cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 3 Documents
Search results for , issue "Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)" : 3 Documents clear
INTELLIGENT AGENTS BASED TRUSTED REVOCATION FOR SECURING CLUSTERING MANETS Aranganathan, A.; Suriyakala, C. D.
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topologyin which the nodes can move anywhere, may join or leave the network through multi-hop communication. In clusternetwork, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gatewayswhich is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data fromneighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium.Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of enteringmalicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc networkfor improving security with Certificate Authority to improve the network performance like high throughput, less latencytime and improved certificate revocation time using ns2 simulators.
DENOISING OF IMAGE USING BILATERAL FILTERING IN MULTIRESOLUTION Abid Ali, Alaa Abid Muslam; Dohan, Mohammed Iqbal; Musluh, Saif Khalid
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the very efficient and resource conservative image processing methodology is with the help of bilateralfilters. This technique filters the image without the help of edge smoothing but it does employs spatial averaging in anon-linear way. The filtering technique discussed above is very much dependent on the parameters of its filters. A veryslight change in filter parameter values effects the outputs and results in a most drastic manner. In this paper, theauthor has worked on two contributions. In the applications concerning image denoising, the author has contributedin study of the parameter selection of bilateral filters which are optimal in nature. The contribution number two isabout extending the present work i.e. extension of the filters which are bilateral in nature. In this process, the bilateralfiltering of images is applied to the lower frequency sub-bands which is also known as approximation sub-band. Thissub-band is obtained by using the wavelet transformations. Hence, a new framework for image denoising will becreated which will be combination of multiresolution bilateral filtering and wavelets transformation techniques. As amatter of fact, this combination is efficient in contradicting noise from an image.
DEVELOPMENT OF AN EFFICIENT MECHANISM FOR RAPID PROTOCOLS USING NS-2 SIMULATOR Abdulwahid, Sarah N.
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The delivered effort in this manuscript is grounded on NS-2 (The Network Simulator 2) to implement thecongestion control process of classic TCP (Transmission Control Protocol), with new congestion control mechanism.In this paper, a novel congestion control algorithm is offered, which contains of slow-start and congestion avoidancemechanisms. The proposed slow-start algorithm assumes a duplicating and an interpolating approach to the congestionwindow (cwnd) for each increment instead of the exponential increment used by other TCP source variants such asReno, Vega, Tahoe, Newreno, Fack, and Sack. Furthermore, the enhanced congestion avoidance algorithm is built byusing an improved Additive Increase Multiplicative Decrease (AIMD) algorithm with multi TCP flow facility, to providean enhanced congestion control algorithm with some valuable properties to improve TCP routine for high speedprotocols. The improvement strategy based on merging of slow start, congestion avoidance mechanism that are usedin TCP congestion control, to create a new AIMD algorithm with a new relationship between the pair parameters aand b. This paper is also involved in the creation of rapid agent in NS-2 models designed to identify the modified TCPand to configure the NS-2 platform. A fast TCP also includes an innovative scheme to slow the rapid start to help TCPto start faster through the high speed networks and also to postpone the congestion state as much as possible.

Page 1 of 1 | Total Record : 3