Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272892
Rita Rahmawati, D. Lestari
Recognition of dialect is a field of research in the field of language recognition. The purpose of this study is to compare the best modelling features and techniques for recognizing Javanese and Sundanese dialects in Indonesian speech using MFCC and combination of MFCC and pitch feature candidates and comparing GMM and I-Vector modelling techniques. This research uses machine learning approach for training process and model testing. As a result, the use of the combination of MFCC and pitch feature and the I-Vector modelling technique has the advantage to recognize Java and Sunda dialect.
{"title":"Java and Sunda dialect recognition from Indonesian speech using GMM and I-Vector","authors":"Rita Rahmawati, D. Lestari","doi":"10.1109/TSSA.2017.8272892","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272892","url":null,"abstract":"Recognition of dialect is a field of research in the field of language recognition. The purpose of this study is to compare the best modelling features and techniques for recognizing Javanese and Sundanese dialects in Indonesian speech using MFCC and combination of MFCC and pitch feature candidates and comparing GMM and I-Vector modelling techniques. This research uses machine learning approach for training process and model testing. As a result, the use of the combination of MFCC and pitch feature and the I-Vector modelling technique has the advantage to recognize Java and Sunda dialect.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272916
Johan Candra, O. Briliyant, Sion Rebeca Tamba
The biggest challenge in information security planning is how to acquire precision in the gap analysis phase. According to the information security management system (ISMS) implementation guide based on ISO/IEC 27001:2013, the planning of ISMS has 5 stages. The 5 stages are : defining the range, perform gap analysis, accomplish risk assessment, determine the control and target, and determine the policy and procedure of ISMS. The gap analysis stage is required to assess the organization's current position toward ISMS implementation. This research suggested the use of AHP to determine which information security control that most relate to the organization needs and goals. We will conduct the process in one of Indonesia's organization called the XYZ institute. The result of this research is prioritization of information security gap handling that will be useful for XYZ institute to support their processes of ISO/IEC 27001:2013 implementation.
{"title":"ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (Case study : XYZ institute)","authors":"Johan Candra, O. Briliyant, Sion Rebeca Tamba","doi":"10.1109/TSSA.2017.8272916","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272916","url":null,"abstract":"The biggest challenge in information security planning is how to acquire precision in the gap analysis phase. According to the information security management system (ISMS) implementation guide based on ISO/IEC 27001:2013, the planning of ISMS has 5 stages. The 5 stages are : defining the range, perform gap analysis, accomplish risk assessment, determine the control and target, and determine the policy and procedure of ISMS. The gap analysis stage is required to assess the organization's current position toward ISMS implementation. This research suggested the use of AHP to determine which information security control that most relate to the organization needs and goals. We will conduct the process in one of Indonesia's organization called the XYZ institute. The result of this research is prioritization of information security gap handling that will be useful for XYZ institute to support their processes of ISO/IEC 27001:2013 implementation.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272914
Levin Kusuma Adiatma Nie, S. Haryadi
This research is focused in a formula called Haryadi Index, which implemented in the assessment of telco industry. This formula will be contested with the other existing formula to gauge competition level, equality level, fairness level, and correlation level. The Herfindahl-Hirschman Index will be compared against Haryadi Index for competition level, Gini Index will be compared for equality level, Jain Index for fairness level, and Pearson Correlation for the correlation level calculation. The research produces the following : (1) Haryadi Index can provide better number for an industry with a different level of competition, whereas the Herfindahl-Hirschman Index do worse; (2) Haryadi Index has more precise equality level coefficient than the Gini Index; (3) Haryadi Index can give more appropriate indexes for a variety levels of fairness, while Jain Index gives a relatively bigger indexes for a variety levels of fairness; (4) Haryadi Index gives a new alternative for correlation counting which refer to the linear equation, while more research will be needed to find the better situation to use the Haryadi Index or the Pearson Correlation appropriately.
{"title":"Comparison of the Haryadi Index with existing method in competition, equality, fairness, and correlation level calculation: Case study: Telecommunication industry","authors":"Levin Kusuma Adiatma Nie, S. Haryadi","doi":"10.1109/TSSA.2017.8272914","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272914","url":null,"abstract":"This research is focused in a formula called Haryadi Index, which implemented in the assessment of telco industry. This formula will be contested with the other existing formula to gauge competition level, equality level, fairness level, and correlation level. The Herfindahl-Hirschman Index will be compared against Haryadi Index for competition level, Gini Index will be compared for equality level, Jain Index for fairness level, and Pearson Correlation for the correlation level calculation. The research produces the following : (1) Haryadi Index can provide better number for an industry with a different level of competition, whereas the Herfindahl-Hirschman Index do worse; (2) Haryadi Index has more precise equality level coefficient than the Gini Index; (3) Haryadi Index can give more appropriate indexes for a variety levels of fairness, while Jain Index gives a relatively bigger indexes for a variety levels of fairness; (4) Haryadi Index gives a new alternative for correlation counting which refer to the linear equation, while more research will be needed to find the better situation to use the Haryadi Index or the Pearson Correlation appropriately.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272903
O. Briliyant, Ahmad Baihaqi
E-learning systems today focuses on wide accessibility which is relatively contradictive to security. But as the cyber landscape has changed, so is the cyber security threat that follows. Security is needed to prevent from cyber threat such as data theft, modification, and fabrication, especially in a web-based environment. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in PHP and Javascript programming. Secure Electronic Learning System (SELS) application is designed to accommodate security services, such as confidentiality, integrity, authentication, and non-repudiation. Encryption to provide confidentiality services in file exchange process. Digital signature used to provide integrity, authentication, and non-repudiation in the access control and file exchange processes. Moreover, application can give information about file modification with notification to users. We demonstrated the implementation of cryptography in SELS can prevent data theft, illegal access, data modification or fabrication and is proven on the test.
{"title":"Implementation of RSA 2048-bit and AES 128-bit for Secure e-learning web-based application","authors":"O. Briliyant, Ahmad Baihaqi","doi":"10.1109/TSSA.2017.8272903","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272903","url":null,"abstract":"E-learning systems today focuses on wide accessibility which is relatively contradictive to security. But as the cyber landscape has changed, so is the cyber security threat that follows. Security is needed to prevent from cyber threat such as data theft, modification, and fabrication, especially in a web-based environment. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in PHP and Javascript programming. Secure Electronic Learning System (SELS) application is designed to accommodate security services, such as confidentiality, integrity, authentication, and non-repudiation. Encryption to provide confidentiality services in file exchange process. Digital signature used to provide integrity, authentication, and non-repudiation in the access control and file exchange processes. Moreover, application can give information about file modification with notification to users. We demonstrated the implementation of cryptography in SELS can prevent data theft, illegal access, data modification or fabrication and is proven on the test.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130542846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things (IoT) brings millions of devices, in the form of sensor, actuator, or embedded electronic devices interconnected through the Internet. Monitoring abundant of IoT devices is a big challenge, especially in a constrained condition of sensor nodes (e.g. limited CPU, memory, and battery). Therefore, a good monitoring system with an efficient monitoring protocol is often needed to compensate the limited resources of sensor nodes. SNMP is a protocol that widely used for a monitoring system. However, SNMP was developed without taking into account of devices with limited resources. This paper presents a proposed prototype of a light weight monitoring system based on agent-manager model. The testing result shows that the developed prototype system generates smaller packet sizes than the SNMP-based monitoring system on the same function and shows a low CPU and memory usage in monitoring thousands of devices.
{"title":"Lightweight monitoring system for IOT devices","authors":"Widhi Yahya, Achmad Basuki, Eko Sakti, Frondy Fernanda","doi":"10.1109/TSSA.2017.8272897","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272897","url":null,"abstract":"The Internet of Things (IoT) brings millions of devices, in the form of sensor, actuator, or embedded electronic devices interconnected through the Internet. Monitoring abundant of IoT devices is a big challenge, especially in a constrained condition of sensor nodes (e.g. limited CPU, memory, and battery). Therefore, a good monitoring system with an efficient monitoring protocol is often needed to compensate the limited resources of sensor nodes. SNMP is a protocol that widely used for a monitoring system. However, SNMP was developed without taking into account of devices with limited resources. This paper presents a proposed prototype of a light weight monitoring system based on agent-manager model. The testing result shows that the developed prototype system generates smaller packet sizes than the SNMP-based monitoring system on the same function and shows a low CPU and memory usage in monitoring thousands of devices.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272933
A. Bhawiyuga, Mahendra Data, Andri Warda
An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time.
{"title":"Architectural design of token based authentication of MQTT protocol in constrained IoT device","authors":"A. Bhawiyuga, Mahendra Data, Andri Warda","doi":"10.1109/TSSA.2017.8272933","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272933","url":null,"abstract":"An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272941
L. V. Yovita, N. Syambas
Named Data Network (NDN) is a network architecture with a content-centric paradigm, in which the consumer has a certain interest in a content. Requests for data are performed based on the content, not to specific server or producer so that the response to the requested content can be performed by the NDN router, not only by the server or producer. NDN causes data traffic more efficient because the request will be served by the node that closest to the consumer who has the content in its Content Storage. In this research, the performance of NDN is tested based on changes in the size of Content Storage as one of the structures in NDN, and also the changes of frequency of interest. The contribution of this research is to study the effect of the content storage size and the number of frequency of interest on NDN performance, from the network point of view and user point of view. This research use Abilene network topology. The performance will be analyzed from average delay and cache hit ratio as the user centric metrics, and also the data circulation, number of interest message retransmission and packet drop as a network centric metrics. Simulation results show that the size of Content Storage greatly affects the efficiency of data transmission in the NDN network. The smaller the size of Content Storage relatively compared to the number of consumer demand, the greater the network load. Data circulation becomes larger, delay and packet drop increases, the number of packets retransmission increases and the cache hit ratio deteriorates. The provision of Content Storage of the optimum size makes the data transmission on the NDN network efficient. The higher number of frequency of interest, the worse the performance of the system.
{"title":"Content storage effect on the named data network traffic load","authors":"L. V. Yovita, N. Syambas","doi":"10.1109/TSSA.2017.8272941","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272941","url":null,"abstract":"Named Data Network (NDN) is a network architecture with a content-centric paradigm, in which the consumer has a certain interest in a content. Requests for data are performed based on the content, not to specific server or producer so that the response to the requested content can be performed by the NDN router, not only by the server or producer. NDN causes data traffic more efficient because the request will be served by the node that closest to the consumer who has the content in its Content Storage. In this research, the performance of NDN is tested based on changes in the size of Content Storage as one of the structures in NDN, and also the changes of frequency of interest. The contribution of this research is to study the effect of the content storage size and the number of frequency of interest on NDN performance, from the network point of view and user point of view. This research use Abilene network topology. The performance will be analyzed from average delay and cache hit ratio as the user centric metrics, and also the data circulation, number of interest message retransmission and packet drop as a network centric metrics. Simulation results show that the size of Content Storage greatly affects the efficiency of data transmission in the NDN network. The smaller the size of Content Storage relatively compared to the number of consumer demand, the greater the network load. Data circulation becomes larger, delay and packet drop increases, the number of packets retransmission increases and the cache hit ratio deteriorates. The provision of Content Storage of the optimum size makes the data transmission on the NDN network efficient. The higher number of frequency of interest, the worse the performance of the system.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"82 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272932
Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood
The behavior of asynchronous hardware system is crucial and practically assured using the formal verification techniques. A signal transition graph is one of the effective alternatives to represent the behavioral design of a huge asynchronous system. The design could be verified beforehand to assure several essential properties including its consistency property. In this paper, the formal modeling scheme of a signal transition graph is proposed along with the consistency property in term of the linear temporal formula. The target signal transition graph is written in Promela code and verified using SPIN model checker. The result shows that the method can verify consistency property automatically.
{"title":"Formal modeling for consistency checking of signal transition graph","authors":"Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood","doi":"10.1109/TSSA.2017.8272932","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272932","url":null,"abstract":"The behavior of asynchronous hardware system is crucial and practically assured using the formal verification techniques. A signal transition graph is one of the effective alternatives to represent the behavioral design of a huge asynchronous system. The design could be verified beforehand to assure several essential properties including its consistency property. In this paper, the formal modeling scheme of a signal transition graph is proposed along with the consistency property in term of the linear temporal formula. The target signal transition graph is written in Promela code and verified using SPIN model checker. The result shows that the method can verify consistency property automatically.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds.
{"title":"Topic based IoT data storage framework for heterogeneous sensor data","authors":"Eko Sakti Pramukantoro, Widhi Yahya, Gabreil Arganata, A. Bhawiyuga, Achmad Basuki","doi":"10.1109/TSSA.2017.8272895","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272895","url":null,"abstract":"Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-01DOI: 10.1109/TSSA.2017.8272935
M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir
This paper presents the wideband monofilar helical antenna which is aimed to increase low level signal reception commonly occurs in the remote area such as highlands, ridge, and borderlands. The use of helical antenna type is due to its ability in producing circularly polarized wave useful to support wireless communication frequently surrounded by some obstructions. The proposed antenna is expected to operate at wideband frequency range including cellular communication and connectable to the GSM modem associated with a laptop or PC device. The antenna is designed by using thin copper wire with spiral turn number of 8 and fed through a 50Ω female N-connector type. The proposed monofilar helical antenna is then realized based on the optimum design for experimental characterization. The measurement result shows that the realized antenna has working frequency from 1200 MHz to 2250 MHz and has the gain up to 14.5 dBi.
{"title":"Wideband monofilar helical antenna for wireless communication in remote area","authors":"M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir","doi":"10.1109/TSSA.2017.8272935","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272935","url":null,"abstract":"This paper presents the wideband monofilar helical antenna which is aimed to increase low level signal reception commonly occurs in the remote area such as highlands, ridge, and borderlands. The use of helical antenna type is due to its ability in producing circularly polarized wave useful to support wireless communication frequently surrounded by some obstructions. The proposed antenna is expected to operate at wideband frequency range including cellular communication and connectable to the GSM modem associated with a laptop or PC device. The antenna is designed by using thin copper wire with spiral turn number of 8 and fed through a 50Ω female N-connector type. The proposed monofilar helical antenna is then realized based on the optimum design for experimental characterization. The measurement result shows that the realized antenna has working frequency from 1200 MHz to 2250 MHz and has the gain up to 14.5 dBi.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}