cover
Contact Name
Tole Sutikno
Contact Email
-
Phone
-
Journal Mail Official
ij.aptikom@gmail.com
Editorial Address
9th Floor, 4th UAD Campus Lembaga Penerbitan dan Publikasi Ilmiah (LPPI) Universitas Ahmad Dahlan
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Computer Science and Information Technologies
ISSN : 2722323X     EISSN : 27223221     DOI : -
Computer Science and Information Technologies ISSN 2722-323X, e-ISSN 2722-3221 is an open access, peer-reviewed international journal that publish original research article, review papers, short communications that will have an immediate impact on the ongoing research in all areas of Computer Science/Informatics, Electronics, Communication and Information Technologies. Papers for publication in the journal are selected through rigorous peer review, to ensure originality, timeliness, relevance, and readability. The journal is published four-monthly (March, July and November).
Articles 89 Documents
Modification data attack inside computer systems: a critical review Vahid Kaviani J; Parvin Ahmadi Doval Amiri; Farsad Zamani Brujeni; Nima Akhlaghi
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p98-105

Abstract

This paper is a review of types of modification data attack based on computer systems and it explores the vulnerabilities and mitigations. Altering information is a kind of cyber-attack during which intruders interfere, catch, alter, take or erase critical data on the PCs and applications through using network exploit or by running malicious executable codes on victim's system. One of the most difficult and trendy areas in information security is to protect the sensitive information and secure devices from any kind of threats. Latest advancements in information technology in the field of information security reveal huge amount of budget funded for and spent on developing and addressing security threats to mitigate them. This helps in a variety of settings such as military, business, science, and entertainment. Considering all concerns, the security issues almost always come at first as the most critical concerns in the modern time. As a matter of fact, there is no ultimate security solution; although recent developments in security analysis are finding daily vulnerabilities, there are many motivations to spend billions of dollars to ensure there are vulnerabilities waiting for any kind of breach or exploit to penetrate into the systems and networks and achieve particular interests. In terms of modifying data and information, from old-fashioned attacks to recent cyber ones, all of the attacks are using the same signature: either controlling data streams to easily breach system protections or using non-control-data attack approaches. Both methods can damage applications which work on decision-making data, user input data, configuration data, or user identity data to a large extent. In this review paper, we have tried to express trends of vulnerabilities in the network protocols’ applications.
Smart home automation towards the development of smart cities Tanweer Alam; Abdulrahman A. Salem; Ahmad O. Alsharif; Abdulaziz M. Alhejaili
Computer Science and Information Technologies Vol 1, No 1: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i1.p17-25

Abstract

Home automation system is a system that controls by the smart device using a mobile application. It can control home appliances such as light, fans, air conditions, and smart security locks, etc. Bluetooth or Wi-Fi technology will be used to control things remotely.  Many people were thinking about that technology is taking a really huge part of our lives. It does! we’re living in a modern generation where smart and intelligent systems are necessary to be there wherever we are to make our lives easier and much better, for example, we can do many things faster, better, and more accurate.
Model of emergence evacuation route planning with contra flow and zone scheduling in disaster evacuation Dedy Hartama; Herman Mawengkang; Muhammad Zarlis; Rahmad Widia Sembiring
Computer Science and Information Technologies Vol 2, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v2i1.p1-10

Abstract

Evacuation is characterized by rapid movement of people in unsafe locations or disaster sites to safer locations. The traffic management strategy for commonly used evacuations is the use of Shoulder-Lane, contra-flowing traffic and gradual evacuation. Contra-flow has been commonly used in traffic management by changing traffic lanes during peak hours. To implement the contra-flow operation, there are two main problems that must be decided, namely Optimal contra-flow lane configuration problem (OCLCP) and optimal contra-flow scheduling. Within the OCSP there are two approaches that can be used: zone scheduling and flow scheduling. Problem of contra-flow and zone scheduling problem is basically an Emergence evacuation route planning (EERP) issue. This research will discuss EERP with contra-flow and zone scheduling which can guarantee the movement of people in disaster area to safe area in emergency situation.
Feature extraction and classification methods of facial expression: A survey Moe Moe Htay
Computer Science and Information Technologies Vol 2, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v2i1.p26-32

Abstract

Facial Expression is a significant role in affective computing and one of the non-verbal communication for human computer interaction. Automatic recognition of human affects has become more challenging and interesting problem in recent years. Facial expression is the significant features to recognize the human emotion in human daily life. Facial expression recognition system (FERS) can be developed for the application of human affect analysis, health care assessment, distance learning, driver fatigue detection and human computer interaction. Basically, there are three main components to recognize the human facial expression. They are face or face’s components detection, feature extraction of face image, classification of expression. The study proposed the methods of feature extraction and classification for FER.
An optimized rubber sheet model for normalization phase of IRIS recognition Selvamuthukumaran S.; Ramkumar T.; Shantharajah Shantharajah
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p126-134

Abstract

Iris recognition is a promising biometric authentication approach and it is a very active topic in both research and realistic applications because the pattern of the human iris differs from person to person, even between twins. In this paper, an optimized iris normalization method for the conversion of segmented image into normalized form has been proposed. The existing methods are converting the Cartesian coordinates of the segmented image into polar coordinates. To get more accuracy, the proposed method is using an optimized rubber sheet model which converts the polar coordinates into spherical coordinates followed by localized histogram equalization. The experimental result shows the proposed method scores an encouraging performance with respect to accuracy.
Extraction of series resistance and mobility degradation parameter in MOSFETs using iterative method Noureddine Maouhoub; Khalid Rais
Computer Science and Information Technologies Vol 1, No 1: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i1.p26-31

Abstract

Series resistance and mobility attenuation parameter are parasitic phenomena that limit the scaling of advanced MOSFETs. In this work, an iterative method is proposed to extract the series resistance and mobility degradation parameter in short channel MOSFETs. It also allows us to extract the surface roughness amplitude. The principle of this method is based on the exponential model of effective mobility and the least squares methods. From these, two analytical equations are obtained to determine the series resistance and the low field mobility as function of the mobility degradation. The mobility attenuation parameter is extracted using an iterative procedure to minimize the root means squared error (RMSE) value. The results obtained by this technique for a single short channel device have shown the good agreement with measurements data at strong inversion. 
On the performance of switching methods in space division multiplexing based optical networks Sridhar Iyer
Computer Science and Information Technologies Vol 1, No 2: July 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i2.p54-60

Abstract

In the current work, for space division multiplexing based optical networks (SDM-b-OTNs), we investigate the performance of various switching methods with a variation in traffic evolution over different time frame periods. Initially, comparison of the existing methods viz., independent switching (InSw), frequency switching (FqSw), and space switching (SpSw) demonstrates that (i) over longer periods of time frame, FqSw provisions low network usage, and (ii) SpSw offers low network usage for shorter periods of time frame; however, as time frame increases to longer periods, SpSw starts to outperform InSw. Next, we investigate a hybrid switching (HySw) method which begins by implementing InSw and then shifts to the use of SpSw after the activation of specific numbers of space channels. The simulation results demonstrate that HySw provisions substantial savings on the costs incurred for switching, and with lower space channel values it also offers a balance in the trade-off which occurs between the costs associated for activating the space channels and that incurred for switching.
Survey of wormhole attack in wireless sensor networks Umashankar Ghugar; Jayaram Pradhan
Computer Science and Information Technologies Vol 2, No 1: March 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v2i1.p33-42

Abstract

From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
Genome feature optimization and coronary artery disease prediction using cuckoo search E. Neelima; M.S. Prasad Babu
Computer Science and Information Technologies Vol 1, No 3: November 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i3.p106-115

Abstract

Cardiovascular diseases (CVD) is among the major health ailment issue leading to millions of deaths every year. In recent past, analyzing gene expression data, particularly using machine learning strategies to predict and classify the given unlabeled gene expression record is a generous research issue. Concerning this, a substantial requirement is feature optimization, which is since the overall genes observed in human body are closely 25000 and among them 636 are cardio vascular related genes. Hence, it complexes the process of training the machine learning models using these entire cardio vascular gene features. This manuscript uses bidirectional pooled variance strategy of ANOVA standard to select optimal features. Along the side to surpass the constraint observed in traditional classifiers, which is unstable accuracy at k-fold cross validation, this manuscript proposed a classification strategy that build upon the swarm intelligence technique called cuckoo search. The experimental study indicating that the number of optimal features those selected by proposed model is substantially low that compared to the other contemporary model that selects features using forward feature selection and classifies using SVM classifier (FFS and SVM). The experimental study evinced that the proposed model, which selects feature by bidirectional pooled variance estimation and classifies using proposed classification strategy that build on cuckoo search (BPVE and CS) outperformed the selected contemporary model (FFS and SVM).
Prototype of LPG gas leakage detector using flame sensor and MQ-2 sensor Harya Gusdevi; Ade Setya P; Puji Handini Zulaeha
Computer Science and Information Technologies Vol 1, No 1: May 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/csit.v1i1.p32-38

Abstract

The conversion of kerosene use in household to gas, in addition to the decision of the Republic of Indonesia minister in relation to the movement of kerosene to gas, gas also given an affordable price, how to use it more effectively. But the public is also expected to be careful about how to use it, because the gas is explosive and leaking causing unpleasant odor (gas leak) even a more dangerous side effect is the explosion of gas cylinders. To evercome these problems then need a tool that can detect gas leakage, in order to prevent gas leakage early. Therefore the authors designed a device that can detect gas leakage by using Sensor Mq-2 and will issue sound gas alarm warning leak by Modul ISD 1760, and will stop the gas flow from the tube to the stove using a Solenoid Valve. There is also a Flame Sensor’s hardware to detect a fire if there is a spark emerging and spraying water into spots that are likely to spark fire. All hardware will be in if using ATMega 328 microcontroller. Monitoring can use android smartphone, with the application that can send a warning to the mobile phone.