Claim Missing Document
Check
Articles

Performance Analysis of Video Transmission Using Sequential Distortion Minimization Method for Digital Video Broadcasting Terrestrial Astin, Novita; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 4, No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.593 KB) | DOI: 10.24003/emitter.v4i2.150

Abstract

This paper presents about the transmission of Digital Video Broadcasting system with streaming video resolution 640x480 on different IQ rate and modulation. In the video transmission, distortion often occurs, so the received video has bad quality. Key frames selection algorithm is flexibel on a change of video, but on these methods, the temporal information of a video sequence is omitted. To minimize distortion between the original video and received video, we aimed at adding methodology using sequential distortion minimization algorithm. Its aim was to create a new video, better than original video without significant loss of content between the original video and received video, fixed sequentially. The reliability of video transmission was observed based on a constellation diagram, with the best result on IQ rate 2 Mhz and modulation 8 QAM. The best video transmission was also investigated using SEDIM (Sequential Distortion Minimization Method) and without SEDIM. The experimental result showed that the PSNR (Peak Signal to Noise Ratio) average of video transmission using SEDIM was an increase from 19,855 dB to 48,386 dB and SSIM (Structural Similarity) average increase 10,49%. The experimental results and comparison of proposed method obtained a good performance. USRP board was used as RF front-end on 2,2 GHz.
Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers Hudhajanto, Rizky Pratama; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 4, No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.785 KB) | DOI: 10.24003/emitter.v4i1.58

Abstract

Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to use this scheme to transmit a sensitive data, such as in the military and commercial communication systems. In this paper, we propose a new method to increase the security of MIMO-OFDM system using the change of location of fake subcarrier. The fake subcarriers’ location is generated per packet of data using Pseudo Random sequence generator. The simulation results show that the proposed scheme does not decrease the performance of conventional MIMO-OFDM. The attacker or eavesdropper gets worse Bit Error Rate (BER) than the legal receiver compared to the conventional MIMO-OFDM system.
Performance Analysis of an OFDM PHY Scheme with Zero Forcing Equalizer Using Software Defined Radio Platform and USRP Zainudin, Ahmad; Sudarsono, Amang; Astawa, I Gede Puja
EMITTER International Journal of Engineering Technology Vol 2, No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v2i1.15

Abstract

We present an implementation of Zero Forcing (ZF) equalizer in OFDM scheme using Software Defined Radio platform whereas NI USRP-2920 as the Radio Frequency (RF) front-end. ZF equalizer is employed to achieve reliable system at the receiver. Center frequency used for data transmission is 915 MHz. The reliability transmission and the performance of ZF equalizer are measured in term of different symbol mapping (i.e., M-PSK and M-QAM). The IQ rate determines the bandwidth available, whereas good performance is achieved with IQ rate less than 1 MHz.ZF equalizer achieves good performance when using BPSK, QPSK and 16-QAM modulation techniques. By applying ZF equalizer, bit error on BPSK and QPSK modulations can be reduced from 29,16% and 39,06% into 0%. This advantage of ZF equalizer also is able to press the bit error on 16- QAM and 64-QAM modulations into 3,125% and 8,85%, respectively.Keywords: OFDM,SDR, USRP,Zero Forcing Equalizer
Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System Yudha, R. Gaguk Pratama; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 4, No 2 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.5 KB) | DOI: 10.24003/emitter.v4i2.146

Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is a popular wireless data transmission scheme. However, its synchronization is still being a major problem when it is applied in real hardware. Cyclic Prefix (CP) based synchronization is one of the solutions in this problem, but CP has high crest factor. In the other hand, CAZAC sequence is another solution with lower crest factor but the higher complexity and also CAZAC has potential in security and channel estimation implementation. The performance between CP and CAZAC sequence based synchronization in OFDM system is analyzed in this paper. The real hardware, Universal Software Rado Peripheral (USRP), is used to prove the analysis. The CAZAC sequence has 10% performance increased in frequency offset than CP based synchronization.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning Tiyas, Indah Yulia Prafitaning; Barakbah, Ali Ridho; Harsono, Tri; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 2, No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10388.993 KB) | DOI: 10.24003/emitter.v2i1.16

Abstract

Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS) required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL). Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R) and high speed (44 ms).The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable.Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.
An Implementation of Error Minimization Data Transmission in OFDM using Modified Convolutional Code Briantoro, Hendy; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 3, No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.575 KB) | DOI: 10.24003/emitter.v3i2.44

Abstract

This paper presents about error minimization in OFDM system. In conventional system, usually using channel coding such as BCH Code or Convolutional Code. But, performance BCH Code or Convolutional Code is not good in implementation of OFDM System. Error bits of OFDM system without channel coding is 5.77%. Then, we used convolutional code with code rate 1/2, it can reduce error bitsonly up to 3.85%. So, we proposed OFDM system with Modified Convolutional Code. In this implementation, we used Software Define Radio (SDR), namely Universal Software Radio Peripheral (USRP) NI 2920 as the transmitter and receiver. The result of OFDM system using Modified Convolutional Code with code rate is able recover all character received so can decrease until 0% error bit. Increasing performance of Modified Convolutional Code is about 1 dB in BER of 10-4 from BCH Code and Convolutional Code. So, performance of Modified Convolutional better than BCH Code or Convolutional Code.Keywords: OFDM, BCH Code, Convolutional Code, Modified Convolutional Code, SDR, USRP
Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol Zainudin, Ahmad; Sudarsono, Amang; Pambudi, Kevin Prima
EMITTER International Journal of Engineering Technology Vol 3, No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (342.329 KB) | DOI: 10.24003/emitter.v3i2.50

Abstract

A DTN architecture consists of several nodes that are connected with high dynamic topology. The routing protocol is an important part which determine the DTN performance system. Although DTN is addressed to be tolerant of delay, a routing protocol with better performance will maximizing packet delivery rate and minimizing the delivery latency. This paper evaluate a level signal priority epidemic routing protocol for delay tolerant network architecture. Our system adopts DTN2 framework using classic epidemic and priority epidemic dynamic routing protocols. The performance of both dynamic routing is observed and compared based on throughput and delay of transmitted data. The measurement results show that the classic epidemic use more bandwith due to sending the same messages many times. The delay transmission using a level signal priority epidemic routing is smaller than classic epidemic routing protocol in all hops of the test-bed. Epidemic based on signal level routing could make traffic of network more efficient than classic Epidemic routing because of filtering system in node before sending bundle to neighbor node.Keywords: DTN, dynamic routing, level signal priority
Classification of Radical Web Content in Indonesia using Web Content Mining and k-Nearest Neighbor Algorithm Subhan, Muh; Sudarsono, Amang; Barakbah, Ali Ridho
EMITTER International Journal of Engineering Technology Vol 5, No 2 (2017)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24003/emitter.v5i2.214

Abstract

Radical content in procedural meaning is content which have provoke the violence, spread the hatred and anti nationalism. Radical definition for each country is different, especially in Indonesia. Radical content is more identical with provocation issue, ethnic and religious hatred that is called SARA in Indonesian languange. SARA content is very difficult to detect due to the large number, unstructure system and many noise can be caused multiple interpretations. This problem can threat the unity and harmony of the religion. According to this condition, it is required a system that can distinguish the radical content or not. In this system, we propose text mining approach using DF threshold and Human Brain as the feature extraction. The system is divided into several steps, those are collecting data which is including at preprocessing part, text mining, selection features, classification for grouping the data with class label, simillarity calculation of data training, and visualization to the radical content or non radical content. The experimental result show that using combination from 10-cross validation and k-Nearest Neighbor (kNN) as the classification methods achieve 66.37% accuracy performance with 7 k value of kNN method[1].
Modified GTS Allocation Scheme for IEEE 802.15.4 Darmawan, Zakha Maisat Eka; Al Rasyid, M. Udin Harun; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 3, No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (230.914 KB) | DOI: 10.24003/emitter.v3i1.92

Abstract

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.
Co-Authors Abd. Rasyid Syamsuri Adam Surya Putra Adam Surya Putra Afifah Dwi Ramadhani agostinho marques ximenes Ahmad Zainudin Ali Ridho Barakbah Anang Budikarso Anang Budikarso, Anang Anang Siswanto Anang Siswanto Anang Siswanto, Anang Anindya Dwi Putri Islamidina Ari Wijayanti Ari Wijayanti Aries Pratiarso Aries Pratiarso Aries Pratiarso, Aries Astin, Novita Bambang Sumantri Bayu Dwiyan Satria Bih Hwang Lee Bima Sena Bayu Dewantara Choirun Nisa Dadet Pramadihanto Darmawan, Zakha Maisat Eka Dewi, Florista Dewi, Ni Made Lintang Asvini Dian Neipa Purnamasari Donny Farhan Eko Prayitno Farel Juliansyah Farhan, Donny Febby Ronaldo Fitri, Novi Aryani Florista Dewi Gulo, Melki Mario Gunawan, M. Wisnu Hadi, Mochammad Zen Samsono Haniah Mahmudah Hari Wahyuningrat S. Hary Oktavianto Haryadi Amran Hasan Basri Hasan Basri Hendy Briantoro Heru Iswanto Heru Iswanto, Heru Hidayah, Nuril Hudhajanto, Rizky Pratama I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Astawa I Gede Puja Aswara Ida Anisah Idris Winarno Indah Yulia Prafitaning Tiyas Indah Yulia Prafitaning Tiyas, Indah Yulia Prafitaning Inka Trisna Dewi Ismed Jauhar Ismed Jauhar, Ismed Juliansyah, Farel Kevin Prima Pambudi Kevin Prima Pambudi, Kevin Prima Lordan Kimbal, Heaven Louis Nashih Uluwan Arif M Udin Harun Al Rasyid, M Udin Harun M. Cahyo Kriswantoro Mahardhika, Yesta Medya Mahmudah, Haniah Mala Nurilmala Mike Yuliana Mochammad Zen Samsono Hadi Mohamad Ridwan Muh Subhan Muh. Alfan Taufiqurrahman Muhammad Taufiq Sumadi Nanang Syahroni Ni Made Lintang Asvini Dewi Nihayatus Sa'adah Nihayatus Sa'adah Ningsih, Norma Novita Astin Nur Nur Adi Siswandari Nurul Fahmi Nurul Fahmi Nurul Fahmi Priambodo, Naufal Ammar Prima Kristalina Putra, Adam Surya Qoirul Setiawan Qoirul Setiawan, Qoirul R Rizki Rachmadi R. Gaguk Pratama Yudha Rafina Destiarti Ainul Rahardita Widyatra Ramadhani, Afifah Dwi Reni Soelistijorini Renovita Edelani Rini Satiti Rizky Pratama Hudhajanto Rokhmat Albasyih Samsul Huda Samsul Huda Santoso, Tribudi Saputro, Anton Cahyo Satiti, Rini Sa’adah, Nihayatus Soelistijorini, Reni Sritrusta Sukaridhoto Subhan, Muh Syahroni, Nanang Taufiqurrahman, Muh. Alfan Titon Dutono Tri Budi Santoso Tri Budi Santoso Tri Harsono Tri Susanti TRI SUSANTI Tribudi Santoso Vivien Arief Wardhany Wahjoe Tjatur Sesulihatien Wahyuningrat S., Hari Winarmo, Idris Ximenes, Agostinho Marques Yoedy Moegiharto, Yoedy Yoga Yuniadi Yudha, R. Gaguk Pratama Yuliana, Mike