cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Harmonic Suppression Rectangular Patch Antenna with Circularly Polarized Nurzaimah Zainol; Zahriladha Zakaria; Maisarah Abu; Mawarni Mohamed Yunus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 2: June 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i2.2394

Abstract

The rectangular patch antenna with proximity coupling at 2.45 GHz is designed and printed on FR-4 substrate with dielectric constant 4.3 and loss tangent 0.019. The overall size of proposed antenna gives 36 % reduction of substrate area as compared to conventional designs. The symmetrical arm of inverted U-stub and U-slot embedded on the transmission feed line suppress harmonic signal effectively at second and third order with minimum reflection coefficients of –0.51 dB and -2.28 dB respectively while circularly polarization was obtained by corner truncated and U-slot on the patch element. The return loss is -23.95 dB at fundamental modes with gain 4.61 dB and axial ratio of 1.48 dB.
Predicting the Level of Emotion by Means of Indonesian Speech Signal Fergyanto E. Gunawan; Kanyadian Idananta
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.3965

Abstract

Understanding human emotion is of importance for developing better and facilitating smooth interpersonal relations. It becomes much more important because human thinking process and behavior are strongly influenced by the emotion. Align with these needs, an expert system that capable of predicting the emotion state would be useful for many practical applications. Based on a speech signal, the system has been widely developed for various languages. This study intends to evaluate to which extent Mel-Frequency Cepstral Coefficients (MFCC) features, besides Teager energy feature, derived from Indonesian speech signal relates to four emotional types: happy, sad, angry, and fear. The study utilizes empirical data of nearly 300 speech signals collected from four amateur actors and actresses speaking 15 prescribed Indonesian sentences. Using support vector machine classifier, the empirical findings suggest that the Teager energy, as well as the first coefficient of MFCCs, are a crucial feature and the prediction can achieve the accuracy level of 86%. The accuracy increases quickly with a few initial MFCC features. The fourth and more features have negligible effects on the accuracy.
Biometrics Authentication of Fingerprint with Using Fingerprint Reader and Microcontroller Arduino Magdin Martin; Koprda Štefan; Ferenczy Ľubor
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.7572

Abstract

The idea of security is as old as humanity itself. Between oldest methods of security were included simple mechanical locks whose authentication element was the key. At first, a universal–simple type, later unique for each lock. A long time had mechanical locks been the sole option for protection against unauthorized access. The boom of biometrics has come in the 20th century, and especially in recent years, biometrics is much expanded in the various areas of our life. Opposite of traditional security methods such as passwords, access cards, and hardware keys, it offers many benefits. The main benefits are the uniqueness and the impossibility of their loss. The main benefits are the uniqueness and the impossibility of their loss. Therefore we focussed in this paper on the the design of low cost biometric fingerprint system and subsequent implementation of this system in praxtise. Our main goal was to create a system that is capable of recognizing fingerprints from a user and then processing them. The main part of this system is the microcontroller Arduino Yun with an external interface to the scan of the fingerprint with a name Adafruit R305 (special reader). This microcontroller communicates with the external database, which ensures the exchange of data between Arduino Yun and user application. This application was created for (currently) most widespread mobile operating system-Android.
Auto purchase order system between retailer and distributor Teguh Andriyanto; Ary Permatadeny Nevita
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.9948

Abstract

Uncertainty of goods inventory often triggers the occurrence of Bullwhip Effect, where there is accumulation of goods on a stage or lack of goods at another stage in the supply chain. Bullwhip Effect is caused by an error in ordering the amount of goods, error in the time of ordering or delivery of goods. The problem can be solved using information sharing. This research utilizing information sharing between two retailers and one distributors used for the ordering process of goods. The process of ordering goods retailers to distributors is done automatically based on sales data retailers. The order quantity is calculated based on the final stock and the maximum stock value of the goods.
Optimization of video steganography with additional compression and encryption Dwi Arraziqi; Endi Sailul Haq
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9513

Abstract

Currently, data such as text, images and video are very important. Therefore, data must be secured from unauthorized parties. In this paper, we propose a number of security levels, first using compression techniques on the data that will be hidden to reduce the size of the data, second using encryption techniques on data that has been compressed so that data is more secure, third using video steganography techniques on compressed and encrypted data so that unauthorized parties are increasingly difficult to extract data. Measurement of differences in quality of cover-video and stego-video using MSE (Mean Square Error), PSNR (Peak Signal to Noise Ratio), evolution histogram of video tags, and video playback. The results show that the proposed algorithm gives better results than the previous algorithm which has a smaller MSE, larger PSNR, smaller histogram evolution of video tags, and play video without distortion.
An overview of multi-filters for eliminating impulse noise for digital images Achmad Abdurrazzaq; Ahmad Kadri Junoh; Wan Zuki Azman Wan Muhamad; Zainab Yahya; Ismail Mohd
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.12888

Abstract

An image through the digitization process is referred to as a digital image. The quality of the digital image may be degenerating due to interferences on the acquisition, transmission, extraction, etc. This attracted the attention of many researchers to study the causes of damage to the information in the image. In addition to finding cause of image damage, the researchers also looking for ways to overcome this problem. There are many filtering techniques that have been introduced to deal the damage to the information in the image. In addition to eliminating noise from the image, filtering techniques also aims to maintain the originality of the features in the image. Among the many research papers on image filtering there is a lack of review papers which are an important to facilitate researchers in understanding the differences in each filtering technique. Additionally, it helps researchers determine the direction of research conducted based on the results of previous research. Therefore, this paper presents a review of several filtering techniques that have been developed so far.
Internet-offline solution: detail description and benchmarking Onno W. Purbo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.13309

Abstract

In this paper, for the first time, the detail of the Internet-Offline solution for rural/village schools is described, and its benchmarking is reported. For providing offline knowledge access, four (4) different systems have examined. An affordable, the RaspberryPi3 server found to be able to provide web as well as file sharing service for up to 20 clients at 100Mbps throughput. UnixBench shows that the RaspberryPi3 about 25% performance of a four-core i5 system. Using consumer grade power banks at 10000-20000mAh, the RaspberryPi3 server may provide a 6+ hour operation. With reliable electrical power, a mini PC provides a more reliable alternative at an order of magnitude increase in cost. For more than 100 users, one may use i5 or higher engines to keep the price-performance ratio low. Besides, in the Internet-Offline system, teachers no longer have to worry about bullies, hoax, or pornographic contents.
Notification information system android-based for spreading school information Wirawan Istiono; Jansen Sampurna
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18326

Abstract

School is a place where students can learn a lot, but beside as a place to learning, the school also has many events and activities that must be attended by students, or even sometimes must be attended by parents. To give information or invintation to the parents, some school give information by manual letter, email, social media or online chatting, but all that method to spread information has a weakness, because sometimes information that shown or give to parents or to students, often not accepted by students or parents, and beside that, to spread message to a lot people need a lot time and need a lot cost. To solve this issue, in this study will be build Android-based information notification application with push messaging services, where if there a new information from the school, the students or parents will receive notification new information to their Android smartphone, and after that, the details of this information can be seen in the applications. To get acceptance user result, we using user acceptance test (UAT) was conducted using the TAM method, the result has positive results were 84.88% from parent or student's side and obtained 84.67% from school administration's perspective as provider information, which means this system can be accepted and as expected by the user who receiving the information and by the school as information provider.
Colored Ball Position Tracking Method for Goalkeeper Humanoid Robot Soccer Arif Rahman; Nuryono Satya Widodo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 1: March 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i1.877

Abstract

The goalkeeper robot in a robot soccer game must be able to detect position of the ball and block the ball into the goal. Identifying the location of the ball using robot vision becomes very important in addition to the mechanical motion of the robot. This paper proposed method to track colored ball position for goalkeeper robot. First, image is captured with web camera and then color filtering based on HSL color model performed on each image frame in the video. After that, images from filtering process are detected its blob by labeling nearest connected components. The largest blob in image represents the ball. The next step is detection of ball position using 9-Cells coordinate. Ball position coordinate is updated in some period of time and then sends to robot controller to conduct the robot's movements appropriately. Experiment results show that system is able to detect the ball and its position in 9-Cells coordinate which can be used by goalkeeper robot soccer controller to block the ball.
KOMBINASI FEED BACK DAN FEED FORWARD KONTROLLER PI SEBAGAI KENDALI DYNAMIC VOLTAGE RESTORER (DVR) UNTUK MEMULIHKAN VOLTAGE SAG DAN INTERRUPTION Dimas Anton A; Imron Rosyadi; Mochamad Ashari; Heri Suryoatmojo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 7, No 2: August 2009
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v7i2.581

Abstract

Dynamic voltage restorer (DVR) is one of equipments to protect sensitive load from voltage drop. DVR is installed series with line feeder by serial transformer which injecting voltage when under voltage occurs. This research is investigate the capability of DVR, which controlled by combination of feed back and feed forward PI, to handle voltage sag and interruption. DVR controls have been designed and implemented in DVR prototype. As a result, in simulation, DVR can maintain voltage in range 90% - 105% nominal voltage. Voltage at load side can be restored to 1 pu and 0.79 pu when voltage sag and interruption respectively. Furthermore, DVR prototype can restore 0.95 pu when voltage sag and 0.54 pu when interruption.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue