20 research outputs found
Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring
The widely-used cellular system, such as LTE, has a large potential to serve vehicle-related connectivity which is one of the potential IoT market in the near future. However, the connection-oriented nature of LTE Random Access procedure remains the challenge. The RA procedure in LTE is prone to be overloaded with simultaneous access request from large number of mobile users. This overload condition is likely to happen due to synchronized location reporting for road traffic monitoring in Intelligent Transportation System (ITS). This work studies the performance of RA procedure under overload condition in term of probability of successful report delivery and average report delivery delay. Subsequently, two proposals are made to increase the performance: report time spreading and truncated binary exponential decrease backoff mechanism. The two proposals are evaluated and compared with the existing configuration of LTE RA procedure. Our simulation results show that both proposals can increase the probability of successful report delivery and obtain fairly low average report delivery delay, which is necessary for accurate location reporting and road traffic monitoring system
DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS
QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detectSQL Injection vulnerabilities in source code using a case study of the PHP CodeIgniter framework. We compared this research with static analysis tools like RIPS, Synopsys Coverity, and Sonarqube. The tool we have developed can detect SQL Injection vulnerabilities that cannot be detected by the two tools with an accuracy of 88.8%. The results of our research can provide suggestions for programmers so that they can improve the code they write
Simulation of Mobile LoRa Gateway for Smart Electricity Meter
LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved
Rethinking Classroom Ventilation in post pandemic Situation
This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation
Implementation of Secure Work From Home System Based on Blockchain using NS3 Simulation
Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process
Performance Comparison of Schedulers in MmWave Communication using NS-3
Millimeter-wave (mmWave) has proven to provide the bandwidth requirement for the new radio (NR) on 5G. MmWave has been developed as a new technology to support enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable low latency communication (URLLC). Since using a high frequency, mmWave also has some disadvantages that could not be avoided, such as small coverage, high signal attenuation, limited against some obstacles, and sensitive to the influence of signal quality. This paper discusses the effect of signal quality on 5G performance using mmWave while sending or receiving packet data by using three types of the scheduler, such as Round Robin, Proportional Fairness, and Max Rate scheduler. Signal quality will impact the value of modulation and coding scheme (MCS) that will be used. Our experiments using NS-3 based on the scenario showed that in the same location and number of UEs, performance throughput using Round Robin and Max Rate with excellent signal strength could reach the maximum throughput. The use of Proportional Fairness could lead only to reaching 50% of the maximum throughput. On the other hand, the use of the Proportional Fairness scheduler causes the weak signal to be unstable. Using Round Robin scheduler, the throughput is more stable. Different from the result using the Max Rate scheduler, the UE with the best signal quality compared to other UEs, was the only UE that get the resources allocation
Developing Models and Tools for Exploring the Synergies between Energy Transition and the Digital Economy
Developing models and tools to explore
the synergies between energy transition and the digital economy has been an
interesting topic, aiming to provide significant contributions to the domains
of technological innovation, economic development, sustainability, and global
establishment. All efforts from these models and tools can support the advanced
and establishing countries by collaborating among all members, researchers,
governments, and others. Our continuing research presented the
revolutionary potential of insights derived from data and demonstrated the
connection between the digital economy and the search for sustainable energy
solutions. The second phase of this ongoing investigation focuses on how the
digital economy might catalyze beneficial changes in the energy sector. These
computerized tools are crucial for improving the efficiency of renewable energy
production, anticipating energy demand accurately, and optimizing patterns of
energy usage. These technologies enable decision-makers in the energy sector to
use complex algorithms and data processing to make precise and well-informed
decisions. They represent a substantial shift from older, less data-driven
techniques.The following argument highlights how important
predictive analytics is for forecasting changes in energy consumption. Data
analytics and machine learning models can foresee changes in demand and help
energy providers make plans by examining historical data and current patterns.
This capacity is essential for guaranteeing the best possible use of resources,
avoiding waste, and preserving the equilibrium between energy production and
consumption. Optimizing energy use is another important area where the digital
economy could be helpful. Machine learning algorithms can make recommendations
for ways to improve energy efficiency by analyzing usage patterns and user
behavior. This contributes to general energy conservation, which is in line
with environmental goals, in addition to perhaps saving consumers money.Numerous studies highlight how ICT-assisted modeling
is becoming more and more common in various contexts. These include data
modeling (representing and analyzing data structures) and behavior/pattern
modeling (understanding and forecasting trends in diverse processes). The
phrase refers to the cross-platform accessibility and adaptability of these
technologies when referring to web-based and mobile-based applications. The
conversation highlights the broad applicability of these technologies and
suggests that they are not exclusive to any industry or business. The cross-domain
applicability of ICT-assisted modeling is demonstrated by its potential
benefits for corporate, government, and public groups.
The concept of a digital twin with rich visualization
is introduced as a particularly intriguing application. Creating a virtual
representation of a real system or process allows for comprehensive tracking,
assessment, and optimization. The paragraph argues that the energy sector's
efforts to manage energy more effectively can benefit significantly from the
adoption of digital twins. Moreover, the potential advantages of digital twins
extend to the healthcare sector, where modeling and digitalization can address
challenges in this field.
In addition, the conversation presents the idea of
digital platforms that offer rewards for environmentally conscious actions
within the energy sector. These platforms can use innovative market mechanisms
to encourage actions that contribute to environmental goals. The discussion
claims that digital platforms can encourage demand response and energy
conservation by offering users incentives to adjust their energy consumption
patterns in response to market or environmental signals. The focus on sustainability
draws attention to how integrating digital platforms into energy markets might
help society and the environment more broadly. Incentives for demand response
and energy conservation not only encourage the more economical use of resources
but also contribute to global initiatives aimed at lowering carbon footprints
and mitigating the effects of climate change.
The 5th International Scientific
Conference on Innovations in Digital
Economy: SPBPU IDE-2023 has already been
held on 12
- 13 October 2023 at Peter the Great St.
Petersburg Polytechnic University located at Novorossiyskaya, Saint Petersburg, Russia,
with interesting topics such as (i) Economic efficiency and the social
consequences of implementing digital innovations, (ii) Regional innovation
systems and clusters as drivers of economic growth during the Fourth Industrial
Revolution, (iii) Industrial, service and agricultural digitalization, (iv)
Responses of the educational system and labor market to digital-driven changes
in the economic system, (v) Digital transformation in the government sector,
(vi) Digital transformation in the financial sector. This conference is
organized by the Graduate School of Industrial Economics (GSIE) of Peter the
Great Saint Petersburg Polytechnic University (SPbPU) and the Centre for
Sustainable Infrastructure Development (CSID) of Universitas Indonesia (UI). SPBPU IDE-2023 is expected to have a significant impact on the
economic, social, and environmental aspects of both regional and national
levels.
A thorough examination of this phenomenon was evident
in the 21 papers that were presented, which mostly focused on researching
important aspects such as support systems, finance structures, and regulatory
frameworks that control industry operations. The expected results of these
research efforts include increased efficiency in investment use, enhanced
competitiveness of businesses, and a significant shift towards an ecologically
conscious approach to industrial activity. Especially in industrial activities,
there is a significant impact on the progress in the economic, social, and
environmental conditions of regions and the country as a whole in Russia. The
discussion is supported by the presentation of 21 papers, which primarily
examine the main forms of support, financing, and regulation of industrial
activities, identifying problematic aspects of state support for them. Their
approaches are expected to result in more efficient investment utilization,
enhanced competitiveness of enterprises, and a shift towards an environmentally
focused approach in industrial activities
AODV-UI Proof of Concept on MIPS-based Wireless Router
AODV routing protocol facilitates changing and simple-to-setup network environment. It helps setting up a network without sufficient infrastructure, such as in disaster area. Development of AODV protocol has gathered a worldwide research interest. However, not many researches implement AODV routing protocol in real mobile nodes and real MANET. In addition, real implementation deals with other works concerning underlying protocol, firmware and hardware configuration, as well as detailed topology both in logical and physical arrangement. This work aims to implements Ad-hoc On-demand Distant Vector – particularly University of Indonesia AODV (AODV-UI) routing protocol on low-end inexpensive generic wireless routers as a proof of concept. AODV-UI is an improved version of AODV routing protocol that implements gateway interconnection and reverse route capability. This routing protocol has been previously successfully tested in NS-2. In this work, current AODV-UI protocol is ported to OpenWRT + MIPS (Microprocessor without Interlocked Pipeline Stages) little endian architecture then tested on the real networking environment. Underlying media access layer is also altered to provide the protocol greater control over the network. Performance of this implementation is measured in terms of energy consumption, routing overhead, end-to-end delay, protocol reliability and packet delivery ratio
AODV-UI with Malicious Node Detection and Removal for Public MANET
A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, this nature of MANET makes it very vulnerable to various attacks, especially by nodes within the MANET that is called malicious nodes. This paper provides a preliminary result for MANET security enhancement based on AODV-UI routing protocol. In this work we implement an algorithm to detect and remove malicious nodes in AODV-UI routing protocol. We evaluate our work in different scenarios by varying the number of nodes, the number of malicious node, the sending rate of the node in concern, and the type of the attack i.e. route poisoning, black hole, packet spoofing. Our experiment shows that on average, an attack can be completely removed within 0.48 seconds in the worst case, with the traffic rate of 100 kbps, and 0.04 seconds in the best case, with the sending rate of 10 kbps
Digital Innovation: Creating Competitive Advantages
The diffusion of innovations during the fourth
industrial revolution reshaped economic systems and caused structural changes
in different economic sectors. These innovations have become the basis of the
new digital infrastructure of society. Digital technology is used to manage integrated
product whole-life cycles and enhance efficient, reliable, and sustainable
business operations. Intelligent production processes and supply chains can be
used to optimize entire end-to-end workflows and create business competitive
advantages. Artificial intelligence, internet of things, machine learning,
blockchain, big data and other digital technologies have been used to create
business agility and resilience and further transform societal behavior.Digitalization creates new ways for companies to
create business added value. Modernizing business enterprises by combining
digital technologies, physical resources, and the creativity of individuals, is
an essential step in innovative business transformation that may constitute a
competitive advantage. Companies need to transform their business
processes and enhance the satisfaction of their customers by using digital
technologies that connect people, systems, and products or render their
services more effective and efficient. Digital technologies create new ways for
companies to integrate customers’ requirements into product development or
service delivery across entire process chains.
Digital
technologies are becoming increasingly important due to strong market
competition. Many studies have shown that there is a strong correlation between
business growth and the use of digital technologies to create innovative
business models. Technological innovations create new products, processes, and
services that generate more added value for companies.