cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
,
INDONESIA
Journal of Telematics and Informatics
ISSN : -     EISSN : -     DOI : -
Journal of Telematics and Informatics (e-ISSN: 2303-3703, p-ISSN: 2303-3711) is an interdisciplinary journal of original research and writing in the wide areas of telematics and informatics. The journal encompasses a variety of topics, including but not limited to: The technology of sending, receiving and storing information via telecommunication devices in conjunction with affecting control on remote objects; The integrated use of telecommunications and informatics; Global positioning system technology integrated with computers and mobile communications technology; The use of telematic systems within road vehicles, in which case the term vehicle telematics may be used; The structure, algorithms, behavior, and interactions of natural and artificial systems that store, process, access and communicate information; Develops its own conceptual and theoretical foundations and utilizes foundations developed in other fields; and The social, economic, political and cultural impacts and challenges of information technologies (advertising and the internet, alternative community networks, e-commerce, e-finance, e–governance, globalization and security, green computing, ICT for sustainable development, ICT in healthcare and education, management and policymaking, mobile and wireless communications, peer-to-peer learning, regulation of digital technologies, social networking, special user groups, the 2.0 paradigm, the WWW, etc). The journal is a collaborative venture between Universitas Islam Sultan Agung (UNISSULA), Universitas Ahmad Dahlan (UAD) and Institute of Advanced Engineering and Science (IAES) Indonesia Section.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol 3, No 1: March 2015" : 5 Documents clear
Segmentation of Blood Vessels and Optic disc in Retinal Images T. Ravi; V.Venkata Sai Aditya; B.M.S. Rani; Manjeera Boppana
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.027 KB) | DOI: 10.12928/jti.v3i1.1-6

Abstract

Understanding of picture substance is one of the targets in PC vision particularly in picture transforming. In this period it has gotten much familiarity with analysts. In picture elucidation the segment of the picture into article and foundation is a serious step. Division differentiates a picture into its segment locales or articles. Picture division t needs to portion the article from the foundation to peruse the picture legitimately and recognize the substance of the picture painstakingly. In this setting, edge identification is a principal apparatus for picture division. In this paper an endeavor is made to study the execution of most usually utilized edge location strategies for picture division.
Comparison of Pipelined Floating Point Unit with Unpipelined Floating Point Unit M. Venkateswarao; J. Triveni; K. Bhargavee Latha; K. Naga Deepika; K.R. Pavan
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (293.027 KB) | DOI: 10.12928/jti.v3i1.7-14

Abstract

Floating-point numbers are broadly received in numerous applications due their element representation abilities. Floating-point representation has the capacity hold its determination and exactness contrasted with altered point representations. Any Digital Signal Processing (DSP) calculations utilization floating-point math, which obliges a huge number of figuring’s every second to be performed. For such stringent necessities, outline of quick, exact and effective circuits is the objective of each VLSI creator. This paper displays a correlation of pipelined floating-point snake dissention with IEEE 754 organization with an unpipelined viper additionally protests with IEEE 754 arrangement. It depicts the IEEE floating-point standard 754. A pipelined floating point unit in light of IEEE 754 configuration is produced and the outline is contrasted and that of an unpipelined floating point unit and an investigation is defeated speed, range, and force contemplations. It builds the rate as well as is vitality productive. Every one of these changes is at the expense of slight increment in the chip region. The basic methodology and approach used for VHDL (Very Large Scale Integration Hardware Descriptive Language) implementation of the floating-point unit are also described. Detailed synthesis report operated upon Xilinx ISE 11 software and Modelsim is given.
Encryption Based Access Control Model In Cloud: A Survey Rachana Chavda; Rajanikanth Aluvalu
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (63.051 KB) | DOI: 10.12928/jti.v3i1.15-21

Abstract

Cloud computing is known as “Utility”. Cloud Computing enabling users to remotely store their data in a server and provide services on-demand. Since this new computing technology requires user to entrust their valuable data to cloud providers, there have been increasing security and privacy concerns on outsourced data. We can increase security on access of the data in the cloud. Morever we can provide encryption on the data so third party can not use thedata. In this paper we will be reviewing various encryption based access control model for enhancing cloud security along with their limitations. We will be concluding with a proposed access control model to enhance cloud security.
A Survey on Hierarchical Attribute Set Based Encryption (HASBE) Access Control Model for Cloud Computing Kamliya, Vanraj; Aluvalu, Rajnikanth
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/jti.v3i1.22-27

Abstract

Cloud computing refers to the application and service that run on a distributed system using virtualized resources and access by common internet protocol and networking standard. Cloud computing virtualizes system by pooling and sharing resources. System and resources can be monitored from central infrastructure as needed. It requires high security because of now a days companies going to put more essential and huge amount of data on cloud. That’s why the reason traditional access control is not enough For the High security .so that the attribute-based encryption (ABE) have been proposed for access control of outsourced data in cloud computing with the complex access control policy.in this paper, we have proposed hierarchical attribute-set-based encryption (HASBE) access control by extending cipher-text policy and attribute-set-based encryption (ASBE) with a hierarchical structure of users. HASBE provides Flexibility, scalability and fine-grained access control with efficient user revocation but the hierarchical structure of the domain hierarchy is to complex and there is no sub-domain level user hierarchy which increases systemresponse time and decreases the system performance. So we are proposing HASBE scheme by creating a sub domain in to the user level Hierarchy that reduce the complexity of the hierarchy and also improve the system performance
Retail Web System Upgrading with Strategic Customer Using Threshold Policy M. Karuna Sree; K. Subrahmanyam
Journal of Telematics and Informatics Vol 3, No 1: March 2015
Publisher : Universitas Islam Sultan Agung

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (82.293 KB) | DOI: 10.12928/jti.v3i1.28-32

Abstract

This paper mainly deals with the problems that online retailers are facing by some group of strategic customers by upgrading web system and goods pricing. A monopolist price of a product for which stylized dynamic pricing model is considered at the beginning and the price change is done on the product after considering some set of constraints based on the product availability. Due to some network issues sometimes website may get problems at that time there may be a chance of transaction failure for customer during online purchasing. To predict this probability and doing purchasing opinion depending on the belief of Transaction Success Probability (TSP).Considering this there will be a threshold policy for purchasing by customers here it is going to consider it as first one: Customers buy products only if his valuation for products is above threshold (total reduced profit) otherwise they will not take it into consideration. The threshold rises as TSP degrades, or customers turn out to be risk averse. Here we obtain the best cost of each phase and make out the best strategy for online shopping site customizing by threshold and upgrade the system when present TSP is less than threshold. The online trader turns to increase the price if he disregards strategic customer behavior. The value of disregarding strategic customer deeds is significant. The profit loss cost of disregarding strategic customer deeds grows as customer transaction cost rises.

Page 1 of 1 | Total Record : 5