cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Hybrid distributed application in banking transaction using remote method invocation Agus Cahyo Nugroho; Mychael Maoeretz Engel
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.8222

Abstract

Today banks have many branches in big cities of the world. System usually used  a central database in a particular city. Increased of database server performance due to number of users accessing this application should not degrade performance of application. To keep  database server performance optimally, application must distributed to the network. In distributed applications it takes a remote method call, that is why we are going to used Remote Method Invocation to develop this system. Based on results of analysis conducted, author can draw following conclusion of the application, which is once the client get a reference from the remote object then method of remote object is called like calling method from local object and methods that we have defined and implemented on remote object can we call or use both on desktop and web applications so we do not need to work twice. This approach makes more effective and efficient in application development, allows for better optimization, eliminates the need for processing of type information at run time and makes a light weight communication protocol possible. We have built a hybrid application, which supports both compile time and run time generation of marshallers in desktop and web application.
2D mapping using omni-directional mobile robot equipped with LiDAR Muhammad Rivai; Dony Hutabarat; Zishwa Muhammad Jauhar Nafis
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 3: June 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i3.14872

Abstract

A room map in a robot environment is needed because it can facilitate localization, automatic navigation, and also object searching. In addition, when a room is difficult to reach, maps can provide information that is helpful to humans. In this study, an omni-directional mobile robot equipped with a LiDAR sensor has been developed for 2D mapping a room. The YDLiDAR X4 sensor is used as an indoor scanner. Raspberry Pi 3 B single board computer (SBC) is used to access LiDAR data and then send it to a computer wirelessly for processing into a map. This computer and SBC are integrated in robot operating system (ROS). The movement of the robot can use manual control or automatic navigation to explore the room. The Hector SLAM algorithm determines the position of the robot based on scan matching of the LiDAR data. The LiDAR data will be used to determine the obstacles encountered by the robot. These obstacles will be represented in occupancy grid mapping. The experimental results show that the robot is able to follow the wall using PID control. The robot can move automatically to construct maps of the actual room with an error rate of 4.59%.
A robust maximum power point tracking control for PV panel using adaptive PI controller based on fuzzy logic Slamet Slamet; Estiko Rijanto; Asep Nugroho; R. A. Ghani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 6: December 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i6.17271

Abstract

Most methods of maximum power point tracking (MPPT) for photovoltaic (PV) focus only on tracking performance while robustness against disturbances hasrarely been addressed. This paper proposes a new MPPT control method that provides robustness against direct current (DC) link voltage disturbance as well as good tracking performance. The method uses indirect MPPT control topology which incorporates two controllers. For the external controller, we use an adaptive proportional-integral (PI) control which is real-time tuned by fuzzy logic (FL). New membership functions and rule base are proposed using only one fuzzy input variable and 10 fuzzy rules. The internal controller is a PI controller. The PV panelis connected to a boost DC-DC converter. The proposed MPPT control iscompared with the fuzzy logic controller (FLC). Performance is evaluated under DC link voltage disturbance, steady-state condition, and rapid solar radiation changes. Simulation results indicate that the proposed method provides 41.2 % better robustness against DC link voltage disturbance as compared to the direct FLC. Experimental results under natural climate conditions with real solar radiation  validate that the proposed method works well in regulating the MPP at steady-state solar irradiance as well as in tracking the MPP towards rapid solar irradiance changes. It yields the PV power tracking speed of 95.75 W/s.
Received Signal Strength Indicator Node Localization Algorithm Based on Constraint Particle Swarm Optimization Songhao Jia; Cai Yang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 1: March 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i1.1263

Abstract

Because the RSSI value greatly changes, the direct use of RSSI value has more errors in the positioning process as the basis to calculate the position of anchor nodes. This paper proposes a RSSI node localization algorithm based on constraint particle swarm optimization (PSO-RSSI). In the algorithm, particle swarm optimization is used to select anchor nodes set which are near the unknown node. The algorithm takes an element in the set, and measure distance between it and the other elements in the set. Then, the maximum likelihood method is used to calculate the coordinates. According to the difference between the calculated coordinates and the actual coordinates of the anchor node, the obtain coordinate of unknown node is corrected. When all the elements in the set perform such operation, the statistical methods are used to determine the coordinates of the unknown node. The algorithm embodies all the reference points influence on positioning, corrects the error problem on a single reference node positioning in the past. The simulation results show that the effect of the PSO-RSSI algorithm is more excellent.
Musical Genre Classification Using SVM and Audio Features Achmad Benny Mutiara; Rina Refianti; Nadia R.A. Mukarromah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 3: September 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i3.3281

Abstract

The need of advance Music Information Retrieval increases as well asa huge amount of digital music files distribution on the internet.Musical genres are the main top-level descriptors used to organize digital music files. Most of work in labeling genre done manually. Thus, an automatic way for labeling a genre to digital music files is needed.The most standard approach to do automatic musical genre classification is feature extraction followed by supervised machine-learning. This research aims to find the best combination of audio features using several kernels of non-linear Support Vector Machines (SVM). The 31 different  combinations of proposed audio features are dissimilar compared in any other related research. Furthermore, among the proposed audio features, Linear Predictive Coefficients (LPC) has not been used in another works related to musical genre classiffication. LPC was originally used for speech coding. An experimentation in classifying digital music file into a genre is carried out. The experiments are done by extracting feature sets related to timbre, rhythm, tonality and LPC from music files. All possible combination of the extracted features are classified using three different kernel of SVM classifier that are Radial Basis Function (RBF), polynomial and sigmoid.The result shows that the most appropriate kernel for automatic musical genre classification is polynomial kernel and the best combination of audio features is the combination of musical surface, Mel-Frequency Cepstrum Coefficients (MFFC), tonality and LPC. It achieves 76.6 % in classification accuracy.
Managers Perceptions towards the Success of E-performance Reporting System A'ang Subiyakto; Ditha Septiandani; Evy Nurmiati; Yusuf Durachman; Mira Kartiwi; Abd. Rahman Ahlan
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 3: September 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i3.5133

Abstract

Managers are the key informants in the information system (IS) success measurements. In fact, besides the determinant agents are rarely involved in the assessments, most of the measurements are also often performed by the technical stakeholders of the systems. Therefore, the results may questionable. This study was carried to explain the factors that influence the success of an e-performance reporting system in an Indonesian university by involving ± 70% of the managers (n=66) in the sampled institution. The DeLone and McLean model was adopted and adapted here following the suggestions of the previous meta-analysis studies. The collected data was analyzed using the partial least squares-structural equation modelling (PLS-SEM) for examining the four hypotheses. Despite the findings revealed acceptances of the overall hypotheses, the weak explanation of the user satisfaction variable towards the net benefit one had been the highlighted point. Besides the study limitations, the point may also be the practical and theoretical considerations for the next studies, especially for the IS success studies in Indonesia
Qualitative Evaluation of RFID Implementation on Warehouse Management System Syafrial Fachri Pane; Rolly Maulana Awangga; Bayu Rahmad Azhari
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 3: June 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i3.8400

Abstract

Logistic sector actors need innovation to improve competitiveness in providing their best services to consumers, one of them on Warehouse Management System (WMS) because the system is used to control the movement of the supply chain. There is a problem in one of Indonesia logistics companies on the process of selecting goods, so the warehouseman still difficulties in this process. Thus, RFID implementation on WMS becomes one of the solutions to handle the goods selection process. This research uses Design Science Research Methodology (DSRM) which focuses on developing and improving the model performance of a system and using waterfall model for system development. Then the authors will analyze the test results with the validity test and reliability test of the questionnaire, and the results of the data analysis will determine the feasibility of this research to be applied.
Threshold Voltage Roll-off by Structural Parameters for Sub-10 nm Asymmetric Double Gate MOSFET Hakkee Jung
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 5: October 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i5.10248

Abstract

This study is to analyze threshold voltage roll-off according to structural parameters of sub-10 nm asymmetric double gate MOSFET. In case of sub-10nm channel length, because of short channel effects resulting from the rapid increase of tunneling current, even asymmetric double gate (DG) MOSFET, which has been developed for reducing short channel effects, will increase threshold voltage roll-off, and this is an obstacle against the miniaturization of asymmetric DGMOSFET. Especially, since asymmetric DGMOSFET can be produced differently in top and bottom oxide thickness, top/bottom oxide thickness will affect the threshold voltage roll-off. To analyze this, thermal emission current and tunneling current model have been calculated, and threshold voltage roll-off in accordance with the reduction of channel length has been analyzed by using channel thickness and top/bottom oxide thickness as parameters. As a result, it is found that, in short channel asymmetric double gate MOSFET, threshold voltage roll-off is changed greatly according to top/bottom gate oxide thickness, and that threshold voltage roll-off, in particular, is generated more greatly according to silicon thickness. In addition, it is found that top and bottom oxide thickness have a relation of inverse proportion mutually for maintaining identical threshold voltage
Gain enhancement of dielectric resonator antenna for millimeter wave applications Irfan Ali; Mohd Haizal Jamaluddin; M. R. Kamarudin; Abinash Gaya; M. H. Dahri
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 4: August 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i4.12770

Abstract

In this paper, dielectric resonator antenna (DRA) with enhanced gain operating on the higher order mode (????????????15???? ) is presented. The dielectric resonator antenna with dielectric constant ???????? of 10 and loss tangent of 0.002 is used. The DRA is fed by microstrip line through an aperture slot. The proposed antenna is designed at 26 GHz and achieved a gain of 7.9 dBi with corresponding simulated radiation efficiency of 93%. The impedance bandwidth of 1.5 GHz from 25.1 GHz to 26.6 GHz has been achieved. The reflection coefficient, antenna gain, radiation patterns, and efficiency of the antenna are studied. Simulations are performed using CST microwave studio, and their results are presented.
Optimized image processing and clustering to mitigate security threats in mobile ad hoc network Ibrahim A. Alameri; Jawad Kadhim Mutar; Ameer N. Onaizah; Iftikhar Ahmed Koondhar
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13914

Abstract

Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network’s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.

Page 70 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue