2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)最新文献

筛选
英文 中文
Java and Sunda dialect recognition from Indonesian speech using GMM and I-Vector 基于GMM和I-Vector的印尼语爪哇和巽他方言识别
Rita Rahmawati, D. Lestari
{"title":"Java and Sunda dialect recognition from Indonesian speech using GMM and I-Vector","authors":"Rita Rahmawati, D. Lestari","doi":"10.1109/TSSA.2017.8272892","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272892","url":null,"abstract":"Recognition of dialect is a field of research in the field of language recognition. The purpose of this study is to compare the best modelling features and techniques for recognizing Javanese and Sundanese dialects in Indonesian speech using MFCC and combination of MFCC and pitch feature candidates and comparing GMM and I-Vector modelling techniques. This research uses machine learning approach for training process and model testing. As a result, the use of the combination of MFCC and pitch feature and the I-Vector modelling technique has the advantage to recognize Java and Sunda dialect.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (Case study : XYZ institute) 基于ISO/IEC 27001:2013的ISMS规划,在差距分析阶段使用层次分析法(案例研究:XYZ研究所)
Johan Candra, O. Briliyant, Sion Rebeca Tamba
{"title":"ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (Case study : XYZ institute)","authors":"Johan Candra, O. Briliyant, Sion Rebeca Tamba","doi":"10.1109/TSSA.2017.8272916","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272916","url":null,"abstract":"The biggest challenge in information security planning is how to acquire precision in the gap analysis phase. According to the information security management system (ISMS) implementation guide based on ISO/IEC 27001:2013, the planning of ISMS has 5 stages. The 5 stages are : defining the range, perform gap analysis, accomplish risk assessment, determine the control and target, and determine the policy and procedure of ISMS. The gap analysis stage is required to assess the organization's current position toward ISMS implementation. This research suggested the use of AHP to determine which information security control that most relate to the organization needs and goals. We will conduct the process in one of Indonesia's organization called the XYZ institute. The result of this research is prioritization of information security gap handling that will be useful for XYZ institute to support their processes of ISO/IEC 27001:2013 implementation.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison of the Haryadi Index with existing method in competition, equality, fairness, and correlation level calculation: Case study: Telecommunication industry Haryadi指数与现有方法在竞争、平等、公平和相关水平计算方面的比较——以电信业为例
Levin Kusuma Adiatma Nie, S. Haryadi
{"title":"Comparison of the Haryadi Index with existing method in competition, equality, fairness, and correlation level calculation: Case study: Telecommunication industry","authors":"Levin Kusuma Adiatma Nie, S. Haryadi","doi":"10.1109/TSSA.2017.8272914","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272914","url":null,"abstract":"This research is focused in a formula called Haryadi Index, which implemented in the assessment of telco industry. This formula will be contested with the other existing formula to gauge competition level, equality level, fairness level, and correlation level. The Herfindahl-Hirschman Index will be compared against Haryadi Index for competition level, Gini Index will be compared for equality level, Jain Index for fairness level, and Pearson Correlation for the correlation level calculation. The research produces the following : (1) Haryadi Index can provide better number for an industry with a different level of competition, whereas the Herfindahl-Hirschman Index do worse; (2) Haryadi Index has more precise equality level coefficient than the Gini Index; (3) Haryadi Index can give more appropriate indexes for a variety levels of fairness, while Jain Index gives a relatively bigger indexes for a variety levels of fairness; (4) Haryadi Index gives a new alternative for correlation counting which refer to the linear equation, while more research will be needed to find the better situation to use the Haryadi Index or the Pearson Correlation appropriately.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of RSA 2048-bit and AES 128-bit for Secure e-learning web-based application 基于web的安全电子学习应用的RSA 2048位和AES 128位的实现
O. Briliyant, Ahmad Baihaqi
{"title":"Implementation of RSA 2048-bit and AES 128-bit for Secure e-learning web-based application","authors":"O. Briliyant, Ahmad Baihaqi","doi":"10.1109/TSSA.2017.8272903","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272903","url":null,"abstract":"E-learning systems today focuses on wide accessibility which is relatively contradictive to security. But as the cyber landscape has changed, so is the cyber security threat that follows. Security is needed to prevent from cyber threat such as data theft, modification, and fabrication, especially in a web-based environment. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in PHP and Javascript programming. Secure Electronic Learning System (SELS) application is designed to accommodate security services, such as confidentiality, integrity, authentication, and non-repudiation. Encryption to provide confidentiality services in file exchange process. Digital signature used to provide integrity, authentication, and non-repudiation in the access control and file exchange processes. Moreover, application can give information about file modification with notification to users. We demonstrated the implementation of cryptography in SELS can prevent data theft, illegal access, data modification or fabrication and is proven on the test.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130542846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight monitoring system for IOT devices 物联网设备的轻量级监控系统
Widhi Yahya, Achmad Basuki, Eko Sakti, Frondy Fernanda
{"title":"Lightweight monitoring system for IOT devices","authors":"Widhi Yahya, Achmad Basuki, Eko Sakti, Frondy Fernanda","doi":"10.1109/TSSA.2017.8272897","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272897","url":null,"abstract":"The Internet of Things (IoT) brings millions of devices, in the form of sensor, actuator, or embedded electronic devices interconnected through the Internet. Monitoring abundant of IoT devices is a big challenge, especially in a constrained condition of sensor nodes (e.g. limited CPU, memory, and battery). Therefore, a good monitoring system with an efficient monitoring protocol is often needed to compensate the limited resources of sensor nodes. SNMP is a protocol that widely used for a monitoring system. However, SNMP was developed without taking into account of devices with limited resources. This paper presents a proposed prototype of a light weight monitoring system based on agent-manager model. The testing result shows that the developed prototype system generates smaller packet sizes than the SNMP-based monitoring system on the same function and shows a low CPU and memory usage in monitoring thousands of devices.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Architectural design of token based authentication of MQTT protocol in constrained IoT device 受限物联网设备中基于令牌的MQTT协议认证体系结构设计
A. Bhawiyuga, Mahendra Data, Andri Warda
{"title":"Architectural design of token based authentication of MQTT protocol in constrained IoT device","authors":"A. Bhawiyuga, Mahendra Data, Andri Warda","doi":"10.1109/TSSA.2017.8272933","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272933","url":null,"abstract":"An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Content storage effect on the named data network traffic load 内容存储对命名数据网络流量负载的影响
L. V. Yovita, N. Syambas
{"title":"Content storage effect on the named data network traffic load","authors":"L. V. Yovita, N. Syambas","doi":"10.1109/TSSA.2017.8272941","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272941","url":null,"abstract":"Named Data Network (NDN) is a network architecture with a content-centric paradigm, in which the consumer has a certain interest in a content. Requests for data are performed based on the content, not to specific server or producer so that the response to the requested content can be performed by the NDN router, not only by the server or producer. NDN causes data traffic more efficient because the request will be served by the node that closest to the consumer who has the content in its Content Storage. In this research, the performance of NDN is tested based on changes in the size of Content Storage as one of the structures in NDN, and also the changes of frequency of interest. The contribution of this research is to study the effect of the content storage size and the number of frequency of interest on NDN performance, from the network point of view and user point of view. This research use Abilene network topology. The performance will be analyzed from average delay and cache hit ratio as the user centric metrics, and also the data circulation, number of interest message retransmission and packet drop as a network centric metrics. Simulation results show that the size of Content Storage greatly affects the efficiency of data transmission in the NDN network. The smaller the size of Content Storage relatively compared to the number of consumer demand, the greater the network load. Data circulation becomes larger, delay and packet drop increases, the number of packets retransmission increases and the cache hit ratio deteriorates. The provision of Content Storage of the optimum size makes the data transmission on the NDN network efficient. The higher number of frequency of interest, the worse the performance of the system.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"82 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Formal modeling for consistency checking of signal transition graph 信号转换图一致性检验的形式化建模
Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood
{"title":"Formal modeling for consistency checking of signal transition graph","authors":"Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood","doi":"10.1109/TSSA.2017.8272932","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272932","url":null,"abstract":"The behavior of asynchronous hardware system is crucial and practically assured using the formal verification techniques. A signal transition graph is one of the effective alternatives to represent the behavioral design of a huge asynchronous system. The design could be verified beforehand to assure several essential properties including its consistency property. In this paper, the formal modeling scheme of a signal transition graph is proposed along with the consistency property in term of the linear temporal formula. The target signal transition graph is written in Promela code and verified using SPIN model checker. The result shows that the method can verify consistency property automatically.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topic based IoT data storage framework for heterogeneous sensor data 异构传感器数据基于主题的物联网数据存储框架
Eko Sakti Pramukantoro, Widhi Yahya, Gabreil Arganata, A. Bhawiyuga, Achmad Basuki
{"title":"Topic based IoT data storage framework for heterogeneous sensor data","authors":"Eko Sakti Pramukantoro, Widhi Yahya, Gabreil Arganata, A. Bhawiyuga, Achmad Basuki","doi":"10.1109/TSSA.2017.8272895","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272895","url":null,"abstract":"Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Wideband monofilar helical antenna for wireless communication in remote area 用于偏远地区无线通信的宽带单线螺旋天线
M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir
{"title":"Wideband monofilar helical antenna for wireless communication in remote area","authors":"M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir","doi":"10.1109/TSSA.2017.8272935","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272935","url":null,"abstract":"This paper presents the wideband monofilar helical antenna which is aimed to increase low level signal reception commonly occurs in the remote area such as highlands, ridge, and borderlands. The use of helical antenna type is due to its ability in producing circularly polarized wave useful to support wireless communication frequently surrounded by some obstructions. The proposed antenna is expected to operate at wideband frequency range including cellular communication and connectable to the GSM modem associated with a laptop or PC device. The antenna is designed by using thin copper wire with spiral turn number of 8 and fed through a 50Ω female N-connector type. The proposed monofilar helical antenna is then realized based on the optimum design for experimental characterization. The measurement result shows that the realized antenna has working frequency from 1200 MHz to 2250 MHz and has the gain up to 14.5 dBi.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信