cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance Ahmad Sanmorino
Computer Engineering and Applications Journal Vol 1 No 1 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (263.414 KB) | DOI: 10.18495/comengapp.v1i1.3

Abstract

Batik is a fabric or clothes that are made with a special staining technique called wax-resist dyeing and is one of the cultural heritage which has high artistic value. In order to improve the efficiency and give better semantic to the image, some researchers apply clustering algorithm for managing images before they can be retrieved. Image clustering is a process of grouping images based on their similarity. In this paper we attempt to provide an alternative method of grouping batik image using fuzzy c-means (FCM) algorithm based on log-average luminance of the batik. FCM clustering algorithm is an algorithm that works using fuzzy models that allow all data from all cluster members are formed with different degrees of membership between 0 and 1. Log-average luminance (LAL) is the average value of the lighting in an image. We can compare different image lighting from one image to another using LAL. From the experiments that have been made, it can be concluded that fuzzy c-means algorithm can be used for batik image clustering based on log-average luminance of each image possessed.
Techniques for Component-Based Software Architecture Optimization Adil Ali Abdelaziz; Wan Nasir
Computer Engineering and Applications Journal Vol 1 No 1 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (190.385 KB) | DOI: 10.18495/comengapp.v1i1.4

Abstract

Although Component-Based System (CBS) increases the efficiency of development and reduces the need for maintenance, but even good quality components could fail to compose good product if the composition is not managed appropriately. In real world, such as industrial automation domain, this probability is unacceptable because additional measures, time, efforts, and costs are required to minimize its impacts. Many general optimization approaches have been proposed in literature to manage the composition of system at early stage of development. This paper investigates recent approach es used to optimize software architecture. The results of this study are important since it will be used to develop an efficient optimization framework to optimize software architecture in next step of our ongoing research.
Survey of Text Plagiarism Detection Ahmed Hamza Osman; Naomie Salim; Albaraa Abuobieda
Computer Engineering and Applications Journal Vol 1 No 1 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (253.437 KB) | DOI: 10.18495/comengapp.v1i1.5

Abstract

In this paper we are going to review and list the advantages and limitations of the significant effective techniques employed or developed in text plagiarism detection. It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text. This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.
Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal Vol 1 No 1 (2012)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (526.605 KB) | DOI: 10.18495/comengapp.v1i1.6

Abstract

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of autonomous mobile nodes without any fixed infrastructure. In MANETs, it is difficult to detect malicious nodes because the network topology constantly changes due to node mobility. Intrusion detection is the means to identify the intrusive behaviors and provide useful information to intruded systems to respond fast and to avoid or reduce damages. The anomaly detection algorithms have the advantage because they can detect new types of attacks (zero-day attacks).In this paper, the Intrusion Detection System clustering-based (ID-Cluster) that fits the requirement of MANET is presented. This work addresses both routing layer misbehaviors issues, with main focuses on thwarting routing disruption attack Dynamic Source Routing (DSR). To validate the research, a case study is presented using the simulation with GloMoSim at different mobility levels. Simulation results show that proposed system can achieve desirable performance and meet the security requirement of MANET.
Performance evaluation of popular l1-minimization algorithms in the context of Compressed Sensing Bijeesh TV
Computer Engineering and Applications Journal Vol 3 No 1 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (513.968 KB) | DOI: 10.18495/comengapp.v3i1.39

Abstract

Compressed sensing (CS) is a data acquisition technique that is gaining popularity because of the fact that the reconstruction of the original signal is possible even if it was sampled at a sub-Nyquist rate. In contrast to the traditional sampling method, in CS we take a few measurements from the signal and the original signal can then be reconstructed from these measurements by using an optimization technique called l1-minimization. Computer engineers and mathematician have been equally fascinated by this latest trend in digital signal processing. In this work we perform an evaluation of different l1-minimization algorithms for their performance in reconstructing the signal in the context of CS. The algorithms that have been evaluated are PALM (Primal Augmented Lagrangian Multiplier method), DALM (Dual Augmented Lagrangian Multiplier method) and ISTA (Iterative Soft Thresholding Algorithm). The evaluation is done based on three parameters which are execution time, PSNR and RMSE.
Power Line Communication Performance Channel Characteristics Dipashree Navanath Duche; Vidya Gogate
Computer Engineering and Applications Journal Vol 3 No 1 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.83 KB) | DOI: 10.18495/comengapp.v3i1.42

Abstract

Power lines form the medium of transmission in PLC systems. The original purpose of these lines is the transportation of electric signals at 50 or 60 Hz .This paper proposes a new channel modeling method for power line communications networks based on the multipath profile in the time domain. The new channel model is developed to be applied in a range of Power line Communications (PLC) research topics such as impulse noise modeling, deployment and coverage studies, and communications theory analysis. The statistical multipath parameters such as path arrival time, magnitude and interval for each category are analyzed to build the model. Each generated channel based on the proposed Power line communication that a performance channel characteristic represents a different realization of a PLC network
A Hybrid Approach for Scheduling based on Multi-criteria Decision Method in Data Grid Najme Mansouri
Computer Engineering and Applications Journal Vol 3 No 1 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (824.653 KB) | DOI: 10.18495/comengapp.v3i1.44

Abstract

Grid computing environments have emerged following the demand of scientists to have a very high computing power and storage capacity. One among the challenges imposed in the use of these environments is the performance problem. To improve performance, scheduling technique is used. Most existing scheduling strategies in Grids only focus on one kind of Grid jobs which can be data-intensive or computation-intensive. However, only considering one kind of jobs in scheduling does not result in suitable scheduling in the viewpoint of all system, and sometimes causes wasting of resources on the other side. To address the challenge of simultaneously considering both kinds of jobs, a new Hybrid Job Scheduling (HJS) strategy is proposed in this paper. At one hand, HJS algorithm considers both data and computational resource availability of the network, and on the other hand, considering the corresponding requirements of each job, it determines a value called W to the job. Using the W value, the importance of two aspects (being data or computation intensive) for each job is determined, and then the job is assigned to the available resources. The simulation results with OptorSim show that HJS outperforms comparing to the existing algorithms mentioned in literature as number of jobs increases.
Classification of Smart Card Operating Systems Reza Asgari; Reza Ebrahimi Atani
Computer Engineering and Applications Journal Vol 3 No 1 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (375.169 KB) | DOI: 10.18495/comengapp.v3i1.49

Abstract

Today, smart cards are widely used in variety of applications of human life.The nature of these cards depends on theirs operating system, in other words the operating system determines that card can be used in what field. Hardware development on the one hand and increasing use of smart cards on the other, have led to that the operating systems have progressed dramatically.Moving from special-purpose operating systems with single application into multi-purpose operating systems with open architecture, is proof of claim.Increase the number of operating systems and variety of their applications, caused that the need to categorize and classify operating systems be felt more than ever.Smart card operating systems can be categorized based on different parameters such as file management, applications management, and historical generations. In this paper we will discussion about smart card operating systems and their classification based on these parameters.
NFC based inventory control system for secure and efficient communication Razi Iqbal; Awais Ahmad; Asfandyar Gilani
Computer Engineering and Applications Journal Vol 3 No 1 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (744.485 KB) | DOI: 10.18495/comengapp.v3i1.50

Abstract

This paper brings up this idea of using Near Field Communication (NFC) for inventory control system instead of using traditional barcodes. NFC because of its high security, ease of use and efficiency can be very suitable for systems like inventory control. In traditional inventory control systems, each product has a barcode pasted on it, which is vulnerable to attacks as barcodes are open and have no security. Furthermore, barcodes are prone to damages and can be unreliable when pasted on different types of products e.g. hot and frozen products, circular shaped products and irregular shaped products like clothes etc. NFC on the other hand is very efficient, secure and reliable when it comes to short-range wireless communication. In this paper we will present our prototype for the inventory control system of an electronic store in which each product has a passive NFC tag pasted to it. When a customer buys a product the receipt of the product is generated using NFC between the NFC passive tag on the product and NFC enabled device (e.g. smart phone or reader) at the cash counter.
Improve the Performance of Data Grids by Cost-Based Job Scheduling Strategy Najme Mansouri
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (929.5 KB) | DOI: 10.18495/comengapp.v3i2.52

Abstract

Grid environments have gain tremendous importance in recent years since application requirements increased drastically. The heterogeneity and geographic dispersion of grid resources and applications places some complex problems such as job scheduling. Most existing scheduling strategies in Grids only focus on one kind of Grid jobs which can be data-intensive or computation-intensive. However, only considering one kind of jobs in scheduling does not result in suitable scheduling in the viewpoint of all system, and sometimes causes wasting of resources on the other side. To address the challenge of simultaneously considering both kinds of jobs, a new Cost-Based Job Scheduling (CJS) strategy is proposed in this paper. At one hand, CJS algorithm considers both data and computational resource availability of the network, and on the other hand, considering the corresponding requirements of each job, it determines a value called W to the job. Using the W value, the importance of two aspects (being data or computation intensive) for each job is determined, and then the job is assigned to the available resources. The simulation results with OptorSim show that CJS outperforms comparing to the existing algorithms mentioned in literature as number of jobs increases.