cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
Words Stemming Based on Structural and Semantic Similarity Mohammad Hassan Dianati; Mohammad Hadi Sadreddini; Amir Hossein Rasekh; Seyed Mostafa Fakhrahmad; Hossein Taghi-Zadeh
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (564.125 KB) | DOI: 10.18495/comengapp.v3i2.57

Abstract

Words  stemming  is  one  of  the  important  issues  in  the field  of  natural  language processing  and  information retrieval.  There  are  different  methods  for stemming which are mostly language-dependent. Therefore, these  stemmers are only applicable  to  particular  languages.  Because  of the importance  of  this issue,  in  this paper, the proposed method for stemming is aimed to be language-independent. In the  proposed  stemmer,  a  bilingual  dictionary  is  used and  all  of  the  words  in  the dictionary are firstly clustered. The words’ clustering is based on their structural and semantic similarity. Finally, finding the stem of new coming words is performed by making use of the previously formatted clusters. To evaluate the proposed scheme, words  stemming is  done on both  Persian  and  English  languages.  The encouraging results  indicate  the  good  performance  of  the proposed  method  compared  with  its counterparts.
Cost Modeling and Risk and Benefit Modeling Approach as a Tools For Decision Making in Adoption Cloud Computing as IT Strategic Business Rian Rahmanda Putra; Wanda Kinasih; Dana Indra Sensuse
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (196.692 KB) | DOI: 10.18495/comengapp.v3i2.62

Abstract

Cloud computing is an innovation that allows the use of IT as a utility based on-demand. Since cloud computing is a new technology, its led to a variety of risks that required an assessment model to assess the organization's readiness to adopt cloud computing. Moreover, by using cloud computing services means organizations or outsourcing involves a third party. Before adopting cloud computing technology, organizations need to consider some of the effects that arise as a result of cloud computing, namely in terms of costs, risks and benefits. To assist organizations to consider the migration of existing IT systems to the cloud, it can be used the cost approach valuation models and risk and benefit. This paper discusses two models of cost-based assessment of risk and benefit modeling and modeling that can be used as a tool to assist organizations in making decisions related to the migration of existing IT systems to the cloud. Â
A new DWT-SVD based robust watermarking scheme for real property rights Sedigeh Razavi Babakalak; Mohammad Ali Balafar; Ali Farzan
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (855.789 KB) | DOI: 10.18495/comengapp.v3i2.73

Abstract

In this paper, a new robust digital image watermarking algorithm which was based on singular value decomposition (SVD) and discrete wavelet transform (DWT) was proposed and simulated for protecting real property rights. A gray scale logo image, rather than a randomly generated Gaussian noise type watermark, was used as a watermark. Its embedding algorithm hid a watermark LL sub-band blocks in the low–low (LL) and high-high (HH) sub-bands of a target non-overlapping block of the host image by modifying singular values on SVD version of these blocks. A semi-blind watermark extraction was designed to estimate the original coefficients. Experimental results showed that the proposed scheme made significant improvements in terms of both transparency and robustness and was superior to the existing methods which were considered in this paper.
W_SR: A QoS Based Ranking Approach for Cloud Computing Service Arezoo Jahani; Leyli Mohammad Khanli; Seyed Naser Razavi
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (573.528 KB) | DOI: 10.18495/comengapp.v3i2.76

Abstract

Cloud computing is a kind of computing model that promise accessing to information resources in request time and subscription basis. In this environment, there are different type of user’s application with different requirements. In addition, there are different cloud Service providers which present spate services with various qualitative traits. Therefore determining the best cloud computing service for users with specific applications is a serious problem. Service ranking system compares the different services based on quality of services (QoS), in order to select the most appropriate service. In this paper, we propose a W_SR (Weight Service Rank) approach for cloud service ranking that uses from QoS features. Comprehensive experiments are conducted employing real-world QoS dataset, including more than 2500 web services over the world. The experimental results show that execution time of our approach is less than other approaches and it is more flexible and scalable than the others with increase in services or users.
Predicting Academic Performance with Applying Data Mining Techniques (Generalizing the results of two Different Case Studies) Rozita Jamili Oskouei; Mohsen Askari
Computer Engineering and Applications Journal Vol 3 No 2 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (417.127 KB) | DOI: 10.18495/comengapp.v3i2.81

Abstract

Several research works are attempted to predict students academic performance and assess  the  evaluating students knowledge  or  detecting  students’  weakness and probability of failure in final semester examinations. However, several factors affect the performance of students in different countries or even in different states of one country. Therefore, understanding these factors and analyzing the effects of each one of those factors in each country, is necessary for improving instructors’ decisions in selecting   the best teaching method for helping weak students or   increasing performance  of  other  students. This study is motivated  to  study  the  students’ academic performance in high  school  and  bachelor  degree  studies  in  Iran and comparing these analysis results with the similar study’s results in India.
High Load Control Mechanism for SIP Servers Ahmadreza Montazerolghaem; Seyed-Amin Hosseini-Seno; Mohammad Hossein Yaghmaee; Rahmat Budiarto
Computer Engineering and Applications Journal Vol 5 No 2 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (708.448 KB) | DOI: 10.18495/comengapp.v5i2.167

Abstract

To start voice, image, instant messaging, and generally multimedia communication, session communication must begin between two participants. SIP (session initiation protocol) that is an application layer control induces management and terminates this kind of sessions. As far as the independence of SIP from transport layer protocols is concerned, SIP messages can be transferred on a variety of transport layer protocols including TCP or UDP. Mechanism of Retransmission that is embedded in SIP could compensate for the missing packet loss, in case of need. This mechanism is applied when SIP messages are transmitted on an unreliable transmission layer protocol like UDP. Also, while facing SIP proxy with overload, it could cause excessive filling of proxy queue, postpone increase of other contacts, and add to the amount of the proxy overload. In the present work, while using UDP as transport layer protocol, invite retransmission timer (T1) was appropriately regulated and SIP functionality was improved. Therefore, by proposing an adaptive timer of invite message retransmission, attempts were made to improve the time of session initiation and consequently improve the performance. Performance of the proposed SIP was implemented and evaluated by SIPP software in a real network environment and its accuracy and performance were demonstrated.
Peak to Average Power Ratio Reduction in OFDM Using Pulse Shaping Technique Diptadeep Das
Computer Engineering and Applications Journal Vol 5 No 2 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (408.059 KB) | DOI: 10.18495/comengapp.v5i2.169

Abstract

Orthogonal Frequency Division Multiplexing (OFDM) is a special type of multicarrier modulation in which a signal is split into several narrowband channels at different frequencies. Here data is divided into parallel data streams each transmitted on a separate band. One of the major drawbacks of multicarrier transmission is the high peak-to-average power ratio (PAPR) of the transmit signal. Nyquist filters provide ISI-free transmission. In this paper we are going to propose some new filters which can formulated in an effort to reduce the peak-to-average power ratio (PAPR) of the baseband signal. While maintaining the same excess bandwidth and the zero inter-symbol interference condition. The proposed filters contain various parameters which gives an additional degree of freedom to minimize PAPR for a given roll-off factor α .
A Proposed Software as a Service (SaaS) Toolkit for Cloud Multi- Tenancy Mohamed Osman Imam; Adil Yousif; Mohammed Bakri Bashir
Computer Engineering and Applications Journal Vol 5 No 2 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.17 KB) | DOI: 10.18495/comengapp.v5i2.170

Abstract

Cloud computing is a general term for anything that involves delivering hosted services over the Internet. It is a construct that allows you to access applications that actually reside at locations other than your computer or other Internet-connected devices. Software as a Service (SaaS) is a software delivery model in which software resources are accessed remotely by users over the internet. Enterprises prefer using SaaS because of its low cost. SaaS requires sharing of application servers among multiple tenants for low operational costs. Several SaaS Toolkits are available and used to develop cloud SaaS applications. However, most of these Toolkits are very complex. This paper aims to build a new simple and easy SaaS Toolkit to develop SaaS applications and to avoid the difficulties and complexity in the current cloud SaaS Toolkits. The proposed Toolkit is based on java virtual machine and the popular web programming languages HTML and PHP. To evaluate the proposed Toolkit an empirical study has been conducted. The result of the empirical study revealed that the proposed Toolkit outperforms the current Toolkits in terms of complexity, understandability and learnability.
Smart Home: Controlling and Monitoring Households Appliances using GSM Network Budi Rahmadya; Fahrul Ghazi; Derisma Derisma
Computer Engineering and Applications Journal Vol 5 No 2 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (588.922 KB) | DOI: 10.18495/comengapp.v5i2.171

Abstract

This study discussed about using the smart home automation systems for household appliances such as lights and fans, by utilizing the GSM network as a communication medium to control and monitor the household appliances. In this study, the simulations were performed by the two following modes 1). Self-automated and 2). Manually-automated. In controlling the lamp, the light intensity that values less than 280 lux will give response of turned ON the lamp, while if the value of light intensity is more than 280 lux, it will give a response of turned OFF the lamp. To control the fan, a room temperature value of more than or equal to 30 ° C will turn ON the fan, while the room temperature value which is less than 30 ° C will turn OFF the fan. Simulations were performed by placing the devices in the room and operating it for three days. The test and simulation results were recorded in the form of log files or history files. The self-automated operations mode controlled the system using a sensor (Light Dependent Resistor and LM35 Sensor) unit to detect the environmental condition and take actions according to detected environmental condition. In the manually-automated operation mode, user could control the household appliances according to the user’s intention. The light intensity values obtained in the morning were equal to 280 lux, so it will turn off the lights. The room temperature obtained was in the range of 28oC - 33oC; the fan will turn on if the temperature value is equal to or more than 30oC.
A Modified Black Hole-Based Task Scheduling Technique for Cloud Computing Environment Fatemeh Ebadifard; Zeinab Borhanifard
Computer Engineering and Applications Journal Vol 5 No 2 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (523.637 KB) | DOI: 10.18495/comengapp.v5i2.172

Abstract

The issue of scheduling is one of the most important ones to be considered by providers of the cloud computing in the data center. Using a suitable solution lets the providers of cloud computing use the available resources more. Additionally, the satisfaction of clients is met through provision of service quality parameters. Most of the solutions for this problem aim at one of the service quality factors and in order to achieve this goal, variety of methods are used. Using the algorithm of modified black hole in this paper, a proper solution is presented to tackle the problem of scheduling the affairs in cloud environment. The proposed method reduces makespan, increases degree of load balancing, and improves the resource`s utilization by considering the capability of each virtual machine. We have compared the proposed algorithm with existing task scheduling algorithms. Simulation results indicate that the proposed algorithm makes a good improvement regarding the makespan and amount of resource utilization compared to schedulers based on Random assignment and particle swarm optimization Algorithms.