Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063916
Dwi Harinitha, I. Zakia, Iskandar, A. Kurniawan
Telecommunication services globally use two communication systems: terrestrial and satellite, but they still have weaknesses that must be addressed immediately. An alternative is High Altitude Platform Station (HAPS), which was studied extensively in the 1990s and 2000s, and is now returning to public attention. In this study, we firstly determine the optimal HAPS position assuming equal power allocation to each User Equipment (UE) in order to maximize the downlink Sum Rate given a backhaul link constraint and minimum data rate of each UE. HAPS operates at the 28 GHz millimeter-wave band with an altitude of 20 km. The antenna configuration is Uniform Planar Array (UPA) with varying number of elements. The number of UE is fixed but randomly distributed in an area of 100x100 km2. The area is divided into 100 equal-sized grids, from which the HAPS location will be varied for optimization purpose. The simulation results indicate that the optimal location is grid number 29 when the antenna element is 16x16. Increasing the antenna element to 128x128 results in higher data rate for each UE. After determining the optimal HAPS location, power allocation for each UE is carried out to fulfill the backhaul link constraint. From several power combinations for each UE, the combination that has the minimum total power is taken. Thus, as the array elements increase, the total minimum power will decrease.
{"title":"Effect of Different Locations of Millimeter Wave HAPS on the Downlink Sum Rate","authors":"Dwi Harinitha, I. Zakia, Iskandar, A. Kurniawan","doi":"10.1109/TSSA56819.2022.10063916","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063916","url":null,"abstract":"Telecommunication services globally use two communication systems: terrestrial and satellite, but they still have weaknesses that must be addressed immediately. An alternative is High Altitude Platform Station (HAPS), which was studied extensively in the 1990s and 2000s, and is now returning to public attention. In this study, we firstly determine the optimal HAPS position assuming equal power allocation to each User Equipment (UE) in order to maximize the downlink Sum Rate given a backhaul link constraint and minimum data rate of each UE. HAPS operates at the 28 GHz millimeter-wave band with an altitude of 20 km. The antenna configuration is Uniform Planar Array (UPA) with varying number of elements. The number of UE is fixed but randomly distributed in an area of 100x100 km2. The area is divided into 100 equal-sized grids, from which the HAPS location will be varied for optimization purpose. The simulation results indicate that the optimal location is grid number 29 when the antenna element is 16x16. Increasing the antenna element to 128x128 results in higher data rate for each UE. After determining the optimal HAPS location, power allocation for each UE is carried out to fulfill the backhaul link constraint. From several power combinations for each UE, the combination that has the minimum total power is taken. Thus, as the array elements increase, the total minimum power will decrease.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"327 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063917
Amran Paso Salmeno, Iskandar
In multi-layer LTE configuration, LTE 900 MHz band placed as the outer layer due to its large coverage and small bandwidth available. This layering configuration makes the LTE 900 MHz coverage only focused for the cell-edge users (CEU) while the cell-center users (CCU) are served by other inner layer bands. Consequently, the LTE 900 MHz users suffer from inter-cell interferences (ICI) more than user in other bands. This paper presents a performance comparison of three different frequency reuse schemes for mitigating ICI, namely Strict Fractional Frequency Reuse (strict FFR), Soft Fractional Frequency Reuse (soft FFR), and Hard Frequency Reuse with reuse factor of 3. The performances evaluated using average user throughput and average Signal to Interference and Noise Ratio (SINR) for users in the cell edge. The simulation results show that the Hard Frequency Reuse Scheme provides the highest performance, particularly for outer layer in multi-layer LTE configuration.
{"title":"Performance of Some Frequency Reuse Schemes on LTE 900 MHz for Cell-Edge Users in Multi-Layer LTE","authors":"Amran Paso Salmeno, Iskandar","doi":"10.1109/TSSA56819.2022.10063917","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063917","url":null,"abstract":"In multi-layer LTE configuration, LTE 900 MHz band placed as the outer layer due to its large coverage and small bandwidth available. This layering configuration makes the LTE 900 MHz coverage only focused for the cell-edge users (CEU) while the cell-center users (CCU) are served by other inner layer bands. Consequently, the LTE 900 MHz users suffer from inter-cell interferences (ICI) more than user in other bands. This paper presents a performance comparison of three different frequency reuse schemes for mitigating ICI, namely Strict Fractional Frequency Reuse (strict FFR), Soft Fractional Frequency Reuse (soft FFR), and Hard Frequency Reuse with reuse factor of 3. The performances evaluated using average user throughput and average Signal to Interference and Noise Ratio (SINR) for users in the cell edge. The simulation results show that the Hard Frequency Reuse Scheme provides the highest performance, particularly for outer layer in multi-layer LTE configuration.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115129725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063868
Agil Fuad Gumelar, Nadifa Rose Rachmawati, Nathan Tenka, Vieri Fajar Firdaus, Mochammad Faiq Al-Harits, Sulthon Furqandhani Araska, N. Syambas
An Unmanned Aerial Vehicle (UAV) is operated remotely using a Ground Control Station (GCS). Conventional GCS usually has limited range for it to be able to control and monitor the UAV due to limitations of the telemetry module. GCS capable of limitless range of connectivity with UAV will give a lot of advantage and unlock more potential of UAVs. This paper proposes the idea of implementing a web server as an intermediate communication component between UAV and GCS to realize the idea of unlimited range UAV control and monitoring. The web server is developed in Node.js environment with the help of Hapi Js framework. In addition, this paper also proposes the implementation of IoT device as an antenna tracker to improve the range of UA V telemetry modules and at the same time provide the connection to a web server on the internet. For this implementation, Raspberry Pi is chosen as an IoT device due to its capabilities and powerful specification. This system configuration will provide stable, wide range, and remote connectivity between UAV and GCS.
{"title":"Design and Implementation of UAV Remote Control and Monitoring in Cloud Infrastructure for IoT Services","authors":"Agil Fuad Gumelar, Nadifa Rose Rachmawati, Nathan Tenka, Vieri Fajar Firdaus, Mochammad Faiq Al-Harits, Sulthon Furqandhani Araska, N. Syambas","doi":"10.1109/TSSA56819.2022.10063868","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063868","url":null,"abstract":"An Unmanned Aerial Vehicle (UAV) is operated remotely using a Ground Control Station (GCS). Conventional GCS usually has limited range for it to be able to control and monitor the UAV due to limitations of the telemetry module. GCS capable of limitless range of connectivity with UAV will give a lot of advantage and unlock more potential of UAVs. This paper proposes the idea of implementing a web server as an intermediate communication component between UAV and GCS to realize the idea of unlimited range UAV control and monitoring. The web server is developed in Node.js environment with the help of Hapi Js framework. In addition, this paper also proposes the implementation of IoT device as an antenna tracker to improve the range of UA V telemetry modules and at the same time provide the connection to a web server on the internet. For this implementation, Raspberry Pi is chosen as an IoT device due to its capabilities and powerful specification. This system configuration will provide stable, wide range, and remote connectivity between UAV and GCS.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129013511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063919
L. Puspitawati, Hanhan Hanafiah Solihin, Sukadwilinda, I. Syarief, D. Kusmana, Cecep Deni Mulyadi
This study aims to examine the suitability of the conceptual model regarding the effect of business strategy, user competence, organizational structure on the Effectiveness of Management Accounting Software (MAS), and how the influence between the variables studied during the Covid 19 Pandemic took place. Quantitative methods are used to test the suitability of the proposed model and to determine the predicted effect between the variables studied. The data were tested using Covarian Base Structural Equation Model (CB-SEM) with Lisrell 8.5 software. This study uses primary data collected through questionnaires to a population of 118 State-Owned Enterprises (SOEs) Management Accounting departments in Indonesia, with a selected sample size of 100 SOEs, which were selected using a simple random technique. The results of this study succeeded in confirming the conceptual model developed by the researcher and empirically proving the influence of business strategy on MAS Effectiveness, user competence on MAS Effectiveness and organizational structure on MAS Effectiveness in Indonesian SOEs companies. The effectiveness of MAS depends on the relevance of the needs of its users. The right business strategy, effectively provides relevant information for the company to design MAIS according to user needs, so that the company's operational activities run effectively and efficiently, the company is able to implement a Cost Reduction Strategy through production cost savings, production process accuracy, implementing product differentiation and low pricing strategy with a focus on customer needs during the Covid-19 pandemic. The results of this study contribute to producing strategic management accounting information to anticipate business continuity during and after the Covid 19 Pandemic and to help overcome the crisis due to the Covid 19 pandemic in the early stages of the Covid 19 Pandemic by optimizing business strategy, organizational structure, and company HR competencies.
{"title":"Factors That Affect the Effectiveness of Management Accounting Software","authors":"L. Puspitawati, Hanhan Hanafiah Solihin, Sukadwilinda, I. Syarief, D. Kusmana, Cecep Deni Mulyadi","doi":"10.1109/TSSA56819.2022.10063919","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063919","url":null,"abstract":"This study aims to examine the suitability of the conceptual model regarding the effect of business strategy, user competence, organizational structure on the Effectiveness of Management Accounting Software (MAS), and how the influence between the variables studied during the Covid 19 Pandemic took place. Quantitative methods are used to test the suitability of the proposed model and to determine the predicted effect between the variables studied. The data were tested using Covarian Base Structural Equation Model (CB-SEM) with Lisrell 8.5 software. This study uses primary data collected through questionnaires to a population of 118 State-Owned Enterprises (SOEs) Management Accounting departments in Indonesia, with a selected sample size of 100 SOEs, which were selected using a simple random technique. The results of this study succeeded in confirming the conceptual model developed by the researcher and empirically proving the influence of business strategy on MAS Effectiveness, user competence on MAS Effectiveness and organizational structure on MAS Effectiveness in Indonesian SOEs companies. The effectiveness of MAS depends on the relevance of the needs of its users. The right business strategy, effectively provides relevant information for the company to design MAIS according to user needs, so that the company's operational activities run effectively and efficiently, the company is able to implement a Cost Reduction Strategy through production cost savings, production process accuracy, implementing product differentiation and low pricing strategy with a focus on customer needs during the Covid-19 pandemic. The results of this study contribute to producing strategic management accounting information to anticipate business continuity during and after the Covid 19 Pandemic and to help overcome the crisis due to the Covid 19 pandemic in the early stages of the Covid 19 Pandemic by optimizing business strategy, organizational structure, and company HR competencies.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130147040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063930
Teguh Nurhadi Suharsono, H.R. Ricky Agusiady, Rini Nuraini Sukmana, Gunawan, Wahyudi, R. R. Avianty
Elections conducted with the system are the most effective and efficient steps compared to conventional voting. However, in this case, the low level of trust between voters and candidates in the E- Voting system, such as voters being unable to verify their choices to ensure the choices have been recorded and counted correctly and the low level of confidence of candidates in the validity of voters involved in the voting process so that they prefer conventional selection. The verifiability factor is one aspect that affects the confidence level of voters and candidates in the results and processes of the electronic voting system. Individual and eligibility verifiability for voters for the verification mechanism in the E- Voting system is an E- Voting system created to be able to verify voter choices. and verification of voters to increase confidence from both the voter's and candidate's point of view of the E- Voting system.
{"title":"Individual And Eligibility Verifiability Method For Verification Mechanism of Voter On E-Voting System","authors":"Teguh Nurhadi Suharsono, H.R. Ricky Agusiady, Rini Nuraini Sukmana, Gunawan, Wahyudi, R. R. Avianty","doi":"10.1109/TSSA56819.2022.10063930","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063930","url":null,"abstract":"Elections conducted with the system are the most effective and efficient steps compared to conventional voting. However, in this case, the low level of trust between voters and candidates in the E- Voting system, such as voters being unable to verify their choices to ensure the choices have been recorded and counted correctly and the low level of confidence of candidates in the validity of voters involved in the voting process so that they prefer conventional selection. The verifiability factor is one aspect that affects the confidence level of voters and candidates in the results and processes of the electronic voting system. Individual and eligibility verifiability for voters for the verification mechanism in the E- Voting system is an E- Voting system created to be able to verify voter choices. and verification of voters to increase confidence from both the voter's and candidate's point of view of the E- Voting system.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"155 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063918
Hardy Purnama Nurba, D. Hadian, Nina Lestari, Ketut Abimanyu Munastha, Hartuti Mistialustina, Eva Rachmawati
This paper presents the implementation of the forward kinematics Denavit-Hartenberg method on a 3 DOF arm robot which is implemented on a coffee maker. This system imitates human movement which works as a regulator of the movement direction of the robotic arm joints. Degree of Freedom (DOF) is set to support the movement method of the manipulator robot. In the process of making coffee, a robotic arm requires a minimum of 3 to 4 joints (3 to 4-DOF) to do the job of imitating a human arm. The forward kinematics method uses kinematic equations to determine the joints of the robot so that the final coordinates of its movement can be determined. The Denavit-Hartenberg method is implemented on 4 variables that become parameters for analyzing the forward kinematics robot movement. These four parameters are used in matrix transformation to determine the relationship between matrices which represents the position and orientation of one body to another. Overall, the results of repeatability testing in moving coffee cups with a deviation standard value for the x-coordinate is 0.060, for the y-coordinate is 0.020 and for the z-coordinate is 0.000. In accordance with the deviation standard theory that smaller deviation standard value, better the repeatability.
{"title":"Performance Evaluation of 3 DOF Arm Robot With Forward Kinematics Denavit-Hartenberg Method For Coffee Maker Machine","authors":"Hardy Purnama Nurba, D. Hadian, Nina Lestari, Ketut Abimanyu Munastha, Hartuti Mistialustina, Eva Rachmawati","doi":"10.1109/TSSA56819.2022.10063918","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063918","url":null,"abstract":"This paper presents the implementation of the forward kinematics Denavit-Hartenberg method on a 3 DOF arm robot which is implemented on a coffee maker. This system imitates human movement which works as a regulator of the movement direction of the robotic arm joints. Degree of Freedom (DOF) is set to support the movement method of the manipulator robot. In the process of making coffee, a robotic arm requires a minimum of 3 to 4 joints (3 to 4-DOF) to do the job of imitating a human arm. The forward kinematics method uses kinematic equations to determine the joints of the robot so that the final coordinates of its movement can be determined. The Denavit-Hartenberg method is implemented on 4 variables that become parameters for analyzing the forward kinematics robot movement. These four parameters are used in matrix transformation to determine the relationship between matrices which represents the position and orientation of one body to another. Overall, the results of repeatability testing in moving coffee cups with a deviation standard value for the x-coordinate is 0.060, for the y-coordinate is 0.020 and for the z-coordinate is 0.000. In accordance with the deviation standard theory that smaller deviation standard value, better the repeatability.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116251831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063876
Doni Pradana Wira Ambara Arifin, Rina Mardiati, M. R. Effendi, N. Sartika
The need for water is increasing daily along with the increasing population in an area. One of the reasons for increasing water demand is boarding houses. The water consumption limit for luxury boarding houses is 123.45 liters/person/day; for medium boarding houses, it is 120.52 liters/person/day, and for simple boarding houses, 115.86 liters/person/day. In this study, a water usage monitoring system was designed using an Internet of Things-based application to monitor water discharge and volume via a smartphone. This system uses a water flow sensor, solenoid valve, and Arduino Uno ATMega microcontroller, which is communicated serially with the ESP8266, a two-channel relay, and a water pump so that water can flow quite fast. The monitoring system designed can calculate the water discharge and the volume of water usage for boarding house residents per day with a water usage limit of 123 liters/person/day. If the boarding house occupants use water exceeding the predetermined limit, the excess water usage fee will be charged to the house occupant. This monitoring system is implemented in 2 rooms in a boarding house. Based on the tests that have been carried out, the average water consumption in Room 1 is 123.72 liters, with an average water flow of 22.41 liters/min. In comparison, the average water consumption in Room 2 is 116.54 liters, with an average water discharge of 21.48 liters/min. Then the accuracy value of the water discharge is 99.88%, the water volume is 98.88% in Room 1, the accuracy value of the water discharge is 99.85%, and the water volume is 95.19% in Room 2. This shows that the monitoring system can work according to the design, where the monitoring system can display the daily water usage of boarding house residents through the Blynk application. Then the monitoring result data is sent to the user via email that the occupant has registered on the Blynk application.
随着一个地区人口的增加,对水的需求每天都在增加。用水需求增加的原因之一是寄宿公寓。豪华公寓用水量限制为123.45升/人/日;中型公寓为120.52升/人/天,简易公寓为115.86升/人/天。在本研究中,利用基于物联网的应用程序设计了一个用水监测系统,通过智能手机监测用水量和水量。该系统使用水流传感器、电磁阀和Arduino Uno ATMega微控制器,该微控制器与ESP8266、双通道继电器和水泵串行通信,从而使水流得相当快。所设计的监控系统可以计算出公寓居民每天的排水量和用水量,用水量上限为123升/人/天。如果住宿者使用的水超过预定的限制,多余的水费将被收取给住宿者。该监控系统在某寄宿公寓的2个房间实施。根据已经进行的测试,1号房间的平均用水量为123.72升,平均水流量为22.41升/分钟。相比之下,2号房间的平均用水量为116.54升,平均排水量为21.48升/分钟。则排水量精度值为99.88%,1号房排水量为98.88%,2号房排水量精度值为99.85%,2号房排水量为95.19%。这说明监控系统可以按照设计工作,其中监控系统可以通过Blynk应用显示公寓居民的日常用水情况。然后,监控结果数据通过电子邮件发送给用户,该用户已在Blynk应用程序上注册。
{"title":"Boarding House Water Usage Monitoring System Using Ineternet of Things-Based Application","authors":"Doni Pradana Wira Ambara Arifin, Rina Mardiati, M. R. Effendi, N. Sartika","doi":"10.1109/TSSA56819.2022.10063876","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063876","url":null,"abstract":"The need for water is increasing daily along with the increasing population in an area. One of the reasons for increasing water demand is boarding houses. The water consumption limit for luxury boarding houses is 123.45 liters/person/day; for medium boarding houses, it is 120.52 liters/person/day, and for simple boarding houses, 115.86 liters/person/day. In this study, a water usage monitoring system was designed using an Internet of Things-based application to monitor water discharge and volume via a smartphone. This system uses a water flow sensor, solenoid valve, and Arduino Uno ATMega microcontroller, which is communicated serially with the ESP8266, a two-channel relay, and a water pump so that water can flow quite fast. The monitoring system designed can calculate the water discharge and the volume of water usage for boarding house residents per day with a water usage limit of 123 liters/person/day. If the boarding house occupants use water exceeding the predetermined limit, the excess water usage fee will be charged to the house occupant. This monitoring system is implemented in 2 rooms in a boarding house. Based on the tests that have been carried out, the average water consumption in Room 1 is 123.72 liters, with an average water flow of 22.41 liters/min. In comparison, the average water consumption in Room 2 is 116.54 liters, with an average water discharge of 21.48 liters/min. Then the accuracy value of the water discharge is 99.88%, the water volume is 98.88% in Room 1, the accuracy value of the water discharge is 99.85%, and the water volume is 95.19% in Room 2. This shows that the monitoring system can work according to the design, where the monitoring system can display the daily water usage of boarding house residents through the Blynk application. Then the monitoring result data is sent to the user via email that the occupant has registered on the Blynk application.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133446873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Well Measurement of water level is very important for Geothermal Well operations. Manual measurement is very ineffective and inefficient because the water level cannot be monitored in real time. So, a wireless interface communication system was designed to monitor water level using ultrasonic sensor and the NRF24LOl+ PA LNA transceiver communication module. The NRF24LOI + P A LNA is a long-distance wireless communication module that utilizes a 2.4-2.5 GHz radio wave frequency equipped with a Low Noise Amplifier and Power Amplifier. The distance data from the sensor transmitted by the NRF24LOI + P A LNA communication module will be displayed on the LCD and the thingspeak website platform. By using this method, the water level can be monitored quickly in real time and efficiently. The test results of communication modules show that the capability of the NRF24LOl+ PA LNA module is quite good and effective in transmitting data at a maximum distance of 200 meters.
地热井的水位测量是地热井作业的重要环节。由于无法实时监测水位,人工测量非常无效和低效。为此,设计了一种利用超声波传感器和NRF24LOl+ PA LNA收发器通信模块进行水位监测的无线接口通信系统。NRF24LOI + P A LNA是一种利用2.4-2.5 GHz无线电波频率的远程无线通信模块,配备了低噪声放大器和功率放大器。通过NRF24LOI + pna通信模块传输的传感器的距离数据将显示在LCD和thingspeak网站平台上。利用该方法可以快速、实时、高效地监测水位。通信模块的测试结果表明,NRF24LOl+ PA LNA模块具有较好的传输能力,最大传输距离可达200米。
{"title":"Wireless Interface Communication System On Water Level Monitoring Device Using NRF24L01+ PA LNA Transceiver Module","authors":"Adhitya Naufal Firdaus, Kusmadi, Nina Lestari, Bambang Susanto, Slamet Risnanto, E. Garnia","doi":"10.1109/TSSA56819.2022.10063875","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063875","url":null,"abstract":"Well Measurement of water level is very important for Geothermal Well operations. Manual measurement is very ineffective and inefficient because the water level cannot be monitored in real time. So, a wireless interface communication system was designed to monitor water level using ultrasonic sensor and the NRF24LOl+ PA LNA transceiver communication module. The NRF24LOI + P A LNA is a long-distance wireless communication module that utilizes a 2.4-2.5 GHz radio wave frequency equipped with a Low Noise Amplifier and Power Amplifier. The distance data from the sensor transmitted by the NRF24LOI + P A LNA communication module will be displayed on the LCD and the thingspeak website platform. By using this method, the water level can be monitored quickly in real time and efficiently. The test results of communication modules show that the capability of the NRF24LOl+ PA LNA module is quite good and effective in transmitting data at a maximum distance of 200 meters.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114936925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study was conducted to model Wi-Fi password resource assets in a platform that can be shared and collaborated publicly securely and support dynamic data changes with online repository shortcuts documented in access support via dedicated search engines and QR CODE. This study uses 3 methods, namely the one-way SHA-256 HASH function which was formulated with the addition of sowing techniques and reversing techniques so as to produce a long String named Keycode, the second method uses modern cryptographic techniques, namely Digital Signature, which collects keycodes in Path the identity of the resource asset, and the last one is a QR CODE used as an access shortcut that collects digital signature access data. This study used testing data from comparator application contributors, namely wifimap.io randomly, the results of which the formulation results were then disassembled using the brute force technique using hashcat. The results of the research of password data from resources were successfully formulated into a combination of Strings with high confidentiality that cannot be disassembled to the original data but are still accessible to the owner and holder of the keycode that is balanced with the limitations of access control.
{"title":"Security Implementation of Wifi Password Asset Sharing With One Way Hash Cryptography Method Sha256 And QR Code","authors":"Dede Sudirman, Teguh Nurhadi Suharsono, Rina Mardiati","doi":"10.1109/TSSA56819.2022.10063886","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063886","url":null,"abstract":"The study was conducted to model Wi-Fi password resource assets in a platform that can be shared and collaborated publicly securely and support dynamic data changes with online repository shortcuts documented in access support via dedicated search engines and QR CODE. This study uses 3 methods, namely the one-way SHA-256 HASH function which was formulated with the addition of sowing techniques and reversing techniques so as to produce a long String named Keycode, the second method uses modern cryptographic techniques, namely Digital Signature, which collects keycodes in Path the identity of the resource asset, and the last one is a QR CODE used as an access shortcut that collects digital signature access data. This study used testing data from comparator application contributors, namely wifimap.io randomly, the results of which the formulation results were then disassembled using the brute force technique using hashcat. The results of the research of password data from resources were successfully formulated into a combination of Strings with high confidentiality that cannot be disassembled to the original data but are still accessible to the owner and holder of the keycode that is balanced with the limitations of access control.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123973471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-13DOI: 10.1109/TSSA56819.2022.10063906
Rustanto, Iskandar
In this paper the use of a 36Mbps Satellite Ku-Band transponder that will be used for internet services for VSAT terminals. The capacity of the Ku-Band transponder serves several VSATs that will be connected to broadband internet through the Hub station. Transponder Satellite is a resource that is limited in bandwidth and limited in power, of course, planning is needed in its application. Planning for the optimal use of satellite transponders is carried out using Network Simulator NS-2. The satellite transponder used for internet services provides bandwidth for both Hub stations and VSAT terminals. This satellite internet service uses the TCP/IP communication protocol which will access services from the VSAT terminal to the hub station. Planning the use of transponders with NS-2 will obtain QoS parameters including throughput, packet loss, end to end delay and packet received. This can be obtained from QoS information from VSAT that uses Ku-Band transponders for internet services.
{"title":"Simulation and Analysis Optimization Ku-Band Satellite Transponder","authors":"Rustanto, Iskandar","doi":"10.1109/TSSA56819.2022.10063906","DOIUrl":"https://doi.org/10.1109/TSSA56819.2022.10063906","url":null,"abstract":"In this paper the use of a 36Mbps Satellite Ku-Band transponder that will be used for internet services for VSAT terminals. The capacity of the Ku-Band transponder serves several VSATs that will be connected to broadband internet through the Hub station. Transponder Satellite is a resource that is limited in bandwidth and limited in power, of course, planning is needed in its application. Planning for the optimal use of satellite transponders is carried out using Network Simulator NS-2. The satellite transponder used for internet services provides bandwidth for both Hub stations and VSAT terminals. This satellite internet service uses the TCP/IP communication protocol which will access services from the VSAT terminal to the hub station. Planning the use of transponders with NS-2 will obtain QoS parameters including throughput, packet loss, end to end delay and packet received. This can be obtained from QoS information from VSAT that uses Ku-Band transponders for internet services.","PeriodicalId":164665,"journal":{"name":"2022 16th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121219481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}