Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994325
C. Islamy, T. Ahmad, R. Ijtihadie
Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.
{"title":"Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error","authors":"C. Islamy, T. Ahmad, R. Ijtihadie","doi":"10.1109/COMNETSAT56033.2022.9994325","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994325","url":null,"abstract":"Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994414
R. Anggraini, Nurul Fajrin Ariyani, A. F. Septiyanto, R. Sarno, Z. D. Meilani, Triono Soendoro
Knowledge base systems have undergone many developments in providing similar results to experts. This can help increase time effectiveness in determining decisions and analysis results. Several methods have given good results in determining decisions based on knowledge, one of which is using a decision tree. In this study, the researchers applied decision tree modeling to determine the results of the review on ethical research protocols. Our target is to classify ethical protocols into one of three decisions: Exempted, Expedited, or Full Board. Three decision tree models are used in this research to evaluate the best results that can predict the ethical review protocol results according to the expert's dataset. The experiments showed that all models showed the same result, with an accuracy value of 0,91, precision of 0,93, and recall of 0,91. However, manual checking showed that the second model with Gini criteria parameters and class weight balance resulted in 10 data correctly predicted based on the dataset used.
{"title":"A Decision Tree Knowledge-based System for Reviewing Research Ethics Protocol","authors":"R. Anggraini, Nurul Fajrin Ariyani, A. F. Septiyanto, R. Sarno, Z. D. Meilani, Triono Soendoro","doi":"10.1109/COMNETSAT56033.2022.9994414","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994414","url":null,"abstract":"Knowledge base systems have undergone many developments in providing similar results to experts. This can help increase time effectiveness in determining decisions and analysis results. Several methods have given good results in determining decisions based on knowledge, one of which is using a decision tree. In this study, the researchers applied decision tree modeling to determine the results of the review on ethical research protocols. Our target is to classify ethical protocols into one of three decisions: Exempted, Expedited, or Full Board. Three decision tree models are used in this research to evaluate the best results that can predict the ethical review protocol results according to the expert's dataset. The experiments showed that all models showed the same result, with an accuracy value of 0,91, precision of 0,93, and recall of 0,91. However, manual checking showed that the second model with Gini criteria parameters and class weight balance resulted in 10 data correctly predicted based on the dataset used.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994388
Ramzi Adriman, M. Fitria, A. Afdhal, Alfy Yusyfa Fernanda
The quality of pond water greatly affects the main factor of prawn survival and its aquaculture productivity. The checking process of the prawn pond water quality is generally very simple and is done manually by the cultivator. Thus, it is necessary to have a system that can assist the cultivator in monitoring the condition of the ponds at all times with accurate data. This work aims to develop an IoT-based system that not only monitors the quality of water in a prawn pond but also warns the users when the quality of the water pond is not in great condition. This system is constructed using several main components, namely the pH sensor, the salinity sensor, the ultrasonic sensor for reading the water level of the pond, and the microcontroller ESP32 to process all input data. The parameters read by the sensors are stored in cloud firebase to be forwarded and displayed on the Android application which is built in the flutter framework. The findings show that the components used in this experiment are feasible and run adequately, with 3.15% error for the water pH sensor, 0.8% error for the salinity sensor, and 0.63% for the ultrasonic sensor. The evaluation results showed that the system can proficiently monitor the water condition, as well as send a notification to the user when the parameter values are not in a normal range.
{"title":"An IoT-Based System for Water Quality Monitoring and Notification System of Aquaculture Prawn Pond","authors":"Ramzi Adriman, M. Fitria, A. Afdhal, Alfy Yusyfa Fernanda","doi":"10.1109/COMNETSAT56033.2022.9994388","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994388","url":null,"abstract":"The quality of pond water greatly affects the main factor of prawn survival and its aquaculture productivity. The checking process of the prawn pond water quality is generally very simple and is done manually by the cultivator. Thus, it is necessary to have a system that can assist the cultivator in monitoring the condition of the ponds at all times with accurate data. This work aims to develop an IoT-based system that not only monitors the quality of water in a prawn pond but also warns the users when the quality of the water pond is not in great condition. This system is constructed using several main components, namely the pH sensor, the salinity sensor, the ultrasonic sensor for reading the water level of the pond, and the microcontroller ESP32 to process all input data. The parameters read by the sensors are stored in cloud firebase to be forwarded and displayed on the Android application which is built in the flutter framework. The findings show that the components used in this experiment are feasible and run adequately, with 3.15% error for the water pH sensor, 0.8% error for the salinity sensor, and 0.63% for the ultrasonic sensor. The evaluation results showed that the system can proficiently monitor the water condition, as well as send a notification to the user when the parameter values are not in a normal range.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994514
Kalam Adhiansyah Lutfie, Prima Dewi Purnamasari, D. Gunawan, I. K. Agung Enriko
Today, the deployment of LoRa gateway in Indonesia uses only traditional methods by predicting the coverage and capacity without using formulas related to LoRa gateway performance or considering area type (urban, suburban or rural). This paper conducts the study and research for coverage and capacity analysis of LoRa Gateway to cover all sensor device demands. The formula is calculated to save more resources and optimize the performance of the LoRa gateway covering all demands needed for Smart Gas Meter devices in Urban areas. The location taken as a model is Jakarta City. In order to obtain the number of gateways to cover all smart gas meter demands, this paper uses the Okumura-Hata formula to obtain coverage prediction for each gateway. It uses time on air and interval concepts to determine capacity per interval times. The calculation result is about 4 LoRa gateways need to be deployed, and the interval of transmission data is about once per 35 minutes to cover all Smart Gas Meter devices in Jakarta.
{"title":"LoRA Gateway Coverage and Capacity Analysis in Urban Area For IoT Smart Gas Meter Demand","authors":"Kalam Adhiansyah Lutfie, Prima Dewi Purnamasari, D. Gunawan, I. K. Agung Enriko","doi":"10.1109/COMNETSAT56033.2022.9994514","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994514","url":null,"abstract":"Today, the deployment of LoRa gateway in Indonesia uses only traditional methods by predicting the coverage and capacity without using formulas related to LoRa gateway performance or considering area type (urban, suburban or rural). This paper conducts the study and research for coverage and capacity analysis of LoRa Gateway to cover all sensor device demands. The formula is calculated to save more resources and optimize the performance of the LoRa gateway covering all demands needed for Smart Gas Meter devices in Urban areas. The location taken as a model is Jakarta City. In order to obtain the number of gateways to cover all smart gas meter demands, this paper uses the Okumura-Hata formula to obtain coverage prediction for each gateway. It uses time on air and interval concepts to determine capacity per interval times. The calculation result is about 4 LoRa gateways need to be deployed, and the interval of transmission data is about once per 35 minutes to cover all Smart Gas Meter devices in Jakarta.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"40 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994517
D. Mattera, M. Tanda
The filter bank multicarrier offset-QAM transceiver is increasingly investigated for its use in multiple-access uplink scenario. The use of the filter bank multicarrier transceiver, however, is attractive when a simple equalizer with a few taps is able to perform correct equalization. In this paper it is provided an extension of a general matrix description of the considered transceiver that is much useful for correctly setting the overall number of subcarriers for which simple channel equalization is possible. The obtained frequency-domain description allows the derivation of a class of simple receiver equalizers; two examples of possible equalizer derivations are provided.
{"title":"Linear Filter Design for FBMC-OQAM Transceiver","authors":"D. Mattera, M. Tanda","doi":"10.1109/COMNETSAT56033.2022.9994517","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994517","url":null,"abstract":"The filter bank multicarrier offset-QAM transceiver is increasingly investigated for its use in multiple-access uplink scenario. The use of the filter bank multicarrier transceiver, however, is attractive when a simple equalizer with a few taps is able to perform correct equalization. In this paper it is provided an extension of a general matrix description of the considered transceiver that is much useful for correctly setting the overall number of subcarriers for which simple channel equalization is possible. The obtained frequency-domain description allows the derivation of a class of simple receiver equalizers; two examples of possible equalizer derivations are provided.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Software Defined Networking (SDN) is a new concept for managing a computer network. In the implementation, the SDN network has difficulties connecting with a traditional IP network. The Open Network Operating System Controller (ONOS) has an application for connecting SDN networks and traditional IP networks via BGP, which is SDN-IP. SDN-IP will convert the BGP route packets obtained from BGP Speakers into intents. The ONOS controller will process these intents into an Openflow route which will be forwarded to the data plane. Reactive SDN-IP routing computes and creates traffic paths between the SDN network and the traditional IP network so that both networks can communicate with one another. Hybrid SDN is an SDN network, and a traditional IP network runs side by side. This research will test the Quality of Service on the Hybrid SDN network with two scenarios. Results of network quality measurement show that the use of the TCP protocol produces an average throughput value of 52.9836 Mbps and a delay of 0.15096 ms in the scenario of a traditional IP network to an SDN network, which is better than a traditional IP network to a traditional IP network over an SDN network.
软件定义网络(SDN)是管理计算机网络的一个新概念。在实现过程中,SDN网络与传统IP网络的连接存在困难。ONOS (Open Network Operating System Controller)有一种通过BGP连接SDN网络和传统IP网络的应用,即SDN-IP。SDN-IP将从BGP speaker获得的BGP路由报文转换为意图。ONOS控制器将把这些意图处理成Openflow路由,该路由将被转发到数据平面。响应式SDN-IP路由通过计算和创建SDN网络与传统IP网络之间的流量路径,实现SDN网络与传统IP网络之间的通信。混合SDN是一种SDN网络,与传统的IP网络并行运行。本研究将通过两种场景对混合SDN网络的业务质量进行测试。网络质量测量结果表明,使用TCP协议从传统IP网络到SDN网络的平均吞吐量为52.9836 Mbps,时延为0.15096 ms,优于传统IP网络通过SDN网络到传统IP网络。
{"title":"The Performance Analysis of Hybrid SDN–IP Reactive Routing on ONOS Controller in Tree Topologies","authors":"Bongga Arifwidodo, Donny Arief Oktavian, Jafaruddin Gustri Amri Ginting","doi":"10.1109/COMNETSAT56033.2022.9994460","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994460","url":null,"abstract":"Software Defined Networking (SDN) is a new concept for managing a computer network. In the implementation, the SDN network has difficulties connecting with a traditional IP network. The Open Network Operating System Controller (ONOS) has an application for connecting SDN networks and traditional IP networks via BGP, which is SDN-IP. SDN-IP will convert the BGP route packets obtained from BGP Speakers into intents. The ONOS controller will process these intents into an Openflow route which will be forwarded to the data plane. Reactive SDN-IP routing computes and creates traffic paths between the SDN network and the traditional IP network so that both networks can communicate with one another. Hybrid SDN is an SDN network, and a traditional IP network runs side by side. This research will test the Quality of Service on the Hybrid SDN network with two scenarios. Results of network quality measurement show that the use of the TCP protocol produces an average throughput value of 52.9836 Mbps and a delay of 0.15096 ms in the scenario of a traditional IP network to an SDN network, which is better than a traditional IP network to a traditional IP network over an SDN network.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994317
Andicho Haryus Wirasapta, Prapto Nugroho, S. Wibowo
QPSK (Quadrature Phase Shift Keying) is one of the digital modulation techniques that can encode two bits per symbol based on data that has been divided into two parts, namely even data bits and odd data bits to minimize the bit error rate (BER). In this research, a QPSK modulator is designed using discrete components based on LTspice in order to support developments in digital communication systems for information exchange especially for low frequency applications. LTspice is powerful for examining designs and for predicting the characteristics of electronic circuits. And, discrete components are chosen because the required components are widely available and obtained in the market, so it is easy to implement into a QPSK modulator. QPSK modulator consist of data sources, odd-even data dividers, carrier signals, balanced modulator, odd-even modulated signals and OpAmp circuits. After the entire cicuits of QPSK modulator have been designed by using LTspice, then simulation testing can be carried out in each circuit and the whole, so that it can be known whether the circuit is worked properly. After the testing has been carried out, it was found that the output in each circuit and overall modulator was in accordance with the expected where the QPSK modulator was able to generate a QPSK modulated wave with a frequency of 2 MHz and a data frequency of 500 kHz. This result can be used as a reference to be implemented into a prototype, because based on the simulation results can be implemented to the next development.
{"title":"Designing QPSK Modulator Using LTspice-Based Discrete Components","authors":"Andicho Haryus Wirasapta, Prapto Nugroho, S. Wibowo","doi":"10.1109/COMNETSAT56033.2022.9994317","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994317","url":null,"abstract":"QPSK (Quadrature Phase Shift Keying) is one of the digital modulation techniques that can encode two bits per symbol based on data that has been divided into two parts, namely even data bits and odd data bits to minimize the bit error rate (BER). In this research, a QPSK modulator is designed using discrete components based on LTspice in order to support developments in digital communication systems for information exchange especially for low frequency applications. LTspice is powerful for examining designs and for predicting the characteristics of electronic circuits. And, discrete components are chosen because the required components are widely available and obtained in the market, so it is easy to implement into a QPSK modulator. QPSK modulator consist of data sources, odd-even data dividers, carrier signals, balanced modulator, odd-even modulated signals and OpAmp circuits. After the entire cicuits of QPSK modulator have been designed by using LTspice, then simulation testing can be carried out in each circuit and the whole, so that it can be known whether the circuit is worked properly. After the testing has been carried out, it was found that the output in each circuit and overall modulator was in accordance with the expected where the QPSK modulator was able to generate a QPSK modulated wave with a frequency of 2 MHz and a data frequency of 500 kHz. This result can be used as a reference to be implemented into a prototype, because based on the simulation results can be implemented to the next development.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994572
Erryc Darmawan, S. Budiyanto, L. M. Silalahi
This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme. VoIP requires QoS (Quality of Service) because it is very sensitive to loss and delay of information packets. The novelty of this research is to compare the performance generated on several VPN security system mechanisms that use the L2TP IPSEC (Layer 2 Tunnelling Protocol Security) and SSL (Secure Socket Layer) methods. The purpose of this research is to obtain a VoIP security system mechanism and analyze delay, jitter, throughput, and packet loss as well as MOS (Mean Opinion Score) measurements. This research is expected to produce a model of best practice of applying QoS VoIP to network security systems The proposed research method is qualitative and objective studies. This research resulted in VoIP performance with an average delay on Forticlient SSL VPN of 7,804 ms while the average delay on L2TP IPSEC VPN was 9,787 ms and the average for forticlient SSL VPN jitter was 7,804 ms while the average jitter for L2TP IPSEC VPN was 9,786 ms. These results show that the SSL method's VoIP performance is better than the L2TP IPSec method, and jitter shows the L2TP IPSec method is better than the SSL method.
{"title":"QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method","authors":"Erryc Darmawan, S. Budiyanto, L. M. Silalahi","doi":"10.1109/COMNETSAT56033.2022.9994572","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994572","url":null,"abstract":"This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme. VoIP requires QoS (Quality of Service) because it is very sensitive to loss and delay of information packets. The novelty of this research is to compare the performance generated on several VPN security system mechanisms that use the L2TP IPSEC (Layer 2 Tunnelling Protocol Security) and SSL (Secure Socket Layer) methods. The purpose of this research is to obtain a VoIP security system mechanism and analyze delay, jitter, throughput, and packet loss as well as MOS (Mean Opinion Score) measurements. This research is expected to produce a model of best practice of applying QoS VoIP to network security systems The proposed research method is qualitative and objective studies. This research resulted in VoIP performance with an average delay on Forticlient SSL VPN of 7,804 ms while the average delay on L2TP IPSEC VPN was 9,787 ms and the average for forticlient SSL VPN jitter was 7,804 ms while the average jitter for L2TP IPSEC VPN was 9,786 ms. These results show that the SSL method's VoIP performance is better than the L2TP IPSec method, and jitter shows the L2TP IPSec method is better than the SSL method.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994512
B. Kindhi, Masca Indra Triana, Umi Laili Yuhana, S. Damarnegara, Fivitria Istiqomah, Muhammad Hafiizh Imaaduddiin
Flood is one of the problems that often occur in big cities, one of which is Surabaya. This arises due to various factors, including changes in land use, relatively high rainfall, and an inadequate drainage system. Floods in several places in Surabaya are basically caused by the unavailability of ditches and places to drain rainwater. This causes rainwater to fall directly onto the road and cause air impacts. One way to anticipate flooding is to know the conditions that trigger flooding, namely rainfall and air temperature. In this study, a classification system for the level of rainfall and air temperature is proposed which affects flooding. The method we propose is fuzzy logic with the Mamdani approach. Our data set is real temperature and rainfall data in the city of Surabaya from 2017 to 2020. The test results from our proposed method, it can be analyzed that fuzzy logic can also study the relationship and degree between temperature and rainfall so as to result in the condition of the city in that month to predict there will be flooding or not.
{"title":"Flood Identification with Fuzzy Logic Based on Rainfall and Weather for Smart City Implementation","authors":"B. Kindhi, Masca Indra Triana, Umi Laili Yuhana, S. Damarnegara, Fivitria Istiqomah, Muhammad Hafiizh Imaaduddiin","doi":"10.1109/COMNETSAT56033.2022.9994512","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994512","url":null,"abstract":"Flood is one of the problems that often occur in big cities, one of which is Surabaya. This arises due to various factors, including changes in land use, relatively high rainfall, and an inadequate drainage system. Floods in several places in Surabaya are basically caused by the unavailability of ditches and places to drain rainwater. This causes rainwater to fall directly onto the road and cause air impacts. One way to anticipate flooding is to know the conditions that trigger flooding, namely rainfall and air temperature. In this study, a classification system for the level of rainfall and air temperature is proposed which affects flooding. The method we propose is fuzzy logic with the Mamdani approach. Our data set is real temperature and rainfall data in the city of Surabaya from 2017 to 2020. The test results from our proposed method, it can be analyzed that fuzzy logic can also study the relationship and degree between temperature and rainfall so as to result in the condition of the city in that month to predict there will be flooding or not.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-03DOI: 10.1109/COMNETSAT56033.2022.9994330
Ibrahim M. Ahmed, Manar Kashmoola
With the vast usage of smart system devices, such as those used in 6G applications, that rely heavily on distributed machine learning technologies such as Federated Learning. Thus, there is an urgent need to provide a secure federated learning environment. The main challenge that faces federated Learning is thepoising attack. Therefore, this paper proposes a new framework for federated Learning that makes it more secure against GANs (Generative Adversarial Networks) attacks and Sybil attacks. The proposed framework is based on Federated Learning with Microsoft Confidential Consortium Framework (FED_CCF) to create a secure and reliable environment that deceives attackers of the federated learning environment. The performance of the proposed FED_CCF is evaluated using the MNIST dataset in terms of accuracy, where 30% of the devices were malicious devices represented by GAN or Sybil attacks. The experiment results of the proposed FED_CCF system show 96% better accuracy, with no effect of Sybil poisoning attacks, and only 0.18% of GAN poisoning attacks could affect it.
{"title":"Investigated Insider and Outsider Attacks on the Federated Learning Systems","authors":"Ibrahim M. Ahmed, Manar Kashmoola","doi":"10.1109/COMNETSAT56033.2022.9994330","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994330","url":null,"abstract":"With the vast usage of smart system devices, such as those used in 6G applications, that rely heavily on distributed machine learning technologies such as Federated Learning. Thus, there is an urgent need to provide a secure federated learning environment. The main challenge that faces federated Learning is thepoising attack. Therefore, this paper proposes a new framework for federated Learning that makes it more secure against GANs (Generative Adversarial Networks) attacks and Sybil attacks. The proposed framework is based on Federated Learning with Microsoft Confidential Consortium Framework (FED_CCF) to create a secure and reliable environment that deceives attackers of the federated learning environment. The performance of the proposed FED_CCF is evaluated using the MNIST dataset in terms of accuracy, where 30% of the devices were malicious devices represented by GAN or Sybil attacks. The experiment results of the proposed FED_CCF system show 96% better accuracy, with no effect of Sybil poisoning attacks, and only 0.18% of GAN poisoning attacks could affect it.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}