APTIKOM Journal on Computer Science and Information Technologies
Latest Publications


TOTAL DOCUMENTS

131
(FIVE YEARS 75)

H-INDEX

2
(FIVE YEARS 1)

Published By Institute Of Advanced Engineering And Science

2528-2425, 2528-2417

Author(s):  
Muhammad Hendri ◽  
Sri Lindawati ◽  
Muhammad Ikhsan

Practicum is a learning experience in which students interact with the material or with secondary data sources to observe and understand the natural world. At this time practicum activities carried out in the laboratory using laboratory tools. The simulation program is an application program designed to simulate an event in accordance with the actual incident, using a simulation program practicum activity can be done outside of the laboratory in order to save space and cost, the most important thing is that students can perform repetitive activities again.


Author(s):  
Eko Hariyanto Hariyanto ◽  
Muhammad Zarlis ◽  
Darmeli Nasution Nasution ◽  
Sri Wahyuni

 Security of RSA cryptography lied in the difficulty of factoring the number p and q bacame the prime factor. The greater the value of p and q used, the better the security level was. However, this could result in a very slow decryption process. The most commonly used and discussed method of speeding up the encryption and decryption process in RSA was the Chinese Remainder Theorem (CRT). Beside that method, there was another method with the same concept with CRT namely Aryabhata Remainder Theorem which was also relevant used in public key cryptography such as RSA. The purpose of this study was to obtain an effective method to RSA especially in the decryption process based on the calculation of the time complexity of computing.


Author(s):  
T. Nagarjuna ◽  
K. Nehru ◽  
G. Nagendra Prasad ◽  
Hema Chowdary

We proposed to use singular wavelet transform (SWT) in OFDM based LTE because the SWT based system does not require a cyclic prefix, so spectrum efficiency is increased. SWT is used to analyze signals by the coefficients of SWT in both time and frequency domain. In order to investigate the bit error rate performance a practical channel model is required.  Many channel models are proposed to mimic a real world scenario. Out of which Stanford university interim (SUI) channel provides best results so we replaced AWGN channel with SUI channel. We investigated the performance of bit error rates of SWT based OFDM in LTE for different modulation techniques such as QPSK, 64 QAM, 128 QAM under SUI 3 Channel model using SWT based haar and db2 transform. BER is reduced by 2 times when compared to the existing system.


Author(s):  
Ravinder Paspula ◽  
K. Chiranjeevi ◽  
S. Laxman Kumar

A new-promising technology called DNA-Cryptography is emerged in the area of DNA- Computing field.DNA useful for store, sending the data and also to perform computation. Even it is under primal level, DNA-Based molecular Cryptography system is shows extremely efficient. This technique offers a unique cipher-text generation process and a new key generation practice. This method used to implement a procedure which includes two stages. First stage generates a session key and encryption key and it uses cipher block chaining mode-CBC, the secrete number(s) and incorporate plain-text M into level-1 cipher-text. The last stage converts the level-1 cipher-text into level-2 cipher-text (s). The level-2 cipher-text is again transformed into human made DNA-sequence (S’) and is given to the receiver along with many other DNA-sequence. By this process it will become a more complicated for un-authorized user to gain original information. The receiver will apply the process to identify the human made DNA sequence with M hidden in it and extract the original message M.


Author(s):  
P. Pallavi ◽  
Shaik Salam

Water is an important, but often ignored element in sustainable development by now it has been clear that urgent action is needed to avoid global water crisis. Water resource management is the activity of planning, developing, distributing and managing the optimum use of water resources. Successful management of water resources requires accurate knowledge of their resource distribution to meet up the competing demands and mechanisms to make good decisions using advanced recent technologies.Towards evolving comprehensive management plan in suitable conservation and utilization of water resources space technology plays a crucial role in managing country’s available water resources. Systematic approaches involving judicious combination of conventional server side scripting programming and remote sensing techniques pave way for achieving optimum planning and operational of water resources projects.   new methodologies and 24/7 accessible system need to be built, these by reducing the dependency on complex infrastructure an specialist domain Open source web GIS systems have proven their rich in application of server side scripting and easy to use client application tools. Present study and implementation aims to provide wizard based or easily driven tools online for command area management practices. In this large endeavour modules for handling remote sensing data, online raster processing, statistics and indices generation will be developed.


Author(s):  
Hari Jyothula ◽  
S. Koteswara Rao ◽  
V. Valli Kumari

image is a two dimensional capacity f(x, y). The way toward dividing an image into numerous parts or questions is named as Segmentation. There are two noteworthy deterrents in sectioning an image i.e., Intensity Inhomogeneity and Noise. As a result of these challenges, precise division comes about can't be acquired. This paper presents Local Chan-Vese (LCV) alongside some enhancement methods for minimization of vitality capacities to defeat power inhomogeneity and commotion. By consolidating this implanted approach, the images with force inhomogeneity can be effectively divided.


Author(s):  
Shrutika Khobragade ◽  
Rohini Bhosale ◽  
Rahul Jiwahe

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.


Author(s):  
Sunda Ariana ◽  
Hadi Syahputra ◽  
Tri Basuki Kurniawan

Scientific writings in Indonesian language  must the rules of the General Guide to the Reformed Indonesian Spelling especially in terms of word spacing. good word spacing is proportional to the width of the typeface. generally use the align right facility in order to have article look neat in typing, but causes space from word to word over space. Additionally, according to the General Guide book for the updated Indonesian spelling, there are rules that use the distance of words with punctuation after and before punctuation. This research is intended to make for detecting applications using word spacing of the Regular Expression String algorithm and to comment on articles based on principles that are in accordance with the General Guidelines for Indonesian Reformed Spelling.


Author(s):  
Maurizio Nolé ◽  
Carlo Sartiani

 In the recent years many real-world applications have been modeled by graph structures (e.g., social networks, mobile phone networks, web graphs, etc.), and many systems have been developed to manage, query, and analyze these datasets. These systems could be divided into specialized graph database systems and large-scale graph analytics systems. The first ones consider end-to-end data management issues including storage representations, transactions, and query languages, whereas the second ones focus on processing specific tasks over large data graphs. In this paper we provide an overview of several  graph database systems and graph processing systems, with the aim of assisting the reader in identifying the best-suited solution for her application scenario.


Author(s):  
Harya Gusdevi ◽  
Ade Setya ◽  
Puji Handini Zulaeha

The conversion of kerosene use in household to gas, in addition to the decision of the Republic of Indonesia minister in relation to the movement of kerosene to gas, gas also given an affordable price, how to use it more effectively. But the public is also expected to be careful about how to use it, be-cause the gas is explosive and leaking causing unpleasant odor (gas leak) even a more dangerous side effect is the explosion of gas cylinders. To evercome these problems then need a tool that can detect gas leakage, in order to prevent gas leakage early. Therefore the authors designed a device that can detect gas leakage by using Sensor Mq-2 and will issue sound gas alarm warning leak by Modul ISD 1760, and will stop the gas flow from the tube to the stove using a Solenoid Valve. There is also a Flame Sensor’s hardware to detect a fire if there is a spark emerging and spraying water into spots that are likely to spark fire. All hardware will be in if using ATMega 328microcontroller.Monitoring can use android smartphone, with the application that can send a warning to the mobile phone 


Sign in / Sign up

Export Citation Format

Share Document