cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Trend of NFC Technology for Payment Transaction Edi Purnomo Putra; Fifilia Fifilia; Hanny Juwitasary
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8441

Abstract

Implementation of NFC Technology was developed to facilitate instant payment transaction such as purchase tickets, goods, or service to become one of the digital wallet besides to using credit cards. The high rate of mobile devices usage in Indonesia make many companies take advantage of this device as a media in electronic payment transactions, a lot of banking and financial product in Indonesia used this technology such as E-money, T-cash, Flazz, Ooredoo, Dompetku, XL-Tunaiku, Doku Wallet, Skye card, Artajasa MYNT and many more. The technique that used in this research to prove the hypotheses was Structural Equation Model (SEM) using Smart PLS software, we will used questionnaire and literature review method to found trend of NFC use. The population from which to draw conclusion was defined as all individual capable use NFC Technology for payment transaction .In this study, we will investigate NFC use in Indonesia, The proposed research model was develop by TAM Framework with some dimension from NFC study iterature that is Mobile Payment Knowledge, Technology, Trust, Behaviour and Compatibility into the model, in order to determine the significant factor that influence of NFC use in Indonesia.
Comparison between Trigonometric, and traditional DDS, in 90 nm technology Cardarilli Gian Carlo; Di Nunzio Luca; Fazzolari Rocco; Giardino Daniele; Matta Marco; Nannarelli Alberto; Re Marco; Silvestri Francesca; Spanò Sergio
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.9832

Abstract

The Direct Digital frequency Synthesizer (DDS) is an architecture largely used for the generation of numeric sine and/or cosine waveforms in different applications. In this work, authors compare two different DDS architectures: the traditional architecture, based on the exploitation of quarter wave symmetry, and the Symon’s DDS (trigonometric DDS) presented in 2002. The two layout configurations have been implemented in 90 nm technology and compared in terms of area, speed and power consumption. Comparisons have been performed in terms of circuital complexity on architectures having the same Spurious Free Dynamic Range (SFDR) and phase resolution. Experiments show that the trigonometric architecture is very efficient in terms of area.
Time and cost optimization of business process RMA using PERT and goal programming Gita Intani Budiawati; Riyanarto Sarno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.11792

Abstract

As a company engaged in the distribution of wireless devices, Return Material Authorization (RMA) is a mandatory service that must be owned by the company. RMA is a part of the process of returning a product to receive a refund, replacement, or repair during the product’s warranty period. The business process of RMA used functionally design, which is not considered to be effective in terms of time and cost for the company of 2880 minutes for IDR 348242. In this research, Project Evaluation and Review Technique (PERT) was used to select the optimal traces; to optimize time and cost, the researcher used goal programming. This technique allows the creation of a controlled and orderly activity because the schedule and budget of a job are predetermined prior to the implementation. The optimization results show that the process time is reduced by 50% and the cost is reduced by almost 55% which show improvement on the performance of the business processes.
Cognitive radio for TVWS usage Diego Pineda; Cesar Hernandez
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.13111

Abstract

Spectrum scarcity is an emerging issue in wireless communication systems due to the increasing demand of broadband services like mobile communications, wireless internet access, IoT applications, among others. The migration of analog TV to digital systems (a.k.a. digital TV switchover) has led to the release of a significant spectrum share that can be used to support said additional services. Likewise, TV white spaces emerge as spectral opportunities that can also be explored. Hence, cognitive radio (CR) presents itself as a feasible approach to efficiently use resources and exploit gaps within the spectrum. The goal of this paper is to unveil the state of the art revolving around the usage of TV white spaces, including some of the most important methods developed to exploit such spaces, upcoming opportunities, challenges for future research projects, and suggestions to improve current models.
Contour evolution method for precise boundary delineation of medical images Friska Natalia; Hira Meidia; Nunik Afriliana; Julio Christian Young; Sud Sudirman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14746

Abstract

Image segmentation is an important precursor to boundary delineation of medical images. One of the major challenges in applying automatic image segmentation in medical images is the imperfection in the imaging process which can result in inconsistent contrast and brightness levels, and low image sharpness and vanishing boundaries. Although recent advances in deep learning produce vast improvements in the quality of image segmentation, the accuracy of segmentation around object boundaries still requires improvement. We developed a new approach to contour evolution that is more intuitive but shares some common principles with the active contour model method. The method uses two concepts, namely the boundary grid and sparse boundary representation, as an implicit and explicit representation of the boundary points. We tested our method using lumbar spine MRI images of 515 patients. The experiment results show that our method performs up to 10.2 times faster and more flexible than the geodesic active contours method. Using BF-score contour-based metric, we show that our method improves the boundary accuracy from 74% to 84% as opposed to 63% by the latter method.
Light follower systems for visually impaired using visible light communication Arsyad Ramadhan Darlis; Lucia Jambola; Tedi Hadyansyah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 1: February 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i1.16509

Abstract

Visual impairment is the condition of someone who has a disorder or an obstacle in their vision. In this research, the implementation of light follower systems for visually impaired using visible light is proposed. This system can enable visually impaired people to determine orientation and support mobility, especially in an indoor situation, using visible light. The prototype of the visually impaired pathway was made as visible light communication (VLC) transmitter consisting of a 12 V power supply, light emitting diode (LED), MPEG-1 Layer-3 (MP3), and band pass filter (BPF) filter circuit. The VLC receiver is made a prototype of a blind stick consisting of a photodiode, amplifier, buzzer, timer, and 9 V battery. The measurement of this system uses acrylic and color filters with system accuracy taking into account the angle and conditions when the fluorescent lights are turned on and off. This result showed the system could transmit audio signals at a frequency of 3000 Hz. Furthermore, the comparison results showed that the quality of measurements without using a filter is better than using a filter. The output voltage value without using a filter with an angle of 700 degree is 7.19 Vp-p, meanwhile using a filter with an angle of 700 degree is 6.48 Vp-p.
Integration of Signal and Artificial Noise in MIMO Wiretap Channel Zhiliang Yang; Aihua Wang; Xiqiang Qu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.995

Abstract

In this paper, the integrated signal-to-artificial noise (ISAN) design is applied in MIMO wiretap channel to ensure wireless communication security. When the information of eavesdropper is unknown, the total power is divided into two parts: signal and artificial noise. The signal can secure certain quality at the legitimate receiver. The artificial noise which is in the null space of the receiver channel matrix can deteriorate eavesdropper channel by the method of beam forming. The artificial noise power is distributed evenly in other space, so that the eavesdropper channel is deteriorated in all directions. The signal to interface and noise ratio (SINR) is regarded as the efficient parameter on measuring reliability and security of information at the legitimate receiver. The simulations reveal that ISAN can deteriorate the eavesdropper channel and safeguard the information transmission on the premise of the given SINR of the legitimate receiver.
Wireless Sensor Network Design based on Hybrid Tree-Like Mesh Topology as a New Platform for Air Pollution Monitoring System Muhammad Iqbal; Muhammad Fuad; Heru Sukoco; Husin Alatas
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 3: September 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i3.2279

Abstract

In this paper, we propose a new platform for air pollution monitoring system based on wireless sensor network (WSN) with Tree-like Mesh topology. We used ZigBee device and General Packet Radio Service (GPRS) for data transfer protocol. The results of a conducted test showed a good performance in delivering data in real time mode. We found that the fewer hop produced higher throughput but lower delay and packet loss ratio. The system performance demonstrated that the reduction of one hop increased 32.06% of throughput, decreased 23.28% of delay and 0.01% of packet loss ratio.In this paper, we propose a new platform for air pollution monitoring system based on wireless sensor network (WSN) with Tree-like Mesh topology. We used ZigBee device and General Packet Radio Service (GPRS) for data transfer protocol. The results of a conducted test showed a good performance in delivering data in real time mode. We found that the fewer hop produced higher throughput but lower delay and packet loss ratio. The system performance demonstrated that the reduction of one hop increased 32.06% of throughput, decreased 23.28% of delay and 0.01% of packet loss ratio
Synchronization Control of Complex Dynamical Networks Based on Uncertain Coupling Qianqian Jia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 3: September 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i3.4224

Abstract

This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexIn recent years, the study of complex networks has been a focus subject of technology fields. In this paper, we consider the adaptive control and synchronization of uncertain complex networks. By using the adaptive control techniques with the linear feedback updated law and the well-known LaSalle invariant principle on dynamical system theory, some simple yet generic criteria are derived. Furthermore, the result is applied to typical chaotic cellular neural networks (CNN). Finally, numerical simulations are presented to demonstrate the feasibility and effectiveness of the proposed techniques.
Confidence of AOI-HEP Mining Pattern Harco Leslie Hendric Spits Warnars; Agung Trisetyarso; Richard Randriatoamanana
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.5303

Abstract

Attribute Oriented Induction High level Emerging Pattern (AOI-HEP) has been proven can mine frequent and similar patterns and the finding AOI-HEP patterns will be underlined with confidence mining pattern for each AOI-HEP pattern either frequent or similar pattern, and each dataset as confidence AOI-HEP pattern between frequent and similar patterns. Confidence per AOI-HEP pattern will show how interested each of AOI-HEP pattern, whilst confidende per dataset will show how interested each dataset between frequent and similar patterns. The experiments for finding confidence of each AOI-HEP pattern showed that AOI-HEP pattern with growthrate under and above 1 will be recognized as uninterested and interested AOI-HEP mining pattern since having confidence AOI-HEP mining pattern under and above 50% respectively. Furthermore, the uniterested AOI-HEP mining pattern which usually found in AOI-HEP similar pattern, can be switched to interested AOI-HEP mining pattern by switching their support positive and negative value scores.

Page 49 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue