19 research outputs found

    Performance Evaluation of LTE Random Access Procedure under Distributed Location Data Mining for Road Traffic Monitoring

    Get PDF
    The widely-used cellular system, such as LTE, has a large potential to serve vehicle-related connectivity which is one of the potential IoT market in the near future. However, the connection-oriented nature of LTE Random Access procedure remains the challenge. The RA procedure in LTE is prone to be overloaded with simultaneous access request from large number of mobile users. This overload condition is likely to happen due to synchronized location reporting for road traffic monitoring in Intelligent Transportation System (ITS). This work studies the performance of RA procedure under overload condition in term of probability of successful report delivery and average report delivery delay. Subsequently, two proposals are made to increase the performance: report time spreading and truncated binary exponential decrease backoff mechanism. The two proposals are evaluated and compared with the existing configuration of LTE RA procedure. Our simulation results show that both proposals can increase the probability of successful report delivery and obtain fairly low average report delivery delay, which is necessary for accurate location reporting and road traffic monitoring system

    DETECTION OF SQL INJECTION VULNERABILITY IN CODEIGNITER FRAMEWORK USING STATIC ANALYSIS

    Get PDF
    QL Injection attacks are still one type of attack that often occurs in web-based applications. The causes and ways to prevent SQL Injection have been widely explained in various sources. Unfortunately, until now, SQL Injection vulnerabilities are still often found in multiple applications. Web-based application frameworks that already have functions to protect against attacks are often not used optimally. This is inseparable from the role of programmers, who often forget the rules for writing program code to prevent SQL Injection attacks. We conducted this research to detectSQL Injection vulnerabilities in source code using a case study of the PHP CodeIgniter framework. We compared this research with static analysis tools like RIPS, Synopsys Coverity, and Sonarqube. The tool we have developed can detect SQL Injection vulnerabilities that cannot be detected by the two tools with an accuracy of 88.8%. The results of our research can provide suggestions for programmers so that they can improve the code they write

    Simulation of Mobile LoRa Gateway for Smart Electricity Meter

    Get PDF
    LoRa is a viable connectivity technology for smart electricity meter. In addition to measuring electricity usage, a smart electricity meter enables many features for smart grid, safety, etc. LoRa is advertised to be capable in very long range transmission and low power consumption. However, LoRa uses sub 1 GHz unlicensed spectrum. In the era of connected smart things, this spectrum is very crowded and will be even more crowded. In this paper we propose the use of mobile LoRa gateway for smart electricity meter. With mobile LoRa gateway, the transmission range can be decreased. Thus, LoRa end devices can save more power and nearby systems can reuse the same band with less interference. We study the performance via simulation using modified LoRaSim. The result shows that the performance of LoRa mobile gateway can be achieved

    Rethinking Classroom Ventilation in post pandemic Situation

    Get PDF
    This paper aims to contribute in outlining the latest findings and formulating a simple practice in providing sufficient air circulation for classroom activities in preparation for the post-pandemic era. During this pandemic, remote learning over the internet has been a viable solution everywhere, including adopted by education institution to keep serving the learning process. However, as more and more people involved and the time elapses, several disadvantages of e-learning are realized. In addition, education institution should be prepared for the upcoming offline learning activity in post-pandemic era. This paper aims to refine the minimum airflow requirement for the classroom, finetuned based on student activity, ceiling height. Student activity is being the focus rather than teacher because student represents the majority of classroom occupant. In addition, a discussion on how it can be achieved using simpler ventilation system is presented. ON/OFF scheme for the usage of the active ventilation is also elaborated.Keyword: classroom, post-pandemic era, ventilation system, air circulation

    Performance Comparison of Schedulers in MmWave Communication using NS-3

    Get PDF
    Millimeter-wave (mmWave) has proven to provide the bandwidth requirement for the new radio (NR) on 5G. MmWave has been developed as a new technology to support enhanced mobile broadband (eMBB), massive machine-type communication (mMTC), and ultra-reliable low latency communication (URLLC). Since using a high frequency, mmWave also has some disadvantages that could not be avoided, such as small coverage, high signal attenuation, limited against some obstacles, and sensitive to the influence of signal quality. This paper discusses the effect of signal quality on 5G performance using mmWave while sending or receiving packet data by using three types of the scheduler, such as Round Robin, Proportional Fairness, and Max Rate scheduler. Signal quality will impact the value of modulation and coding scheme (MCS) that will be used. Our experiments using NS-3 based on the scenario showed that in the same location and number of UEs, performance throughput using Round Robin and Max Rate with excellent signal strength could reach the maximum throughput. The use of Proportional Fairness could lead only to reaching 50% of the maximum throughput. On the other hand, the use of the Proportional Fairness scheduler causes the weak signal to be unstable. Using Round Robin scheduler, the throughput is more stable. Different from the result using the Max Rate scheduler, the UE with the best signal quality compared to other UEs, was the only UE that get the resources allocation

    Implementation of Secure Work From Home System Based on Blockchain using NS3 Simulation

    Get PDF
    Work from Home (WFH) is an activity carrying out official duties, completing outputs, coordination, meetings, and other tasks from the residence of employees. Implement WFH many users use the zoom application has vulnerabilities. The network architecture used refers to the simple experiment network. In Secure WFH there are 3 offices connected through a router. Each client in each office is connected to the router via a Virtual Private Network (VPN) on a peer-to-peer (P2P). That architecture has 18 nodes that will be simulated. Secure WFH simulation with blockchain combines secure WFH with a bitcoin code simulator from Arthur Gervais's. Implementation of blockchain on secure WFH can increase security but the resulting speed decreases. The decrease in speed when implementing secure WFH is due to the generate block process and the verification process

    Developing Models and Tools for Exploring the Synergies between Energy Transition and the Digital Economy

    Get PDF
    Developing models and tools to explore the synergies between energy transition and the digital economy has been an interesting topic, aiming to provide significant contributions to the domains of technological innovation, economic development, sustainability, and global establishment. All efforts from these models and tools can support the advanced and establishing countries by collaborating among all members, researchers, governments, and others.     Our continuing research presented the revolutionary potential of insights derived from data and demonstrated the connection between the digital economy and the search for sustainable energy solutions. The second phase of this ongoing investigation focuses on how the digital economy might catalyze beneficial changes in the energy sector. These computerized tools are crucial for improving the efficiency of renewable energy production, anticipating energy demand accurately, and optimizing patterns of energy usage. These technologies enable decision-makers in the energy sector to use complex algorithms and data processing to make precise and well-informed decisions. They represent a substantial shift from older, less data-driven techniques.The following argument highlights how important predictive analytics is for forecasting changes in energy consumption. Data analytics and machine learning models can foresee changes in demand and help energy providers make plans by examining historical data and current patterns. This capacity is essential for guaranteeing the best possible use of resources, avoiding waste, and preserving the equilibrium between energy production and consumption. Optimizing energy use is another important area where the digital economy could be helpful. Machine learning algorithms can make recommendations for ways to improve energy efficiency by analyzing usage patterns and user behavior. This contributes to general energy conservation, which is in line with environmental goals, in addition to perhaps saving consumers money.Numerous studies highlight how ICT-assisted modeling is becoming more and more common in various contexts. These include data modeling (representing and analyzing data structures) and behavior/pattern modeling (understanding and forecasting trends in diverse processes). The phrase refers to the cross-platform accessibility and adaptability of these technologies when referring to web-based and mobile-based applications. The conversation highlights the broad applicability of these technologies and suggests that they are not exclusive to any industry or business. The cross-domain applicability of ICT-assisted modeling is demonstrated by its potential benefits for corporate, government, and public groups. The concept of a digital twin with rich visualization is introduced as a particularly intriguing application. Creating a virtual representation of a real system or process allows for comprehensive tracking, assessment, and optimization. The paragraph argues that the energy sector's efforts to manage energy more effectively can benefit significantly from the adoption of digital twins. Moreover, the potential advantages of digital twins extend to the healthcare sector, where modeling and digitalization can address challenges in this field. In addition, the conversation presents the idea of digital platforms that offer rewards for environmentally conscious actions within the energy sector. These platforms can use innovative market mechanisms to encourage actions that contribute to environmental goals. The discussion claims that digital platforms can encourage demand response and energy conservation by offering users incentives to adjust their energy consumption patterns in response to market or environmental signals. The focus on sustainability draws attention to how integrating digital platforms into energy markets might help society and the environment more broadly. Incentives for demand response and energy conservation not only encourage the more economical use of resources but also contribute to global initiatives aimed at lowering carbon footprints and mitigating the effects of climate change. The 5th International Scientific Conference on Innovations in Digital Economy: SPBPU IDE-2023 has already been held on 12 - 13 October 2023 at Peter the Great St. Petersburg Polytechnic University located at Novorossiyskaya, Saint Petersburg, Russia, with interesting topics such as (i) Economic efficiency and the social consequences of implementing digital innovations, (ii) Regional innovation systems and clusters as drivers of economic growth during the Fourth Industrial Revolution, (iii) Industrial, service and agricultural digitalization, (iv) Responses of the educational system and labor market to digital-driven changes in the economic system, (v) Digital transformation in the government sector, (vi) Digital transformation in the financial sector. This conference is organized by the Graduate School of Industrial Economics (GSIE) of Peter the Great Saint Petersburg Polytechnic University (SPbPU) and the Centre for Sustainable Infrastructure Development (CSID) of Universitas Indonesia (UI). SPBPU IDE-2023 is expected to have a significant impact on the economic, social, and environmental aspects of both regional and national levels. A thorough examination of this phenomenon was evident in the 21 papers that were presented, which mostly focused on researching important aspects such as support systems, finance structures, and regulatory frameworks that control industry operations. The expected results of these research efforts include increased efficiency in investment use, enhanced competitiveness of businesses, and a significant shift towards an ecologically conscious approach to industrial activity. Especially in industrial activities, there is a significant impact on the progress in the economic, social, and environmental conditions of regions and the country as a whole in Russia. The discussion is supported by the presentation of 21 papers, which primarily examine the main forms of support, financing, and regulation of industrial activities, identifying problematic aspects of state support for them. Their approaches are expected to result in more efficient investment utilization, enhanced competitiveness of enterprises, and a shift towards an environmentally focused approach in industrial activities

    AODV-UI Proof of Concept on MIPS-based Wireless Router

    Get PDF
    AODV routing protocol facilitates changing and simple-to-setup network environment. It helps setting up a network without sufficient infrastructure, such as in disaster area. Development of AODV protocol has gathered a worldwide research interest. However, not many researches implement AODV routing protocol in real mobile nodes and real MANET. In addition, real implementation deals with other works concerning underlying protocol, firmware and hardware configuration, as well as detailed topology both in logical and physical arrangement. This work aims to implements Ad-hoc On-demand Distant Vector – particularly University of Indonesia AODV (AODV-UI) routing protocol on low-end inexpensive generic wireless routers as a proof of concept. AODV-UI is an improved version of AODV routing protocol that implements gateway interconnection and reverse route capability. This routing protocol has been previously successfully tested in NS-2. In this work, current AODV-UI protocol is ported to OpenWRT + MIPS (Microprocessor without Interlocked Pipeline Stages) little endian architecture then tested on the real networking environment. Underlying media access layer is also altered to provide the protocol greater control over the network. Performance of this implementation is measured in terms of energy consumption, routing overhead, end-to-end delay, protocol reliability and packet delivery ratio

    AODV-UI with Malicious Node Detection and Removal for Public MANET

    Get PDF
    A node in Mobile Ad-hoc Network (MANET) solely depends on neighbor nodes for its connectivity to the outer networks. It is completely different with fixed network connection where a central infrastructure is providing connectivity to the outside network for all mobile nodes there. This kind of situation makes MANET easier to build rather than fixed network with certain infrastructure. However, this nature of MANET makes it very vulnerable to various attacks, especially by nodes within the MANET that is called malicious nodes. This paper provides a preliminary result for MANET security enhancement based on AODV-UI routing protocol. In this work we implement an algorithm to detect and remove malicious nodes in AODV-UI routing protocol. We evaluate our work in different scenarios by varying the number of nodes, the number of malicious node, the sending rate of the node in concern, and the type of the attack i.e. route poisoning, black hole, packet spoofing. Our experiment shows that on average, an attack can be completely removed within 0.48 seconds in the worst case, with the traffic rate of 100 kbps, and 0.04 seconds in the best case, with the sending rate of 10 kbps

    Digital Innovation: Creating Competitive Advantages

    Get PDF
    The diffusion of innovations during the fourth industrial revolution reshaped economic systems and caused structural changes in different economic sectors. These innovations have become the basis of the new digital infrastructure of society. Digital technology is used to manage integrated product whole-life cycles and enhance efficient, reliable, and sustainable business operations. Intelligent production processes and supply chains can be used to optimize entire end-to-end workflows and create business competitive advantages. Artificial intelligence, internet of things, machine learning, blockchain, big data and other digital technologies have been used to create business agility and resilience and further transform societal behavior.Digitalization creates new ways for companies to create business added value. Modernizing business enterprises by combining digital technologies, physical resources, and the creativity of individuals, is an essential step in innovative business transformation that may constitute a competitive advantage. Companies need to transform their business processes and enhance the satisfaction of their customers by using digital technologies that connect people, systems, and products or render their services more effective and efficient. Digital technologies create new ways for companies to integrate customers’ requirements into product development or service delivery across entire process chains. Digital technologies are becoming increasingly important due to strong market competition. Many studies have shown that there is a strong correlation between business growth and the use of digital technologies to create innovative business models. Technological innovations create new products, processes, and services that generate more added value for companies.&nbsp
    corecore