Computer Science and Information Technologies

Journal Information
ISSN / EISSN : 2722-323X / 2722-3221
Current Publisher: Institute of Advanced Engineering and Science (10.11591)
Total articles ≅ 23

Latest articles in this journal

Dedy Hartama, Herman Mawengkang, Muhammad Zarlis, Rahmad Widia Sembiring
Computer Science and Information Technologies, Volume 2, pp 1-10; doi:10.11591/csit.v2i1.p1-10

Evacuation is characterized by rapid movement of people in unsafe locations or disaster sites to safer locations. The traffic management strategy for commonly used evacuations is the use of Shoulder-Lane, contraflowing traffic and gradual evacuation. Contra-flow has been commonly used in traffic management by changing traffic lanes during peak hours. To implement the contra-flow operation, there are two main problems that must be decided, namely Optimal Contraflow Lane Configuration Problem (OCLCP) and Optimal Contraflow Scheduling. Within the OCSP there are two approaches that can be used: zone scheduling and flow scheduling. Problem of Contra Flow and Zone Scheduling Problem is basically an Emergence Evacuation Route Planning (EERP) issue. This research will discuss EERP with ContraFlow and Zone Scheduling which can guarantee the movement of people in disaster area to safe area in emergency situation.
Rishabh Singh, Ghanendra Kumar, Chakresh Kumar
Computer Science and Information Technologies, Volume 2, pp 11-15; doi:10.11591/csit.v2i1.p11-15

This project proposes the design of ultrafast communication circuit which can enable the high speed secured data transmission at 50 Gb/s and 100 Gb/s by the use of distributed Raman amplifier, EDFA (Erbium – doped fiber amplifier), filter, single mode fiber along with Fiber Bragg Grating (FBG) and attenuators. The simulation of the suggested optical circuit involves the use of parameters of Raman amplifier and EDFA and other components included in the optical structure. The design also includes the use of encryption and decryption techniques to ensure secured communication. Thus, realization of these circuits at 50 Gb/s and 100 Gb/s will enable the future optical communication applications for ultrafast data transmission to large distances.
Merlin Florrence
Computer Science and Information Technologies, Volume 2, pp 43-48; doi:10.11591/csit.v2i1.p43-48

Natural Language Processing (NLP) is rapidly increasing in all domains of knowledge acquisition to facilitate different language user. It is required to develop knowledge based NLP systems to provide better results. Knowledge based systems can be implemented using ontologies where ontology is a collection of terms and concepts arranged taxonomically. The concepts that are visualized graphically are more understandable than in the text form. In this research paper, new multilingual ontology visualization plug-in MLGrafViz is developed to visualize ontologies in different natural languages. This plug-in is developed for protégé ontology editor. This plug-in allows the user to translate and visualize the core ontology into 135 languages.
Moe Moe Htay
Computer Science and Information Technologies, Volume 2, pp 26-32; doi:10.11591/csit.v2i1.p26-32

Facial Expression is a significant role in affective computing and one of the non-verbal communication for human computer interaction. Automatic recognition of human affects has become more challenging and interesting problem in recent years. Facial Expression is the significant features to recognize the human emotion in human daily life. Facial Expression Recognition System (FERS) can be developed for the application of human affect analysis, health care assessment, distance learning, driver fatigue detection and human computer interaction. Basically, there are three main components to recognize the human facial expression. They are face or face’s components detection, feature extraction of face image, classification of expression. The study proposed the methods of feature extraction and classification for FER.
Rekha C, Krishnamurthy G. N.
Computer Science and Information Technologies, Volume 2, pp 16-25; doi:10.11591/csit.v2i1.p16-25

In the field of cryptography, there has been a massive amount of enhancement in manipulating the plaintext which is unreadable, less prone to crackers and hackers, again manipulating this unreadable form to get back plaintext in some way. The Blowfish algorithm is a block cipher, has complex in structure in generating P-box and S-box entries using encryption algorithm. By simplifying the structure of encryption algorithm as well as F function with dynamic substitution, this can improve the performance by generating P-box and S-box entries of blowfish algorithm. In this paper, the proposed method simplifies the structure to produce P-box and S-box entries in order to reduce computational cost and demonstrates the performance of blowfish. The approach considers different security aspects namely EQ analysis, KS analysis, AV analysis, Entropy, Floating Frequency analysis and correlation of horizontally adjacent pixels in an encrypted image.
Umashankar Ghugar, Jayaram Pradhan
Computer Science and Information Technologies, Volume 2, pp 33-42; doi:10.11591/csit.v2i1.p33-42

From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN.In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
, Parvin Ahmadi Doval Amiri, Farsad Zamani Brujeni, Nima Akhlaghi
Computer Science and Information Technologies, Volume 1, pp 98-105; doi:10.11591/csit.v1i3.p98-105

This paper is a review of types of modification data attack based on computer systems and it explores the vulnerabilities and mitigations. Altering information is a kind of cyber-attack during which intruders interfere, catch, alter, take or erase critical data on the PCs and applications through using network exploit or by running malicious executable codes on victim's system. One of the most difficult and trendy areas in information security is to protect the sensitive information and secure devices from any kind of threats. Latest advancements in information technology in the field of information security reveal huge amount of budget funded for and spent on developing and addressing security threats to mitigate them. This helps in a variety of settings such as military, business, science, and entertainment. Considering all concerns, the security issues almost always come at first as the most critical concerns in the modern time. As a matter of fact, there is no ultimate security solution; although recent developments in security analysis are finding daily vulnerabilities, there are many motivations to spend billions of dollars to ensure there are vulnerabilities waiting for any kind of breach or exploit to penetrate into the systems and networks and achieve particular interests. In terms of modifying data and information, from old-fashioned attacks to recent cyber ones, all of the attacks are using the same signature: either controlling data streams to easily breach system protections or using non-control-data attack approaches. Both methods can damage applications which work on decision-making data, user input data, configuration data, or user identity data to a large extent. In this review paper, we have tried to express trends of vulnerabilities in the network protocols’ applications.
Abhishek B., Kanya Krishi, Meghana M., Mohammed Daaniyaal,
Computer Science and Information Technologies, Volume 1, pp 116-120; doi:10.11591/csit.v1i3.p116-120

Gesture recognition is an emerging topic in today’s technologies. The main focus of this is to recognize the human gestures using mathematical algorithms for human computer interaction. Only a few modes of Human-Computer Interaction exist, they are: through keyboard, mouse, touch screens etc. Each of these devices has their own limitations when it comes to adapting more versatile hardware in computers. Gesture recognition is one of the essential techniques to build user-friendly interfaces. Usually gestures can be originated from any bodily motion or state, but commonly originate from the face or hand. Gesture recognition enables users to interact with the devices without physically touching them. This paper describes how hand gestures are trained to perform certain actions like switching pages, scrolling up or down in a page.
, Dessy Novita, Deni Setiana
Computer Science and Information Technologies, Volume 1, pp 121-125; doi:10.11591/csit.v1i3.p121-125

Someone who could only move his/her head and could not move his/her limbs needs a wheelchair and robotic arms which could be controlled by the head. Gyro sensor is a sensor that could be controlled according to the tilt in the x,y coordinates which then implemented to measure the tilt of the user’s head. This paper would explain the head detector application to control wheelchairs and robotic arms. They could be controlled using Arduino microcontroller which uses C programming language. Gyro sensor that is put on the head could control wheelchair to move left, right, forward and backward according to the tilt of the head. It is the same with controlling robotic arms. It could rotate left, right, and move up and down. The x and y coordinates are used to determine the tilt of the head for controlling the wheelchair as well as robotic arms’ movements. It is discovered that wheelchairs and robotic arms could be controlled by the head by the use of gyro sensor.
Computer Science and Information Technologies, Volume 1, pp 93-97; doi:10.11591/csit.v1i3.p93-97

The idea of blockchains technology (BT) in the Internet of Things (IoT) is to allow the physical things to trust in the transactions held within the IoT network. The BT is a distributed, decentralized, publicly shared its digital ledger and secured technology to eternally record the transactions across the shared database. The BT in IoT can be called Trust Machine to eliminate the intermediates and enables the physical things to trust with each other. This research evaluates the performance of BT in IoT. The simulated results are tested and can be used in the sustainable development of the integration of BT and IoT.
Back to Top Top