cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 318 Documents
Python Source Code Plagiarism Attacks in Object-Oriented Environment Oscar Karnalim; Aldi Aldiansyah
Computer Engineering and Applications Journal Vol 6 No 3 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (461.293 KB) | DOI: 10.18495/comengapp.v6i3.217

Abstract

Since source code plagiarism is an emerging issue on Computer Science major and Python is a new popular programming language, this paper aims to empirically enlist plagiarism attacks that might be occurred on Python source code. As our case study, our work will be focused on source code plagiarism in object-oriented environment. The result of this work is expected to become either an evaluation baseline or a prior knowledge for developing Python-targeted plagiarism detection system. Based on 280 plagiarism-suspected pairs that were extracted from four Basic Data Structure classes, four findings can be deducted. First, there are 20 distinct Python plagiarism attacks that might be occurred in object-oriented environment. Second, plagiarism attack trend on both object-oriented and procedural environment are considerably similar to each other. Third, there is no need to handle plagiarism attacks in both object-oriented and procedural environment separately. Last, plagiarism attacks in object-oriented environment is more monotonous than such attacks in procedural environment.
Implementation Color Filtering and Harris Corner Method on Pattern Recognition System Ahmad Zarkasi; Sutarno Sutarno; Huda Ubaya; Muhammad Fajar
Computer Engineering and Applications Journal Vol 6 No 3 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (820.64 KB) | DOI: 10.18495/comengapp.v6i3.219

Abstract

Color recognition and angle detection of underwater objects can be done with the help of underwater robots (ROV) with image processing applications. The processing of the object's image is recognizing various shapes and colors of objects in the water. In this research, the color filtering and Harris corner method will be designed, studied, tested and implemented. The color filtering method is used to recognize object color patterns, while the Harris Corner method is used to detect angles of underwater objects. Then classify images to get data on environmental pattern recognition. The color patterns tested include red, green, yellow and blue. the results obtained are all color patterns can be recognized well. while the shape of the object being tested includes cubes, triangles, rectangles, pentagons, and hexagons. the results of testing some of the shapes can be detected with a good angle and others still have errors. This is because testing the form of objects is done in various positions, such as from the front, right, left, up and below. 
Design of a Bimodal Home Automation System using ESP8266 and ATMEGA328 Microcontroller Sikiru Olayinka Zakariyya; A.F. Salami; O.O. Alabi; A.M. Usman
Computer Engineering and Applications Journal Vol 6 No 3 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (649.481 KB) | DOI: 10.18495/comengapp.v6i3.220

Abstract

Home automation systems are garnering increasing popularity and widespread use due to the relative ease of domestic management and comparatively high return on technology investment tied to its adoption. However, Nigeria and other emerging ICT economies are yet to fully actualize and maximize the inherent potential of these smart home technologies due to endemic challenges associated with poor infrastructure, erratic power supply and unreliable Internet connectivity. These challenges necessitate an innovative paradigmatic shift that could provide a pragmatic technological solution suitable to the context of Nigeria and other developing climes. For most smart home systems in this research context, the status quo is based on choosing whether the design would be for short- or long-range communication network. Short-range designs which are usually realized with Bluetooth technology suffer from limited range issues while poor connectivity, bandwidth and latency issues are some of the problems plaguing Wi-Fi-based long-range designs. Consequently, this research presents a hybrid adaptive architecture that combines desirable features of both short- and long-range modes. The proposed smart home system is based on using embedded systems which use mobile application to send messages to ESP8266 Wi-Fi module. Together with notifications received from the monitoring unit, these messages are parsed by Arduino's ATMEGA328 microcontroller from where instruction codes are sent for controlling the load by switching ON or OFF various relays connected to the load.
Swarm Robot Implementation in Gas Searching Using Particle Swarm Optimization Algorithm Nyayu Latifah Husni; Ade Silvia; Siti Nurmaini; Falah Yuridho; Irsyadi Yani
Computer Engineering and Applications Journal Vol 6 No 3 (2017)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.811 KB) | DOI: 10.18495/comengapp.v6i3.221

Abstract

In this reseach, a PSO method is impelemented in searching a gas leakage. A swarm robot consisted of 3 agents, yelow, blue, and green, was used. The research was done in 2 type of experiments, i.e. in simulation and real expeiment. A Matlab is used as a simulation validation while for the real experiment, a 2 x 2 m arena is used. From the experiment, it can be concluded that a good performance of a swam can be achieved using PSO method.
Faces and eyes Detection in Digital Images Using Cascade Classifiers Alhamzawi Hussein Ali Mezher
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (489.075 KB) | DOI: 10.18495/comengapp.v7i1.222

Abstract

In this Article we present a way to implementation and detect the face and eyes on digital image, based on Haar-like features extraction and cascade classifier, these techniques used in 100 % and 92% for faces and eyes detection respectively for the best all cases using low processing time , we used cheap equipment in our work (Acer TravelMate web camera ) . OpenCV library(computer vision library) and Python language used in this work.
Improving Data Integrity of Individual-based Bibliographic Repository Using Clustering Techniques Firdaus Firdaus; Oky Budiyarti; Muhammad Anshori; Mira Afrina; Siti Nurmaini
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (376.066 KB) | DOI: 10.18495/comengapp.v7i1.223

Abstract

This paper presents a method to improve data integrity of individual-based bibliographic repository. Integrity improvement is done by comparing individual-based publication raw data with individual-based clustered publication data. Hierarchical Agglomerative Clustering is used to cluster the publication data with similar author names. Clustering is done by two steps of clustering. The first clustering is based on the co-author relationship and the second is by title similarity and year difference. The two-step hierarchical clustering technique for name disambiguation has been applied to Universitas Sriwijaya Publication Data Center with good accuracy.
Application of the Fundamental Solution Method to object recognition in the pictures Tomasz Klekiel
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (637.177 KB) | DOI: 10.18495/comengapp.v7i1.224

Abstract

Recognition of objects in pictures and movies requires the use of techniques, such as filtering, segmentation and classification. Image filtering is required to remove all artifacts that hinder the unequivocal identification and sharpen interesting objects. Segmentation refers to finding areas of images respected to individual objects. For the selected areas corresponding to objects in the selected picture, the classification of objects finally gives information about the type of object which orientation is made. This paper presents a method for the classification of objects from drawings as a bitmap using the method of fundamental solutions (MFS). The MFS was tested on the selected bitmap depicting simple geometric shapes. The correlations between errors occurring on the boundary for particular shapes are used for the selection of geometric shape figures. Due to this correlation, it is possible to recognize the shape of the image appearing on the drawing by an analysis consisting of the comparison of recognized points describing the shape of contour to a database containing solutions of boundary value problems for the selected shape. In one way, the comparison of the pattern can determine which shape from database it is most similar to in terms of contour. This article appear that this approach is very simple and clearly. In result, this method can be used to recognition of the objects in the systems of real-time processing.
A new method to improve feature selection with meta-heuristic algorithm and chaos theory Mohammad Masoud Javidi; Nasibeh Emami
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (626.406 KB) | DOI: 10.18495/comengapp.v7i1.225

Abstract

Finding a subset of features from a large data set is a problem that arises in many fields of study. It is important to have an effective subset of features that is selected for the system to provide acceptable performance. This will lead us in a direction that to use meta-heuristic algorithms to find the optimal subset of features. The performance of evolutionary algorithms is dependent on many parameters which have significant impact on its performance, and these algorithms usually use a random process to set parameters. The nature of chaos is apparently random and unpredictable; however it also deterministic, it can suitable alternative instead of random process in meta-heuristic algorithms
Some Physical and Computational Features of Unloaded Power Transmission Lines' Switching-off Process Tahir Lazimov; Esam Ali Saafan; Asif Sadigov
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (719.281 KB) | DOI: 10.18495/comengapp.v7i1.227

Abstract

The paper presents results of research some physical and computational features of unloaded power transmission lines switching-offs. It was stated that there are not monotonous dependence between magnitudes of transitional voltages at switching-off high voltage aerial lines and their lengths. There was studied influence of the circuit-breaker type (SF6 or vacuum ones) on transitional voltages. Features of use the ordinary differential equations' solvers at computer simulation from the point of view stability of solutions and simulation time consuming were investigated in the presented research.
BLOB Analysis for Fruit Recognition and Detection Muhammad Dede Yusuf; RD Kusumanto; Yurni Oktarina; Tresna Dewi; Pola Risma
Computer Engineering and Applications Journal Vol 7 No 1 (2018)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (682.192 KB) | DOI: 10.18495/comengapp.v7i1.237

Abstract

Robot application in agriculture can ease the farming process, especially as the harvesting robot for seasonal fruit that is available in a short time. The addition of "eye" as the image sensor is an important feature for a harvesting robot. Thanks to the increment of technology, the camera is getting smaller with better performance, and lower prices. The cheap sensors and components make the creation of cheap and effective robot possible. Image processing is necessary for object detection, and open source software is available now for this purpose. This paper proposes BLOB analysis for object detection of 5 fruits with different shapes and colors. The simulation results show that the proposed method is effective for object detection regardless the shapes, colors, and noises.

Page 8 of 32 | Total Record : 318