cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
A Model to Predict The Live Bodyweight of Livestock Using Back-Propagation Algorithm Inggih Permana; Ria Agustina; Endah Purnamasari; Febi Nur Salisah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.6716

Abstract

Cattle is the most popular livestock in Indonesia. Assessments of the live bodyweight of cattle can be conducted through weighing or predicting. Weighing is an accurate method, but it is not efficient due to the prices of scales that most traditional farmers cannot afford. Prediction is a more affordable technique however occurrences of error remains high. To deal with this issue this research has created a model predicting the live bodyweight of cattle through Back-Propagation algorithm. There are four morphometric variables examined in this study: (1) body length; (2) withers height; (3) chest girth; and (4) hip width. Based on comparative results with conventional prediction methods, Schoorl Indonesia and Schoorl Denmark, showed that the method offered has a lower error. Rate of error is 60.54% lower than Schoorl Denmark and 53.95% lower than Schoorl Indonesia.
Exploiting Outage Performance of Wireless Powered NOMA Dinh-Thuan Do; Chi-Bao Le
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.9385

Abstract

Considering a dual-hop energy-harvesting (EH) non-orthogonal multiple access (NOMA) relaying system, this paper considers novel relaying protocol based on time power switching-based relaying (TPSR) and power switching-based relaying (PSR) schemes for two kinds of gain factors regarding amplify-and-forward mode. We introduce novel system model relaying network with impacts of energy harvesting fractions and derive analytical expressions for outage probability for the information transmission link. It confirmed that right selection of power allocation for NOMA to obtain optimal performance as compared study in two considered schemes. We also explore impacts of other key parameters of system to outage performance evaluation for different channel models. Simulation results are presented to corroborate the proposed methodology.
Online video-based abnormal detection using highly motion techniques and statistical measures Ahlam Al-Dhamari; Rubita Sudirman; Nasrul Humaimi Mahmood; Nor Hisham Khamis; Azli Yahya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12753

Abstract

At the essence of video surveillance, there are abnormal detection approaches, which have been proven to be substantially effective in detecting abnormal incidents without prior knowledge about these incidents. Based on the state-of-the-art research, it is evident that there is a trade-off between frame processing time and detection accuracy in abnormal detection approaches. Therefore, the primary challenge is to balance this trade-off suitably by utilizing few, but very descriptive features to fulfill online performance while maintaining a high accuracy rate. In this study, we propose a new framework, which achieves the balancing between detection accuracy and video processing time by employing two efficient motion techniques, specifically, foreground and optical flow energy. Moreover, we use different statistical analysis measures of motion features to get robust inference method to distinguish abnormal behavior incident from normal ones. The performance of this framework has been extensively evaluated in terms of the detection accuracy, the area under the curve (AUC) and frame processing time. Simulation results and comparisons with ten relevant online and non-online frameworks demonstrate that our framework efficiently achieves superior performance to those frameworks, in which it presents high values for he accuracy while attaining simultaneously low values for the processing time.
A survey on android security: development and deployment hindrance and best practices Ratul Sikder; Md Shohel Khan; Md Shohrab Hossain; Wazir Zada Khan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13288

Abstract

Android OS is the most popular mobile OS for the past few years. Vulnerabilities arise with respect to the increasing functionality of Android OS, impolitic app development practices of developers, end-user incautious and interestingly remediation for the vulnerabilities has been introduced frequently as well. To mitigate security risk factor Google has been updated, deprecated and restricted many system level APIs for 3rd party developers. Considering the consequences, this paper provides a wide overview of Android’s system level app development, privacy issues, and guideline for the developers about what measure they should consider while developing apps. We also discussed the historical development of Android OS and the end-users role to maintain privacy and to minimize security risks.
On-chip ultra low power optical wake-up receiver for wireless sensor nodes targeting structural health monitoring Chia Yee Saw; Yan Chiew Wong; Ser Lee Loh; Haoyu Zhang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.13378

Abstract

Wireless sensor network (WSN) consists of distributed nodes deployed for monitoring the physical conditions and organizing collected data at the central control unit. Power consumption is the challenges in WSN as the network consists of wireless sensor nodes becomes denser. By utilizing WSN and visible light technology, a simple health monitoring system design can be approached that are smaller in size, faster and lower power consumption. This work focuses on design a low power optical wake-up receiver to reduce the energy consumption of each node in WSN. A wake-up receiver is designed to be always-on for detecting incoming signal and switches on the stand by protocol controller and WSN network for data transmission process. The characteristic of optical transmission and functional circuit of a wake-up receiver has been investigated. A low power optical wake-up receiver has been designed in 180nm Silterra CMOS process technology. The proposed wake-up receiver consumes only 443pW in standby mode and 1.89nW in active mode. The proposed optical wake-up receiver drastically reduces the power consumption by more than one third compared to other wake-up receivers which could be a milestone in the medical field if successfully conducted.
Deep fingerprint classification network Abdulsattar M. Ibrahim; Abdulrahman K. Eesee; Raid Rafi Omar Al-Nima
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18771

Abstract

Fingerprint is one of the most well-known biometrics that has been used for personal recognition. However, faked fingerprints have become the major enemy where they threat the security of this biometric. This paper proposes an efficient deep fingerprint classification network (DFCN) model to achieve accurate performances of classifying between real and fake fingerprints. This model has extensively evaluated or examined parameters. Total of 512 images from the ATVS-FFp_DB dataset are employed. The proposed DFCN achieved high classification performance of 99.22%, where fingerprint images are successfully classified into their two categories. Moreover, comparisons with state-of-art approaches are provided.
SIMULASI PENGUKURAN PERUBAHAN FREKUENSI DOPPLER ULTRASONIK PADA BENDA YANG BERGERAK Margi Sasono; Ishafit Ishafit
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 3, No 3: December 2005
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v3i3.1236

Abstract

Simulasi dari skema pengukuran perubahan frekuensi Doppler ultrasonik telah ditunjukkan. Skema ini digunakan untuk mendeteksi kelajuan dari suatu benda yang sedang bergerak. Sinyal gelombang ultrasonik ditimpakan pada benda yang sedang bergerak dan sinyal yang terpantul kemudian diolah untuk mengidentifikasi spektrum perubahan frekuensi  Doppler ultrasoniknya dengan menggunakan algoritma FFT (Fast Fourier Transform). Sebagai parameter masukan adalah frekuensi transmiter, frekuensi sampling, kecepatan ultrasonik, kelajuan obyek dan sudut efektif antara berkas ultrasonik dengan lintasan linear gerak obyek. Implementasi simulasi dilakukan dengan MATLAB berbasis GUI (Graphical User Interface). Hasil simulasi menunjukkan bahwa dengan frekuensi transmiter 200 kHz dan kelajuan obyek sekitar 144 km/jam dalam bidang transportasi, spektrum perubahan frekuensi Doppler ultrasonik nampak jelas dan nilai terukurnya sekitar 38 kHz. Namun, dalam bidang medis untuk pengukuran akelajuan aliran darah dengan frekuensi transmiter 10 MHz dan kelajuan benda 7 m/s,  spektrum beda frekuensi Doppler ultrasonik tidak begitu jelas tetapi nilai terukurnya sekitar 73,54 kHz.
Text Mining Research Based on Intelligent Computing in Information Retrieval System Yong Li
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.1788

Abstract

With the popularity and rapid development of the Internet, web text information has rapidly grown as well. To address the key problem of text mining, text clustering is investigated in this study. The shuffled frog leaping algorithm as a new type of swarm intelligence optimization algorithm can be used to improve the performance of the K-means algorithm, but the shuffled frog leaping algorithm is influenced by its moving step length. On the basis of this information, the shuffled frog leaping algorithm is improved, and the K-means clustering algorithm based on the improved shuffled frog leaping algorithm is introduced. Experiment results show that the proposed scheme can enhance the ability of searching for the optimal initial clustering center and can effectively avoid instability in the clustering results of the K-means clustering algorithm. The proposed scheme also reduces the chances of the algorithm falling into the local optimum. The performance of the proposed clustering scheme is found to be better than that of the clustering algorithm based on the shuffled frog leaping algorithm.
Compound Control of Electromagnetic Linear Actuator Based on Fuzzy Switching Zhu Jianhui; Wang Cheng; Dai Jianguo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.4685

Abstract

Due to the motion control system of electromagnetic linear actuator (EMLA) is a nonlinear system with poor controllability, single control strategy has been difficult to meet the requirements of its control. A compound control strategy based on inverse system control (ISC) and proportional-integral (PI) is designed in this paper. Switching between two algorithms, which is based on the fuzzy rules, prevents the control algorithm to jitter and jump. System model is build under Matlab/Simulink to do simulation analysis. The designed controller is integrated into the system simulation model and the system software of digital signal processor (DSP) controller. Simulation and test results show that the compound control strategy using fuzzy switching rules achieves the smooth transition of two control algorithms, and the goal of any position location, and continuous adjustment in 0~4mm lift. Positioning accuracy is up to ± 0.02mm, while the response time is less than 10ms.
Algorithm for Predicting Compound Protein Interaction Using Tanimoto Similarity and Klekota-roth Fingerprint Isnan Mulia; Wisnu Ananta Kusuma; Farit Mochamad Afendi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.5916

Abstract

This research aimed to develop a method for predicting interaction between chemical compounds contained in herbs and proteins related to particular disease. The algorithm of this method is based on binary local models algorithm, with protein similarity section is omitted. Klekota-Roth fingerprint is used for the compound's representation. In the development process of the method, three similarity functions are compared: Tanimoto, Cosine, and Dice. Youden’s index is used to evaluate optimum threshold value. The result showed that Tanimoto similarity function yielded higher similarity values and higher AUC value than those of the other two functions. Moreover, the optimum threshold value obtained is 0.65. Therefore, Tanimoto similarity function and threshold value 0.65 are selected to be used on the prediction method. The average evaluation accuracy of the developed algorithm is only about 50%. The low accuracy value is allegedly caused by the only use of compound similarity on the prediction method, without including the protein similarity.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue