EMITTER International Journal of Engineering Technology
EMITTER International Journal of Engineering Technology is a BI-ANNUAL journal published by Politeknik Elektronika Negeri Surabaya (PENS). It aims to encourage initiatives, to share new ideas, and to publish high-quality articles in the field of engineering technology and available to everybody at no cost. It stimulates researchers to explore their ideas and enhance their innovations in the scientific publication on engineering technology.
EMITTER International Journal of Engineering Technology primarily focuses on analyzing, applying, implementing and improving existing and emerging technologies and is aimed to the application of engineering principles and the implementation of technological advances for the benefit of humanity.
Articles
12 Documents
Search results for
, issue
"Vol 4 No 1 (2016)"
:
12 Documents
clear
Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers
Rizky Pratama Hudhajanto;
I Gede Puja Astawa;
Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (348.785 KB)
|
DOI: 10.24003/emitter.v4i1.58
Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to use this scheme to transmit a sensitive data, such as in the military and commercial communication systems. In this paper, we propose a new method to increase the security of MIMO-OFDM system using the change of location of fake subcarrier. The fake subcarriers’ location is generated per packet of data using Pseudo Random sequence generator. The simulation results show that the proposed scheme does not decrease the performance of conventional MIMO-OFDM. The attacker or eavesdropper gets worse Bit Error Rate (BER) than the legal receiver compared to the conventional MIMO-OFDM system.
Multi Voxel Descriptor for 3D Texture Retrieval
Hero Yudo Martono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (435.356 KB)
|
DOI: 10.24003/emitter.v4i1.110
In this paper, we present a new feature descriptors which exploit voxels for 3D textured retrieval system when models vary either by geometric shape or texture or both. First, we perform pose normalisation to modify arbitrary 3D models in order to have same orientation. We then map the structure of 3D models into voxels. This purposes to make all the 3D models have the same dimensions. Through this voxels, we can capture information from a number of ways. First, we build biner voxel histogram and color voxel histogram. Second, we compute distance from centre voxel into other voxels and generate histogram. Then we also compute fourier transform in spectral space. For capturing texture feature, we apply voxel tetra pattern. Finally, we merge all features by linear combination. For experiment, we use standard evaluation measures such as Nearest Neighbor (NN), First Tier (FT), Second Tier (ST), Average Dynamic Recall (ADR). Dataset in SHREC 2014 and its evaluation program is used to verify the proposed method. Experiment result show that the proposed method is more accurate when compared with some methods of state-of-the-art.
A Prediction System of Dengue Fever Using Monte Carlo Method
Mochammad Choirur Roziqin;
Achmad Basuki;
Tri Harsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (246.598 KB)
|
DOI: 10.24003/emitter.v4i1.111
Dengue fever is an acute disease that clinically can cause death because there is no prediction system to estimate dengue fever cases so it resulted in the growing of dengue fever cases every year. Original data gathering in Jember area that uses technique of partial data gathering has caused data missing. To make this secondary data can be processed in prediction stage there is need to conduct missing imputation by using Monte Carlo method with four different randomization method, followed by data normality test with chi-square, then continued to regression stage. We use MSE (Mean Square Error) to measure prediction error. The smallest MSE result of regression is the best regression model for prediction.
The rSPA Processes of River Water-quality Analysis System for Critical Contaminate Detection, Classification Multiple-water-quality-parameter Values and Real-time Notification
Chalisa VEESOMMAI;
Yasushi KIYOKI
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2875.13 KB)
|
DOI: 10.24003/emitter.v4i1.112
The water quality analysis is one of the most important aspects of designing environmental systems. It is necessary to realize detection and classification processes and systems for water quality analysis. The important direction is to lead to uncomplicated understanding for public utilization. This paper presents the river Sensing Processing Actuation processes (rSPA) for determination and classification of multiple-water- parameters in Chaophraya river. According to rSPA processes of multiple-water-quality-parameters, we find the pollutants of conductivity, salinity and total dissolved solid (TDS), which are accumulated from upstream to downstream. In several spots of the river, we have analyzed water quality in a maximum value of pollutants in term of oxidation-reduction potential (ORP). The first range effect of parameter is to express high to very high effects in term of dissolved oxygen, second is to express intermediate to very high effect in term of conductivity, third is to express low to very high effect in term of total dissolved solid, fourth is to express completely safe to very high effect in term of turbidity and the final is to express completely safe for effect in term of salinity.
An Embedded System for applying High Performance Computing in Educational Learning Activity
Irene Erlyn Wina Rachmawan;
Nurul Fahmi;
Edi Wahyu Widodo;
Samsul Huda;
M. Unggul Pamenang;
M. Choirur Roziqin;
Andri Permana W.;
Stritusta Sukaridhoto;
Dadet Pramadihanto
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1553.613 KB)
|
DOI: 10.24003/emitter.v4i1.113
HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in universities could be consuming a lot of resources because well-known HPC system are using Personal Computer or Server. By using PC as the practical moduls it is need great resources and spaces. This paper presents an innovative high performance computing cluster system to support education learning activities in HPC course with small size, low cost, and yet powerful enough. In recent years, High Performance computing usually implanted in cluster computing and require high specification computer and expensive cost. It is not efficient applying High Performance Computing in Educational research activiry such as learning in Class. Therefore, our proposed system is created with inexpensive component by using Embedded System to make High Performance Computing applicable for leaning in the class. Students involved in the construction of embedded system, built clusters from basic embedded and network components, do benchmark performance, and implement simple parallel case using the cluster.  In this research we performed evaluation of embedded systems comparing with i5 PC, the results of our embedded system performance of NAS benchmark are similar with i5 PCs. We also conducted surveys about student learning satisfaction that with embedded system students are able to learn about HPC from building the system until making an application that use HPC system.
Performance Analysis of Scheduling Schemes for Femto to Macro Interference Coordination in LTE-Femtocell Deployment Scenario
Rafina Destiarti Ainul;
Haniah Mahmudah;
Ari Wijayanti
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (563.184 KB)
|
DOI: 10.24003/emitter.v4i1.114
Deploying femtocells that have low power level in LTE with small coverage area is an alternative solution for mobile operators to improve indoors network coverage area as well as system capacity. However deploying femtocells (HeNB) that were used co-channel frequency, can be brought about interference problem to the Macro BTS (eNB). Close Subscriber Group (CSG) of HeNB allows only User equipment (UE) to access HeNB. HeNB is the source of interference for UE who cannot access it. Therefore it is necessary for interference coordination methods among the HeNB and eNB. The methods are ICIC (Intercell Interference Coordination) and eICIC (enhanced Intercell Interference Coordination). Â This paper proposed performance analysis of scheduling schemes for Femto to macro interference coordination that allocated resource in the frequency and time domain using LTE-Femtocell suburban and urban deployment scenario. Simulation result using ICIC methods can improve SINR performance 15.77 % in urban and 28.66 % in suburban, throughput performance 10.11 % in urban and 21.05 % in suburban. eICIC methods can improve SINR performance 17.44 % in urban and 31.14 % in suburban, throughput performance 19.83% in urban and 44.39 % in suburban.The result prove using eICIC method in time domain resource have better performance than using ICIC method in frequency resource. However using eICIC method in suburban deployment scenariocan increase the performance of SINR and throughput more effective than using eICIC method in urban deployment scenario.
Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard
Nurul Fahmi;
M. Udin Harun Al Rasyid;
Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2836.872 KB)
|
DOI: 10.24003/emitter.v4i1.115
In the recent years, Wireless Sensor Networks (WSNs) have become a very popular technology for research in various fields. One of the technologies which is developed using WSN is environmental health monitoring. However, there is a problem when we want to optimize the performance of the environmental health monitoring such as the limitation of the energy. In this paper, we proposed a method for the environmental health monitoring using the fuzzy logic approach according to the environmental health conditions. We use that condition to determine the sleep time in the system based on IEEE 802.15.4 standard protocol. The main purpose of this method is to extend the life and minimize the energy consumption of the battery. We implemented this system in the real hardware test-bed using temperature, humidity, CO and CO2 sensors. We compared the performance without sleep scheduling, with sleep scheduling and adaptive sleep scheduling. The power consumption spent during the process of testing without sleep scheduling is 52%, for the sleep scheduling is 13%, while using the adaptive sleep scheduling is around 7%. The users also can monitor the health condition via mobile phone or web-based application, in real-time anywhere and anytime.
Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network
Samsul Huda;
Amang Sudarsono;
Tri Harsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2906.57 KB)
|
DOI: 10.24003/emitter.v4i1.116
MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms, we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.
Review of A* (A Star) Navigation Mesh Pathfinding as the Alternative of Artificial Intelligent for Ghosts Agent on the Pacman Game
Moh. Zikky
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (2002.685 KB)
|
DOI: 10.24003/emitter.v4i1.117
Shortest pathfinding problem has become a populer issue in Game’s Artificial Intelligent (AI). This paper discussed the effective way to optimize the shortest pathfinding problem, namely Navigation Mesh (NavMesh). This method is very interesting because it has a large area of implementation, especially in games world. In this paper, NavMesh was implemented by using A* (A star) algorithm and examined in Unity 3D game engine. A* was an effective algorithm in shortest pathfinding problem because its optimization was made with effective tracing using segmentation line. Pac-Man game was chosen as the example of the shortest pathfinding by using NavMesh in Unity 3D. A* algorithm was implemented on the enemies of Pac-Man (three ghosts), which path was designed by using NavMesh concept. Thus, the movement of ghosts in catching Pac-Man was the result of this review of the effectiveness of this concept. In further research, this method could be implemented on several optimization programmes, such as Geographic Information System (GIS), robotics, and statistics.
Comparison of The Data-Mining Methods in Predicting The Risk Level of Diabetes
Andri Permana Wicaksono;
Tessy Badriyah;
Achmad Basuki
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (813.592 KB)
|
DOI: 10.24003/emitter.v4i1.119
Mellitus Diabetes is an illness that happened in consequence of the too high glucose level in blood because the body could not release or use insulin normally. The purpose of this research is to compare the two methods in The data-mining, those are a Regression Logistic method and a Bayesian method, to predict the risk level of diabetes by web-based application and nine attributes of patients data. The data which is used in this research are 1450 patients that are taken from RSD BALUNG JEMBER, by collecting data from 26 September 2014 until 30 April 2015. This research uses performance measuring from two methods by using discrimination score with ROC curve (Receiver Operating Characteristic). On the experiment result, it showed that two methods, Regression Logistic method and Bayesian method, have different performance excess score and are good at both. From the highest accuracy measurement and ROC using the same dataset, where the excess of Bayesian has the highest accuracy with 0,91 in the score while Regression Logistic method has the highest ROC score with 0.988, meanwhile on Bayesian, the ROC is 0.964. In this research, the plus of using Bayesian is not only can use categorical but also numerical.