2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)最新文献

筛选
英文 中文
Traffic analysis of number of request per user and Volume per Request Hits on IP networks IP网络上每个用户的请求数和每次请求命中量的流量分析
S. Haryadi, Marisa Premitasari
{"title":"Traffic analysis of number of request per user and Volume per Request Hits on IP networks","authors":"S. Haryadi, Marisa Premitasari","doi":"10.1109/TSSA.2014.7065932","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065932","url":null,"abstract":"Packet switching is a switching technique by segmenting the data into packets to be passed in the idle path. This attracted attention for researchers to know how big the queues or congestion that occurs in it and how the shape of the distribution. The results of research on network-based traffic in a switching circuit generates traffic that follows the Poisson process. In the Poisson process, the amount of arrival traffic is distributed Poisson and negative exponentially distributed arrival intervals. The researchers wanted to know whether the new technology, traffic still meets the Poisson distribution or not. From the results obtained that traffic modeling of IP-Based by taking a sample of the number of requests per user and Volume per Request Hits, obtained IDI = 0.30556, which indicates that the traffic is not including the Poisson Distribution. Research with various approaches continuous distribution, the number of request user generates Pareto distributed with X (1:02; 0.5) and the Volume per Request Hits Gaussian distributed with X (6.4).","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
OLSR and AODV routing protocol performance analysis in ad hoc mobile phone network to maintain the connectivity of celluler network 为保持蜂窝网络的连通性,对自组织移动电话网络中的OLSR和AODV路由协议进行性能分析
Effi Kurniawati, R. Munadi, I. Wahidah, D. Perdana
{"title":"OLSR and AODV routing protocol performance analysis in ad hoc mobile phone network to maintain the connectivity of celluler network","authors":"Effi Kurniawati, R. Munadi, I. Wahidah, D. Perdana","doi":"10.1109/TSSA.2014.7065921","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065921","url":null,"abstract":"The connectivity of the user equipment is one of the important thing that must be keep by the operator. To maintain this connectivity, operator should be smart to determine the network infrastructure that is low cost, easy, and fast to be implemented. To solve those connectivity problem, in this study will be designed an ad hoc mobile phone network. In an ad hoc network mobile phone which is built on a mesh client of the Wireless Mesh Network (WMN) allows a user equipment (UE) that having a poor link quality or out of eNode-B coverage will still get service from eNode-B by transmitting data packets over others UE which has better link quality using using wi-fi technology that already exist in each UE. This network is chosen because it is self-configuring, self-organizing, self-healing and does not require fixed infrastructure in implementation and does not require communication with the higher entities such as core or Radio Network Controller (RNC).","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130665901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Degree centrality and eigenvector centrality in twitter 微博中的度中心性和特征向量中心性
W. Maharani, Adiwijaya, A. A. Gozali
{"title":"Degree centrality and eigenvector centrality in twitter","authors":"W. Maharani, Adiwijaya, A. A. Gozali","doi":"10.1109/TSSA.2014.7065911","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065911","url":null,"abstract":"Network formed between users in a social media can be used to encourage information spreading among them. This research applied Social Network Analysis which further can be used to social media marketing to improve the marketing process effectively. Based on previous research, information spreading speed among the social media is affected by the users' activity connection which can be represented in centrality value. The centrality value itself is very affected by the graph structure and weights. This research applied degree and eigenvector centrality to observe the effect of centrality value for twitter data. The result shows that there is significant difference among 10 most influential users. This result will be used for the future research that will be focused in small and medium enterprise (SME) twitter data.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
Application of system monitoring and analysis of vehicle traffic on toll road 收费公路车辆交通监控与分析系统的应用
Peter H. L. Tobing, Hendrawan
{"title":"Application of system monitoring and analysis of vehicle traffic on toll road","authors":"Peter H. L. Tobing, Hendrawan","doi":"10.1109/TSSA.2014.7065968","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065968","url":null,"abstract":"In this study an image processing based application for system monitoring and analysis of vehicles traffic on toll road was developed. The method used to detect a vehicle in the daytime is based on the background subtraction method. While to detect cars in the night condition, a new algorithm was developed using car lights features. The experimental results show that background subtraction method can achieve maximum accuration rate of 86.7%, meanwhile the method of vehicle detection at night works well with an accuracy rate of 96.3%. The applications also analyze the traffic conditions to provide information on traffic congestion state and gather statistical data of the traffic during certain periods. The application also provide notification of traffic conditions to the user which is broadcast automatically.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"189 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120885552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Closed loop power control with space diversity to improve performance of low elevation angle users in HAPs-CDMA communication channel 利用空间分集进行闭环功率控制以改善HAPs-CDMA通信信道中低仰角用户的性能
Iskandar, A. Kurniawan, M. E. Ernawan
{"title":"Closed loop power control with space diversity to improve performance of low elevation angle users in HAPs-CDMA communication channel","authors":"Iskandar, A. Kurniawan, M. E. Ernawan","doi":"10.1109/TSSA.2014.7065926","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065926","url":null,"abstract":"This paper proposes variable step closed loop power control algorithm combined with space diversity to improve the performance of High Altitude Platforms (HAPs) communication at low elevation angle using Code Division Multiple Access (CDMA). In this contribution, we first develop HAPs channel model which is derived from experimental measurement. From our experiment, we found HAPs channel characteristic can be modeled as a Ricean distribution because the presence of line of sight path. Different elevation angle resulting different K factor value. This value is then used in Signal to Interference Ratio (SIR) based closed loop power control evaluation. The variable step algorithm is simulated under various elevation angles with different speed of mobile user. The performance is presented in terms of user elevation angle, user speed, step size and space diversity order. We found that the performance of variable step closed-loop power control less effective at low elevation angle. However our simulation shows that space diversity is able to improve the performance of closed loop power control for HAPs channel at low elevation angle.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121207542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study of unfair competition between regulated and unregulated VoIP providers in the mixed of non and all-IP network era 非ip网络与全ip网络混合时代受监管与不受监管VoIP提供商之间的不公平竞争研究
S. Haryadi, FestyLalita Niramaya
{"title":"Study of unfair competition between regulated and unregulated VoIP providers in the mixed of non and all-IP network era","authors":"S. Haryadi, FestyLalita Niramaya","doi":"10.1109/TSSA.2014.7065930","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065930","url":null,"abstract":"All-IP network in Indonesia are still few in number. It is estimated that more than 5 years from now there are a combination of non-IP networks and all-IP network. At this time, an international VoIP service in Indonesia is given by the regulated and unregulated providers. The regulation of VoIP services are included in government regulation number KM.23.2002 about internet telephony for public use. The unregulated services is defined as the services outside the regulated one and broadly known as OTT (over - the - top) services. The difference between the regulated and unregulated studied from several aspects such as infrastructure, traffic, rates, and quality of service. This study has also found that the regulated VoIP have a better quality of service, otherwise unregulated VoIP service is cheaper. Recommendations resulting from this research is about how to make a fair regulation of VoIP. With proper regulation, the unregulated providers will change to a regulated provider, and will cooperate with the telecommunications network operators. This scheme will provide benefits for users and operators, as well as service providers.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122726894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of digital evidence collection methods in case of Digital Forensic using two step inject methods 基于两步注入法的数字取证方法研究
N. Syambas, Naufal El Farisi
{"title":"Development of digital evidence collection methods in case of Digital Forensic using two step inject methods","authors":"N. Syambas, Naufal El Farisi","doi":"10.1109/TSSA.2014.7065951","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065951","url":null,"abstract":"Digital Forensics is a branch of forensic science related to legal evidence found in computers and digital storage media. In the process of the investigation, the investigators took digital evidence from computers, laptops, HP, and other electronic goods. But there are times when a suspect or a witness or related person does not want to cooperate with investigators and removing the digital evidence. Therefore a lot of research whose goal is to generate data from the flash memory, a hard disk or other digital storage media data content has been deleted. Unfortunately, such methods can not guarantee the data that has been deleted can be resurrected all, most can only partially and sometimes even then not perfect so the file can not be opened.This paper discusses the development of new methods for retrieval of digital evidence inject the two-step method (TSI), which have focused on the prevention of the loss of digital evidence by suspects or other party.The advantages of this method is the system working in secret and can be combined with other digital evidence excavation applications that already exist so that the accuracy and completeness of the resulting digital evidence can be better. Collaboration with admin-LAN client application also enables future data collection can be performed remotely.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116430696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Resource sharing between M2M and H2H traffic under time-controlled scheduling scheme in LTE networks LTE网络中时间控制调度方案下M2M和H2H流量的资源共享
Kennedy Edemacu, T. Bulega
{"title":"Resource sharing between M2M and H2H traffic under time-controlled scheduling scheme in LTE networks","authors":"Kennedy Edemacu, T. Bulega","doi":"10.1109/TSSA.2014.7065909","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065909","url":null,"abstract":"Machine-to-Machine (M2M) communication is becoming a commonly used terminology due to the idea of Internet of Things (IoT). M2M communication has many areas of application, such as in; medical, transport, environmental monitoring, smart grids among others. As the field of its application expands, the number of M2M devices is expected to grow exponentially in the next few years. Long Term Evolution (LTE) has been identified as one of the suitable wireless communication technologies for M2M communication. Incorporating M2M communication on top of regular Human-to-Human (H2H) communication in LTE is a challenging task due to the expected increase in the number of M2M devices coupled with the unique characteristics of M2M traffic. Therefore, the current scheduling and resource allocation techniques among others being used in LTE need to be refined to efficiently accommodate M2M communication. A scheduling scheme called fixed Access Grant Time Interval (AGTI) time-controlled scheduling scheme was proposed for scheduling M2M traffic in LTE. Resource sharing and utilization under this scheme is inefficient due to fixed AGTI assignment which results into fixed nature of resource allocation. In this work, we propose a scheduling scheme called Dynamic AGTI Time-controlled Scheduling Scheme in which the AGTI is dynamically assigned basing on M2M and H2H traffic intensities. We model the proposed scheme using M/G/m/m queuing technique focusing on resource utilization and Quality of Service (QoS) of both M2M and H2H traffic. The analytical results show that, the Dynamic AGTI Time-controlled Scheduling Scheme achieves; better percentage resource utilization as compared to Fixed AGTI Time-controlled Scheduling Scheme while providing optimal blocking probability for both M2M and H2H traffic. However, the monitoring of resource usage and reassignments of AGTI in Dynamic AGTI Time-controlled Scheduling Scheme increases scheduler complexity.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117057723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A transmit power control protocol for multipath wireless sensor networks 一种多路径无线传感器网络的发射功率控制协议
U. A. Al-Hamdany, R. Raad
{"title":"A transmit power control protocol for multipath wireless sensor networks","authors":"U. A. Al-Hamdany, R. Raad","doi":"10.1109/TSSA.2014.7065945","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065945","url":null,"abstract":"This paper proposes a Transmit Power control algorithm that increases a sensor network lifetime while maintaining throughput. The developed protocol has two main purposes: (1) to reduce energy depletion by using transmit power control protocol, and, (2) to maintain throughput by using multipath routing. A limitation of most previous studies that minimize transmit power is that they fail to take into consideration the throughput reduction when energy saving schemes are employed. Positive results were obtained when the proposed scheme was simulated on an IEEE 802.11g wireless link.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile phone auto registration to OpenBTS-based cellular network in disaster situation 灾害情况下手机自动登记以基于openbts的蜂窝网络为主
Elvanno Hatorangan, T. Juhana
{"title":"Mobile phone auto registration to OpenBTS-based cellular network in disaster situation","authors":"Elvanno Hatorangan, T. Juhana","doi":"10.1109/TSSA.2014.7065965","DOIUrl":"https://doi.org/10.1109/TSSA.2014.7065965","url":null,"abstract":"When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. The problem arise when victims' mobile phone only associated to the providers' network where the SIM card come. Even though it can manually associate to available network in an emergency situation, but victims' situation and knowledge might prevented them in doing that. In this work we propose method to enable mobile phones automatically associates themselves to OpenBTS-based cellular network.","PeriodicalId":169550,"journal":{"name":"2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132242895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信