cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
EMITTER International Journal of Engineering Technology
ISSN : 2355391x     EISSN : -     DOI : -
Core Subject : Science,
EMITTER International Journal of Engineering Technology is a BI-ANNUAL journal published by Politeknik Elektronika Negeri Surabaya (PENS). It aims to encourage initiatives, to share new ideas, and to publish high-quality articles in the field of engineering technology and available to everybody at no cost. It stimulates researchers to explore their ideas and enhance their innovations in the scientific publication on engineering technology. EMITTER International Journal of Engineering Technology primarily focuses on analyzing, applying, implementing and improving existing and emerging technologies and is aimed to the application of engineering principles and the implementation of technological advances for the benefit of humanity.
Arjuna Subject : -
Articles 436 Documents
Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol Ahmad Zainudin; Amang Sudarsono; Kevin Prima Pambudi
EMITTER International Journal of Engineering Technology Vol 3 No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (342.329 KB) | DOI: 10.24003/emitter.v3i2.50

Abstract

A DTN architecture consists of several nodes that are connected with high dynamic topology. The routing protocol is an important part which determine the DTN performance system. Although DTN is addressed to be tolerant of delay, a routing protocol with better performance will maximizing packet delivery rate and minimizing the delivery latency. This paper evaluate a level signal priority epidemic routing protocol for delay tolerant network architecture. Our system adopts DTN2 framework using classic epidemic and priority epidemic dynamic routing protocols. The performance of both dynamic routing is observed and compared based on throughput and delay of transmitted data. The measurement results show that the classic epidemic use more bandwith due to sending the same messages many times. The delay transmission using a level signal priority epidemic routing is smaller than classic epidemic routing protocol in all hops of the test-bed. Epidemic based on signal level routing could make traffic of network more efficient than classic Epidemic routing because of filtering system in node before sending bundle to neighbor node.Keywords: DTN, dynamic routing, level signal priority
Covert Communication in MIMO-OFDM System Using Pseudo Random Location of Fake Subcarriers Rizky Pratama Hudhajanto; I Gede Puja Astawa; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (348.785 KB) | DOI: 10.24003/emitter.v4i1.58

Abstract

Multiple-Input Multiple-Output Orthogonal Frequency Division Multiplexing (MIMO-OFDM) is the most used wireless transmission scheme in the world. However, its security is the interesting problem to discuss if we want to use this scheme to transmit a sensitive data, such as in the military and commercial communication systems. In this paper, we propose a new method to increase the security of MIMO-OFDM system using the change of location of fake subcarrier. The fake subcarriers’ location is generated per packet of data using Pseudo Random sequence generator. The simulation results show that the proposed scheme does not decrease the performance of conventional MIMO-OFDM. The attacker or eavesdropper gets worse Bit Error Rate (BER) than the legal receiver compared to the conventional MIMO-OFDM system.
Modified GTS Allocation Scheme for IEEE 802.15.4 Zakha Maisat Eka Darmawan; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 3 No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (230.914 KB) | DOI: 10.24003/emitter.v3i1.92

Abstract

IEEE 802.15.4 standard is widely used in wireless personal area networks (WPANs). The devices transmit data during two periods: contention access period (CAP) by accessing the channel using CSMA/CA and contention free period (CFP), which consists of guaranteed time slots (GTS) allocated to individual devices by the personal area network (PAN). However, the use of GTS slot size may lead to severe bandwidth wastage if  the traffic pattern is not fit or only a small portion of GTS slot is used by allocated device. The proposed scheme devides the GTS slot and then optimizes the GTS slot size by exploiting the value of superframe order (SO) information. The proposed scheme was tested through simulations and the results show that the new GTS allocation scheme perform better than the original IEEE 802.15.4 standard in terms of average transmitted packets, throughput, latency and probability of successful packets.
Multi Voxel Descriptor for 3D Texture Retrieval Hero Yudo Martono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.356 KB) | DOI: 10.24003/emitter.v4i1.110

Abstract

In this paper, we present a new feature descriptors  which exploit voxels for 3D textured retrieval system when models vary either by geometric shape or texture or both. First, we perform pose normalisation to modify arbitrary 3D models  in order to have same orientation. We then map the structure of 3D models into voxels. This purposes to make all the 3D models have the same dimensions. Through this voxels, we can capture information from a number of ways.  First, we build biner voxel histogram and color voxel histogram.  Second, we compute distance from centre voxel into other voxels and generate histogram. Then we also compute fourier transform in spectral space.  For capturing texture feature, we apply voxel tetra pattern. Finally, we merge all features by linear combination. For experiment, we use standard evaluation measures such as Nearest Neighbor (NN), First Tier (FT), Second Tier (ST), Average Dynamic Recall (ADR). Dataset in SHREC 2014  and its evaluation program is used to verify the proposed method. Experiment result show that the proposed method  is more accurate when compared with some methods of state-of-the-art.
A Prediction System of Dengue Fever Using Monte Carlo Method Mochammad Choirur Roziqin; Achmad Basuki; Tri Harsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (246.598 KB) | DOI: 10.24003/emitter.v4i1.111

Abstract

Dengue fever is an acute disease that clinically can cause death because there is no prediction system to estimate dengue fever cases so it resulted in the growing of dengue fever cases every year. Original data gathering in Jember area that uses technique of partial data gathering has caused data missing. To make this secondary data can be processed in prediction stage there is need to conduct missing imputation by using Monte Carlo method with four different randomization method, followed by data normality test with chi-square, then continued to regression stage. We use MSE (Mean Square Error) to measure prediction error. The smallest MSE result of regression is the best regression model for prediction.
The rSPA Processes of River Water-quality Analysis System for Critical Contaminate Detection, Classification Multiple-water-quality-parameter Values and Real-time Notification Chalisa VEESOMMAI; Yasushi KIYOKI
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2875.13 KB) | DOI: 10.24003/emitter.v4i1.112

Abstract

The water quality analysis is one of the most important aspects of designing environmental systems. It is necessary to realize detection and classification processes and systems for water quality analysis. The important direction is to lead to uncomplicated understanding for public utilization. This paper presents the river Sensing Processing Actuation processes (rSPA) for determination and classification of multiple-water- parameters in Chaophraya river. According to rSPA processes of multiple-water-quality-parameters, we find the pollutants of conductivity, salinity and total dissolved solid (TDS), which are accumulated from upstream to downstream. In several spots of the river, we have analyzed water quality in a maximum value of pollutants in term of oxidation-reduction potential (ORP). The first range effect of parameter is to express high to very high effects in term of dissolved oxygen, second is to express intermediate to very high effect in term of conductivity, third is to express low to very high effect in term of total dissolved solid, fourth is to express completely safe to very high effect in term of turbidity and the final is to express completely safe for effect in term of salinity.
An Embedded System for applying High Performance Computing in Educational Learning Activity Irene Erlyn Wina Rachmawan; Nurul Fahmi; Edi Wahyu Widodo; Samsul Huda; M. Unggul Pamenang; M. Choirur Roziqin; Andri Permana W.; Stritusta Sukaridhoto; Dadet Pramadihanto
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1553.613 KB) | DOI: 10.24003/emitter.v4i1.113

Abstract

HPC (High Performance Computing) has become more popular in the last few years. With the benefits on high computational power, HPC has impact on industry, scientific research and educational activities. Implementing HPC as a curriculum in universities could be consuming a lot of resources because well-known HPC system are using Personal Computer or Server. By using PC as the practical moduls it is need great resources and spaces.  This paper presents an innovative high performance computing cluster system to support education learning activities in HPC course with small size, low cost, and yet powerful enough. In recent years, High Performance computing usually implanted in cluster computing and require high specification computer and expensive cost. It is not efficient applying High Performance Computing in Educational research activiry such as learning in Class. Therefore, our proposed system is created with inexpensive component by using Embedded System to make High Performance Computing applicable for leaning in the class. Students involved in the construction of embedded system, built clusters from basic embedded and network components, do benchmark performance, and implement simple parallel case using the cluster.  In this research we performed evaluation of embedded systems comparing with i5 PC, the results of our embedded system performance of NAS benchmark are similar with i5 PCs. We also conducted surveys about student learning satisfaction that with embedded system students are able to learn about HPC from building the system until making an application that use HPC system.
Performance Analysis of Scheduling Schemes for Femto to Macro Interference Coordination in LTE-Femtocell Deployment Scenario Rafina Destiarti Ainul; Haniah Mahmudah; Ari Wijayanti
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (563.184 KB) | DOI: 10.24003/emitter.v4i1.114

Abstract

Deploying femtocells that have low power level in LTE with small coverage area is an alternative solution for mobile operators to improve indoors network coverage area as well as system capacity. However deploying femtocells (HeNB) that were used co-channel frequency, can be brought about interference problem to the Macro BTS (eNB). Close Subscriber Group (CSG) of HeNB allows only User equipment (UE) to access HeNB. HeNB is the source of interference for UE who cannot access it. Therefore it is necessary for interference coordination methods among the HeNB and eNB. The methods are ICIC (Intercell Interference Coordination) and eICIC (enhanced Intercell Interference Coordination).  This paper proposed performance analysis of scheduling schemes for Femto to macro interference coordination that allocated resource in the frequency and time domain using LTE-Femtocell suburban and urban deployment scenario. Simulation result using ICIC methods can improve SINR performance 15.77 % in urban and 28.66 % in suburban, throughput performance 10.11 % in urban and 21.05 % in suburban. eICIC methods can improve SINR performance 17.44 % in urban and 31.14 % in suburban, throughput performance 19.83% in urban and 44.39 % in suburban.The result prove using eICIC method in time domain resource have better performance than using ICIC method in frequency resource. However using eICIC method in suburban deployment scenariocan increase the performance of SINR and throughput more effective than using eICIC method in urban deployment scenario.
Adaptive Sleep Scheduling for Health Monitoring System Based on the IEEE 802.15.4 Standard Nurul Fahmi; M. Udin Harun Al Rasyid; Amang Sudarsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2836.872 KB) | DOI: 10.24003/emitter.v4i1.115

Abstract

In the recent years, Wireless Sensor Networks (WSNs) have become a very popular technology for research in various fields. One of the technologies which is developed using WSN is environmental health monitoring. However, there is a problem when we want to optimize the performance of the environmental health monitoring such as the limitation of the energy. In this paper, we proposed a method for the environmental health monitoring using the fuzzy logic approach according to the environmental health conditions. We use that condition to determine the sleep time in the system based on IEEE 802.15.4 standard protocol. The main purpose of this method is to extend the life and minimize the energy consumption of the battery. We implemented this system in the real hardware test-bed using temperature, humidity, CO and CO2 sensors. We compared the performance without sleep scheduling, with sleep scheduling and adaptive sleep scheduling. The power consumption spent during the process of testing without sleep scheduling is 52%, for the sleep scheduling is 13%, while using the adaptive sleep scheduling is around 7%. The users also can monitor the health condition via mobile phone or web-based application, in real-time anywhere and anytime.
Secure Communication and Information Exchange using Authenticated Ciphertext Policy Attribute-Based Encryption in Mobile Ad-hoc Network Samsul Huda; Amang Sudarsono; Tri Harsono
EMITTER International Journal of Engineering Technology Vol 4 No 1 (2016)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2906.57 KB) | DOI: 10.24003/emitter.v4i1.116

Abstract

MANETs are considered as suitable for commercial applications such as law enforcement, conference meeting, and sharing information in a student classroom and critical services such as military operations, disaster relief, and rescue operations. Meanwhile, in military operation especially in the battlefield in freely medium which naturally needs high mobility and flexibility. Thus, applying MANETs make these networks vulnerable to various types of attacks such aspacket eavesdropping, data disseminating, message replay, message modification, and especially privacy issue. In this paper, we propose a secure communication and information exchange in MANET with considering secure adhoc routing and secure information exchange. Regarding privacy issue or anonymity, we use a reliable asymmetric encryption which protecting user privacy by utilizing insensitive user attributes as user identity, CP-ABE (Ciphertext-Policy Attribute-Based Encryption) cryptographic scheme. We also design protocols to implement the proposed scheme for various battlefied scenarios in real evironment using embedded devices. Our experimental results showed that the additional of HMAC (Keyed-Hash Message Authentication Code) and AES (Advanced Encryption standard) schemes using processor 1.2GHz only take processing time about 4.452 ms,  we can confirm that our approach by using CP-ABE with added HMAC and AES schemes make low overhead.