2015 1st International Conference on Wireless and Telematics (ICWT)最新文献

筛选
英文 中文
The design requirements for Libyan imaging mini-satellite (LibyaSat-1) 利比亚成像小型卫星(利比亚卫星1号)的设计要求
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449261
Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman
{"title":"The design requirements for Libyan imaging mini-satellite (LibyaSat-1)","authors":"Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman","doi":"10.1109/ICWT.2015.7449261","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449261","url":null,"abstract":"In this paper we present the conceptual design of Libyan remote sensing satellite (LibyaSat-1) and its sub-systems requirements. LibyaSat-1 is a 300 kg mini satellite, which will be used to support high resolution multi-spectral earth imaging camera to fulfill the civilian needs. This satellite will operate at LEO of 775 km and will provide a resolution of 2.5 m for the panchromatic band and 10 m for the VIS/NIR bands with 30 km swath. We have presented the mission overview, mission operation concept and mission requirements. Moreover, the System Tool Kit (STK) simulation is used to show the ground trucks of LibyaSat-1 for three days and to find the contact numbers between LibyaSat-1 and both Murezeq and Tripoli stations. We have also presented the design of telemetry and command subsystem, code and data handling subsystem, electrical power subsystem, altitude orbit control subsystem, and structure subsystem.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles 无线交通灯控制器对车辆远程无钥匙进入的干扰分析
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449214
Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus
{"title":"Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles","authors":"Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus","doi":"10.1109/ICWT.2015.7449214","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449214","url":null,"abstract":"This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433-434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario where the wireless traffic light and RKE for vehicles operate on frequency 434 MHz and 433.9 MHz respectively. Three time delays 0 s, 0.2 s and 0.5 s were considered during the simulations. The results show that time delay 0 s and 0.2 s cause a very high probability of interference. Whereas time delay setting of 0.5 s provide probability of interference about 2 % at distance 5 m.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing gamified-service towards user engagement and service quality improvement 设计游戏化服务以提高用户参与度和服务质量
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449241
Sarifah Putri Raflesia, K. Surendro
{"title":"Designing gamified-service towards user engagement and service quality improvement","authors":"Sarifah Putri Raflesia, K. Surendro","doi":"10.1109/ICWT.2015.7449241","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449241","url":null,"abstract":"Organizations find new challenge which is related to employees' engagement along service support implementation. Gamified-service is defined as service support which integrated Information Technology Infrastructure Library (ITIL) and gamification model. This integration enables fun, challenge, and reward to boost employees' motivation. Pressure in the workplace and employees' personal issues become main triggrer to decrease productivity. According to this reason, we need to add persuasive approach along implementation of ITIL best practices. This research focused on designing gamified-service prototype in order to help organization build game-like workplace environment We believe that gamified-service will help employees do their job with fun way.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Throughput evaluation in LTE-Advanced network access using carrier aggregation 基于载波聚合的LTE-Advanced网络接入的吞吐量评估
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449212
Iskandar, R. Galih
{"title":"Throughput evaluation in LTE-Advanced network access using carrier aggregation","authors":"Iskandar, R. Galih","doi":"10.1109/ICWT.2015.7449212","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449212","url":null,"abstract":"This paper proposes throughput evaluation for LTE-Advanced network access in the particular service area employing carrier aggregation (CA) technique. From several kind of CA, we evaluate which one the best CA configuration in term of network throughput. 30 MHz aggregated bandwidth and two component carrier (CC) serve as a primary serving cell (PCell) and secondary serving cell (SCell) are used in the simulation. Simulation results show that the configuration of wider PCell bandwidth resulting better performance of the throughput. In particular, in CA intra-band scenario, the throughput of non-contiguous CA has better performance compared with CA contiguous. Whereas in the inter-band CA scenario, CC combination with lower frequency resulting better throughput performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic 基于残差多项式拟合的基于时间的交通统计异常检测
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449256
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
{"title":"Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449256","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449256","url":null,"abstract":"Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile TV interactive in DVB-T broadcast network hybrid with WiFi 移动电视互动在DVB-T广播网络与WiFi混合
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449207
N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana
{"title":"Mobile TV interactive in DVB-T broadcast network hybrid with WiFi","authors":"N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana","doi":"10.1109/ICWT.2015.7449207","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449207","url":null,"abstract":"Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart phone interactively connected to DVB-T transmitter. As the first target we develop an android-based smart phone. We use DVB-T signal for downlink transmission and wifi for the uplink connection. This interactivity may include file sharing, polling, etc. using non-DVB enabler devices. Therefore the development of a system that can convert DVB signal into WiFi-IP based protocol signal is big challenge in this work.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAPR reduction by data subcarriers and null subcarriers switching 通过数据子载波和空子载波交换来降低PAPR
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449213
Arif Budiman, Sugihartono, D. Arseno
{"title":"PAPR reduction by data subcarriers and null subcarriers switching","authors":"Arif Budiman, Sugihartono, D. Arseno","doi":"10.1109/ICWT.2015.7449213","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449213","url":null,"abstract":"One of OFDM main problem is amount of PAPR (Peak Average Power Ratio). The magnitude of PAPR caused the summation of power by the wave in phase so that maximum power compared to average power becomes high. One method to reduce the amount of PAPR is switching null subcarrier with the data subcarrier. This method has advantages over other methods that do not damage the transmitted signal. BER is not increasing and does not require any side information to restore the signal to its original data. The problem in the switching method is the complexity of the system. In this paper will offered a method based on switching data subcarrier null subcarrier. The new method will provide lower complexity and the PAPR results lower than original OFDM but still higher than switching the data subcarrier null subcarrier method.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120819437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of white box switch on Software Defined Networking using open vSwitch 软件定义网络中使用open vSwitch的白盒交换机性能分析
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449257
Aditya Widya Manggala, Hendrawan, Adrie Tanwidjaja
{"title":"Performance analysis of white box switch on Software Defined Networking using open vSwitch","authors":"Aditya Widya Manggala, Hendrawan, Adrie Tanwidjaja","doi":"10.1109/ICWT.2015.7449257","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449257","url":null,"abstract":"Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput of some configuration were measured. The result is compared to conventional switch, which is Cisco Catalyst 2950. White Box Switch was created of a computer with 2.50 GHz processor and 32 GBytes memory. The result shows that performance of Cisco Catalyst 2950 is superior to white box switch because of its ASIC that allow it to forward data in hardware. Furthermore minimum specification of white box switch can be calculated, that is 1.225 GHz processor and 1 GBytes memory. To get the best performance, we can use single-board computer to be used as white box switch. Single-board computer contains all of its hardware in a single-board and it will give best performance of a computer.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography 使用LZW压缩、RSA加密和DCT隐写术的组合设计安全的数据
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449245
L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro
{"title":"Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography","authors":"L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro","doi":"10.1109/ICWT.2015.7449245","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449245","url":null,"abstract":"Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person addressed, another person will not be aware of the existence of the message. In this study the issues to be discussed is the technique of message encryption with RSA (Rivest Shamir Adleman) method. Messages are encrypted after compressed by LZW (Lempel Ziv Welch) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DCT (Discrete Cosine Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. For a 512×512 colored image there are 1536 characters enable for hiding. With LZW the amount of characters hiding will be about twice larger in this research.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network packet data online processing for intrusion detection system 网络数据包数据的在线处理,用于入侵检测系统
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449259
A. Jacobus, A. Sinsuw
{"title":"Network packet data online processing for intrusion detection system","authors":"A. Jacobus, A. Sinsuw","doi":"10.1109/ICWT.2015.7449259","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449259","url":null,"abstract":"The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信