[CEPAT] Journal of Computer Engineering: Progress, Application and Technology最新文献

筛选
英文 中文
The NDNS PERFORMANCE WITH VARIATION OF TOPOLOGY AND PREFIX ON NAMED DATA NETWORKING 命名数据网络中拓扑和前缀变化对NDNS性能的影响
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-11-24 DOI: 10.25124/cepat.v1i03.5428
Muhammad Daffa, L. V. Yovita, T. Wibowo
{"title":"The NDNS PERFORMANCE WITH VARIATION OF TOPOLOGY AND PREFIX ON NAMED DATA NETWORKING","authors":"Muhammad Daffa, L. V. Yovita, T. Wibowo","doi":"10.25124/cepat.v1i03.5428","DOIUrl":"https://doi.org/10.25124/cepat.v1i03.5428","url":null,"abstract":"NDNS is DNS embedded in Named Data Network (NDN) architecture as a distributed database system to support NDN caching and know the content's location. In this research, the simulation performed using two topologies, Abilene and PAN-Europe with changes to their prefixes. This simulation conducted to see performance of NDNS with minimal ability to cache on NDN router or Caching Resolver. From simulation results, the variation of prefix at Second Level Domain and Top Level Domain there is no difference in average delay in both topologies, namely 1% increase in average delay as the variation of prefix increases. There is a decrease in the Cache Hit Ratio by 0.16% (Abilene) and 0.18% (PAN-Europe) because the probability of getting cached data decreases as the prefix varies. In the change in interest frequency, there is an increase of 0.4% in average delay and the Cache Hit Ratio decreases by 0.08% in both topologies as the frequency of interest per second increases. NDNS with cache in Router and Caching Resolver get 43% lower average delay (Abilene) and 44% (PAN-Europe) than NDN with cache in Router and 57% lower (Abilene) and 60% (PAN-Europe) than NDNS with cache in Caching Resolver only.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130854286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Content Management System Development for Medical Web Applications 医疗Web应用的内容管理系统开发
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-11-24 DOI: 10.25124/cepat.v1i03.5297
M. Adrian, Munawar Ahmad
{"title":"Content Management System Development for Medical Web Applications","authors":"M. Adrian, Munawar Ahmad","doi":"10.25124/cepat.v1i03.5297","DOIUrl":"https://doi.org/10.25124/cepat.v1i03.5297","url":null,"abstract":"The world of the web and the internet today has become one of the centers for exchanging information between humans, one of which is shown by the development of web applications in the form of content management systems (CMS). By being based on JavaServer Pages (JSP), which has the advantages of being platform-independent, inexpensive and free, and easy to develop, it is possible to become an alternative solution to meet today's general medical needs, namely online and web-based, extensible and customizable. , robust and efficient, secure and authenticated, and easy to develop and maintain. there is a need that turns out to be equally owned and used by only a few medical institutions or there is even a need that is shared by all of them. These needs are developed and used as a standard so that web applications in the medical field are universal and can be used by any medical institution, anywhere, and anywhere. As a result, medical needs that can be implemented into a web application and can be universally applicable.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134452945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
As 5G Mobile Private Security Analysis Based on Cloud Computing 如基于云计算的5G移动私有安全分析
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5269
Michelle Octavia Yolanda Sari
{"title":"As 5G Mobile Private Security Analysis Based on Cloud Computing","authors":"Michelle Octavia Yolanda Sari","doi":"10.25124/cepat.v1i02.5269","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5269","url":null,"abstract":"As time passes by, the increasing demands from 4G technology services to 5G technology are getting bigger. In line with the development of 5G, there are several open sources such as Free5gc, Open5gs which already provide core 5G network services so that they can help create and simulate private 5G networks. By using free5gc open source, it still needs more attention from the security side, especially from common attacks such as DDoS. Then the attack scenario is carried out from the inner network side, namely from the UE with the TCP SYN Flood and Ping of Death attack methods. The results of the attack contained comparisons for CPU and memory usage parameters. Then the TCP SYN Flood attack had an impact on the core network function components, namely Access and Mobility Management (AMF), which in 5G services experienced errors or crashes after receiving large packets. Thus, users cannot use the service because if an error occurs in the core network function (AMF), then the connection to gNB and the UE will also be lost","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122825804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DarkWeb Crawling using Focused and Classified Algorithm 基于聚焦分类算法的暗网爬行
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.4879
Putri Rahmasari Yunelfi, Yudha Purwanto, M. F. Ruriawan, Agus Setiawan Popalia, Fina Fahrani
{"title":"DarkWeb Crawling using Focused and Classified Algorithm","authors":"Putri Rahmasari Yunelfi, Yudha Purwanto, M. F. Ruriawan, Agus Setiawan Popalia, Fina Fahrani","doi":"10.25124/cepat.v1i02.4879","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.4879","url":null,"abstract":"At this moment there are more and more cases of illegal goods transactions and personal data being leaked. Illegal transactions and personal sales data are usually carried out on the deep web, especially dark web because the web has multiple layers of encryption and an anonymous system when accessing it. without any illegal transactions and personal sales data, basically the web is very wide and deep. Therefore, the crawling method can be used to explore the dark web. The crawling method on the dark web can use a crawl focus that takes a focused approach on a particular topic. The focus crawling method takes a URL approach by looking at URL that are interconnected with the main URL page on the desired topic. To do focus crawling, it is done by entering keywords that best match the desired topic. With the focus crawling method, it is hoped that the maximum URL data set related to a particular topic can be generated. From the results obtained on the crawling system on the dark web, it is hoped that it can also be used to find out the number of URLs related to certain topics. In addition, the results of this crawl can also be a source of information for further research on the dark web.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Significance of Accuracy Comparison in Real-Time Kinematic and Single Point Positioning On-Board Application in Vehicles 车载实时运动定位与单点定位精度比较的意义
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5299
Taufan Zandy Andrian
{"title":"Significance of Accuracy Comparison in Real-Time Kinematic and Single Point Positioning On-Board Application in Vehicles","authors":"Taufan Zandy Andrian","doi":"10.25124/cepat.v1i02.5299","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5299","url":null,"abstract":"\u0000 \u0000 \u0000 \u0000Vehicle tracking using the positioning system that is used today is the single point positioning method implementation, but the accuracy of the method is still inadequate for further features to be applied. Therefore, an accuracy improvement is needed. By applying the Real Time Kinematic (RTK) method which has an centimeter level of accuracy, the IndiCar webapp made by PT. Telkom Indonesia offers further features in driving, such as sudden vehicle movements detection, to accidents indications. Accuracy comparisons can also be made to define how significant the difference in accuracy of the two methods. The tests show quite significant results. At single point positioning, the largest deviation is at 20 m and the smallest at 1.0960 m, while in the RTK method, the largest deviation is at a value of 80 cm while the smallest at 0.92 cm. The standard deviation value is then used in the calculation of accuracy. With CEP calculations, the single point positioning method produces accuracy at 5.4659 m, while the RTK method provides a more precise level of accuracy, with a value of 18.22 cm. These results show that the RTK method can be an alternative, to improve accuracy in the use of positioning systems. \u0000 \u0000 \u0000 \u0000","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"79 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121203347","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random Forest Implementation in Prepaid Electric Meter Recognition 随机森林在预付费电表识别中的实现
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5228
Komang Jaya Bhaskara Mahatya, Fathoni Waseso Jati, Budhi Irawan, F. Hasibuan
{"title":"Random Forest Implementation in Prepaid Electric Meter Recognition","authors":"Komang Jaya Bhaskara Mahatya, Fathoni Waseso Jati, Budhi Irawan, F. Hasibuan","doi":"10.25124/cepat.v1i02.5228","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5228","url":null,"abstract":"While prepaid electricity services provide better flexibility, it comes with an additional step for the customer. Instead of paying a monthly bill based on electric usage, a prepaid system requires customers to actively predict their electricity usage before they pay for the correct electricity value. This presents a challenge because Underestimating electricity usage may lead to a power outage. Therefore, a system that monitors electricity can be developed to address this issue. There are two approaches to developing an electric monitoring system: designing the electric meter equipped with monitoring features or designing an external capturing device to work with the current electric meter. The first approach is costly and requires a meter disassembly. Thus, in this paper, the second approach is used. By utilizing image processing and a Random Forest machine learning algorithm, a monitoring device can be developed to read the digital meter's display. Although it may affect performance due to the low-power device, Raspberry Pi 3 and Raspberry Camera are used to provide automation. This method yields an accuracy of 97% using 375 images.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction System on Electricity Consumption using Web-Based LSTM Algorithm 基于web的LSTM算法的用电量预测系统
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5227
Fathoni Waseso Jati, Komang Jaya Bhaskara, F. Hasibuan, Budhi Irawan
{"title":"Prediction System on Electricity Consumption using Web-Based LSTM Algorithm","authors":"Fathoni Waseso Jati, Komang Jaya Bhaskara, F. Hasibuan, Budhi Irawan","doi":"10.25124/cepat.v1i02.5227","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5227","url":null,"abstract":"The technology development from year to year is increasing rapidly, especially in the electronics devices such as notebooks and smartphones. With the rapid development of technology, lifestyle habits have also changed. This can lead to an increase in the use of electrical energy. In addition, the negligence of electricity users in monitoring electricity usage at the place of the electricity meter also causes an increase in electrical energy. Monitoring the electricity meter in real time can limit the user from manage their electricity efficiently. This study aims to create a web-based electrical energy usage prediction system. This system can make it easier for users to manage and reduce waste of electrical energy. In the development of this system, it begins by collecting image data of remaining electricity which are processed manually into electrical energy consumption data. Then the data is pre-processed so that the data is clean and ready to use. The clean data is carried out by the process of making a Long-Short Term Memory (LSTM) model which was chosen because it can overcome Time Series and Non-Linear data types. LSTM model is designed to be able to predict the use of electrical energy. Then do the web application design as an interface on the predictive data. Based on the results of the test, the LSTM model can predict the use of electrical energy with a Loss Mean Square Error (MSE) value of 0.0071. While the results of website testing carried out with the alpha test get an accuracy of 100% and a beta test of 82.64%.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129835804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The IMPLEMENTATION OF BLOCKCHAIN AS COVID-19 TEST AND VACCINE CERTIFICATE STORAGE SYSTEM 区块链作为COVID-19测试和疫苗证书存储系统的实现
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5189
Dendi Arya Raditya Prawira Putra, Yudha Purwanto, Marisa W. Paryasto
{"title":"The IMPLEMENTATION OF BLOCKCHAIN AS COVID-19 TEST AND VACCINE CERTIFICATE STORAGE SYSTEM","authors":"Dendi Arya Raditya Prawira Putra, Yudha Purwanto, Marisa W. Paryasto","doi":"10.25124/cepat.v1i02.5189","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5189","url":null,"abstract":"The existence of the Covid-19 virus, which was first announced at the end of 2019, in a short time was able to cause a pandemic. To overcome this, the government implemented a protocol that integrates Covid-19 test results and vaccination certificates into an application, with the aim that individuals can prove that they are free from Covid-19 infection and can return to normal activities. However, a centralized system is prone to single point of failure and data manipulation from the intervention of certain parties due to a lack of transparency. This paper proposed the use of Ethereum blockchain and smart contracts to solve this problem. By Using blockchain technology and smart contracts, the data management process will be more transparent since every transaction on the blockchain is recorded by each node. Blockchain also prevents a single point of failure because there are more than one data providers. The system that has been developed has fulfilled the security and privacy aspects of patient data by implementing password-based encryption on patient data. However, the system’s response time is strongly influenced by the computational capabilities of the Rinkeby network. On average, the system took 47,9 seconds to register a new certificate.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122480266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web Scraping On Forecast Report Form Of Geomagnet 地磁预报报表的网络抓取
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5226
S. C. Pranoto
{"title":"Web Scraping On Forecast Report Form Of Geomagnet","authors":"S. C. Pranoto","doi":"10.25124/cepat.v1i02.5226","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5226","url":null,"abstract":"The increasing information encourages the development of new technologies so that data and information processing can be done easily and quickly. One of them in terms of obtaining information obtained from the website and most of the current studies targeting this task are mostly about automated web data extraction. Web scraping is a process of extracting valuable and interesting text information from web pages. To realize space weather prediction information services, including geomagnetic activity, Forecast Report Form of geomagnetic (FRF) application was developed using the web scraping method. The results obtained indicate that web scraping reliable for collecting large amounts of data more quickly automatically, efficient and can present expected result. Black box testing is used to test the web scrapping process.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114396498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Neuromarketing in Consumer Behavior due to Product Logos Color Changes Effect 产品标志颜色变化效应对消费者行为的神经营销研究
[CEPAT] Journal of Computer Engineering: Progress, Application and Technology Pub Date : 2022-08-30 DOI: 10.25124/cepat.v1i02.5245
Denta Rahmadani, Hilman Fauzi, Reza Armanda Lubis, Maya Ariyanti
{"title":"Study of Neuromarketing in Consumer Behavior due to Product Logos Color Changes Effect","authors":"Denta Rahmadani, Hilman Fauzi, Reza Armanda Lubis, Maya Ariyanti","doi":"10.25124/cepat.v1i02.5245","DOIUrl":"https://doi.org/10.25124/cepat.v1i02.5245","url":null,"abstract":"Consumer behavior can be detected by conducting surveys, but this method lacks the depth of analysis to measure consumer behavior. By utilizing technological and scientific advances through the study of neuroscience, especially in neuromarketing, it is hoped to improve the ability to analyze consumer behavior. Neuromarketing has been widely used to measure consumer behavior through several stimuli, including logo colors. Neuromarketing to the human brain's response is done using electroencephalography (EEG) signal analysis. Data collection was carried out on six students aged 19-24 years. Subjects were given a stimulus of five original logo colors and five logo colors recolored with the number of questions in three sessions. Pre-processing uses a butterwort horde four bandpass filter with a theta-band frequency band in the frequency range of 4-8 Hz. Data on color changes using questionnaires and EEG signal data is processed on spatial and spectral domains to view active areas of short-term memory. The result obtained is the effect of the change in logo color on consumer memory and the active location of short-term memory on the logo's color. Using spatial selection, the number of channels was reduced from 16 to 4 channels or by 75%. The selected channels are in the memory and visual areas.","PeriodicalId":301532,"journal":{"name":"[CEPAT] Journal of Computer Engineering: Progress, Application and Technology","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信