cover
Contact Name
Nizirwan Anwar
Contact Email
nizirwan.anwar@esaunggul.ac.id
Phone
-
Journal Mail Official
telkomnika@ee.uad.ac.id
Editorial Address
Ahmad Yani st. (Southern Ring Road), Tamanan, Banguntapan, Bantul, Yogyakarta 55191, Indonesia
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
TELKOMNIKA (Telecommunication Computing Electronics and Control)
ISSN : 16936930     EISSN : 23029293     DOI : 10.12928
Core Subject : Science,
Submitted papers are evaluated by anonymous referees by single blind peer review for contribution, originality, relevance, and presentation. The Editor shall inform you of the results of the review as soon as possible, hopefully in 10 weeks. Please notice that because of the great number of submissions that TELKOMNIKA has received during the last few months the duration of the review process can be up to 14 weeks. Communication Engineering, Computer Network and System Engineering, Computer Science and Information System, Machine Learning, AI and Soft Computing, Signal, Image and Video Processing, Electronics Engineering, Electrical Power Engineering, Power Electronics and Drives, Instrumentation and Control Engineering, Internet of Things (IoT)
Articles 2,614 Documents
Exploration of the Potential of Reclaimed Waste Cooking Oil for Oil-Immersed Power Transformers Imran Sutan Chairul; Sharin Ab Ghani; Hidayat Zainuddin; Nor Hidayah Rahim; Mohd Aizam Talib; Nor Hafiz Nor Rahman
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 15, No 2: June 2017
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v15i2.6151

Abstract

In this study, reclaimed waste cooking oil is proposed as an alternative insulating liquid for oil-immersed power transformers. Reclamation is carried out by heating a mixture of waste cooking oil and Fuller’s Earth adsorbent and followed by filtration. Propyl gallate antioxidant is then added into the filtered oil. Four oil samples are investigated in this study: (1) new cooking oil (NCO), (2) waste cooking oil (WCO), (3) reclaimed oil (RWCO) and (4) reclaimed oil with propyl gallate antioxidant (RWCOPG). The AC breakdown voltage, moisture content and total acid number is measured for all oil samples according to the ASTM D1816, ASTM D1533 and ASTM D974 standard test method, respectively. The results show that the AC breakdown voltage is highest for the RWCOPG sample (28.08 kV), which is 0.4% higher than the standard requirement of 20 kV. The moisture content for this sample is 180.60 ppm, which is still below the allowable limit of 200 ppm. However, the total acid number is highest for the RWCOPG sample which suggests that it has high acidity. It is indicated that the antioxidant-reclaimed waste cooking oil has potential to be used as an insulating liquid for oil-immersed power transformers, but much work is still needed to reduce the total acid number of this oil.
Real Time Face Recognition Based on Face Descriptor and Its Application I Gede Pasek Suta Wijaya; Ario Yudo Husodo; I Wayan Agus Arimbawa
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.7418

Abstract

This paper presents a real time face recognition based on face descriptor and its application for door locking. The face descriptor is represented by both local and global information. The local information, which is the dominant frequency content of sub-face, is extracted by zoned discrete cosine transforms (DCT). While the global information, which also is the dominant frequency content and shape information of the whole face, is extracted by DCT and by Hu-moment. Therefore, face descriptor has rich information about a face image which tends to provide good performance for real time face recognition. To decrease the dimensional size of face descriptor, the predictive linear discriminant analysis (PDLDA) is employed and the face classification is done by kNN. The experimental results show that the proposed real time face recognition provides good performances which indicated by 98.30%, 21.99%, and 1.8% of accuracy, FPR, and FNR respectively. In addition, it also needs short computational time (1 second).
Inclined Image Recognition for Aerial Mapping using Deep Learning and Tree based Models Muhammad Attamimi; Ronny Mardiyanto; Astria Nur Irfansyah
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 6: December 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i6.10157

Abstract

One of the important capabilities of an unmanned aerial vehicle (UAV) is aerial mapping. Aerial mapping is an image registration problem, i.e., the problem of transforming different sets of images into one coordinate system. In image registration, the quality of the output is strongly influenced by the quality of input (i.e., images captured by the UAV). Therefore, selecting the quality of input images becomes important and one of the challenging task in aerial mapping because the ground truth in the mapping process is not given before the UAV flies. Typically, UAV takes images in sequence irrespective of its flight orientation and roll angle. These may result in the acquisition of bad quality images, possibly compromising the quality of mapping results, and increasing the computational cost of a registration process. To address these issues, we need a recognition system that is able to recognize images that are not suitable for the registration process. In this paper, we define these unsuitable images as “inclined images,” i.e., images captured by UAV that are not perpendicular to the ground. Although we can calculate the inclination angle using a gyroscope attached to the UAV, our interest here is to recognize these inclined images without the use of additional sensors in order to mimic how humans perform this task visually. To realize that, we utilize a deep learning method with the combination of tree-based models to build an inclined image recognition system. We have validated the proposed system with the images captured by the UAV. We collected 192 images and labelled them with two different levels of classes (i.e., coarse- and fine-classification). We compared this with several models and the results showed that our proposed system yielded an improvement of accuracy rate up to 3%.
Wireless sensor network based monitoring system for precision agriculture in Uzbekistan Farruh Muzafarov; Abdimurod Eshmuradov
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 3: June 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i3.11513

Abstract

The last decades the WSN technology has been adopted by more and more scientific fields for accurate and effective monitoring of climate phenomena like air pollution, destruction phenomena like landslides, etc. It has been widely used in agriculture for field monitoring. WSN is an emerging technology, which through the research in the labs and the real deployments has been proved to be a significant and valuable tool for scientists to explore another world which is behind the various environmental phenomena using tiny sensor nodes In this article, "Expert Advisory System" was developed to improve the productivity of farmers, save their time and improve the efficiency of the crops. The system monitors real-time crop fields using wireless sensor networks and provides the necessary information to farmers via the Internet. The farmer will be required to undertake the necessary remedial action on the basis of the information received. It’s also provided that the simulation of WSN in Contiki Simulator tool. Moreover, the queing model for WSN to also considered in this work.
Optimization of image compression and ciphering based on EZW techniques Majid S. Naghmash; Nazar J. Alhyani; Ali M. Kadhim
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.13092

Abstract

This paper presents the design and optimization of image compression and ciphering depend on optimized embedded zero tree of wavelet (EZW) techniques. Nowadays, the compression and ciphering of image have become particularly important in a protected image storage and communication. The challenge is put in application for both compression and encryption where the parameters of images such as quality and size are critical in secure image transmission. A new technique for secure image storage and transmission is proposed in this work. The compression is achieved by remodel the EZW scheme combine with discrete cosine transform (DCT). Encrypted the XOR ten bits by initial threshold of EZW with random bits produced from linear-feedback shift register (LFSR). The obtained result shows that the suggested techniques provide acceptable compression ratio, reduced the computational time for both compression and encryption, immunity against the statistical and the frequency attacks.
Optimal power scheduling of renewable energy sources in micro-grid via distributed energy storage system Ibrahim Alhamrouni; Firdaus Ramli; Mohamed Salem; Bazilah Ismail; Awang Jusoh; Tole Sutikno
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 4: August 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i4.15159

Abstract

This research is mainly focusing on the optimal power management by controlling the charging and discharging modes of the battery storage of the micro-grid (MG). A droop-based controller or battery controller is proposed for this work in order to optimize the power management of the battery. Charging and discharging modes are controlled by the droop-based characteristic where it will perform as a battery controller for the battery storage. Furthermore, the charging and discharging rates will depend on the signal from the MG at power secondary and its signal will be read by the battery controller and choose either to charge or discharge the battery storage where it will suffice the energy demand by loads in the micro-grid. The simulation results show the effectiveness of the controller to control sharing the power based on the desired energy from the battery storage to the loads at the MG. Moreover, all the critical cases have been advised, such as sudden decrease or disturbance of any generating unit. The result has been observed that due to sudden decrease or disturbance of any generating unit, the battery controller manages to control the charging and discharging rate based on the insufficient energy caused by the disturbance to fulfil the demand at MG.
A 9.38-bit, 422nW, high linear SAR-ADC for wireless implantable system Silpa Kesav Velagaleti; Nayanathara K. S.; Madhavi B. K.
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 19, No 2: April 2021
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v19i2.18318

Abstract

In wireless implantable systems (WIS) low power consumption and linearity are the most prominent performance metrics in data acquisition systems. successive approximation register-analog to digital converter (SAR-ADC) is used for data processing in WIS. In this research work, a 10-bit low power high linear SAR-ADC has been designed for WIS. The proposed SAR-ADC architecture is designed using the sample and hold (S/H) circuit consisting of a bootstrap circuit with a dummy switch. This SAR-ADC has a dynamic latch comparator, a split capacitance digital to analog converter (SC-DAC) with mismatch calibration, and a SAR using D-flipflop. This architecture is designed in 45 nm CMOS technology. This ADC reduces non-linearity errors and improve the output voltage swing due to the usage of a clock booster and dummy switch in the sample and hold. The calculated outcomes of the proposed SAR ADC display that with on-chip calibration an ENOB of 9.38 (bits), spurious free distortion ratio (SFDR) of 58.621 dB, and ± 0.2 LSB DNL and ± 0.4LSB INL after calibration.
Iris Image Recognition Based on Independent Component Analysis and Support Vector Machine Muhammad Fachrurrozi; Muhammad Mujtahid
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 13, No 2: June 2015
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v13i2.1171

Abstract

Iris has a very unique texture and pattern, different for each individual and the pattern will remain stable, making it possible as biometric technology called iris recognition. In this paper, 150 iris image from Dept. Computer Science, Palacky University in Olomouc iris database used for iris recognition based on independent component analysis and support vector machine. There are three steps for developing this research namely, image preprocessing, feature extraction and recognition. First step is image preprocessing in order to get the iris region from eye image. Second is feature extraction by using independent component analysis in order to get the feature from iris image. Support vector machine (SVM) is used for iris classification and recognition. In the end of this experimental, the implement method will evaluated based upon Genuine Acceptance Rate (GAR). Experimental result shown that the recognize rate from variation of training data is 52% with one data train, 73% with two data train and 90% three data train. From experimental result also shows that this technique produces good performance.  
Water Inrush Characteristics with Roadway Excavation Approaching to Fault Shuren Wang; Hu Wang Hu Wang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 3: September 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i3.830

Abstract

Water inrush disaster is an important factor in restricting safe production of the coal mine. Taking the roadway in seam in Danhou Coal Mine, as the engineering background, according to the spatial relationship of the roadway, the impermeable layer, the fault and the loading conditions, the fault activation mechanical model under the roadway excavation disturbance was built, and the fault activation conditions, roadway water inrush criterion and water inrush three modes were put forward. A three-dimensional numerical calculation models were built by using FLAC3D. Through fluid-solid coupling calculation, the surrounding rock damage and failure, the water inrush channel formation, and the evolution process of water inrush of the roadway excavation approaching the fault were analyzed. Moreover, the displacement field, the stress field and the surrounding rock plastic failure characteristics of the roadway were revealed. Furthermore, under the conditions of different water pressure, impermeable rock thickness, fault displacement, and fault dip angles, the roadway water inrush modes and their evolution characteristics were comparatively analyzed.
The Development of Windows Communication Foundation Application as Middleware for Banyumas Tourism and Culinary Information System Yuli Purwati; Fandy Setyo Utomo
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.445

Abstract

Banyumas located in the southwest of Central Java province. Banyumas is a tourist destination that serves a variety of interesting attractions to visit which include natural attractions, arts and culture, as well as culinary tourism. Business growth in the culinary and hospitality sectors in Banyumas region since 2011 experienced a significant increase in terms of quantity. Two of the business sector is a potential contributing factor for the tourism sector in Banyumas. In this study, an attempt to introduce and market potential for tourism, arts and culture, as well as culinary Banyumas done through WCF as a middleware application development that can be used by client applications to provide information about the potential of tourism, arts and culture, as well as culinary Banyumas. Step study conducted starting from data collection, analysis of functional requirements, system design, implementation, and testing of WCF applications. WCF application consists of several services, namely download service information lists attractions, arts and cultural information, culinary information, lodging information, and download the tourism image data from the server. Based on the test results of the service, it can be concluded that the service to function properly and is able to distribute information to the client.

Page 76 of 262 | Total Record : 2614


Filter by Year

2004 2022


Filter By Issues
All Issue Vol 20, No 3: June 2022 Vol 20, No 2: April 2022 Vol 20, No 1: February 2022 Vol 19, No 6: December 2021 Vol 19, No 5: October 2021 Vol 19, No 4: August 2021 Vol 19, No 3: June 2021 Vol 19, No 2: April 2021 Vol 19, No 1: February 2021 Vol 18, No 6: December 2020 Vol 18, No 5: October 2020 Vol 18, No 4: August 2020 Vol 18, No 3: June 2020 Vol 18, No 2: April 2020 Vol 18, No 1: February 2020 Vol 17, No 6: December 2019 Vol 17, No 5: October 2019 Vol 17, No 4: August 2019 Vol 17, No 3: June 2019 Vol 17, No 2: April 2019 Vol 17, No 1: February 2019 Vol 16, No 6: December 2018 Vol 16, No 5: October 2018 Vol 16, No 4: August 2018 Vol 16, No 3: June 2018 Vol 16, No 2: April 2018 Vol 16, No 1: February 2018 Vol 15, No 4: December 2017 Vol 15, No 3: September 2017 Vol 15, No 2: June 2017 Vol 15, No 1: March 2017 Vol 14, No 4: December 2016 Vol 14, No 3: September 2016 Vol 14, No 2: June 2016 Vol 14, No 1: March 2016 Vol 13, No 4: December 2015 Vol 13, No 3: September 2015 Vol 13, No 2: June 2015 Vol 13, No 1: March 2015 Vol 12, No 4: December 2014 Vol 12, No 3: September 2014 Vol 12, No 2: June 2014 Vol 12, No 1: March 2014 Vol 11, No 4: December 2013 Vol 11, No 3: September 2013 Vol 11, No 2: June 2013 Vol 11, No 1: March 2013 Vol 10, No 4: December 2012 Vol 10, No 3: September 2012 Vol 10, No 2: June 2012 Vol 10, No 1: March 2012 Vol 9, No 3: December 2011 Vol 9, No 2: August 2011 Vol 9, No 1: April 2011 Vol 8, No 3: December 2010 Vol 8, No 2: August 2010 Vol 8, No 1: April 2010 Vol 7, No 3: December 2009 Vol 7, No 2: August 2009 Vol 7, No 1: April 2009 Vol 6, No 3: December 2008 Vol 6, No 2: August 2008 Vol 6, No 1: April 2008 Vol 5, No 3: December 2007 Vol 5, No 2: August 2007 Vol 5, No 1: April 2007 Vol 4, No 3: December 2006 Vol 4, No 2: August 2006 Vol 4, No 1: April 2006 Vol 3, No 3: December 2005 Vol 3, No 2: August 2005 Vol 3, No 1: April 2005 Vol 2, No 1: April 2004 More Issue