cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Engineering and Applications Journal (ComEngApp)
ISSN : -     EISSN : -     DOI : -
Core Subject :
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "June 2012" : 6 Documents clear
Design of Prototype Payment Application System With Near Field Communication (NFC) Technology based on Android Huda Ubaya
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the late 1990s, people have enjoyed a comfortable lifestyle. Mobile devices supported by the development of wireless networks have spread throughout the world. People can get information, order tickets, download songs and perform commercial transactions, called mobile commerce. Mobile commerce applications become the most popular application for mobile device users who want to do business and financial transactions easily and securely, anytime and anywhere they are. Today the use of physical cash is experiencing a decline in popularity in the business world, because it is being replaced by non-physical payments are often called electronic money (e-money). An important technology behind mobile payments is called Near Field Communication (NFC). As an indication that the NFC has tremendous business potential, leading companies like Nokia, Microsoft, Visa Inc., and MasterCard Worldwide and NXP Semiconductors, is actively engaged on them. Payment processing integrated with NFC technology based mobile operating system that is a trend today is Android that support NFC technology is version 2.3.3 Gingerbread. The prototype application is designed to pay for 2 on the user side of the user as consumer and the merchant side as a trader or seller by using the handset that already have NFC technology is Google Samsung Nexus S. Pay an application prototype also implements the concept of security in e-commerce transactions by using the protocol-to-Tag Tag so that the user needs for security and comfort during the financial transaction are met.
Analysis of Intercarrier Interference Cancellation Scheme in OFDM Systems Nasir Salh Almisbah; Elessaid S Saad
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is an emerging multi-carrier modulation scheme, which has been adopted for several wireless standards such as IEEE 802.11a and HiperLAN2. In OFDM systems, the performance is very sensitive to subcarrier frequency errors (offset). This paper shows the analysis and derivations of intercarrier interference (ICI) complex gain that used in self-cancellation scheme and its dependence on subcarrier frequency offset. Simulation shows that better improvement in performance is achieved for systems that use this cancellation scheme. Moreover, analysis and simulation show that theoretical carrier-to-interference ratio (CIR) for OFDM with cancellation scheme is greater than conventional one by more than 14dB.
Clustering Batik Images using Fuzzy C-Means Algorithm Based on Log-Average Luminance Ahmad Sanmorino
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Batik is a fabric or clothes that are made ​​with a special staining technique called wax-resist dyeing and is one of the cultural heritage which has high artistic value. In order to improve the efficiency and give better semantic to the image, some researchers apply clustering algorithm for managing images before they can be retrieved. Image clustering is a process of grouping images based on their similarity. In this paper we attempt to provide an alternative method of grouping batik image using fuzzy c-means (FCM) algorithm based on log-average luminance of the batik. FCM clustering algorithm is an algorithm that works using fuzzy models that allow all data from all cluster members are formed with different degrees of membership between 0 and 1. Log-average luminance (LAL) is the average value of the lighting in an image. We can compare different image lighting from one image to another using LAL. From the experiments that have been made, it can be concluded that fuzzy c-means algorithm can be used for batik image clustering based on log-average luminance of each image possessed.
Techniques for Component-Based Software Architecture Optimization Adil Ali Abdelaziz; Wan Nasir
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Although Component-Based System (CBS) increases the efficiency of development and reduces the need for maintenance, but even good quality components could fail to compose good product if the composition is not managed appropriately. In real world, such as industrial automation domain, this probability is unacceptable because additional measures, time, efforts, and costs are required to minimize its impacts. Many general optimization approaches have been proposed in literature to manage the composition of system at early stage of development. This paper investigates recent approach es used to optimize software architecture. The results of this study are important since it will be used to develop an efficient optimization framework to optimize software architecture in next step of our ongoing research.
Survey of Text Plagiarism Detection Ahmed Hamza Osman; Naomie Salim; Albaraa Abuobieda
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this paper we are going to review and list the advantages and limitations of the significant effective techniques employed or developed in text plagiarism detection.  It was found that many of the proposed methods for plagiarism detection have a weakness and lacking for detecting some types of plagiarized text. This paper discussed several important issues in plagiarism detection such as; plagiarism detection Tasks, plagiarism detection process and some of the current plagiarism detection techniques.
Anomaly detection using clustering for ad hoc networks -behavioral approach- Belacel Madani; B. Messabih
Computer Engineering and Applications Journal (ComEngApp) June 2012
Publisher : Computer Engineering and Applications Journal (ComEngApp)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Mobile   ad   hoc   networks   (MANETs)   are   multi-hop   wireless   networks   ofautonomous  mobile  nodes  without  any  fixed  infrastructure.  In  MANETs,  it  isdifficult to detect malicious nodes because the network topology constantly changesdue  to  node  mobility.  Intrusion  detection  is  the  means  to  identify  the  intrusivebehaviors and provide useful information to intruded systems to respond fast and toavoid  or  reduce  damages.  The  anomaly  detection  algorithms  have  the  advantagebecause  they  can  detect  new  types  of  attacks  (zero-day  attacks).In  this  paper,  wepresent  a  Intrusion  Detection  System  clustering-based  (ID-Cluster)  that  fits  therequirement of MANET. This dissertation addresses both routing layer misbehaviorsissues,  with  main  focuses  on  thwarting  routing  disruption  attack  Dynamic  SourceRouting  (DSR).  To  validate  the  research,  a  case  study  is  presented  using  thesimulation with GloMoSum at different mobility levels. Simulation results show thatour  proposed  system  can  achieve  desirable  performance  and  meet  the  securityrequirement of MANET.

Page 1 of 1 | Total Record : 6


Filter by Year

2012 2012