cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Performance analysis of negative group delay network using MIMO technique Yaqeen S. Mezaal; Marwah Al-Ogaidi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 5: October 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i5.13666

Abstract

This study introduces comparative consequences that determine the bit error rate enhancements, resultant from adopting a proposed MIMO wireless model in this study. The antenna configurations for this model uses new small microstrip slotted patch antenna with multiple frequency bands at strategic operating frequencies of 2.4, 4.4, and 5.55 respectively. The S11 response of the proposed antenna for IEEE802.11 MIMO wireless network has been highly appropriate to be adopted with MIMO antenna system. The negative group delay (NGD) response is the most significant feature for projected MIMO antenna. The NGD stands for a counterintuitive singularity that interacts time advancement with wave propagation. These improvements are employed for increasing a reliability of instantly conveyed data streams, enhance the capacity of the wireless configuration and decrease the bit error rate (BER) of adopted wireless system. In addition to antenna scattering response, the enhancements have been analysed in term of BER for different MIMO topologies.
Dialogue management using reinforcement learning Binashir Rofi’ah; Hanif Fakhrurroja; Carmadi Machbub
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 3: June 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i3.18319

Abstract

Dialogue has been widely used for verbal communication between human and robot interaction, such as assistant robot in hospital. However, this robot was usually limited by predetermined dialogue, so it will be difficult to understand new words for new desired goal. In this paper, we discussed conversation in Indonesian on entertainment, motivation, emergency, and helping with knowledge growing method. We provided mp3 audio for music, fairy tale, comedy request, and motivation. The execution time for this request was 3.74 ms on average. In emergency situation, patient able to ask robot to call the nurse. Robot will record complaint of pain and inform nurse. From 7 emergency reports, all complaints were successfully saved on database. In helping conversation, robot will walk to pick up belongings of patient. Once the robot did not understand with patient’s conversation, robot will ask until it understands. From asking conversation, knowledge expands from 2 to 10, with learning execution from 1405 ms to 3490 ms. SARSA was faster towards steady state because of higher cumulative rewards. Q-learning and SARSA were achieved desired object within 200 episodes. It concludes that RL method to overcome robot knowledge limitation in achieving new dialogue goal for patient assistant were achieved.
UHF RFID Tag Antenna for Vehicle License Plate Number (e-Plate) Evizal Evizal; Tharek Abdul Rahman; Sharul Kamal Abdul Rahim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.935

Abstract

 In this research presents a new design of UHF RFID tag antenna for vehicle license plate number (e-plate). The proposed e-plate does not require another gadget or equipment since every vehicle is attached with a vehicle registration plate number and this e-plate embedded together. A low cost FR4 material has been used for its fabrication and there is performance improvement compared to the current tag antenna. The proposed antenna design works at 902-928 MHz frequency band for UHF RFID application with 3.8 dBi antenna gain. The antenna is rectangular in shape and has a dimension of 300 mm x 100 mm, which is usually the typical size of the conventional vehicle registration plate number. Acceptable responses were obtained in simulation at centre frequency of 915 MHz with reflection coefficient of -57.7 dB.  The performance of proposed e-plate antenna was further tested by attaching a RFID tag chip and embedded it to the actual vehicle plate number. Initial testing on the field by attached e-plate on vehicle was achieved maximum reading range of up to 12 meters.
A FUZZY LOGIC CLASSIFICATION OF INCOMING PACKET FOR VOIP Suardinata Suardinata; Kamalrulnizam Bin Abu Bakar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 8, No 2: August 2010
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v8i2.618

Abstract

The Voice over Internet Protocol (VoIP) technology is cheaper and does not need new infrastructure because it has availables in the global computer (IP) network. Unfortunately, transition from PSTN to VoIP networks have emerged new problems in voice quality. Furthermore, the transmission of voice over IP networks can generate network congestion due to weak supervision of the traffic incoming packet, queuing and scheduling. This congestion affects the Quality of Service (QoS) such as delay, packet drop and packet loss. Packet delay effects will affect the other QoS such as: unstable voice packet delivery, packet jitter, packet loss and echo. Priority Queuing (PQ) algorithm is a popular technique used in the VoIP network to reduce delays. But, the method can result in repetition. This recursive leads to the next queue starved. To solving problems, there are three phases namely queuing, classifying and scheduling. It will be applied to the fuzzy inference system to classify the queuing incoming packet (voice, video and text). To justify the research of the improved PQ algorithm be compared against the algorithm existing.
Quantum Particle Swarm Optimization Algorithm Based on Dynamic Adaptive Search Strategy Jing Huo; Xiaoshu Ma
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1266

Abstract

The particle swarm system simulates the evolution of the social mechanism. In this system, the individual particle representing the potential solution flies in the multidimensional space in order to find the better or the optimal solution. But because of the search path and limited speed, it's hard to avoid local best and the premature phenomenon occurs easily. Based on the uncertain principle of the quantum mechanics, the global search ability of the quantum particle swarm optimization (QPSO) algorithms are better than the particle swarm optimization algorithm (PSO). On the basis of the fundamental quantum PSO algorithm, this article introduces the grouping optimization strategy, and meanwhile adopts the dynamic adjustment, quantum mutation and possibility acceptance criteria to improve the global search capability of the algorithm and avoid premature convergence phenomenon. By optimizing the test functions, the experimental simulation shows that the proposed algorithm has better global convergence and search ability.
Demosaicing of Color Images by Accurate Estimation of Luminance V.N.V. Satya Prakash; K. Satya Prasad; T. Jaya Chandra Prasad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 1: March 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i1.2634

Abstract

Digital cameras acquire color images using a single sensor with Color filter Arrays. A single color component per pixel is acquired using color filter arrays and the remaining two components are obtained using demosaicing techniques. The conventional demosaicing techniques existent induce artifacts in resultant images effecting reconstruction quality. To overcome this drawback a frequency based demosaicing technique is proposed. The luminance and chrominance components extracted from the frequency domain of the image are interpolated to produce intermediate demosaiced images. A novel Neural Network Based Image Reconstruction Algorithm is applied to the intermediate demosaiced image to obtain resultant demosaiced images. The results presented in the paper prove the proposed demosaicing technique exhibits the best performance and is applicable to a wide variety of images.
Mathematical Modeling and Fuzzy Adaptive PID Control of Erection Mechanism Feng Jiangtao; Gao Qinhe; Guan Wenliang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3568

Abstract

This paper describes an application of fuzzy adaptive PID controller to erection mechanism. Mathematical model of erection mechanism was derived. Erection mechanism is driven by electro-hydraulic actuator system which is difficult to control due to its nonlinearity and complexity. Therefore fuzzy adaptive PID controller was applied to control the system. Simulation was performed in Simulink software and experiment was accomplished on laboratory equipment. Simulation and experiment results of erection angle controlled by fuzzy logic, PID and fuzzy adaptive PID controllers were respectively obtained. The results show that fuzzy adaptive PID controller can effectively achieve the best performance for erection mechanism in comparison with fuzzy logic and PID controllers.
A Novel Configuration of a Microstrip Microwave Wideband Power Amplifier for Wireless Application Amine Rachakh; El Abdellaoui Larbi; Zbitou Jamal; Ahmed Errkik; Abdelali Tajmouati; Latrach Mohamed
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.7369

Abstract

RF/microwave power amplifier (PA) is one of the components that has a large effect on the overall performance of communication system especially in transmitter system and their design is decided by the parameters of transistor selected. This letter presents a new concept of a wide-band microwave amplifier using scattering parameters that is often used in the radio frequency communication systemas an application of the active integrated antenna[1- 2]. This power amplifier operates from 1.75 GHz to 2.15GHz frequency and it is based on AT-41410 NPN transistor that has a high transition frequency of 10GHz. The proposed Single Stage PA is designed by microstrip technology and simulated with Advanced Design System (ADS) software. The simulation results indicate good performances; the small power gain (S21) is changed between 11.8 and 10dB. For the input reflection coefficient (S11) is varied between -11 and -22.5dB. Regarding the output reflection coefficient (S22) is varied between -13.1 and -18.7dB over the wide frequency band of 1.75-2.15GHz and stability without oscillating over a wide range of frequencies.
A Miniature L-slot Microstrip Printed Antenna for RFID Mohamed Ihamji; El hassane Abdelmounim; Jamal Zbitou; Hamid Bennis; Mohamed Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.9378

Abstract

This work presents a miniature microstrip antenna at 2.45 GHz by using the slots technique. This microstrip antenna is fed by a CPW technique and designed for RFID reader system on FR4 substrate. A size reduction equal to 66.6% has been obtained compared to the conventional rectangular microstrip antenna. The total area of the final circuit is 19x31 mm2. The validated antenna has good matching input impedance with a stable radiation pattern, a loss return of -40 dB, and a gain of 1.78 dBi, a prototype of the proposed antenna has been fabricated and measured.
Power analysis attack against encryption devices: a comprehensive analysis of AES, DES, and BC3 Septafiansyah Dwi Putra; Mario Yudhiprawira; Sarwono Sutikno; Yusuf Kurniawan; Adang Suwandi Ahmad
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9384

Abstract

Cryptography is a science of creating a secret message and it is constantly developed. The development consists of attacking and defending the cryptography itself. Power analysis is one of many Side-Channel Analysis (SCA) attack techniques. Power analysis is an attacking technique that uses the information of a cryptographic hardware’s power consumption. Power analysis is carried on by utilizing side-channel information to a vulnerability in a cryptographic algorithm. Power analysis also uses a mathematical model to recover the secret key of the cryptographic device. This research uses design research methodology as a research framework started from research clarification to descriptive study. In this research, power analysis attack is implemented to three symmetrical cryptographic algorithms: DES (Data Encryption Standard), AES (Advanced Encryption Standard), and BC3 (Block Cipher 3). The attack has successfully recovered 100% of AES secret key by using 500 traces and 75% DES secret key by using 320 traces. The research concludes that the power analysis attack using Pearson Correlation Coefficient (PCC) method produces more optimal result compared to a difference of means method.

Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue