cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Time Series Based for Online Signature Verification Pande Sutawan; Darma Putra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 4: December 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i4.1186

Abstract

Signature verification system is to match the tested signature with a claimed signature. This paper propose time series based for feature extraction method and dynamic time warping for match method. The system made by process of testing 900 signatures belong to 50 participants, 3 signatures for reference and 5 signatures from original user, simple imposters and trained imposters for signatures test. The final result system was tested with 50 participants with 3 references. This test obtained that system accuracy without imposters is 90,45 % at threshold 44 with rejection errors (FNMR) is 5,2% and acceptance errors (FMR) is 4,35 %, when with imposters system accuracy is 80,13 % at threshold 27 with error rejection (FNMR) is 15,6% and acceptance errors (average FMR) is 4,26 %, with details as follows: acceptance errors is 0,39%, acceptance errors simple imposters is 3,2% and acceptance errors trained imposters is 9,2%.
Power Quality Signal De-noising with Sub band Adaptive Algorithm Yingjun Sang; Yuanyuan Fan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 11, No 2: June 2013
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v11i2.936

Abstract

A new level-dependent sub band adaptive noise reduction algorithm based on wavelet transform is proposed in order to improve the effect of power quality signal de-noising for power quality monitoring system. This threshold algorithm has two adjustable parameters to adjust the threshold both fine and coarsely, and the optimal parameters are determined by BP neural networks algorithm. Power disturbance data is referred to actual power disturbance data at IEEE open source and applied for test. The test results indicate that the proposed algorithm could denoise the different kind of power disturbances effectively, and the signal noise ratio is improved further with a smaller mean square error.
Genetic Optimization of Neural Networks for Person Recognition Based on the Iris Patricia Melin; Victor Herrera; Danniela Romero; Fevrier Valdez; Oscar Castillo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 2: June 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i2.800

Abstract

This paper describes the application of modular neural network architectures for person recognition using the human iris image as a biometric measure. The iris database was obtained from the Institute of Automation of the Academy of Sciences China (CASIA). We show simulation results with the modular neural network approach, its optimization using genetic algorithms, and the integration with different methods, such as: the gating network method, type-1 fuzzy integration and optimized fuzzy integration using genetic algorithms. Simulation results show a good identification rate using fuzzy integrators and the best structure found by the genetic algorithm.
Spectrum Comparative Study of Commutation Failure and Short-Circuit Fault in UHVDC Transmission System Shi-long Chen; Jun-xiang Rong; Gui-hong Bi; Xing-wang Li; Rui-rui Cao
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.300

Abstract

When commutation failure occurs in UHVDC transmission system, the transient process of DC voltage and current are similar to grounding short-circuit fault. In order to differentiate them effectively, the paper introduces mathematical morphology methods to analysis the spectrum of transient current. Base on Yunnan-Guangzhou kV UHVDC transmission system, the paper simulates the commutation failure and DC line short-circuit fault under different fault conditions in PSCAD/EMTDC.  By modified morphology filter, the transient signal of DC () is decomposed into six scales, and morphological characteristics of aerial mode component of  is analyzed under different scales. The simulation results show that when DC line short-circuit faults occurs, wherever in the rectifier side, in the DC transmission line midpoint or in the inverter side, the aerial mode component of  have more high frequency weight in ~ and decays gradually; When commutation failures, which are caused by the inverter side AC system single-phase grounding fault, phase to phase fault, three phase grounding fault or the inverter side transformer ratio increased,  the aerial mode component of  have less frequency weight in.
Robust Path Construction for Reliable Data Transmissions in Node Disjoint Multipath Routing Abdulaleem Ali ALmazroi; MA Ngadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 3: September 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i3.1496

Abstract

Wireless Sensor Networks (WSNs) are prone to node breakdowns due to energy constraints, which contribute to frequent topology changes. Moreover, since sensor nodes have restricted transmission range, multiple hops are needed by the node in order to forward the packets from one node to the other and this raises very challenging issues when designing routing protocols. Most of the proposed single path routing schemes use a periodic low-rate flooding of data in order to recover from path failures, which causes higher consumption in sensor node resources. So multipath routing is an optimal approach to enhance the network lifetime. In this paper, a robust path construction for a reliable data transmission in node-disjoint multipath routing (RNDMR) is proposed for WSNs. The proposed RNDMR has the ability to provide a low overhead path construction as well as provide data transmission reliability by using XOR-based coding algorithm, which entails low utilization of resources, such as low storage space and lesser computing power. In the proposed RNDMR, the procedure involves the splitting up of all transmitted messages into many different segments of equal size, before adding the XOR-based error correction codes and distributing it among multiple paths simultaneously in order to boost reliable data transmission and to be assured that the essential fragment of the packet arrives at the sink node without any additional consumption of energy and undue delay. By using simulations, the performance of RNDMR was assessed and compares it with ReInForm routing. The results illustrate that RNDMR attains low energy consumption, records low average delay and routing overhead, as well as increased packet delivery ratio when compared with ReInForm Routing.
Energy Efficient Error Rate Optimization Transmission in Wireless Sensor Network Sharada K A; Siddaraju Siddaraju
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 4: December 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i4.4013

Abstract

Wireless Sensor Network is a collection of independent nodes and create a network for monitoring purposes in various scenarios like military operation, environmental operation etc. WSN network size is increasing very rapidly these days, due to large network size energy consumption is also increased and it has small battery, lifetime of network   decreases due to early death of nodes and it impact the overall system performance. Clustering is a technique for enhance the network lifetime in WSN. Here in this paper we propose a new multi-objective adaptive swarm optimization (MASO) technique for clustering and computes the maximum number of clusters, which is best suited for the network. Each cluster has cluster head and cluster members and performed the task of local information extraction. Cluster head gathers all the extracted information from member nodes and send it to the base station, where base station performed global information extraction from all the cluster head nodes and generate some useful result. In MASO technique, object is used to find the best global position for the node and compare with existing position value. If new value is better than the old value, than node moves to a new position and object update their table for this new position. We are considering error probability in transmission of data packet in one hop communication. Here obtained the results are compared with other research in terms of overall network lifetime and effect on network lifetime when the size of the network is changed. We have fine tuned the node’s decay rate and throughput of the network.
Generating a Lighting System by Using Pico Hydro System G. Subhashini; Devindran Munandy; Raed Abdulla
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 4: December 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i4.7235

Abstract

The main aim of this research is to design and develop LED based lighting system by using Pico hydro power. The proposed system is to use renewable energy to generate power in remote areas. The system is designed in a small scale which capable of lighting up a LED and sustain power when turbine stop to rotate. Reaction turbine is selected to be the suitable model for this Pico Hydro System (PHS). The performance of the system is tested by changing the materials for the blades and determines the suitable number of blades for the system to perform at maximum efficiency. Additional features, such as displaying generated voltage and flow rate has been implemented. It is observed that, the system could generate maximum voltage of 5.46V at the head height of 65 cm with flow rate of 5.51 L/Min. A total of 4.62 watt of net electrical power generated from this PHS, the value is obtained by using theoretical calculation. Finally, the system proves to be efficient in terms of generated voltage and cost, as compared to the journals which is reviewed in the literature. The scale of the design has to be remodified to be implemented in river areas. 
Development of Fall Risk Detector for Elderly Nor Aini Zakaria; Nur Amalina Rashid; Muhammad Amir Asa’ari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.9066

Abstract

In Malaysia, falls has become the most common injuries for elderly. Therefore, a wearable fall detector device is created to decrease the risk of serious injury among elderly. The device consists of an accelerometer (ADXL345) as a sensor, an Arduino Nano as a microcontroller, and a Global System for Mobile Communications (GSM) as a notifier. A group of 15 young people participated in performing several sets of different falls and ADL (daily life activities) to determine the ability of the device. The result shows a good functioning performance by 92.6% sensitivity to detect fall and 89.3% specificity in discriminate fall from daily life activity.
Power loss analysis of current-modules based multilevel current-source power inverters Suroso Suroso; Winasis Winasis; Daru Tri Nugroho; Wahyu Tri Cahyanto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.11601

Abstract

A power loss analysis of multilevel current-source inverter (MCSI) circuits developed from two basic configurations of three-level current-source inverters, i.e. H-bridge and common-emitter inverter configurations is presented and discussed. The first circuit topology of the MCSI is developed by using DC current modules connected to the primary three-level H-bridge inverter. The second MCSI circuit is created by connecting the current-modules to a three-level common-emitter inverter. The DC current modules work generating the intermediate level waveform of the inverter circuits. Power loss analysis of the both topologies was carried out to explore the efficiency performance of the inverter circuits. The results showed that for the H-bridge and common-emitter MCSI using DC current modules, the amount of conduction losses in the inverter circuits could be diminished when the level number of AC output current increase. The measurement test results have also proved that using these MCSI topologies, the power conversion efficiency will also increase.
Enhancement of boresight radiation for leaky wave antenna array Mowafak K. Mohsen; M. S. M Isa; A. A. M. Isa; M. K. Abdulhameed; Mothana L. Attiah; Ahmed M. Dinar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.12631

Abstract

An array of half-width microstrip leaky-wave antennas (HW-MLWAs) of two uniform elements was designed to obtain maximum boresight radiation. Achieve this, two uniform of HW-MLWAs are placed at 180◦ and fed by a probe located at the center between the elements, two uniforms of HW-MLWAs, loaded terminated by 50Ω lumped element. Two beams from two branches individual merge to form the resultant directive beam. The simulation represents the susceptibility of the proposed array of uniform HW-MLWAs to the radiation broadside direction effectively. The predict bandwidth matched of the array is 582 MHz (4.18–4.76 GHz). The direction of its main beam in boresight happens over a wide 13%, relatively (4.18-4.76 GHz) band. The proposed peak gain at the boresight direction of the array is 9.91 dBi.

Page 44 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue