Volume 10, Issue 1, January 2018

 

 

Recommendations System for Purchase of Cosmetics Using Content-Based Filtering
 

Recommendations System for Purchase of Cosmetics Using Content-Based Filtering

Pages: 1-5 (5) | [Full Text] PDF (419 KB)
JC Patty, ET Kirana, MSDK Giri
Magister Teknik Informatika, Universitas Atma Jaya Yogyakarta, Yogyakarta, 55281, Indonesia

Abstract -
Over the years, technology has been growing fast. Currently, the rapid development of this technology also has affected the rapid development of the cosmetics industry. Progress in the beauty industry in Indonesia shows many improvements. In Indonesia, there are various specifications of the cosmetic market. Many cosmetic specifications make prospective buyers find it difficult to choose the type of cosmetics that suit their needs. Prospective buyers usually come to the cosmetics counter to find information about cosmetics as desired. However, not all counters can provide appropriate recommendations for the prospective buyer that have no intention of different specifications. The way it is less effective and it also takes a long time.The solution to solve the problem is to make the design of the recommendation system for the selection of cosmetic purchases. The recommendation system aims to facilitate the customers take the right decision in determining which products to be used. The method used in the system of recommendations have been made is Content-Based Filtering method. Content-Based Filtering is done based on common approaches item profiles and user profiles.The system design is built on cosmetics to provide recommendations in accordance with the required specifications of users. Specs shown include cosmetic type, skin type, usage, price, description and pictures.
 
Index Terms - Content Based Filtering, Recommendations System, Cosmetics

Citation - JC Patty, ET Kirana, MSDK Giri. "Recommendations System for Purchase of Cosmetics Using Content-Based Filtering ." International Journal of Computer Engineering and Information Technology 10, no. 1 (2018): 1-5.

CO Gas Detection System for Cigarette Type Filter and Kretek- Using Cluster Method
 

CO Gas Detection System for Cigarette Type Filter and Kretek- Using Cluster Method

Pages: 6-10 (5) | [Full Text] PDF (2.18 MB)
A Rivalto, FDN Putra, MH Wathan, AJ Santoso
Magister Teknik Informatika, Universitas Atma Jaya Yogyakarta, Yogyakarta, 55281, Indonesia

Abstract -
The content of substances and gases in cigarette smoke is very harmful to human health. Inside a cigarette contains a variety of gas content. With a variety of gases contained in cigarette smoke, CO gas (Carbon Monoxide) is one of the most dangerous gases for human health. Seeing the current condition of many people who do not know every day how many harmful gases that enter the body from cigarette smoke, even these gases are also harmful to people around him who do not smoke. By Cluster analysis method where this method determines data with the same characteristics into a "group" that have similarities and also group the data into other groups based on unequal or different characteristics. This paper with case study of sampling 2 types of cigarettes ie Kretek and Filter. These two types of cigarettes we will measure the levels of CO gas contained in each stem with the detection of CO gas that is installed in cigarettes when in suction and on this tool will produce information on the gas that CO will be processed d with the CO gas concentration measurement software on cigarette smoke, from that information we can know the amount of CO gas content in each cigarette smoke pool is sucked and inhaled into the body from cigarettes. Information on this software will be displayed in the form of graphs or numbers based on data threshold of CO gas content into the human body, which is inserted into the information knowledge software through expert (lung health experts).
 
Index Terms - Cigarette Smoke, CO Gas, Filter Cigarette and Clove, Cluster Method

Citation - A Rivalto, FDN Putra, MH Wathan, AJ Santoso. "CO Gas Detection System for Cigarette Type Filter and Kretek- Using Cluster Method ." International Journal of Computer Engineering and Information Technology 10, no. 1 (2018): 6-10.

SYN Flooding Detection and Mitigation using NFV
 

SYN Flooding Detection and Mitigation using NFV

Pages: 11-19 (9) | [Full Text] PDF (534 KB)
T Alharbi, A Aljuhani, H Liu
The Catholic University of America, United States, University of Jeddah, Saudi Arabia
The Catholic University of America, United States, University of Tabuk, Saudi Arabia
The Catholic University of America, United States

Abstract -
A SYN flooding DDoS attack aims to consume the CPU and memory resources of servers that run online services. While hardware-based firewalls play a critical role in network security, they are limited to the resource capacity. Consequently, extreme traffic of DDoS attack renders firewalls and servers inoperational. Therefore, this article presents a defense model against DDoS attacks. The model includes a detection algorithm using DBSCAN clustering. When the algorithm detects SYN patterns, new security rules are automatically generated to block the attack. The proposed solution is to be deployed on Network Functions Virtualization (NFV) where all networking and security functions are software-based instead of hardware-based. Our solution takes advantages of the scalability and automation of NFV to maintain service during DDoS attacks.
 
Index Terms - SYN flood, DDoS, NFV, Firewall

Citation - T Alharbi, A Aljuhani, H Liu. "SYN Flooding Detection and Mitigation using NFV ." International Journal of Computer Engineering and Information Technology 10, no. 1 (2018): 11-19.