cover
Contact Name
Siti Nurmaini
Contact Email
comengappjournal@unsri.ac.id
Phone
+6285268048092
Journal Mail Official
comengappjournal@unsri.ac.id
Editorial Address
Jurusan Sistem Komputer, Fakultas Ilmu Komputer, Universtas Sriwijaya, KampusUnsri Bukit Besar, Palembang
Location
Kab. ogan ilir,
Sumatera selatan
INDONESIA
ComEngApp : Computer Engineering and Applications Journal
Published by Universitas Sriwijaya
ISSN : 22524274     EISSN : 22525459     DOI : 10.18495
ComEngApp-Journal (Collaboration between University of Sriwijaya, Kirklareli University and IAES) is an international forum for scientists and engineers involved in all aspects of computer engineering and technology to publish high quality and refereed papers. This Journal is an open access journal that provides online publication (three times a year) of articles in all areas of the subject in computer engineering and application. ComEngApp-Journal wishes to provide good chances for academic and industry professionals to discuss recent progress in various areas of computer science and computer engineering.
Articles 215 Documents
Network Survivability Performance Evaluation in Underwater Surveillance System Using Markov Model Seyyed Yahya Nabavi; Reza Mohammadi; Manijeh Keshtgari
Computer Engineering and Applications Journal Vol 3 No 3 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (558.704 KB) | DOI: 10.18495/comengapp.v3i3.98

Abstract

Underwater Wireless Sensor Network (UWSN) is a useful technology that can be used in Underwater Surveillance System (USS). USSs are mostly used in military purposes for detecting underwater military activities. One of the most important issues in USS is mission reliability or survivability. Due to harsh underwater environment and mission critical nature of military applications, it is important to measure survivability of USS. Underwater sensor node failures can be detrimental for USS. To improve survivability in USS, we propose a fault-tolerant underwater sensor node model. To the best of our knowledge, this is the first fault-tolerant underwater sensor node model in USS that evaluates survivability of an USS. Â We develop Markov models for characterizing USS survivability and MTTF (Mean Time to Failure) to facilitate USS. Performance evaluation results show the effectiveness of proposed model.
Data Management Challenges in Cloud Environments Mohamad Masood Javidi; Najme Mansouri; Asghar Asadi Karam
Computer Engineering and Applications Journal Vol 3 No 3 (2014)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (570.774 KB) | DOI: 10.18495/comengapp.v3i3.105

Abstract

Recently the cloud computing paradigm has been receiving special excitement and attention in the new researches. Cloud computing has the potential to change a large part of the IT activity, making software even more interesting as a service and shaping the way IT hardware is proposed and purchased. Developers with novel ideas for new Internet services no longer require the large capital outlays in hardware to present their service or the human expense to do it. These cloud applications apply large data centers and powerful servers that host Web applications and Web services. This report presents an overview of what cloud computing means, its history along with the advantages and disadvantages. In this paper we describe the problems and opportunities of deploying data management issues on these emerging cloud computing platforms. We study that large scale data analysis jobs, decision support systems, and application specific data marts are more likely to take benefit of cloud computing platforms than operational, transactional database systems.
An imperialist competitive algorithm for the winner determination problem in combinatorial auction Reza Mostafavi; Seyed Naser Razavi; Mohammad Ali Balafar
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (168.423 KB) | DOI: 10.18495/comengapp.v4i1.107

Abstract

Winner Determination problem (WDP) in combinatorial auction is an NP-complete problem. The NP-complete problems are often solved by using heuristic methods and approximation algorithms. This paper presents an imperialist competitive algorithm (ICA) for solving winner determination problem. Combinatorial auction (CA) is an auction that auctioneer considers many goods for sale and the bidder bids on the bundle of items. In this type of auction, the goal is finding winning bids that maximize the auctioneer’s income under the constraint that each item can be allocated to at most one bidder. To demonstrate, the postulated algorithm is applied over various benchmark problems. The ICA offers competitive results and finds good-quality solution in compare to genetic algorithm (GA), Memetic algorithm (MA), Nash equilibrium search approach (NESA) and Tabu search.
Network Attacks Detection by Hierarchical Neural Network Mohammad Masoud Javidi; Mohammad Hassan Nattaj
Computer Engineering and Applications Journal Vol 4 No 2 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (460.132 KB) | DOI: 10.18495/comengapp.v4i2.108

Abstract

Intrusion detection is an emerging area of research in the computer security and net-works with the growing usage of internet in everyday life. Most intrusion detection systems (IDSs) mostly use a single classifier algorithm to classify the network traffic data as normal behavior or anomalous. However, these single classifier systems fail to provide the best possible attack detection rate with low false alarm rate. In this paper,we propose to use a hybrid intelligent approach using a combination of classifiers in order to make the decision intelligently, so that the overall performance of the resul-tant model is enhanced. The general procedure in this is to follow the supervised or un-supervised data filtering with classifier or cluster first on the whole training dataset and then the output are applied to another classifier to classify the data. In this re- search, we applied Neural Network with Supervised and Unsupervised Learning in order to implement the intrusion detection system. Moreover, in this project, we used the method of Parallelization with real time application of the system processors to detect the systems intrusions.Using this method enhanced the speed of the intrusion detection. In order to train and test the neural network, NSLKDD database was used. Creating some different intrusion detection systems, each of which considered as a single agent, we precisely proceeded with the signature-based intrusion detection of the network.In the proposed design, the attacks have been classified into 4 groups and each group is detected by an Agent equipped with intrusion detection system (IDS).These agents act independently and report the intrusion or non-intrusion in the system; the results achieved by the agents will be studied in the Final Analyst and at last the analyst reports that whether there has been an intrusion in the system or not. Keywords: Intrusion Detection, Multi-layer Perceptron, False Positives, Signature- based intrusion detection, Decision tree, Nave Bayes Classifier
Learning from Imbalanced Multi-label Data Sets by Using Ensemble Strategies Mohammad Masoud Javidi; Fatemeh Shamsezat
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (698.335 KB) | DOI: 10.18495/comengapp.v4i1.109

Abstract

Multi-label classification is an extension of conventional classification in which a single instance can be associated with multiple labels. Problems of this type are ubiquitous in everyday life. Such as, a movie can be categorized as action, crime, and thriller. Most algorithms on multi-label classification learning are designed for balanced data and don’t work well on imbalanced data. On the other hand, in real applications, most datasets are imbalanced. Therefore, we focused to improve multi-label classification performance on imbalanced datasets. In this paper, a state-of-the-art multi-label classification algorithm, which called IBLR_ML, is employed. This algorithm is produced from combination of k-nearest neighbor and logistic regression algorithms. Logistic regression part of this algorithm is combined with two ensemble learning algorithms, Bagging and Boosting. My approach is called IB-ELR. In this paper, for the first time, the ensemble bagging method whit stable learning as the base learner and imbalanced data sets as the training data is examined. Finally, to evaluate the proposed methods; they are implemented in JAVA language. Experimental results show the effectiveness of proposed methods. Keywords: Multi-label classification, Imbalanced data set, Ensemble learning, Stable algorithm, Logistic regression, Bagging, Boosting
Game Theory Approaches in Taxonomy of Intrusion Detection for MANETs Mohammad Masoud Javidi; Laya Aliahmadipour
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.062 KB) | DOI: 10.18495/comengapp.v4i1.111

Abstract

MANETs are self configuring networks that are formed by a set of wireless mobile nodes and have no fixed network infrastructure nor administrative support. Since transmission range of wireless network interfaces is limited, forwarding hosts may be needed. Each node in a wireless ad hoc network functions is as both a host and a router. Due to their communication type and resources constraint, MANETs are vulnerable to diverse types of attacks and intrusions so, security is a critical issue. Network security is usually provided in the three phases: intrusion prevention, intrusion detection and intrusion tolerance phase. However, the network security problem is far from completely solved. Researchers have been exploring the applicability of game theory approaches to address the network security issues. This paper reviews some existing game theory solutions which are designed to enhance network security in the intrusion detection phase. Keywords: Mobile Ad hoc Network (MANET), Intrusion detection system (IDS), Cluster head, host based, Game theory.
Dynamic Location Modelling in 3D Beamforming for 5G Mobile Communications Sasi A; Santhiya P
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (234.2 KB) | DOI: 10.18495/comengapp.v4i1.116

Abstract

Mobile communication system is designed to provide reliable communication with more number of services and with low cost among multiple users. Due to limited frequency spectrum and resources, mobile communication requires more development in case of both establishing communication and maintenance in service quality. To fulfill these requirements, 5G mobile communication is being developed to provide high quality reliable communication and quality of service, by using beamforming model. As the trend of next generation mobile communication, 3D directional transmission is considered to give enhanced coverage model and reusability of frequency. Phase arrayed antenna is used in this beamforming model to give orthogonal communication among users. In this paper, a new modeling of beamforming is applied to give a new dimension by considering altitude with potential field strategy. Here phase arrayed antenna is replaced by 3-D smart antenna to improve the performance of 5G mobile communications. Performance evaluation outcomes 3D beamforming leads 2D beamforming in terms of communication delay, and uplink downlink throughput.
Green Cloud and reduction of energy consumption Kamyab Khajehei
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (497.596 KB) | DOI: 10.18495/comengapp.v4i1.119

Abstract

By using global application environments, cloud computing based data centers growing every day and this exponentially grows definitely effect on our environment. Researchers that have a commitment to their environment and others which was concerned about the electricity bills came up with a solution which called “Green Cloud”. Green cloud data centers based on how consume energy are known as high efficient data centers. In green cloud we try to reduce number of active devices and consume less electricity energy. In green data centers toke an advantage of VM and ability of copying, deleting and moving VMs over the data center and reduce energy consumption. This paper focused on which parts of data centers may change and how researchers found the suitable solution for each component of data centers. Also with all these problems why still the cloud data centers are the best technology for IT businesses.
Parallel Continuous Double Auction for Service Allocation in Cloud Computing Nima Farajian; Hossein Ebrahim pour-komleh
Computer Engineering and Applications Journal Vol 4 No 2 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (587.261 KB) | DOI: 10.18495/comengapp.v4i2.125

Abstract

Cloud Computing is a service oriented architecture in which every computing resources is delivered to users as a service. Nowadays market-oriented approach has attracted a lot of researchers because of its great ability to manage Cloud services efficiently and dynamically. Each service consists of various resources which all should be allocated to utilize the service. In this paper a parallel continuous double auction method for efficient service allocation in cloud computing is presented in which by using a novel parallel sorting algorithm at auctioneer, enables consumers to order various resources as workflow for utilizing requested services efficiently. Also in the presented method consumers and providers make bid and offer prices based on time factor. Experimental results show that proposed method is efficient in success rate, resource utilization and average connection time and also overall performance of system is improved by parallel approach.
Network Selection Problems - QoE vs QoS Who is the Winner? Vasuky Mohanan Mohanan; Ismat Aldmour
Computer Engineering and Applications Journal Vol 4 No 1 (2015)
Publisher : Universitas Sriwijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (584.31 KB) | DOI: 10.18495/comengapp.v4i1.131

Abstract

In network selection problem (NSP), there are now two schools of thought. There are those who think using QoE (Quality of Experience) is the best yardstick to measure the suitability of a Candidate Network (CN) to handover to. On the other hand, Quality of Service (QoS) is also advocated as the solution for network selection problems. In this article, a comprehensive framework that supports effective and efficient network selection is presented. The framework   attempts to provide a holistic solution to network selection problem that is achieved by combining both of the QoS and QoE measures.   Using this hybrid solution the best qualities in both methods are combined to overcome issues of the network selection problem According to ITU-R (International Telecommunications Union – Radio Standardization Sector), a 4G network is defined as having peak data rates of 100Mb/s for mobile nodes with speed up to 250 km/hr and 1Gb/s for mobile nodes moving at pedestrian speed. Based on this definition, it is safe to say that mobile nodes that can go from pedestrian speed to speed of up to 250 km/hr will be the norm in future. This indicates that the MN’s mobility will be highly dynamic. In particular, this article addresses the issue of network selection for high speed Mobile Nodes (MN) in 4G networks. The framework presented in this article also discusses how the QoS value collected from CNs can be fine-tuned to better reflect an MN’s current mobility scenario.

Page 4 of 22 | Total Record : 215