cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload Imam Riadi; Eddy Irawan Aristianto
Computer Engineering and Applications Journal Vol 5 No 1 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (668.245 KB) | DOI: 10.18495/comengapp.v5i1.161

Abstract

The development of computer security technology is very rapidly. Web security is one of the areas that require particular attention related to the abundance of digital crimes conducted over the web. Unrestricted file upload image is a condition in the process of uploading pictures is not restricted. This can be used to make the attacker retrieve the information that is contained in a system. This research developed with several stages, such as, data collection, analysis of the current conditions, designing improvements to the program code, testing and implementation of the results of patch. Security testing is performed to find out the difference between before and after conditions applied patch unrestricted image file upload. Based on the results of testing done by the method of penetration testing results obtained before the application of patch unrestricted image file upload results respondents said 15% strongly disagree, 85% did not agree. Testing after applying patch unrestricted image file upload results respondents said 7.5% strongly agree, 92.5% agree, so it can be concluded that the development of the patch that has been done has been running smoothly as expected.
Cloud-Based Retrieval Information System Using Concept for Multi-Format Data Ibrahim Alghamdi; Dhafer Ali F. Alshehri; Abdullah Alghamdi; Bedine Kerim; Rahmat Budiarto
Computer Engineering and Applications Journal Vol 5 No 1 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (416.257 KB) | DOI: 10.18495/comengapp.v5i1.165

Abstract

The need of effective and efficient method to retrieving non-Web-enabled and Web-enabled information entities is essential, due to the fact of inaccuracy of the existing search engines that still use traditional term-based indexing for text documents and annotation text for images, audio and video files. Previous works showed that incorporating the knowledge in the form of concepts into an information retrieval system may increase the effectiveness of the retrieving method. Unfortunately, most of the works that implemented the concept-based information retrieval system still focused on one information format. This paper proposes a multi-format (text, image, video and, audio) concept-based information retrieval method for Cloud environment. The proposed method is implemented in a laboratory-scale heterogeneous cloud environment using Eucalyptus middleware.  755 multi-format information is experimented and the performance of the proposed method is measured.
Boosting diagnosis accuracy of Alzheimer's disease using statistical and kernel-based feature selection techniques M. A Balafar; Rouya Norzadeh
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (410.612 KB) | DOI: 10.18495/comengapp.v5i3.173

Abstract

Alzheimer's disease (AD) is the most common type of dementia in the elderly. Approximately, 26 million people worldwide are affected by AD. Among the various diagnostic methods for Alzheimer's disease, MRI brain imaging can display sharp changes in brain tissues. It can be used as a method for early diagnosis of Alzheimer's disease. Considering the high volume of features related to brain tissue thickness, requires the using feature reduction methods. For this purpose, statistical tests pair sample test and Independent sample test was used. After careful selection of key features, for reducing the number of features, SAS which is a kernel-based feature selection algorithm is used in linear and nonlinear mode. At the end, neural network classification, decision trees, nearest neighbor and Naïve Bayes algorithms are used for modeling. Results show that the classification accuracy of obtained feature subsets have better results compare to the original data set.
Dual Band Fractal Antenna Design for Wireless Application O.S. Zakariyya; Bashir Olaniyi Sadiq; A.A Olaniyan; A.F. Salami
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (134.354 KB) | DOI: 10.18495/comengapp.v5i3.175

Abstract

The objective of this paper was to design and analyze a dual wide band compact antenna for wireless application. Microstrip patch antenna limitation was overcome by using fractal geometry. The proposed antenna was designed with a radius of 15mm on a FR4 lossy substrate with relative permittivity of 4.4 and loss factor of 0.025. Measurement result showed that the antenna has a dual band of operation with bandwidth for return loss below -10dB of 1.84GHz (2.2GHz-4.07GHz) and 2GHz (6GHz-8GHz) which can be applied to wireless local area network (WLAN) and Ultra wide band applications.
Exploration based Genetic Algorithm for Job Scheduling on Grid Computing Hanaa Abdelrahman; Mohammed Bakri Bashir; Adil Yousif
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.7 KB) | DOI: 10.18495/comengapp.v5i3.181

Abstract

Grid computing presents a new trend to distribute and Internet computing to coordinate large scale heterogeneous resources providing sharing and problem solving in dynamic, multi- institutional virtual organizations. Scheduling is one of the most important problems in computational grid to increase the performance. Genetic Algorithm is adaptive method that can be used to solve optimization problems, based on the genetic process of biological organisms. The objective of this research is to develop a job scheduling algorithm using genetic algorithm with high exploration processes. To evaluate the proposed scheduling algorithm this study conducted a simulation using GridSim Simulator and a number of different workload. The research found that genetic algorithm get best results when increasing the mutation and these result directly proportional with the increase in the number of job. The paper concluded that, the mutation and exploration process has a good effect on the final execution time when we have large number of jobs. However, in small number of job mutation has no effects.
Object Reconstruction from 2D Drawing sketch to 3D Object Rossi Passarella; Osvari Arsalan
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (547.997 KB) | DOI: 10.18495/comengapp.v5i3.183

Abstract

Design engineer in the early phase of building up another product is  typically using a freehand sketching to communicate or illustrate the idea in the form of orthographic projection. This orthographic projection is based on viewpoint. A translation from 2D drawing  view point to 3D models is needed to help engineer to imagine the product preview in 3D. This procedure includes a tedious, so that automation is needed. The way to deal with this reproduction issue begin straightforwardly from 2D freehand portraying, by using the camera, the 2D drawing is captured and then transferred to a Personal Computer. Inside the computer, the image is processed with  filtering to find the view point zones. The view point zone than separate to 3 zones, each zone consists of the pixel coordinate. This coordinates are used to generated and processing of 3D voxel Image according to the form of geometries. A case study is presented in order to emphasize and discuss the proposed method
Multicast Energy Aware Routing in Wireless Networks Ahmad Karimi
Computer Engineering and Applications Journal Vol 5 No 3 (2016)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (929.288 KB) | DOI: 10.18495/comengapp.v5i3.184

Abstract

Multicasting is a service for disseminating data to a group of hostsand it is of paramount importance in applications with a close collabo-ration of network hosts. Due to limited energy available in the wirelessdevices, energy management is one of the most important problems inwireless networks. Energy aware routing strategies help us to mini-mize the energy costs for communication as much as possible and toincrease the network lifetime. In this paper, we address the problemof energy efficient routing to increase the lifetime of the network. Wepresent three new strategies for online multicast energy aware routingin wireless networks to increase the network lifetime.
Network-on-Chip Paradigm for System-on-Chip Communication Rahmat Budiarto; Lelyzar Siregar; Deris Stiawan
Computer Engineering and Applications Journal Vol 6 No 1 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (36.543 KB) | DOI: 10.18495/comengapp.v6i1.186

Abstract

Developments of modern technologies in electronics, such as communication, Internet, pervasive and ubiquitous computing and ambient intelligence have figured largely our life. In our day micro-electronic products inspire the ways of learning, communication and entertainment. These products such as laptop computer, mobile phones, and personal handheld sets are becoming faster, lighter in weight, smaller in size, larger in capacity, lower in power consumptions, cheaper and functionally enhanced. This trend will persistently continue. Following this trend, we could integrate more and more complex applications and even systems onto a single chip. The System-on-Chip (SoC) technologies, where complex applications are integrated onto single ULSI chips became key driving force for the developments.
Object Following Design for a Mobile Robot using Neural Network Neta Larasati; Tresna Dewi; Yurni Oktarina
Computer Engineering and Applications Journal Vol 6 No 1 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (334.427 KB) | DOI: 10.18495/comengapp.v6i1.189

Abstract

Deciding the best method for robot navigation is the most important tasks in mobile robot design, defined as the robot's ability to reach the target or/and move around its environment safely using the installed sensors and/or predefined map. To achieve this objective, wall or object detection can be considered. It is common to derive kinematics and dynamics to design the controls system of the robot, however by giving intelligence system to the robot, the control system will provide better performance for robot navigation. One of the most applied artificial intelligence is neural networks, a good approach for sensors of mobile robot system that is difficult to be modeled with an accurate mathematical equations. Mostly discussed basic navigation of a mobile robot is wall following. Wall following robot has been used for many application not only in industrial as a transport robot but also in domestic or hospital. Two behaviors are designed in this paper, wall following and object following. Object following behavior is developed from wall following by utilizing data from 4 installed distance sensors. The leader robot as the target for the follower robot, therefore the follower robot will keep on trying reaching for the leader in a safe distance. The novelty of this research is in the sense of the simplicity of proposed method. The feasibility of our proposed design is proven by simulation where all the results shows the effectiveness of the proposed method.
Least Significant Braille Method in Steganography Using Digital Image Media For Security Message Megah Mulya; Zikry Sugiwa
Computer Engineering and Applications Journal Vol 6 No 1 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (252.61 KB) | DOI: 10.18495/comengapp.v6i1.193

Abstract

Confidentiality of the message or the information is the most important and essential. It is very influential on the party who has the valuable message when they want to exchange messages on others. To keep the message is not known to others, the necessary security on the message. Steganography is one technique for providing security to the message. Steganography is a technique to hide messages in a medium, such as pictures, sounds, and video. Steganographic technique used in this study is the Least Significant Braille (LSBraille). This technique makes use of human vision in the message on the bit value was not significant. This study focuses on how much resistance level stego image to various image processes and measure results accuracy Peak Signal to Noise Ratio (PSNR). From the result of the insertion of a secret message, that the level of resistance stego image is not resistant to digital image processing. The result of the calculation of PSNR value obtained from experiments on all data samples between 51-73 dB

Page 6 of 32 | Total Record : 318