cover
Contact Name
Computer Science and Information Technologies (CSIT)
Contact Email
csit@aptikom-journal.id
Phone
+6285781002211
Journal Mail Official
csit@aptikom-journal.id
Editorial Address
Jl. Jend. Sudirman No, 40 Modern – Cikokol Tangerang 15117, Indonesia
Location
Kota bandung,
Jawa barat
INDONESIA
APTIKOM Journal on Computer Science and Information Technologies (CSIT)
ISSN : 25282417     EISSN : 25282425     DOI : 10.34306
APTIKOM Journal on Computer Science and Information Technologies is a peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science, Informatics, Electronics Engineering, Communication Network and Information Technologies. The journal is published four-monthly (March, July and November) by the Indonesian Association of Higher Education Institutions in Computer Science and Information Technology (APTIKOM).
Articles 61 Documents
DECISION SUPPORT SYSTEM BASED ON BENEFIT COST RATIO METHOD FOR PROJECT TENDER Rukmana, Siti Hardiyanti; Muslim, Much Aziz
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 1 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The procurement process became one of the important aspects for PT. PLN (Persero) to operate thecompany. One way to meet these needs is through the project tender. The tender process aims to get high-gradematerials with the lowest prices that meet the criteria of efficiency PT. PLN (Persero). In order to simplify thebidding process required a decision support system. The method used in this system is Benefit Cost Ratio (BCR).Input in this application are the documents and the tender offer price from bidders with complete tender documentsthat have been validated by prospective bidders and then selected by the tender committee to make an assessment andvalidation winner. The output of this process is the winner of the tender project based on calculations Benefit CostRatio (BCR). Therefore, the method Benefit Cost Ratio (BCR) can be used as a decision support system to determinethe winner of the project tender.
QUALITY OF SERVICE BASED MULTICASTING ROUTING PROTOCOLS FOR MANETS: A SURVEY Sahu, Prabhat Kumar; Pattanayak, Binod Kumar
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 1 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The modern electronic age consists of many new approaches for the communication among the humancivilizations and the AD HOC network is one of the successful self-configuring and infrastructure-lesscommunicating approach. Mobile ad hoc networks (MANETs) comprised of mobile nodes organize themselves insuch a manner that the can move freely inside the network and frequently change their position. Open architectureand dynamic nature of the network enhance its use in multimedia applications that needs graphics, audio, data,image, video and animation. Now a day?s the increasing use of multimedia and Internet technology needs quality ofservice (QoS) in MANETs in order to provide better service for the companies. This type of applications lendsthemselves well to multicast operations. As multicasting supports group oriented computing it can improve the QoSof the wireless medium by means of sending multiple copies of packets by exploring the internet broadcast propertiesof wireless transmission. Hence QoS multicasting plays a great role in MANETs for multimedia applications.However it is very difficult and challenging task to provide QoS multicasting. With unique features and by means ofdifferent recovery mechanisms, many researchers have been proposed various QoS based multicasting routingprotocols for MANETs. In order to assist QoS multicasting routing protocols design for MANETs, we characterizethe taxonomy of the multicast routing protocols and design features in this paper.
IMPLEMENTATION OF PC CONTROLLED WIRELESS VIDEO TRANSMITTING VEHICLE P, Ramanathan
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 2 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Remote PC controlled video transmitting Surveillance Car is a microcontroller based configuration whichsend serial information from PC by means of chip to the auto. This auto works as indicated by the guideline givenfrom PC. Remote transmission is behavior through transmitter to send the information and direction to the auto so itwill work as indicated by the guideline given. It transmits continuous video back to PC to screen the whereabouts ofthe auto and to see the items and the obstructions in the way. It additionally peruses an entire picture from cameraand sends it to the PC with the objective that we can surveillance through video transmission.
DESIGN AND SIMULATION OF AUTOMATIC TEMPERATURE CONTROL AND ALERT SYSTEM BASED PIC16F887 Jahlool, Jabbar Shaati
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 2 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this research, the design and simulation of an automatic system for temperature control using embeddedsystem in order to automatically control of multi appliances depend on the temperature value. The appliances will becontrolled are ventilation, cooling, heating and alert. This is an order to avoid or reduce to human intervention andincrease system reliability. An important feature of this automation process is to reduce or eliminate the possibility ofrelying on the human factor operator for industries, warehouses and laboratories, and to improve working andperformance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit,LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display thedifferent system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators todisplay the corresponding working appliance driver. The implementation and simulation of the system work has beenachieved by using Proteus professional software v8.0 and mikroc pro for pic v.6.6.1 software to write the equivalentprogram and generate. Hex file for system working.
RESEARCH TRENDS AND SOLUTIONS FOR SECURE TRAFFIC MANAGEMENT OF SDN Pandey, Ravi Shankar; Srivastava, Vivek; Yadav, Lal Babu
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Software Defined Network (SDN) decouples the responsibilities of route management and datatransmission of network devices present in network infrastructure. It integrates the control responsibility at thecentralized software component which is known as controller. This centralized aggregation of responsibilities mayresult the single point of failure in the case malicious attack at the controller side. These attacks may also affect thetraffic flow and network devices. The security issues due to such malicious attacks in SDN are dominating challengesin the implementation and utilization of opportunities provided by this new paradigm. In this paper we haveinvestigated the several research papers related to proposal of new research trends for security and suggestionswhich fulfil the security requirements like confidentiality, integrity, availability, authenticity, authorization,nonrepudiation, consistency, fast responsiveness and adaptation. We have also investigated the new future researchfor creating the attack free environment for implementing the SDN.
A LIGHTWEIGHT INTER-ZONAL AUTHENTICATION PROTOCOL FOR MOVING OBJECTS IN LOW POWERED RF SYSTEMS Shyamala, C. K.; Rajagopalan, Anand K.
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Automatic identification systems represent a wide classification of devices used primarily in commercialsettings for inventory/logistics control. Familiar examples of such devices are bar codes, magnetic strips, smartcards, RFID (Radio frequency identification) and biometric and voice recognition. Security is especially lax in lowpowered RF (radio frequency) systems communicating through an unsecured radio wave channel. Security representsa critical component for enabling the large scale adoption of automatic identification systems. Providing an effectivesecurity solution for low powered systems is a major area of concern; it directs research towards ?powerconsumption aware? computations in security solutions. This paper proposes a Lightweight Inter-ZonalAuthentication Protocol for moving objects in low powered RF systems. Formal validation and a thorough analysisof the protocol in SPAN security tool reveals its effectiveness and resiliency to attacks?eaves dropping, reader andtag impersonation, replay and desynchronization.
RK ALGORITHM: STOCHASTIC PARALLEL METHODOLOGY FOR SYMMETRIC KEY CRYPTOGRAPHY Ramesh, Yegireddi; Reddi, Kiran Kumar
APTIKOM Journal on Computer Science and Information Technologies Vol 2 No 3 (2017): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the enormous growth in the Internet and network, data security has become an inevitable concern forany organization. From antecedent security has attracted considerable attention from network researchers. In thisperspective many possible fields of endeavour come to mind with many cryptographic algorithms in a broader way,each is highly worthy and lengthy. As society is moving towards digital information age we necessitate highlystandard algorithms which compute faster when data size is of wide range or scope. On survey, numerous sequentialapproaches carried out by symmetric key algorithms on 128 bits as block size are ascertained to be highly insecurable and resulting at a low speed. As in the course the commodities are immensely parallelized on multi coreprocessors to solve computational problems, in accordance with, propound parallel symmetric key based algorithmsto encrypt/decrypt large data for secure conveyance. The algorithm is aimed to prevail by considering 64 character(512 bits) plain text data, processed 16 characters separately by applying parallelism and finally combine each 16-character cipher data to form 64-character cipher text. The round function employed in the algorithm is verycomplex, on which improves efficacy.
INTELLIGENT AGENTS BASED TRUSTED REVOCATION FOR SECURING CLUSTERING MANETS Aranganathan, A.; Suriyakala, C. D.
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile Ad-hoc Network is a non-secure wireless network which has no infrastructure, dynamical topologyin which the nodes can move anywhere, may join or leave the network through multi-hop communication. In clusternetwork, all the nodes can select one Cluster Head for transmission of data to another Cluster Head through gatewayswhich is mainly used for saving energy of each node. Intelligent agents are used for collecting secure data fromneighboring nodes and inform to the trusted agent in clustered networks. Security plays major role in wireless medium.Detecting malicious node is also causing a major concern to damage the data packets. To avoid this problem of enteringmalicious node in networks and non-secured data, agents based trusted revocation in clustering mobile ad-hoc networkfor improving security with Certificate Authority to improve the network performance like high throughput, less latencytime and improved certificate revocation time using ns2 simulators.
DENOISING OF IMAGE USING BILATERAL FILTERING IN MULTIRESOLUTION Abid Ali, Alaa Abid Muslam; Dohan, Mohammed Iqbal; Musluh, Saif Khalid
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the very efficient and resource conservative image processing methodology is with the help of bilateralfilters. This technique filters the image without the help of edge smoothing but it does employs spatial averaging in anon-linear way. The filtering technique discussed above is very much dependent on the parameters of its filters. A veryslight change in filter parameter values effects the outputs and results in a most drastic manner. In this paper, theauthor has worked on two contributions. In the applications concerning image denoising, the author has contributedin study of the parameter selection of bilateral filters which are optimal in nature. The contribution number two isabout extending the present work i.e. extension of the filters which are bilateral in nature. In this process, the bilateralfiltering of images is applied to the lower frequency sub-bands which is also known as approximation sub-band. Thissub-band is obtained by using the wavelet transformations. Hence, a new framework for image denoising will becreated which will be combination of multiresolution bilateral filtering and wavelets transformation techniques. As amatter of fact, this combination is efficient in contradicting noise from an image.
DEVELOPMENT OF AN EFFICIENT MECHANISM FOR RAPID PROTOCOLS USING NS-2 SIMULATOR Abdulwahid, Sarah N.
APTIKOM Journal on Computer Science and Information Technologies Vol 3 No 1 (2018): APTIKOM Journal on Computer Science and Information Technologies (CSIT)
Publisher : APTIKOM Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The delivered effort in this manuscript is grounded on NS-2 (The Network Simulator 2) to implement thecongestion control process of classic TCP (Transmission Control Protocol), with new congestion control mechanism.In this paper, a novel congestion control algorithm is offered, which contains of slow-start and congestion avoidancemechanisms. The proposed slow-start algorithm assumes a duplicating and an interpolating approach to the congestionwindow (cwnd) for each increment instead of the exponential increment used by other TCP source variants such asReno, Vega, Tahoe, Newreno, Fack, and Sack. Furthermore, the enhanced congestion avoidance algorithm is built byusing an improved Additive Increase Multiplicative Decrease (AIMD) algorithm with multi TCP flow facility, to providean enhanced congestion control algorithm with some valuable properties to improve TCP routine for high speedprotocols. The improvement strategy based on merging of slow start, congestion avoidance mechanism that are usedin TCP congestion control, to create a new AIMD algorithm with a new relationship between the pair parameters aand b. This paper is also involved in the creation of rapid agent in NS-2 models designed to identify the modified TCPand to configure the NS-2 platform. A fast TCP also includes an innovative scheme to slow the rapid start to help TCPto start faster through the high speed networks and also to postpone the congestion state as much as possible.