IJCT
- Volume 5, Issue 1 / January - February 2018
S.No
|
Title/Author Name
|
Serial No
|
1 |
Designing of Library Information System to Support Learning in High School
- Ariyani Wardhana.
10.29126/23942231/IJCT-V5I1P1
Abstract
In this era of globalization, the existence of computers is necessary in all aspects of life. Computer is a tool to assist the process of a job so that it can make a job becomes easier and efficient. Library in high School as an institution that provides library materials as a means of information resources requires a computerized system to process data and to perform library work activities. The method used is doing research to find out directly the problems that arise. From the results of this practice that the upper secondary school library has not utilized the computer system effectively to perform its work activities. While visitors who want to get the sources of information increasingly longer. The ease of visitors to register, get information about library materials and to conduct lending transactions library material into something that needs to be considered, because the librarian high school still manually process, in addition to these things computerization will also assist the management in decision making. Keyword: Library, Information Technology, Computerization. × Ariyani Wardhana," Designing of Library Information System to Support Learning in High School " Vol. 5 - Issue 1 (1-4) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P1 |
2 |
Multi-task Offloading and Resource Allocation for Energy-Efficiency in Mobile Edge Computing
- Huanjie Li
10.29126/23942231/IJCT-V5I1P2
Abstract
On edge computing, mobile devices can offload some computing intensive tasks to the cloud so that the time delay and battery losses can be reduced. Different from cloud computing, an edge computing model is under the constraint of radio transmitting bandwidth, power and etc. With regard to most models in presence, each user is assigned to a single mission, transmitting power or local CPU frequency on mobile terminals is deemed to be a constant. Furthermore, energy consumption has a positive correlation with the above two parameters. In a context of multitask, such values could be increased or reduced according to workload to save energy. Additionally, the existing offloading methods are inappropriate if all the compute densities of multiple tasks are high. In this paper, a single-user multi-task with high computing density model is proposed and partial task is offloaded when use the different offload algorithm. Simulated annealing algorithm is the best method to select offloading tasks, which can enhance the offloading ratio and save energy consumption. Keyword: edge computing, offloading, simulated annealing. × Huanjie Li,"Multi-task Offloading and Resource Allocation for Energy-Efficiency in Mobile Edge Computing" Vol. 5 - Issue 1 (5-13) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P2 |
3 |
A Method of DTW Based Gait Recognition and Gait Data from Kinect
- YiFei Hu
10.29126/23942231/IJCT-V5I1P3
Abstract
Gait recognition as a field of biometrics more and more attention. Many people are interested in working with Kinect to study gait recognition. In this paper, we propose a Dynamic Time Warping (DTW) algorithm to classify the features by using the inherent physiological characteristics of human and Kinect's skeletal tracking function, extracting the distance between skeletal and joint points, the height of body mass center, height and centroid to the main skeletal joint points . The experimental results show that this method can obtain more than 90% recognition rate in the UPCV database and has good robustness. Keyword: Gait Recognition, Kinect, Centroid, DTW. × YiFei Hu,"A Method of DTW Based Gait Recognition and Gait Data from Kinect" Vol. 5 - Issue 1 (14-19) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P3 |
4 |
Paper Removed | - |
5 |
Anonymous Authentication in the SAML 2. 0 Protocol Based On Algebraic MAC
- Shiwei Wen
10.29126/23942231/IJCT-V5I1P5
Abstract
In this paper, the Security Assertion Markup Language (SAML) protocol is analyzed and the existing privacy leakage problems are pointed out. A method for anonymous authentication in the SAML 2. 0 protocol proposed by adding a lightweight Attribute-based algebraic MAC (Message Authentication Code) anonymous credential solution. Due to the anonymity and security of the authentication solution, both the identity provider and the service provider can not be traced back to the real name of the pseudonym, so as to realize the protection of users' privacy data.Experiments show that the method we design is feasible and computationally efficient. Keyword: SAML,anonymous credential, algebraic MAC;privacy-preserving, federated identity management. × Shiwei Wen,"Anonymous Authentication in the SAML 2. 0 Protocol Based On Algebraic MAC" Vol. 5 - Issue 1 (25-29) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P5 |
6 |
Optimization of 5G Wireless Mobile Network Energy with ULTRA-LEAN Design
- Jonathan, Sarif Hidayat, Daril Willianson, Greg Martin, Hari Suryantoro
10.29126/23942231/IJCT-V5I1P6
Abstract
Wireless technologies are now taking 4G technology that has been used arbitrarily countries. However, due to the development of mobile devices and mobile communication services on, then there are some that can not be handled by 4G technologies such as energy consumption is very high in this technology. The development of mobile world that continues to grow, the demand for data access becomes very high. Since the development of some researchers that conducted research for the wireless systems of the fifth generation to handle problems that occur on 4G. This article describes the design architecture of 5G technologies and discuss various promising technologies for 5G wireless communication systems, such as MIMO large, energy-efficient communications, cognitive radio networks, and the visible light communication. future challenges facing the potential of technology are also discussed. Keyword: Wireless, 5G, Mobile Network Energy, Optimization. × Jonathan, Sarif Hidayat, Daril Willianson, Greg Martin, Hari Suryantoro,"Optimization of 5G Wireless Mobile Network Energy with ULTRA-LEAN Design" Vol. 5 - Issue 1 (30-35) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P6 |
7 |
Complex Background Image Detection and Processing Based on Machine Vision
- Lei Tai
10.29126/23942231/IJCT-V5I1P7
Abstract
This paper suggests a new method that generates sampling point along the guide line for linear contour defect detection and recognition. The method registers the vector data with the measured image to generate sampling points that can cover the contour accurately. Next, these sampling points are saved into a test file for quick batch detection of the same products. Then pictures are taken to eliminate the complex background noise on the objects to carry out a series of image pretreatment. On this basis, the algorithm that using SUSAN Operator is used to determine the location of the sampling points. Also, the potential defects are identified and classified. The method has good adaptability to the detection of linear image contour. It is of high application value due to reliability and real-time capability. Keyword: Machine Vision, Defect Detection, Vector File, Image Contour. × Lei Tai,"Complex Background Image Detection and Processing Based on Machine Vision" Vol. 5 - Issue 1 (36-43) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P7 |
8 |
The Creation Of Data Pattern Of Kerosene-mixed Gasoline By Utilizing Gas Sensor And Fast Fourier Transform Method To Detect The Purity Of Gasoline
- Derisma, Hilda Rahmiati, Andrizal
10.29126/23942231/IJCT-V5I1P8
Abstract
The research regarding the creation of data pattern of kerosene-mixed gasoline by using gas sensor has been conducted through the utilization of fast fourier transform (FFT) method. This research is aimed to create data pattern of both pure and kerosene-mixed gasoline. The composition of kerosene in gasoline is varied by 10%, 20%, 30%, 40%, and 50%. The FFT method test is conducted to create pattern from the detected gas. The sensor of TGS 2620 Gas has low sensitivity towards the change of steam/vapor of kerosene-mixed gasoline. The data sample of pure gasoline and kerosene-mixed gasoline have dominant frequency values that frequently occur in 17-31 frequency range, while the entire random samples that used are identified to have been mixed with kerosene. Keyword: Gasoline, Kerosene, TGS 2620 Gas Sensor, Data Pattern. × Derisma, Hilda Rahmiati, Andrizal,"The Creation Of Data Pattern Of Kerosene-mixed Gasoline By Utilizing Gas Sensor And Fast Fourier Transform Method To Detect The Purity Of Gasoline" Vol. 5 - Issue 1 (44 - 49) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P8 |
9 |
Temperature Monitoring In Water Heating System Using Control Temperature With Pid Ziegler Nichols Method Web Based
- Agus Riyanto, Muhammad Ramdhan, Galih Surono, Ayu Ratna Juwita, Adi Rizky Pratama
10.29126/23942231/IJCT-V5I1P9
Abstract
Many industries use heating for the production process. But the problem is that this heater must be controlled to its temperature so that the hot temperature in accordance with the desired, because if uncontrolled heat will lead to overheating and over pressure that will cause the production process to fail. To control the heater then used the on-off method and PID method which is a method to determine the precision of an instrumentation system with the characteristics of feedback on the system. On the control result using the on-off method to address the time when the process of heating water from the initial temperature of 36.69 to the desired temperature value 73 that is 8 minutes 14 seconds while in the heating process using PID from the initial temperature of 29.56 to the desired temperature value 73 that is 19 minutes 14 seconds. Temperature value can be seen in the web display either in the form of numbers with units of degrees Celsius or in the form of graphs. While the result of testing tool to user acceptance / respondent shows that variable of PU (X1) and variable of PEU (X2) to receipt of BITU (Y) user is acceptable. This is indicated by the reliability test with the value of croncbach's alpha PU 0.759> 0.60, PEU 0.669> 0.60, PU and PEU validity show r table value higher than t table, multiple linear regression tests PU (X1) and PEU (X2 ) to the receipt of BITU (Y) users shows significant value 0,000 <0.05, the summary summary model shows the value () = 0.262 and anova attributes the Sig value. F of 0.000 <α = 0.05. Keyword: Control System, PID, Node Mcu esp8266, Temperature, Monitoring. × Agus Riyanto, Muhammad Ramdhan, Galih Surono, Ayu Ratna Juwita, Adi Rizky Pratama,"Temperature Monitoring In Water Heating System Using Control Temperature with Pid Ziegler Nichols Method Web Based" Vol. 5 - Issue 1 (50 - 57) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P9 |
10 |
Digital Image Segmentation based Worm Count and Identified Diseases of worms in Human
- R. Augasthega, R. Ravi
10.29126/23942231/IJCT-V5I1P10
Abstract
Many industries use heating for the production process. But the problem is that this heater must be controlled to its temperature so that the hot temperature in accordance with the desired, because if uncontrolled heat will lead to overheating and over pressure that will cause the production process to fail. To control the heater then used the on-off method and PID method which is a method to determine the precision of an instrumentation system with the characteristics of feedback on the system. On the control result using the on-off method to address the time when the process of heating water from the initial temperature of 36.69 to the desired temperature value 73 that is 8 minutes 14 seconds while in the heating process using PID from the initial temperature of 29.56 to the desired temperature value 73 that is 19 minutes 14 seconds. Temperature value can be seen in the web display either in the form of numbers with units of degrees Celsius or in the form of graphs. While the result of testing tool to user acceptance / respondent shows that variable of PU (X1) and variable of PEU (X2) to receipt of BITU (Y) user is acceptable. This is indicated by the reliability test with the value of croncbach's alpha PU 0.759> 0.60, PEU 0.669> 0.60, PU and PEU validity show r table value higher than t table, multiple linear regression tests PU (X1) and PEU (X2 ) to the receipt of BITU (Y) users shows significant value 0,000 <0.05, the summary summary model shows the value () = 0.262 and anova attributes the Sig value. F of 0.000 <α = 0.05. Keyword: Control System, PID, Node Mcu esp8266, Temperature, Monitoring. × R. Augasthega, R. Ravi,"Digital Image Segmentation based Worm Count and Identified Diseases of worms in Human" Vol. 5 - Issue 1 (58 - 64) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P10 |
11 |
Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android
- Denni Kurniawan, April Lia Hananto, Bayu Priyatna
10.29126/23942231/IJCT-V5I1P11
Abstract
Playfair cipher is a classic encryption method that is difficult to manually manipulate but apart from the advantages found in plyafair cipher there are also many shortcomings, can be solved by using the information frequency of occurrence bigram, can not enter lowercase letters, numbers and special characters when encrypting This research modifies the key matrix of playfair cryptography algorithms and combines with the Linear Feedback Shift Register (LFSR) algorithm, by changing the size of the 13x13 key matrix the playfair cipher is able to insert characters as many as 196 characters consisting of capital letters, lowercase letters. The result of calculation with avalanche effect method got average value 43,59% at playfair cipher done by modification of matrix key 13x13 and combined with LFSR generator, 2,15% at playfair cipher 10x10 matrix key without merged with LFSR and 34,41% at playfair classic 5x5. That the playfair cipher that has been modified and combined with the LFSR generator is stronger than the previous playfair cipher. The result of time complexity testing has fast encryption and decryption. Keyword: Playfair, LFSR, cryptography, encryption, description. × Denni Kurniawan, April Lia Hananto, Bayu Priyatna,"Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android" Vol. 5 - Issue 1 (65 - 70) - January - February 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I1P11 |