{"title":"Mobile phone location logging into OpenBTS-based cellular network in disaster situation","authors":"Elvanno Hatorangan, T. Juhana","doi":"10.1109/TSSA.2014.7065966","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065966","url":null,"abstract":"When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. We propose to deploy a mobile OpenBTS along with search and rescue operation. While the search and rescue team doing their jobs, the OpenBTS serves the victims mobile phone. The victims in limited space and time might access the OpenBTS system to try to send short messages (SMS). In this paper we propose a method to logging the location of received SMS to OpenBTS, so the disaster stakeholders will have way to find the possible victims location at later time.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture design of Manado e-Government ICT networks: The road to Manado Smart City","authors":"A. Sinsuw, Xaverius B. N. Najoan, Y. D. Rindengan","doi":"10.1109/TSSA.2014.7065934","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065934","url":null,"abstract":"E-Government is believed to be one effective way of achieving good governance. In order to implement the good governance, it is need to have a good ICT network design architecture. Manado is one of developing city in Indonesia. As a capital of North Sulawesi Province, the business movement is more rapid so that it is a need for the government to issued letters of permit with good service and fast. This paper is discussed about architecture design of information and communication technology network that connects all existing institutions within the scope of Manado City government by using OSPF Protocol. In the simulated network by using packet tracer, the network of Information and Communication Technology in Manado City Government is divided into eight areas that representing the government offices which are consists of the major office and districts offices.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128161414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Faisel E. M. Tubbal, R. Raad, Kwan-Wu Chin, B. Butters
{"title":"S-band shorted patch antenna for inter pico satellite communications","authors":"Faisel E. M. Tubbal, R. Raad, Kwan-Wu Chin, B. Butters","doi":"10.1109/TSSA.2014.7065938","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065938","url":null,"abstract":"In this paper we study and evaluate shorted patch and CPW-feed square slot antennas, both of which we deem suitable for use in inter pico satellite communications in terms of gain, bandwidth and size. We have simulated both antennas in the High Frequency Structure Simulator (HFSS). Our results show that the shorted patch antenna achieves higher gain; e.g., 4.8 dBi, wider impedance bandwidth; e.g., 3.9-11.1 GHz with Voltage Standing Wave Ratio (VSWR) ≤ 2 at resonance frequencies of 4.4, 6.9 and 10.1 GHz. In addition, the Quasi Newton method is used to shift the shorted patch antenna's operating frequency to 2.45 GHz (S-band). This thus enables its use in the unlicensed ISM band without critically affecting its radiation performance. The simulated results show an impedance bandwidth of 3650 MHz (2.05-5.7 GHz) with VSWR ≤ 2 at a resonance frequency of 2.45 GHz.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121193771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-complexity sequential non-parametric signal classification for wideband cognitive radios","authors":"Mario Bkassiny, S. Jayaweera","doi":"10.1109/TSSA.2014.7065908","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065908","url":null,"abstract":"This paper addresses the computational complexity of the Dirichlet process mixture model (DPMM)-based Bayesian non-parametric classifier in cognitive radios (CR's). The DPMM is an ideal signal classification tool for wideband CR's (W-CR's) due to its non-parametric structure. However, it can incur a high computational complexity since it usually requires a large number of Gibbs sampling iterations. To address this issue, we first propose a parameter selection policy that efficiently selects the cluster parameters at each Gibbs sampling iteration, leading to a faster convergence to the stationary distribution of the underlying Markov Chain Monte Carlo (MCMC). Next, we propose a sequential DPMM classifier based on a recursive formulation that allows real-time classification of newly detected signals. The proposed algorithms are shown to significantly reduce the computational burden of the DPMM-based classifier, making it suitable for both large-scale and real-time CR applications.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129215035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security system for surveillance radar network communication using chaos algorithm","authors":"Nova Hadi Lestriandoko, T. Juhana, R. Munir","doi":"10.1109/TSSA.2014.7065947","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065947","url":null,"abstract":"Surveillance radar network is the network of some radar station to monitor and keep watch ship/vessel traffic. The communication of these station used tcp/ip over internet and local area network. The security system is an important part that can not be ignored for network communication. This paper proposed a prototype of security system for surveillance radar network, which is handling the security of communications over the Internet between a radar station to master station. The system is designed to protect the radar data against unauthorized parties. From the previous work, there was a weakness in the pseudorandom number generator. The generated number could not satisfy the randomness, it might be raise a security problem. Thus, Pseudorandom Number Generator (PNRG) using chaos algorithm was added to strengthen the salt cryptographic scheme. The analysis of result will be discussed to obtain the advantages of new system. Finally, a layered security system has been developed by taking advantage of a variety of encryption algorithms to get the best protection for the security of surveillance radar network communication.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129181126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indoor positioning system based on received signal strength (RSS) fingerprinting: Case in Politeknik Caltex Riau","authors":"Muhammad Diono, N. Rachmana","doi":"10.1109/TSSA.2014.7065942","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065942","url":null,"abstract":"Location detection system utilizing wireless LAN technology is an interesting field to study. The technique is widely used by researchers to build an indoor location detection system is fingerprint. Fingerprint is an information gathering phase of the received signal strength (RSS) by coordinate measuring instrument in particular. The system is able to overcome the limitations of GPS is not capable of providing location information in an indoor area. The results were analyzed by using a location estimate 80 test data and 1040 data from the fingerprint that has been selected. Accuracy of the results of this test reached 72.5% for the coordinate accuracy with an average error distance of 2 meters.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multifactor Customer Classification model for IP Transit product","authors":"Ian Yosef, Christophorus Ivan Samuels","doi":"10.1109/TSSA.2014.7065955","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065955","url":null,"abstract":"Customer Classification has important role in Customer Relationship Management (CRM) and has been applied in many industries, such as retail and manufacturing. However, there is no single model purposely created only for telecommunication wholesale segment, especially IP Transit. This research develops a model for customer classification with consideration of all aspects of customer - company relationship. These aspects are customer value, customer loyalty, and customer risk. The main point is the suitability with real industry. To achieve this objective, we used real transactional data and appropriate method for processing data. Customer lifetime value analysis is done to measure customer value, while Artificial Neural Network is done for measuring customer loyalty, and also Ordinal Regression is done for measuring customer risk. The outputs from these three measurements become the input for clustering using K-Means. The optimal cluster is four clusters which can be retrieved from Elbow Rule on Ward's Method. From the value of distance to zero point, there is one customer in “Platinum” cluster, twenty two customers in “Gold” cluster, and ten customers in “Silver” and twenty three in “Bronze” clusters.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Subekti, Sugihartono, N. Rachmana, A. B. Suksmono
{"title":"A Jarque-Bera test based spectrum sensing for cognitive radio","authors":"A. Subekti, Sugihartono, N. Rachmana, A. B. Suksmono","doi":"10.1109/TSSA.2014.7065944","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065944","url":null,"abstract":"A cognitive radio has to perform spectrum sensing to detect the vacant channel. The detection faces some challenges due to the required performance and limited knowledge on the primary signals and the channel. In this paper we proposed a blind spectrum sensing method for cognitive radio network. The proposed method based on the difference on distribution of the condition between when the transmission from primary user is active and when it's inactive. If it is inactive, the received signal will contain only noise. The distribution of noise which is Gaussian, differs from the distribution of signal which is contaminated with noise. The Jarque-Bera (JB) test is used for the detection of the event. The target of the analysis is both the real and the imaginary parts of FFT's output. The proposed algorithm was tested to detect the DTV signal. Results show that our method is performed better than previous similar method.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"59 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Co-channel interference mitigation technique for mobile WiMAX downlink system deployed via Stratospheric Platform","authors":"Iskandar, A. Abubaker","doi":"10.1109/TSSA.2014.7065905","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065905","url":null,"abstract":"This paper aim at evaluating an interference mitigation technique proposed for Stratospheric Platform (SPF) WiMAX downlink system. Performance evaluation of mobile WiMAX system under impact of co-channels interfering from the SPF antennas operating in the same frequency band is proposed to be studied in this paper. Several frequency reuse pattern are simulated to find the best reuse pattern which means that they have a minimum interference level. Simulation results clearly demonstrate that the co-channel interference was dominant when delivering mobile WiMAX via SPF and its performance can be effectively improved using frequency reuse patterns. Results relative to co-channel interfering evaluation, showed an improvement on the system performance with increasing frequency reuse pattern (from 1 to 3, or from 3 to 4). The remaining results with respect to BER simulation indicate how K Rice factor which is governed by elevation angle, Doppler shifts due to mobility, and physical layer setting of broadband system can contribute to the overall performance. Finally, simulation results clarified that applying spatial diversity at transmitter side can improve the performance at low elevation angles.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116745007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. M. Nasution, Yudha Purwanto, Agus Virgono, Girindra Chandra Alam
{"title":"Integration of kleptoware as keyboard keylogger for input recorder using teensy USB development board","authors":"S. M. Nasution, Yudha Purwanto, Agus Virgono, Girindra Chandra Alam","doi":"10.1109/TSSA.2014.7065954","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065954","url":null,"abstract":"Operating a computer to perform everyday tasks is sure to require input devices. The common human interface devices for operating a computer are mouse and keyboard. It means that modifying input devices can be alternative way to do monitoring and logging activity from a user. A keylogger is able to do such functions, but various hardware and software keylogger on the market are easily detectable either physically or by antivirus software. Those limitations can be avoided by hiding a keylogger directly into the keyboard. This key logger is implemented using Teensy 2.0 USB development board, which differs between the PS/2 and USB variant. Results of analysis shows that the keylogger in undetectable physically and works correctly just like any normal keyboard. The drawbacks are reduced performance as in increasing delay between held keystrokes, key ghosting and key jamming.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125747635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}