cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
The detection of handguns from live-video in real-time based on deep learning Mohammed Ghazal; Najwan Waisi; Nawal Abdullah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16174

Abstract

Many people have been killed indiscriminately by the use of handguns in different countries. Terroristacts, online fighting games and mentally disturbed people are considered the common reasons for these crimes.  A real-time handguns detection surveillance system is built to overcome these badacts, based on convolutional neural networks (CNNs). This method is focused on the detection of different weapons, such as (handgun and rifles). The identification of handguns from surveillance cameras and images requires monitoring by human supervisor, that can cause errors. To overcome this issue,the designed detection system sends an alert message to the supervisor when aweapon is detected. In the proposed detection system, a pre-trained deep learning model MobileNetV3-SSDLite is used to perform the handgundetection operation. This model has been selected becauseit is fast and accurate in infering to integrate network for detecting and classifying weaponsin images. The experimental result using global handguns datasets of various weapons showed that the use of MobileNetV3 with SSDLite model bothenhance the accuracy level in identifying the real time handguns detection.
A Cognitive Radio Spectrum Sensing Algorithm to Improve Energy Detection at Low SNR Agus Subekti; Sugihartono Sugihartono; Nana Rachmana S; Andriyan B.Suksmono
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 3: September 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i3.101

Abstract

Energy detection is among the most popular spectrum sensing method for spectrum sensing due its low complexity. Unfortunately, its performance is poor at low SNR. In this paper we proposed a spectrum sensing method for cognitive radio network that improves the performance of energy detection. The proposed method based on distribution analysis using kurtosis as test statistic. This comes from the fact that distribution of received signal when a channel is occupied will be different from vacant channel. Noise tends to have a Gaussian distribution. Signal which faces multipath fading during the transmission way will have non Gaussian distribution. Sensing algorithm was tested using captured DTV signal. Result shows that our method performs well at low SNR. It achieves probability of detection of 90 % for 10 % Probability of false alarm for low SNR, below -20 dB.
SISTEM KENDALI PERALATAN RUMAH TANGGA BERBASIS HT DAN MIKROKONTROLER AT89S51 Muchlas Muchlas; Tole Sutikno; Sahnan Sahnan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 4, No 1: April 2006
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v4i1.1242

Abstract

Aplikasi sistem kendali peralatan listrik rumah tangga menggunakan frekuensi radio HT (handy talky) sebagai media pengendali (remote controll) masih  perlu diteliti lebih spesifik. Penelitian ini bertujuan untuk memperoleh suatu desain rangkaian kendali menggunakan radio HT, serta untuk mengetahui unjuk kerjanya.  Subjek dari penelitian ini adalah sistem yang dibangun dalam sebuah sistem pengendali jarak jauh dengan memanfaatkan radio transceiver 2 meter untuk mentransmisikan data yang telah dikodekan dalam bentuk sinyal DTMF (Dual Tone Multiple Frequency). Sistem ini menggunakan mikrokontroler AT89S51 sebagai pemroses utama. Bagian penerima pada rangkaian objek kendali menangkap, menguatkan, mengubah menjadi bilangan biner 4 bit dan akan diolah oleh AT89S51 sehingga dapat mengendalikan peralatan elektonik secara on/off. Rangkaian pengendali objek akan menampilkan kondisi peralatan elektronik apakah dalam kondisi on/off kepada bagian kendali yang akan ditampilkan pada display. Hasil penelitian menunjukkan bahwa sistem kendali dengan media HT dapat digunakan sebagai kendali jarak jauh untuk menghidupkan dan mematikan peralatan peralatan rumah tangga. Konsumsi daya yang dibutuhkan adaah sebesar 5.335 watt.
Overcoming Challenges of Renewable Energy on Future Smart Grid J.O. Petinrin J.O. Petinrin; M. Shaaban M. Shaaban
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 2: June 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i2.781

Abstract

The increasing complexity of the conventional grid due to population growth, advancement in technology, and infrastructures are the factors that contribute immensely to instability, insecurity, and inefficiency of the use of electrical energy. To overcome the problems, the environmental energy sustainability calls for the use of renewable energy for sustainability of power supply. Intermittency and fluctuation of the renewable energy is a great challenge on the smart grid. This paper reveal the potential challenges of renewable energy on the smart grid and proffer solution with the application of high voltage DC (HVDC) and Flexible AC transmission system (FACTS) devices. The functions and advantages of FACTS devices are presented in this paper. Voltage control and stability control with FACTS application are also discussed because FACTS has fast controllability and capability to exchange active and reactive power independently.
A Self-adaptive Multipeak Artificial Immune Genetic Algorithm Qingzhao Li; Fei Jiang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 2: June 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i2.2753

Abstract

Genetic algorithm is a global probability search algorithm developed by simulating the biological natural selection and genetic evolution mechanism and it has excellent global search ability, however, in practical applications, premature convergence occurs easily in the genetic algorithm. This paper proposes an self-adaptive multi-peak immune genetic algorithm (SMIGA) and this algorithm integrates immunity thought in the biology immune system into the evolutionary process of genetic algorithm, uses self-adaptive dynamic vaccination and provides a downtime criterion, the selection strategy of immune vaccine and the construction method of immune operators so as to promote the population develop towards the optimization trend and suppress the degeneracy phenomenon in the optimization by using the feature information in a selective and purposive manner. The simulation experiment shows that the method of this paper can better solve the optimization problem of multi-peak functions, realize global optimum search, overcome the prematurity problem of the antibody population and improve the effectiveness and robustness of optimization.
Estimation of pH and MLSS using Neural Network Nur Sakinah Ahmad Yasmin; Muhammad Sani Gaya; Norhaliza Abdul Wahab; Yahaya Md Sam
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.6144

Abstract

The main challenges to achieving a reliable model which can predict well the process are the nonlinearities associated with many biological and biochemical processes in the system. Artificial intelligent approaches revolved as better alternative in predicting the system. Typical measured variables for effluent quality of wastewater treatment plant are pH, and mixed liquor suspended solids (MLSS). This paper presents an adaptive neuro-fuzzy inference system (ANFIS) and feed-forward neural network (FFNN) modeling applied to the domestic plant of the Bunus regional sewage treatment plant. ANFIS and feed- forward neural network techniques as nonlinear function approximators have demonstrated the capability of predicting nonlinear behaviour of the system. The data for the period of two years and nine months sampled weekly (140 week samples) were collected and used for this study. Simulation studies showed that the prediction capability of the ANFIS model is somehow better than that of the FFNN model. The ANFIS model may serves as a valuable prediction tool for the plant.
Exergy Assessment of Photovoltaic Thermal with V-groove Collector Using Theoretical study Muhammad Zohri; Nurato Nurato; Lalu Darmawan Bakti; Ahmad Fudholi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8433

Abstract

The solution of the environmental problems because of fuel fossil is to use new and renewable energy. There are many studies about energy analysis of solar collector with v-groove but exergy analysis of photovoltaic thermal system with v-groove is still less especially by theoretical study. Photovoltaic thermal with v-groove collector has been conducted the exergy analysis by theoretical assessment. The matrix inversion methods were used to analyze the energy balance equation. The theoretical assessment was conducted under the solar intensity of 385 W/m2, 575 W/m2, and 875 W/m2 and mass flow rate between 0.01 and 0.05 kg/s. The maximum exergy efficiency and exergy of PVT system with v-groove collector were 17.80% and 86.32 Watt at the solar intensity of 875 W/m2.
Secure Code Generation for Multi-Level Mutual Authentication Gregor Alexander Aramice; Jaafar Qassim Kadhim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.10437

Abstract

Any secured system requires one or more logging policies to make that system safe. Static passwords alone cannot be furthermore enough for securing systems, even with strong passwords illegal intrusions occur or it suffers the risk of forgotten. Authentication using many levels (factors) might complicate the steps when intruders try to reach system resources. Any person to be authorized for logging-in a secured system must provide some predefined data or present some entities that identify his/her authority. Predefined information between the client and the system help to get more secure level of logging-in. In this paper, the user that aims to log-in to a secured system must provide a recognized RFID card with a mobile number, which is available in the secured systems database, then the secured system with a simple algorithm generates a One-Time Password that is sent via GSM Arduino compatible shield to the user announcing him/her as an authorized person.
Bandwidth enhancement of compact microstrip rectangular antennas for UWB applications S. Elajoumi; A. Tajmouati; J. Zbitou; A. Errkik; A. M. Sanchez; M. Latrach
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.9184

Abstract

In this paper design of microstrip patch antennas are presented for ultra wideband (UWB) applications. The designed antennas have good matching input impedance in a wide frequency band covering the UWB frequency band which is defined by the FCC. The proposed antennas consist of rectangular patch which is fed by 50Ω microstrip line. These antennas are investigated and optimized by using CST microwave studio, they are validated by using another electromagnetic solver HFSS. The proposed antennas are designed and optimized taking into account the optimized of the ground by using Defected Ground Structure (DGS) in order to improve the frequency band of microstrip antenna. Hence, the impedance and surface current of the antenna structures are affected by DGS. As will be seen, the operation bandwidth of the proposed antennas is from 3 to 15 GHz (return loss≤-10 dB), corresponding to wide input impedance bandwidth (133.33%), with stable omnidirectional radiation patterns and important gain. A good agreement has been obtained between simulation and measurement results in term of bandwidth clearly show the validity of the proposed structures. These antennas are useful for UWB applications, may be able to potentially minimize frequency interference from many wireless technologies i.e WLAN, WiMAX. Details of the antennas have been investigated numerically and experimentally.
Iris images encryption based on QR code and chaotic map Raniah Ali Mustafa; Amal Abdulbaqi Maryoosh; Dena Nadir George; Waleed Rasheed Humood
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13293

Abstract

In this paper an Iris image is encrypted based on QR (quick response) code and chaotic map. The main idea of the proposed system is generating a QR code depending on the input text and then extract the features from QR code by using convolution, these features are used for key generation. After that the permuted iris image is encrypted by using generated key, after that the resulting image will be encrypts using 2D logistic map. The randomness of generated key is tested using the measures of NIST, and quality of images that encrypted in this method are tested by using security analysis tests such as PSNR, UACI, NPCR, histogram, correlation and entropy. The security analysis shows that the proposed system is secure for iris image encryption.

Page 6 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue