Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063903
Hendra Noor Aditya, Rina Mardiati, L. Kamelia, Fajar Rohandy
In shipping, the damage is often caused by not maintaining balance when facing big waves or bad weather. It is necessary to apply a control system to certain objects. This study uses the PID control method to implement a control system on the ship's table. This method is expected to stabilize the table position with a set point angle of 0° on the x (roll) and y (pitch) axes. This balancing system uses the MPU-6050 sensor, Arduino UNO as a microcontroller, and two servo motors as actuators on each axis that maintain the table position at the set point. Mechanical design is needed to support the optimization of the system's performance. The implementation of the control parameter values from the manual tuning carried out obtained values on the x (roll) axis, namely Kp = 10, Ti= 0.192, and Td= 0.0487. The control parameter values on the y-axis (pitch) are Kp = 6, Ti= 0.392, and Td= 0.092. The test results showed the system could work stably, and the response on both axes was as desired. The response values obtained by the x and y axes are the overshoot percentages of 20.05% and 3.85%, the steady-state error is both 0%, the rise time is 0.55 and 0.35 seconds, and the settling time is 1, 06, and 0.74 seconds.
{"title":"Two-Axis Balancing System for Ship-Table Based on The Proportional Integral Derivative Controller (PID) Methods","authors":"Hendra Noor Aditya, Rina Mardiati, L. Kamelia, Fajar Rohandy","doi":"10.1109/TSSA56819.2022.10063903","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063903","url":null,"abstract":"In shipping, the damage is often caused by not maintaining balance when facing big waves or bad weather. It is necessary to apply a control system to certain objects. This study uses the PID control method to implement a control system on the ship's table. This method is expected to stabilize the table position with a set point angle of 0° on the x (roll) and y (pitch) axes. This balancing system uses the MPU-6050 sensor, Arduino UNO as a microcontroller, and two servo motors as actuators on each axis that maintain the table position at the set point. Mechanical design is needed to support the optimization of the system's performance. The implementation of the control parameter values from the manual tuning carried out obtained values on the x (roll) axis, namely Kp = 10, Ti= 0.192, and Td= 0.0487. The control parameter values on the y-axis (pitch) are Kp = 6, Ti= 0.392, and Td= 0.092. The test results showed the system could work stably, and the response on both axes was as desired. The response values obtained by the x and y axes are the overshoot percentages of 20.05% and 3.85%, the steady-state error is both 0%, the rise time is 0.55 and 0.35 seconds, and the settling time is 1, 06, and 0.74 seconds.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"1615 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116505148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063885
Sulhan Saharo, Eki Ahmad Zaki Hamidi, Rin Rin Nurmalasari
During the Covid-19 pandemic, there was an increase in the use of electrical energy on a household scale. This study developed a home-scale power monitoring system to monitor electrical power at a household scale. This research was conducted to facilitate access to home power monitoring via Android based on the Internet of Things using the Thinger.IO web browser and Telegram Messenger using the Bot feature. This power monitoring system develops using the ACS712 sensor as a current reader and the ZMPT101B as a voltage reader, using an ESP32 microcontroller with a WiFi module that can be connected online. The results of this study are that the accuracy of the ZMPT101B voltage sensor is excellent, with an accuracy value of 99.845%. The ACS712 current sensor has the highest difference value with a reference of 0.32 A and 0.04 A for the lowest difference value. The data logger system on Thinger.IO works well in recording data. The Bot Feature on the Telegram application can work well even though it has an average delay of up to 4.2 seconds, depending on the speed of the internet network.
{"title":"Power Monitoring System of Home-scale Internet of Things (IoT)","authors":"Sulhan Saharo, Eki Ahmad Zaki Hamidi, Rin Rin Nurmalasari","doi":"10.1109/TSSA56819.2022.10063885","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063885","url":null,"abstract":"During the Covid-19 pandemic, there was an increase in the use of electrical energy on a household scale. This study developed a home-scale power monitoring system to monitor electrical power at a household scale. This research was conducted to facilitate access to home power monitoring via Android based on the Internet of Things using the Thinger.IO web browser and Telegram Messenger using the Bot feature. This power monitoring system develops using the ACS712 sensor as a current reader and the ZMPT101B as a voltage reader, using an ESP32 microcontroller with a WiFi module that can be connected online. The results of this study are that the accuracy of the ZMPT101B voltage sensor is excellent, with an accuracy value of 99.845%. The ACS712 current sensor has the highest difference value with a reference of 0.32 A and 0.04 A for the lowest difference value. The data logger system on Thinger.IO works well in recording data. The Bot Feature on the Telegram application can work well even though it has an average delay of up to 4.2 seconds, depending on the speed of the internet network.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121852846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063909
Izuardo Zulkarnain, Rin Rin Nurmalasari, F. N. Azizah
Generally, the extraction of information in the table is done quickly if the table is within a document with a tabular structure. However, in the case of tables presented in the image document, steps are needed first to detect the table. Seeing a table in image documents becomes more complicated if the table to be seen does not have clear boundaries. This research focuses on extracting information from borderless tables in image documents. The study applies the Mask RCNN-FPN deep learning model to detect borderless tables using augmentation data. The use of data augmentation is expected to increase the accuracy of deep learning models even though there is only a small amount of training data available. The data augmentation technique proposed in this study is a fine-tuning method with CutMask augmentation data. For model formation and testing, this study uses the UNLV data set. This data set consists of scanned images of documents from various sources, including financial reports, journals, and different tabular research papers. The total amount of data used is 427 samples. After data augmentation, the amount of data used is 854 samples. The table detection model is based on the Mask RCNN created using Python. The testing parameters used for table detection quality are precise detection, partial detection, false detection, Precision, Recall, and F-Measure. The table's structure recognition rate is measured from the detection intersection value, rows, columns, and cells compared to ground truth. The test results show that using data augmentation with the CutMask technique can improve the performance of deep learning models to detect borderless tables. The use of image processing is shown to enhance table segmentation. However, the table structure recognition result does not offer a good result compared to the effects of other research.
{"title":"Table Information Extraction Using Data Augmentation on Deep Learning and Image Processing","authors":"Izuardo Zulkarnain, Rin Rin Nurmalasari, F. N. Azizah","doi":"10.1109/TSSA56819.2022.10063909","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063909","url":null,"abstract":"Generally, the extraction of information in the table is done quickly if the table is within a document with a tabular structure. However, in the case of tables presented in the image document, steps are needed first to detect the table. Seeing a table in image documents becomes more complicated if the table to be seen does not have clear boundaries. This research focuses on extracting information from borderless tables in image documents. The study applies the Mask RCNN-FPN deep learning model to detect borderless tables using augmentation data. The use of data augmentation is expected to increase the accuracy of deep learning models even though there is only a small amount of training data available. The data augmentation technique proposed in this study is a fine-tuning method with CutMask augmentation data. For model formation and testing, this study uses the UNLV data set. This data set consists of scanned images of documents from various sources, including financial reports, journals, and different tabular research papers. The total amount of data used is 427 samples. After data augmentation, the amount of data used is 854 samples. The table detection model is based on the Mask RCNN created using Python. The testing parameters used for table detection quality are precise detection, partial detection, false detection, Precision, Recall, and F-Measure. The table's structure recognition rate is measured from the detection intersection value, rows, columns, and cells compared to ground truth. The test results show that using data augmentation with the CutMask technique can improve the performance of deep learning models to detect borderless tables. The use of image processing is shown to enhance table segmentation. However, the table structure recognition result does not offer a good result compared to the effects of other research.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"77 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132193098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063878
Putra Wisnu Agung Sucipto, K. Yaqin, M. A. Bakri, S. Supratno, Annisa Firasanti, Eki Ahmad Zaki Hamidi
Due to its unique characteristics, the heart rate of Oryzias Celebensis can play an important role in the observation of the health of the aquatic environment. Unfortunately, due to its tiny size, the process of scanning the heart rate of these fish fry requires sophisticated device engineering. The purpose of this study is to extract cardiac signal characteristics of Oryzias Celebensis seeds based on statistical and spectral aspects. We performed the extraction of statistical and spectral characteristics of heart rate using five statistical formulas namely mean, variance, standard deviation, skewness and kurtosis. As for spectral characteristic, we analyze the magnitude value of the discrete Fourier transformation from the color intensity that appear in the video view. The results of this study showed that statistical characteristic has much better result with 50% accuracy of pulse calculations while spectral characteristic that use fourier transformation only shows 0.2% accuracy.
{"title":"Statistical and Spectral Feature Extraction of Oryzias Celebensis Heart Rate","authors":"Putra Wisnu Agung Sucipto, K. Yaqin, M. A. Bakri, S. Supratno, Annisa Firasanti, Eki Ahmad Zaki Hamidi","doi":"10.1109/TSSA56819.2022.10063878","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063878","url":null,"abstract":"Due to its unique characteristics, the heart rate of Oryzias Celebensis can play an important role in the observation of the health of the aquatic environment. Unfortunately, due to its tiny size, the process of scanning the heart rate of these fish fry requires sophisticated device engineering. The purpose of this study is to extract cardiac signal characteristics of Oryzias Celebensis seeds based on statistical and spectral aspects. We performed the extraction of statistical and spectral characteristics of heart rate using five statistical formulas namely mean, variance, standard deviation, skewness and kurtosis. As for spectral characteristic, we analyze the magnitude value of the discrete Fourier transformation from the color intensity that appear in the video view. The results of this study showed that statistical characteristic has much better result with 50% accuracy of pulse calculations while spectral characteristic that use fourier transformation only shows 0.2% accuracy.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115719762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many calibration companies still use the gravimetric method in the totalizer and flowrate calibration processes for flowmeters, so the results obtained cannot be maximized considering that there are many factors that become limitations when using the gravimetric method, one of which is the height of the tank which has a significant effect on water velocity, requiring space. Wide area, the installation path used is not flexible, the flow rate for flowrate calibration is limited, and it also requires a large number of flow media, oil, water, diesel, and others. This paper discusses the design of a fluid flow regulation machine that functions for flowmeter calibration media that focuses on flowrate or flow velocity using PLC (Programmable Logic Controller) based automation. The calibration method used is a comparison method between a standard flowmeter and a UUT (unit under test) flowmeter. The flow rate that can be produced by this system is 150 liters per minute, but to prevent overload on the standard flowmeter, a threshold of 10% is made below the system capacity of 135 liters per minute. This PLC (Programmable Logic Controller) based discharge control machine has a stability value of 0.236 liters/minute.
{"title":"A PLC-based Flowmeter Calibration Using PID Metode","authors":"Cecep Deni Mulyadi, Ali Waliyullah Muwaffaq, Ivany Sarief, Dody Kusama, Wisnu Wijaya, Hanhan Hanafiah Solihin","doi":"10.1109/TSSA56819.2022.10063874","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063874","url":null,"abstract":"Many calibration companies still use the gravimetric method in the totalizer and flowrate calibration processes for flowmeters, so the results obtained cannot be maximized considering that there are many factors that become limitations when using the gravimetric method, one of which is the height of the tank which has a significant effect on water velocity, requiring space. Wide area, the installation path used is not flexible, the flow rate for flowrate calibration is limited, and it also requires a large number of flow media, oil, water, diesel, and others. This paper discusses the design of a fluid flow regulation machine that functions for flowmeter calibration media that focuses on flowrate or flow velocity using PLC (Programmable Logic Controller) based automation. The calibration method used is a comparison method between a standard flowmeter and a UUT (unit under test) flowmeter. The flow rate that can be produced by this system is 150 liters per minute, but to prevent overload on the standard flowmeter, a threshold of 10% is made below the system capacity of 135 liters per minute. This PLC (Programmable Logic Controller) based discharge control machine has a stability value of 0.236 liters/minute.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129902836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063905
Ayu Rosyida Zain, Maria Agustin, P. Oktivasari, Nur Fauzi Soelaiman, Muhammad Fatih Fahroji
Indonesia has two seasons, namely the dry season and the rainy season. Floods occupy the first position in the sequence of natural disasters with a total of 1,067 floods in Indonesia. The flood caused a lot of losses for the community, this is because the garbage that has accumulated in the waterways makes it difficult for the water to flow and when it rains enough it can cause the canal to be unable to accommodate a lot of water so it overflows onto the road and causes floods to occur. From this condition, a system is needed that aims to monitor the height and turbidity of the water. This research will be designed using NodeMCU as a microcontroller and communication with android applications via the internet. The method used is a literature study by collecting data related to the problem, analyzing needs for research, designing tools, testing, analyzing systems and documentation, and compiling research reports. The results of this study are a prototype tool that is used as a monitoring system for water level and turbidity using an android application as an early flood warning.
{"title":"Design of Monitoring System for Water Levels and Turbidity Water Canals Based on Nodemcu","authors":"Ayu Rosyida Zain, Maria Agustin, P. Oktivasari, Nur Fauzi Soelaiman, Muhammad Fatih Fahroji","doi":"10.1109/TSSA56819.2022.10063905","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063905","url":null,"abstract":"Indonesia has two seasons, namely the dry season and the rainy season. Floods occupy the first position in the sequence of natural disasters with a total of 1,067 floods in Indonesia. The flood caused a lot of losses for the community, this is because the garbage that has accumulated in the waterways makes it difficult for the water to flow and when it rains enough it can cause the canal to be unable to accommodate a lot of water so it overflows onto the road and causes floods to occur. From this condition, a system is needed that aims to monitor the height and turbidity of the water. This research will be designed using NodeMCU as a microcontroller and communication with android applications via the internet. The method used is a literature study by collecting data related to the problem, analyzing needs for research, designing tools, testing, analyzing systems and documentation, and compiling research reports. The results of this study are a prototype tool that is used as a monitoring system for water level and turbidity using an android application as an early flood warning.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132776930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/tssa56819.2022.10063898
{"title":"Proceeding of 2022 The 16th International Conference on Telecommunication Systems Services and Applications (TSSA2022)","authors":"","doi":"10.1109/tssa56819.2022.10063898","DOIUrl":"https://doi.org/10.1109/tssa56819.2022.10063898","url":null,"abstract":"","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127920533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063897
Via Nabila Hidayati, Iskandar, Adam Baihaqi Satriobudi
Air is an element that is inextricably linked to human life. Air pollution is not a new issue in Indonesia. In 2016, 80 percent of Indonesia's 256 million people lived in locations with annual average levels of particle pollution above WHO recommendations [1]. According to WHO, 90 percent of the world's population has inhaled polluted air, which kills seven million people each year [2]. With this knowledge, it is clear that air pollution is a problem with serious consequences for human health. Technological advancements can help decrease the risk of this issue. One of them is by developing a tool that can monitor air quality using the LoRa IoT communication protocol. This tool will utilize several air sensors, including the PMS5003 and MQ-131, which can detect the concentration of dangerous gases and particulates. In addition, the DHT-22 and KY-021 sensors can read temperature, humidity, and detect fire. The data of this reading will be saved in a database on the cloud server. This data will then be analyzed using ISPU standardization to provide an air quality index value, or AQI, which will be displayed on a web dashboard. The public can use this dashboard to learn about the surrounding air and what health recommendations can be done.
{"title":"Web Dashboard Development for Cloud Server-Based Air Quality Monitoring System","authors":"Via Nabila Hidayati, Iskandar, Adam Baihaqi Satriobudi","doi":"10.1109/TSSA56819.2022.10063897","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063897","url":null,"abstract":"Air is an element that is inextricably linked to human life. Air pollution is not a new issue in Indonesia. In 2016, 80 percent of Indonesia's 256 million people lived in locations with annual average levels of particle pollution above WHO recommendations [1]. According to WHO, 90 percent of the world's population has inhaled polluted air, which kills seven million people each year [2]. With this knowledge, it is clear that air pollution is a problem with serious consequences for human health. Technological advancements can help decrease the risk of this issue. One of them is by developing a tool that can monitor air quality using the LoRa IoT communication protocol. This tool will utilize several air sensors, including the PMS5003 and MQ-131, which can detect the concentration of dangerous gases and particulates. In addition, the DHT-22 and KY-021 sensors can read temperature, humidity, and detect fire. The data of this reading will be saved in a database on the cloud server. This data will then be analyzed using ISPU standardization to provide an air quality index value, or AQI, which will be displayed on a web dashboard. The public can use this dashboard to learn about the surrounding air and what health recommendations can be done.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"95 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063887
Hasan Nur Arifin, N. Syambas, Jupriyadi, Adi Sucipto, Eki Ahmad Zaki Hamidi
Today's data communication needs have shifted from client-server data communication to peer-to-peer. The user's focus is currently on the immediately requested data or the so-called Named Data Network (NDN). Changes to the nature of the app, user needs, and usage patterns have changed significantly, and apps on networks like YouTube, Facebook, and other social networks have revolutionized the idea of user- generated content. One of the problems in the network is network congestion or network failure. Network congestion occurs due to the need for network resources exceeding the capacity of network resources. When network congestion occurs, the NDN forwarding mechanism facilitated by FIB on the IP router cannot detect the congestion condition and will still use the same path. At the same time, the NDN router can detect congestion conditions and react by using alternative paths. The simulation results show that on the NDN router, the forwarding mechanism can maximize the use of link bandwidth faster than the forwarding mechanism on the router-based IP network. In the topology designed, NDN can achieve maximum bandwidth in the 3rd second compared to IP in the 5th second.
{"title":"Comparative Analysis of Network Congestion on IP and Named Data Network","authors":"Hasan Nur Arifin, N. Syambas, Jupriyadi, Adi Sucipto, Eki Ahmad Zaki Hamidi","doi":"10.1109/TSSA56819.2022.10063887","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063887","url":null,"abstract":"Today's data communication needs have shifted from client-server data communication to peer-to-peer. The user's focus is currently on the immediately requested data or the so-called Named Data Network (NDN). Changes to the nature of the app, user needs, and usage patterns have changed significantly, and apps on networks like YouTube, Facebook, and other social networks have revolutionized the idea of user- generated content. One of the problems in the network is network congestion or network failure. Network congestion occurs due to the need for network resources exceeding the capacity of network resources. When network congestion occurs, the NDN forwarding mechanism facilitated by FIB on the IP router cannot detect the congestion condition and will still use the same path. At the same time, the NDN router can detect congestion conditions and react by using alternative paths. The simulation results show that on the NDN router, the forwarding mechanism can maximize the use of link bandwidth faster than the forwarding mechanism on the router-based IP network. In the topology designed, NDN can achieve maximum bandwidth in the 3rd second compared to IP in the 5th second.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121051003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063890
Rangga Satria Perdana, Asep Effendy, Hendra Garnida, Abdul Fidayan, Femmy Nazar, Didin Saepudin
Security audit and risk management can be done using standard framework. NIST is one of the framework which usually used to identify the security and risks on information system. The assessment is done to the security and risk in academic information system at Univeristas Sangga Buana (USB) Bandung that it is expected to minimize the risks occurs to the academic information system. The result of security audit on academic information system with NIST SP 800–26 framework shows the security on the system has the whole score as big as 72.43%. the score is obtained from the calculation of 3 categories tested namely Management Control, Operational Control, and Technical Control. Based on the data, the security of information system in USB belongs to level 3, Implemented Procedures and Controls. Risk management is done using some stages on NIST SP 800–30, with the help of Acunetix Scanning Application. Based on the result of scanning using Acunetix, academic information system at USB has 600 pieces of vulnerabilities. These vulnerabilities divided into 4 levels of vulnerability, namely 4 pieces of high level of vulnerabilities, 40 pieces of medium level of vulnerabilities, 13 pieces of low level of vulnerabilities, and 543 pieces of informational vulnerabilities
{"title":"Security and Risk Assessment of Academic Information System By Using NIST Framework (A Case Study Approach)","authors":"Rangga Satria Perdana, Asep Effendy, Hendra Garnida, Abdul Fidayan, Femmy Nazar, Didin Saepudin","doi":"10.1109/TSSA56819.2022.10063890","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063890","url":null,"abstract":"Security audit and risk management can be done using standard framework. NIST is one of the framework which usually used to identify the security and risks on information system. The assessment is done to the security and risk in academic information system at Univeristas Sangga Buana (USB) Bandung that it is expected to minimize the risks occurs to the academic information system. The result of security audit on academic information system with NIST SP 800–26 framework shows the security on the system has the whole score as big as 72.43%. the score is obtained from the calculation of 3 categories tested namely Management Control, Operational Control, and Technical Control. Based on the data, the security of information system in USB belongs to level 3, Implemented Procedures and Controls. Risk management is done using some stages on NIST SP 800–30, with the help of Acunetix Scanning Application. Based on the result of scanning using Acunetix, academic information system at USB has 600 pieces of vulnerabilities. These vulnerabilities divided into 4 levels of vulnerability, namely 4 pieces of high level of vulnerabilities, 40 pieces of medium level of vulnerabilities, 13 pieces of low level of vulnerabilities, and 543 pieces of informational vulnerabilities","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}