cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Engineering and Applications Journal (ComEngApp)
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 12 Documents
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android Huda Ubaya
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by non-physical payments are often called electronic money (e-money). An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today is Android that support NFC technology is version 2.3.3 Gingerbread. The prototype application is designed to pay for 2 on the user side of the user as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. Pay an application prototype also implements the concept of security in e-commerce transactions by using the protocol-to-Tag Tag so that the user needs for security and comfort during the financial transaction are met.
Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems Nasir Salh Almisbah; Elessaid S Saad
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is an emerging multi-carrier modulation scheme, which has been adopted for several wireless standards such as IEEE 802.11a and HiperLAN2. In OFDM systems, the performance is very sensitive to subcarrier frequency errors (offset). This paper shows the analysis and derivations of intercarrier interference (ICI) complex gain that used in self-cancellation scheme and its dependence on subcarrier frequency offset. Simulation shows that better improvement in performance is achieved for systems that use this cancellation scheme. Moreover, analysis and simulation show that theoretical carrier-to-interference ratio (CIR) for OFDM with cancellation scheme is greater than conventional one by more than 14dB.
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance Ahmad Sanmorino
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Batik is a fabric or clothes that are made ​​with a special staining technique called wax-resist dyeing and is one of the cultural heritage which has high artistic value. In order to improve the efficiency and give better semantic to the image, some researchers apply clustering algorithm for managing images before they can be retrieved. Image clustering is a process of grouping images based on their similarity. In this paper we attempt to provide an alternative method of grouping batik image using fuzzy c-means (FCM) algorithm based on log-average luminance of the batik. FCM clustering algorithm is an algorithm that works using fuzzy models that allow all data from all cluster members are formed with different degrees of membership between 0 and 1. Log-average luminance (LAL) is the average value of the lighting in an image. We can compare different image lighting from one image to another using LAL. From the experiments that have been made, it can be concluded that fuzzy c-means algorithm can be used for batik image clustering based on log-average luminance of each image possessed.
Techniques for Component-Based Software Architecture Optimization Adil Ali Abdelaziz; Wan Nasir
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Although Component-Based System (CBS) increases the efficiency of development and reduces the need for maintenance, but even good quality components could fail to compose good product if the composition is not managed appropriately. In real world, such as industrial automation domain, this probability is unacceptable because additional measures, time, efforts, and costs are required to minimize its impacts. Many general optimization approaches have been proposed in literature to manage the composition of system at early stage of development. This paper investigates recent approach es used to optimize software architecture. The results of this study are important since it will be used to develop an efficient optimization framework to optimize software architecture in next step of our ongoing research.
Survey of Text Plagiarism Detection Ahmed Hamza Osman; Naomie Salim; Albaraa Abuobieda
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper we are going to review and list the advantages and limitations of the significant effective techniques employed or developed in text plagiarism detection.  It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text. This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.
Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile   ad   hoc   networks   (MANETs)   are   multi-hop   wireless   networks   ofautonomous  mobile  nodes  without  any  fixed  infrastructure.  In  MANETs,  it  isdifficult to detect malicious nodes because the network topology constantly changesdue  to  node  mobility.  Intrusion  detection  is  the  means  to  identify  the  intrusivebehaviors and provide useful information to intruded systems to respond fast and toavoid  or  reduce  damages.  The  anomaly  detection  algorithms  have  the  advantagebecause  they  can  detect  new  types  of  attacks  (zero-day  attacks).In  this  paper,  wepresent  a  Intrusion  Detection  System  clustering-based  (ID-Cluster)  that  fits  therequirement of MANET. This dissertation addresses both routing layer misbehaviorsissues,  with  main  focuses  on  thwarting  routing  disruption  attack  Dynamic  SourceRouting  (DSR).  To  validate  the  research,  a  case  study  is  presented  using  thesimulation with GloMoSum at different mobility levels. Simulation results show thatour  proposed  system  can  achieve  desirable  performance  and  meet  the  securityrequirement of MANET.
A Survey of Hand Gesture Dialogue Modeling For Map Navigation Yee Yong Pang; Nor Azman Ismail
Computer Engineering and Applications Journal (ComEngApp) December 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Human trends to use hand gesture in communication. The development of ubiquitous computer causes the possibility of human to interact with computer natural and intuitive.  In human-computer interaction, emerge of hand gesture interaction fusion with other input modality greatly increase the effectiveness in multimodal interaction performance. It is necessary to design a hand gesture dialogue based on the different situation because human have different behavior depend on the environment. In this paper, a brief description of hand gesture and related study is presented. The aim of this paper is to design an intuitive hand gesture dialogue for map navigation. Some discussion also included at the end of this paper.
Using Power-Law Degree Distribution to Accelerate PageRank Zhaoyan Jin; Quanyuan Wu
Computer Engineering and Applications Journal (ComEngApp) December 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The PageRank vector of a network is very important, for it can reflect the importance of a Web page in the World Wide Web, or of a people in a social network. However, with the growth of the World Wide Web and social networks, it needs more and more time to compute the PageRank vector of a network. In many real-world applications, the degree and PageRank distributions of these complex networks conform to the Power-Law distribution. This paper utilizes the degree distribution of a network to initialize its PageRank vector, and presents a Power-Law degree distribution accelerating algorithm of PageRank computation. Experiments on four real-world datasets show that the proposed algorithm converges more quickly than the original PageRank algorithm.
Monitoring and Resource Management in P2P Grid-Based Web Services Djafri Laouni; Mekki Rachida
Computer Engineering and Applications Journal (ComEngApp) December 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Grid computing has recently emerged as a response to the growing demand for resources (processing power, storage, etc.) exhibited by scientific applications. However, as grid sizes increase, the need for self-organization and dynamic reconfigurations is becoming more and more important. Since such properties are exhibited by P2P systems, the convergence of grid computing and P2P computing seems natural. However, using P2P systems (usually running on the Internet) on a grid infrastructure (generally available as a federation of SAN-based clusters interconnected by high-bandwidth WANs) may raise the issue of the adequacy of the P2P communication mechanisms. Among the interesting properties of P2P systems is the  volatility of  peers  which  causes  the  need  for  integration  of  a  service fault tolerance. And service Load balancing,   As a solution, we proposed a mechanism of fault tolerance and model of Load balancing  adapted to a grid P2P model, named SGRTE (Monitoring and Resource Management, Fault Tolerances and Load Balancing).
Lightweight Solar Vehicle Impact Analysis Using ABAQUS/EXPLICIT Rossi Passarella; Zahari Taha
Computer Engineering and Applications Journal (ComEngApp) December 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This paper described the Abaqus/Explicit 6.7 simulation work performed to study the frontal crash impact condition for an in-house designed and produced lightweight solar vehicle main structural body. The structural body was fabricated from aluminum hollow pipes welded together. The analysis is needed to safeguard the safety of the vehicle driver. The dynamic response of the vehicle structure when subjected to frontal impact condition was simulated, according to NASA best practice for crash test methodology. The simulated speed used was based on the NHTSA standard. Comparison of the analysis with the standard Head Injury Criteria (HIC) and Chest Injury Criteria (CIC) revealed that the driver of the designed vehicle would not be risk because the acceleration resultant was found to be lower than 20 G.  The analysis also proved that structural component was able to protect the driver during any frontal collision incident. However, to ensure the safety of the driver, safety precautions such as the use of seatbelt and helmet as well as driving below the speed limit are recommended.

Page 1 of 2 | Total Record : 12


Filter by Year

2012 2012