{"title":"Performance of modulator DTA-110 and DTA-115 in the mobile TV interactive based on DVB and unicast hybrid network","authors":"Iskandar, T. Hendrawan, G. F. Ramadhan","doi":"10.1109/TSSA.2014.7065927","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065927","url":null,"abstract":"Nowadays we are witnessing the development of digital broadcast television. One famous standard of digital broadcast is a Digital Video Broadcast (DVB). DVB is a family of standardize technologies designed to transmit video, audio, and multimedia services. In this work we develop small scale DVB system using computer equipped with DVB modulator to broadcast information or entertainment for students in a limited environment. The purpose of this research is to provide alternative solution in campus area that the students and academic community are able to develop an interactivity in learning, studying, or delivering home work or lesson material. To realize that, we develop DVB system using modulator DTA-110 and DTA-115 installed on the computer server. DTA-110 work on the Ubuntu operating system, while the DTA 115 works on Windows operating systems. Data in the form of video format TS (Transport Stream) emitted by an antenna connected to the modulator output. Then the data is received on the server re - stream with the help of a receiver dongle PC TV nano Stick. The parameters specified in the delivery of data, namely: frequency, guard interval, convolutional rate, constellation, and transmission mode. The performance of developed system is then evaluated and investigated in order the system is able to provide an acceptable performance to deliver such TV program or video.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Syambas, Ian Yosef, H. Situmorang, H. Nusantara
{"title":"The development of real time application monitoring system for fishery sea resources in Indonesia","authors":"N. Syambas, Ian Yosef, H. Situmorang, H. Nusantara","doi":"10.1109/TSSA.2014.7065940","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065940","url":null,"abstract":"In running the activities, the Goverment requires the data and information that are real time, accurate and relevant to the field of development planning. In short, application monitoring system for fishery sea resources is a mechanism of monitoring integrated activity between staff whos are in the headquarter with staff working in each unit of work scattered throughout the territory of Indonesia. The head office has authority in the strategic operational implementation of each unit in all existing province and district. Determining indicators and targets achievement associated with fishery sea resources monitoring activities and validate assessment conducted by the staff in each unit, compared or validated with physical reports received by the headquarter. With these mechanisms, monitoring can be run in real-time, a high degree of accuracy, and facilitate reporting on each unit of work to central or national level. In this paper application of ICT in the form of real-time application data monitoring fishery sea resources has developed using a dashboard approach.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wideband channel modeling employing 60 GHz frequency for wireless gigabit transmission","authors":"Iskandar","doi":"10.1109/TSSA.2014.7065928","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065928","url":null,"abstract":"This paper aim at evaluating wideband channel characterization of 60 GHz radio frequency that is used for short range high speed data transmission. We observe an RMS delay spread of 60 GHz channel using radio propagation software simulation base on ray tracing algorithm. Three different rooms is taken into account for our experiment. Detail room size, dimension, and material are considered in the simulation to find RMS delay spread, coherence bandwidth, and finally the performance of the channel in which Gbps of data were transmitted through this channel.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125313327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Homomorphic filtering for extracting Javanese Gong wave signals","authors":"M. H. Budhiantho, Gunawan Dewantoro","doi":"10.1109/TSSA.2014.7065912","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065912","url":null,"abstract":"The Gong is a unique percussion instrument of Gamelan because of its wave-like sounds after being struck immediately. These special sounds correspond to the characteristics of each gong which is originated from different places. This phenomenon might raises from the primary beat of the partials and or mismatched overtone frequencies. However, there has been a lack of studies that rigorously locate the beat and/or a set of beat frequencies the better understand the perceptible beat. This study attempts to trace the beat-showing occurrences in the quefrency domain employing a set of homomorphic operations. First, acoustic measurement was conducted and further analyzed using homomorphic operations to obtain its cepstral profile. The rapidly-varying frequency part was filtered out to show the location of a set of beats. The cepstrum also show a prominent peak at 0.01 s, which corresponds to the harmonicity of 47.6 Hz. This is in agreement with the measured fundamental frequency of Gong Kempul.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131491382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna co-planar array of X-band frequency 9.4 GHz for radar","authors":"Y. P. Saputera, Y. Wahyu, M. Wahab","doi":"10.1109/TSSA.2014.7065924","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065924","url":null,"abstract":"In this paper, carried out research on the development of radar antenna for X-band, with a resonant frequency of 9.4GHz. Antenna designed using coplanar array, the module is designed radiating patch of 4, 4 co-planar patch on the left side of the main and 4 co-planar on the right side of the main patch. Bandwidth resulting from the simulation is 677.8MHz, at a frequency of 9.0815GHz - 9.7953GHz. In the realization of Bandwidth is 419MHz. The resulting simulated VSWR at a frequency of 9.4GHz is 1.0256 and 1.056 for the realization of results. The resulting gain is 13.38dBi for simulation, and 14.1dBi for realization.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133315148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Mean Time-to-Compromise and VEA-bility security metrics in auditing computer network security","authors":"E. Husni, Yustika Kurniati","doi":"10.1109/TSSA.2014.7065960","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065960","url":null,"abstract":"This study focuses on the application of security metrics to a computer network. Mean Time-to-Compromise (MTTC) metric and VEA-bility metric are selected for this study. MTTC is calculated using a set of equations based on the known vulnerabilities of the system. VEA-bility is selected because it uses CVSS that has a wide coverage of security aspects. The input data for both metrics are obtained from Nessus, a network security tool. Both metrics give numerical results which are simple to comprehend to average clients. The purpose of this study are to calculate MTTC and VEA-bility values of the network, to compare the security level of different network configurations, also to compare the feasibility and convenience of using both metrics. The results of the study can be used as recommendations for network security assessment and references to determine policies relating to computer network management.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133022708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A 2.4 GHz High Data Rate radio for pico-satellites","authors":"B. Butters, R. Raad","doi":"10.1109/TSSA.2014.7065943","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065943","url":null,"abstract":"CubeSat is a class of popular pico-satellites that is limited in size to a standard 10×10×10cm unit. In this paper, we present a functioning High Data Rate (HDR) 2.4 GHz radio for use on a CubeSat. Current CubeSats suffer from low data rate radios and this severely limits their functionality. In this design, the operating constraints of a CubeSat have been addressed. Namely, power, wide variations in temperature, the size and weight of the components, and cost. The radio can potentially achieve bits rates in the order of 60 Mbps using 0.3W in Rx mode and 0.5W in Tx mode - with a further 2W for the power amplifier.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115296013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
{"title":"Traffic anomaly detection in DDos flooding attack","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/TSSA.2014.7065953","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065953","url":null,"abstract":"Researches have been conducted to overcome Distributed Denial of Service (DDoS) flooding attack. Beside the use of signature based detection, anomaly based detection is also used to detect the attack. Several methods such as statistic, information theory, data mining and forecasting have been proposed. In several researches, they just focused to detect the traffic anomaly, but not to recognize the types of anomaly that were detected such as flashcrowd, types of botnet, types of DDoS, and prevention action. In this paper we categorize anomaly traffic detection system based on process and capability focus. Anomaly detection system process including traffic features, preprocessing, and detection process. Capability focus based on each main research problem to be solved, there are detectingonly anomaly, types of anomaly, and prevention system that include process to overcome the attack. At the end of paper, we provide overview of research direction and opportunities that may be done in future research.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recommendation on domestic Internet interconnection towards all-IP network","authors":"S. Haryadi, Febrianty","doi":"10.1109/TSSA.2014.7065937","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065937","url":null,"abstract":"The Internet is a packet-based network switches become part of everyday people in the world at large. Currently, the implementation of Internet interconnection has been held in almost all countries in the world, but in a country that has not had an all-IP based networks, is still limited to the relationship of business to business, where the state has not made regulations on this matter. It is expected that this academic study, may be one approach to regulation of the Internet interconnection. In the regulation of the Internet, the necessary technical arrangements and charging models that fit the Internet interconnection. Interconnection Regulation, from the technical aspect consists of two ways, namely Direct Interconnection, and Indirect Interconnection. Interconnection Regulation, from charging aspects, there are also two ways, namely Bill and Keep Transfer Model the Initiating Party's Network Pays Model.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126269184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible image watermarking based on histogram modification and virtual border","authors":"Nova Hadi Lestriandoko, D. Rosiyadi","doi":"10.1109/TSSA.2014.7065948","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065948","url":null,"abstract":"This paper proposed the reversible image watermarking based on histogram modification and virtual border to protect the digital image originality. The color histogram was used to embed the digital signature of image. The histogram was modified based on the payload, thus the changes can be minimized. The reversibility was obtained from the storing of changes in the LSB of virtual border. Finally, the analysis of the result will be discussed.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129575018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}