cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota samarinda,
Kalimantan timur
INDONESIA
International Journal of Computing and Informatics (IJCANDI)
Published by Universitas Mulawarman
ISSN : 25022334     EISSN : -     DOI : -
IJCANDI (INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS) ISSN: 2502-2334 is a peer reviewed open-access journal published four times a year (February, May, August, November) in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in computing and informatics. All the papers are refereed by two international reviewers, accepted papers will be available on line (free access), and no publication fee for authors. IJCANDI is organized by Faculty of Computer Science and Information Technology, Computer Science and Information Technology Department - Universitas Mulawarman, Faculty of Computing and Informatics - Universiti Malaysia Sabah, and Faculty of Computer Science, Universitas Muslim Indonesia.
Arjuna Subject : -
Articles 3 Documents
Search results for , issue "Vol 1, No 3 (2016): August 2016" : 3 Documents clear
Implementation of Certificateless Signcryption Based On Elliptic Curve Using Javascript Abdul Wahid; Masahiro Mambo
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1223.562 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

Certificateless Cryptography (CLC) provides a new approach in addressing problems in encryption techniques. In CLC, any string can be used as a public key so that the data can be secured without using a certificate. In addition, the CLC concept makes it possible for the revocation of keys with a certain time limit. Another emerging concept is the signcryption which is a cryptographic system that combines the digital signature system and encryption system into one logical step thus requiring a smaller computational cost compared to the regular signature-then-encryption system. Elliptic Curve Cryptography (ECC) is a cryptography that uses elliptic curve which offers the same security but with smaller key sizes thus requiring less memory and computation. In this paper, we attempted to combine the three concepts to obtain all the advantages possessed by each concept without compromising system security. In the implementation we used client-based programming namely javascript which can reduce the workload of the server in order to achieve system security. We compared the computational cost of our scheme with some previous schemes and analyzed the security property of our scheme.
Mobile Packet Internet Groper (Moping) Application and Database Connection for Testing the QoS of Internet Services Edy Budiman; Ummul Hairah
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Optimizing the Quality of Experience (QoE) of mobile applications over cellular networks requires detailed knowledge of the underlying network and it is performance. Parameters of interest are, besides the signal strength and availability of technologies, the Round-trip Time (RTT) and available throughput of individual cells at a given location. This information is generally not readily available. Therefore, an Android application measuring the cellular network performance was developed. This demonstration shows the Mobile Ping (Moping) Network App, being implemented to provide visual feedback of the measured network quality to the users. The Mobile Packet Internet Groper (Moping) enables mobile application developers to characterize the data delivery performance of cellular data networks as delivered to mobile devices. Mobile application developers need to know a range of network performance characteristics, including latency, jitter, throughput, and network timeout delays. Of particular importance is how these values vary in different network provider, network technology, and mobile device combinations. To enable data collection from users across the range of technologies available, the application of Moping offers a lightweight measurement architecture that can be deployed on a wide range of Android-enabled mobile devices. The essential effect of mobile systems is that link quality becomes extremely variable, often in a random manner, although some parts of this effect can be predicted, or statistically modelled. The main QoS parameters – reliability of connection, bandwidth, latency and jitter are all affected by mobility, both during and between connections.
Perfection of Intrusion Detection Using Correlation, Genetic Algorithm, Radial Basis Function S Selvakani; R.S Rajesh
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

The tech-savvy generation of today uses network, which has become embedded in everyone’s routine and is inseparable from our life. Hence securing your network from various network attacks becomes paramount for us to keep our sensitive data online safe. One of the most noticeable threats to the security of networks is intruder. Due to the number of challenges faced by the Intrusion Detection System, it is a priority to detect malicious activities in a network and have an enhanced performance to cope with the increasing network traffic. The results of our experiment throw a light of our IDS ability to improve the attack detection rate and decreasing the FAR. This Intrusion detection system can do with a low FAR and the low FAR important for its functioning. The time required to train to test the model is significantly reduced by feature selection and implementing the layered approach with the help of GA and RBF. We address two concepts in this paper, first deals with features reduction based on correlation and secondly genetic algorithm rules formation with RBF training. The overall accuracy and efficiency of the system is improved by integrating them.

Page 1 of 1 | Total Record : 3