{"title":"Artificial immune wireless intelligent sensor and actuator network (WISAN) for more electrical aircraft performance monitoring system (Study case: 80 passenger aircraft)","authors":"N. Hendrarini, Ema","doi":"10.1109/ICWT.2015.7449217","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449217","url":null,"abstract":"The issue of this paper is about computer development in the field of aviation. This is in accordance with the technological development of aircraft that shifted from manual to computer-based conditions. Many things can be learned about computerization in the aviation world especially associated with the control mechanism of the aircraft or aircraft communications system. The research related to control of aircraft by utilizing wireless technology and computers. This control technology embeds a special system on another system-computer based. Intelligent system is a system that is filed with artificial immune algorithm. This algorithm is expected to be known to prevent all potential failures. This control technology is intended to be implemented on electrical-based aircraft Redundancy became a matter of support in obtaining reliable and robust performance of system. Sensor system with the support of the microprocessor as a data processor becomes major system of this control system. Setup and configuration of sensors with certain consideration, good data communication systems and realtime applications become necessary to obtain the expected outcomes. Wireless data communication based on certain setting and proper topology is important thing to support the aircraft control system. System to be built also considers the existing standard computer on airplanes.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency interference analysis between UMTS and CDMA 2000 in 2.1 GHz frequency band","authors":"Y. A. Siregar, Iskandar","doi":"10.1109/ICWT.2015.7449206","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449206","url":null,"abstract":"As a natural limited resources, the radio frequency spectrum should be managed and used as efficiently as possible. The Government as regulator has a responsibility to manage and regulate the spectrum to prevent interference. One example of the many problems in Indonesia that must be solved is the spectrum in 2.1 MHz frequency band for 3G services. The CDMA 2000 and UMTS system occupy adjacent band and that very potential to cause interference each other. The CDMA 2000 downlink channel which is separated by only 3.125 MHz guard band, have the potential to interfere the UMTS uplink channel. It is especially in the last channel with a center frequency of 1977.5 MHz. In this paper we evaluate an interference that occur between the two system by computer simulation and experimentally measurement. We propose three methods to cope with this problem, namely spectrum segmentation with sufficient separation band, geographical separation, and additional filters on the BTS. Antenna spatial isolation method is also used so that both systems can operate co-location in which the level of the interference is acceptable. With the arrangement of the antenna vertically by 1,1 meters separation, the additional attenuation of 15.2 dB can be obtained to reduce interference.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129519075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir
{"title":"Development of radio telescope receiver based on GNU radio and USRP","authors":"Bramantyo Ibrahim Supriyatno, T. Hidayat, Andriyan Bayu Susksmono, A. Munir","doi":"10.1109/ICWT.2015.7449244","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449244","url":null,"abstract":"This paper presents the development of radio telescope receiver based on GNU radio and Universal Software Radio Peripheral (USRP). Usually an existing radio telescope receiver is only able to be used for fixed frequency and signal processing system; hence the other different frequency receiver needs to be carried out with different types of observation. Here, the development of radio telescope receiver includes the hardware system and the signal processing system. Then, the design of radio telescope receiver is developed based on GNU Radio and implemented by using USRP. From the result, it shows that the implemented radio telescope receiver which is applied for continuum observation can clearly detect signals at frequencies of 322MHz and 406MHz n which those frequencies are usually used in radio telescope.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adult image classifiers based on face detection using Viola-Jones method","authors":"M. D. Putro, T. B. Adji, Bondhan Winduratna","doi":"10.1109/ICWT.2015.7449208","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449208","url":null,"abstract":"This research consists of a classification system to determine the adult and benign image. Adult image in this research was defined as image that is perceived as pornographic by Indonesian people. The method in this research combines face detection and HS skin color detection on an image. Face detection is done by using the Viola-Jones method. After face detection process, skin detection is performed on the image. Based on the results of face and skin detections, a set of features is extracted and inserted into the classifier. The classification used in determining adult or benign image will be based on the percentage of face area in the image, the position of face in the image, and the percentage of the skin color in the image. For each feature, the threshold value is defined in this research. The results of the classifier is whether an input image is benign or adult images. From 30 sample images, the classification process classifies 5 pieces of images as benign images and 25 images as adult images. False positive rate are 2 images and false negative rate is 1 image with the accuracy of 90%.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130603867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coverage simulation for WRAN base station network","authors":"N. Faradina, Iskandar","doi":"10.1109/ICWT.2015.7449262","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449262","url":null,"abstract":"This paper tried to design the implementation of WRAN 802.22 as a new proposed and interesting standard to provide broadband service in tv white space (unused spectrum digital television), specially in hard to reach and low density population area. With the standard parameter WRAN that have been drafted, we calculate the total amount of site needed in Banten, one of the province in Indonesia. In this paper, we use frequency 650 MHz, 30 dB transmit power, 10 m receiver's height and 30 meter of transmitter height. By using okumura hata propagation, Banten needs 245 site to cover all the area.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122128597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indonesian regulation management recommendation for Over-the-Top services","authors":"Astari Nandhiasa, S. Haryadi","doi":"10.1109/ICWT.2015.7449236","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449236","url":null,"abstract":"This paper derives Over-the-Top (OTT) regulation analysis. OTT services have gained popularity worldwide and started to replace conventional telecommunication services. The propositions in this paper are deemed necessary as the concepts to protect operators in Indonesia from the eroding revenues caused by OTT services without harming the user.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126313068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security requirements planning to anticipate the traffic flooding on the backbone network","authors":"S. Haryadi, Jordia Ibrahim","doi":"10.1109/ICWT.2015.7449229","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449229","url":null,"abstract":"Along with the increased use of telecommunications networks for social media activities, the risk to information security increases, including the risk of flooding traffic. This paper studied the effect of flooding on the QoS traffic in the backbone network and needs to be met by security to face the traffic flooding. Security requirements required include: Centralized resource, identity management that supports Identity Recovery, Transaction Logging, Policy Management, mechanisms of basic security (authentication, confidentiality, etc.) minimization of data, and access control, monitoring system, secure Intranet, secure Internet and Extranet, and physical security.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133133632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative analysis of LLQ traffic scheduler to FIFO and CBWFQ on IP phone-based applications (VoIP) using Opnet (Riverbed)","authors":"Rizal Broer Bahaweres, Ahmad Fauzi, M. Alaydrus","doi":"10.1109/ICWT.2015.7449215","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449215","url":null,"abstract":"Nowadays, world is on going to “Convergence Era”, where data, voice, and video overcome to pass through same network, like IP network. Unfortunately, the fast growth of application technology has not been supported yet by default IP network in the case of quality of service. We have known, that voice over IP services have sensitivity to delay, jitter and latency. And it require of different bandwidth which is also required some service guarantee. How to comparing queue mechanism of VoIP attributed to QoS?. In this case, we need to give guarantee of QoS relied on operation of data packages to be delivered along with its scheduling. Scheduling represent queue mechanism from an applying of network QoS's, that is an arrangement process of an exit and entry of assumed data packages queuing exceed CIR (Committed Information Rate) specified. Regulation of this data exit and entry can be formed with specified classification. This research compare queue method of First In First Out (FIFO) with two algorithm type of WFQ scheduling which at most used, that is Class Based Weighted Fair Queuing (CBWFQ) and Low Latency Queuing (LLQ). Based on delay, jitter, and MOS (Mean Opinion Score) obtained, LLQ give a better network performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto
{"title":"Blood provision and service application for people in manado using mobile web technology","authors":"Cindy Rambitan, Ari Samadhi, A. Kewo, Thomas Suwanto","doi":"10.1109/ICWT.2015.7449216","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449216","url":null,"abstract":"The development of technology is increasing rapidly. These developments have a huge impact on all areas, including The Health Field. Blood is one very important component in supporting the health of the human body. The lack of information about blood stock availability in hospitals and the Indonesian Red Cross (PMI) makes people often have difficulty in getting the blood they needs. Today many people are willing to donate blood to help people who in needs for blood, but time and cost became their main obstacle, because they need to find the nearest hospital or Indonesian PMI to do so. This application is built to be able to help people get information about existing blood stocks and provide media that can deliver information to people who want to donate their blood. This application is built using Hypertext Preprocessor programming language (PHP). The methodology use is Rapid Application Development (RAD) and using UML (Unified Modeling Language) as a modeling tool. The test result showed that this application is properly function and this application can assist the people in ordering the blood it needs and the people who wants to donate their blood without having to go to the nearby hospital or PMI.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123175727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
{"title":"Statistical analysis on aggregate and flow based traffic features distribution","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449255","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449255","url":null,"abstract":"Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis done in aggregate and per-flow traffic level which showed similarity and difference in each category. Windowing technic used to measure instantaneous statistical value. The result showed several statistical difference which could be used to categorized types of anomaly, especially to identify normal threshold. Flow to normal average flow distance distribution perform not followed Gaussian distribution.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132529483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}