cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 89 Documents
An optimized encryption algorithm and F function with dynamic substitution for creating S-box and P-box entries for blowfish algorithm Rekha C; Krishnamurthy G. N.
Computer Science and Information Technologies Vol 2, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v2i1.p16-25

Abstract

In the field of cryptography, there has been a massive amount of enhancement in manipulating the plaintext which is unreadable, less prone to crackers and hackers, again manipulating this unreadable form to get back plaintext in some way. The Blowfish algorithm is a block cipher, has complex in structure in generating P-box and S-box entries using encryption algorithm. By simplifying the structure of encryption algorithm as well as F function with dynamic substitution, this can improve the performance by generating P-box and S-box entries of blowfish algorithm. In this paper, the proposed method simplifies the structure to produce P-box and S-box entries in order to reduce computational cost and demonstrates the performance of blowfish. The approach considers different security aspects namely EQ analysis, KS analysis, AV analysis, Entropy, Floating Frequency analysis and correlation of horizontally adjacent pixels in an encrypted image.
Email phishing: Text classification using natural language processing Priyanka Verma; Anjali Goyal; Yogita Gigras
Computer Science and Information Technologies Vol 1, No 1: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i1.p1-12

Abstract

Phishing is networked theft in which the main motive of phishers is to steal any person’s private information, its financial details like account number, credit card details, login information, payment mode information by creating and developing a fake page or a fake web site, which look completely authentic and genuine. Nowadays email phishing has become a big threat to all, and is increasing day by day. Moreover detection of phishing emails have been considered an important research issue as phishing emails have been increasing day by day. Various techniques have been introduced and applied to deal with such a big issue. The major objective of this research paper is giving a detailed description on the classification of phishing emails using the natural language processing concepts. Natural language processing (NLP) concepts have been applied for the classification of emails, along with that accuracy rate of various classifiers have been calculated. The paper is presented in four sections. An introduction about phishing its types, its history, statistics, life cycle, motivation for phishers and working of email phishing have been discussed in the first section. The second section covers various technologies of phishing- email phishing and also description of evaluation metrics. An overview of the various proposed solutions and work done by researchers in this field in form of literature review has been presented in the third section. The solution approach and the obtained results have been defined in the fourth section giving a detailed description about NLP concepts and working procedure.
Insult detection using a partitional CNN-LSTM model Mohamed Maher Ben Ismail
Computer Science and Information Technologies Vol 1, No 2: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i2.p84-92

Abstract

Recently, deep learning has been coupled with notice-able advances in Natural Language Processing related research. In this work, we propose a general framework to detect verbal offense in social networks comments. We introduce a partitional CNN-LSTM architecture in order to automatically recognize verbal offense patterns in social network comments. Specifically, we use a partitional CNN along with a LSTM model to map the social network comments into two predefined classes. In particular, rather than considering a whole document/comments as input as performed using typical CNN, we partition the comments into parts in order to capture and weight the locally relevant information in each partition. The resulting local information is then sequentially exploited across partitions using LSTM for verbal offense detection. The combination of the partitional CNN and LSTM yields the integration of the local within comments information and the long distance correlation across comments. The proposed approach was assessed using real dataset, and the obtained results proved that our solution outperforms existing relevant solutions.
High security mechanism: fragmentation and replication in the cloud with auto update in the system Shrutika Khobragade; Rohini Bhosale; Rahul Jiwane
Computer Science and Information Technologies Vol 1, No 2: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i2.p78-83

Abstract

Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fragment or any file is also done here. The concept of auto update of filles is done where a file or a fragment can be updated online. Instead of downloading the whole file, a fragment can be downloaded to update. More time is saved using this methodology.
Building a multilingual ontology for education domain using monto method Merlin Florrence
Computer Science and Information Technologies Vol 1, No 2: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i2.p47-53

Abstract

Ontologies are emerging technology in building knowledge based information retrieval systems. It is used to conceptualize the information in human understandable manner. Knowledge based information retrieval are widely used in the domain like education, artificial intelligence, healthcare and so on. It is important to provide multilingual information of those domains to facilitate multilanguage users. In this paper, we propose a multilingual ontology (MOnto) methodology to develop multilingual ontology applications for education domain. New algorithms are proposed for merging and mapping multilingual ontologies.
Hand gesture recognition using machine learning algorithms Abhishek B.; Kanya Krishi; Meghana M.; Mohammed Daaniyaal; Anupama H. S.
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p116-120

Abstract

Gesture recognition is an emerging topic in today’s technologies. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of Human-Computer Interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one of the essential techniques to build user-friendly interfaces. Usually gestures can be originated from any bodily motion or state, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page.
Traffic lane controller using RFID and IoT Veera Boopathy E
Computer Science and Information Technologies Vol 1, No 1: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i1.p13-16

Abstract

Traffic in urban areas is increasing day by day which leads to most critical issues of traffic management this paper proposes a smart and fully automatic traffic control system that will detect and control the congestion in real time, detect a stolen vehicle and also passes emergency vehicles smoothly with the use of passive RFID device. This effectively reduces travel delays and relieves congestion, it is necessary to control lane merge behaviours of freeway. Depending upon the count of vehicles green passage will be set dynamically and the proposed system provides special privileges for emergency vehicles like police vehicle, ambulance, VIP vehicles, etc.
Wheelchair and robotic arm controls using gyro sensor Asep Sholahuddin; Dessy Novita; Deni Setiana
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p121-125

Abstract

Someone who could only move his/her head and could not move his/her limbs needs a wheelchair and robotic arms which could be controlled by the head. Gyro sensor is a sensor that could be controlled according to the tilt in the x,y coordinates which then implemented to measure the tilt of the user’s head. This paper would explain the head detector application to control wheelchairs and robotic arms. They could be controlled using Arduino microcontroller which uses C programming language. Gyro sensor that is put on the head could control wheelchair to move left, right, forward and backward according to the tilt of the head. It is the same with controlling robotic arms. It could rotate left, right, and move up and down. The x and y coordinates are used to determine the tilt of the head for controlling the wheelchair as well as robotic arms’ movements. It is discovered that wheelchairs and robotic arms could be controlled by the head by the use of gyro sensor.
INTERNET OF THINGS: A CLOUD-MANET COMMUNICATION FRAMEWORK Alam, Tanweer
Computer Science and Information Technologies Vol 2, No 2: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i2.p%p

Abstract

The Internet of Things (IoT) devices is able to communicate with another IoT devices in heterogeneous environments. They are also able to create a network by their own using wireless capabilities without a centralized approach. This network is called wireless mobile ad hoc network (MANET).  The MANET facilitate IoT devices to communicate with each other in an infrastructure less network of the Internet of Things environment. The IoT devices can dynamically join, create connection and exchange information among them. The role of cloud in this framework is to store and process the data by IoT devices. The communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in a constant growth in the use and popularity of cloud. Our purpose of this study is to create a framework for providing the communication in an integrated framework of Cloud and MANET among IoT devices. Our main contribution links a new study that integrates cloud computing to the MANET and provides communication to the internet of things. This study can be used in the framework of the Internet of Things in future.
Performance evaluation of blockchains in the internet of things Tanweer Alam
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p93-97

Abstract

The idea of blockchains technology (BT) in the internet of things (IoT) is to allow the physical things to trust in the transactions held within the IoT network. The BT is a distributed, decentralized, publicly shared its digital ledger and secured technology to eternally record the transactions across the shared database. The BT in IoT can be called Trust Machine to eliminate the intermediates and enables the physical things to trust with each other. This research evaluates the performance of BT in IoT. The simulated results are tested and can be used in the sustainable development of the integration of BT and IoT.