cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Recursive Detection of M-Ary Signals over Fast Varying Mobile Communication Channel Ahmed El-Sayed El-Mahdy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 1: March 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i1.899

Abstract

          Mobile radio is characterized by a fast time varying channel. Conventional detectors which designed optimal for non-fading channel exhibit a limited performance in fast time varying channel. In this paper a recursive detector for M-ary signals over fast time varying mobile communication channel is introduced. The proposed detector continuously estimates the channel directly within the metric calculation of the log-likelihood function in a recursive manner. The estimation of the channel is performed by the covariance form of the recursive least square approach. The performance of the detector is evaluated in terms of the misdetection probability. The effects of timing and phase offsets on the performance of detector are examined by simulation. Simulation results show that the proposed detector can accommodate the fast time varying channel with adequate performance.
SISTEM PEMANTAU RUANG JARAK JAUH DENGAN SENSOR PASSIVE INFRARED BERBASIS MIKROKONTROLER AT89S52 Albert Gifson; Slamet Slamet
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 7, No 3: December 2009
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v7i3.595

Abstract

This research describes about the design of the room detection system using a Passive Infrared sensors (PIR) controlled by Microcontroller AT89S52 for remote control application. The output of the PIR is a low logic when it captures the heat waves of the human body. The output PIR is connected to the port 1.7 on Microcontroller in high logic. The maximum distance is 5 meters for the sensor to detect an object. When there is a signal sent by PIR, the Microcontroller processes the data and activates the buzzer to beep and the stepper motor to stop. Microcontroller also sends data through the RS-232 that continues a signal to the personal mobile phone.  In order that the message is able to be sent, then first, messages must be programmed and stored in the Microcontroller AT89S52. The average message delivery time is 8.8 seconds. The recipient can turn the alarm of system on or off by a missed call.
PENGENALAN POLA ALPHABET TULISAN TANGAN SECARA ON-LINE DENGAN JST-BP Tole Sutikno; Andhy Fathurrakhman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 3, No 2: August 2005
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v3i2.1228

Abstract

The intelligent system based in the backpropagation artificial neural network and image processing with GUI Matlab 7.0 was developed. This system is designed for on-line pattern recognition. In this experiments, system are trained dan tested using capital alfabet handwriting patterns that captured from on-line webcam automatically. Generally, the results of the experiments show that the system could recoginize with a high accuracy.
Recognition of Emotions in Video Clips: The Self-Assessment Manikin Validation Dini Handayani; Abdul Wahab; Hamwira Yaacob
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 4: December 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i4.2735

Abstract

Many research domains use video contents as stimuli for study on human emotions. A video content within a particular genre or a specific theme evokes dynamic emotions that are highly useful in many research fields. The present study proposed a set of video-clip stimuli that embody four emotions under specific genres of movies, namely happiness, calmness, sadness and fear. Two experiments (a preliminary and a validation) were conducted in order to validate the video clips. Self-Assessment Manikin was utilized to rate the videos. All the video clips were rated with respect to valence and arousal judgment. In the preliminary experiment, the video clips were rated in terms of how clearly the expected emotions were evoked. The validation experiment was conducted to confirm the results from preliminary experiment, and only video clips with high recognition rates were included into data set.
Hierarchical Gaussian Scale-Space on Androgenic Hair Pattern Recognition Regina Lionnie; Mudrik Alaydrus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.5381

Abstract

Androgenic hair pattern stated to be the new biometric trait since 2014. The research to improve the performance of androgenic hair pattern recognition system has begun to be developed due to the problems that occurred when other apparent biometric trait such as face is hidden from sight. The recognition system was built with hierarchical Gaussian scale-space using 4 octaves and 3 levels in each octave. The system also implemented the equalization process to adjust image’s intensity by using histogram equalization. We analyzed 400 images of androgenic hair in the database that were analyzed using 2-fold and 10-fold cross validation and Euclidean distance to classify it. The experimental results showed that our proposed method gave better performance compared to previous work that used Haar wavelet transformation and principal component analysis as the main method. The best recognition precision was 94.23 % obtained from the base octave with the third level using histogram equalization and 10-fold cross validation.   
Similarities of Antimalarial Resistance Genes in Plasmodium Falciparum Based on Ontology Dinar Munggaran Akhmad; Yeni Herdiyeni; Etih Sudarnika
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.6898

Abstract

The finding of P. falciparum chloroquine resistance (pfcrt) and P. falciparum multidrug resistance 1(pfmdr1) gene in P. falciparum has become an obstacle in treating malaria. The polymorphism between the two genes may result in molecular functions, in cellular components, or in biological processes. The objective of this research is to find similarities between the two genes in 3 components; cellular components, molecular functions and biological processes, based on Gene Ontology. the similarity will be counted semantically by path length approach with Wang method. The range of similarity values is 0-1. After the similarity value examined; in Molecular Function the similarity is 1 due to the same drug transmembrane transporter activity, in Cellular Component is 0,714, the similarity only at the same vacuole food cells, and in Biological Processes is 1 due to the same proces in responding to drug. Therefore, this research proves both genes have similarities based on gene ontology.
Efficient Data Security for Mobile Instant Messenger Putra Wanda; Huang J. Jie
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.4045

Abstract

Instant Messenger (IM) becomes one of the most popular applications in mobile technology and communication. A lot of users around the world installed it for daily activities. Current IM found security lacks both in authentication and encryption matters. Various IM growing today still not apply an efficient method in authentication and encryption process, conventional security methods and client-server architecture system have to risk too many users for attacking server such as compromising, cracking password or PINs by Unauthorized people. Common IM services lack native encryption to protect information being transmitted over the public network and still used high computation in the mobile environment, this problem needs efficient security methods. Then, in public IM also found various messages with fake users, it occurs because public IM carry out the separate system in authentication and encryption process, strong authentication need to solve this issue in messenger environment. The tremendous growth of mobile IM user needs efficient and secure communication way. This paper proposes a new efficient method for securing message both in encryption and authentication within the end-to-end model. In this research, security method proposes new algorithms based on Elliptic Curve (EC) works in Peer to Peer (P2P) architecture than a conventional client-server model. The result shows this method produces efficient time in authentication and encryption process while applying in a mobile environment. Besides, it is compatible with the mobile phone which has a limitation of computation capabilities and resources.
State-space averaged modeling and transfer function derivation of DC-DC boost converter for high-brightness led lighting applications Muhammad Wasif Umar; Norzaihar Yahaya; Zuhairi Baharudin
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10272

Abstract

This paper presents dynamic analysis of a boost type DC-DC converter for high-brightness LED (HBLED) driving applications. The steady state operation in presence of all system parasitics has been discussed for continuous conduction mode (CCM). The state-space averaging, energy conservation principle and standard linearization are used to derive ac small signal control to inductor current open-loop transfer function of the converter. The derived transfer function can be further used in designing a robust feed-back control network for the system. In the end frequency and transient responses of the derived transfer function are obtained for a given set of component values, hence to provide a useful guide for control design engineers.
A new Leach protocol based on ICH-Leach for adaptive image transferring using DWT Abdelali Zbakh; Mohamed Taj Bennani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.12446

Abstract

Nowadays, the rapid development and the miniaturization of CMOS image sensors in the last years allowed the creation of WMSN (Wireless Multimedia Sensor Network). Therefore, transferring images through the network becomes an important field of research. The main goal is to transmit the data from a sensor node to another to reach finally the Sink node. Thus, routing protocols play an important role in managing and optimizing the node's resources particularly the energy consumption. Therefore, some routing protocols are known by their ability to save energy and extend the lifetime of the network such as Leach protocol and derived variants. However, multimedia content transferring was not a priority for these protocols. In this paper, the main idea is to adapt ICH-Leach [1], for image transferring. This protocol was tested in a previous work and has given good performances against Leach [2], balanced Leach [3] and MLD-Leach [4]. In fact, the Haar wavelet transform is used, in the application layer, to extract the resolution level to be used in image transmission, depending on the rate flow between the sensor node and the sink node. This paper provides statistics concerning the lifetime of the network, the energy consumption and statistics related to receive images using the peak signal-to-noise ratio (PSNR). The Castalia framework is used for simulation, obtained results show the efficiency of the proposed approach by network lifetime extending and more images transmitting with better quality compared to other protocols.
Classification of pneumonia from X-ray images using siamese convolutional network Kennard Alcander Prayogo; Alethea Suryadibrata; Julio Christian Young
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14751

Abstract

Pneumonia is one of the highest global causes of deaths especially for children under 5 years old. This happened mainly because of the difficulties in identifying the cause of pneumonia. As a result, the treatment given may not be suitable for each pneumonia case. Recent studies have used deep learning approaches to obtain better classification within the cause of pneumonia. In this research, we used siamese convolutional network (SCN) to classify chest x-ray pneumonia image into 3 classes, namely normal conditions, bacterial pneumonia, and viral pneumonia. Siamese convolutional network is a neural network architecture that learns similarity knowledge between pairs of image inputs based on the differences between its features. One of the important benefits of classifying data with SCN is the availability of comparable images that can be used as a reference when determining class. Using SCN, our best model achieved 80.03% accuracy, 79.59% f1 score, and an improved result reasoning by providing the comparable images.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue