Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994516
Ntivuguruzwa Jean de La Croix, C. Islamy, T. Ahmad
Pixel value ordering (PVO) and difference expansion (DE) are promising methods for digital image steganography. PVO is a steganographic method of digital images that deals with pixel values sorting before the data embedding. In digital image steganography, DE is a method for data protection based on hiding secret data in differences computed between pixels. Even though the previous methods based on PVO and DE tried to improve the embedding capacity and the stego image quality, improvement is still needed to increase both simultaneously. This work proposes a new method that combines PVO and DE to improve the number of embeddable areas and the embedding capacity in the pixels of a digital image. The experimental results showed that the maximum number of the embeddable regions within used images with the existing methods was increased from 17582 pixels to 131009 pixels, yielding the embedding capacity improvement from 6.70% up to 49.97%.
{"title":"Reversible Data Hiding using Pixel-Value-Ordering and Difference Expansion in Digital Images","authors":"Ntivuguruzwa Jean de La Croix, C. Islamy, T. Ahmad","doi":"10.1109/COMNETSAT56033.2022.9994516","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994516","url":null,"abstract":"Pixel value ordering (PVO) and difference expansion (DE) are promising methods for digital image steganography. PVO is a steganographic method of digital images that deals with pixel values sorting before the data embedding. In digital image steganography, DE is a method for data protection based on hiding secret data in differences computed between pixels. Even though the previous methods based on PVO and DE tried to improve the embedding capacity and the stego image quality, improvement is still needed to increase both simultaneously. This work proposes a new method that combines PVO and DE to improve the number of embeddable areas and the embedding capacity in the pixels of a digital image. The experimental results showed that the maximum number of the embeddable regions within used images with the existing methods was increased from 17582 pixels to 131009 pixels, yielding the embedding capacity improvement from 6.70% up to 49.97%.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994345
M. Yusro, N. Azlyn, S. I. Purnama
Biomedical tool quality assurance needs to be concerned regarding its measurement validation worrying its function to treat the human body. It has been found that in reported medical tools on the internet of medical things (IoMT), the quality of the tool is defined mostly only using Quality of Service (QoS). It has not been standard yet that medical tools also must be concerned about their quality measurement. This article imposed to elaborate on developing quality assessment in the medical tool by adapting ISO 17025 as quality measurement, particularly the validation method. ISO 17025 is the method using notable parameters used in the quality of laboratory of measurement. The parameters include calibration, selectivity, sensitivity, precision (repeatability), accuracy, linearity and working range, robustness, and ruggedness (reproducibility). To clarify how this standard is implemented, the medical tool, detector of kidney disorder based on pH meter using urea and acid solution, is employed as a case study. The result said that even though QoS is a very good outcome, this biomedical tool has crucial parameters particularly in calibration. Hopefully, this article could be a reference to enhance the quality standard of medical tools.
{"title":"Adapting ISO 17025 to Enrich QoS as Quality Measurement on Internet of Medical Things","authors":"M. Yusro, N. Azlyn, S. I. Purnama","doi":"10.1109/COMNETSAT56033.2022.9994345","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994345","url":null,"abstract":"Biomedical tool quality assurance needs to be concerned regarding its measurement validation worrying its function to treat the human body. It has been found that in reported medical tools on the internet of medical things (IoMT), the quality of the tool is defined mostly only using Quality of Service (QoS). It has not been standard yet that medical tools also must be concerned about their quality measurement. This article imposed to elaborate on developing quality assessment in the medical tool by adapting ISO 17025 as quality measurement, particularly the validation method. ISO 17025 is the method using notable parameters used in the quality of laboratory of measurement. The parameters include calibration, selectivity, sensitivity, precision (repeatability), accuracy, linearity and working range, robustness, and ruggedness (reproducibility). To clarify how this standard is implemented, the medical tool, detector of kidney disorder based on pH meter using urea and acid solution, is employed as a case study. The result said that even though QoS is a very good outcome, this biomedical tool has crucial parameters particularly in calibration. Hopefully, this article could be a reference to enhance the quality standard of medical tools.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"42 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132399848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994546
Raihan Islamadina, Khairun Saddami, Maulisa Oktiana, Taufik Fuadi Abidin, R. Muharar, F. Arnia
This paper discusses the performance of deep learning models from ResNet, MobileNetV2, and EfficientNet for pain recognition through facial expressions. The dataset used in this paper is a thermal image obtained from the Multimodal Pain Intensity (MintPain) database which is a database for facial pain-level recognition. The deep learning model used has been trained on other datasets and its performance is proven through the transfer learning method. During training, epochs of 5, 20, 40, and 60 were used. We used a minibatch size of 24, the optimizer with a learning rate of 0.001, momentum of 0.9, and the learning rate factor for weight and bias each to 10. The results of the training showed that ResNet, MobileNetV2, and EfficientNet had 100%, 100%, and 99.60% accuracy at epoch 40, respectively. Finally, an evaluation of the performance of each model that has been trained is carried out using the test results. Here, MobileNetV2 is able to correctly classify all test datasets with an accuracy of 82.3%.
{"title":"Performance of Deep Learning Benchmark Models on Thermal Imagery of Pain through Facial Expressions","authors":"Raihan Islamadina, Khairun Saddami, Maulisa Oktiana, Taufik Fuadi Abidin, R. Muharar, F. Arnia","doi":"10.1109/COMNETSAT56033.2022.9994546","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994546","url":null,"abstract":"This paper discusses the performance of deep learning models from ResNet, MobileNetV2, and EfficientNet for pain recognition through facial expressions. The dataset used in this paper is a thermal image obtained from the Multimodal Pain Intensity (MintPain) database which is a database for facial pain-level recognition. The deep learning model used has been trained on other datasets and its performance is proven through the transfer learning method. During training, epochs of 5, 20, 40, and 60 were used. We used a minibatch size of 24, the optimizer with a learning rate of 0.001, momentum of 0.9, and the learning rate factor for weight and bias each to 10. The results of the training showed that ResNet, MobileNetV2, and EfficientNet had 100%, 100%, and 99.60% accuracy at epoch 40, respectively. Finally, an evaluation of the performance of each model that has been trained is carried out using the test results. Here, MobileNetV2 is able to correctly classify all test datasets with an accuracy of 82.3%.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132412536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994439
S. Budiyanto, Ch Surya Aprihansah, L. M. Silalahi, Imelda Uli Vistalina Simanjuntak, Freddy Artadima Silaban, A. D. Rochendi
VPN (Virtual Private Network) is one of the communication technologies that allows users to connect to public networks and allows to use, send, and get information as if the network were a private network. However, a VPN becomes complicated if a company has branch offices spread across many places and implements a full mesh method. In a full mesh network, each branch office is required to be able to communicate with the head office or fellow branch offices, so each branch office must make BGP (Border Gateway Protocol) peer to the head office and also to other branch offices. BGP route reflector is one solution in implementing a full mesh network. The experimental hypothesis in this study uses BGP Non-Route Reflector requires 15 BGP Peers while the results of this research using BGP Route Reflector only require 5 BGP Peers. By using BGP Route Reflector is no longer needed to create BGP Peer at each branch office to the head office, then the head office will be Reflectors for all existing routers. The conclusion in this research can be stated that the entire network can automatically find other networks that are integrated. Network quality testing found that the highest jitter occurred at 9.76 ms while for the highest packet loss at 2.15%.
{"title":"Auto Discover Virtual Private Network Using Border Gateway Protocol Route Reflector","authors":"S. Budiyanto, Ch Surya Aprihansah, L. M. Silalahi, Imelda Uli Vistalina Simanjuntak, Freddy Artadima Silaban, A. D. Rochendi","doi":"10.1109/COMNETSAT56033.2022.9994439","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994439","url":null,"abstract":"VPN (Virtual Private Network) is one of the communication technologies that allows users to connect to public networks and allows to use, send, and get information as if the network were a private network. However, a VPN becomes complicated if a company has branch offices spread across many places and implements a full mesh method. In a full mesh network, each branch office is required to be able to communicate with the head office or fellow branch offices, so each branch office must make BGP (Border Gateway Protocol) peer to the head office and also to other branch offices. BGP route reflector is one solution in implementing a full mesh network. The experimental hypothesis in this study uses BGP Non-Route Reflector requires 15 BGP Peers while the results of this research using BGP Route Reflector only require 5 BGP Peers. By using BGP Route Reflector is no longer needed to create BGP Peer at each branch office to the head office, then the head office will be Reflectors for all existing routers. The conclusion in this research can be stated that the entire network can automatically find other networks that are integrated. Network quality testing found that the highest jitter occurred at 9.76 ms while for the highest packet loss at 2.15%.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133873214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994476
Mohammad Edar Paradise Wibowo, Mohammad Raudya Hananditya, Firdaus Firdaus, Noor Azurati Ahmad, Adi Azlan Mohd Ali
Today, many buildings have many floors and rooms. The building usually provides a conventional map that shows the name and location of the existing rooms. The use of conventional maps is currently considered less effective because ordinary people who visit to find the desired location have difficulty. Global Navigation Satellite System (GNNS) is unreliable because the signal is not strong enough to pierce the building. A solution is proposed to create an Android application-based system that can detect the location of humans in the building by utilizing a Wi-Fi signal. The proposed system uses fingerprint technique and k-NN (Nearest Neighbour) algorithm. It has a level of accuracy in the room-scale, where the system can find out where the user is in which room. The system was tested in the Faculty of Industrial Technology Building, Universitas Islam Indonesia, with an accuracy of 82% on a room scale. This paper also provides a solution for choosing the access point to be used by creating a block system. The level of system accuracy is affected by the device ability to receive signals, and the signal from the access point is not always stable. Overall, the designed system can detect where the user is when accessing the application.
{"title":"Indoor Positioning System for Campus Building Based on WLAN Fingerprint","authors":"Mohammad Edar Paradise Wibowo, Mohammad Raudya Hananditya, Firdaus Firdaus, Noor Azurati Ahmad, Adi Azlan Mohd Ali","doi":"10.1109/COMNETSAT56033.2022.9994476","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994476","url":null,"abstract":"Today, many buildings have many floors and rooms. The building usually provides a conventional map that shows the name and location of the existing rooms. The use of conventional maps is currently considered less effective because ordinary people who visit to find the desired location have difficulty. Global Navigation Satellite System (GNNS) is unreliable because the signal is not strong enough to pierce the building. A solution is proposed to create an Android application-based system that can detect the location of humans in the building by utilizing a Wi-Fi signal. The proposed system uses fingerprint technique and k-NN (Nearest Neighbour) algorithm. It has a level of accuracy in the room-scale, where the system can find out where the user is in which room. The system was tested in the Faculty of Industrial Technology Building, Universitas Islam Indonesia, with an accuracy of 82% on a room scale. This paper also provides a solution for choosing the access point to be used by creating a block system. The level of system accuracy is affected by the device ability to receive signals, and the signal from the access point is not always stable. Overall, the designed system can detect where the user is when accessing the application.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133877873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994338
Muhammad Miftahul Amri
Reconfigurable Intelligent Surfaces (RIS) have risen as a promising technology for future wireless communications. RIS consists of a massive number of unit cells, each of which can be tuned individually to induce a manipulation of the wireless signal properties. These properties include the signal's phase, magnitude, frequency, and even polarization. In this manuscript, we briefly present the recent trends in RIS research. This manuscript covers the trends in the development of active RIS, various RIS control elements comparison (i.e., electronics, mechanics, and materials approaches), flexible and transparent RIS, RIS lens and RIS mirror, and the most-recent brain-controlled RIS paradigm. This review was derived from the recent high-quality meta-analyses, reviews, and original research papers related to the recent RIS works. We extensively searched online libraries such as IEEE, Nature, Scopus, and Google Scholar for those articles. There were no limitations on the year of the publications. In this manuscript, we consider any research study types written in English (excluding unpublished data, technical notes, and submitted manuscripts). As a result, we have gathered more than 50 references related to the recent RIS research. While RIS promised attractive capabilities for reconfiguring the wireless environment, several challenges are lying ahead and must be overcome. Among those, there are two major challenges: multiplicative fading effect and channel estimation problems.
{"title":"Recent Trends in the Reconfigurable Intelligent Surfaces (RIS): Active RIS to Brain-controlled RIS","authors":"Muhammad Miftahul Amri","doi":"10.1109/COMNETSAT56033.2022.9994338","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994338","url":null,"abstract":"Reconfigurable Intelligent Surfaces (RIS) have risen as a promising technology for future wireless communications. RIS consists of a massive number of unit cells, each of which can be tuned individually to induce a manipulation of the wireless signal properties. These properties include the signal's phase, magnitude, frequency, and even polarization. In this manuscript, we briefly present the recent trends in RIS research. This manuscript covers the trends in the development of active RIS, various RIS control elements comparison (i.e., electronics, mechanics, and materials approaches), flexible and transparent RIS, RIS lens and RIS mirror, and the most-recent brain-controlled RIS paradigm. This review was derived from the recent high-quality meta-analyses, reviews, and original research papers related to the recent RIS works. We extensively searched online libraries such as IEEE, Nature, Scopus, and Google Scholar for those articles. There were no limitations on the year of the publications. In this manuscript, we consider any research study types written in English (excluding unpublished data, technical notes, and submitted manuscripts). As a result, we have gathered more than 50 references related to the recent RIS research. While RIS promised attractive capabilities for reconfiguring the wireless environment, several challenges are lying ahead and must be overcome. Among those, there are two major challenges: multiplicative fading effect and channel estimation problems.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994302
Amarudin, R. Ferdiana, Widyawan
The application of Machine Learning (ML)-based Intrusion Detection System (IDS) has been widely used. The advantage of ML-based IDS is that it can detect intrusions in the network. However, in its application, there are still false positive detections on the IDS. False positive detection occurs due to improper ML techniques. This research applies an S-SDN model based on Ensemble Learning (EL) to overcome this problem. The S-SDN model is built from three base-learners, namely SVM, Decision Tree, and Naïve Bayes with the Stacking technique. Furthermore, the S-SDN model is used as a classifier on the IDS to detect intrusions. S-SDN was validated using the UNSW-NB15 dataset. Based on the experiment, S-SDN's performance was superior to the old method based on a single classifier. The performance of S-SDN can achieve an accuracy of 83.19%. In comparison, the old method based on a single classifier (SVM) can only achieve an accuracy of 75.89%, and the ensemble classifier (Bagging-DT) is only 80,09%. As for further research, the development of EL-based IDS still needs to be improved. For example, it builds an EL-based model with feature selection techniques and different base learners.
{"title":"New Approach of Ensemble Method to Improve Performance of IDS using S-SDN Classifier","authors":"Amarudin, R. Ferdiana, Widyawan","doi":"10.1109/COMNETSAT56033.2022.9994302","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994302","url":null,"abstract":"The application of Machine Learning (ML)-based Intrusion Detection System (IDS) has been widely used. The advantage of ML-based IDS is that it can detect intrusions in the network. However, in its application, there are still false positive detections on the IDS. False positive detection occurs due to improper ML techniques. This research applies an S-SDN model based on Ensemble Learning (EL) to overcome this problem. The S-SDN model is built from three base-learners, namely SVM, Decision Tree, and Naïve Bayes with the Stacking technique. Furthermore, the S-SDN model is used as a classifier on the IDS to detect intrusions. S-SDN was validated using the UNSW-NB15 dataset. Based on the experiment, S-SDN's performance was superior to the old method based on a single classifier. The performance of S-SDN can achieve an accuracy of 83.19%. In comparison, the old method based on a single classifier (SVM) can only achieve an accuracy of 75.89%, and the ensemble classifier (Bagging-DT) is only 80,09%. As for further research, the development of EL-based IDS still needs to be improved. For example, it builds an EL-based model with feature selection techniques and different base learners.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115457274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994485
Anju R S, M. P, Anandpushparaj J
An Unmanned aerial vehicle and its application in communication are of great interest these days. This paper an-alyzes a UAV-based system model that replaces the conventional relay and derives the closed-loop expression for performance metrics like outage and throughput over Nakagami-m Channel. The results are validated using the simulation results. All the analyses are done considering selection combining (SC) as the diversity technique, Non-orthogonal multiple access techniques (NOMA) as the multiple access technique, and imperfect succes-sive interference cancellation (SIC) at the receiver. To add more novelty to the work, we have incorporated an energy harvesting technique i.e., power splitting approach (PS).
{"title":"Outage Analysis of UAV-assisted Co-operative Communication System with imperfect SIC","authors":"Anju R S, M. P, Anandpushparaj J","doi":"10.1109/COMNETSAT56033.2022.9994485","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994485","url":null,"abstract":"An Unmanned aerial vehicle and its application in communication are of great interest these days. This paper an-alyzes a UAV-based system model that replaces the conventional relay and derives the closed-loop expression for performance metrics like outage and throughput over Nakagami-m Channel. The results are validated using the simulation results. All the analyses are done considering selection combining (SC) as the diversity technique, Non-orthogonal multiple access techniques (NOMA) as the multiple access technique, and imperfect succes-sive interference cancellation (SIC) at the receiver. To add more novelty to the work, we have incorporated an energy harvesting technique i.e., power splitting approach (PS).","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124346957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994452
Yougha Budi Prahmana, Ayu Mika Sherila, Umaisaroh Umaisaroh, E. Handoko, M. Alaydrus
Several research on microwave absorber have been mentioned, most of which aim to absorb this harmful electromagnetic radiation. Using biomaterial instead of polyurethane or polystyrene foam for absorber was beneficial to nature. This study suggested sugarcane bagasse as a material for absorbers in a 27–29 GHz frequency work. To demonstrate the absorption behavior of the sugarcane bagasse, we simulated using HFSS. The dielectric constant and loss tangent used are 0.161 and 1.44, respectively. The results confirmed that the thickness of the absorber significantly influences the effectiveness of microwave absorption. Both simulation and measurement results obtain a good performance of the sugarcane bagasse absorber over 29 GHz frequency in a round shape with a diameter of 70 mm and a thickness of 20 mm in a reflection factor of -33.18 dB and -20.42 dB. At the same time, an absorber with a diameter of 90 mm and thickness of 10 mm produced a reflection factor of -29.62 and -25.81 dB.
{"title":"Analysis of Microwave Absorber Using Sugarcane Bagasse for 27 - 29 GHz Frequency","authors":"Yougha Budi Prahmana, Ayu Mika Sherila, Umaisaroh Umaisaroh, E. Handoko, M. Alaydrus","doi":"10.1109/COMNETSAT56033.2022.9994452","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994452","url":null,"abstract":"Several research on microwave absorber have been mentioned, most of which aim to absorb this harmful electromagnetic radiation. Using biomaterial instead of polyurethane or polystyrene foam for absorber was beneficial to nature. This study suggested sugarcane bagasse as a material for absorbers in a 27–29 GHz frequency work. To demonstrate the absorption behavior of the sugarcane bagasse, we simulated using HFSS. The dielectric constant and loss tangent used are 0.161 and 1.44, respectively. The results confirmed that the thickness of the absorber significantly influences the effectiveness of microwave absorption. Both simulation and measurement results obtain a good performance of the sugarcane bagasse absorber over 29 GHz frequency in a round shape with a diameter of 70 mm and a thickness of 20 mm in a reflection factor of -33.18 dB and -20.42 dB. At the same time, an absorber with a diameter of 90 mm and thickness of 10 mm produced a reflection factor of -29.62 and -25.81 dB.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117108754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994415
Marina Vicini, Sercan Albut, Elvina Gindullina, L. Badia
We consider an emergency maneuver scenario involving two autonomous vehicles interacting with a road obstacle characterized by a random behavior. We employ game theory to solve the resulting problems, first framing a static game of compete information, and further adding incomplete information about the obstacle so as to transform it into a Bayesian game. Depending on the considered scenario, the autonomous vehicles can have multiple available actions, such as to stay at the same lane and swerve and move to another one. These actions can lead to different outcomes, such as keep driving on an empty lane, hit the obstacle, or hit another car. We analyse the Nash equilibria of the game and test the hypothesis that the knowledge of one vehicle about an obstacle can be advantageous to other road participants, which is key in the context of connected vehicles.
{"title":"Decision Making via Game Theory for Autonomous Vehicles in the Presence of a Moving Obstacle","authors":"Marina Vicini, Sercan Albut, Elvina Gindullina, L. Badia","doi":"10.1109/COMNETSAT56033.2022.9994415","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994415","url":null,"abstract":"We consider an emergency maneuver scenario involving two autonomous vehicles interacting with a road obstacle characterized by a random behavior. We employ game theory to solve the resulting problems, first framing a static game of compete information, and further adding incomplete information about the obstacle so as to transform it into a Bayesian game. Depending on the considered scenario, the autonomous vehicles can have multiple available actions, such as to stay at the same lane and swerve and move to another one. These actions can lead to different outcomes, such as keep driving on an empty lane, hit the obstacle, or hit another car. We analyse the Nash equilibria of the game and test the hypothesis that the knowledge of one vehicle about an obstacle can be advantageous to other road participants, which is key in the context of connected vehicles.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124801693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}