cover
Contact Name
Alde Alanda
Contact Email
alde@pnp.ac.id
Phone
+6281267775707
Journal Mail Official
editor@ijasce.org
Editorial Address
Kampus Limau Manis
Location
Kota padang,
Sumatera barat
INDONESIA
International Journal of Advanced Science Computing and Engineering
ISSN : 27147533     EISSN : 27147533     DOI : https://doi.org/10.30630/ijasce
The journal scopes include (but not limited to) the followings: Computer Science : Artificial Intelligence, Data Mining, Database, Data Warehouse, Big Data, Machine Learning, Operating System, Algorithm Computer Engineering : Computer Architecture, Computer Network, Computer Security, Embedded system, Coud Computing, Internet of Thing, Robotics, Computer Hardware Information Technology : Information System, Internet & Mobile Computing, Geographical Information System Visualization : Virtual Reality, Augmented Reality, Multimedia, Computer Vision, Computer Graphics, Pattern & Speech Recognition, image processing Social Informatics: ICT interaction with society, ICT application in social science, ICT as a social research tool, ICT education
Articles 149 Documents
Caribi Mobile Application Based on Radio Frequency Identification (RFID) for Internet of Things (IoT) Faridah, Linda; Rahayu, Andri Ulus; Shopa, Rahmi Nur; Sulastri, Heni; Hiron, Nurul; Nursuwars, Firmansyah M S
International Journal of Advanced Science Computing and Engineering Vol. 4 No. 3 (2022)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (554.597 KB) | DOI: 10.62527/ijasce.4.3.98

Abstract

Nowadays, the e-commerce industry in Indonesia is growing substantially and expanding annually. This is one of the revolutions that has affected various aspects of life, including animal husbandry. In Indonesia, buying and selling livestock has become routine; however, it is still conducted conventionally. Therefore, a system is required to facilitate online purchasing and selling transactions; thus, farmers can expand their enterprises. This study aimed to develop a mobile application for the online purchase and sale of livestock. The Caribi Mobile Application is built with a system that can provide consumers with accurate information by recording the tracks of each animal that will be sold. Each animal’s age, weight, and recent pictures are included. Tag RFID-based Internet of Things (IoT) system is used in searching for mobile applications. The RFID Tag System is used to carry out two functions at once, namely assistance and security. This application is designed to integrate livestock data from the internet and save it in a database. This study’s findings demonstrate that the system can read the data related to each farm animal. Additionally, the system has created data on the weights of each animal, which anyone with access to the Caribi Mobile Application can view.
FPGA Implementation of High Speed and Area Efficient Three Operand Binary Adder Azeez, Saba; Rangaree, Pankaj
International Journal of Advanced Science Computing and Engineering Vol. 3 No. 1 (2021)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.642 KB) | DOI: 10.62527/ijasce.3.1.34

Abstract

Three operand binary adder is the basic functional unit to perform the pseudorandom bit generator algorithms and in various cryptography. The basic method used to perform the three-operand binary addition is carry save adder, which leads to high delay. For this a parallel prefix two operand adder such as Han-Carlson adder is used to reduce the delay but increases the hardware architecture i.e., area increases. To overcome this disadvantage, we need a new area efficient and high-speed adder architecture to be proposed using pre compute bitwise addition followed by carry prefix computation logic to perform three operand binary adder which reduces delay and area efficiently. This method is the proposed method and implemented on the FPGA device. A newly designed three operand binary adder is shown and is implemented in MDCLCG. The results of 16 bit and 32-bit three operand adder will be shown and this proposed method is applied on Modified Dual CLCG. The Carry-Save-Adder architecture used in 32-bit MDCLCG is replaced by the proposed architecture. The design is prototyped on a commercially available FPGA platform to validate the design on silicon chip.
A Linguistic Communication Interpretation Wearable Device for Deaf and Mute User Rehman, Adil; Shoufan, Abdulhadi
International Journal of Advanced Science Computing and Engineering Vol. 4 No. 2 (2022)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.509 KB) | DOI: 10.62527/ijasce.4.2.87

Abstract

There is a segment of society, which does not have access to today's sophisticated acoustics, but gesture-based sign language, such as using the hands or the shoulders of the eyes, can be a vital tool for making sure their audio is audible. The most widely used sign language in the world, known as ALC—American Linguistic Communication—varies slightly depending on the nation. Deaf and mute people can communicate effectively by using hand gestures to convey their message. The wearable good glove we developed for this study will translate ALC motions into the proper alphabets and words. It makes use of a glove with a number of flex sensors on the fingers' distal and proximal interphalangeal joints as well as the metacarpophalangeal joint to detect finger bending. The complete system is divided into three units: a wearable hand glove unit with a flexible device that records user-created ALC gestures, a processing unit in charge of taking sensor data, and a final unit that uses a machine classifier to identify the appropriate alphabet. In order to receive known alphabet data in text form through a wired channel via the mobile "Sign to Speech App," which presented that text data into this app, the smartphone unit is linked to the processing unit. Its user-friendly design, low cost, and availability on mobile platforms give it an edge over traditional gesture language techniques.
Kindergarten Registration Management System (KREMS) Ibrahim, Amirah; Mohamed, Hasiah
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 3 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.123 KB) | DOI: 10.62527/ijasce.1.3.22

Abstract

 Kindergarten Registration Management System (KReMS) is a systemthat has been developed for one of the kindergarten in Dungun. Thissystem is proposed to be developed in order to help the management ofthe kindergarten to manage the registration process. The user for thissystem can be divided into four which are parent, admin, staff andteacher. KReMS basically have eight modules which are studentregistration, fees payment, generating report, announcement to parent,updating vacancies in the kindergarten, upload receipt and importantdocuments, update status, and record parent, staff and studentinformation. The methodology used to develop KReMS is RapidApplication Development (RAD). KReMS is evaluated by experts andusers. The evaluation of KReMS is done with four experts based on fivecriteria which are flow of the system, interface, efficiency, ease of use,and user experience. From this evaluation, the result shows that most ofthe experts agree that KReMS the interface of KReMS is attractive.Apart from that, user’s evaluation that involved 30 respondents has beenconducted. Questionnaire is distributed to the respondents and therespondents evaluated the system based on six constructs which areinterface, usability, efficiency, satisfaction, ease of use and userexperience. Result shows that most of the respondents agreed that thesystem will be able to improve the efficiency of their works with thehighest mean which is 4.36 (SD= 0.62). As for the future enhancement,one of features that can be added is ability of the system to recordstudent attendance
Multi-SAP Adversarial Defense for Deep Neural Networks Sharma, Shorya
International Journal of Advanced Science Computing and Engineering Vol. 4 No. 1 (2022)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (500.333 KB) | DOI: 10.62527/ijasce.4.1.76

Abstract

Deep learning models have gained immense popularity for machine learning tasks such as image classification and natural language processing due to their high expressibility. However, they are vulnerable to adversarial samples - perturbed samples that are imperceptible to a human, but can cause the deep learning model to give incorrect predictions with a high confidence. This limitation has been a major deterrent in the deployment of deep learning algorithms in production, specifically in security critical systems. In this project, we followed a game theoretic approach to implement a novel defense strategy, that combines multiple Stochastic Activation Pruning with adversarial training. Our defense accuracy outperforms that of PGD adversarial training, which is known to be the one of the best defenses against several L∞ attacks, by about 6-7%. We are hopeful that our defense strategy can withstand strong attacks leading to more robust deep neural network models.Deep learning models have gained immense popularity for machine learning tasks such as image classification and natural language processing due to their high expressibility. However, they are vulnerable to adversarial samples - perturbed samples that are imperceptible to a human, but can cause the deep learning model to give incorrect predictions with a high confidence. This limitation has been a major deterrent in the deployment of deep learning algorithms in production, specifically in security critical systems. In this project, we followed a game theoretic approach to implement a novel defense strategy, that combines multiple Stochastic Activation Pruning with adversarial training. Our defense accuracy outperforms that of PGD adversarial training, which is known to be the one of the best defenses against several L∞ attacks, by about 6-7%. We are hopeful that our defense strategy can withstand strong attacks leading to more robust deep neural network models.
A Study Of Internet Protocol Digital Microwave Radio (IP DMR) Propagation Delay Affected Downtime In Oil And Gas Company Samsudin, Nooraida; Ahmad, Azham
International Journal of Advanced Science Computing and Engineering Vol. 1 No. 3 (2019)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (345.476 KB) | DOI: 10.62527/ijasce.1.3.19

Abstract

 Internet Protocol Digital Microwave Radio (IP DMR) is a significantimpact on the trunk mobile communication between platform. Thus, thegoal of downtime is a crucial problem especially in oil and gascompany. Based on the examines from the previous issues such asrelative costing based on previous hardware requirements and possibleimplementation, and upgrade that contribute to the long termcommunication flexibly on all radio in the platform system. This paperwill examine the downtime that affect the network by calculate thepropagation delay using SLA given and compare the SLA for DigitalMicrowave Radio (DMR) and Internet Protocol Digital MicrowaveRadio (IP DMR) that contribute to the process
Predicting Peer to Peer Lending Loan Risk Using Classification Approach Zulfikri, Fahmi; Tryanda, Dendy; Syarif, Allevia; Patria, Harry
International Journal of Advanced Science Computing and Engineering Vol. 3 No. 2 (2021)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (318.08 KB) | DOI: 10.62527/ijasce.3.2.57

Abstract

Technological innovations have affected all sectors of life, especially, the financial sector with the emergence of financial technology. One of them is marked by the emergence of Peer-to-Peer Lending ("P2P Lending). Credit Risk Management is essential to P2P Lending as it directly affects business results, therefore it is important for P2P Lending to predict borrowers with the highest probability to become good or bad loans based on their profile or characteristics. In the experiments, five classification algorithms are used, which are Gradient Boosted Trees, Naïve Bayes, Random Forest, Decision Tree and Logistic Regression. The result is two modelling performed well that is Random Forest with accuracy 93.38% and Decision Tree with 92.35%.
Performance Comparison of Apriori, ECLAT and FP-Growth Algorithm for No Biological Data Genes for Association Rule Learning Anuar, Anies Nurfazlin; Kasim, Shahreen; Hendrick, -
International Journal of Advanced Science Computing and Engineering Vol. 2 No. 3 (2020)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.2.3.103

Abstract

This project is carried out to study the performance comparison of Apriori Algorithm, ECLAT Algorithm and FP-Growth Algorithm for no biological data genes. There are many genes with no biological data, but for this project we have chosen 4 types of no biological data genes. No biological data genes are genes that have no specific data about themselves such as location, behaviour and function of the genes. Association Rule Learning is a technique implementing big data in finding frequent item-sets. Frequent item-sets are items that occur frequently in the database. The performance of these three algorithms is compared through time efficiency and the ability to process small and large datasets. After the comparison, we can conclude that FP-Growth algorithm is the fastest algorithm for small data-set and Apriori algorithm and ECLAT algorithm takes lesser time to generate the frequent item-sets compared to FP-Growth algorithm.
Carbon Emissions and Net Zero Under Carbon Capture, Usage and Storage (CCUS) Technology Babu, A Mahesh; Akhil, Barapati; Pochampally, Naveen Kumar
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 1 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.1.119

Abstract

The key change in the environment is the gases which emit into the atmosphere and majorly carbon emissions by urbanization with greatly reduced energy needs through efficiency gains such that the balance of energy needs can be supplied with renewable technologies. According to various estimates, carbon stock consumes 30 to 40% of all energy resources. As the result, it is possible to get carbon dioxide atmosphere emissions reduction due to energy consumption reduction. In this research, we had a sample of current generation low-energy consumption and carbon storage by different techniques and usage by renewable sources, progress towards CCUS Technology.The way the zero-energy co2 goal is defined affects the choices designers to make achieve for this goal and whether they can claim success. CCUS will also support the transition from Blue Hydrogen to Green Hydrogen by accelerating the demand growth and creating technologies and infrastructure for the production, storage and transportation of hydrogen. Conversion of co2 to usable chemicals and products will spur economic development and help achieve some of the SDGs like green aggregates, green ammonia and methanol and ultimately green energy. This study shows the design impacts of the definition used for CCUS and progressed goals towards CCUS goals.
Durability Performance Analysis of Mixture Asphalt Concrete - Base Course (AC-Base) Using Coal Fly Ash as A Filler Substitute Archenita, Dwina; Alkhairi, Wafiq; Rizki, Aditiya; -, Apwiddhal; -, Satwarnirat
International Journal of Advanced Science Computing and Engineering Vol. 5 No. 1 (2023)
Publisher : SOTVI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/ijasce.5.1.120

Abstract

Highways are land transportation infrastructure whose needs in Indonesia continue to increase, along with the increasing number of vehicle. The top Laston or base coarse (AC-Base) is a pavement foundation consisting of a mixture of asphalt aggregates with a certain ratio mixed and compacted in a hotmix. This coarse is at under binder coarse (AC-BC), not directly related to the weather, but it needs to have stability to withstand the traffic load spread through the vehicle wheels. Base coarse (AC-Base) serves to provide support the surface coarse, reduce strain and stress, spread and continue the load of road construction to the layer below (subgrade). Filler as one of the materials forming the AC-Base layer usually obtained from stone ash whose availability is increasingly difficult to feel in the field implementation. Therefore, a substitute material or substitute material is needed for the filler. One possible substitute material is fly ash. This research will analyze the performance of AC-Base coarse that make use of filler substitution material using fly ash with variation FA-0%, FA-5%, FA-7.5%, FA-10%, FA-12.5% and FA-15%. The samples made by Marshall Method will give the Optimum Asphalt Content (OAC) value on each mix variation. While the performance of this AC-Base mixture in increasing density, durability, and stability in the pavement mixture using the Marshall Immersion method (MI). The analysis result shows that the OAC value at 0% fly ash variation is 6,82%, at 5% fly ash variation is 6,87%, at 7.5% fly ash variation is 6,85%, at 10% fly ash variation is 6,84%, at 12.5% fly ash variation is 6,82%, and at 15% fly ash variation is 6.79%. While the performance of AC-Base mixture indicated by the MI value meets the specifications, and the MI value obtained tends to increase along with the increase in the percentage of fly ash. The mixture with 15% fly ash shows the better durability performance (99,75%) compared to other variations 0%, 5%, 7,5%, 10% and 12,5% (96,44%, 97,51%, 97,71%, 98,36% and 99,54%).

Page 8 of 15 | Total Record : 149