Claim Missing Document
Check
Articles

Found 49 Documents
Search
Journal : EMITTER International Journal of Engineering Technology

Performance Analysis of Circular 8-QAM Constellation with MMSE Equalizer for OFDM System Using USRP Taufiqurrahman, Muh. Alfan; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 4, No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1974.161 KB) | DOI: 10.24003/emitter.v4i2.148

Abstract

Bandwidth is very important in communication system, and it is a limited resource. In order to save the limited bandwidth resource, high order M-ary modulation is widely employed in modern communication and broadcasting systems. In Orthogonal Frequency Division Multiplexing (OFDM), fading environment lead to a loss of orthogonality between the subcarriers. In this paper, we present the performance analysis of circular 8-Quadrature Ampilutude Modulation (QAM) constellation for Orthogonal Frequency Division Multiplexing (OFDM) system. We also combine the system with Minimum Mean Square Error (MMSE) equalizer to mitigate the effect of Inter Symbol Interference (ISI). Then, all of this system is implemented practically using Universal Software Radio Peripheral (USRP). The performance of circular 8-QAM and MMSE equalizer is evaluated by comparing with other 8-QAM modulation models such as circular-Zero Forcing (ZF), star-ZF, Square-ZF, Star-MMSE, and Square-MMSE. The performance of circular 8-QAM with MMSE equalizer is  better than the other combinations. Bit Error Rate (BER) graph shows that the performance of circular-MMSE is better than star-MMSE. The performance improvement using circular-MMSE is about 1.6%. The performance will decrease when the distance is increased. The performance of this system is greatly affected by the distance between transmitter and receiver.
Botnet Detection Using On-line Clustering with Pursuit Reinforcement Competitive Learning (PRCL) Mahardhika, Yesta Medya; Sudarsono, Amang; Barakbah, Ali Ridho
EMITTER International Journal of Engineering Technology Vol 6, No 1 (2018)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (4349.397 KB) | DOI: 10.24003/emitter.v6i1.207

Abstract

Botnet is a malicious software that often occurs at this time, and can perform malicious activities, such as DDoS, spamming, phishing, keylogging, clickfraud, steal personal information and important data. Botnets can replicate themselves without user consent. Several systems of botnet detection has been done by using classification methods. Classification methods have high precision, but it needs more effort to determine appropiate classification model. In this paper, we propose reinforced  approach to detect botnet with On-line Clustering using Reinforcement Learning. Reinforcement Learning involving interaction with the environment and became new paradigm in machine learning. The reinforcement learning will be implemented with some rule detection, because botnet ISCX dataset is categorized as unbalanced dataset which have high range of each number of class. Therefore we implemented Reinforcement Learning to Detect Botnet using Pursuit Reinforcement Competitive Learning (PRCL) with additional rule detection which has reward and punisment rules to achieve the solution. Based on the experimental result, PRCL can detect botnet in real time with high  accuracy (100% for Neris, 99.9% for Rbot, 78% for SMTP_Spam, 80.9% for Nsis, 80.7% for Virut, and 96.0% for Zeus) and fast processing time up to 176 ms. Meanwhile the step of CPU and memory usage which are 78 % and 4.3 GB  for pre-processing, 34% and 3.18 GB for online clustering with PRCL, and  23% and 3.11 GB evaluation. The proposed method is one solution for network administrators to detect botnet which has unpredictable behavior in network traffic.
Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player Wardhany, Vivien Arief; Sukaridhoto, Sritrusta; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 2, No 2 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i2.25

Abstract

The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz) than woman (165 to 255 Hz).The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system.Keywords: Automatic Speech Recognizer, Indonesian Acoustic Model, CMU Sphinx, indonesian Language Model, Recognition Rate, XBMC.
Trusted Data Transmission Using Data Scrambling Security Method with Asymmetric Key Algorithm for Synchronization Saadah, Nihayatus; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 6, No 2 (2018)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (804.766 KB) | DOI: 10.24003/emitter.v6i2.267

Abstract

Security is a major concern of the internet world because the development of the Internet requires the security of data transmission. The security method helps us to store valuable information and send it over an insecure network so that it can not be read by anyone except the intended recipient. Security algorithm uses data randomization method. This method of data information randomization has a low computation time with a large number of bits when compared to other encryption algorithms. In general, the encryption algorithm is used to encrypt data information, but in this research the encryption algorithm is used for synchronization between the sender and the intended recipient. Number of bits on asymmetric key algorithm for synchronization are the 64-bits, 512-bits and 1024-bits. We will prove that security methods can secure data sent with low computational time with large number of bits. In the result will be shown the value of computing time with variable number of bits sent. When data are sent by 50 bytes, encryption time required 2 ms using 1024 bits for synchronization technique asymmetric key algorithm. 
Medical Health Record Protection Using Ciphertext-Policy Attribute-Based Encryption and Elliptic Curve Digital Signature Algorithm Fitri, Novi Aryani; Al Rasyid, M. Udin Harun; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 7, No 1 (2019)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (999.468 KB) | DOI: 10.24003/emitter.v7i1.356

Abstract

Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it was stored in the data center. The user must go through an authentication process to ensure that not an attacker and verify to ensure the authenticity and accuracy of the data received. In this research, we proposed a solution to secure medical data using the Ciphertext-Policy Attribute-Based Encryption (CP-ABE) and Elliptic Curve Digital Signature Algorithm (ECDSA) methods. Our system can secure data centers from illegal access because the uploaded data has patient control over access rights based on attributes that have been embedded during the data encryption process. Encrypted data was added to the digital signature to pass the authentication process before being sent to the data center. The results of our experiments serve efficient system security and secure with low overhead. We compare the proposed system performance with the same CP-ABE method but don’t add user revocation to this system and for our computing times are shorter than the previous time for 0.06 seconds and 0.1 seconds to verify the signature. The total time in the system that we propose requires 0.6 seconds.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Ismed Jauhar; Amang Sudarsono; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Performance Analysis of an OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP Ahmad Zainudin; Amang Sudarsono; I Gede Puja Astawa
EMITTER International Journal of Engineering Technology Vol 2 No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i1.15

Abstract

We present an implementation of Zero Forcing (ZF) equalizer in OFDM scheme using Software Defined Radio platform whereas NI USRP-2920 as the Radio Frequency (RF) front-end. ZF equalizer is employed to achieve reliable system at the receiver. Center frequency used for data transmission is 915 MHz. The reliability transmission and the performance of ZF equalizer are measured in term of different symbol mapping (i.e., M-PSK and M-QAM). The IQ rate determines the bandwidth available, whereas good performance is achieved with IQ rate less than 1 MHz.ZF equalizer achieves good performance when using BPSK, QPSK and 16-QAM modulation techniques. By applying ZF equalizer, bit error on BPSK and QPSK modulations can be reduced from 29,16% and 39,06% into 0%. This advantage of ZF equalizer also is able to press the bit error on 16- QAM and 64-QAM modulations into 3,125% and 8,85%, respectively.Keywords: OFDM,SDR, USRP,Zero Forcing Equalizer
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning Indah Yulia Prafitaning Tiyas; Ali Ridho Barakbah; Tri Harsono; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 2 No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10388.993 KB) | DOI: 10.24003/emitter.v2i1.16

Abstract

Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS) required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL). Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R) and high speed (44 ms).The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable.Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.
Indonesian Automatic Speech Recognition For Command Speech Controller Multimedia Player Vivien Arief Wardhany; Sritrusta Sukaridhoto; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 2 No 2 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i2.25

Abstract

The purpose of multimedia devices development is controlling through voice. Nowdays voice that can be recognized only in English. To overcome the issue, then recognition using Indonesian language model and accousticc model and dictionary. Automatic Speech Recognizier is build using engine CMU Sphinx with modified english language to Indonesian Language database and XBMC used as the multimedia player. The experiment is using 10 volunteers testing items based on 7 commands. The volunteers is classifiedd by the genders, 5 Male & 5 female. 10 samples is taken in each command, continue with each volunteer perform 10 testing command. Each volunteer also have to try all 7 command that already provided. Based on percentage clarification table, the word “Kanan” had the most recognize with percentage 83% while “pilih” is the lowest one. The word which had the most wrong clarification is “kembali” with percentagee 67%, while the word “kanan” is the lowest one. From the result of Recognition Rate by male there are several command such as “Kembali”, “Utama”, “Atas “ and “Bawah” has the low Recognition Rate. Especially for “kembali” cannot be recognized as the command in the female voices but in male voice that command has 4% of RR this is because the command doesn’t have similar word in english near to “kembali” so the system unrecognize the command. Also for the command “Pilih” using the female voice has 80% of RR but for the male voice has only 4% of RR. This problem is mostly because of the different voice characteristic between adult male and female which male has lower voice frequencies (from 85 to 180 Hz) than woman (165 to 255 Hz).The result of the experiment showed that each man had different number of recognition rate caused by the difference tone, pronunciation, and speed of speech. For further work needs to be done in order to improving the accouracy of the Indonesian Automatic Speech Recognition system.Keywords: Automatic Speech Recognizer, Indonesian Acoustic Model, CMU Sphinx, indonesian Language Model, Recognition Rate, XBMC.
Traffic Analysis of Quality of Service (QoS) for Video Conferencing between Main Campus and Sub Campus in Laboratory Scale Amang Sudarsono; Anang Siswanto; Heru Iswanto; Qoirul Setiawan
EMITTER International Journal of Engineering Technology Vol 3 No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6439.001 KB) | DOI: 10.24003/emitter.v3i2.41

Abstract

Recently, in the distance learning system, video conferencing becomes one of expected course material delivery systems for creating a virtual class such that lecturer and student which are separated at long distance can engage a learning activity as well as face to face learning system. For this reason, the service availability and quality should be able to guaranteed and fulfilled. In this research, we analyze QoS of video conferencing between main campus and sub campus as the implementation of distance learning system in laboratory scale. Our experimental results show that the channel capacity or bandwidth of WAN connection between main campus and sub campus at 128 kbps is able to generate the throughput of video transmission and reception at 281 kbps and 24 kbps, respectively. Meanwhile, throughput of audio transmission and reception is 64 kbps and 26 kbps with the number of total packet loss for video and audio transmission is 84.3% and 29.2%, respectively. In this setting, the total jitter for video and audio transmission is 125 ms and 21 ms, respectively. In this case, there is no packet loss for traffic transmitting and receiving with jitter is not more than 5 ms. We also implemented QoS using Trust CoS model dan Trust DSCP for improving the quality of service in term of jitter up to 12.3% and 22.41%, respectively.Keywords: quality of service, throughput, delay, jitter, packet loss, Trust CoS, Trust DSCP
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Choirun Nisa Dadet Pramadihanto Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Inka Trisna Dewi Ismed Jauhar Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muh Subhan Muh. Alfan Taufiqurrahman Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Nihayatus Sa'adah Ningsih, Norma Novita Astin Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan Qoirul Setiawan, Qoirul R Rizki Rachmadi R. Gaguk Pratama Yudha Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rizky Pratama Hudhajanto Rokhmat Albasyih Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono Tri Susanti TRI SUSANTI Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yuliana, Mike