cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 6 Documents
Search results for , issue "Vol 1, No 3: November 2020" : 6 Documents clear
Hand gesture recognition using machine learning algorithms Abhishek B.; Kanya Krishi; Meghana M.; Mohammed Daaniyaal; Anupama H. S.
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p116-120

Abstract

Gesture recognition is an emerging topic in today’s technologies. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of Human-Computer Interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one of the essential techniques to build user-friendly interfaces. Usually gestures can be originated from any bodily motion or state, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page.
Wheelchair and robotic arm controls using gyro sensor Asep Sholahuddin; Dessy Novita; Deni Setiana
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p121-125

Abstract

Someone who could only move his/her head and could not move his/her limbs needs a wheelchair and robotic arms which could be controlled by the head. Gyro sensor is a sensor that could be controlled according to the tilt in the x,y coordinates which then implemented to measure the tilt of the user’s head. This paper would explain the head detector application to control wheelchairs and robotic arms. They could be controlled using Arduino microcontroller which uses C programming language. Gyro sensor that is put on the head could control wheelchair to move left, right, forward and backward according to the tilt of the head. It is the same with controlling robotic arms. It could rotate left, right, and move up and down. The x and y coordinates are used to determine the tilt of the head for controlling the wheelchair as well as robotic arms’ movements. It is discovered that wheelchairs and robotic arms could be controlled by the head by the use of gyro sensor.
Performance evaluation of blockchains in the internet of things Tanweer Alam
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p93-97

Abstract

The idea of blockchains technology (BT) in the internet of things (IoT) is to allow the physical things to trust in the transactions held within the IoT network. The BT is a distributed, decentralized, publicly shared its digital ledger and secured technology to eternally record the transactions across the shared database. The BT in IoT can be called Trust Machine to eliminate the intermediates and enables the physical things to trust with each other. This research evaluates the performance of BT in IoT. The simulated results are tested and can be used in the sustainable development of the integration of BT and IoT.
Modification data attack inside computer systems: a critical review Vahid Kaviani J; Parvin Ahmadi Doval Amiri; Farsad Zamani Brujeni; Nima Akhlaghi
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p98-105

Abstract

This paper is a review of types of modification data attack based on computer systems and it explores the vulnerabilities and mitigations. Altering information is a kind of cyber-attack during which intruders interfere, catch, alter, take or erase critical data on the PCs and applications through using network exploit or by running malicious executable codes on victim's system. One of the most difficult and trendy areas in information security is to protect the sensitive information and secure devices from any kind of threats. Latest advancements in information technology in the field of information security reveal huge amount of budget funded for and spent on developing and addressing security threats to mitigate them. This helps in a variety of settings such as military, business, science, and entertainment. Considering all concerns, the security issues almost always come at first as the most critical concerns in the modern time. As a matter of fact, there is no ultimate security solution; although recent developments in security analysis are finding daily vulnerabilities, there are many motivations to spend billions of dollars to ensure there are vulnerabilities waiting for any kind of breach or exploit to penetrate into the systems and networks and achieve particular interests. In terms of modifying data and information, from old-fashioned attacks to recent cyber ones, all of the attacks are using the same signature: either controlling data streams to easily breach system protections or using non-control-data attack approaches. Both methods can damage applications which work on decision-making data, user input data, configuration data, or user identity data to a large extent. In this review paper, we have tried to express trends of vulnerabilities in the network protocols’ applications.
An optimized rubber sheet model for normalization phase of IRIS recognition Selvamuthukumaran S.; Ramkumar T.; Shantharajah Shantharajah
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p126-134

Abstract

Iris recognition is a promising biometric authentication approach and it is a very active topic in both research and realistic applications because the pattern of the human iris differs from person to person, even between twins. In this paper, an optimized iris normalization method for the conversion of segmented image into normalized form has been proposed. The existing methods are converting the Cartesian coordinates of the segmented image into polar coordinates. To get more accuracy, the proposed method is using an optimized rubber sheet model which converts the polar coordinates into spherical coordinates followed by localized histogram equalization. The experimental result shows the proposed method scores an encouraging performance with respect to accuracy.
Genome feature optimization and coronary artery disease prediction using cuckoo search E. Neelima; M.S. Prasad Babu
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p106-115

Abstract

Cardiovascular diseases (CVD) is among the major health ailment issue leading to millions of deaths every year. In recent past, analyzing gene expression data, particularly using machine learning strategies to predict and classify the given unlabeled gene expression record is a generous research issue. Concerning this, a substantial requirement is feature optimization, which is since the overall genes observed in human body are closely 25000 and among them 636 are cardio vascular related genes. Hence, it complexes the process of training the machine learning models using these entire cardio vascular gene features. This manuscript uses bidirectional pooled variance strategy of ANOVA standard to select optimal features. Along the side to surpass the constraint observed in traditional classifiers, which is unstable accuracy at k-fold cross validation, this manuscript proposed a classification strategy that build upon the swarm intelligence technique called cuckoo search. The experimental study indicating that the number of optimal features those selected by proposed model is substantially low that compared to the other contemporary model that selects features using forward feature selection and classifies using SVM classifier (FFS and SVM). The experimental study evinced that the proposed model, which selects feature by bidirectional pooled variance estimation and classifies using proposed classification strategy that build on cuckoo search (BPVE and CS) outperformed the selected contemporary model (FFS and SVM).

Page 1 of 1 | Total Record : 6