63 research outputs found

    Adaptive Active Queue Management based on Queue Ratio of Set-point Weighting

    Get PDF
    Presently, active queue management (AQM) is one of the important considerations in communication networks. The challenge is to make it simple and robust in bursty traffic and uncertain network conditions. This paper proposes a new AQM scheme, an adaptive ratio proportional integral (ARPI), for adaptively controlling network congestion in dynamic network traffic conditions. First, AQM was designed by adding a set-point weighting structure to a proportional integral (PI) controller to reduce the burstiness of network traffic. Second, an adaptive set-point weighting based on the ratio of instantaneous queue length to the set-point queue and the buffer size was proposed to improve the robustness of a non-linear network. The proposed design integrates the aforementioned expectations into one function and needs only one parameter change to adapt to fluctuating network condition. Hence, this scheme provides lightweight computation and simple software and hardware implementation. This approach was analyzed and compared with the PI AQM scheme. Evaluation results demonstrated that our proposed AQM can regulate queue length with a fast response, good stability under any traffic conditions, and small queuing delay

    Variance Analysis of Photoplethysmography for Blood Pressure Measurement

    Get PDF
    The emergence of photoplethysmography for blood pressure estimation is offering a more convenient method. The elements of photoplethysmography waveform is crucial for blood pressure measurement. Several photoplethysmography elements are still not completely understood. The purpose of this study was to investigated corelation of photoplethysmography elements with blood pressure using statistical approach. Analysis of variance test (ANOVA) was conducted to see if there are any correlation between elements of photoplethysmography with blood pressure. This study used 10 volunteers without an ethical clearance. Photoplethysmography waveform and blood pressure measurements were taken through the patient monitor equipment DatascopeTM. As the result, value factor from the arithmetic is 35.67 and value factor from the table is 3.14. The value of F arithmetic (35.67) > F table (3.14). The correlation of diastolic time (Td) is negative with systolic arterial pressure (SAP) and the correlation of systolic amplitude (As) is positive with diastolic arterial pressure (DAP). The results showed elements of photoplethysmography can be used to estimation blood pressure. The emergence of photoplethysmography for blood pressure estimation is offering a more convenient method. The elements of photoplethysmography waveform is crucial for blood pressure measurement. Several photoplethysmography elements are still not completely understood. The purpose of this study was to investigated corelation of photoplethysmography elements with blood pressure using statistical approach. Analysis of variance test (ANOVA) was conducted to see if there are any correlation between elements of photoplethysmography with blood pressure. This study used 10 volunteers without an ethical clearance. Photoplethysmography waveform and blood pressure measurements were taken through the patient monitor equipment DatascopeTM. As the result, value factor from the arithmetic is 35.67 and value factor from the table is 3.14. The value of F arithmetic (35.67) > F table (3.14). The correlation of diastolic time (Td) is negative with systolic arterial pressure (SAP) and the correlation of systolic amplitude (As) is positive with diastolic arterial pressure (DAP). The results showed elements of photoplethysmography can be used to estimation blood pressure

    EFFECTIVENESS OF SECURITY THROUGH OBSCURITY METHODS TO AVOID WEB APPLICATION VULNERABILITY SCANNERS

    Get PDF
    The concept of security through obscurity is not recommended by the National Institute of Standards and Technology (NIST) as a form of system security. Basically this concept hides assets as difficult as possible so that it is not easy for attackers to find them, so that it can be used to avoid vulnerability scanner applications that are widely used by attackers to find out web system weaknesses. This research was conducted by modifying the web application firewall (WAF) and testing using the SQLMap and OWASP Zed Attack Proxy (ZAP) vulnerability scanner applications. The results of the study show that SQLMap takes up to 1238 times longer to complete a scan on a modified web application firewall than without modification, while OWASP ZAP cannot complete a scan on the same treatment. Thus the concept of security through obscurity can be applied to web security to extend vulnerability scanning time

    An Improved Active Network Concept and Architecture for Distributed and Dynamic Streaming Multimedia Environments with Heterogeneous Bandwidths

    Get PDF
    A problem in todays Internet infrastructure may occur when a streaming multimedia application is to take place. The information content of video and audio signals that contain moving or changing scenes may simply be too great for Internet clients with low bandwidth capacity if no adaptation is performed. In order to satisfactorily reach clients with various bandwidth capacities some works such as receiver-driven multicast and resilient overlay networks (RON) have been developed. However these efforts mainly call for modification on router level management or place additional layer to the Internet structure, which is not recommended in the nearest future due to the highly acceptance level and widely utilization of the current Internet structure, and the lengthy and tiring standardization process for a new structure or modification to be accepted. We have developed an improved active network approach for distributed and dynamic streaming multimedia environment with heterogeneous bandwidth, such as the case of the Internet. Friendly active network system (FANS) is a sample of our approach. Adopting application level active network (ALAN) mechanism, FANS participants and available media are referred through its universal resource locator (url). The system intercepts traffic flowing from source to destination and performs media post-processing at an intermediate peer. The process is performed at the application level instead of at the router level, which was the original approach of active networks. FANS requires no changes in router level management and puts no additional requirement to the current Internet architecture and, hence, instantly applicable. In comparison with ALAN, FANS possesses two significant differences. From the system overview, ALAN requires three minimum elements: clients, servers, and dynamic proxy servers. FANS, on the other hand, unifies the functionalities of those three elements. Each of peers in FANS is a client, an intermediate peer, and a media server as well. Secondly, FANS members tracking system dynamically detects the existence of a newly joined computers or mobile device, given its url is available and announced. In ALAN, the servers and the middle nodes are priori known and, hence, static. The application level approach and better performance characteristics distinguished also our work with another similar work in this field, which uses router level approach. The approach offers, in general, the following improvements: FANS promotes QoS fairness, in which clients with lower bandwidth are accommodated and receive better quality of service FANS introduces a new algorithm to determine whether or not the involvement of intermediate peer(s) to perform media post-processing enhancement services is necessary. This mechanism is important and advantageous due to the fact that intermediate post-processing increases the delay and, therefore, should only be employed selectively. FANS considers the size of media data and the capacity of clients bandwidth as network parameters that determine the level of quality of service offered. By employing the above techniques, our experiments with the Internet emulator show that our approach improves the reliability of streaming media applications in such environment

    Design of Network Traffic Congestion Controller with PI AQM Based on ITAE Index

    Get PDF
    Establishing the proper values of controller parameters is the most important thing to design in active queue management (AQM) for achieving excellent performance in handling network congestion. For example, the first well known AQM, the random early detection (RED) method, has a lack of proper parameter values to perform under most the network conditions. This paper applies a Nelder-Mead simplex method based on the integral of time-weighted absolute error (ITAE) for a proportional integral (PI) controller using active queue management (AQM). A TCP flow and PI AQM system were analyzed with a control theory approach. A numerical optimization algorithm based on the ITAE index was run with Matlab/Simulink tools to find the controller parameters with PI tuned by Hollot (PI) as initial parameter input. Compared with PI and PI tuned by Ustebay (PIU) via experimental simulation in Network Simulator Version 2 (NS2) in five scenario network conditions, our proposed method was more robust. It provided stable performance to handle congestion in a dynamic network

    INTEGRATING PASSENGER AND MODULO AS LEARNING TOOLS FOR COLLABORATIVE ENGINEERING EDUCATION

    Get PDF
    oai:journal.ui.ac.id:article/5The University of Indonesia (UI), Gerhard Mercator University (GMU), the Universiti Kebangsaan Malaysia (UKM) have agreed to cooperate as partners to develop a joint bachelor (3+1) and masters (1+1) degree, and collaborate in the research fi elds of multimedia- and internet-based learning and application level active networks. This paper describes the introduction of the Offshore Project and the extending of information technology applications to the partner institutions in this international cooperation which would very much enhance the operations of the new initiative in engineering education, which could provide students in far distance with more fl exible learning environment.Keywords: Groupware in education, multimedia-and Internet-based education concep

    INFORMATION SECURITY RISK MANAGEMENT DESIGN OF SUPERVISION MANAGEMENT INFORMATION SYSTEM AT XYZ MINISTRY USING NIST SP 800-30

    Get PDF
    SIMWAS is an information system at the XYZ Ministry that is used to manage supervisory activities and follow up on supervisory results. SIMWAS is an important asset that contains all internal control business processes, but in practice, SIMWAS information security risks have not been managed properly. To overcome these problems, information security risk management is needed at SIMWAS. This study aims to design and analyze SIMWAS information security risk management using the NIST SP 800-30 framework. NIST SP 800-30 focuses on a particular infrastructure and its boundaries. Since the purpose is to perform a technical risk analysis of the core IT infrastructure, it is highly prescriptive. It has nine primary steps to conduct risk assessment. The NIST SP 800-30 framework is used to design and analyze SIMWAS information security risks by identifying threats, vulnerabilities, impacts, likelihoods, and recommendations for controls. SIMWAS information security risk assessment is carried out by analyzing data obtained from the results of interviews, observations, and document reviews. The results of this study show that SIMWAS information security has four low-level risks, eight moderate-level risks, and five high-level risks. Very low and low risk levels are acceptable according to the risk appetite of the business owner, but moderate, high, and very high-risk levels require risk avoidance, risk transfer and risk reduction. The XYZ Ministry need to carry out residual risk analysis and cost-benefit analysis from implementing controls in each risk scenarios

    Novel Approach for Evaluating Video Transmission using Combined Scalable Video Coding over Wireless Broadband Network

    Get PDF
    One of the main problems in video transmission is the bandwidth fluctuation in wireless channel. Therefore, there is an urgent need to find an efficient bandwidth utilization and method. This research utilizes the Combined Scalable Video Coding (CSVC) which comes from Joint Scalable Video Model (JSVM). In the combined scalable video coding, we implement Coarse Grain Scalability (CGS) and Medium Grain Scalability (MGS). We propose a new scheme in which it can be implemented on Network Simulator II (NS-2) over wireless broadband network. The advantages of this new scheme over the other schemes are more realistic and based on open source program. The result shows that CSVC implementation on MGS mode outperforms CGS mode

    Impact of Implementation of Information Security Risk Management and Security Controls on Cyber Security Maturity (A Case Study at Data Management Applications of XYZ Institute)

    Get PDF
    Information security is an important concern for governments and industry due to the increase in cyber attacks during Covid-19. The government is obliged to maintain information security in implementing an Electronic-Based Government System following Presidential Regulation of the Republic of Indonesia Number 95 of 2018. To overcome this problem, the XYZ Institute needs an approach to implementing information security risk management and information security controls. This study aims to risk identification, risk analysis, risk evaluation, risk treatment, risk acceptance, risk control, and analysis of cyber security maturity gaps in the domain of governance, identification, protection, detection, and response. ISO/IEC 27005:2018 as guidance for conducting risk assessments. The code of practice for information security control uses the ISO/IEC 27002:2013 standard and assessing maturity using the cyber security maturity model version 1.10 developed by the National Cyber and Crypto Agency of the Republic of Indonesia. The results show that the cyber maturity value increased from 3.19 to 4.06 after implementing 12 new security controls
    • …
    corecore