{"title":"Musical note recognition using Minimum Spanning Tree Algorithm","authors":"Yoppy Sazaki, Rosda Ayuni, S. Kom","doi":"10.1109/TSSA.2014.7065919","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065919","url":null,"abstract":"Musical Notes are notes which is placed in staff. This research was developed a musical note recognition software using Minimum Spanning Tree Algorithm. This software was developed to help beginner in learning music especially in recognizing musical notes. The input for this software was musical notes image and the output were information of musical note which is name of musical note and beat's length sound of recognized musical note. There were four pre-processing involved in this research namely Sobel edge detection, binarization, segmentation and scaling then the result from pre-processing was used in training process. Accuracy of musical note recognition using this algorithm reached 97.9 per cent out of 97 trained data and 97.4 per cent out of 40 tested data.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128836742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation of energy detector in Cooperative Spectrum Sensing","authors":"N. Armi, M. Wahab, H. Asep Yudi","doi":"10.1109/TSSA.2014.7065917","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065917","url":null,"abstract":"The main idea of Cooperative Spectrum Sensing (CSS) is to improve detection performance. Each Secondary User (SU) shares sensing information to collect data of the unused bands. One technique to detect those frequency bands is energy detector. This technique uses the threshold level to minimize spectrum sensing error in Cognitive Radio (CR) system. Proper selection of the threshold level results a good detection performance. In addition, detection performance to the unused spectrum is indirectly influenced by error rate. Less error rate in spectrum sensing leads to have a good detection performance. In this paper, the detection performance of CSS is investigated. The proper number of collaboration users with target error rate is determined as well in order to achieve an optimal performance. Total error rate of energy detector, signal to noise ratio (SNR), and number of CR user are used as metric for performance evaluation. Through computer simulation, numbers of CR user, degree of voting rule, and threshold value of energy detector have a significant impact to the achieved performance.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127379820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and implementation multicast video streaming on openflow network","authors":"A. Latif, E. Mulyana","doi":"10.1109/TSSA.2014.7065949","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065949","url":null,"abstract":"Multicast is a technology that allows transmission of data efficiently from one server to multiple recipients at once. To use this technology, required devices and systems that support multicast such as router/switch that supports IGMP. Software Defined Networking (SDN) and OpenFlow has emerged as a new paradigm in networking. With SDN, network is no longer closed, proprietary, and difficult to program. With OpenFlow we do not need IGMP protocol and specific hardware, as OpenFlow can set / program entire network through the controller. Then author made an application “Lcast video streaming” Floodlight OpenFlow-based controller.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122807978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ian Yosef Matheus Edward, S. I. Lestariningati, A. Agusdian
{"title":"Correlation model map between the ICT industry growths with GDP growth","authors":"Ian Yosef Matheus Edward, S. I. Lestariningati, A. Agusdian","doi":"10.1109/TSSA.2014.7065956","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065956","url":null,"abstract":"The demand of Information and Communication of today world citizen has triggered ICT as rapidly growing industries in the world. The ICT critical role is significant in improving people's welfare in the sense of providing services for competitiveness and high level of efficiency in all aspects of life, particularly in relation to time and distance. Hence by its nature ICT industry have contributed in very significant in productivity and economic growth.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Leader-following consensus in vehicle platoons with an inter-vehicle communication network","authors":"Y. Ruan, S. Jayaweera","doi":"10.1109/TSSA.2014.7065910","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065910","url":null,"abstract":"We consider the problem of controlling a platoon of vehicles in which each vehicle tries to maintain a fixed distance from its predecessor, which is an instance of the so-called “string stability” problem. Our model includes a communication network among the platoon of vehicles and an associated leader-following consensus protocol. We derive the sufficient conditions, in terms of communication topology and control parameters, for string stability by using the leader-following consensus algorithm. Comparison of our proposed algorithm with previously proposed control methods in literature shows that ours is a generalization that encompasses previous approaches as special cases obtained by assuming specific communication topologies. Simulation results and performance in terms of disturbance propagation are also given, showing that the proposed leader-following consensus protocol leads to almost the same level of performance as the previous approaches, while the proposed algorithm has additional advantages of scalability, robustness and distributed implementation.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114567448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile application design of disaster rescue team tracking","authors":"T. Juhana","doi":"10.1109/TSSA.2014.7065936","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065936","url":null,"abstract":"The first 72 hours is critical in saving human lives after a disaster occurred. Mobilizing many disaster rescuer team to many different places can be a daunting task. In this work, we propose a mobile-devices-based application which can be used to track the rescuer movement. The tracking records, which are displayed in a map, can be used by decision makers in command center to distribute rescuer team to places where the rescuers have not gone yet. The application can effectively reduce rescuer mobilizing time so hopefully many lives can be saved.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modifing Power Source Aware Routing (PSAR) algorithm with fuzzy logic addition in ZigBee network","authors":"Sri Astuti, R. Munadi, Istikmal","doi":"10.1109/TSSA.2014.7065922","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065922","url":null,"abstract":"Routing mechanism is one of the many ways to optimize the performance of Zigbee network that used battery-powered device. Therefore, a variety of routing algorithms are developed to obtain the optimal performance. One of the examples is Power-Source Aware Routing (PSAR) algorithm. However, PSAR algorithm has problem that the reconfiguration of battery powered node from communication path is not always possible to be conducted due to the availability of lots of battery-powered devices, or node located outside the communication range, etc. We proposed the modified PSAR algorithm by adding a fuzzy logic. This was to select the optimal battery powered node to forward the message to their neighbors. The results of the simulation indicate that for overall battery powered node, PSAR algorithm has 10.5 percent smaller energy consumption in average compared to Tree algorithm. In addition as a result of the reconfiguration, PSAR algorithm has longer lifetime node. For overall battery-powered node, the modified PSAR algorithm has 6.1 percent smaller energy consumption compared to PSAR algorithm. The modified PSAR algorithm has also more balance lifetime node.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115717192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Digital rights management with ABAC implementation to improve enterprise document protection","authors":"Ubaidillah, Ir BudimanBadarsyah, Y. Rosmansyah","doi":"10.1109/TSSA.2014.7065920","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065920","url":null,"abstract":"Digital rights management has become a solution for copyright owners to protect the content in any digital object that transacted over the internet or digital storage from the risk of modifications such save a copy, edit, and illegal transfer from the irresponsible or piracy[16]. In DRM, content owners may limit the use of documents through the provision of encryption, copy control modifications, restrictions on access right and apply digital watermark so that the object has ability to protect the contents from theft and data piracy or unauthorized distribution[1]. In an organization, distribution of documents data/information is important because it may affects the performance of the company. Distribution which based on RBAC (role-based access control) with tight role permission will not effectively used when documents are distributed to 2-3 slices of different divisions interest, because it can add a bureaucracy that could hurt the company. To that end, each document should be regarded as an object/attribute (attribute-based access control (ABAC)) so that each person has the freedom to use the document while still providing protection from the contents of the documents were distributed[15]. In this paper the author tries to give an overview of the implementation of ABAC into DRM to see the extent to which access control can provide a sense of comfort and effectiveness in the use of an organization's documents while providing protection of copyrights contained in this document.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115096179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study of HAPS-LTE downlink channel performance simulation deployed for high speed user vehicle","authors":"Iskandar, M. R. K. Aziz","doi":"10.1109/TSSA.2014.7065929","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065929","url":null,"abstract":"This paper aims at evaluating Long Term Evolution (LTE) channel performance in the downlink direction deployed via high altitude platform station (HAPS) channel. Based on experimentally HAPS channel characteristic, we evaluate LTE channel performance in the downlink direction using channel estimation. First HAPS channel model is characterized according to the user's position inside the coverage. Transmission of an LTE signal into HAPS channel is then evaluated based on normal reception. The minimum square error (MSE) for users located at low elevation angle which mean at the edge coverage is not as we expect to be because high contribution of multipath. To cope with this problem channel estimation using minimum mean square error (MMSE) is applied and compared with simple least square (LS) algorithm. From simulation, the performance of MMSE algorithm is superior compared with LS algorithm for the users that have high elevation angle. However for the users that have low elevation angle the performance of MMSE and LS is not quite different.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124662760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of FTTH - GEPON for high rise building","authors":"H. Nusantara, Freyskania Dairianta","doi":"10.1109/TSSA.2014.7065961","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065961","url":null,"abstract":"This paper is about analysis and design of fiber access network systems using GEPON technology for HRB. GPON for HRB are designed to comply both for power budget and rise time budget standard. From analysis, G.652 and G.657 fiber type and also the SC connector is suitable in this design.. The design result recommended only using 1 stage splitting method with maximum splitting ratio of 1;32 and 1;16 splitter. The margin link power budget is above 0 and the value of rise time budget is still below the 70% NRZ.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129310921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}