cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Image Restoration Algorithm Based on Artificial Fish Swarm Micro Decomposition of Unknown Priori Pixel Dan Sui; Fang He
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 1: March 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i1.2739

Abstract

In this paper, we put forward a new method to holographic reconstruct image that prior information, module matching and edge structure information is unknown. The proposed image holographic restoration algorithm combines artificial fish swarm micro decomposition and brightness compensation. The traditional method uses subspace feature information of multidimensional search method, it is failed to achieve the fine structure information of image texture template matching and the effect is not well. Therefore, it is difficult to holographic reconstruct the unknown pixels. This weakness obstructs the application of image restoration to many fields. Therefore, we builds a structure texture conduction model for the priority determination of the block that to be repaired, then we use subspace feature information multidimensional search method to the confidence updates of unknown pixel. In order to maintain the continuity of damaged region in image, the artificial fish swarm algorithm decomposition model is combined with the image brightness compensation strategy of edge feature. The simulation result shows that it has a good visual effect in image restoration of a priori unknown pixel, recovery time and computation costs are less, the stability and convergence performance is improved.
Measurement of 3 Solar Panel Output with Different Treatment Involving Controller and Reflector Yulinar Adnan; Khairul Saleh; Assaidah Assaidah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 1: March 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i1.3478

Abstract

Solar cell as one of renewable energy source had been treated differently in this research. In order to optimize its output and efficiency, three panels output was measured simultaneously by vary its movement and sun light exposure. The variations of measurement  are one static panel without any treatment; one static panel with two mirrors as reflector; and one dynamic panel with reflector. The dynamic panel movement controlled by microcontroller. Result had revealed that the treatment succesfully improve the output of solar cell.
Embedded System Practicum Module for Increase Student Comprehension of Microcontroller Indrianto Indrianto; Meilia Nur Indah Susanti; Rakhmat Arianto; Riki Ruli A. Siregar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 1: February 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i1.4194

Abstract

The result of applying the embedded system in education for students is successfully applied in university. On the other side, many people in Indonesia use smart equipment’s (Hand phone, Remote), but none of those equipments are used in education. University as the source of knowledge should overcome the problem by encouraging the students to use a technology with learning about it first. Embedded System Practicum Module Design needs a prototype method so that the practicum module that is desired can be made. This method is often used in real life. A prototype considered of a part of a product that expresses logic and physical of external interface that is being displayed and this method will fully depend on user contentment. Embedded System Practicum Module Design is made to increase student comprehension of embedded system course and to encourage students to innovate, so that many technologies will be developed and also to help lecturers deliver course subjects. With this practicum it is hoped that the student comprehension will increase significantly. The result of this research is a decent practicum module, hardware or software that can help students to know better about technology and the course subjects so that it will encourage the students to create an embedded system technology. The result of the test has been done; there is an increase of learning value obtained by 7.8%.
A New Framework for Information System Development on Instant Messaging for Low Cost Solution I Made Sukarsa; I Ketut Gede Darma Putra; Nyoman Putra Sastra; Lie Jasa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.8614

Abstract

The increasingly inexpensive Internet has spurred the growth of online information system services in various companies. Almost all services are available in forms on web or mobile applications. For small companies, this particular system is more difficult to implement as it requires a substantial cost allocated for hosting, domain and server devices. The solution is to develop a framework for building information system services through Instant Messaging (IM) such as Telegram, Line or XMPP / Jabber using the Design Science Research Methodology. This proposed framework has the ability to transform the existing information system services into chat services with RBAC role, session, validation and natural interaction using Indonesian-language conversations. The framework that consists of Initiate layers, business process and communication, memory group and OLTP DBMS will produce low-cost solution for the development of integrated information systems service.
Sequential order vs random order in operators of variable neighborhood descent method Darmawan Satyananda; Sapti Wahyuningsih
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.11789

Abstract

Many optimization problems require heuristic methods to solve the problem. Variable Neighborhood Search (VNS) is a metaheuristic form that systematically changes its “neighborhood” in search of solutions. One method in VNS is Variable Neighborhood Descent (VND), which performs a deterministic neighborhood change. The change of the neighborhood in VND can be done in a random and sequential order. This paper compares sequential and random neighborhood selection methods in solving Capacitated Vehicle Routing Problem (CVRP) problems. There are 6 intra-route neighborhood structures and 4 inter-route structures used. CVRP problems are taken from several dataset providers. The initial solution is formed by Sequential Insertion method. The experimental results show that the random selection of neighborhood operators can provide a more optimal route length (in 10 of 13 datasets used) than that of sequential selection (only better in 3 dataset). However, the random selection takes more iterations to reach convergent state than the sequential one. For sequential selection, determination of the neighborhood structure’s order affects the speed to the convergent state. Hence, a random selection in VND method is more preferable than sequential selection.
Modified RSA-based algorithm: a double secure approach Israa Al_Barazanchi; Shihab A. Shawkat; Moayed H. Hameed; Khalid Saeed Lateef Al-badri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 6: December 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i6.13201

Abstract

Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.
Analysis sentiment about islamophobia when Christchurch attack on social media Windu Gata; Achmad Bayhaqy
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.14179

Abstract

Islamophobia is formed by "Islam" with "-phobia" which means "fear of Islam". This shows the view of Islam as "other" and can threaten Western culture. The recent horrific terror attack that took place at the Christchurch mosque in New Zealand, is the result of allowing an attitude of hatred towards Islam in the West. Twitter is social media that allows users send real-time messages and can be used for sentiment analysis because it has a large amount of data. The lexical based method using VADER is used for automatic labeling of crawling data from Twitter. And then compare Supervised Machine Learning Naïve Bayes and SVM algorithm. Addition of SMOTE for Imbalanced Data. As result, SVM with SMOTE is proven the highest performance value and short processing time.
Measuring memetic algorithm performance on image fingerprints dataset Priati Assiroj; H. L. H. S. Warnars; E. Abdurrachman; A. I. Kistijantoro; A. Doucet
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 1: February 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i1.16418

Abstract

Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset. Before we run this algorithm, we divide our fingerprints into four groups according to its characteristics and make 15 specimens of data, do four partial tests and at the last of work we measure all computation time.
ANALISIS UPAYA PENURUNAN BIAYA PEMAKAIAN ENERGI LISTRIK PADA LAMPU PENERANGAN Slamet Suripto
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 5, No 1: April 2007
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v5i1.1334

Abstract

Keterbatasan sumber energi listrik menuntut adanya upaya penghematan energi, agar fasilitas yang menggunakan energi listrik dapat dinikmati dalam jangka waktu yang lebih lama. Upaya penghematan ini perlu dilakukan oleh segenap pengguna energi listrik baik untuk penerangan maupun penggerak motor pada industri. Penghematan penggunaan energi listrik di samping akan mengurangi konsumsi bahan baku bagi penyedia daya listrik, juga akan mengurangi biaya pengeluaran bagi pengguna energi listrik. Paper ini membahas upaya pengematan energi listrik untuk keperluan penerangan dengan pemasangan kapasitor paralel pada lampu TL. Berdasarkan hasil penelitian ditunjukkan bahwa pemilihan lampu hemat energi dan pemasangan kapasitor paralel pada setiap lampu TL dapat menurunkan biaya pemakaian energi listrik secara signifikan. 
Intelligent Monitoring System on Prediction of Building Damage Index using Neural-Network Mardiyono Mardiyono; Reni Suryanita; Azlan Adnan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 1: March 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i1.773

Abstract

An earthquake potentially destroys a tall building. The building damage can be indexed by FEMA into three categories namely immediate occupancy (IO), life safety (LS), and collapse prevention (CP). To determine the damage index, the building model has been simulated into structure analysis software. Acceleration data has been analyzed using non linear method in structure analysis program. The earthquake load is time history at surface, PGA=0105g. This work proposes an intelligent monitoring system utilizing artificial neural network to predict the building damage index. The system also provides an alert system and notification to inform the status of the damage. Data learning is trained on ANN utilizing feed forward and back propagation algorithm. The alert system is designed to be able to activate the alarm sound, view the alert bar or text, and send notification via email to the security or management. The system is tested using sample data represented in three conditions involving IO, LS, and CP. The results show that the proposed intelligent monitoring system could provide prediction of up to 92% rate of accuracy and activate the alert. Implementation of the system in building monitoring would allow for rapid, intelligent and accurate prediction of the building damage index due to earthquake.

Page 65 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue