cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
EMITTER International Journal of Engineering Technology
ISSN : 2355391x     EISSN : -     DOI : -
Core Subject : Science,
EMITTER International Journal of Engineering Technology is a BI-ANNUAL journal published by Politeknik Elektronika Negeri Surabaya (PENS). It aims to encourage initiatives, to share new ideas, and to publish high-quality articles in the field of engineering technology and available to everybody at no cost. It stimulates researchers to explore their ideas and enhance their innovations in the scientific publication on engineering technology. EMITTER International Journal of Engineering Technology primarily focuses on analyzing, applying, implementing and improving existing and emerging technologies and is aimed to the application of engineering principles and the implementation of technological advances for the benefit of humanity.
Arjuna Subject : -
Articles 406 Documents
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB)

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Automatic Representative News Generation using On-Line Clustering Sigita, Marlisa; Barakbah, Ali Ridho; Kusumaningtyas, Entin Martiana; Winarno, Idris
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8313.353 KB)

Abstract

The increasing number of online news provider has produced large volume of news every day. The large volume can bring drawback in consuming information efficiently because some news contain similar contents but they have different titles that may appear. This paper presents a new system for automatically generating representative news using on-line clustering. The system allows the clustering to be dynamic with the features of centroid update and new cluster creation. Text mining is implemented to extract the news contents. The representative news is obtained from the closest distance to each centroid that calculated using Euclidean distance. For experimental study, we implement our system to 460 news in Bahasa Indonesia. The experiment performed 70.9% of precision ratio. The error is mainly caused by imprecise results from keyword extraction that generates only one or two keywords for an article. The distribution of centroid’s keywords also affects the clustering results.Keywords: News Representation, On-line Clustering, Keyword Aggregation, Text Mining.
Reinforced Intrusion Detection Using Pursuit Reinforcement Competitive Learning Tiyas, Indah Yulia Prafitaning; Barakbah, Ali Ridho; Harsono, Tri; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 2, No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (10388.993 KB)

Abstract

Today, information technology is growing rapidly,all information can be obtainedmuch easier. It raises some new problems; one of them is unauthorized access to the system. We need a reliable network security system that is resistant to a variety of attacks against the system. Therefore, Intrusion Detection System (IDS) required to overcome the problems of intrusions. Many researches have been done on intrusion detection using classification methods. Classification methodshave high precision, but it takes efforts to determine an appropriate classification model to the classification problem. In this paper, we propose a new reinforced approach to detect intrusion with On-line Clustering using Reinforcement Learning. Reinforcement Learning is a new paradigm in machine learning which involves interaction with the environment.It works with reward and punishment mechanism to achieve solution. We apply the Reinforcement Learning to the intrusion detection problem with considering competitive learning using Pursuit Reinforcement Competitive Learning (PRCL). Based on the experimental result, PRCL can detect intrusions in real time with high accuracy (99.816% for DoS, 95.015% for Probe, 94.731% for R2L and 99.373% for U2R) and high speed (44 ms).The proposed approach can help network administrators to detect intrusion, so the computer network security systembecome reliable.Keywords: Intrusion Detection System, On-Line Clustering, Reinforcement Learning, Unsupervised Learning.
AC-DC PFC Converter Using Combination of Flyback Converter and Full-bridge DC-DC Converter Efendi, Moh. Zaenal; Rizal, Abdul; Erzanuari, Aldi; ., Suryono; Windarko, Novie Ayub
EMITTER International Journal of Engineering Technology Vol 2, No 1 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (6864.867 KB)

Abstract

This paper presents a combination of power factor correction converter using Flyback converter and Full-bridge dc-dc converter in series connection. Flyback converter is operated in discontinuous conduction mode so that it can serve as a power factor correction converter and meanwhile Full-bridge dc-dc converter is used for dc regulator. This converter system is designed to produce a 86 Volt of output voltage and 2 A of output current. Both simulation and experiment results show that the power factor of this converter achieves up to 0.99 and meets harmonic standard of IEC61000-3-2.Keywords: Flyback Converter, Full-bridge DC-DC Converter, Power Factor Correction.
Internet Connection Control based on Idle Time Using User Behavior Pattern Analysis Hardiansyah, Fadilah Fahrul; Buliali, Joko Lianto; Wibisono, Waskitho
EMITTER International Journal of Engineering Technology Vol 2, No 2 (2014)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The increase of smartphone ability is rapidly increasing the power consumption. Many methods have been proposed to reduce smartphone power consumption. Most of these methods use the internet connection control based on the availability of the battery power level regardless of when and where a waste of energy occurs. This paper proposes a new approach to control the internet connection based on idle time using user behavior pattern analysis. User behavior patterns are used to predict idle time duration. Internet connection control performed during idle time. During idle time internet connection periodically switched on and off by a certain time interval. This method effectively reduces a waste of energy. Control of the internet connection does not interfere the user because it is implemented on idle time.Keywords: Smartphone, User Behavior, Pattern Recognition, Idle Time, Internet Connection Control
Evacuation System in a Building Using Cellular Automata for Pedestrian Dynamics ., Muarifin; Harsono, Tri; Barakbah, Aliridho
EMITTER International Journal of Engineering Technology Vol 3, No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The sense of safety in public facilities for pedestrians can be shown by the availability of good infrastructure, particularly the building. One of the aspects that can make pedestrians feel comfortable and safe is the availability of evacuation facilities in emergency situation. When a disaster strikes, people would start to panic and this will cause problems, especially during an evacuation.During panic in an evacuation process, pedestrians tend to act blindly and walk randomly and mindlessly. They might follow one another when they get panic. This is called as herding behavior. Regarding the evacuation systems, cellular automata is the basic method used to represent human motion. The movement of pedestrian is an important aspect during an evacuation process and this can be analyzed and implemented by using Cellular Automata. It is a simple method yet it can solve complex problems.Total evacuation time becomes the indicators in measuring the efficiency of this system. The result of comparison method shows that the proposed method could work better in certain conditions. In addition, the results of the experiments during panic and normal situation show similar characteristics especially regarding density aspect, yet evacuation time during panic situation takes longer time. The experiment’s results by using the actual data also has similar tendency with the evacuation time.Keywords: evacuation time, cellular automata, panic behavior, pedestrian
Differential Spatio-temporal Multiband Satellite Image Clustering using K-means Optimization With Reinforcement Programming Rachmawan, Irene Erlyn Wina; Barakbah, Ali Ridho; Harsono, Tri
EMITTER International Journal of Engineering Technology Vol 3, No 1 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (946.111 KB)

Abstract

Deforestration is one of the crucial issues in Indonesia because now Indonesia has worlds highest deforestation rate. In other hand, multispectral image delivers a great source of data for studying spatial and temporal changeability of the environmental such as deforestration area. This research present differential image processing methods for detecting nature change of deforestration. Our differential image processing algorithms extract and indicating area automatically. The feature of our proposed idea produce extracted information from multiband satellite image and calculate the area of deforestration by years with calculating data using temporal dataset. Yet, multiband satellite image consists of big data size that were difficult to be handled for segmentation. Commonly, K- Means clustering is considered to be a powerfull clustering algorithm because of its ability to clustering big data. However K-Means has sensitivity of its first generated centroids, which could lead into a bad performance. In this paper we propose a new approach to optimize K-Means clustering using Reinforcement Programming in order to clustering multispectral image. We build a new mechanism for generating initial centroids by implementing exploration and exploitation knowledge from Reinforcement Programming. This optimization will lead a better result for K-means data cluster. We select multispectral image from Landsat 7 in past ten years in Medawai, Borneo, Indonesia, and apply two segmentation areas consist of deforestration land and forest field. We made series of experiments and compared the experimental results of K-means using Reinforcement Programming as optimizing initiate centroid and normal K-means without optimization process.Keywords: Deforestration, Multispectral images, landsat, automatic clustering, K-means.
An Implementation of Error Minimization Data Transmission in OFDM using Modified Convolutional Code Briantoro, Hendy; Astawa, I Gede Puja; Sudarsono, Amang
EMITTER International Journal of Engineering Technology Vol 3, No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (363.575 KB)

Abstract

This paper presents about error minimization in OFDM system. In conventional system, usually using channel coding such as BCH Code or Convolutional Code. But, performance BCH Code or Convolutional Code is not good in implementation of OFDM System. Error bits of OFDM system without channel coding is 5.77%. Then, we used convolutional code with code rate 1/2, it can reduce error bitsonly up to 3.85%. So, we proposed OFDM system with Modified Convolutional Code. In this implementation, we used Software Define Radio (SDR), namely Universal Software Radio Peripheral (USRP) NI 2920 as the transmitter and receiver. The result of OFDM system using Modified Convolutional Code with code rate is able recover all character received so can decrease until 0% error bit. Increasing performance of Modified Convolutional Code is about 1 dB in BER of 10-4 from BCH Code and Convolutional Code. So, performance of Modified Convolutional better than BCH Code or Convolutional Code.Keywords: OFDM, BCH Code, Convolutional Code, Modified Convolutional Code, SDR, USRP
Performance Analysis of DTN Using Level Signal Priority Epidemic Routing Protocol Zainudin, Ahmad; Sudarsono, Amang; Pambudi, Kevin Prima
EMITTER International Journal of Engineering Technology Vol 3, No 2 (2015)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (342.329 KB)

Abstract

A DTN architecture consists of several nodes that are connected with high dynamic topology. The routing protocol is an important part which determine the DTN performance system. Although DTN is addressed to be tolerant of delay, a routing protocol with better performance will maximizing packet delivery rate and minimizing the delivery latency. This paper evaluate a level signal priority epidemic routing protocol for delay tolerant network architecture. Our system adopts DTN2 framework using classic epidemic and priority epidemic dynamic routing protocols. The performance of both dynamic routing is observed and compared based on throughput and delay of transmitted data. The measurement results show that the classic epidemic use more bandwith due to sending the same messages many times. The delay transmission using a level signal priority epidemic routing is smaller than classic epidemic routing protocol in all hops of the test-bed. Epidemic based on signal level routing could make traffic of network more efficient than classic Epidemic routing because of filtering system in node before sending bundle to neighbor node.Keywords: DTN, dynamic routing, level signal priority
Performance of Channel Estimation Technique in MIMO-OFDM System Using mPSK Modulation ., Musayyanah; Moegiharto, Yoedy; Puja Astawa, I Gede
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Multicarrier modulation technique as Orthogonal Frequency Division Multiplexing (OFDM) is able to vanishIntersymbol Interferences (ISI) caused by multipathchannel. Merging with multi- antenna transmission techniques such asMIMO become MIMO- OFDM system is able to improve (data rate transmission)the transmission of data and capacity of the system. Pilot channel estimation technique with the algorithm Linear Minimum Mean Square Error (LMMSE) with modulation m-PSK is applied in this study. The results obtained in the form of graphs BER against EbNo which shows that the system performance with LMMSEestimator has a different gain for QPSKmodulation better about 0.75 dB, for 8 PSKmodulation is about 1.5 dB and for 16 PSKmodulation around 1 dB compare to LS estimator. Number of the largest antenna both in the transmitter and receiver produce the best system performance. Observation for QPSKmodulation shows a scheme transmitter- receiver antenna 4x2 having gain approximately 9 dB better than the number of the lowest transmitter antenna(1x2). For scheme 4x4 shows gain around 8,5 dB than the number of the lowest receiver antenna.Keywords:MIMO, OFDM,LS, LMMSE, MPSK.

Page 2 of 41 | Total Record : 406