scispace - formally typeset
Search or ask a question
Institution

Telkom Institute of Technology

About: Telkom Institute of Technology is a based out in . It is known for research contribution in the topics: Computer science & Network packet. The organization has 570 authors who have published 470 publications receiving 1390 citations.


Papers
More filters
Proceedings ArticleDOI
17 Dec 2020
TL;DR: In this paper, the authors compared network planning in mid-band at 2.6 GHz and high-band in 26 GHz for multi-Gigabitper-second (Gbps) data rate transmission using Mentum Planet 7.3.
Abstract: New Radio (NR) is the fifth generation of wireless access technology that is able to provide extreme mobile broadband, massive connectivity and low-latency communications. This study aimed to compare network planning in mid-band at 2.6 GHz and in high-band at 26 GHz which enables very large bandwidth for multi-Gigabitper-second (Gbps) data rate transmission. The network planning used Mentum Planet 7.3 based on coverage area in the form of a case study in Jababeka Industrial Estate with an area of 22.67 km2. Link budget was calculated using Downlink Outdoor-to-Outdoor (O2O) with Line of Sight (LOS) and Non-Line of Sight (NLOS) scenarios based on the Urban Micro (UMi) and Urban Macro (UMa) propagation models with 3GPP TR 38.901 standardization. The simulation results showed that scenario 1 (downlink-O2OLOS) produced a better network than scenario 2 (downlinkO2O-NLOS). The NLOS scenario required a higher number of gNodeB than the LOS scenario because in the NLOS scenario, there was a trouble between the gNodeB and the user terminal. The maximum data rate at 2.6 GHz was 436.31 Mbps with an average SS-RSRP value of -96.01 dBm and an average SS-SINR value of 4.21 dB, while the maximum data rate for 26 GHz was 1.83 Gbps with an average SS-RSRP value of -78.14 dBm and an average SSSINR value of 0.46 dB.

5 citations

Proceedings ArticleDOI
01 Oct 2010
TL;DR: A comprehensive design simulation of hybrid network concerning the timeout of ACK and CTS, which determine the maximum length of optical fiber is proposed and the result of simulation is used to predict the delay bound of inter-devices WLAN.
Abstract: The convergence between WLAN and optical fiber has created a new challenge in network design. In this paper, we propose a comprehensive design simulation of hybrid network concerning the timeout of ACK and CTS, which determine the maximum length of optical fiber. Then, the result of simulation is used to predict the delay bound of inter-devices WLAN.

5 citations

Journal ArticleDOI
21 May 2020
TL;DR: In this paper, koi merupakan salah satu jenis ikan hias ying banyak dipelihara oleh masyarakat karena memiliki bentuk serta corak warna ying indah.
Abstract: Ikan koi merupakan salah satu jenis ikan hias yang banyak dipelihara oleh masyarakat karena memiliki bentuk serta corak warna yang indah. Pertumbuhan benih ikan koi sangat dipengaruhi oleh faktor lingkungan, diantaranya adalah suhu air kolam. Suhu air untuk pertumbuhan, selera makan, dan berat benih ikan koi berada pada 250C – 270C. Tujuan dari penelitian ini adalah merancang dan membuat sistem monitoring suhu pada kolam benih ikan koi berbasis IoT. Hardware yang digunakan yaitu development board NodeMCU ESP8266, sensor suhu DS18B20 , Relay, dan Water Heater. Sistem yang dibuat dapat memantau suhu air kolam dan menstabilkan suhu kolam secara otomatis menggunakan heater. Dari hasil pengujian sensor suhu yang digunakan didapatkan rata-rata error pada kondisi dingin sebesar 3,426 %, rata-rata error pada kondisi normal sebesar 1,778% dan rata-rata error pada kondisi panas sebesar 1,546%. Angka ini menunjukkan akurasi yang baik untuk pengukuran sensor.

5 citations

Journal ArticleDOI
31 Aug 2020
TL;DR: In this article, a linear array of 8 elements with a microstrip line supply was designed and fabricated into an X-band radar antenna with a unidirectional radiation pattern.
Abstract: To accurately detect objects, the radar antenna must have a high gain for the desired range. The antenna uses an array method to increase the gain. It has a unidirectional radiation pattern to meet the X-band radar implementation as a ship navigation tool. The X-band radar works at high frequencies. Thus, it will be more sensitive in detecting small particles, including rain particles. The use of a mitered-bends feeding network method by cutting the 90-degree curve is to maximize the power transmitted to reduce losses. This method spreads the bandwidth of the antenna. The antenna is designed and fabricated into a linear array of 8 elements, using the R04003C Rogers substrate with a microstrip line supply. This study limits up to 8 elements of radiation, followed by the addition of a method to expand the bandwidth of antennas. Considering material limitation and duration of antenna design. The final antenna dimensions are 142.40 mm × 42.8 mm. The measuring results show fc = 9.496 GHz, S11 = -32.64 dB, VSWR 1.05, bandwidth = 41.9 MHz (9.5159 GHz - 9.4740 GHz), and gain 8.8 dB as well as a linear polarized antenna with unidirectional pattern direction. The radar antenna tends to have a narrow beamwidth and high gain.

5 citations

Proceedings ArticleDOI
01 Nov 2018
TL;DR: It is shown that Kumar's enhanced smart card-based remote user authentication scheme is vulnerable to the off-line guessing password attack and an improved version is proposed to withstand the vulnerability in their scheme.
Abstract: One of the common necessity to have secret communication through Internet is to authenticate the legality of users. The simplest and most popular authentication technique to have secret communication through Internet is remote user authentication scheme. Recently, Kumar proposed an enhanced amart card-based remote user authentication scheme. Their scheme was robust and easy to implement. They claimed that their scheme could against explicit key authentication, replay attack, stolen-verifier attacks, forward secrecy, denial of service attacks, impersonation attacks, mutual authentication, parallel session attack, password guessing attacks, smart card loss attacks, attack via registered identity, and attack via password. In this article, we will show that Kumar's scheme is vulnerable to the off-line guessing password attack. In this article, we also propose an improved Kumar's enhanced smart card-based remote user authentication scheme to withstand the vulnerability in their scheme.

5 citations


Authors
Network Information
Related Institutions (5)
Information Technology University
13K papers, 236.4K citations

74% related

Universiti Teknologi Malaysia
39.5K papers, 520.6K citations

73% related

International Islamic University Malaysia
13.7K papers, 137.8K citations

73% related

University of Indonesia
27.5K papers, 169.3K citations

72% related

Soongsil University
8.1K papers, 109.8K citations

72% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2021107
2020113
201986
201842
20177
20162