinical dementia rating (CDR), the process of identifying between images with Alzheimer's disease (AD) and healthy models is done based on the morphological analysis that has been done. The results show this method has a better performance compared to the previously work.
Process Improvement of LSA for Semantic Relatedness Computing Wujian Yang; Lianyue Lin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.811

Abstract

Tang poetry semantic correlation computing is critical in many applications, such as searching, clustering, automatic generation of poetry and so on. Aiming to increase computing efficiency and accuracy of semantic relatedness, we improved the process of latent semantic analysis (LSA). In this paper, we adopted “representation of words semantic” instead of “words-by-poems” to represent the words semantic, which based on the finding that words having similar distribution in poetry categories are almost always semantically related. Meanwhile, we designed experiment which obtained segmentation words from more than 40000 poems, and computed relatedness by cosine value which calculated from decomposed co-occurrence matrix with Singular Value Decomposition (SVD) method. The experimental result shows that this method is good to analyze semantic and emotional relatedness of words in Tang poetry. We can find associated words and the relevance of poetry categories by matrix manipulation of the decomposing matrices as well.
Prediction and Realization of DO in Sewage Treatment Based on Machine Vision and BP Neural Network Liu Liping; Sunjin Sheng; Yin Jing-tao; Liang Na
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.437

Abstract

Dissolved Oxygen (DO) is one of the most important parameters describing biochemical process in wastewater treatment. It is usually measured with dissolved oxygen meters, and currently galvanic and polarographic electrodes are the predominant methods. Expensive, membrane surface inactivation, and especially need of cleaning and calibrating very frequently are common disadvantages of electrode-type measuring sensors. In our work, a novel method for Prediction and Realization dissolved oxygen based-on Machine Vision and BP Neural Network was researched. Pictures of the water-body surface in aeration basins are captured and transformed into HSI space data. These data plus the correspondent measured DO values are processed with a neural network. Using the well-trained neural network, a satisfied result for classifying dissolved oxygen according to the water-body pictures has been realized.
Implementation of K-Nearest Neightbors Face Recognition on Low-power Processor Eko Setiawan; Adharul Muttaqin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 3: September 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i3.713

Abstract

Face recognition is one of early detection in security system. Automation encourages implementation of face recognition in robot with low-power processor. Most of face recognition research focused on recognition accuration only and performed on high-speed computer. Face recognition that is implemented on low-cost processor, such as ARM processor, needs proper algorithm. Our research proposed K-Nearest Neighbor (KNN) algorithm to recognize face by ARM processor, which was common processor in robot system. This research sought best k-value to create proper face recognition with low-power processor. The proposed algorithm was tested on AT&T face dataset from Computer Laboratory, Cambridge University. The 15 images were set as testing image and 315 images were used as reference data set. OpenCV was choosen as main core image processing library, due to its high-speed. Proposed algorithm was implemented on ARM11 700MHz. Experiment result showed that KNN face recognition detected 93.3% face with k=1. Another proposed Histogram KNN face recognition gave 100% true detection with k=3. Overall experiment showed that proposed algorithm detected face on 2.657 s by ARM processor.
Research on Batch Scheduling in Cloud Computing Jiao Jintao; Yu Wensen; Guo Lei
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 4: December 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i4.3539

Abstract

In the existing cloud computing environment, batch scheduling strategies mainly focus on the management of resources allocation. This paper provides the task scheduling algorithm based on service quality which fully considers priority and scheduling deadline. The improved algorithm combines the advantages of Min-min algorithm with higher throughput and linear programming with global optimization, considers not only all the tasks but also the high priority tasks. The experiment result shows that compared with the Min-min and DBCT the completed tasks of the improved algorithm increase about 10.6% and 22.0%, on the other hand the completed high priority tasks also increases approximately 20% and 40%.
Performance Analysis of Data Traffic Offload Scheme on Long Term Evolution and IEEE 802.11AH Made Adi Paramartha Putra; Doan Perdana; Ridha Muldina Negara
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.6033

Abstract

One of new mobile technology is being developed by 3GPP is Long-Term Evolution (LTE). LTE usually used by user because provide high data rate. Many traffic sending over LTE, makes several users didn’t get good Quality of Service (QoS). Traffic diversion is needed to increasing QoS value. It can be done with offloading data method from LTE to Wi-Fi network. This paper using 802.11ah standard to evaluate Wi-Fi network. IEEE 802.11ah have 1000 meters coverage area and efficiency energy mechanism, which is proposed for M2M in 5G techonology. Some research has proven that traffic diversion with offloading can increasing network performance. The contribution of this paper is to evaluate the impact of traffic offload between LTE and IEEE 802.11ah standard. This paper propose two scenarios using increment number of user and increment mobility speed of user to evaluate throughput and delay value before and after the offload process. The simulation will simulate using Network Simulator-3. We can conclude that network performance after offloading is better for every scenario. For increment number of user scenario, throughput value increasing 29.08%, and delay decreasing 8.12%. Scenario with increment mobility speed of user obtain throughput value increasing 37,57%, and delay value decreasing 27.228%.
Stereo Vision Human Motion Detection and Tracking in Uncontrolled Environment Bunseng Chan; King Hann Lim; Lenin Gopal; Alpha Agape Gopalai; Darwin Gouwanda
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.9033

Abstract

Stereo vision in detecting human motion is an emerging research for automation, robotics, and sports science field due to the advancement of imaging sensors and information technology. The difficulty of human motion detection and tracking is relatively complex when it is applied to uncontrolled environment. In this paper, a hybrid filter approach is proposed to detect human motion in the stereo vision. The hybrid filter approach integrates Gaussian filter and median filter to reduce the coverage of shadow and sudden change of illumination. In addition, sequential thinning and thickening morphological method is used to construct the skeleton model. The proposed hybrid approach is compared with the normalized filter. As a result, the proposed approach produces better skeleton model with less influential effect on shadow and illumination. The output results of the proposed approach can show up to 86% of average accuracy matched with skeleton model. In addition, obtains approximately 94% of sensitivity measurement in the stereo vision. The proposed approach using hybrid filter and sequential morphology could improve the performance of the detection in the uncontrolled environment.
Analysis Predicted Location of Harmonic Distortion in RF Upconverter Structure Sirmayanti Sirmayanti; Mike Faulkner
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.7628

Abstract

A new mathematical analysis to predict the magnitude size of the distortion products from the signal up-conversion process output is presented. The signal up-conversion process converts the digital baseband from the analog baseband into a radio frequency signal. When the signal baseband involves frequency offsetting then occurring a number of distortion products which can reduce the dynamic range so it is difficult to meet the spectrum mask requirements within the operating band. This paper will focus on methods of new mathematical analysis using a continuous frequency range and only applies to a single side band tone, with constant amplitude into any value of frequency offsets. The novel contribution to the analysis starts at generating the gate signal and convolution of the gate signal into the reference carrier signal. The results show very close between the simulation results and the calculation of the predicted location of the distortions.
Imperceptible and secure image watermarking using DCT and random spread technique Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi; Christy Atika Sari; Nova Rijati
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.9227

Abstract

Watermarking is a copyright protection technique, while cryptography is a message encoding technique. Imperceptibility, robustness, and safety are aspects that are often investigated in watermarking. Cryptography can be implemented to increase watermark security. Beaufort cipher is the algorithm proposed in this research to encrypt watermark. The new idea proposed in this research is the utilization of Beaufort key for watermark encryption process as well as for spread watermark when inserted as PN Sequence substitute with the aim to improve imperceptibility and security aspects. Where PN Sequence is widely used in spread spectrum watermarking technique. Based on the experimental results and testing of the proposed method proved that imperceptibility and watermark security are increased. Improved imperceptibility measured by PSNR rose by about 5dB and so did the MSE score better. Robustness aspect is also maintained which has been proven by the excellent value of NCC.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue