cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Token-based Single Sign-on with JWT as Information System Dashboard for Government I Putu Arie Pratama; Linawati Linawati; Nyoman Putra Sastra
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 4: August 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i4.8388

Abstract

Various web-based information systems are developed by Indonesian government to improve quality of services for their society. It encourages users, generally civil servants, to perform different authentications on used information systems and have to remember credentials. Account management of the users poses another challenge for administrators. Single Sign-On (SSO) can be the solution by providing a service of centralized authentication and user account management. This study applies a token-based SSO architecture and uses Json Web Token (JWT) to grant permission authorities, since JWT can provide a claim process between 2 parties. Additionally, the built-in dashboard lists associated information systems to facilitate accessing for the authenticated users. This study will discuss JWT implementation on the dashboard of government information systems that implements SSO, which will generate the permission authorities securely for connected information systems on SSO.
An idea of intuitive mobile diopter calculator for myopia patient Komang Candra Brata; Mukhammad Sharif Hidayatulloh
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.11623

Abstract

The diopter is the unit of measurement for the refractive power of a lens. Myopia is a form of refractive error which is a leading cause of visual disability throughout the world. The prevailing treatment of refractive errors which are commonly used in daily life are glasses and contact lenses. Although those methods can overcome myopia, many myopia patients still don’t really know how to measure their current refractive error in diopter. This condition may retard the progression of refractive treatment in the myopic individual. The common methods to measure refractive error are phoropter with Snellen chart and retinoscopy, but those expensive tools need expertise to operate. This paper presents the concept of measure the face to smartphone screen distance to provide the possibility to implement a mobile application as a low-cost alternative refractive measurement tool. The main objective is to investigate the feasibility of mobile application to help patients with myopia measuring their blur line distances and evaluate their diopter levels independently. The experimental results reveal that, with 80.5 usability score the overall functionality of proposed application can be categorized as usable to users and feasible for future implementation.
A low cost electromagnetic sensor for detecting holes in metallic sheet Galang P. N. Hakim; Ahmad Firdausi; Mudrik Alaydrus
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.12684

Abstract

Unwanted hole in metal sheet that use for vehicle body or structure is proved dangerous situation. To prevent disaster this hole needs to be found before its installation, or other wise it will be time and money consuming once its found when already finished installation. Therefore, an inspection using sensor for metal sheet is recommended to prevent this problem. In this paper, we proposed a new sensor using radio wave propagation to detect holes in metal sheet. We propose to use RSSI methods to detect hole based on electromagnetic wave propagation signal strength. Using this method we success to detect 8mm hole diameter in metal sheet with 1mm thickness. Using this method, we transmit electromagnetic wave energy at about 20 dBm, and we receive with average -27.53 dBm for iron sheet and -23.13 dBm for aluminum sheet.
Effects of noises on near infrared sensor for blood glucose level measurement Kiki Prawiroredjo; Engelin Shintadewi Julian
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14760

Abstract

This paper proposed the method of measuring glucose level in solution using near infrared light (NIR) and photodiode sensor. We studied noises that occurred on the output signal of NIR sensor in three different room conditions in order to know the effects on this sensor output voltage stability. The sensor’s circuit consisted of a 1450 nm NIR light emitting diode, a photodiode as the receiver, transimpedance amplifier, a notch filter, and a 4th order low pass filter. The results indicated that sunlight passing through windows was the most influencing factor caused the unstable sensor output voltage. Filters removed the effective voltages and the average sensor output voltages from the three rooms were 4.6825 V for air media, 2.2809 V for water media and 2.3368 V for glucose solution media. The output voltages tended to increase for one-hour measurement about 10 to 40 mV for air media, 40 to 90 mV for water media and 30 to 80 mV for glucose solution media. This sensor could only be used in a short time and suitable in a room without sunlight. Based on the voltage difference of the average sensor output voltage with water and glucose solution media, the sensor had the potential to be a blood glucose level meter.
Reconfigurable ultra wideband to narrowband antenna for cognitive radio applications using PIN diode Aziz El fatimi; Seddik Bri; Adil Saadi
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.16242

Abstract

Frequency reconfigurable antennas are very attractive for many wireless applications.They offer many advantages such as simplicity and compactness. In this electronicpaper, we propose a reconfigurable antenna operating in the S and C bands. Theproposed antenna uses a BAP65-02 RF diode to switch between the ultra widebandfrom 2.92 to 6.19 GHz to the narrowband from 2.92 to 3.93 GHz. The ultra widebandis obtained by a partial rectangular ground plane with a symmetrical rectangular slotand the narrowband is obtained by adding a parasitic element electrically connectedto the ground plane by the PIN diode when it is positively biased. This patch antennaoperates in the Federal Communications Commission band (FCC) and can be used forbiomedical applications such as radiometry imaging. The numerical simulation resultsbased on the finite element method and the finite integral method show a very goodagreement between them.
TRANCEIVER INFRA MERAH TERMODULASI UNTUK PENGENDALIAN ALAT-ALAT LISTRIK Muchlas Muchlas; Anton Yudhana; Sigit Wijaya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 3, No 3: December 2005
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v3i3.1233

Abstract

Pada penelitian ini dirancang alat yang dapat memudahkan dalam pengendalian alat rumah tangga untuk menghidupkan dan mematikan lampu dari jarak jauh tanpa menggunakan saklar, melainkan menggunakan sinar infra merah. Alat yang dirancang hanya rangkaian penerimanya, sedangkan rangkaian pengirim mengunakan remote televisi JVC. Rangkaian penerima terdiri dari rangkaian detektor, dekoder dan rangkaian kendali. Fungsi dari rangkaian detektor sebagai pendeteksi sinyal yang dikirimkan oleh remote control. Rangkaian dekoder digunakan untuk pengkodean (sandi) untuk menentukan jumlah pulsa yang digunakan Dalam hal ini jumlah kodenya adalah tiga sinyal jika bukan maka akan ditolak. Sedangkan rangkaiaan kendali difungsikan untuk mengkondisikan keadaan lampu baik redup, terang maupun keadaan mati. Hasil penelitian menunjukkan bahwa rangkaian penerima infra merah yang dirancang dapat digunakan untuk mengendalikan nyal, redup dan mati lampu secara nirkawat. 
Cluster Analysis for SME Risk Analysis Documents Based on Pillar K-Means Irfan Wahyudin; Taufik Djatna; Wisnu Ananta Kusuma
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 2: June 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i2.2385

Abstract

In Small Medium Enterprise’s (SME) financing risk analysis, the implementation of qualitative model by giving opinion regarding business risk is to overcome the subjectivity in quantitative model. However, there is another problem that the decision makers have difficulity to quantify the risk’s weight that delivered through those opinions. Thus, we focused on three objectives to overcome the problems that oftenly occur in qualitative model implementation. First, we modelled risk clusters using K-Means clustering, optimized by Pillar Algorithm to get the optimum number of clusters. Secondly, we performed risk measurement by calculating term-importance scores using TF-IDF combined with term-sentiment scores based on SentiWordNet 3.0 for Bahasa Indonesia. Eventually, we summarized the result by correlating the featured terms in each cluster with the 5Cs Credit Criteria. The result shows that the model is effective to group and measure the level of the risk and can be used as a basis for the decision makers in approving the loan proposal. 
An Indonesian Standard of Lithium-ion Battery Cell Ferro Phospate for Electric Vehicle Applications Wahyudi Sutopo; Evizal Abdul Kadir
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.6233

Abstract

In general, the process of developing new standards had problems in early the development process. In particular to identify what steps are necessary to develop new standards. Methodology of writing this article was conducted using the methodology of FACTS (Framework for Analysis, Comparison and Testing of the Standard). The results of this paper are the new standard for the Indonesian National Standard of Lithium-ion Battery Cell Ferro Phosphate for Electric Vehicle Applications.The standard of development data is can be use by automotive industrial and also for the government to decide new policy on electric vehicle especially in Indonesia.
Face Recognition on Linear Motion-blurred Image Fergyanto E. Gunawan; Jeklin Harefa; Nobumasa Sekishita
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.5480

Abstract

Most face recognition algorithms are generally capable to achieve a high level of accuracy when the image is acquired under wellcontrolled conditions. The face should be still during the acquisition process; otherwise, the resulted image would be blur and hard for recognition. Enforcing persons to stand still during the process is impractical; extremely likely that recognition should be performed on a blurred image. It is important to understand the relation between the image blur and the recognition accuracy. The ORL Database was used in the study. All images were in PGM format of 92 × 112 pixels from forty different persons, ten images per person. Those images were randomly divided into training and testing datasets with 50-50 ratio. Singular value decomposition was used to extract the features. The images in the testing datasets were artificially blurred to represent a linear motion, and recognition was performed. The blurred images were also filtered using various methods. The accuracy levels of the recognition on the basis of the blurred faces and filtered faces were compared. The performed numerical study suggests that at its best, the image improvement processes are capable to improve the recognition accuracy level by less than five percent.
Analysis of DBSCAN and K-means algorithm for evaluating outlier on RFM model of customer behaviour Siti Monalisa; Fitra Kurnia
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 1: February 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i1.9394

Abstract

The aim of study is to discover outlier of customer data to found customer behaviour. The customer behaviour determined with RFM (Recency, Frequency and Monetary) models with K-Mean and DBSCAN algorithm as clustering customer data. There are six step in this study. The first step is determining the best number of clusters with the dunn index (DN) validation method for each algorithm. Based on the dunn index, the best cluster values were 2 clusters with DN value for DBSCAN 1.19 which were minpts and epsilon value 0.2 and 3 and DN for K-Means was 1.31. The next step was to cluster the dataset with the DBSCAN and K-Means algorithm based on the best cluster that was 2. DBSCAN algorithm had 37 outliers data and K-means algorithm had 63 outliers (cluster 1 are 26 outliers and cluster 2 are 37 outliers). This research shown that outlier in DBSCAN and K-Means in cluster 1 have similarities is 100%. But overal outliers similarities is 67%. Based the outliers shown that the behaviour of customers is a small frequency of spending but high recency and monetary.

Page 61 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue