JURNAL INFOTEL https://ejournal.ittelkom-pwt.ac.id/index.php/infotel <h2>About Jurnal INFOTEL</h2> <table border="0"> <tbody> <tr> <td><img src="https://ejournal.ittelkom-pwt.ac.id/public/site/images/journaladmin/cover_infotel.png" alt="telecommunication journal" width="180" height="250"></td> <td align="justify" valign="top"> <div style="background-color: #ebfeec; border: 1px solid #bae481; border-radius: 5px; text-align: justify; padding: 10px; font-family: sans-serif; font-size: 14px; margin-left: 10px;">Jurnal INFOTEL is a scientific journal published by Lembaga Penelitian dan Pengabdian Masyarakat (LPPM) of Institut Teknologi Telkom Purwokerto, Indonesia. Jurnal INFOTEL covers the field of <strong>informatics, telecommunication, and electronics</strong>. First published in 2009 for a printed version and published online in 2012. The aims of Jurnal INFOTEL are to disseminate research results and to improve the productivity of scientific publications. Jurnal INFOTEL is published quarterly in February, May, August, and November. <strong>Starting in 2018, Jurnal INFOTEL uses English as the primary language.</strong></div> </td> </tr> </tbody> </table> <div style="text-align: justify;"> <p>&nbsp;</p> <h4><strong>Important For Authors (Volume 16, No. 4, November 2024)<br></strong></h4> <p>Reminder for all the authors, you are expected to submit papers that:<br> 1. are original and have not been submitted to any other publication.<br>2. use the template specified by Jurnal INFOTEL.<br>3. use a reference manager <em>e.g.</em> Mendeley or others when managing the references.<br>4. Add all authors and complete affiliation in the metadata.<br>5.&nbsp;The text adheres to the stylistic and bibliographic requirements outlined in the Author Guidelines.<br>6.&nbsp;Willing to make improvements at the pre-review stage, a maximum of 14 days after the pre-review was carried out<br>Thank you.</p> <p>&nbsp;</p> </div> en-US <p>Authors who publish with this journal agree to the following terms:</p> <ul> <li style="text-align: justify;">Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by/3.0/" target="_new">Creative Commons Attribution License</a> that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li style="text-align: justify;">Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li style="text-align: justify;">Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work&nbsp;</li> </ul> andidemon@ittelkom-pwt.ac.id (Andi Prademon Yunus, Ph.D) awietmwp@telkomuniversity.ac.id (Muhamad Awiet Wiedanto Prasetyo, S.Kom., M.MSI.) Mon, 02 Jun 2025 00:00:00 +0800 OJS 3.1.1.4 http://blogs.law.harvard.edu/tech/rss 60 Enhancing IoT Security: Optimizing PUF Responses through Pre-Processing Techniques https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1236 <p>In this paper, we propose and detail the implementation of pre-processing techniques—specifically truncation and uniformization—to enhance the performance of authentication processes utilizing Physical Unclonable Functions (PUFs) within the context of the Internet of Things (IoT). Traditional authentication methods are often critiqued for their reliance on static secret storage, presenting inherent security risks. Physical Unclonable Function (PUF) technology addresses this concern by dynamically generating keys, akin to a device's "biometric" signature, thereby offering a more secure alternative. However, despite the dynamic nature of PUF-generated secret keys, vulnerabilities to specific attacks persist. Prior research has not focused on optimizing the secret key generated by PUFs, resulting in a lack of additional security layers and maintaining the susceptibility to PUF-targeted attacks at a constant level. This study introduces a PUF-based IoT device framework that optimizes PUF responses, aiming to significantly improve the security performance of the system. This enhancement is evaluated through metrics such as decidability, the confusion matrix, and randomness value, presenting a comprehensive approach to reinforcing system security. The optimization of Physical Unclonable Function (PUF) responses, through methods such as truncation or bit uniforming, plays a critical role in enhancing the security of IoT devices. Our findings indicate that bit uniforming notably improves system security, evidenced by a significant increase in the decidability value from 0.73 (unoptimized) to 1.37. This improvement is further reflected in the confusion matrix values, with False Rejection Rate (FRR), False Acceptance Rate (FAR), True Rejection Rate (TRR), and True Acceptance Rate (TAR) showing marked improvements from 18.02%, 4.93%, 95.06%, and 81.97% in the unoptimized state to 3.04%, 0.98%, 99.02%, and 96.96%, respectively, post-optimization. The proposed pre-processing techniques show its effectiveness in the PUF authentication systems, as superior results are obtained.</p> Parman Sukarno ##submission.copyrightStatement## http://creativecommons.org/licenses/by-sa/4.0 https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1236 Mon, 02 Jun 2025 05:47:36 +0800 Autism Face Detection System using Single Shot Detector and ResNet50 https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1331 <p>The facial features of children can provide important visual cues for the early detection of autism spectrum disorder (ASD). This research focuses on developing an image-based detection system to identify children with ASD. The main problem addressed is the lack of practical methods to assist healthcare professionals in the early identification of ASD through facial visual characteristics. This study aims to design a prototype facial image acquisition and detection system for children with ASD using Raspberry Pi and a deep learning-based single shot detector (SSD) algorithm. In this method, the face detection model uses a modified ResNet50 architecture, which can be used for advanced analysis for classification between autistic and normal children, achieving 95% recognition accuracy on a dataset consisting of facial images of children with and without ASD. The system is able to recognize the visual characteristics of the faces of children with ASD and consistently distinguish them from those of normal children. Real-time testing shows a detection accuracy ranging from 86% to 90%, with an average accuracy of 90%, despite fluctuations caused by variations in movement and viewing angle. These results show that the developed system offers high accuracy and has the potential to function as a reliable diagnostic tool for the early detection of ASD, which ultimately facilitates timely intervention by healthcare professionals to support the optimal development of children with ASD.</p> Melinda Melinda, Muhammad Fauzan Alfariz, Yunidar Yunidar, Agung Hilm Ghimri, Maulisa Oktiana, Rizka Miftahujjannah, Nurlida Basir, Donata D. Acula ##submission.copyrightStatement## http://creativecommons.org/licenses/by-sa/4.0 https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1331 Sat, 21 Jun 2025 00:00:00 +0800 English Analysis of Optical Communications System HFC and FTTH Using Optisystem Software (a Case Study at PT. Link) https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1271 <p>This research present the Analysis of the application of Optisystem software technology for FTTH and HFC shows that both have the capability for the WDM systems, to support a maximum transmission distance of 20 kilometers and can serve up to 32 subscribers. Key factors such as signal strength, Q factor, and bit error rate (BER) were observed and analyzed discreetly.&nbsp;&nbsp; It was found that FTTH has an average Q factor of 13.49 and HFC has an average Q factor of 7.475. The difference is about 44.59%, which indicates that FTTH has an advantage in terms of signal quality. However, based on the simulation results as well as the field measurements, Since the BER value does not exceed the maximum limit of 10<sup>-9</sup> and the Q-factor value exceeds the minimum limit of 6, it can be stated that both technologies are reliable for efficient and high-quality communication services<em>.</em></p> Marsul Siregar ##submission.copyrightStatement## http://creativecommons.org/licenses/by-sa/4.0 https://ejournal.ittelkom-pwt.ac.id/index.php/infotel/article/view/1271 Mon, 23 Jun 2025 07:46:48 +0800