首页 > 最新文献

2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)最新文献

英文 中文
Java and Sunda dialect recognition from Indonesian speech using GMM and I-Vector 基于GMM和I-Vector的印尼语爪哇和巽他方言识别
Rita Rahmawati, D. Lestari
Recognition of dialect is a field of research in the field of language recognition. The purpose of this study is to compare the best modelling features and techniques for recognizing Javanese and Sundanese dialects in Indonesian speech using MFCC and combination of MFCC and pitch feature candidates and comparing GMM and I-Vector modelling techniques. This research uses machine learning approach for training process and model testing. As a result, the use of the combination of MFCC and pitch feature and the I-Vector modelling technique has the advantage to recognize Java and Sunda dialect.
方言识别是语言识别领域的一个研究领域。本研究的目的是比较使用MFCC和MFCC与音高特征候选组合识别印度尼西亚语音中的爪哇语和巽他语方言的最佳建模特征和技术,并比较GMM和I-Vector建模技术。本研究使用机器学习方法进行训练过程和模型测试。因此,结合MFCC和音高特征以及I-Vector建模技术对Java和巽他方言进行识别具有优势。
{"title":"Java and Sunda dialect recognition from Indonesian speech using GMM and I-Vector","authors":"Rita Rahmawati, D. Lestari","doi":"10.1109/TSSA.2017.8272892","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272892","url":null,"abstract":"Recognition of dialect is a field of research in the field of language recognition. The purpose of this study is to compare the best modelling features and techniques for recognizing Javanese and Sundanese dialects in Indonesian speech using MFCC and combination of MFCC and pitch feature candidates and comparing GMM and I-Vector modelling techniques. This research uses machine learning approach for training process and model testing. As a result, the use of the combination of MFCC and pitch feature and the I-Vector modelling technique has the advantage to recognize Java and Sunda dialect.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"296 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (Case study : XYZ institute) 基于ISO/IEC 27001:2013的ISMS规划,在差距分析阶段使用层次分析法(案例研究:XYZ研究所)
Johan Candra, O. Briliyant, Sion Rebeca Tamba
The biggest challenge in information security planning is how to acquire precision in the gap analysis phase. According to the information security management system (ISMS) implementation guide based on ISO/IEC 27001:2013, the planning of ISMS has 5 stages. The 5 stages are : defining the range, perform gap analysis, accomplish risk assessment, determine the control and target, and determine the policy and procedure of ISMS. The gap analysis stage is required to assess the organization's current position toward ISMS implementation. This research suggested the use of AHP to determine which information security control that most relate to the organization needs and goals. We will conduct the process in one of Indonesia's organization called the XYZ institute. The result of this research is prioritization of information security gap handling that will be useful for XYZ institute to support their processes of ISO/IEC 27001:2013 implementation.
信息安全规划面临的最大挑战是如何在缺口分析阶段获得准确性。根据基于ISO/IEC 27001:2013的信息安全管理体系(ISMS)实施指南,ISMS的规划分为5个阶段。这5个阶段分别是:确定范围、进行差距分析、完成风险评估、确定控制和目标、确定ISMS的政策和程序。差距分析阶段是评估组织在ISMS实施方面的当前位置所必需的。这项研究建议使用AHP来确定哪些信息安全控制与组织的需求和目标最相关。我们将在一个叫做XYZ研究所的印尼组织中进行这个过程。这项研究的结果是信息安全漏洞处理的优先级,这将有助于XYZ研究所支持他们的ISO/IEC 27001:2013实施过程。
{"title":"ISMS planning based on ISO/IEC 27001:2013 using analytical hierarchy process at gap analysis phase (Case study : XYZ institute)","authors":"Johan Candra, O. Briliyant, Sion Rebeca Tamba","doi":"10.1109/TSSA.2017.8272916","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272916","url":null,"abstract":"The biggest challenge in information security planning is how to acquire precision in the gap analysis phase. According to the information security management system (ISMS) implementation guide based on ISO/IEC 27001:2013, the planning of ISMS has 5 stages. The 5 stages are : defining the range, perform gap analysis, accomplish risk assessment, determine the control and target, and determine the policy and procedure of ISMS. The gap analysis stage is required to assess the organization's current position toward ISMS implementation. This research suggested the use of AHP to determine which information security control that most relate to the organization needs and goals. We will conduct the process in one of Indonesia's organization called the XYZ institute. The result of this research is prioritization of information security gap handling that will be useful for XYZ institute to support their processes of ISO/IEC 27001:2013 implementation.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129853299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Comparison of the Haryadi Index with existing method in competition, equality, fairness, and correlation level calculation: Case study: Telecommunication industry Haryadi指数与现有方法在竞争、平等、公平和相关水平计算方面的比较——以电信业为例
Levin Kusuma Adiatma Nie, S. Haryadi
This research is focused in a formula called Haryadi Index, which implemented in the assessment of telco industry. This formula will be contested with the other existing formula to gauge competition level, equality level, fairness level, and correlation level. The Herfindahl-Hirschman Index will be compared against Haryadi Index for competition level, Gini Index will be compared for equality level, Jain Index for fairness level, and Pearson Correlation for the correlation level calculation. The research produces the following : (1) Haryadi Index can provide better number for an industry with a different level of competition, whereas the Herfindahl-Hirschman Index do worse; (2) Haryadi Index has more precise equality level coefficient than the Gini Index; (3) Haryadi Index can give more appropriate indexes for a variety levels of fairness, while Jain Index gives a relatively bigger indexes for a variety levels of fairness; (4) Haryadi Index gives a new alternative for correlation counting which refer to the linear equation, while more research will be needed to find the better situation to use the Haryadi Index or the Pearson Correlation appropriately.
本研究的重点是一个名为哈里亚迪指数的公式,该公式在电信行业的评估中实施。该公式将与现有的其他公式进行竞争,以衡量竞争水平、平等水平、公平水平和相关水平。赫芬达尔-赫希曼指数与哈里亚迪指数比较竞争水平,基尼指数比较平等水平,贾恩指数比较公平水平,Pearson相关系数计算相关水平。研究发现:(1)Haryadi指数能较好地反映不同竞争水平的行业,而Herfindahl-Hirschman指数则表现较差;(2)哈里雅迪指数比基尼指数具有更精确的平等水平系数;(3) Haryadi指数对各种公平程度给出的指标更为合适,Jain指数对各种公平程度给出的指标相对较大;(4) Haryadi指数为参考线性方程的相关计数提供了新的选择,但需要更多的研究来找到更好的情况下,适当地使用Haryadi指数或Pearson相关。
{"title":"Comparison of the Haryadi Index with existing method in competition, equality, fairness, and correlation level calculation: Case study: Telecommunication industry","authors":"Levin Kusuma Adiatma Nie, S. Haryadi","doi":"10.1109/TSSA.2017.8272914","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272914","url":null,"abstract":"This research is focused in a formula called Haryadi Index, which implemented in the assessment of telco industry. This formula will be contested with the other existing formula to gauge competition level, equality level, fairness level, and correlation level. The Herfindahl-Hirschman Index will be compared against Haryadi Index for competition level, Gini Index will be compared for equality level, Jain Index for fairness level, and Pearson Correlation for the correlation level calculation. The research produces the following : (1) Haryadi Index can provide better number for an industry with a different level of competition, whereas the Herfindahl-Hirschman Index do worse; (2) Haryadi Index has more precise equality level coefficient than the Gini Index; (3) Haryadi Index can give more appropriate indexes for a variety levels of fairness, while Jain Index gives a relatively bigger indexes for a variety levels of fairness; (4) Haryadi Index gives a new alternative for correlation counting which refer to the linear equation, while more research will be needed to find the better situation to use the Haryadi Index or the Pearson Correlation appropriately.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126935968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Implementation of RSA 2048-bit and AES 128-bit for Secure e-learning web-based application 基于web的安全电子学习应用的RSA 2048位和AES 128位的实现
O. Briliyant, Ahmad Baihaqi
E-learning systems today focuses on wide accessibility which is relatively contradictive to security. But as the cyber landscape has changed, so is the cyber security threat that follows. Security is needed to prevent from cyber threat such as data theft, modification, and fabrication, especially in a web-based environment. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in PHP and Javascript programming. Secure Electronic Learning System (SELS) application is designed to accommodate security services, such as confidentiality, integrity, authentication, and non-repudiation. Encryption to provide confidentiality services in file exchange process. Digital signature used to provide integrity, authentication, and non-repudiation in the access control and file exchange processes. Moreover, application can give information about file modification with notification to users. We demonstrated the implementation of cryptography in SELS can prevent data theft, illegal access, data modification or fabrication and is proven on the test.
当今的电子学习系统侧重于广泛的可访问性,这与安全性相对矛盾。但随着网络格局的变化,随之而来的网络安全威胁也在发生变化。安全需要防止网络威胁,如数据盗窃、修改和伪造,特别是在基于web的环境中。在本研究中,RSA 2048位算法、AES 256位算法和SHA 256算法将在PHP和Javascript编程中实现。安全电子学习系统(Secure Electronic Learning System, SELS)应用程序的设计是为了适应安全服务,例如机密性、完整性、身份验证和不可否认性。加密在文件交换过程中提供保密服务。数字签名用于在访问控制和文件交换过程中提供完整性、身份验证和不可否认性。此外,应用程序可以将文件修改的信息以通知的方式通知用户。我们证明了在SELS中实现密码学可以防止数据盗窃,非法访问,数据修改或伪造,并在测试中得到了证明。
{"title":"Implementation of RSA 2048-bit and AES 128-bit for Secure e-learning web-based application","authors":"O. Briliyant, Ahmad Baihaqi","doi":"10.1109/TSSA.2017.8272903","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272903","url":null,"abstract":"E-learning systems today focuses on wide accessibility which is relatively contradictive to security. But as the cyber landscape has changed, so is the cyber security threat that follows. Security is needed to prevent from cyber threat such as data theft, modification, and fabrication, especially in a web-based environment. In this research, RSA 2048-bit algorithm, AES 256-bit and SHA 256 will be implemented in PHP and Javascript programming. Secure Electronic Learning System (SELS) application is designed to accommodate security services, such as confidentiality, integrity, authentication, and non-repudiation. Encryption to provide confidentiality services in file exchange process. Digital signature used to provide integrity, authentication, and non-repudiation in the access control and file exchange processes. Moreover, application can give information about file modification with notification to users. We demonstrated the implementation of cryptography in SELS can prevent data theft, illegal access, data modification or fabrication and is proven on the test.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130542846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Lightweight monitoring system for IOT devices 物联网设备的轻量级监控系统
Widhi Yahya, Achmad Basuki, Eko Sakti, Frondy Fernanda
The Internet of Things (IoT) brings millions of devices, in the form of sensor, actuator, or embedded electronic devices interconnected through the Internet. Monitoring abundant of IoT devices is a big challenge, especially in a constrained condition of sensor nodes (e.g. limited CPU, memory, and battery). Therefore, a good monitoring system with an efficient monitoring protocol is often needed to compensate the limited resources of sensor nodes. SNMP is a protocol that widely used for a monitoring system. However, SNMP was developed without taking into account of devices with limited resources. This paper presents a proposed prototype of a light weight monitoring system based on agent-manager model. The testing result shows that the developed prototype system generates smaller packet sizes than the SNMP-based monitoring system on the same function and shows a low CPU and memory usage in monitoring thousands of devices.
物联网(IoT)将数以百万计的传感器、执行器或嵌入式电子设备通过互联网互联起来。监控大量的物联网设备是一个巨大的挑战,特别是在传感器节点受限的情况下(例如,有限的CPU,内存和电池)。因此,通常需要一个具有高效监控协议的良好监控系统来补偿传感器节点有限的资源。SNMP是一种广泛应用于监控系统的协议。然而,SNMP的开发并没有考虑到资源有限的设备。本文提出了一种基于agent-manager模型的轻量级监控系统原型。测试结果表明,在相同的功能下,所开发的原型系统生成的数据包大小比基于snmp的监控系统要小,并且在监控数千台设备时CPU和内存占用率较低。
{"title":"Lightweight monitoring system for IOT devices","authors":"Widhi Yahya, Achmad Basuki, Eko Sakti, Frondy Fernanda","doi":"10.1109/TSSA.2017.8272897","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272897","url":null,"abstract":"The Internet of Things (IoT) brings millions of devices, in the form of sensor, actuator, or embedded electronic devices interconnected through the Internet. Monitoring abundant of IoT devices is a big challenge, especially in a constrained condition of sensor nodes (e.g. limited CPU, memory, and battery). Therefore, a good monitoring system with an efficient monitoring protocol is often needed to compensate the limited resources of sensor nodes. SNMP is a protocol that widely used for a monitoring system. However, SNMP was developed without taking into account of devices with limited resources. This paper presents a proposed prototype of a light weight monitoring system based on agent-manager model. The testing result shows that the developed prototype system generates smaller packet sizes than the SNMP-based monitoring system on the same function and shows a low CPU and memory usage in monitoring thousands of devices.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Architectural design of token based authentication of MQTT protocol in constrained IoT device 受限物联网设备中基于令牌的MQTT协议认证体系结构设计
A. Bhawiyuga, Mahendra Data, Andri Warda
An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time.
在基于物联网的系统中,有效、安全的认证机制是实现通信协议的重要组成部分之一。作为物联网世界中流行的消息传递协议之一,消息队列遥测传输(MQTT)提供了使用用户名和密码的基本身份验证。但是,这种身份验证方法在安全性和可伸缩性方面可能存在问题。在本文中,我们提出了一种基于令牌的MQTT协议认证的设计与实现。提出的设计由四个组件组成:发布者、订阅者、MQTT代理和令牌身份验证服务器。发布者/订阅者首先将其用户名密码发送到身份验证服务器以获取令牌。请注意,令牌生成过程仅在以下情况下执行:1)尚未生成令牌,2)令牌已过期。一旦发布者获得有效令牌,它将把该令牌存储在其本地存储中,并将其用于进一步的身份验证。从可用性和性能测试结果来看,该系统可以在相对可接受的时间内完成有效令牌和过期令牌的认证。
{"title":"Architectural design of token based authentication of MQTT protocol in constrained IoT device","authors":"A. Bhawiyuga, Mahendra Data, Andri Warda","doi":"10.1109/TSSA.2017.8272933","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272933","url":null,"abstract":"An effective and secure authentication mechanism is one of the important part in implementation of communication protocol in a Internet of Things (IoT) based system. As one of the popular messaging protocol in IoT world, Message Queue Telemetry Transport (MQTT) offers a basic authentication using username and password. However, this authentication method might possibly have a problem in term of security and scalability. In this paper, we propose the design and implementation of token based authentication of MQTT protocol in constrained devices. The proposed design consists of four components : publisher, subscriber, MQTT broker and token authentication server. Publisher/subscriber first sends its username password to authentication server to get the token. Notice that, the token generating process is only performed at following conditions : 1) when token has not been generated yet and 2) when token has been expired. Once publisher get a valid token, it will store that token in its local storage and use it for further authentication. From usability and performance testing result, the proposed system can perform the authentication of valid and expired token in relatively acceptable time.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121066907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Content storage effect on the named data network traffic load 内容存储对命名数据网络流量负载的影响
L. V. Yovita, N. Syambas
Named Data Network (NDN) is a network architecture with a content-centric paradigm, in which the consumer has a certain interest in a content. Requests for data are performed based on the content, not to specific server or producer so that the response to the requested content can be performed by the NDN router, not only by the server or producer. NDN causes data traffic more efficient because the request will be served by the node that closest to the consumer who has the content in its Content Storage. In this research, the performance of NDN is tested based on changes in the size of Content Storage as one of the structures in NDN, and also the changes of frequency of interest. The contribution of this research is to study the effect of the content storage size and the number of frequency of interest on NDN performance, from the network point of view and user point of view. This research use Abilene network topology. The performance will be analyzed from average delay and cache hit ratio as the user centric metrics, and also the data circulation, number of interest message retransmission and packet drop as a network centric metrics. Simulation results show that the size of Content Storage greatly affects the efficiency of data transmission in the NDN network. The smaller the size of Content Storage relatively compared to the number of consumer demand, the greater the network load. Data circulation becomes larger, delay and packet drop increases, the number of packets retransmission increases and the cache hit ratio deteriorates. The provision of Content Storage of the optimum size makes the data transmission on the NDN network efficient. The higher number of frequency of interest, the worse the performance of the system.
命名数据网络(NDN)是一种以内容为中心范式的网络体系结构,在这种范式中,消费者对内容有一定的兴趣。对数据的请求是基于内容执行的,而不是针对特定的服务器或生成器,因此对所请求内容的响应可以由NDN路由器执行,而不仅仅是由服务器或生成器执行。NDN使数据流量更高效,因为请求将由最接近其内容存储中具有内容的使用者的节点提供。在本研究中,基于作为NDN结构之一的Content Storage的大小变化以及感兴趣频率的变化来测试NDN的性能。本研究的贡献在于从网络和用户的角度研究了内容存储大小和兴趣频率数量对NDN性能的影响。本研究采用阿比林网络拓扑结构。性能分析将从平均延迟和缓存命中率作为以用户为中心的指标,以及数据循环、感兴趣的消息重传次数和丢包作为以网络为中心的指标。仿真结果表明,内容存储器的大小对NDN网络中数据传输的效率有很大影响。相对于消费者需求的数量而言,Content Storage的大小越小,网络负载就越大。数据循环变大,时延和丢包增加,重传次数增加,缓存命中率降低。提供最优大小的内容存储,使NDN网络上的数据传输更加高效。感兴趣的频率数越多,系统的性能越差。
{"title":"Content storage effect on the named data network traffic load","authors":"L. V. Yovita, N. Syambas","doi":"10.1109/TSSA.2017.8272941","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272941","url":null,"abstract":"Named Data Network (NDN) is a network architecture with a content-centric paradigm, in which the consumer has a certain interest in a content. Requests for data are performed based on the content, not to specific server or producer so that the response to the requested content can be performed by the NDN router, not only by the server or producer. NDN causes data traffic more efficient because the request will be served by the node that closest to the consumer who has the content in its Content Storage. In this research, the performance of NDN is tested based on changes in the size of Content Storage as one of the structures in NDN, and also the changes of frequency of interest. The contribution of this research is to study the effect of the content storage size and the number of frequency of interest on NDN performance, from the network point of view and user point of view. This research use Abilene network topology. The performance will be analyzed from average delay and cache hit ratio as the user centric metrics, and also the data circulation, number of interest message retransmission and packet drop as a network centric metrics. Simulation results show that the size of Content Storage greatly affects the efficiency of data transmission in the NDN network. The smaller the size of Content Storage relatively compared to the number of consumer demand, the greater the network load. Data circulation becomes larger, delay and packet drop increases, the number of packets retransmission increases and the cache hit ratio deteriorates. The provision of Content Storage of the optimum size makes the data transmission on the NDN network efficient. The higher number of frequency of interest, the worse the performance of the system.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"82 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116650923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Formal modeling for consistency checking of signal transition graph 信号转换图一致性检验的形式化建模
Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood
The behavior of asynchronous hardware system is crucial and practically assured using the formal verification techniques. A signal transition graph is one of the effective alternatives to represent the behavioral design of a huge asynchronous system. The design could be verified beforehand to assure several essential properties including its consistency property. In this paper, the formal modeling scheme of a signal transition graph is proposed along with the consistency property in term of the linear temporal formula. The target signal transition graph is written in Promela code and verified using SPIN model checker. The result shows that the method can verify consistency property automatically.
异步硬件系统的行为是至关重要的,使用形式化验证技术可以实际保证。信号转换图是表示大型异步系统行为设计的有效替代方法之一。设计可以预先验证,以确保几个基本性能,包括其一致性。本文提出了信号转换图的形式化建模方案,并给出了信号转换图的线性时间公式的一致性。目标信号转换图用Promela代码编写,并使用SPIN模型检查器进行验证。结果表明,该方法可以自动验证一致性。
{"title":"Formal modeling for consistency checking of signal transition graph","authors":"Kanut Boonroeangkaow, A. Thongtak, W. Vatanawood","doi":"10.1109/TSSA.2017.8272932","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272932","url":null,"abstract":"The behavior of asynchronous hardware system is crucial and practically assured using the formal verification techniques. A signal transition graph is one of the effective alternatives to represent the behavioral design of a huge asynchronous system. The design could be verified beforehand to assure several essential properties including its consistency property. In this paper, the formal modeling scheme of a signal transition graph is proposed along with the consistency property in term of the linear temporal formula. The target signal transition graph is written in Promela code and verified using SPIN model checker. The result shows that the method can verify consistency property automatically.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116783189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topic based IoT data storage framework for heterogeneous sensor data 异构传感器数据基于主题的物联网数据存储框架
Eko Sakti Pramukantoro, Widhi Yahya, Gabreil Arganata, A. Bhawiyuga, Achmad Basuki
Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds.
海量数据和异构数据是物联网数据存储面临的挑战。需要一个设计合理的物联网中间件来处理这些问题。本文提出了一个由互联网网关设备(IGD)功能、Web服务、NoSQL数据库和物联网应用程序组成的框架。该框架有效地处理了传感器的结构化和非结构化数据。为了验证框架,我们使用功能和非功能测试对其进行评估。从功能测试来看,该框架可以交付和存储异构数据量的数据。从非功能测试来看,该框架每秒可以从IGD接收443个数据,每秒可以向物联网应用程序发送173个数据,响应时间在1秒以下,是可以接受的。
{"title":"Topic based IoT data storage framework for heterogeneous sensor data","authors":"Eko Sakti Pramukantoro, Widhi Yahya, Gabreil Arganata, A. Bhawiyuga, Achmad Basuki","doi":"10.1109/TSSA.2017.8272895","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272895","url":null,"abstract":"Massive volume and heterogeneous data are the challenges in IoT data storage. A properly designed IoT middleware is required to handle the issues. This paper presents a framework consists of Internet Gateway Device (IGD) function, a Web service, NoSQL database, and IoT Application. The framework efficiently handles the structured and unstructured of sensors data. To verify the framework, we evaluated it using functional and non-functional testing. From the functional testing, this framework can deliver and store data with heterogeneous data and volume. From the non-functional testing, this framework can receive 443 data per second from an IGD, can deliver 173 data per second to IoT Apps, and response times are acceptable which is under 1 seconds.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132749138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Wideband monofilar helical antenna for wireless communication in remote area 用于偏远地区无线通信的宽带单线螺旋天线
M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir
This paper presents the wideband monofilar helical antenna which is aimed to increase low level signal reception commonly occurs in the remote area such as highlands, ridge, and borderlands. The use of helical antenna type is due to its ability in producing circularly polarized wave useful to support wireless communication frequently surrounded by some obstructions. The proposed antenna is expected to operate at wideband frequency range including cellular communication and connectable to the GSM modem associated with a laptop or PC device. The antenna is designed by using thin copper wire with spiral turn number of 8 and fed through a 50Ω female N-connector type. The proposed monofilar helical antenna is then realized based on the optimum design for experimental characterization. The measurement result shows that the realized antenna has working frequency from 1200 MHz to 2250 MHz and has the gain up to 14.5 dBi.
本文提出了一种宽带单丝螺旋天线,用于提高高原、山脊和边境等偏远地区的低电平信号接收。螺旋型天线的使用是由于其产生圆极化波的能力,有利于支持经常被一些障碍物包围的无线通信。所提议的天线预计将在包括蜂窝通信在内的宽带频率范围内工作,并可连接到与笔记本电脑或PC设备相关联的GSM调制解调器。天线采用螺旋匝数为8的细铜线设计,通过50Ω母型n型连接器馈电。在实验表征优化设计的基础上,实现了单丝螺旋天线。测试结果表明,所实现的天线工作频率在1200 ~ 2250 MHz之间,增益可达14.5 dBi。
{"title":"Wideband monofilar helical antenna for wireless communication in remote area","authors":"M. Yunus, Amdan Apriansyah, I. Fitri, Evyta Wismiana, A. Munir","doi":"10.1109/TSSA.2017.8272935","DOIUrl":"https://doi.org/10.1109/TSSA.2017.8272935","url":null,"abstract":"This paper presents the wideband monofilar helical antenna which is aimed to increase low level signal reception commonly occurs in the remote area such as highlands, ridge, and borderlands. The use of helical antenna type is due to its ability in producing circularly polarized wave useful to support wireless communication frequently surrounded by some obstructions. The proposed antenna is expected to operate at wideband frequency range including cellular communication and connectable to the GSM modem associated with a laptop or PC device. The antenna is designed by using thin copper wire with spiral turn number of 8 and fed through a 50Ω female N-connector type. The proposed monofilar helical antenna is then realized based on the optimum design for experimental characterization. The measurement result shows that the realized antenna has working frequency from 1200 MHz to 2250 MHz and has the gain up to 14.5 dBi.","PeriodicalId":271883,"journal":{"name":"2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 11th International Conference on Telecommunication Systems Services and Applications (TSSA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1