cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
A Survey of Hand Gesture Dialogue Modeling For Map Navigation Yee Yong Pang; Nor Azman Ismail
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.18495/comengapp.v1i2.7

Abstract

Human trends to use hand gesture in communication. The development of ubiquitous computer causes the possibility of human to interact with computer natural and intuitive. In human-computer interaction, emerge of hand gesture interaction fusion with other input modality greatly increase the effectiveness in multimodal interaction performance. It is necessary to design a hand gesture dialogue based on the different situation because human have different behavior depend on the environment. In this paper, a brief description of hand gesture and related study is presented. The aim of this paper is to design an intuitive hand gesture dialogue for map navigation. Some discussion also included at the end of this paper.
Using Power-Law Degree Distribution to Accelerate PageRank Zhaoyan Jin; Quanyuan Wu
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1029.269 KB) | DOI: 10.18495/comengapp.v1i2.8

Abstract

The PageRank vector of a network is very important, for it can reflect the importance of a Web page in the World Wide Web, or of a people in a social network. However, with the growth of the World Wide Web and social networks, it needs more and more time to compute the PageRank vector of a network. In many real-world applications, the degree and PageRank distributions of these complex networks conform to the Power-Law distribution. This paper utilizes the degree distribution of a network to initialize its PageRank vector, and presents a Power-Law degree distribution accelerating algorithm of PageRank computation. Experiments on four real-world datasets show that the proposed algorithm converges more quickly than the original PageRank algorithm.
Monitoring and Resource Management in P2P Grid-Based Web Services Djafri Laouni; Mekki Rachida
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (433.305 KB) | DOI: 10.18495/comengapp.v1i2.9

Abstract

Grid computing has recently emerged as a response to the growing demand for resources (processing power, storage, etc.) exhibited by scientific applications. However, as grid sizes increase, the need for self-organization and dynamic reconfigurations is becoming more and more important. Since such properties are exhibited by P2P systems, the convergence of grid computing and P2P computing seems natural. However, using P2P systems (usually running on the Internet) on a grid infrastructure (generally available as a federation of SAN-based clusters interconnected by high-bandwidth WANs) may raise the issue of the adequacy of the P2P communication mechanisms. Among the interesting properties of P2P systems is the  volatility of  peers  which  causes  the  need  for  integration  of  a  service fault tolerance. And service Load balancing,   As a solution, we proposed a mechanism of fault tolerance and model of Load balancing  adapted to a grid P2P model, named SGRTE (Monitoring and Resource Management, Fault Tolerances and Load Balancing).DOI: 10.18495/comengapp.12.071084
Lightweight Solar Vehicle Impact Analysis Using ABAQUS/EXPLICIT Rossi Passarella; Zahari Taha
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.665 KB) | DOI: 10.18495/comengapp.v1i2.10

Abstract

This paper described the Abaqus/Explicit 6.7 simulation work performed to study the frontal crash impact condition for an in-house designed and produced lightweight solar vehicle main structural body. The structural body was fabricated from aluminum hollow pipes welded together. The analysis is needed to safeguard the safety of the vehicle driver. The dynamic response of the vehicle structure when subjected to frontal impact condition was simulated, according to NASA best practice for crash test methodology. The simulated speed used was based on the NHTSA standard. Comparison of the analysis with the standard Head Injury Criteria (HIC) and Chest Injury Criteria (CIC) revealed that the driver of the designed vehicle would not be risk because the acceleration resultant was found to be lower than 20 G.  The analysis also proved that structural component was able to protect the driver during any frontal collision incident. However, to ensure the safety of the driver, safety precautions such as the use of seatbelt and helmet as well as driving below the speed limit are recommended.DOI: 10.18495/comengapp.12.085096
Circularly Polarized Slotted Microstrip Patch Antenna with Finite Ground Plane Sanyog Rawat; K K Sharma
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.145 KB) | DOI: 10.18495/comengapp.v1i2.11

Abstract

In this paper a new geometry of circularly polarized patch antenna is proposed with improved bandwidth. The radiation performance of proposed patch antenna is investigated using IE3D simulation software and its performance is compared with that of conventional rectangular patch antenna. The simulated return loss, axial ratio and impedance with frequency for the proposed antenna are reported in this paper. It is shown that by selecting suitable ground-plane dimensions, air gap and location of the slots, the impedance bandwidth can be enhanced upto 10.15% as compared to conventional rectangular patch (4.24%) with an axial ratio bandwidth of 4.05%.DOI: 10.18495/comengapp.12.097106
Combined Classifier for Face Recognition using Legendre Moments Sridhar Dasari; I.V. Murali Krishna
Computer Engineering and Applications Journal Vol 1 No 2 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (415.502 KB) | DOI: 10.18495/comengapp.v1i2.12

Abstract

In this paper, a new combined Face Recognition method based on Legendre moments with Linear Discriminant Analysis and Probabilistic Neural Network is proposed. The Legendre moments are orthogonal and scale invariants hence they are suitable for representing the features of the face images. The proposed face recognition method consists of three steps, i) Feature extraction using Legendre moments ii) Dimensionality reduction using Linear Discrminant Analysis (LDA) and iii) classification using Probabilistic Neural Network (PNN). Linear Discriminant Analysis searches the directions for maximum discrimination of classes in addition to dimensionality reduction. Combination of Legendre moments and Linear Discriminant Analysis is used for improving the capability of Linear Discriminant Analysis when few samples of images are available. Probabilistic Neural network gives fast and accurate classification of face images. Evaluation was performed on two face data bases. First database of 400 face images from Olivetty Research Laboratories (ORL) face database, and the second database of thirteen students are taken. The proposed method gives fast and better recognition rate when compared to other classifiers.DOI: 10.18495/comengapp.12.107118
Robotics Current Issues and Trends Siti Nurmaini
Computer Engineering and Applications Journal Vol 2 No 1 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (930.261 KB) | DOI: 10.18495/comengapp.v2i1.13

Abstract

The ongoing research and development work in the field of robotics have resulted in so many new technological trends. There are revolution which are being achieved with the use of latest technology in robotics, giving birth to new possibilities for automating tasks and enriching human lives for better. One can easily witness the presence of robotics in every sphere of life from industrial robots, service robots to personal robots. It other words, robots have become a part of our world to meet new demands of a new society.DOI: 10.18495/comengapp.21.117120
An Immune Based Patient Anomaly Detection using RFID Technology Sri Listia Rosa; Siti Mariyam Shamsuddin; Evizal Evizal
Computer Engineering and Applications Journal Vol 2 No 1 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1027.754 KB) | DOI: 10.18495/comengapp.v2i1.14

Abstract

Detecting of anomalies patients data are important to gives early alert to hospital, in this paper will explore on anomalies patient data detecting and processing using artificial computer intelligent system. Artificial Immune System (AIS) is an intelligent computational technique refers to human immunology system and has been used in many areas such as computer system, pattern recognition, stock market trading, etc. In this case, real value negative selection algorithm (RNSA) of artificial immune system used for detecting anomalies patient body parameters such as temperature. Patient data from monitoring system or database classified into real valued, real negative selection algorithm results is real values deduction by RNSA distance, the algorithm used is minimum distance and the value of detector generated for the algorithm. The real valued compared with the distance of data, if the distance is less than a RNSA detector distance then data classified into abnormal. To develop real time detecting and monitoring system, Radio Frequency Identification (RFID) technology has been used in this system. Keywords: AIS, RNSA, RFID, AbnormalDOI: 10.18495/comengapp.21.121142
Codes correcting and simultaneously detecting solid burst errors P.K. Das
Computer Engineering and Applications Journal Vol 2 No 1 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (952.615 KB) | DOI: 10.18495/comengapp.v2i1.15

Abstract

Detecting and correcting errors is one of the main tasks in coding theory. The bounds are important in terms of error-detecting and -correcting capabilities of the codes. Solid Burst error is common in several communication channels. This paper obtains lower and upper bounds on the number of parity-check digits required for linear codes capable of correcting any solid burst error of length b or less and simultaneously detecting any solid burst error of length s(>b) or less. Illustration of such a code is also provided.Keywords: Parity check matrix, Syndromes, Solid burst errors, Standard arrayDOI: 10.18495/comengapp.21.143150  
Proposed Developments of Blind Signature Scheme based on The Elliptic Curve Discrete Logarithm Problem E.H. El Kinani; Fatima Amounas
Computer Engineering and Applications Journal Vol 2 No 1 (2013)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (959.359 KB) | DOI: 10.18495/comengapp.v2i1.16

Abstract

In recent years, Elliptic Curve Cryptography (ECC) has attracted the attention of researchers due to its robust mathematical structure and highest security compared to other existing algorithm like RSA. Our main objective in this work was to provide a novel blind signature scheme based on ECC. The security of the proposed method results from the infeasibility to solve the discrete logarithm over an elliptic curve. In this paper we introduce a proposed to development the blind signature scheme with more complexity as compared to the existing schemes. Keyword: Cryptography, Blind Signature, Elliptic Curve, Blindness, Untraceability.DOI: 10.18495/comengapp.21.151160

Page 1 of 32 | Total Record : 318