Pub Date : 2014-11-01DOI: 10.1109/ICITACEE.2014.7065737
W. Syafei, M. Kurosaki, H. Ochi
We have been developing a very high throughput WLAN system based on IEEE802.11ac's criteria. It combines MIMO and OFDM technology to provide throughput over 1 Gbps for 150 feet propagation distance by using 80 MHz of bandiwdth on 5 GHz frequency band. 4 by 5 antennas MIMO is set to get 2nd-order diversity gain to maintain high throughput and performance. Greenfield preamble with novel phase rotation is employed to mitigate the overhead problem while reducing the peak to average power ratio of the signals. Run test to broadcast the ultra high definition video which resolution 4096 × 1714 pixels/frame with 30 frame/second under in-door channel model demonstrates an excellent performance of the developed system.
{"title":"Very high throughput WLAN system for ultra HD 4K video streaming","authors":"W. Syafei, M. Kurosaki, H. Ochi","doi":"10.1109/ICITACEE.2014.7065737","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065737","url":null,"abstract":"We have been developing a very high throughput WLAN system based on IEEE802.11ac's criteria. It combines MIMO and OFDM technology to provide throughput over 1 Gbps for 150 feet propagation distance by using 80 MHz of bandiwdth on 5 GHz frequency band. 4 by 5 antennas MIMO is set to get 2nd-order diversity gain to maintain high throughput and performance. Greenfield preamble with novel phase rotation is employed to mitigate the overhead problem while reducing the peak to average power ratio of the signals. Run test to broadcast the ultra high definition video which resolution 4096 × 1714 pixels/frame with 30 frame/second under in-door channel model demonstrates an excellent performance of the developed system.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-27DOI: 10.1109/ICITACEE.2014.7065710
Hugo Adeodatus Hendarto, Munadi, J. Setiawan
This paper focused on the robot arm's kinematics problem or the connection between angle in each joint and the end-effector's position.f Forward kinematics problem will be deduced using D-H (Denavit- Hartenberg) parameter method. The inverse kinematics problem will be solved using ANFIS (Adaptive Neuro-Fuzzy Inference System) instead of calculating the solution. ANFIS is a feature in MATLAB using ANFIS toolbox. PUMA 560 robot arm virtual model is used in this paper. Three ANFIS training conditions are made to test the influence of training conditions with the result's performance. The difference between end effector's position that using ANFIS and from calculation in forward kinematics will be calculated to test the end effector's position error. By making ANFIS solutions with three different MFs (Membership Functions), influence of MF number are known. With more MF will decrease the position's error. The most MF in this paper is 10 MFs resulting position error by 27.974mm.
{"title":"ANFIS application for calculating inverse kinematics of programmable universal machine for assembly (PUMA) robot","authors":"Hugo Adeodatus Hendarto, Munadi, J. Setiawan","doi":"10.1109/ICITACEE.2014.7065710","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065710","url":null,"abstract":"This paper focused on the robot arm's kinematics problem or the connection between angle in each joint and the end-effector's position.f Forward kinematics problem will be deduced using D-H (Denavit- Hartenberg) parameter method. The inverse kinematics problem will be solved using ANFIS (Adaptive Neuro-Fuzzy Inference System) instead of calculating the solution. ANFIS is a feature in MATLAB using ANFIS toolbox. PUMA 560 robot arm virtual model is used in this paper. Three ANFIS training conditions are made to test the influence of training conditions with the result's performance. The difference between end effector's position that using ANFIS and from calculation in forward kinematics will be calculated to test the end effector's position error. By making ANFIS solutions with three different MFs (Membership Functions), influence of MF number are known. With more MF will decrease the position's error. The most MF in this paper is 10 MFs resulting position error by 27.974mm.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125102974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065763
Ajub Ajulian Zahra Macrina, A. Hidayatno
English language is interesting for native speaker but there are many difficulties due to pronunciation. In order to facilitate for beginner to learn how to appropriately utter English word, we developed interactive learning program based on speech recognition. This paper investigates performance of three back-propagation neural network architectures with different hidden layers, e.g. 3, 4, and 5. The neural network is used to implements a speech recognition system to make interactive animal names utterance learning. The performance indicator that used in this study is number of epoch, training time, and mean square error (mse). The train dataset consist of 1, 2, and 3 syllables of animal names. The more hidden layer causes the longer training time but the smaller of the mse. Related to the number of epochs for training 1 and 2 syllables have a tendency that more hidden layers will be less the epoch, but this is not the case for training 3 syllables.
{"title":"Comparison of three back-propagation architectures for interactive animal names utterance learning","authors":"Ajub Ajulian Zahra Macrina, A. Hidayatno","doi":"10.1109/ICITACEE.2014.7065763","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065763","url":null,"abstract":"English language is interesting for native speaker but there are many difficulties due to pronunciation. In order to facilitate for beginner to learn how to appropriately utter English word, we developed interactive learning program based on speech recognition. This paper investigates performance of three back-propagation neural network architectures with different hidden layers, e.g. 3, 4, and 5. The neural network is used to implements a speech recognition system to make interactive animal names utterance learning. The performance indicator that used in this study is number of epoch, training time, and mean square error (mse). The train dataset consist of 1, 2, and 3 syllables of animal names. The more hidden layer causes the longer training time but the smaller of the mse. Related to the number of epochs for training 1 and 2 syllables have a tendency that more hidden layers will be less the epoch, but this is not the case for training 3 syllables.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117245459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065728
Rahmat Sholeh, F. Agus, H. R. Hatta, Tarbiyatul Munawwarah
In the Agricultural Development Zone in East Kalimantan, inefficient land use is continuing to occur. Many of land utility planned by individual or by group of local farmers still using traditional way, in identification of suitable crops for their farm. The method used is based on their experience and their ancestor guidance. It is important to formulate scientific method that can help to recommend suitable crops for specific land in order to help reduce inefficient use of land used for farming. This study introduce the concept of Analytical Hierarchy Process (AHP) in analytical study of land suitability, thus can help decision-makers to determine suitable crops for certain area. Using AHP to determine the best crop from four alternatives that used in this study, the result obtained from this study has shown that Cassava is the most suitable crop for the farm land that analyzed in this study, followed by Soybean on the second place.
{"title":"Analytical hierarchy process for land suitability analysis","authors":"Rahmat Sholeh, F. Agus, H. R. Hatta, Tarbiyatul Munawwarah","doi":"10.1109/ICITACEE.2014.7065728","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065728","url":null,"abstract":"In the Agricultural Development Zone in East Kalimantan, inefficient land use is continuing to occur. Many of land utility planned by individual or by group of local farmers still using traditional way, in identification of suitable crops for their farm. The method used is based on their experience and their ancestor guidance. It is important to formulate scientific method that can help to recommend suitable crops for specific land in order to help reduce inefficient use of land used for farming. This study introduce the concept of Analytical Hierarchy Process (AHP) in analytical study of land suitability, thus can help decision-makers to determine suitable crops for certain area. Using AHP to determine the best crop from four alternatives that used in this study, the result obtained from this study has shown that Cassava is the most suitable crop for the farm land that analyzed in this study, followed by Soybean on the second place.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124725224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065752
A. Rubhasy, A. A. G. Yudhi Paramartha, I. Budi, Z. Hasibuan
Cultural heritage objects can be found everywhere, whether in heritage institutions (i.e. Library, Archive and Museum) or other sources. Since the cultural heritage has outstanding values to mankind, it is important for us to preserve and benefited its values. The challenging task is that the heritage collection is provided in digital format; have different type of media (i.e. text, image, video, audio and animation); and stored in scattered locations. This paper introduces ontology-based approach in management and retrieval cultural heritage multimedia collection. The goal is to enable the integration of different type of heritage media and to retrieve relevant heritage media to a given query in any type of media. In order to do this, the cultural heritage ontology is developed based on the World Heritage Classification provided by UNESCO/WHC. The ontology also included media classification to accommodate the heterogeneous nature of multimedia collection. The retrieval task is done using SPARQL query language. The result shows that all type of relevant heritage media can be retrieved and the number of retrieved non-relevant media is relatively low.
{"title":"Management and retrieval of cultural heritage multimedia collection using ontology","authors":"A. Rubhasy, A. A. G. Yudhi Paramartha, I. Budi, Z. Hasibuan","doi":"10.1109/ICITACEE.2014.7065752","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065752","url":null,"abstract":"Cultural heritage objects can be found everywhere, whether in heritage institutions (i.e. Library, Archive and Museum) or other sources. Since the cultural heritage has outstanding values to mankind, it is important for us to preserve and benefited its values. The challenging task is that the heritage collection is provided in digital format; have different type of media (i.e. text, image, video, audio and animation); and stored in scattered locations. This paper introduces ontology-based approach in management and retrieval cultural heritage multimedia collection. The goal is to enable the integration of different type of heritage media and to retrieve relevant heritage media to a given query in any type of media. In order to do this, the cultural heritage ontology is developed based on the World Heritage Classification provided by UNESCO/WHC. The ontology also included media classification to accommodate the heterogeneous nature of multimedia collection. The retrieval task is done using SPARQL query language. The result shows that all type of relevant heritage media can be retrieved and the number of retrieved non-relevant media is relatively low.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065736
S. R. Sulistiyanti, M. Komarudin, L. Hakim, A. Yudamson
In this paper, we report our experiment about wavelet decomposition for study environmental condition based on infrared images. Infrared images acquired by consumer digital camera, after replacing the infrared stoping filter with filter SRS, and the images captured sequentially every two hours (from 06:00-16:00). The result of this research is the increasing air pollution characterized using wavelet decomposition by increasing index value from 0-3 and amount of white spots about 60% (from 5%-65%). Finally wavelet decomposition was made to estimate the environmental condition, especially air pollution, based on infrared image.
{"title":"Study of environmental condition using wavelet decomposition based on infrared image","authors":"S. R. Sulistiyanti, M. Komarudin, L. Hakim, A. Yudamson","doi":"10.1109/ICITACEE.2014.7065736","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065736","url":null,"abstract":"In this paper, we report our experiment about wavelet decomposition for study environmental condition based on infrared images. Infrared images acquired by consumer digital camera, after replacing the infrared stoping filter with filter SRS, and the images captured sequentially every two hours (from 06:00-16:00). The result of this research is the increasing air pollution characterized using wavelet decomposition by increasing index value from 0-3 and amount of white spots about 60% (from 5%-65%). Finally wavelet decomposition was made to estimate the environmental condition, especially air pollution, based on infrared image.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133732156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065768
M. U. Aslam, Muhammad Usman Cheema, Muhammad Bilal Cheema, Muhammad Samran
The 500KV substations are important for power system in Pakistan. They cover large area meeting the power requirement of whole power system. The ground grid system of substation has to be carefully analyzed in order to protect the grid, keep the system functional. A practical 500KV substation is chosen for this purpose i.e. RAWAT Grid Station. The grounding system of substation is studied in detail along with practical data collection for the purpose of analysis. It is important to mention about latest IEEE 81 2013 methods which have been adopted during data collection phase. The ETAP software version 12 is used for modeling and analysis of network. The Ground Grid System (GGS) module included in latest version of ETAP i.e. ETAP 12 is used for analysis. Firstly modeling is done in ETAP-12, afterwards analysis is performed on actual ground mesh using IEEE 80-2000 improved methods to evaluate step potential, ground potential rise, ground resistance, short term temperature rise of conductors /rods & touch potential. The shortcomings in existing grid mesh are highlighted and remedial actions are suggested to rectify the problems. The extension is planned in the substation regarding installation of new power transformer which will result to in rise of overall substation fault level. The increase in fault level is considered in one case study and possible solution is provided. A new ground mesh is also designed for this area which will serve as a model for future substations which will be designed in this particular area keeping in view essential parameters. A new ground mesh is also designed for 750KV substation, as it will be part of our national grid in near future as feasibility study is ongoing in NTDC Pakistan for the establishment of first 750KV substation in this area. The variation in ground grid resistance and various safety parameters with the change in ground grid mesh shape, depth and size is explained by the help of results obtained through Case studies.
{"title":"Design analysis and optimization of ground grid mesh of extra high voltage substation using an intelligent software","authors":"M. U. Aslam, Muhammad Usman Cheema, Muhammad Bilal Cheema, Muhammad Samran","doi":"10.1109/ICITACEE.2014.7065768","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065768","url":null,"abstract":"The 500KV substations are important for power system in Pakistan. They cover large area meeting the power requirement of whole power system. The ground grid system of substation has to be carefully analyzed in order to protect the grid, keep the system functional. A practical 500KV substation is chosen for this purpose i.e. RAWAT Grid Station. The grounding system of substation is studied in detail along with practical data collection for the purpose of analysis. It is important to mention about latest IEEE 81 2013 methods which have been adopted during data collection phase. The ETAP software version 12 is used for modeling and analysis of network. The Ground Grid System (GGS) module included in latest version of ETAP i.e. ETAP 12 is used for analysis. Firstly modeling is done in ETAP-12, afterwards analysis is performed on actual ground mesh using IEEE 80-2000 improved methods to evaluate step potential, ground potential rise, ground resistance, short term temperature rise of conductors /rods & touch potential. The shortcomings in existing grid mesh are highlighted and remedial actions are suggested to rectify the problems. The extension is planned in the substation regarding installation of new power transformer which will result to in rise of overall substation fault level. The increase in fault level is considered in one case study and possible solution is provided. A new ground mesh is also designed for this area which will serve as a model for future substations which will be designed in this particular area keeping in view essential parameters. A new ground mesh is also designed for 750KV substation, as it will be part of our national grid in near future as feasibility study is ongoing in NTDC Pakistan for the establishment of first 750KV substation in this area. The variation in ground grid resistance and various safety parameters with the change in ground grid mesh shape, depth and size is explained by the help of results obtained through Case studies.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115075511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065773
I. G. N. Satriyadi Hernanda, Evril N. Kartinisari, D. A. Asfani, D. Fahmi
A power system must be able to deliver the electric power even though some disturbance occurs. The failure of the protection system to localized fault can cause catastrophic failure of a system or blackout. In this research, an algorithm based on Monte Carlo simulations is proposed to obtain the reliability index that considers the overcurrent relay coordination varied by time settings of overcurrent relay. The reliability index consists of SAIFI, SAIDI, and CAIDI. Monte Carlo is a simulation procedure to obtain the reliability index by using a random number of generation and a simulated through a program. The results from Monte Carlo simulations is to determine the disturbance in a transmission line, the overcurrent relay that works at the time, and the reliability index on consumer that the parameters is derived from the amount of the failure rate and the rate of improvement of the line and transformer. The proposed method is compared to commercial software that is ETAP®. The results of ETAP simulation only count the failures in transformers, and the outcome of SAIFI and SAIDI is 0.013 and 0.1819. Other ways on the Monte Carlo simulation to determine disturbances in line with the generation of random numbers on the 2000 iteration, value of SAIFI and SAIDI is 0.0139 and 0.2697. The strength points of this study are implementing and analyzing the method into real system in Indonesia.
{"title":"Analysis of protection failure effect and relay coordination on reliability index","authors":"I. G. N. Satriyadi Hernanda, Evril N. Kartinisari, D. A. Asfani, D. Fahmi","doi":"10.1109/ICITACEE.2014.7065773","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065773","url":null,"abstract":"A power system must be able to deliver the electric power even though some disturbance occurs. The failure of the protection system to localized fault can cause catastrophic failure of a system or blackout. In this research, an algorithm based on Monte Carlo simulations is proposed to obtain the reliability index that considers the overcurrent relay coordination varied by time settings of overcurrent relay. The reliability index consists of SAIFI, SAIDI, and CAIDI. Monte Carlo is a simulation procedure to obtain the reliability index by using a random number of generation and a simulated through a program. The results from Monte Carlo simulations is to determine the disturbance in a transmission line, the overcurrent relay that works at the time, and the reliability index on consumer that the parameters is derived from the amount of the failure rate and the rate of improvement of the line and transformer. The proposed method is compared to commercial software that is ETAP®. The results of ETAP simulation only count the failures in transformers, and the outcome of SAIFI and SAIDI is 0.013 and 0.1819. Other ways on the Monte Carlo simulation to determine disturbances in line with the generation of random numbers on the 2000 iteration, value of SAIFI and SAIDI is 0.0139 and 0.2697. The strength points of this study are implementing and analyzing the method into real system in Indonesia.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124381380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065744
S. Djanali, F. X. Arunanto, B. Pratomo, Abdurrazak Baihaqi, H. Studiawan, A. M. Shiddiqi
Attackers are most likely to exploit invalidated and unsanitized user input with several attacks such as cross-site scripting (XSS) or SQLinjection. Many methods were proposed to prevent those attacks. Some of them were created to learn about pattern and behavior of the attacker. That is honeypot. Honeypot is classified into two types based on the simulation that honeypot can do : low interaction and high interaction. In this paper, we propose a low-interaction honeypot for emulating vulnerabilities that can be exploited using XSS and SQL injection attacks. But this honeypot not only records attacker's request, but also try to expose attacker identity by using some browser exploitation techniques. Some attackers would use techniques to hide their identity, thus they couldn't be tracked. Our proposed honeypot was trying to overcome this problem by giving them malicious JavaScript codes. The malicious JavaScript codes will be run when an attacker open the honeypot's website. We have conducted several test to see how our honeypot's performance. Our honeypot could catch more useful information about the HTTP request than popular web-based honeypot, Glastopf. Moreover, there were attacker's social media accounts caught by using LikeJacking technique although they might have used proxy or TOR to hide their identity.
{"title":"Aggressive web application honeypot for exposing attacker's identity","authors":"S. Djanali, F. X. Arunanto, B. Pratomo, Abdurrazak Baihaqi, H. Studiawan, A. M. Shiddiqi","doi":"10.1109/ICITACEE.2014.7065744","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065744","url":null,"abstract":"Attackers are most likely to exploit invalidated and unsanitized user input with several attacks such as cross-site scripting (XSS) or SQLinjection. Many methods were proposed to prevent those attacks. Some of them were created to learn about pattern and behavior of the attacker. That is honeypot. Honeypot is classified into two types based on the simulation that honeypot can do : low interaction and high interaction. In this paper, we propose a low-interaction honeypot for emulating vulnerabilities that can be exploited using XSS and SQL injection attacks. But this honeypot not only records attacker's request, but also try to expose attacker identity by using some browser exploitation techniques. Some attackers would use techniques to hide their identity, thus they couldn't be tracked. Our proposed honeypot was trying to overcome this problem by giving them malicious JavaScript codes. The malicious JavaScript codes will be run when an attacker open the honeypot's website. We have conducted several test to see how our honeypot's performance. Our honeypot could catch more useful information about the HTTP request than popular web-based honeypot, Glastopf. Moreover, there were attacker's social media accounts caught by using LikeJacking technique although they might have used proxy or TOR to hide their identity.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"80 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129870670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-10-26DOI: 10.1109/ICITACEE.2014.7065788
F. B. Setiawan
Speech signal can be modeled by sinusoidal model. On the sinusoidal model, there are many kinds for representing the signal. One of model is Segmental Sinusoidal model. The segmental sinusoidal model is an approximation method based on sinusoidal model for speech signal, especially for periodic detection. The periodic signal can be decomposed by infinite sinusoidal signal with combination of amplitude, frequency and phase. After the signal is decomposed, parameter will be quantized. The proposed quantization method in this paper is sampling signal on big part between minimum and maximum part over observation block. Some parameters of speech signal are detected. The useful parameters are peaks and period between consecutive peaks. Period information obtained from this quantization tends to different than the original, In this paper, we show the experimental results that there are many differences between period information on encoder side with the decoder side. It caused by quantization error on period information and quantization error on the codebook design. Effect of differences is degradation of signal quality, especially on frequency signal accuracy. On this paper, deviation of the reconstructed signal from original signal will be evaluated. Deviation from the original signals means that some error occur on period quantization.
{"title":"Period information deviation on the segmental sinusoidal model","authors":"F. B. Setiawan","doi":"10.1109/ICITACEE.2014.7065788","DOIUrl":"https://doi.org/10.1109/ICITACEE.2014.7065788","url":null,"abstract":"Speech signal can be modeled by sinusoidal model. On the sinusoidal model, there are many kinds for representing the signal. One of model is Segmental Sinusoidal model. The segmental sinusoidal model is an approximation method based on sinusoidal model for speech signal, especially for periodic detection. The periodic signal can be decomposed by infinite sinusoidal signal with combination of amplitude, frequency and phase. After the signal is decomposed, parameter will be quantized. The proposed quantization method in this paper is sampling signal on big part between minimum and maximum part over observation block. Some parameters of speech signal are detected. The useful parameters are peaks and period between consecutive peaks. Period information obtained from this quantization tends to different than the original, In this paper, we show the experimental results that there are many differences between period information on encoder side with the decoder side. It caused by quantization error on period information and quantization error on the codebook design. Effect of differences is degradation of signal quality, especially on frequency signal accuracy. On this paper, deviation of the reconstructed signal from original signal will be evaluated. Deviation from the original signals means that some error occur on period quantization.","PeriodicalId":404830,"journal":{"name":"2014 The 1st International Conference on Information Technology, Computer, and Electrical Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122170558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}