cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
EMITTER International Journal of Engineering Technology
ISSN : 2355391x     EISSN : -     DOI : -
Core Subject : Science,
EMITTER International Journal of Engineering Technology is a BI-ANNUAL journal published by Politeknik Elektronika Negeri Surabaya (PENS). It aims to encourage initiatives, to share new ideas, and to publish high-quality articles in the field of engineering technology and available to everybody at no cost. It stimulates researchers to explore their ideas and enhance their innovations in the scientific publication on engineering technology. EMITTER International Journal of Engineering Technology primarily focuses on analyzing, applying, implementing and improving existing and emerging technologies and is aimed to the application of engineering principles and the implementation of technological advances for the benefit of humanity.
Arjuna Subject : -
Articles 24 Documents
Search results for , issue " Vol 1, No 1 (2013)" : 24 Documents clear
Analysis of Channel Coding Performance in OFDMTechnique for Underwater Acoustic Communication System Alhamidi, Machmud Roby; Puja Astawa, I Gede; Santoso, Tri Budi
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One way to increase the performance of Orthogonal Frequency Division Multiplexing System (OFDM) system is by adding a channel coding (error correction code) in order to detect and correct errors that occur when sending data.At communication of acoustic underwater channel coding is required because of the characteristics of the channel bottom water is much different compared with the air channel and errors are likely to occur.In this research it was made simulation of acoustic underwater communication system with OFDM applied channel codingin which using Hamming code (7,4) and Hamming code (15,11) that is able to correct one error and detect two errors then BCH code capable to correct two errors for BCH (15,7) and correct 9 errors forBCH (127,64) and Reed Solomon code able to correct two errors for RS (15,11) and correct 8 errors for RS (31,15). Results of the study confirm the better performance when system usesOFDM with BCH Code (127.64) than other codes that are used, starting from 1 decibel (dB) to 3 dB for the performance of BER as10 -3 on Additive Gaussian White Noise (AWGN) channel while at the multipath channel, the performance of Bit Error Rate (BER) got better result on 1 dB up to 8 dB for BER performance as10 -3.Keyword: Underwater, Orthogonal Frequency Division Multiplexing (OFDM), channel coding
Mobile Application to Identify Indonesian Flowers on Android Platform Karlita, Tita; Basuki, Achmad; Makarti, Lakmi
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Although many people love flowers, they do not know their name. Especially, many people do not recognize local flowers. To find the flower image, we can use search engine such as Google, but it does not give much help to find the name of local flower. Sometimes, Google cannotshow the correct name of local flowers. This study proposes an application to identify Indonesian flowers that runs on the Android platform for easy use anywhere. Flower recognition is based on the color features using the Hue-Index, shape feature using Centroid Contour Distance (CCD), and the similarity measurement using Entropy calculations. The outputs of this application are information about inputted flower image including Latinname, local name, description, distribution and ecology. Based on tests performed on 44 types of flowers with 181 images in the database, the best similarity percentage is 97.72%. With this application, people will be expected to know more about Indonesia flowers.Keywords: Indonesian flowers, android, hue-index, CCD, entropy
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB)

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB)

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Automatic Representative News Generation using On-Line Clustering Sigita, Marlisa; Barakbah, Ali Ridho; Kusumaningtyas, Entin Martiana; Winarno, Idris
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8313.353 KB)

Abstract

The increasing number of online news provider has produced large volume of news every day. The large volume can bring drawback in consuming information efficiently because some news contain similar contents but they have different titles that may appear. This paper presents a new system for automatically generating representative news using on-line clustering. The system allows the clustering to be dynamic with the features of centroid update and new cluster creation. Text mining is implemented to extract the news contents. The representative news is obtained from the closest distance to each centroid that calculated using Euclidean distance. For experimental study, we implement our system to 460 news in Bahasa Indonesia. The experiment performed 70.9% of precision ratio. The error is mainly caused by imprecise results from keyword extraction that generates only one or two keywords for an article. The distribution of centroid’s keywords also affects the clustering results.Keywords: News Representation, On-line Clustering, Keyword Aggregation, Text Mining.
Performance of Channel Estimation Technique in MIMO-OFDM System Using mPSK Modulation ., Musayyanah; Moegiharto, Yoedy; Puja Astawa, I Gede
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Multicarrier modulation technique as Orthogonal Frequency Division Multiplexing (OFDM) is able to vanishIntersymbol Interferences (ISI) caused by multipathchannel. Merging with multi- antenna transmission techniques such asMIMO become MIMO- OFDM system is able to improve (data rate transmission)the transmission of data and capacity of the system. Pilot channel estimation technique with the algorithm Linear Minimum Mean Square Error (LMMSE) with modulation m-PSK is applied in this study. The results obtained in the form of graphs BER against EbNo which shows that the system performance with LMMSEestimator has a different gain for QPSKmodulation better about 0.75 dB, for 8 PSKmodulation is about 1.5 dB and for 16 PSKmodulation around 1 dB compare to LS estimator. Number of the largest antenna both in the transmitter and receiver produce the best system performance. Observation for QPSKmodulation shows a scheme transmitter- receiver antenna 4x2 having gain approximately 9 dB better than the number of the lowest transmitter antenna(1x2). For scheme 4x4 shows gain around 8,5 dB than the number of the lowest receiver antenna.Keywords:MIMO, OFDM,LS, LMMSE, MPSK.
The Comparison of Propagation Model for Terrestrial Trunked Radio (TETRA) Kartika R, Ayu; M, Hani’ah; S, Nur Adi
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10313.609 KB)

Abstract

A system of digital radio Terrestrial Trunked Radio (TETRA) is designed for communication which need specialility, better privacy, better quality of audio with speed transmission data and access capacity to the internet and telephone network. TETRA system of TMO and DMO operation mode which has wide coverage and reliable than the interference so that the TETRA planning needs a propagation model which corresponding with environment. Therefore, this research compare a pathloss value of calculation of propagation model such as Free Space Loss, Wickson, Bacon, CEPT SE21, Ericsson (9999), ITU-R SM 2028 and Okumura Hata based on the environment are clutter urban, sub urban dan rural. The calculation of pathloss provide that Bacon propagation model is an corresponding model for DMO operation mode with a frequency of 380 MHz, height handhelds 1.5 m and 2 m with pathloss value of 76.82 dB at a distance of 100 m and 113.63 dB at a distance of 1 km while the 400 MHz frequency pathloss value of 77.08 dB at a distance of 100 m and 113.6 dB at a distance of 1 km. The propagation model which corresponding to the TMO operation mode with a frequency of 400 MHz distance of 1 km, the transmitter antenna height (hb) 30 m and receiver antenna height (hm) 1.5 m is a model of Ericsson (9999) on urban clutter with pathloss value of 96.4 dB, the model ITU-R SM2028 in suburban clutter with a pathloss value of 101.13 dB, and the model ITU-R SM2028 on rural clutter with pathloss value of 83.59 dB.Keywords: TETRA, propagation model, urban, suburban, rural
Semi Automatic Retargeting for Facial Expressions of 3D Characters with Fuzzy logicBased on BlendshapeInterpolation Zikky, Moh.; Hariadi, Mochamad; ., Muhtadin
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

To produce a 3D virtual characters face expression of human’s natural face expressions, facial motion capture is the technique considered to be the most effective one, especially in terms of production speed. However, there are still some results showing that the expression is not so expressive, especially on the side of the 3D character which has a different facial features than the real models regarding to the application of it. In this research, the correction of the basic expressions of faces in the process of facial motion retargeting was done by using blendshape interpolation method that was based on fuzzy logic. Blendshape interpolation method is the method used to combine multiple shapes into one blend with the concept of interpolation. In this research, the process of blendshape meets the concept of linear interpolation which the movement of a point of vertexon blendshape used straight lines . Blendshape method will be run as a proofreader on the results of retargeting process. Theweighting of blendshape will be assigned automatically from the results of the calculation of fuzzy logic, which refers to the input of the marker position of the facial motion retargeting. This weight is then used to provide improvements to create more expressive expressions. This process will be easier and faster to do than doing customize one by one at the vertex point manually. To avoid the appearance of irregular motion (haphazard movement), it is necessary to give the limitation of the weight (weight constraint) with range of [0,1].Keywords : Blendshape, retargeting, fuzzy logic, facial motion capture.
Performance Evaluation of DCT And Wavelet Coding of Image Transmission By Using of DM Technique Over Topical Shallow-Water Environment Nilasari, Sendi Eka; Puja Astawa, I Gede; Santoso, Tri Budi
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Image transmission over under water acoustic channel is one of research trends that were developed to support under ocean environment monitoring. The result of study about the source coding performance for image transmission over underwater acoustic channel over tropical shallow-water environment is presented in this paper. By using the discrete cosine transform (DCT) and wavelet coding, image file was compressed and converted into binary data sequence. Transmission process was conducted with multicarrier OFDM system over under water acoustic channel. An evaluation has been implemented on base band scale by adopting channel model of previous research. With the DCT technique at Eb/No 20 dB was achieved the value of PNSR 12.69 dB, and bit error 0.0025. While by using the wavelet technique, at same Eb/No value, achieved the value of PSNR at 21.38 dB and bit error rate 0.0022. The performance evaluation also conducted visually and showing similar trend as simulation result by using pseudo random data.Keywords: DCT, wavelet, OFDM, underwater acoustic.
Performance Evaluation of Beacon-Enabled Mode for IEEE 802.15.4 Wireless Sensor Network Al Rasyid, M. Udin Harun; Saputra, Ferry Astika; Fahmi, Alfian
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (9039.049 KB)

Abstract

IEEE 802.15.5 standard support structure of star and peer-to-peer network formation. Strating from these, the cluster tree network can be built as a special case of peer-to-peer network to increse coverage area. In this paper, we provide an performance evaluation of beacon- enabled mode for IEEE 802.15.4 wireless sensor network on star and cluster topology in order to get the maximum result to apply the appropriate topology model as needed. We conduct analysis on each topology model by using the numbers of nodes from 10 nodes to 100 nodes to analyze throughput, delay, energy consumption, and probability success packet by using NS2 simulator. The simulation results show that the throughput and the probability of success packet of cluster topology are higher than that of star topology, and the energy consumption of cluster topology is lesser than that of star topology. However, cluster topology increases the delay more than star topology.Keywords: IEEE 802.15.4, wireless sensor network, beacon-enabled mode, topology, csma/ca

Page 1 of 3 | Total Record : 24