Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tutun Juhana is active.

Publication


Featured researches published by Tutun Juhana.


international conference on telecommunication systems services and applications | 2012

Security in vehicular ad-hoc network with Identity-Based Cryptography approach: A survey

Nurain Izzati Shuhaimi; Tutun Juhana

The number of vehicles on the road has increased in recent years. Due to the high density of all these vehicles, potential threats and road accidents are increasing. Wireless technology is designed to equip in-vehicle technology in order to reduce these factors by sending messages to each other, known as vehicular ad hoc networks or VANET. The optimal goal of this study is that vehicular networks will contribute to safer and more efficient roads in the future by providing timely information to drivers and concerned authorities. Thus to meet this goal, substantial research in the area of security is required in order to make the VANET deployment possible in near future. In terms of architecture, implementation of Identity Based Cryptography (IBC) schemes has been studied in order to provide better security and privacy for VANET, as it is considered a viable choice due to the properties of VANET compared to the traditional Public Key Infrastructure (PKI) approach.


international conference on telecommunication systems services and applications | 2012

Mobile application for rapid disaster victim assessment

Tutun Juhana; Ririn Nur Widyani; Eueung Mulyana

Indonesia is one of the countries with the highest risk of natural disaster in the world. Therefore, Indonesia needs a disaster management method to minimize the number of casualties on any natural disasters happened in the country. This research developed a mobile application to record the medical conditions of natural disasters victim on the android platform. The data gathered will be sent to the server via HTTP Post Protocol when the network connectivity is available. The data is sent in the form of XML files and image format. When the network connectivity is unavailable, the data will be stored within android device. The data stored in android devices can be displayed, changed, and deleted by the user of the application. Overall, the mobile application developed has functioned properly. It is expected that with this application the natural disaster response team can get the adequate information of the situation in disaster field more quickly and clearly so that the medical treatment and evacuation strategy can be determined more effectively and efficiently.


international conference on telecommunication systems services and applications | 2015

A high availability (HA) MariaDB Galera Cluster across data center with optimized WRR scheduling algorithm of LVS — TUN

Bagus Aditya; Tutun Juhana

Data availability and reliability is very important along with the growth of information and communication technology services today. Needs of the powerful and affordable database system infrastructure to be the most considered thing by the application service provider. This paper presents the powerful and scalable database open source solution infrastructure which can be distributed across the data center in the world to provide any application or content services. Database infrastructure in this paper using MariaDB Galera Cluster which geographically distributed across data center and Linux Virtual Server (LVS)-Tunnel with optimized weighted round robin algorithm as the load balancer. Optimization in this weighted round robin algorithm are focused on assignment value of weight, based on the condition of database server status. The condition include total active thread (active connected client) and Query per Second Average.


international conference on telecommunication systems services and applications | 2014

Mobile phone location logging into OpenBTS-based cellular network in disaster situation

Elvanno Hatorangan; Tutun Juhana

When disasters occurs, cellular network might be down and cannot serve subscribers anymore. On the other hand, many victims trapped in a wreckage might still have access to their mobile phone. An OpenBTS-based cellular network has been long before known as an ideal solution to rapidly deploy emergency GSM cellular network in situation after disaster. We propose to deploy a mobile OpenBTS along with search and rescue operation. While the search and rescue team doing their jobs, the OpenBTS serves the victims mobile phone. The victims in limited space and time might access the OpenBTS system to try to send short messages (SMS). In this paper we propose a method to logging the location of received SMS to OpenBTS, so the disaster stakeholders will have way to find the possible victims location at later time.


international conference on telecommunication systems services and applications | 2014

Security system for surveillance radar network communication using chaos algorithm

Nova Hadi Lestriandoko; Tutun Juhana; Rinaldi Munir

Surveillance radar network is the network of some radar station to monitor and keep watch ship/vessel traffic. The communication of these station used tcp/ip over internet and local area network. The security system is an important part that can not be ignored for network communication. This paper proposed a prototype of security system for surveillance radar network, which is handling the security of communications over the Internet between a radar station to master station. The system is designed to protect the radar data against unauthorized parties. From the previous work, there was a weakness in the pseudorandom number generator. The generated number could not satisfy the randomness, it might be raise a security problem. Thus, Pseudorandom Number Generator (PNRG) using chaos algorithm was added to strengthen the salt cryptographic scheme. The analysis of result will be discussed to obtain the advantages of new system. Finally, a layered security system has been developed by taking advantage of a variety of encryption algorithms to get the best protection for the security of surveillance radar network communication.


international conference on telecommunication systems services and applications | 2015

Non-intrusive load monitoring using Bluetooth low energy

Tutun Juhana; Arif Indra Irawan

The energy consumption in residential has been increasing over the past years. Many researches about energy saving which uses information and communication technology have been presented to conserve electrical consumption. Providing residents with information on their energy consumption has become a feasible option to promote energy saving in residential sector. In this paper, a home energy monitoring system using Bluetooth Low Energy (BLE) and sensor non-invasive, is described. The authors designed a system based on BLE and non-invasive sensor so monitoring process of electrical parameter such as voltage RMS, current RMS, real power, apparent power and power factor is realized.


international conference on instrumentation communications information technology and biomedical engineering | 2015

Comparative performance evaluation of DSRC and Wi-Fi Direct in VANET

Nurain Izzati Shuhaimi; Heriansyah; Tutun Juhana

In this paper, we present a comprehensive study on the performance and behavior of AODV and DSDV routing protocols by using two standards which is the conventional DSRC and the latest Wi-Fi Direct. DSRC is a well-known technology being considered as the most promising wireless standard in VANET. On the contrary, as the latest wireless networking standard, the potential of Wi-Fi Direct technology should be concerned. We evaluated these standards using both routing protocols under realistic mobility model in order to analyze the QoS performance by using NS-2 and SUMO simulator. It is demonstrated via simulations that AODV routing protocol produces better results compared to DSDV routing protocol in both standards. It also can be concluded that DSRC is slightly better than Wi-Fi Direct standard. However based on QoS performance that has been obtained by a combination of AODV and Wi-Fi Direct standard, we can defer that Wi-Fi Direct is feasible to be used as an alternative standard since it has been considered as potential competitor of DSRC in VANET.


2015 1st International Conference on Wireless and Telematics (ICWT) | 2015

On the design of FM broadcasting remote monitoring system

Tutun Juhana

In a country like Indonesia which still uphold eastern culture and religion norm, the content of FM broadcasting stations considered important for mentality development of the society. A committee on broadcasting in Indonesia has been established which has duty, among others, to manage complains on negative broadcasting content (actually not only FM broadcasting). In every province, there is similar committee. The local province committee responsibility is mostly covers a wide geographical area. Currently, the commissioners must visit the FM broadcasting studios in regents reside in a province to compile evidence when complains from society arise. In this paper, we propose a system to remotely monitor the content of FM broadcasting stations. By using this system, commissioners do not have to visit the stations complained by the society. They can monitor the broadcasting content from headquarter. Thus the proposed system offers cheaper solution than existing one.


international conference on telecommunication systems services and applications | 2014

On the application of smart home technology to prolong classroom equipment lifetime

Tutun Juhana; Erdy Suryadarma; Gregorius K. Purwidi; Fadhli Dzil Ikram; Christian Hendy

In this work we propose to apply the smart home technology in building a monitoring system which control classroom equipment. The system saves energy and lowering the maintenance cost by undertaking necessary actions according to classroom situations. When classrooms empty, system can be used to turn off related equipment remotely and wirelessly via XBee-based wireless network. The system can be used to control LCD projectors and lights in classroom. The system thus prolong classroom equipment lifetime and decreases the energy bills. Globally speaking, lower power consumption will also reduce global warming effect.


international conference on telecommunication systems services and applications | 2011

Experimental study of TCP unfairness in IEEE802.11-based ad hoc network

Tutun Juhana; Rizqi Hersyandika

TCP is a transport layer protocol providing end-to-end reliable data transfer over IP based network. Wired TCP versions have been developed many years and have good performance. When they are deployed in wireless environment, they show poor performance. In this paper we present our evaluation on TCP performance in the term of throughput unfairness in an IEEE802.11-based ad hoc network. We evaluate TCP unfairness using experimental approach by performing measurement in a real life testbed. Two scenarios, representing hidden and exposed terminal situations, are used. In one of scenario we also vary the traffic load to see the effect of the traffic load to TCP-fairness. In each scenario we measure the throughput and calculate TCP fairness using Jains fairness index formula

Collaboration


Dive into the Tutun Juhana's collaboration.

Top Co-Authors

Avatar

Nurain Izzati Shuhaimi

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Adit Kurniawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Arif Indra Irawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Eueung Mulyana

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hamonangan Situmorang

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hamzah U. Mustakim

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hendrawan

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Heriansyah

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Iskandar

Bandung Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Muhammad Ammar Wibisono

Bandung Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge