首页 > 最新文献

2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)最新文献

英文 中文
Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error 基于模糊逻辑和预测误差的秘密图像共享与隐写
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994325
C. Islamy, T. Ahmad, R. Ijtihadie
Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.
通过互联网传输数据可能会由于攻击者的非法访问而存在严重的安全风险。已经引入了一些方法来克服这个问题,例如密码学和隐写术。然而,仍然存在一些问题,如隐写数据的质量。具体来说,如果stego与某些用户共享,就会发生这种情况。在本研究中,将共享秘密机制与隐写术相结合。为此,利用模糊逻辑边缘检测和预测误差(PE)方法来隐藏私有数据。在封面图像中嵌入数据后进行秘密共享过程。这种共享机制在已转换为PE值的图像像素上执行。实验得到了各种峰值信噪比(PSNR)值。研究发现,参与者数量和阈值对股票的图像质量没有显著影响。
{"title":"Secret Image Sharing and Steganography based on Fuzzy Logic and Prediction Error","authors":"C. Islamy, T. Ahmad, R. Ijtihadie","doi":"10.1109/COMNETSAT56033.2022.9994325","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994325","url":null,"abstract":"Transmitting data through the internet may have severe security risks due to illegal access done by attackers. Some methods have been introduced to overcome this issue, such as cryptography and steganography. Nevertheless, some problems still arise, such as the quality of the stego data. Specifically, it happens if the stego is shared with some users. In this research, a shared-secret mechanism is combined with steganography. For this purpose, the fuzzy logic edge detection and Prediction Error (PE) methods are utilized to hide private data. The secret sharing process is carried out after data embedding in the cover image. This sharing mechanism is performed on image pixels that have been converted to PE values. Various Peak Signal to Noise Ratio (PSNR) values are obtained from the experiment. It is found that the number of participants and the threshold do not significantly affect the image quality of the shares.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Decision Tree Knowledge-based System for Reviewing Research Ethics Protocol 基于决策树知识的研究伦理协议评审系统
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994414
R. Anggraini, Nurul Fajrin Ariyani, A. F. Septiyanto, R. Sarno, Z. D. Meilani, Triono Soendoro
Knowledge base systems have undergone many developments in providing similar results to experts. This can help increase time effectiveness in determining decisions and analysis results. Several methods have given good results in determining decisions based on knowledge, one of which is using a decision tree. In this study, the researchers applied decision tree modeling to determine the results of the review on ethical research protocols. Our target is to classify ethical protocols into one of three decisions: Exempted, Expedited, or Full Board. Three decision tree models are used in this research to evaluate the best results that can predict the ethical review protocol results according to the expert's dataset. The experiments showed that all models showed the same result, with an accuracy value of 0,91, precision of 0,93, and recall of 0,91. However, manual checking showed that the second model with Gini criteria parameters and class weight balance resulted in 10 data correctly predicted based on the dataset used.
知识库系统在向专家提供类似结果方面经历了许多发展。这有助于提高决定决策和分析结果的时间效率。有几种方法在基于知识的决策中取得了很好的效果,其中一种是使用决策树。在这项研究中,研究人员应用决策树模型来确定伦理研究方案的审查结果。我们的目标是将伦理协议分为以下三种:豁免、加速或全面审议。本研究采用三种决策树模型,根据专家数据集对伦理审查方案结果的最佳预测结果进行评估。实验表明,所有模型结果一致,准确率为0.91,精密度为0.93,召回率为0.91。然而,人工检查表明,第二个模型与基尼标准参数和类权重平衡导致10个数据正确预测基于所使用的数据集。
{"title":"A Decision Tree Knowledge-based System for Reviewing Research Ethics Protocol","authors":"R. Anggraini, Nurul Fajrin Ariyani, A. F. Septiyanto, R. Sarno, Z. D. Meilani, Triono Soendoro","doi":"10.1109/COMNETSAT56033.2022.9994414","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994414","url":null,"abstract":"Knowledge base systems have undergone many developments in providing similar results to experts. This can help increase time effectiveness in determining decisions and analysis results. Several methods have given good results in determining decisions based on knowledge, one of which is using a decision tree. In this study, the researchers applied decision tree modeling to determine the results of the review on ethical research protocols. Our target is to classify ethical protocols into one of three decisions: Exempted, Expedited, or Full Board. Three decision tree models are used in this research to evaluate the best results that can predict the ethical review protocol results according to the expert's dataset. The experiments showed that all models showed the same result, with an accuracy value of 0,91, precision of 0,93, and recall of 0,91. However, manual checking showed that the second model with Gini criteria parameters and class weight balance resulted in 10 data correctly predicted based on the dataset used.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126717300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An IoT-Based System for Water Quality Monitoring and Notification System of Aquaculture Prawn Pond 基于物联网的养殖对虾池水质监测与通报系统
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994388
Ramzi Adriman, M. Fitria, A. Afdhal, Alfy Yusyfa Fernanda
The quality of pond water greatly affects the main factor of prawn survival and its aquaculture productivity. The checking process of the prawn pond water quality is generally very simple and is done manually by the cultivator. Thus, it is necessary to have a system that can assist the cultivator in monitoring the condition of the ponds at all times with accurate data. This work aims to develop an IoT-based system that not only monitors the quality of water in a prawn pond but also warns the users when the quality of the water pond is not in great condition. This system is constructed using several main components, namely the pH sensor, the salinity sensor, the ultrasonic sensor for reading the water level of the pond, and the microcontroller ESP32 to process all input data. The parameters read by the sensors are stored in cloud firebase to be forwarded and displayed on the Android application which is built in the flutter framework. The findings show that the components used in this experiment are feasible and run adequately, with 3.15% error for the water pH sensor, 0.8% error for the salinity sensor, and 0.63% for the ultrasonic sensor. The evaluation results showed that the system can proficiently monitor the water condition, as well as send a notification to the user when the parameter values are not in a normal range.
池塘水质对对虾的生存和养殖生产力有着重要的影响。对虾池水质的检查过程一般很简单,由养殖户手工完成。因此,有必要有一个系统,可以帮助栽培者监测池塘的状况,在任何时候都有准确的数据。这项工作的目标是开发一种IoT-based系统,不仅监控质量的对虾池塘中的水还警告用户当水盘的质量不是在伟大的条件。本系统主要由pH传感器、盐度传感器、读取池塘水位的超声波传感器和单片机ESP32处理输入数据组成。传感器读取的参数存储在cloud firebase中,然后转发并显示在构建在flutter框架中的Android应用程序上。实验结果表明,实验中使用的元件是可行的,运行良好,pH值传感器误差3.15%,盐度传感器误差0.8%,超声波传感器误差0.63%。评估结果表明,该系统能够熟练地监测水情,并在参数值不在正常范围内时向用户发送通知。
{"title":"An IoT-Based System for Water Quality Monitoring and Notification System of Aquaculture Prawn Pond","authors":"Ramzi Adriman, M. Fitria, A. Afdhal, Alfy Yusyfa Fernanda","doi":"10.1109/COMNETSAT56033.2022.9994388","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994388","url":null,"abstract":"The quality of pond water greatly affects the main factor of prawn survival and its aquaculture productivity. The checking process of the prawn pond water quality is generally very simple and is done manually by the cultivator. Thus, it is necessary to have a system that can assist the cultivator in monitoring the condition of the ponds at all times with accurate data. This work aims to develop an IoT-based system that not only monitors the quality of water in a prawn pond but also warns the users when the quality of the water pond is not in great condition. This system is constructed using several main components, namely the pH sensor, the salinity sensor, the ultrasonic sensor for reading the water level of the pond, and the microcontroller ESP32 to process all input data. The parameters read by the sensors are stored in cloud firebase to be forwarded and displayed on the Android application which is built in the flutter framework. The findings show that the components used in this experiment are feasible and run adequately, with 3.15% error for the water pH sensor, 0.8% error for the salinity sensor, and 0.63% for the ultrasonic sensor. The evaluation results showed that the system can proficiently monitor the water condition, as well as send a notification to the user when the parameter values are not in a normal range.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133954193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
LoRA Gateway Coverage and Capacity Analysis in Urban Area For IoT Smart Gas Meter Demand 面向物联网智能燃气表需求的城市LoRA网关覆盖和容量分析
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994514
Kalam Adhiansyah Lutfie, Prima Dewi Purnamasari, D. Gunawan, I. K. Agung Enriko
Today, the deployment of LoRa gateway in Indonesia uses only traditional methods by predicting the coverage and capacity without using formulas related to LoRa gateway performance or considering area type (urban, suburban or rural). This paper conducts the study and research for coverage and capacity analysis of LoRa Gateway to cover all sensor device demands. The formula is calculated to save more resources and optimize the performance of the LoRa gateway covering all demands needed for Smart Gas Meter devices in Urban areas. The location taken as a model is Jakarta City. In order to obtain the number of gateways to cover all smart gas meter demands, this paper uses the Okumura-Hata formula to obtain coverage prediction for each gateway. It uses time on air and interval concepts to determine capacity per interval times. The calculation result is about 4 LoRa gateways need to be deployed, and the interval of transmission data is about once per 35 minutes to cover all Smart Gas Meter devices in Jakarta.
目前,在印度尼西亚部署LoRa网关仅使用传统方法预测覆盖范围和容量,而不使用与LoRa网关性能相关的公式或考虑区域类型(城市、郊区或农村)。本文对LoRa网关的覆盖范围和容量分析进行了研究,以满足所有传感器设备的需求。计算公式是为了节省更多的资源并优化LoRa网关的性能,覆盖城市地区智能燃气表设备所需的所有需求。以雅加达市为例。为了得到能够覆盖所有智能燃气表需求的网关数量,本文采用Okumura-Hata公式对每个网关进行覆盖预测。它使用播放时间和间隔概念来确定每个间隔时间的容量。计算结果表明,需要部署约4个LoRa网关,传输数据的间隔时间约为每35分钟一次,覆盖雅加达所有智能燃气表设备。
{"title":"LoRA Gateway Coverage and Capacity Analysis in Urban Area For IoT Smart Gas Meter Demand","authors":"Kalam Adhiansyah Lutfie, Prima Dewi Purnamasari, D. Gunawan, I. K. Agung Enriko","doi":"10.1109/COMNETSAT56033.2022.9994514","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994514","url":null,"abstract":"Today, the deployment of LoRa gateway in Indonesia uses only traditional methods by predicting the coverage and capacity without using formulas related to LoRa gateway performance or considering area type (urban, suburban or rural). This paper conducts the study and research for coverage and capacity analysis of LoRa Gateway to cover all sensor device demands. The formula is calculated to save more resources and optimize the performance of the LoRa gateway covering all demands needed for Smart Gas Meter devices in Urban areas. The location taken as a model is Jakarta City. In order to obtain the number of gateways to cover all smart gas meter demands, this paper uses the Okumura-Hata formula to obtain coverage prediction for each gateway. It uses time on air and interval concepts to determine capacity per interval times. The calculation result is about 4 LoRa gateways need to be deployed, and the interval of transmission data is about once per 35 minutes to cover all Smart Gas Meter devices in Jakarta.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"40 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Filter Design for FBMC-OQAM Transceiver FBMC-OQAM收发器线性滤波器设计
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994517
D. Mattera, M. Tanda
The filter bank multicarrier offset-QAM transceiver is increasingly investigated for its use in multiple-access uplink scenario. The use of the filter bank multicarrier transceiver, however, is attractive when a simple equalizer with a few taps is able to perform correct equalization. In this paper it is provided an extension of a general matrix description of the considered transceiver that is much useful for correctly setting the overall number of subcarriers for which simple channel equalization is possible. The obtained frequency-domain description allows the derivation of a class of simple receiver equalizers; two examples of possible equalizer derivations are provided.
滤波器组多载波偏移qam收发器在多址上行场景中的应用越来越受到人们的关注。使用滤波器组多载波收发器,然而,是有吸引力的,当一个简单的均衡器与几个抽头能够执行正确的均衡。本文提供了所考虑的收发器的一般矩阵描述的扩展,这对于正确设置可能实现简单信道均衡的子载波总数非常有用。所获得的频域描述允许推导一类简单的接收器均衡器;提供了两个可能的均衡器推导的例子。
{"title":"Linear Filter Design for FBMC-OQAM Transceiver","authors":"D. Mattera, M. Tanda","doi":"10.1109/COMNETSAT56033.2022.9994517","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994517","url":null,"abstract":"The filter bank multicarrier offset-QAM transceiver is increasingly investigated for its use in multiple-access uplink scenario. The use of the filter bank multicarrier transceiver, however, is attractive when a simple equalizer with a few taps is able to perform correct equalization. In this paper it is provided an extension of a general matrix description of the considered transceiver that is much useful for correctly setting the overall number of subcarriers for which simple channel equalization is possible. The obtained frequency-domain description allows the derivation of a class of simple receiver equalizers; two examples of possible equalizer derivations are provided.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Performance Analysis of Hybrid SDN–IP Reactive Routing on ONOS Controller in Tree Topologies 树状拓扑下ONOS控制器上SDN-IP混合响应路由的性能分析
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994460
Bongga Arifwidodo, Donny Arief Oktavian, Jafaruddin Gustri Amri Ginting
Software Defined Networking (SDN) is a new concept for managing a computer network. In the implementation, the SDN network has difficulties connecting with a traditional IP network. The Open Network Operating System Controller (ONOS) has an application for connecting SDN networks and traditional IP networks via BGP, which is SDN-IP. SDN-IP will convert the BGP route packets obtained from BGP Speakers into intents. The ONOS controller will process these intents into an Openflow route which will be forwarded to the data plane. Reactive SDN-IP routing computes and creates traffic paths between the SDN network and the traditional IP network so that both networks can communicate with one another. Hybrid SDN is an SDN network, and a traditional IP network runs side by side. This research will test the Quality of Service on the Hybrid SDN network with two scenarios. Results of network quality measurement show that the use of the TCP protocol produces an average throughput value of 52.9836 Mbps and a delay of 0.15096 ms in the scenario of a traditional IP network to an SDN network, which is better than a traditional IP network to a traditional IP network over an SDN network.
软件定义网络(SDN)是管理计算机网络的一个新概念。在实现过程中,SDN网络与传统IP网络的连接存在困难。ONOS (Open Network Operating System Controller)有一种通过BGP连接SDN网络和传统IP网络的应用,即SDN-IP。SDN-IP将从BGP speaker获得的BGP路由报文转换为意图。ONOS控制器将把这些意图处理成Openflow路由,该路由将被转发到数据平面。响应式SDN-IP路由通过计算和创建SDN网络与传统IP网络之间的流量路径,实现SDN网络与传统IP网络之间的通信。混合SDN是一种SDN网络,与传统的IP网络并行运行。本研究将通过两种场景对混合SDN网络的业务质量进行测试。网络质量测量结果表明,使用TCP协议从传统IP网络到SDN网络的平均吞吐量为52.9836 Mbps,时延为0.15096 ms,优于传统IP网络通过SDN网络到传统IP网络。
{"title":"The Performance Analysis of Hybrid SDN–IP Reactive Routing on ONOS Controller in Tree Topologies","authors":"Bongga Arifwidodo, Donny Arief Oktavian, Jafaruddin Gustri Amri Ginting","doi":"10.1109/COMNETSAT56033.2022.9994460","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994460","url":null,"abstract":"Software Defined Networking (SDN) is a new concept for managing a computer network. In the implementation, the SDN network has difficulties connecting with a traditional IP network. The Open Network Operating System Controller (ONOS) has an application for connecting SDN networks and traditional IP networks via BGP, which is SDN-IP. SDN-IP will convert the BGP route packets obtained from BGP Speakers into intents. The ONOS controller will process these intents into an Openflow route which will be forwarded to the data plane. Reactive SDN-IP routing computes and creates traffic paths between the SDN network and the traditional IP network so that both networks can communicate with one another. Hybrid SDN is an SDN network, and a traditional IP network runs side by side. This research will test the Quality of Service on the Hybrid SDN network with two scenarios. Results of network quality measurement show that the use of the TCP protocol produces an average throughput value of 52.9836 Mbps and a delay of 0.15096 ms in the scenario of a traditional IP network to an SDN network, which is better than a traditional IP network to a traditional IP network over an SDN network.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127485391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Designing QPSK Modulator Using LTspice-Based Discrete Components 基于ltspice的离散元件设计QPSK调制器
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994317
Andicho Haryus Wirasapta, Prapto Nugroho, S. Wibowo
QPSK (Quadrature Phase Shift Keying) is one of the digital modulation techniques that can encode two bits per symbol based on data that has been divided into two parts, namely even data bits and odd data bits to minimize the bit error rate (BER). In this research, a QPSK modulator is designed using discrete components based on LTspice in order to support developments in digital communication systems for information exchange especially for low frequency applications. LTspice is powerful for examining designs and for predicting the characteristics of electronic circuits. And, discrete components are chosen because the required components are widely available and obtained in the market, so it is easy to implement into a QPSK modulator. QPSK modulator consist of data sources, odd-even data dividers, carrier signals, balanced modulator, odd-even modulated signals and OpAmp circuits. After the entire cicuits of QPSK modulator have been designed by using LTspice, then simulation testing can be carried out in each circuit and the whole, so that it can be known whether the circuit is worked properly. After the testing has been carried out, it was found that the output in each circuit and overall modulator was in accordance with the expected where the QPSK modulator was able to generate a QPSK modulated wave with a frequency of 2 MHz and a data frequency of 500 kHz. This result can be used as a reference to be implemented into a prototype, because based on the simulation results can be implemented to the next development.
QPSK (Quadrature Phase Shift keyying,正交相移键控)是一种数字调制技术,它可以将数据分成两部分,即偶数数据位和奇数数据位,对每个符号进行2位编码,以最小化误码率(BER)。在本研究中,使用基于LTspice的离散元件设计了QPSK调制器,以支持数字通信系统中信息交换的发展,特别是低频应用。LTspice在检查设计和预测电子电路特性方面功能强大。并且,由于所需元件在市场上广泛可用,因此选择离散元件,因此易于实现到QPSK调制器中。QPSK调制器由数据源、奇偶数据分频器、载波信号、平衡调制器、奇偶调制信号和OpAmp电路组成。在使用LTspice对QPSK调制器的整个电路进行设计之后,可以对每个电路和整个电路进行仿真测试,从而知道电路是否正常工作。经过测试,发现各电路和整体调制器的输出符合预期,其中QPSK调制器能够产生频率为2mhz,数据频率为500khz的QPSK调制波。这个结果可以作为参考来实现成原型,因为基于仿真结果可以实现到下一步的开发。
{"title":"Designing QPSK Modulator Using LTspice-Based Discrete Components","authors":"Andicho Haryus Wirasapta, Prapto Nugroho, S. Wibowo","doi":"10.1109/COMNETSAT56033.2022.9994317","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994317","url":null,"abstract":"QPSK (Quadrature Phase Shift Keying) is one of the digital modulation techniques that can encode two bits per symbol based on data that has been divided into two parts, namely even data bits and odd data bits to minimize the bit error rate (BER). In this research, a QPSK modulator is designed using discrete components based on LTspice in order to support developments in digital communication systems for information exchange especially for low frequency applications. LTspice is powerful for examining designs and for predicting the characteristics of electronic circuits. And, discrete components are chosen because the required components are widely available and obtained in the market, so it is easy to implement into a QPSK modulator. QPSK modulator consist of data sources, odd-even data dividers, carrier signals, balanced modulator, odd-even modulated signals and OpAmp circuits. After the entire cicuits of QPSK modulator have been designed by using LTspice, then simulation testing can be carried out in each circuit and the whole, so that it can be known whether the circuit is worked properly. After the testing has been carried out, it was found that the output in each circuit and overall modulator was in accordance with the expected where the QPSK modulator was able to generate a QPSK modulated wave with a frequency of 2 MHz and a data frequency of 500 kHz. This result can be used as a reference to be implemented into a prototype, because based on the simulation results can be implemented to the next development.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122191000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method 采用SSL和L2TP IPSec方式的VoIP服务质量分析
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994572
Erryc Darmawan, S. Budiyanto, L. M. Silalahi
This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme. VoIP requires QoS (Quality of Service) because it is very sensitive to loss and delay of information packets. The novelty of this research is to compare the performance generated on several VPN security system mechanisms that use the L2TP IPSEC (Layer 2 Tunnelling Protocol Security) and SSL (Secure Socket Layer) methods. The purpose of this research is to obtain a VoIP security system mechanism and analyze delay, jitter, throughput, and packet loss as well as MOS (Mean Opinion Score) measurements. This research is expected to produce a model of best practice of applying QoS VoIP to network security systems The proposed research method is qualitative and objective studies. This research resulted in VoIP performance with an average delay on Forticlient SSL VPN of 7,804 ms while the average delay on L2TP IPSEC VPN was 9,787 ms and the average for forticlient SSL VPN jitter was 7,804 ms while the average jitter for L2TP IPSEC VPN was 9,786 ms. These results show that the SSL method's VoIP performance is better than the L2TP IPSec method, and jitter shows the L2TP IPSec method is better than the SSL method.
本研究背景始于VoIP(互联网协议语音)服务,它允许共享信息、通信,并成为WFH(在家工作)方案的支持优先部分。由于VoIP对信息包的丢失和延迟非常敏感,因此需要QoS (Quality of Service)。本研究的新颖之处在于比较了使用L2TP IPSEC(第二层隧道协议安全)和SSL(安全套接字层)方法的几种VPN安全系统机制所产生的性能。本研究的目的是获得一个VoIP安全系统机制,并分析延迟、抖动、吞吐量、丢包以及MOS (Mean Opinion Score)测量。本研究期望产生一个将QoS VoIP应用于网络安全系统的最佳实践模型。建议的研究方法是定性和客观的研究。研究结果表明,VoIP性能中,Forticlient SSL VPN的平均延迟为7804 ms, L2TP IPSEC VPN的平均延迟为9787 ms, Forticlient SSL VPN的平均抖动为7804 ms, L2TP IPSEC VPN的平均抖动为9786 ms。这些结果表明SSL方式的VoIP性能优于L2TP方式,而抖动表明L2TP方式优于SSL方式。
{"title":"QoS Analysis on VoIP with VPN using SSL and L2TP IPSec Method","authors":"Erryc Darmawan, S. Budiyanto, L. M. Silalahi","doi":"10.1109/COMNETSAT56033.2022.9994572","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994572","url":null,"abstract":"This research background began with the VoIP (Voice over Internet Protocol) service which allows to share information, communicate, and become a supporting priority part of the WFH (Work from Home) scheme. VoIP requires QoS (Quality of Service) because it is very sensitive to loss and delay of information packets. The novelty of this research is to compare the performance generated on several VPN security system mechanisms that use the L2TP IPSEC (Layer 2 Tunnelling Protocol Security) and SSL (Secure Socket Layer) methods. The purpose of this research is to obtain a VoIP security system mechanism and analyze delay, jitter, throughput, and packet loss as well as MOS (Mean Opinion Score) measurements. This research is expected to produce a model of best practice of applying QoS VoIP to network security systems The proposed research method is qualitative and objective studies. This research resulted in VoIP performance with an average delay on Forticlient SSL VPN of 7,804 ms while the average delay on L2TP IPSEC VPN was 9,787 ms and the average for forticlient SSL VPN jitter was 7,804 ms while the average jitter for L2TP IPSEC VPN was 9,786 ms. These results show that the SSL method's VoIP performance is better than the L2TP IPSec method, and jitter shows the L2TP IPSec method is better than the SSL method.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116948957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flood Identification with Fuzzy Logic Based on Rainfall and Weather for Smart City Implementation 基于降雨和天气的模糊洪水识别在智慧城市中的应用
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994512
B. Kindhi, Masca Indra Triana, Umi Laili Yuhana, S. Damarnegara, Fivitria Istiqomah, Muhammad Hafiizh Imaaduddiin
Flood is one of the problems that often occur in big cities, one of which is Surabaya. This arises due to various factors, including changes in land use, relatively high rainfall, and an inadequate drainage system. Floods in several places in Surabaya are basically caused by the unavailability of ditches and places to drain rainwater. This causes rainwater to fall directly onto the road and cause air impacts. One way to anticipate flooding is to know the conditions that trigger flooding, namely rainfall and air temperature. In this study, a classification system for the level of rainfall and air temperature is proposed which affects flooding. The method we propose is fuzzy logic with the Mamdani approach. Our data set is real temperature and rainfall data in the city of Surabaya from 2017 to 2020. The test results from our proposed method, it can be analyzed that fuzzy logic can also study the relationship and degree between temperature and rainfall so as to result in the condition of the city in that month to predict there will be flooding or not.
洪水是大城市经常发生的问题之一,泗水就是其中之一。这是由多种因素造成的,包括土地用途的变化、相对较高的降雨量和排水系统不足。泗水几个地方的洪水基本上是由于没有沟渠和排水场所造成的。这导致雨水直接落在道路上,造成空气影响。预测洪水的一种方法是了解引发洪水的条件,即降雨量和气温。在本研究中,提出了影响洪水的降雨和气温水平的分类系统。我们提出的方法是模糊逻辑与Mamdani方法。我们的数据集是泗水市从2017年到2020年的真实温度和降雨量数据。从我们提出的方法的测试结果可以分析,模糊逻辑还可以研究温度与降雨之间的关系和程度,从而得出该月城市的情况来预测是否会发生洪水。
{"title":"Flood Identification with Fuzzy Logic Based on Rainfall and Weather for Smart City Implementation","authors":"B. Kindhi, Masca Indra Triana, Umi Laili Yuhana, S. Damarnegara, Fivitria Istiqomah, Muhammad Hafiizh Imaaduddiin","doi":"10.1109/COMNETSAT56033.2022.9994512","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994512","url":null,"abstract":"Flood is one of the problems that often occur in big cities, one of which is Surabaya. This arises due to various factors, including changes in land use, relatively high rainfall, and an inadequate drainage system. Floods in several places in Surabaya are basically caused by the unavailability of ditches and places to drain rainwater. This causes rainwater to fall directly onto the road and cause air impacts. One way to anticipate flooding is to know the conditions that trigger flooding, namely rainfall and air temperature. In this study, a classification system for the level of rainfall and air temperature is proposed which affects flooding. The method we propose is fuzzy logic with the Mamdani approach. Our data set is real temperature and rainfall data in the city of Surabaya from 2017 to 2020. The test results from our proposed method, it can be analyzed that fuzzy logic can also study the relationship and degree between temperature and rainfall so as to result in the condition of the city in that month to predict there will be flooding or not.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigated Insider and Outsider Attacks on the Federated Learning Systems 调查联邦学习系统的内部和外部攻击
Pub Date : 2022-11-03 DOI: 10.1109/COMNETSAT56033.2022.9994330
Ibrahim M. Ahmed, Manar Kashmoola
With the vast usage of smart system devices, such as those used in 6G applications, that rely heavily on distributed machine learning technologies such as Federated Learning. Thus, there is an urgent need to provide a secure federated learning environment. The main challenge that faces federated Learning is thepoising attack. Therefore, this paper proposes a new framework for federated Learning that makes it more secure against GANs (Generative Adversarial Networks) attacks and Sybil attacks. The proposed framework is based on Federated Learning with Microsoft Confidential Consortium Framework (FED_CCF) to create a secure and reliable environment that deceives attackers of the federated learning environment. The performance of the proposed FED_CCF is evaluated using the MNIST dataset in terms of accuracy, where 30% of the devices were malicious devices represented by GAN or Sybil attacks. The experiment results of the proposed FED_CCF system show 96% better accuracy, with no effect of Sybil poisoning attacks, and only 0.18% of GAN poisoning attacks could affect it.
随着智能系统设备(如6G应用程序中使用的设备)的广泛使用,这些设备严重依赖分布式机器学习技术,如联邦学习。因此,迫切需要提供一个安全的联邦学习环境。联邦学习面临的主要挑战是攻击。因此,本文提出了一种新的联邦学习框架,使其在对抗gan(生成对抗网络)攻击和Sybil攻击时更加安全。该框架基于联邦学习与微软机密联盟框架(FED_CCF),以创建一个安全可靠的环境,欺骗联邦学习环境的攻击者。使用MNIST数据集对所提出的FED_CCF的性能进行了准确性评估,其中30%的设备是由GAN或Sybil攻击代表的恶意设备。实验结果表明,FED_CCF系统的准确率提高了96%,不受Sybil中毒攻击的影响,仅受0.18%的GAN中毒攻击的影响。
{"title":"Investigated Insider and Outsider Attacks on the Federated Learning Systems","authors":"Ibrahim M. Ahmed, Manar Kashmoola","doi":"10.1109/COMNETSAT56033.2022.9994330","DOIUrl":"https://doi.org/10.1109/COMNETSAT56033.2022.9994330","url":null,"abstract":"With the vast usage of smart system devices, such as those used in 6G applications, that rely heavily on distributed machine learning technologies such as Federated Learning. Thus, there is an urgent need to provide a secure federated learning environment. The main challenge that faces federated Learning is thepoising attack. Therefore, this paper proposes a new framework for federated Learning that makes it more secure against GANs (Generative Adversarial Networks) attacks and Sybil attacks. The proposed framework is based on Federated Learning with Microsoft Confidential Consortium Framework (FED_CCF) to create a secure and reliable environment that deceives attackers of the federated learning environment. The performance of the proposed FED_CCF is evaluated using the MNIST dataset in terms of accuracy, where 30% of the devices were malicious devices represented by GAN or Sybil attacks. The experiment results of the proposed FED_CCF system show 96% better accuracy, with no effect of Sybil poisoning attacks, and only 0.18% of GAN poisoning attacks could affect it.","PeriodicalId":221444,"journal":{"name":"2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)","volume":"353 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132381061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 IEEE International Conference on Communication, Networks and Satellite (COMNETSAT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1