cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota samarinda,
Kalimantan timur
INDONESIA
International Journal of Computing and Informatics (IJCANDI)
Published by Universitas Mulawarman
ISSN : 25022334     EISSN : -     DOI : -
IJCANDI (INTERNATIONAL JOURNAL OF COMPUTING AND INFORMATICS) ISSN: 2502-2334 is a peer reviewed open-access journal published four times a year (February, May, August, November) in English-language, provides scientists and engineers throughout the world for the exchange and dissemination of theoretical and practice-oriented papers dealing with advances in computing and informatics. All the papers are refereed by two international reviewers, accepted papers will be available on line (free access), and no publication fee for authors. IJCANDI is organized by Faculty of Computer Science and Information Technology, Computer Science and Information Technology Department - Universitas Mulawarman, Faculty of Computing and Informatics - Universiti Malaysia Sabah, and Faculty of Computer Science, Universitas Muslim Indonesia.
Arjuna Subject : -
Articles 17 Documents
Backpropagation and Genetic Algorithm in Network Traffic Activities Forecasting Purnawansyah Purnawansyah
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 1 (2017): February 2017
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

This paper presents techniques based on the development of backpropagation (BP) and genetic algorithm models for calculating and analyzing the daily network traffic activities at Universitas Mulawarman, East Kalimantan, Indonesia. The experiment results indicate that a strong agreement between model predictions and observed values, since MAPE is below 5%. Thus, the use of network traffic is becoming a more effective, efficient and optimal. Model optimization is one of future works.
Mobile Packet Internet Groper (Moping) Application and Database Connection for Testing the QoS of Internet Services Edy Budiman; Ummul Hairah
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

Optimizing the Quality of Experience (QoE) of mobile applications over cellular networks requires detailed knowledge of the underlying network and it is performance. Parameters of interest are, besides the signal strength and availability of technologies, the Round-trip Time (RTT) and available throughput of individual cells at a given location. This information is generally not readily available. Therefore, an Android application measuring the cellular network performance was developed. This demonstration shows the Mobile Ping (Moping) Network App, being implemented to provide visual feedback of the measured network quality to the users. The Mobile Packet Internet Groper (Moping) enables mobile application developers to characterize the data delivery performance of cellular data networks as delivered to mobile devices. Mobile application developers need to know a range of network performance characteristics, including latency, jitter, throughput, and network timeout delays. Of particular importance is how these values vary in different network provider, network technology, and mobile device combinations. To enable data collection from users across the range of technologies available, the application of Moping offers a lightweight measurement architecture that can be deployed on a wide range of Android-enabled mobile devices. The essential effect of mobile systems is that link quality becomes extremely variable, often in a random manner, although some parts of this effect can be predicted, or statistically modelled. The main QoS parameters – reliability of connection, bandwidth, latency and jitter are all affected by mobility, both during and between connections.
Comparative Analysis of Tsukamoto and Sugeno Fuzzy Methods For Procurement Optimization Fahrul Agus; Hairunnisa Hairunnisa; Septya Maharani
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 4 (2016): November 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

This paper aims to conduct a comparative analysis of appropriate methods between Tsukamoto and Sugeno fuzzy method in solving optimization problems approximate amount of procurement. The analysis is done by comparing the average value of the relative error in the calculation results forecasts procurement of data procurement of goods belonging to a company. The results of the analysis is implemented in an application program and obtained value of the average relative error Tsukamoto method by 39.67% and amounted to 50.39 % of Sugeno method. Based on these results, Tsukamoto method is more appropriate and recommended to solve optimization of the approximate number of procurement.
Company Divestment: Applicability of Existing IT Governance Frameworks Annamaré Wolmarans; Neels Kruger; Neil Croft
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 2 (2016): May 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (671.228 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

The successful accomplishment of a divestiture is generally calculated by the dimension of accomplishment in realizing the elemental strategic goal that the company set out to achieve when adopting a divestment strategy. The paper will highlight the substantial role that IT has to fulfil in bringing company divestment to completion by investigating if any one of the existing IT Governance frameworks and standards could be implemented or adopted to serve as a managerial and governance framework towards company divestment. The IT department has a fundamental function to fulfill in the disentanglement of systems and IT infrastructure. In order to achieve this goal it is imperative to have a well-defined IT governance framework to guide the disentanglement processes and ensure the smooth execution of the IT divestment process.
Secure Data Transfer on Color Flower Image Using AES, GA and LSB Ekta Chauhan
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 4 (2016): November 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

a new technique is going to be introducing for data transmission over internet. This research presented image steganography on color flower image using genetic algorithm (GA) and AES with LSB technique. In this paper secret data is encrypted and decrypted by AES is performed to high security. Then improved covert message is identified by GA. This proposed method is executed and key strength of this project is its huge data hiding capability and least distortion in Stego image. This technique is functional over various images and the outcomes show least distortion in altered image. PSNR and entropy help for experimental study.
Prediction of Regional Economic Growth in East Kalimantan using Genetic Algorithm Emmilya Umma Aziza Gaffar
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 2 (2016): May 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (928.407 KB) | DOI: 10.19732/10.19732/vol1122016

Abstract

This paper outlines and presents the development of genetic algorithms (GA) that are used for analyzing and predicting Regional Economic Growth (REG) with an agriculture share (SA) and an industry share (SI) as independent variables covers 13 districts/cities in East Kalimantan Province of 2002-2012 datasets. The genetic algorithm (GA) was used for modeling of REG datasets. The results of experiment shows that GA was produced prediction value of 92.389. This results indicate that the average price fluctuation is decreased in 2012. Meanwhile, the southern region is significantly increased in 2013. The results indicated that GA was good algorithm for prediction of REG. This paper is concluded by recommending some future works that can be applied in order to improve the prediction accuracy.
Perfection of Intrusion Detection Using Correlation, Genetic Algorithm, Radial Basis Function S Selvakani; R.S Rajesh
International Journal of Computing and Informatics (IJCANDI) Vol 1, No 3 (2016): August 2016
Publisher : International Journal of Computing and Informatics (IJCANDI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19732/10.19732/vol1122016

Abstract

The tech-savvy generation of today uses network, which has become embedded in everyone’s routine and is inseparable from our life. Hence securing your network from various network attacks becomes paramount for us to keep our sensitive data online safe. One of the most noticeable threats to the security of networks is intruder. Due to the number of challenges faced by the Intrusion Detection System, it is a priority to detect malicious activities in a network and have an enhanced performance to cope with the increasing network traffic. The results of our experiment throw a light of our IDS ability to improve the attack detection rate and decreasing the FAR. This Intrusion detection system can do with a low FAR and the low FAR important for its functioning. The time required to train to test the model is significantly reduced by feature selection and implementing the layered approach with the help of GA and RBF. We address two concepts in this paper, first deals with features reduction based on correlation and secondly genetic algorithm rules formation with RBF training. The overall accuracy and efficiency of the system is improved by integrating them.

Page 2 of 2 | Total Record : 17