2015 1st International Conference on Wireless and Telematics (ICWT)最新文献

筛选
英文 中文
Artificial immune wireless intelligent sensor and actuator network (WISAN) for more electrical aircraft performance monitoring system (Study case: 80 passenger aircraft) 面向多电飞机性能监控系统的人工免疫无线智能传感器与执行器网络(WISAN)(研究案例:80架客机)
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449217
N. Hendrarini, Ema
{"title":"Artificial immune wireless intelligent sensor and actuator network (WISAN) for more electrical aircraft performance monitoring system (Study case: 80 passenger aircraft)","authors":"N. Hendrarini, Ema","doi":"10.1109/ICWT.2015.7449217","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449217","url":null,"abstract":"The issue of this paper is about computer development in the field of aviation. This is in accordance with the technological development of aircraft that shifted from manual to computer-based conditions. Many things can be learned about computerization in the aviation world especially associated with the control mechanism of the aircraft or aircraft communications system. The research related to control of aircraft by utilizing wireless technology and computers. This control technology embeds a special system on another system-computer based. Intelligent system is a system that is filed with artificial immune algorithm. This algorithm is expected to be known to prevent all potential failures. This control technology is intended to be implemented on electrical-based aircraft Redundancy became a matter of support in obtaining reliable and robust performance of system. Sensor system with the support of the microprocessor as a data processor becomes major system of this control system. Setup and configuration of sensors with certain consideration, good data communication systems and realtime applications become necessary to obtain the expected outcomes. Wireless data communication based on certain setting and proper topology is important thing to support the aircraft control system. System to be built also considers the existing standard computer on airplanes.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Frequency interference analysis between UMTS and CDMA 2000 in 2.1 GHz frequency band UMTS与CDMA 2000在2.1 GHz频段的频率干扰分析
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449206
Y. A. Siregar, Iskandar
{"title":"Frequency interference analysis between UMTS and CDMA 2000 in 2.1 GHz frequency band","authors":"Y. A. Siregar, Iskandar","doi":"10.1109/ICWT.2015.7449206","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449206","url":null,"abstract":"As a natural limited resources, the radio frequency spectrum should be managed and used as efficiently as possible. The Government as regulator has a responsibility to manage and regulate the spectrum to prevent interference. One example of the many problems in Indonesia that must be solved is the spectrum in 2.1 MHz frequency band for 3G services. The CDMA 2000 and UMTS system occupy adjacent band and that very potential to cause interference each other. The CDMA 2000 downlink channel which is separated by only 3.125 MHz guard band, have the potential to interfere the UMTS uplink channel. It is especially in the last channel with a center frequency of 1977.5 MHz. In this paper we evaluate an interference that occur between the two system by computer simulation and experimentally measurement. We propose three methods to cope with this problem, namely spectrum segmentation with sufficient separation band, geographical separation, and additional filters on the BTS. Antenna spatial isolation method is also used so that both systems can operate co-location in which the level of the interference is acceptable. With the arrangement of the antenna vertically by 1,1 meters separation, the additional attenuation of 15.2 dB can be obtained to reduce interference.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of radio telescope receiver based on GNU radio and USRP 基于GNU无线电和USRP的射电望远镜接收机的研制
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449244
Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir
{"title":"Development of radio telescope receiver based on GNU radio and USRP","authors":"Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir","doi":"10.1109/ICWT.2015.7449244","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449244","url":null,"abstract":"This paper presents the development of radio telescope receiver based on GNU radio and Universal Software Radio Peripheral (USRP). Usually an existing radio telescope receiver is only able to be used for fixed frequency and signal processing system; hence the other different frequency receiver needs to be carried out with different types of observation. Here, the development of radio telescope receiver includes the hardware system and the signal processing system. Then, the design of radio telescope receiver is developed based on GNU Radio and implemented by using USRP. From the result, it shows that the implemented radio telescope receiver which is applied for continuum observation can clearly detect signals at frequencies of 322MHz and 406MHz n which those frequencies are usually used in radio telescope.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adult image classifiers based on face detection using Viola-Jones method 基于Viola-Jones方法的人脸检测成人图像分类器
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449208
M. D. Putro, T. B. Adji, Bondhan Winduratna
{"title":"Adult image classifiers based on face detection using Viola-Jones method","authors":"M. D. Putro, T. B. Adji, Bondhan Winduratna","doi":"10.1109/ICWT.2015.7449208","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449208","url":null,"abstract":"This research consists of a classification system to determine the adult and benign image. Adult image in this research was defined as image that is perceived as pornographic by Indonesian people. The method in this research combines face detection and HS skin color detection on an image. Face detection is done by using the Viola-Jones method. After face detection process, skin detection is performed on the image. Based on the results of face and skin detections, a set of features is extracted and inserted into the classifier. The classification used in determining adult or benign image will be based on the percentage of face area in the image, the position of face in the image, and the percentage of the skin color in the image. For each feature, the threshold value is defined in this research. The results of the classifier is whether an input image is benign or adult images. From 30 sample images, the classification process classifies 5 pieces of images as benign images and 25 images as adult images. False positive rate are 2 images and false negative rate is 1 image with the accuracy of 90%.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Coverage simulation for WRAN base station network WRAN基站网络覆盖仿真
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449262
N. Faradina, Iskandar
{"title":"Coverage simulation for WRAN base station network","authors":"N. Faradina, Iskandar","doi":"10.1109/ICWT.2015.7449262","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449262","url":null,"abstract":"This paper tried to design the implementation of WRAN 802.22 as a new proposed and interesting standard to provide broadband service in tv white space (unused spectrum digital television), specially in hard to reach and low density population area. With the standard parameter WRAN that have been drafted, we calculate the total amount of site needed in Banten, one of the province in Indonesia. In this paper, we use frequency 650 MHz, 30 dB transmit power, 10 m receiver's height and 30 meter of transmitter height. By using okumura hata propagation, Banten needs 245 site to cover all the area.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Indonesian regulation management recommendation for Over-the-Top services 印尼对over - top服务的监管建议
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449236
Astari Nandhiasa, S. Haryadi
{"title":"Indonesian regulation management recommendation for Over-the-Top services","authors":"Astari Nandhiasa, S. Haryadi","doi":"10.1109/ICWT.2015.7449236","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449236","url":null,"abstract":"This paper derives Over-the-Top (OTT) regulation analysis. OTT services have gained popularity worldwide and started to replace conventional telecommunication services. The propositions in this paper are deemed necessary as the concepts to protect operators in Indonesia from the eroding revenues caused by OTT services without harming the user.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126313068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security requirements planning to anticipate the traffic flooding on the backbone network 安全需求规划,预测骨干网的流量泛滥
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449229
S. Haryadi, Jordia Ibrahim
{"title":"Security requirements planning to anticipate the traffic flooding on the backbone network","authors":"S. Haryadi, Jordia Ibrahim","doi":"10.1109/ICWT.2015.7449229","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449229","url":null,"abstract":"Along with the increased use of telecommunications networks for social media activities, the risk to information security increases, including the risk of flooding traffic. This paper studied the effect of flooding on the QoS traffic in the backbone network and needs to be met by security to face the traffic flooding. Security requirements required include: Centralized resource, identity management that supports Identity Recovery, Transaction Logging, Policy Management, mechanisms of basic security (authentication, confidentiality, etc.) minimization of data, and access control, monitoring system, secure Intranet, secure Internet and Extranet, and physical security.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133133632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed) 基于Opnet(河床)的IP电话应用(VoIP)中LLQ流量调度与FIFO和CBWFQ流量调度的比较分析
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449215
Rizal Broer Bahaweres, Ahmad Fauzi, M. Alaydrus
{"title":"Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed)","authors":"Rizal Broer Bahaweres, Ahmad Fauzi, M. Alaydrus","doi":"10.1109/ICWT.2015.7449215","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449215","url":null,"abstract":"Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitter and latency. And it require of different bandwidth which is also required some service guarantee. How to comparing queue mechanism of VoIP attributed to QoS?. In this case, we need to give guarantee of QoS relied on operation of data packages to be delivered along with its scheduling. Scheduling represent queue mechanism from an applying of network QoS's, that is an arrangement process of an exit and entry of assumed data packages queuing exceed CIR (Committed Information Rate) specified. Regulation of this data exit and entry can be formed with specified classification. This research compare queue method of First In First Out (FIFO) with two algorithm type of WFQ scheduling which at most used, that is Class Based Weighted Fair Queuing (CBWFQ) and Low Latency Queuing (LLQ). Based on delay, jitter, and MOS (Mean Opinion Score) obtained, LLQ give a better network performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blood provision and service application for people in manado using mobile web technology 利用移动网络技术为万鸦老提供血液和服务
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449216
Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto
{"title":"Blood provision and service application for people in manado using mobile web technology","authors":"Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto","doi":"10.1109/ICWT.2015.7449216","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449216","url":null,"abstract":"The development of technology is increasing rapidly. These developments have a huge impact on all areas, including The Health Field. Blood is one very important component in supporting the health of the human body. The lack of information about blood stock availability in hospitals and the Indonesian Red Cross (PMI) makes people often have difficulty in getting the blood they needs. Today many people are willing to donate blood to help people who in needs for blood, but time and cost became their main obstacle, because they need to find the nearest hospital or Indonesian PMI to do so. This application is built to be able to help people get information about existing blood stocks and provide media that can deliver information to people who want to donate their blood. This application is built using Hypertext Preprocessor programming language (PHP). The methodology use is Rapid Application Development (RAD) and using UML (Unified Modeling Language) as a modeling tool. The test result showed that this application is properly function and this application can assist the people in ordering the blood it needs and the people who wants to donate their blood without having to go to the nearby hospital or PMI.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical analysis on aggregate and flow based traffic features distribution 基于聚合流的交通特征分布统计分析
2015 1st International Conference on Wireless and Telematics (ICWT) Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449255
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
{"title":"Statistical analysis on aggregate and flow based traffic features distribution","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449255","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449255","url":null,"abstract":"Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis done in aggregate and per-flow traffic level which showed similarity and difference in each category. Windowing technic used to measure instantaneous statistical value. The result showed several statistical difference which could be used to categorized types of anomaly, especially to identify normal threshold. Flow to normal average flow distance distribution perform not followed Gaussian distribution.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信