首页 > 最新文献

2015 1st International Conference on Wireless and Telematics (ICWT)最新文献

英文 中文
The design requirements for Libyan imaging mini-satellite (LibyaSat-1) 利比亚成像小型卫星(利比亚卫星1号)的设计要求
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449261
Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman
In this paper we present the conceptual design of Libyan remote sensing satellite (LibyaSat-1) and its sub-systems requirements. LibyaSat-1 is a 300 kg mini satellite, which will be used to support high resolution multi-spectral earth imaging camera to fulfill the civilian needs. This satellite will operate at LEO of 775 km and will provide a resolution of 2.5 m for the panchromatic band and 10 m for the VIS/NIR bands with 30 km swath. We have presented the mission overview, mission operation concept and mission requirements. Moreover, the System Tool Kit (STK) simulation is used to show the ground trucks of LibyaSat-1 for three days and to find the contact numbers between LibyaSat-1 and both Murezeq and Tripoli stations. We have also presented the design of telemetry and command subsystem, code and data handling subsystem, electrical power subsystem, altitude orbit control subsystem, and structure subsystem.
本文介绍了利比亚遥感卫星(LibyaSat-1)的概念设计及其子系统需求。利比亚卫星1号是一颗300公斤的迷你卫星,将用于支持高分辨率多光谱地球成像相机,以满足民用需求。这颗卫星将在775公里的近地轨道运行,将提供2.5米的全色波段分辨率和10米的可见光/近红外波段分辨率。我们已经介绍了任务概述,任务操作概念和任务要求。此外,系统工具包(STK)模拟用于显示利比亚卫星1号的地面卡车三天的情况,并查找利比亚卫星1号与Murezeq和的黎波里站之间的联系号码。介绍了遥测与指挥分系统、编码与数据处理分系统、电力分系统、高度轨道控制分系统和结构分系统的设计。
{"title":"The design requirements for Libyan imaging mini-satellite (LibyaSat-1)","authors":"Faisel E. M. Tubbal, A. Elarabi, Abdelmonem Etabeb, H. Marah, Khaled Beneljankou, Mosbah Bellid, Riyadh El-bouaishi, A. Amer, Wesam Shita, Saleh Srabet, Akram Alkaseh, Ahmed Turkman","doi":"10.1109/ICWT.2015.7449261","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449261","url":null,"abstract":"In this paper we present the conceptual design of Libyan remote sensing satellite (LibyaSat-1) and its sub-systems requirements. LibyaSat-1 is a 300 kg mini satellite, which will be used to support high resolution multi-spectral earth imaging camera to fulfill the civilian needs. This satellite will operate at LEO of 775 km and will provide a resolution of 2.5 m for the panchromatic band and 10 m for the VIS/NIR bands with 30 km swath. We have presented the mission overview, mission operation concept and mission requirements. Moreover, the System Tool Kit (STK) simulation is used to show the ground trucks of LibyaSat-1 for three days and to find the contact numbers between LibyaSat-1 and both Murezeq and Tripoli stations. We have also presented the design of telemetry and command subsystem, code and data handling subsystem, electrical power subsystem, altitude orbit control subsystem, and structure subsystem.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130519065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles 无线交通灯控制器对车辆远程无钥匙进入的干扰分析
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449214
Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus
This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433-434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario where the wireless traffic light and RKE for vehicles operate on frequency 434 MHz and 433.9 MHz respectively. Three time delays 0 s, 0.2 s and 0.5 s were considered during the simulations. The results show that time delay 0 s and 0.2 s cause a very high probability of interference. Whereas time delay setting of 0.5 s provide probability of interference about 2 % at distance 5 m.
本文旨在分析无线交通灯控制器与车辆远程无钥匙进入之间的干扰。两个系统在433-434 MHz频率上彼此靠近。在分析过程中,无线交通灯的广播变时延随距离和RKE的变化而确定,以保证它们之间的干扰。在无线交通灯和车载RKE分别工作在434 MHz和433.9 MHz频率的情况下,对干扰影响进行了评估。仿真过程中考虑了0 s、0.2 s和0.5 s三种时延。结果表明,0秒和0.2秒的时间延迟会产生非常高的干扰概率。而延时设置为0.5 s时,在距离5m处的干扰概率约为2%。
{"title":"Analysis of interference from wireless traffic light controller upon remote keyless entry for vehicles","authors":"Rizal Broer Bahaweres, Felki Fikiansyah, M. Alaydrus","doi":"10.1109/ICWT.2015.7449214","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449214","url":null,"abstract":"This paper aims to analyze the interference between wireless traffic light controller and remote keyless entry for vehicles. Both systems are located closely to each other at the frequency 433-434 MHz. During the analysis, broadcast variant time delay on wireless traffic light versus distances between and RKE determined to ensure their interference. The interference impact is evaluated in a scenario where the wireless traffic light and RKE for vehicles operate on frequency 434 MHz and 433.9 MHz respectively. Three time delays 0 s, 0.2 s and 0.5 s were considered during the simulations. The results show that time delay 0 s and 0.2 s cause a very high probability of interference. Whereas time delay setting of 0.5 s provide probability of interference about 2 % at distance 5 m.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130538072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing gamified-service towards user engagement and service quality improvement 设计游戏化服务以提高用户参与度和服务质量
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449241
Sarifah Putri Raflesia, K. Surendro
Organizations find new challenge which is related to employees' engagement along service support implementation. Gamified-service is defined as service support which integrated Information Technology Infrastructure Library (ITIL) and gamification model. This integration enables fun, challenge, and reward to boost employees' motivation. Pressure in the workplace and employees' personal issues become main triggrer to decrease productivity. According to this reason, we need to add persuasive approach along implementation of ITIL best practices. This research focused on designing gamified-service prototype in order to help organization build game-like workplace environment We believe that gamified-service will help employees do their job with fun way.
随着服务支持的实施,组织发现了与员工敬业度相关的新挑战。游戏化服务是将ITIL (Information Technology Infrastructure Library)和游戏化模型相结合的服务支持。这种整合使乐趣、挑战和奖励能够提高员工的积极性。工作压力和员工的个人问题成为降低工作效率的主要诱因。根据这个原因,我们需要在ITIL最佳实践的实现中添加有说服力的方法。本研究的重点是设计游戏化服务原型,以帮助组织建立游戏化的工作环境,我们相信游戏化服务将帮助员工以有趣的方式完成工作。
{"title":"Designing gamified-service towards user engagement and service quality improvement","authors":"Sarifah Putri Raflesia, K. Surendro","doi":"10.1109/ICWT.2015.7449241","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449241","url":null,"abstract":"Organizations find new challenge which is related to employees' engagement along service support implementation. Gamified-service is defined as service support which integrated Information Technology Infrastructure Library (ITIL) and gamification model. This integration enables fun, challenge, and reward to boost employees' motivation. Pressure in the workplace and employees' personal issues become main triggrer to decrease productivity. According to this reason, we need to add persuasive approach along implementation of ITIL best practices. This research focused on designing gamified-service prototype in order to help organization build game-like workplace environment We believe that gamified-service will help employees do their job with fun way.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133883378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Throughput evaluation in LTE-Advanced network access using carrier aggregation 基于载波聚合的LTE-Advanced网络接入的吞吐量评估
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449212
Iskandar, R. Galih
This paper proposes throughput evaluation for LTE-Advanced network access in the particular service area employing carrier aggregation (CA) technique. From several kind of CA, we evaluate which one the best CA configuration in term of network throughput. 30 MHz aggregated bandwidth and two component carrier (CC) serve as a primary serving cell (PCell) and secondary serving cell (SCell) are used in the simulation. Simulation results show that the configuration of wider PCell bandwidth resulting better performance of the throughput. In particular, in CA intra-band scenario, the throughput of non-contiguous CA has better performance compared with CA contiguous. Whereas in the inter-band CA scenario, CC combination with lower frequency resulting better throughput performance.
本文提出了采用载波聚合(CA)技术对特定业务区域的LTE-Advanced网络接入进行吞吐量评估。从几种CA配置中,我们评估了哪种CA配置在网络吞吐量方面是最好的。仿真中采用30mhz的聚合带宽和双分量载波(CC)作为主服务小区(PCell)和副服务小区(SCell)。仿真结果表明,配置更宽的PCell带宽可以获得更好的吞吐量性能。特别是在CA带内场景下,非连续CA的吞吐量比连续CA具有更好的性能。而在带间CA场景中,CC与较低频率的组合可获得更好的吞吐量性能。
{"title":"Throughput evaluation in LTE-Advanced network access using carrier aggregation","authors":"Iskandar, R. Galih","doi":"10.1109/ICWT.2015.7449212","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449212","url":null,"abstract":"This paper proposes throughput evaluation for LTE-Advanced network access in the particular service area employing carrier aggregation (CA) technique. From several kind of CA, we evaluate which one the best CA configuration in term of network throughput. 30 MHz aggregated bandwidth and two component carrier (CC) serve as a primary serving cell (PCell) and secondary serving cell (SCell) are used in the simulation. Simulation results show that the configuration of wider PCell bandwidth resulting better performance of the throughput. In particular, in CA intra-band scenario, the throughput of non-contiguous CA has better performance compared with CA contiguous. Whereas in the inter-band CA scenario, CC combination with lower frequency resulting better throughput performance.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124481050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic 基于残差多项式拟合的基于时间的交通统计异常检测
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449256
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.
Flashcrowd和分布式拒绝服务攻击(DDoS)在跨网络和跨服务器上几乎具有相似的症状。但是像入侵检测系统(IDS)这样的安全元素必须对两者进行不同的处理。如果IDS无法区分快闪人群和DDoS攻击,将会降低对快闪人群中合法用户流量的服务质量。因此,IDS区分flashcrowd和DDoS是很重要的。许多早期的对比方法可以感知异常事件,但不太注意识别哪些流是异常。提出了窗口聚合流量统计值组合之间的残差计算。通过统计百分位数10和平均值的残差计算,获得了较高的flashcrowd和DDoS综合异常事件判别准确率。该方法可以直接识别异常流,并进行可视化分析,以检测两个事件的开始和结束。
{"title":"Time based anomaly detection using residual polynomial fitting on aggregate traffic statistic","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/ICWT.2015.7449256","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449256","url":null,"abstract":"Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier comparison method could sense the anomalous event, but not pay much attention to identify which flow was the anomaly. We presented residual calculation between windowed aggregate traffic statistical value combination. With residual calculation among statistical percentile 10th and mean, a high accuracy of flashcrowd and DDoS differentiation of synthetic anomalous event gained. This method could directly identify the anomalous flow and perform visual analysis to detect the start to end of both event.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130912852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Mobile TV interactive in DVB-T broadcast network hybrid with WiFi 移动电视互动在DVB-T广播网络与WiFi混合
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449207
N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana
Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart phone interactively connected to DVB-T transmitter. As the first target we develop an android-based smart phone. We use DVB-T signal for downlink transmission and wifi for the uplink connection. This interactivity may include file sharing, polling, etc. using non-DVB enabler devices. Therefore the development of a system that can convert DVB signal into WiFi-IP based protocol signal is big challenge in this work.
在许多国家,数字电视已经取代了模拟电视。因此,内容广播应用被广泛开发,包括在智能手机上作为非dvb启用设备。本文旨在开发一种智能手机上的应用程序,该应用程序作为DVB-T发射机接收程序并向服务器发送请求。目标是开发一种可以让智能手机与DVB-T发射机交互连接的应用程序。作为第一个目标,我们开发了一款基于android的智能手机。我们使用DVB-T信号进行下行传输,使用wifi进行上行连接。这种交互性可能包括使用非dvb启用设备的文件共享、轮询等。因此,如何将DVB信号转换成基于wi - fi - ip的协议信号是这项工作的一大挑战。
{"title":"Mobile TV interactive in DVB-T broadcast network hybrid with WiFi","authors":"N. S. Sugiharto, Iskandar, T. Hendrawan, N. Rachmana","doi":"10.1109/ICWT.2015.7449207","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449207","url":null,"abstract":"Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart phone interactively connected to DVB-T transmitter. As the first target we develop an android-based smart phone. We use DVB-T signal for downlink transmission and wifi for the uplink connection. This interactivity may include file sharing, polling, etc. using non-DVB enabler devices. Therefore the development of a system that can convert DVB signal into WiFi-IP based protocol signal is big challenge in this work.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"363 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115974218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAPR reduction by data subcarriers and null subcarriers switching 通过数据子载波和空子载波交换来降低PAPR
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449213
Arif Budiman, Sugihartono, D. Arseno
One of OFDM main problem is amount of PAPR (Peak Average Power Ratio). The magnitude of PAPR caused the summation of power by the wave in phase so that maximum power compared to average power becomes high. One method to reduce the amount of PAPR is switching null subcarrier with the data subcarrier. This method has advantages over other methods that do not damage the transmitted signal. BER is not increasing and does not require any side information to restore the signal to its original data. The problem in the switching method is the complexity of the system. In this paper will offered a method based on switching data subcarrier null subcarrier. The new method will provide lower complexity and the PAPR results lower than original OFDM but still higher than switching the data subcarrier null subcarrier method.
OFDM的主要问题之一是峰值平均功率比(PAPR)的大小。PAPR的大小使功率的总和与波相一致,使最大功率与平均功率相比变得高。减少PAPR量的一种方法是将空子载波与数据子载波交换。这种方法与其他方法相比具有不破坏传输信号的优点。误码率不会增加,也不需要任何侧信息来将信号恢复到原始数据。切换方法的问题在于系统的复杂性。本文提出了一种基于数据子载波零子载波交换的方法。新方法的复杂度较低,PAPR结果低于原始OFDM,但仍高于数据子载波零子载波交换方法。
{"title":"PAPR reduction by data subcarriers and null subcarriers switching","authors":"Arif Budiman, Sugihartono, D. Arseno","doi":"10.1109/ICWT.2015.7449213","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449213","url":null,"abstract":"One of OFDM main problem is amount of PAPR (Peak Average Power Ratio). The magnitude of PAPR caused the summation of power by the wave in phase so that maximum power compared to average power becomes high. One method to reduce the amount of PAPR is switching null subcarrier with the data subcarrier. This method has advantages over other methods that do not damage the transmitted signal. BER is not increasing and does not require any side information to restore the signal to its original data. The problem in the switching method is the complexity of the system. In this paper will offered a method based on switching data subcarrier null subcarrier. The new method will provide lower complexity and the PAPR results lower than original OFDM but still higher than switching the data subcarrier null subcarrier method.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120819437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of white box switch on Software Defined Networking using open vSwitch 软件定义网络中使用open vSwitch的白盒交换机性能分析
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449257
Aditya Widya Manggala, Hendrawan, Adrie Tanwidjaja
Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput of some configuration were measured. The result is compared to conventional switch, which is Cisco Catalyst 2950. White Box Switch was created of a computer with 2.50 GHz processor and 32 GBytes memory. The result shows that performance of Cisco Catalyst 2950 is superior to white box switch because of its ASIC that allow it to forward data in hardware. Furthermore minimum specification of white box switch can be calculated, that is 1.225 GHz processor and 1 GBytes memory. To get the best performance, we can use single-board computer to be used as white box switch. Single-board computer contains all of its hardware in a single-board and it will give best performance of a computer.
复杂性和灵活性是未来网络世界面临的主要问题。为了能够回答这些问题,一种叫做软件定义网络(SDN)的方法正在开发中。SDN的概念是将网络的控制器和硬件的转发平面分开。在本研究中,构建了SDN组件——白盒交换机。为了测试其性能,测量了一些配置的RTT和吞吐量。结果与传统交换机Cisco Catalyst 2950进行了比较。白盒开关是由一台2.50 GHz处理器和32gb内存的计算机创建的。结果表明,Cisco Catalyst 2950的性能优于白盒交换机,因为它的ASIC允许它在硬件上转发数据。此外,还可以计算出白盒开关的最小规格,即1.225 GHz处理器和1gb内存。为了获得最佳性能,我们可以使用单板计算机作为白盒开关。单板计算机将所有的硬件都集中在一块单板上,它将提供计算机的最佳性能。
{"title":"Performance analysis of white box switch on Software Defined Networking using open vSwitch","authors":"Aditya Widya Manggala, Hendrawan, Adrie Tanwidjaja","doi":"10.1109/ICWT.2015.7449257","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449257","url":null,"abstract":"Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput of some configuration were measured. The result is compared to conventional switch, which is Cisco Catalyst 2950. White Box Switch was created of a computer with 2.50 GHz processor and 32 GBytes memory. The result shows that performance of Cisco Catalyst 2950 is superior to white box switch because of its ASIC that allow it to forward data in hardware. Furthermore minimum specification of white box switch can be calculated, that is 1.225 GHz processor and 1 GBytes memory. To get the best performance, we can use single-board computer to be used as white box switch. Single-board computer contains all of its hardware in a single-board and it will give best performance of a computer.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography 使用LZW压缩、RSA加密和DCT隐写术的组合设计安全的数据
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449245
L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro
Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person addressed, another person will not be aware of the existence of the message. In this study the issues to be discussed is the technique of message encryption with RSA (Rivest Shamir Adleman) method. Messages are encrypted after compressed by LZW (Lempel Ziv Welch) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DCT (Discrete Cosine Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. For a 512×512 colored image there are 1536 characters enable for hiding. With LZW the amount of characters hiding will be about twice larger in this research.
当大量数据在互联网上交换时,手机的信息安全成为一个挑战。安全的信息传输可以通过密码学和隐写术来实现。密码学是一种为安全通信提供加密技术的工具。隐写术是一种通过图片的信息来隐藏信息的技术,这样除了被称呼的人之外,另一个人就不会意识到信息的存在。本文讨论的问题是采用RSA (Rivest Shamir Adleman)方法的消息加密技术。消息是通过LZW (Lempel Ziv Welch)方法压缩后加密的,因此它会减少将要插入的消息的大小,增加可以插入的消息的容量。经过压缩和加密的消息,然后通过DCT(离散余弦变换)技术隐藏。随着加密技术、隐写技术和压缩技术的结合,获取的信息更加安全,容量更大。对于512×512彩色图像,有1536个字符可以隐藏。使用LZW,本研究中隐藏的字符数量将增加两倍。
{"title":"Designing secured data using a combination of LZW compression, RSA encryption, and DCT steganography","authors":"L. Novamizanti, Gelar Budiman, Iwan Iwut Tritoasmoro","doi":"10.1109/ICWT.2015.7449245","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449245","url":null,"abstract":"Information security in mobile phones has become a challenge when large amounts of data exchanged on the Internet. Secure information transfer can be achieved by cryptography and steganography. Cryptography is a tool that provides encryption techniques for secure communication. Steganography is the technique of hiding information by way of the message of the picture, so that in addition to the person addressed, another person will not be aware of the existence of the message. In this study the issues to be discussed is the technique of message encryption with RSA (Rivest Shamir Adleman) method. Messages are encrypted after compressed by LZW (Lempel Ziv Welch) method, so it will reduce the size of the message that will be inserted and increase the capacity of messages that can be inserted. Messages that have been compressed and encrypted, is then hidden by DCT (Discrete Cosine Transform) techniques. With the incorporation of encryption techniques, steganography, and compression, the acquired information is more secure and its capacity is larger. For a 512×512 colored image there are 1536 characters enable for hiding. With LZW the amount of characters hiding will be about twice larger in this research.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network packet data online processing for intrusion detection system 网络数据包数据的在线处理,用于入侵检测系统
Pub Date : 2015-11-01 DOI: 10.1109/ICWT.2015.7449259
A. Jacobus, A. Sinsuw
The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.
入侵检测系统作为计算机网络中存在的一个重要的网络安全工具,利用该工具可以在入侵行为造成更大的破坏之前将其检测出来。传统的入侵检测系统是利用专家制定的规则来检测入侵,但随着网络活动的增加,需要分析的数据量越来越大,从而产生了新的入侵技术无法检测到的可能性。利用数据挖掘技术从网络数据包数据中发现入侵模式是离线环境下入侵检测的成功方法,但有效的入侵检测系统必须能够在线环境下检测到入侵。因此需要一种能够对网络数据包数据进行在线处理的方法。本文讨论了数据处理网络数据包建立连接记录的完整或不完整,以使入侵检测系统能够在线检测入侵,并根据测试结果,该方法成功地实现了在线环境下的入侵检测。
{"title":"Network packet data online processing for intrusion detection system","authors":"A. Jacobus, A. Sinsuw","doi":"10.1109/ICWT.2015.7449259","DOIUrl":"https://doi.org/10.1109/ICWT.2015.7449259","url":null,"abstract":"The existence of intrusion detection systems in computer network as a part of network security tool is very important, with this tool a computer system can detect the intrusion action before it makes more damage. Traditional intrusion detection system using the rule that created by expert for detecting the intrusion, but because of the increasing of internet activity the data to be analyzed in order to establish that rules become large and create the possibility the new intrusion technique cannot detect. Using data mining techniques to find intrusion pattern from network packet data was success to detect intrusion in offline environment, but the effective intrusion detection system must able to detect the intrusion in online environment. Therefore needed a method that can be used to perform online processing of network packets data. This paper discusses the data processing network packets to establish the connection records are complete or incomplete in an effort to enabling the intrusion detection system detecting the intrusion online and based on the test result this method was success to detect the intrusion in online environment.","PeriodicalId":371814,"journal":{"name":"2015 1st International Conference on Wireless and Telematics (ICWT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125800704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2015 1st International Conference on Wireless and Telematics (ICWT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1