cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Dynamic Stability Improvement of Multimachine Power Systems using ANFIS-based Power System Stabilizer Agung Budi Muljono; I Made Ginarsa; I Made Ari Nrartha
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2049

Abstract

Modern power system are very vurnerable to against load fluctuation during their operation. Load fluctuation identified as small disturbance is important to test dynamic (small signal) stability. This research is focused on improvement of multimachine dynamic stability by using ANFIS-based power system stabilizer (proposed PSS). ANFIS method is proposed because the ANFIS computation is more efective than Mamdani fuzzy computation. Simulation results show that the proposed PSS is able to maintain the dynamic stability by decreasing peak overshoot (Po) to the value -3,37´10-5 pu/pu and accelerating settling time (St) to the time 4.01 s for rotor speed deviation Machine-2. Also, the Po is decreased to the value -3,37´10-5 pu/pu and the St is accelerated to the time 3.98 s for rotor speed deviation Machine-3.
Flower Pollination for Rotary Inverted Pendulum Stabilization with Delay Srikanth Kavirayani; Nagesh Kumar Gundavarapu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3403

Abstract

Flower pollination is a single objective optimization technique which as a unconstrained optimization method is applied for the stabilization of the rotary inverted pendulum system. It was observed that the flower pollination method gave better sensitivity in control of the pendulum about its upright unstable equilibrium position with less time and definitely indicated that the method is an energy efficient method when compared with other methods like direct pole placement.  This method yielded results under the influence of time delay and have proven that the influence of time delay is significantly felt and would cause loss of energy, however the presence of flower pollination for optimization minimizes the loss incurred due to time delay and makes the system significant in terms of sensitivity.
A Review of Methods Employed to Identify Flicker Producing Sources Jeevan Inamdar; K. Iyswarya Annapoorani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.6678

Abstract

Because of increasing requirements of the present consumers and industrial units utilizing sensitive loads, there is need of good power quality in order to retain the power quality standards. Nowadays the study of the voltage flicker is becoming essential part of power quality studies. The flicker is typically the effect of a rapidly changing load which is large with respect to the short circuit ability of an electrical supply system. The inferior effects of voltage flicker include malfunctioning of power electronic equipment. Also it causes annoying effects to human. Hence detection of the flicker source is an essential step in the power quality assessment process. This paper delivers a review about methods used to identify flicker producing loads in accordance with IEC 61000-4-15. Once the report related to the disturbance place is known, an investigation and corrective action can be accordingly carried out. Also a method based upon Discrete Wavelet Transform and Artificial Neural Network is proposed to detect initial instance of occurrence of flicker.
Maximum Power Point Tracking Charge Controller for Standalone PV System Mohd Asri Jusoh; Mohammad Faridun Naim Tajuddin; Shahrin Md Ayob; Mohd Azrik Roslan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.9512

Abstract

The depletion of conventional energy sources and global warming has raised worldwide awareness on the usage of renewable energy sources particularly solar photovoltaic (PV). Renewable energy sources are non-polluting sources which can meet energy demands without causing any environmental issues. For standalone PV systems, a low conversion efficiency of the solar panel and high installation cost due to storage elements are the two primary constraints that limit the widespread use of this system. As the size of the system increases, the demand for a highly efficient tracking and charging system is very crucial. Direct charging of battery with PV module will results in loss of capacity or premature battery degradation. Furthermore, most of the available energy generated by the PV module or array will be wasted if proper tracking technique is not employed. As a result, more PV panels need to be installed to provide the same output power capacity. This paper presents selection, design and simulation of maximum power point tracker (MPPT) and battery charge controller for standalone Photovoltaic (PV) system. Contributions are made in several aspects of the whole system, including selection of suitable converter, converter design, system simulation, and MPPT algorithm. The proposed system utilizes direct duty cycle technique thus simplifying its control structure. MPPT algorithm based on scanning approach has been applied by sweeping the duty cycle throughout the I-V curve to ensure continuous tracking of the maximum power irrespective of any environmental circumstances. For energy storage, lead acid battery is employed in this work. MATLAB/Simulink® was utilized for simulation studies. Results show that the propose strategy can track the MPPs and charge the battery effectively.
Stereo matching based on absolute differences for multiple objects detection Rostam Affendi Hamzah; Melvin Gan Yeou Wei; Nik Syahrim Nik Anwar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9185

Abstract

This article presents a new algorithm for object detection using stereo camera system. The problem to get an accurate object detion using stereo camera is the imprecise of matching process between two scenes with the same viewpoint. Hence, this article aims to reduce the incorrect matching pixel with four stages. This new algorithm is the combination of continuous process of matching cost computation, aggregation, optimization and filtering. The first stage is matching cost computation to acquire preliminary result using an absolute differences method. Then the second stage known as aggregation step uses a guided filter with fixed window support size. After that, the optimization stage uses winner-takes-all (WTA) approach which selects the smallest matching differences value and normalized it to the disparity level. The last stage in the framework uses a bilateral filter. It is effectively further decrease the error on the disparity map which contains information of object detection and locations. The proposed work produces low errors (i.e., 12.11% and 14.01% nonocc and all errors) based on the KITTI dataset and capable to perform much better compared with before the proposed framework and competitive with some newly available methods.
Advanced watermarking technique to improve medical images’ security Media Anugerah Ayu; Teddy Mantoro; I Made Alan Priyatna
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.13292

Abstract

Advances in imaging technology have made medical images become one of the important sources for information in supporting accurate diagnoses and treatment decisions by doctors for their patients. However, the vulnerability of medical images’ security is high. The images can be easily ‘attacked’, which altered their information that can lead to incorrect diagnoses or treatment. In order to make the images less vulnerable from outside attacks, this study proposes to secure them by advancing the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarkingwill guarantee the integrity, authenticity, and confidentiality of patient’s and any other important information and also the pixel data of the medical images. The work in this study implements two LSBs of image where the role of the first LSB is as a tamper detector, and the second LSB is used to store patient’s and any other important information. Medical images of four deadliest diseases in Indonesia were used to test the proposed watermarking technique. Results from the conducted tests show that the proposed technique able to generate a watermarked image that has no noticeable changes compared to its original image, with PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to have a higher level of security on medical images, compared to DICOM standard and standard watermarking method.
Cleveree: an artificially intelligent web service for Jacob voice chatbot Octavany Octavany; Arya Wicaksana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14791

Abstract

Jacob is a voice chatbot that use Wit.ai to get the context of the question and give an answer based on that context. However, Jacob has no variation in answer and could not recognize the context well if it has not been learned previously by the Wit.ai. Thus, this paper proposes two features of artificial intelligence (AI) built as a web service: the paraphrase of answers using the Stacked Residual LSTM model and the question summarization using Cosine Similarity with pre-trained Word2Vec and TextRank algorithm. These two features are novel designs that are tailored to Jacob, this AI module is called Cleveree. The evaluation of Cleveree is carried out using the technology acceptance model (TAM) method and interview with Jacob admins. The results show that 79.17% of respondents strongly agree that both features are useful and 72.57% of respondents strongly agree that both features are easy to use.
New prediction method for data spreading in social networks based on machine learning algorithm Maytham N. Meqdad; Rawya Al-Akam; Seifedine Kadry
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16300

Abstract

Information diffusion prediction is the study of the path of dissemination of news, information, or topics in a structured data such as a graph. Research in this area is focused on two goals, tracing the information diffusion path and finding the members that determine future the next path. The major problem of traditional approaches in this area is the use of simple probabilistic methods rather than intelligent methods. Recent years have seen growing interest in the use of machine learning algorithms in this field. Recently, deep learning, which is a branch of machine learning, has been increasingly used in the field of information diffusion prediction. This paper presents a machine learning method based on the graph neural network algorithm, which involves the selection of inactive vertices for activation based on the neighboring vertices that are active in a given scientific topic. Basically, in this method, information diffusion paths are predicted through the activation of inactive vertices byactive vertices. The method is tested on three scientific bibliography datasets: The Digital Bibliography and Library Project (DBLP), Pubmed, and Cora. The method attempts to answer the question that who will be the publisher of thenext article in a specific field of science. The comparison of the proposed method with other methods shows 10% and 5% improved precision in DBL Pand Pubmed datasets, respectively.
Classification and Numbering of Dental Radiographs for an Automated Human Identification System Anny Yuniarti; Anindhita Sigit Nugroho; Bilqis Amaliah; Agus Zainal Arifin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 1: March 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i1.771

Abstract

 Dental based human identification is commonly used in forensic. In a case of large scale investigation, manual identification needs a large amount of time. In this paper, we developed an automated human identification system based on dental radiographs. The system developed has two main stages. The first stage is to arrange a database consisting of labeled dental radiographs. The second stage is the searching process in the database in order to retrieve the identification result. Both stages use a number of image processing techniques, classification methods, and a numbering system in order to generate dental radiograph’s features and patterns. The first technique is preprocessing which includes image enhancement and binarization, single tooth extraction, and feature extraction. Next, we performed dental classification process which aims to classify the extracted tooth into molar or premolar using the binary support vector machine method. After that, a numbering process is executed in accordance with molar and premolar pattern obtained in the previous process. Our experiments using 16 dental radiographs that consist of 6 bitewing radiographs and 10 panoramic radiographs, 119 teeth objects in total, has shown good performance of classification. The accuracy value of dental pattern classification and dental numbering system are 91.6 % and 81.5% respectively.
The Implementation of Henon Map Algorithm for Digital Image Encryption Edi Sukirman; Suryadi MT; M. Agus Mubarak
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.83

Abstract

Security information is a very important aspect that must be noticed. Information not only in the form of text but also in form of data image. Using data encription to send private information have been widely use. But still need to improve the endurance from bruto force attack. One ways to improve it, is by using chaos theory with henom algorithm. Test result gave the alghoritm can encrypt image data from grayscale type to colorfull type. Encryption and descryption time proportional to the size image. Composition and variety coulor doesn’t effect the time. This algorithm has key space of  and key sensitivity up to . So, it can be concluded that, the algorithm is very difficult to be cracked by brute force attack.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue