Volume 9, Issue 12, December 2017

 

 

Braille and Text To Speech Using Digital Signal Processing for Visually Impaired Individuals
 

Braille and Text To Speech Using Digital Signal Processing for Visually Impaired Individuals

Pages: 277-283 (7) | [Full Text] PDF (417 KB)
JLV Abamo, SC Ambat
School of Graduate Studies, AMA University, Quezon City, Philippines

Abstract -
In the Philippines, half a million are blind and many more are visually impaired and up to one hundred children lose their sight every week. According to SWS, unemployment rate hit twenty-seven percent equivalents to 12.4 million jobless Filipinos in 2015 of the countrys total population. An annual growth rate of six percent from 2013 to 2015 has been assumed with contribution of students, victims, retired, and PWDs. If this will continue the economic status of the Philippines will fall. BPO Industry boost on the Philippines giving job to the unemployed Filipinos that contributed to the economic growth of the country. BPO consists of call centers, data transcription, back office processing, and etc. Assistive technologies are readily available to assist the PWDs in their daily lives and educating them. In this paper, it will discuss how this technology will contribute to the society as a whole.
 
Index Terms - Social Weather Station (SWS), Person with Disability (PWD), Business Process Outsourcing (BPO), Philippine Statistics Authority (PSA), Census of Population and Housing (CPH), Information and Communications Technology (ICT), Braille; Text-to-Speech

Citation - JLV Abamo, SC Ambat. "Braille and Text To Speech Using Digital Signal Processing for Visually Impaired Individuals." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 277-283.

A Systematic Literature Review on SQL Injection Attacks Techniques and Common Exploited Vulnerabilities
 

A Systematic Literature Review on SQL Injection Attacks Techniques and Common Exploited Vulnerabilities

Pages: 284-291 (8) | [Full Text] PDF (308 KB)
SA Faker, MA Muslim, HS Dachlan
Computer Department, Tripoli University, Tripoli, Libya
Electrical Engineering, Brawijaya University, Malang, Indonesia

Abstract -
Database faces several threats such as Cross Site Scripting Attack (XSS), phishing, Denial of Service (DoS) and SQL injection attack. SQL injection attack is the major concern and the most effective method for stealing the data from backend database, by the help of these attacks hacker can get access to the database and steal sensitive information. Although there are many review papers in the field, they are not systematic literature review (SLR), instead they are a normal survey or literature review. In contrast, this paper followed general guidelines for undertaking SLR in order to exploring the impacts and the types of SQLIA, illustrating the mechanisms and techniques of conducting SQLIA and exploring the most common type of SQLIA. An advanced search has been performed in most relevant digital libraries to obtain potentially relevant articles published until the end of 2016. Primary studies have been identified based on inclusion and exclusion criteria. The analytical study is mainly based on the primary studies to achieve the objectives. The results illustrate the impacts and the types of SQLIA, exploring the impacts and the types of SQLIA and illustrating the mechanisms and techniques of conducting SQLIA.
 
Index Terms - Database attacks, Systematic literature review, SQLIA

Citation - SA Faker, MA Muslim, HS Dachlan. "A Systematic Literature Review on SQL Injection Attacks Techniques and Common Exploited Vulnerabilities." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 284-291.

Analysis Design Learning Agents ITVL with UCD and Face Recognition
 

Analysis Design Learning Agents ITVL with UCD and Face Recognition

Pages: 292-297 (6) | [Full Text] PDF (246 KB)
DH Yohandy, AR Pulakiang, IMN Wiranata, AJ Santoso
Magister Teknik Informatika, Universitas Atmajaya Yogyakarta, Yogyakarta, Indonesia

Abstract -
Usage of technology device is already in our everyday life, and with a corresponding software it helps everyones daily life. Research in this paper is focused on the application of learning agent into one of a technology device, which is ITVL to learn users response and emotion to given media with help from User-Centered Design method in development and Face Recognition for the learning process. Performance of this learning agent will be assessed based on knowledge of response and emotion from user to given media, which is result data from implementation Face Recognition. The aim of this system is user can enjoy and relax and because that reason, User Centered Design approach is used, ITVL as the system of SMART TV is having direct interaction with the user for learning and decide which program need to provide. This system needs to know exactly how human as a user of TV want and expect from the system. And the system must be developed in a way just be right how the user uses a TV, deciding TV programs or channel, time usage, users behavior, and other aspects that can influence the learning process of the system. As for Face Recognition, this concept already been studied a lot and applications of face recognition have been used in any aspects we can see every day, even for games purposes. Face Recognition is a new way to interact and communicate with a smart system for improving ease of use. Furthermore, the product of this research believed can be useful information in development and implementation of artificial intelligence into technology device.
 
Index Terms - Technology Device, Learning Agent, User Centered Design, Face Recognition

Citation - DH Yohandy, AR Pulakiang, IMN Wiranata, AJ Santoso. "Analysis Design Learning Agents ITVL with UCD and Face Recognition." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 292-297.

Application to Determine the Quality of Coconut With Fuzzy Tsukamoto Method
 

Application to Determine the Quality of Coconut With Fuzzy Tsukamoto Method

Pages: 298-303 (6) | [Full Text] PDF (293 KB)
DA Mardani, R Alexander, D Prasetyo, AJ Santoso
Magister Teknik Informatika, Universitas Atma Jaya Yogyakarta, Yogyakarta, Indonesia

Abstract -
Coconut is one of the plants that are important enough to meet the daily needs of human beings. While the expert system is a system that uses human knowledge are recorded in a computer to solve problems which usually require human expertise. Expert system of quality meat selection coconuts is an expert system that is designed as a tool to know the quality of the meat of the coconut fruit. This expert system is built to provide information regarding the prediction of the quality of girth chops coconuts, and can yield a prediction without the need to consult an expert. Research on application of pepers focus to the methods of fuzzy expert system in a tsukamoto. The results of this research are expected to be useful information in the development and implementation of artificial intelligence into hardware (hardware).
 
Index Terms - Coconut, Cocos Nucifera, Expert System

Citation - DA Mardani, R Alexander, D Prasetyo, AJ Santoso. "Application to Determine the Quality of Coconut With Fuzzy Tsukamoto Method ." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 298-303.

Analysis of Prepaid Electricity Monitoring System with SMS Notification
 

Analysis of Prepaid Electricity Monitoring System with SMS Notification

Pages: 304-307 (4) | [Full Text] PDF (229 KB)
RLS Putra, TQ Febia, S Ndala, AJ Santoso
Magister Teknik Informatika, Universitas Atma jaya Yogyakarta, Yogyakarta, Indonesia

Abstract -
Today the electric meter consists of two types, namely postpaid electricity meter and prepaid electricity meter. Postpaid electricity meters are often misused by the public by not making timely payments. So to cope with that created a product of prepaid electricity meter system. In prepaid electricity system PLN today can minimize the problem of delinquent bill payments, but on the side of the community sometimes they often cannot control about their kwh (killo watt hour) balance when not at home or when they are busy until the electricity suddenly runs out. This is because there is no direct notification system to gsm handphone owner. With the sms notification via microcontroller this will be able to solve the problem about the notice about the balance kwh electricity directly to consumers wherever and whenever.
 
Index Terms - Prepaid Electricity, Monitoring System, SMS Notification, Microcontroller, PLN

Citation - RLS Putra, TQ Febia, S Ndala, AJ Santoso. "Analysis of Prepaid Electricity Monitoring System with SMS Notification ." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 304-307.

Cookie-less Browsing
 

Cookie-less Browsing

Pages: 308-312 (5) | [Full Text] PDF (459 KB)
M Al-Ibrahim, N Al-Ibrahim, A Bennakhi
Computing Department, KILAW, Kuwait
Computer Engineering Department, Kuwait University , Kuwait

Abstract -
Cookies are used to help users browse the web using the stateless protocol of HTTP. These cookiescan perform a variety of functions such as user authentication and history tracking. Even though thesecookies are useful, malicious users may try to exploit these cookies by attempting to sniff or hijack a user’scookie. To avoid these attackers, a secure method of using cookie must be developed. This method mustprovide the following services: authentication, confidentiality, integrity, and anti-reply. Several methodshave been proposed in the literature; however none of them seem completely acceptable. In this paper, wepropose two new schemes to securely browse the web without the use of cookies while still maintainingthe advantages that a cookie provides.Cookies are used to help users browse the web using the statelessprotocol of HTTP. These cookies can perform a variety of functions such as user authentication andhistory tracking. Even though these cookies are useful, malicious users may try to exploit these cookiesby attempting to sniff or hijack a user’s cookie. To avoid these attackers, a secure method of using cookiemust be developed. This method must provide the following services: authentication, confidentiality,integrity, and anti-reply. Several methods have been proposed in the literature; however none of themseem completely acceptable. In this paper, we propose two new schemes to securely browse the webwithout the use of cookies while still maintaining the advantages that a cookie provides.
 
Index Terms - Cookies, Session-Hijacking, Web, Client-Server

Citation - M Al-Ibrahim, N Al-Ibrahim, A Bennakhi. "Cookie-less Browsing." International Journal of Computer Engineering and Information Technology 9, no. 12 (2017): 308-312.