cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Efficient Content Location Using Semantic Small World in Peer-to-Peer Networks Yong Chen; Wei-zhong Xiao; Huan-lin Liu; Long-zhao Sun
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.909

Abstract

        Locating content in unstructured peer-to-peer networks is a challenging problem. This paper presents a novel semantic small world resource search mechanism to address the problem. By using vector space model to compute the semantic relevance and applying small world properties such as low average hop distance and high clustering coefficient to construct a cluster overlay. In semantic small world system, the search mechanism is divided into two parts, searching at cluster and outside cluster through inner link and short link, so that it can achieve the incremental research. It significantly reduces the average path length and query cost. Meanwhile, the simulation results show that semantic small world scheme outperforms K-random walks and flooding scheme than higher query hit rate and lower query latency.
METODE SINKRONISASI INVERTER SATU FASE DENGAN JARINGAN LISTRIK YANG TERDISTORSI Bambang Sujanarko
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 8, No 1: April 2010
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v8i1.604

Abstract

DC power sources from renewable energy sources that would be connected to the electricity grid system require synchronization process. This process is implemented by controlling the inverter in a way to obtain instantaneous amplitude, phase and frequency according to the electricity network. This research discussed a method for synchronizing VSI PWM inverters connected with distorted single-phase power grid using a filter as a pure sine generator, and a compensator as the restorer of angle change due to the power filtering. Results of simulation using MATLAB show that this method can produce better synchronization compared to other synchronization methods, as it successfully produce similar phase and waveform with the grid’s waveform.
VISUALISASI METODE REFLEKSOLOGI UNTUK PENYEMBUHAN PENYAKIT DENGAN VISUAL BASIC Kartika Firdausy; Anton Yudhana; Ikhsan Sugianto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 4, No 1: April 2006
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v4i1.1248

Abstract

Kesibukan yang makin meningkat dan faktor ekonomi sering membuat orang kurang peduli dengan kesehatan tubuhnya. Sering terjadi, manusia baru sadar ketika penyakitnya mulai berat. Tujuan penelitian ini adalah membuat visualisasi metode refleksologi untuk penyembuhan penyakit dengan Visual Basic yang menyajikan informasi tentang metode refleksologi melalui visualisasi yang mudah digunakan meski oleh orang awam sekalipun. Metode pengumpulan data dalam pembuatan Visualisasi Metode Refleksologi Untuk Penyembuhan Penyakit Dengan Visual Basic adalah dengan metode: observasi (melakukan pengamatan langsung terhadap kegiatan pemijatan titik refleks yang dilakukan di daerah Kulonprogo Yogyakarta) dan metode kepustakaan (membaca buku-buku yang berkaitan dengan metode refleksologi). Data yang diperoleh dikelompokkan sesuai dengan kebutuhan dan kemudian diolah dengan menggunakan bahasa pemrograman Visual Basic.Pada hasil penelitian program aplikasi Visualisasi Metode Refleksologi Untuk Penyembuhan Penyakit Dengan Visual Basic menyajikan beberapa pilihan menu, antara lain: menu anjuran memijat, menu cara memijat, menu penyakit dan gejalanya, menu metode refleksologi, menu gambar titik refleks, dan menu keluar. Software yang dibuat telah diuji coba terhadap beberapa orang responden, yaitu orang yang memahami metode refleksologi dan orang yang belum memahami metode refleksologi.  Dari pengujian didapatkan hasil: software visualisasi titik refleksologi tampilannya menarik, materi yang disajikan mudah dimengerti, dan cukup informatif.
Underwater Channel Characterization to Design Wireless Sensor Network by Bellhop Nima Bahrami; Nor Hisham Haji Khamis; Ameruddin Baharom; Azli Yahya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 1: March 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i1.2454

Abstract

Acoustic underwater link due to low attenuation is employed for underwater sensor network (UWSN). Due to water changing physical properties and different environmental conditions, the sound propagation for every underwater channel are different. So, the most important parameters to design reliable UWSN are: the shadow zone determination, optimum nodes placement, high signal to noise ratio and more power efficiency of nodes. This paper simulates underwater channel for 7 KHz carrier frequency, with measured physical water properties and remote sensing data. Based on defined scenario, the research determines optimum nodes placement and link budget analysis based on bottom to surface acoustic link. The paper utilizes Bellhop acoustic toolbox as a simulator, GeoMapApp program to collects bathymetry data and Aviso+ database to determine wind speed on sea surface. As a result the paper based on simulation of sound propagation in channel and transmission loss determination in depth and range, finds the optimum nodes positions and link budget calculation to prove the results.
Hybrids Otsu method, Feature region and Mathematical Morphology for Calculating Volume Hemorrhage Brain on CT-Scan Image and 3D Reconstruction Sumijan Sumijan; Sarifuddin Madenda; Johan Harlan; Eri Prasetya Wibowo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3146

Abstract

Traumatic brain injury is a pathological process of brain tissue that is not degenerative or congenital, but rather due to external mechanical force, which causes physical disorders, cognitive function, and psychosocial. These disorders can be permanent or temporary and accompanied by the loss of or change in level of consciousness. Segmentation techniques for Computed Tomography Scanner (CT scan) of the brain is one of the methods used by the radiologist to detect abnormalities or brain hemorrhage that occurs in the brain.  This paper discusses the extraction area of a brain hemorrhage on each image slice CT scan and 3D reconstruction, making it possible to visualize the 3D shape and calculating the volume of a brain hemorrhage. Extraction of brain hemorrhage area is based on a combination of Otsu algorithm, the algorithm Morphological features and algorithms region. For the reconstruction of a 3D brain hemorrhage area of the bleeding area on a 2D slice is done by using a linear interpolation approach.
Long-term Robust Tracking whith on Failure Recovery Khaled Hammemi; Mohamed Atri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.7271

Abstract

This article aims at a new algorithm for tracking moving objects in the long term. We have tried to overcome some potential difficulties, first by a comparative study of the measuring methods of the difference and the similarity between the template and the source image. In the second part, an improvement of the best method allows us to follow the target in a robust way. This method also allows us to effectively overcome the problems of geometric deformation, partial occlusion and recovery after the target leaves the field of vision. The originality of our algorithm is based on a new model, which does not depend on a probabilistic process and does not require a data based detection in advance. Experimental results on several difficult video sequences have proven performance advantages over many recent trackers. The developed algorithm can be employed in several applications such as video surveillance, active vision or industrial visual servoing.
A New Design of an UWB Circular Fractal Printed Antenna Akram El Hamdouni; Abdelali Tajmouati; Jamal Zbitou; Ahmed Errkik; Larbi El Abdellaoui; Mohamed Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.9548

Abstract

A Microstrip Antenna (MSA) has been computed and analysed in this study by using CST of Microwave studio as Electromagnetic solver by generating the coefficient of reflection, the Gain, the density of current and the radiation pattern in the frequency range 3.1-10.6 GHz which commercialised by the Federal communication commission (FCC) as an Ultra-wide band (UWB) frequency range. The substrate used to achieve the proposed structure is the FR4-Epoxy with a thickness of 1.6 mm, a constant dielectric of 4.4 and a loss tangent of 0.025. The radiating patch is a circular shape etched with different sizes to create the fractal geometry. The transmission line has been designed by including a tapered section in the part connected to the radiator. The design of the antenna has been verified by using ADS and CST solvers. The fabrication of the antenna has been performed in order to measure the coefficient of reflection and the radiation pattern.
Security risk analysis of bring your own device system in manufacturing company at Tangerang Astari Retnowardhani; Raziv Herman Diputra; Yaya Sudarya Triana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10165

Abstract

Nowadays information system has become popular used for help effectiveness and efficiency operation on a company. Bring Your Own Device (BYOD) system is a growing trend in corporate environment, where employees could access the system from anywhere. BYOD system is system information development using some technology like a Virtual Private Networks (VPN) or using some application to make the client on outside network office can access to inside networks with remote system. The remote system has strength to help employees working anywhere and anytime, that could make some issue for a security thing. The security issue that can be happen is unauthorized access and lost some important of company information. XYZ company as a manufacturing company in Tangerang, Indonesia has been used BYOD system in their company. They want to improve the security of the system with do risk analysis, with the aim to protect the internal data. The risk analysis use Cybersecurity Framework NIST will assist organizations to understand the risk of BYOD system. The analysist results obtained by the use of cybersecurity analysis on BYOD system in XYZ company are found some improvement need to develop in terms of security system recommended. According to the stages of respond with the analysis using Cybersecurity NIST framework and ISO/IEC 27002:2013.
PAPR analysis of OFDM system using AI based multiple signal representation methods Jyoti Shukla; Alok Joshi; Rajesh Tyagi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.11511

Abstract

OFDM (orthogonal frequency division multiplexing) is widely used in 4th generation applications owing to its robustness in fading environments. The major issues with OFDM systems is the high PAPR (peak-to-average power ratio) of the transmitted signals, it leads to in and out of band distortion. SLM (selective mapping) and PTS (partial transmit sequence) are two key methods for PAPR reduction. Both the methods require exhaustive searching of phase factors to optimize the PAPR, these searches lead to high computational complexity. This paper discusses using optimization based PAPR reduction methods which an be used with PTS for the reduction of computational complexity and search space. In this paper we have analyzed PTS and SLM with particle swarm optimization (PSO), Artificial Bee Colony (ABC) and differential evolution (DE). PAPR and BER (bit error rate) comparison is done for both the cases.
Training feedforward neural network using genetic algorithm to diagnose left ventricular hypertrophy J. Revathi; J. Anitha; D. Jude Hemanth
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.15225

Abstract

In this research work, a new technique was proposed for the diagnosis of left ventricular hypertrophy (LVH) from the ECG signal. The advanced imaging techniques can be used to diagnose left ventricular hypertrophy, but it leads to time-consuming and more expensive. This proposed technique overcomes thesef issues and may serve as an efficient tool to diagnose the LVH disease. The LVH causes changes in the patterns of ECG signal which includes R wave, QRS and T wave. This proposed approach identifies the changes in the pattern and extracts the temporal, spatial and statistical features of the ECG signal using windowed filtering technique. These features were applied to the conventional classifier and also to the neural network classifier with the modified weights using a genetic algorithm. The weights were modified by combining the crossover operators such as crossover arithmetic and crossover two-point operator. The results were compared with the various classifiers and the performance of the neural network with the modified weights using a genetic algorithm is outperformed. The accuracy of the weights modified feedforward neural network is 97.5%.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue