cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 4 Documents
Search results for , issue "Vol 5 No 2 July (2020): APTIKOM Journal on Computer Science and Information Technologies (CSIT)" : 4 Documents clear
HIGH SECURITY MECHANISM: FRAGMENTATION AND REPLICATION IN THE CLOUD WITH AUTO UPDATE IN THE SYSTEM. Khobragade, Shrutika; Bhosale, Rohini; Jiwahe, Rahul
APTIKOM Journal on Computer Science and Information Technologies Vol 5 No 2 July (2020): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/csit.v5i2.138

Abstract

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
INTEGRATION OF LOCAL CHAN VASE ALONG WITH OPTIMIZATION TECHNIQUES FOR SEGMENTATION Jyothula, Hari; Rao, S. Koteswara; Kumari, V. Valli
APTIKOM Journal on Computer Science and Information Technologies Vol 5 No 2 July (2020): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/csit.v5i2 July.140

Abstract

image is a two dimensional capacity f(x, y). The way toward dividing an image into numerous parts or questions is named as Segmentation. There are two noteworthy deterrents in sectioning an image i.e., Intensity Inhomogeneity and Noise. As a result of these challenges, precise division comes about can't be acquired. This paper presents Local Chan-Vese (LCV) alongside some enhancement methods for minimization of vitality capacities to defeat power inhomogeneity and commotion. By consolidating this implanted approach, the images with force inhomogeneity can be effectively divided.
ONLINE COMMAND AREA WATER RESOURCE MANAGEMENT SYSTEM Pallavi, P.; Salam, Shaik
APTIKOM Journal on Computer Science and Information Technologies Vol 5 No 2 July (2020): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/csit.v5i2 July.141

Abstract

Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the activity of planning, developing, distributing and managing the optimum use of water resources. Successful management of water resources requires accurate knowledge of their resource distribution to meet up the competing demands and mechanisms to make good decisions using advanced recent technologies.Towards evolving comprehensive management plan in suitable conservation and utilization of water resources space technology plays a crucial role in managing country?s available water resources. Systematic approaches involving judicious combination of conventional server side scripting programming and remote sensing techniques pave way for achieving optimum planning and operational of water resources projects.   new methodologies and 24/7 accessible system need to be built, these by reducing the dependency on complex infrastructure an specialist domain Open source web GIS systems have proven their rich in application of server side scripting and easy to use client application tools. Present study and implementation aims to provide wizard based or easily driven tools online for command area management practices. In this large endeavour modules for handling remote sensing data, online raster processing, statistics and indices generation will be developed.
TRANSMISSION OF DATA IN SECURE MANNER WITH DNA SEQUENCE Paspula, Ravinder; Chiranjeevi, K.; Kumar, S. Laxman
APTIKOM Journal on Computer Science and Information Technologies Vol 5 No 2 July (2020): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/csit.v5i2 July.142

Abstract

A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level, DNA-Based molecular Cryptography system is shows extremely efficient. This technique offers a unique cipher-text generation process and a new key generation practice. This method used to implement a procedure which includes two stages. First stage generates a session key and encryption key and it uses cipher block chaining mode-CBC, the secrete number(s) and incorporate plain-text M into level-1 cipher-text. The last stage converts the level-1 cipher-text into level-2 cipher-text (s). The level-2 cipher-text is again transformed into human made DNA-sequence (S?) and is given to the receiver along with many other DNA-sequence. By this process it will become a more complicated for un-authorized user to gain original information. The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.

Page 1 of 1 | Total Record : 4