Pandapotan Siagian
Unknown Affiliation

Published : 14 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : ICON-CSE

Signature Similarity Search Using Cluster Image Retrieval Pandapotan Siagian
ICON-CSE Vol 1, No 1 (2014)
Publisher : ICON-CSE

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Significant image search in the database of signatures on previous research is still 65%, because the data stored that result capture camera [13, 14, ]. In this paper, we do the retrieval pattern signatures automatically, the algorithm that is used to find data points based on contributions. Similarity search algorithms will optimize the intra cluster and claster signatures in 3 classes i.e., Gx, Gy, gt. image capture-based content, which can calculate the similarity between the shape and texture of the images and do a grouping of pictures with minimum Euclidean distance consideration. CBIR is a set of techniques for taking pictures of semantically relevant than just image database based on recommended sources of images automatically. Performance evaluation method is now done with precision and recall for a different database. Response time to find most of the signatures from 3 grade database, giving the effect of a 78% accuracy rate higher.
Analysis of Security Service Oriented Architecture (SOA) With Access Control Models Dynamic Level Erick Fernando; Pandapotan Siagian
ICON-CSE Vol 1, No 1 (2014)
Publisher : ICON-CSE

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Now we are moving towards the "Internet of Things" (IOT) in millions of devices will be interconnected with each other, giving and taking information provided within a network that can work together. Because of computing and information processing itself IOT core supporters, So in this paper introduces "Service-Oriented Computing" (SOA) as one of the models that can be used. Where's it at each device can offer functionality as a standard service [4]. In SOA, we can make the resources available to each other in the IOT together. However, a major challenge in these service-oriented environment is the design of effective access control schemes. In SOA, the service will be invoked by a large number, and at the same time authentication and authorization need to cross several security domains are always used. In this paper, we present the analysis of data safety suatua WorkflowBased Access Control Model associated oriented (WABAC) to troubleshoot problems that occur within a system integration. The analysis showed that the point system function model based integration system that is lower than the legacy model of SOA-based systems, by designing several services using WOA approach. In addition, we have observed that the integrated model can guarantee the quality of service, security and reliability main, by applying SOA approach when needed. Finally, experimental results have proved that the service can be run side by side seamlessly without performance degradation and additional complexity.