The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Narrow passages in the configuration space pose challenge for sampling-based planners. In this paper, the conventional wisdom of ”divide and conquer” is adopted to design a hierarchical strategy to address this challenging problem. Rapidly-exploring random tree (RRT) is taken as an example to illustrate the proposed strategy. A hybrid map which consists of a topological map and a set of metric maps...
This paper proposes a new algorithm called Path Associativity Centralized Explicit Congestion Control (PACEC). PACEC works on a Software Defined Networking (SDN) framework. In PACEC, a congestion control decision is based on global information network conditions. PACEC uses global information network to identify network resources along the path from the source to the destination and provides this...
In order to meet the growing demand for electrical power, Semboro Sugar Factory (PG Semboro)'s management has built an additional 1×7 MW power plant with SST-300 steam turbine. Standard system of this power plant consists of turbine and generator control system, Barring Gear system, Lube Oil system, and Gland Steam Condenser system. In this paper, design and implementation of On-Off Differential control...
This paper presents the development of an automatic pointing system for very small aperture terminal (VSAT) antenna. The system which uses AVR microcontroller as a main controller unit (MCU) is featured with non-horizontal alignment autocorrect. User interface is implemented using android smartphone connected wirelessly to the MCU using bluetooth module. The android smartphone also reads the latitude...
This study analyze the cradle to gate total CO2 emission of the bio-hydrogen supply chain system in Indonesia. Waste wood from forestry area collected as a feedstock of hydrogen power plant in the capital city of forestry area. A life cycle inventory as part of life cycle assessment methodology is use to evaluate the emission of the new energy system. The system boundary are including harvesting,...
Video applications are essential nowadays. Even though almost everyone has access to it right now, the means and ability to access it is not uniform. Some of the important aspects to consider are the bandwidth available on the user and the video codec compatibility. Therefore, we need to find a video codec which can be played on most currently available devices and apply lossy compression to get smaller...
The proposed NMS, called ITB NMS, is a web-based centralized management system used to manage and monitor the current condition of the entire existing network infrastructure clearly and concisely. ITB NMS is used to monitor a device or devices connected to the network-based LAN, WAN or Internet. ITB NMS is able to monitor the condition of a device or monitor the activities being performed by a device...
ITU-T H.264/MPEG-4 Scalable Video Coding (H.264/SVC) is one of popular video coding standard after H.264/MPEG-4 Advanced Video Coding (H.264/AVC) which was created by Joint Video Team (JVT) between Video Coding Expert Group (VCEG) ITU-T and Moving Picture Expert Group (MPEG) ISO/IEC. This standard allows video coding using single layer or more ones to provide the scalability of the coded video.
Nowadays, many algorithms in cryptography area has been developed. Choosing the appropriate algorithm and dealing with its tradeoff, require a specific analysis. One of the examples is calculating the optimum encryption algorithm in video encryption. There are various ways to encrypt the video, depend on encryption algorithms (DES, Triple DES, Blowfish, AES, etc), modes of operation (ECB, CBC, CFB,...
Digital TV broadcast technology is growing rapidly. One among many digital TV standards that has been develoved is DVB standard. When we want to use non-DVB enabler device such as general smartphone as a DVB receiver, we need to develop applications that can run on that device. In this paper, it is presented how we develop such application and emphasize in designing Electronic Service Guide (ESG)...
Nowadays the widespread use of variety of smart phones and tablets with wide range of multimedia application support is driving more data service users towards full mobility causing a rapid increase in demand for mobile data rates. These new devices and multimedia applications require high data rates and reduced latency to provide better Quality of Service (QoS). To address these requirements the...
Crude Palm Oil is a strategic agricultural commodity that became one of the pillars for the economy of Indonesia. These commodities provide a large of income for the country through export revenues and taxes as well as play an important role in gross domestic product of Indonesia. Besides, this sub-sector has an important role in employment, open up business opportunities, and regional development...
Present study constructed a set of computer tests to measure inhibitory control, a core component of executive function, which is responsible for suppressing irrelevant automatic responses to promote consciously goal-directed behaviour. In accordance with our previous study, the battery test was adapted to an artificially cognitive system in form of computer-based application compatible to android...
In machine tool control, not only tracking errors in each drive axis but also contour errors, which is directly related to the machined shape of workpiece, should be considered. Although most existing contouring controllers are based on feedback control, this paper proposes an embedded iterative learning contouring controller (EILCC) by considering both tracking and contour errors. The reference trajectory...
In this paper, we analyze flow-based routing schemes in SDN. Specifically, we study the flow-based routing performance; combining the knowledge of the link condition and updating the period for calculating the path. The framework uses centralized control of SDN where the SDN controller calculates available paths to determine the routing policy based on a global knowledge network. This flow-based routing...
Software Defined Network is a new paradigm in data communication networks. In contrast to the traditional internet network, SDN separates the control function and the function forwarding. SDN controller operates on the principle of a centralized logical controller. This centralized control causes the controller to have a global network knowledge so that SDN can be more effective in managing the network...
Anomaly traffic detection is one method to detect attack in internet, especially Distributed Denial of Service (DDoS). Here, traffic analysis which reveal the observed traffic pattern is key important process as the anomaly decision was taken based on traffic analysis. This research analyzed several statistical analysis of traffic datasets categorized as normal, DDoS attack and flashcrowd. Analysis...
Complexity and flexibility are the main problems that will be faced in the world of the future network. To be able to answer these problems, a method called Software Defined Network (SDN) is being developed. The SDN concept is to separate the network's controller and forwarding plane of the hardware. In this research, SDN component, white box switch was built. To test its performance, RTT and throughput...
Digital television (TV) has been replacing analog TV in many countries. Content broadcasting applications therefore are developed widely including on the smart phone as the non-DVB enabler device. This paper aims at developing an application on the smart phone that receives program and transmits a request to the server as DVB-T transmitter. The target is to develop an application that allows smart...
Flashcrowd and Distributed Denial of Service (DDoS) almost has similar symptom across network and server. But security element such Intrusion Detection System (IDS) must handle both differently. If IDS cannot differentiate flashcrowd and DDoS attack, Quality of Service of legal user traffic in flashcrowd will degraded. So it is important for IDS to differentiate between flashcrowd and DDoS. Many earlier...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.