Today banks have many branches in big cities of the world. System usually used a central database in a particular city. Increased of database server performance due to number of users accessing this application should not degrade performance of application. To keep database server performance optimally, application must distributed to the network. In distributed applications it takes a remote method call, that is why we are going to used Remote Method Invocation to develop this system. Based on results of analysis conducted, author can draw following conclusion of the application, which is once the client get a reference from the remote object then method of remote object is called like calling method from local object and methods that we have defined and implemented on remote object can we call or use both on desktop and web applications so we do not need to work twice. This approach makes more effective and efficient in application development, allows for better optimization, eliminates the need for processing of type information at run time and makes a light weight communication protocol possible. We have built a hybrid application, which supports both compile time and run time generation of marshallers in desktop and web application.
Mobile phone has become one of the essential plugins of our society. The basic definition of mobile phone from its first breath till day has been evolved into an application which provides you the services of your demand via appropriate servers. This paper also talks about a similar service; the idea is to create a social bridge between experts of different crafts and normal persons via GSM network and internet; so that they can communicate with each other when required. Client will send his query to
our server, this server will multicast the query to the cabinet of experts of related category, the replies of the experts either from GSM network or Website will be then unicast to the client. All the queries and responses will be saved in a centralized Database server.
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
Mobile phone has become one of the essential plugins of our society. The basic definition of mobile phone from its first breath till day has been evolved into an application which provides you the services of your demand via appropriate servers. This paper also talks about a similar service; the idea is to create a social bridge between experts of different crafts and normal persons via GSM network and internet; so that they can communicate with each other when required. Client will send his query to
our server, this server will multicast the query to the cabinet of experts of related category, the replies of the experts either from GSM network or Website will be then unicast to the client. All the queries and responses will be saved in a centralized Database server.
At Softroniics we provide job oriented training for freshers in IT sector. We are providing IEEE project guidance and Final year project guidance. We are Pioneers in all leading technologies like Android, Java, .NET, PHP, Python, Embedded Systems, Matlab, NS2, VLSI, Modelsim, Tanner, Xilinx etc. We are specializiling in technologies like Big Data, Cloud Computing, Internet Of Things (iOT), Data Mining, Networking, Information Security, Image Processing and many other. We are providing long term and short term internship also. We are also providing IEEE project support at Calicut, Thrissur and Palakkad. For more details contact 9037291113, 7907435072
A Mobile Messaging Apps: Service Usage Classification to Internet Traffic and...dbpublications
The rapid adoption of mobile
messaging Apps has enabled us to collect massive
amount of encrypted Internet traffic of mobile
messaging. The classification of this traffic into
different types of in-App service usages can help for
intelligent network management, such as managing
network bandwidth budget and providing quality of
services. Traditional approaches for classification of
Internet traffic rely on packet inspection, such as
parsing HTTP headers. However, messaging Apps are
increasingly using secure protocols, such as HTTPS
and SSL, to transmit data. This imposes significant
challenges on the performances of service usage
classification by packet inspection. To this end, in this
paper, we investigate how to exploit encrypted Internet
traffic for classifying in-App usages. Specifically, we
develop a system, named CUMMA, for classifying
service usages of mobile messaging Apps by jointly
modeling user behavioral patterns, network traffic
characteristics, and temporal dependencies. Along this
line, we first segment Internet traffic from trafficflows
into sessions with a number of dialogs in a
hierarchical way. Also, we extract the discriminative
features of traffic data from two perspectives: (i)
packet length and (ii) time delay. Next, we teach a
service usage predictor to classify these segmented
dialogs into single-type usages or outliers. In addition,
we design a clustering Hidden Markov Model (HMM)
based method to detect mixed dialogs from outliers
and decompose mixed dialogs into sub-dialogs of
single-type usage. Indeed, CUMMA enables mobile
analysts to identify service usages and analyze enduser
in-App behaviors even for encrypted Internet
traffic.
Sending the data already gathered from the client to the Serverhussam242
as I believe that spending a lot of time at work is becoming a social problem , and people do not have time for family ,sport and other activities , I created “LOGGER” , it is a monitoring application for employees at work, it controls the time they spent on social media while they are at work , it is also an application that interfere with the user by sending alarm massages when it thinks it’s the need to and alarm the users to get back to work so they finish work early and go back to family/sports , social activities so there will be time for everything !
in this essay i will be talking about how to send the collected data from the monitored computer to the server .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
Privacy preserving relative location based services for mobile users
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Offline and Online Bank Data Synchronization Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The aim of this project is to make online university service based on composite service offered by service producer. Application is constructed out of services like student information service, payment gateway service, adhar information service. In this project, student information service is open to all university application so that information distribution is possible.
Sending the data already gathered from the client to the Serverhussam242
as I believe that spending a lot of time at work is becoming a social problem , and people do not have time for family ,sport and other activities , I created “LOGGER” , it is a monitoring application for employees at work, it controls the time they spent on social media while they are at work , it is also an application that interfere with the user by sending alarm massages when it thinks it’s the need to and alarm the users to get back to work so they finish work early and go back to family/sports , social activities so there will be time for everything !
in this essay i will be talking about how to send the collected data from the monitored computer to the server .
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
Privacy preserving relative location based services for mobile users
Do Your Projects With Technology Experts
To Get this projects Call : 9566355386 / 99625 88976
Web : http://www.lemenizinfotech.com
Web : http://www.ieeemaster.com
Mail : projects@lemenizinfotech.com
Blog : http://ieeeprojectspondicherry.weebly.com
Blog : http://www.ieeeprojectsinpondicherry.blogspot.in/
Youtube:https://www.youtube.com/watch?v=eesBNUnKvws
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This paper is an attempt to base on auctions which
presents a frame work for the secure multi-party decision
protocols. In addition to the implementations which are very
light weighted, the main focus is on synchronizing security
features for avoiding agreements manipulations and reducing
the user traffic. Through this paper one can understand that
this different auction protocols on top of the frame work can
be collaborated using mobile devices. This paper present the
negotiation between auctioneer and the proffered and this
negotiation shows that multiparty security is far better than
the existing system.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Offline and Online Bank Data Synchronization Systemijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
The aim of this project is to make online university service based on composite service offered by service producer. Application is constructed out of services like student information service, payment gateway service, adhar information service. In this project, student information service is open to all university application so that information distribution is possible.
Techniques to Minimize State Transfer Cost for Dynamic Execution Offloading I...IJERA Editor
The recent advancement in cloud computing in cloud computing is leading to and excessive growth of the mobile devices that can become powerful means for the information access and mobile applications. This introducing a latent technology called Mobile cloud computing. Smart phone device supports wide range of mobile applications which require high computational power, memory, storage and energy but these resources are limited in number so act as constraints in smart phone devices. With the integration of cloud computing and mobile applications it is possible to overcome these constraints by offloading the complex modules on cloud. These restrictions may be alleviated by computation offloading: sending heavy computations to resourceful servers and receiving the results from these servers. Many issues related to offloading have been investigated in the past decade.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Software engineering based fault tolerance model for information system in pl...IJECEIAES
The rapid development of mobile phone technologies in recent years promoted them for being used in various areas of life, such as commercial, health, transportation and tourism and other uses. In this paper, a software engineering based fault tolerance model is proposed to manage the expected faults in the adopted servers. The underlying QR based information system in plants shopping center employs different local serves allocated at local shops that are connected to the main server. In a fault case detection at any local server, the main server can cover the management of the system until the maintenance is completed. This is performed in efficient way as the main server keeps a copy of the information for all local branches. It is important to note that the self-checking process is adopted for fault detection. After completing the maintenance, a copy of the updated information is sent back to the investigated local server including all sales, etc. Moreover, the main and local servers contain information about all offer’s plants in different languages and in text and image form, customer's information and admin's information. The proposed system is tested in several cases to prove the efficiency and effectivity in retrieving and managing information and data as well as the fault tolerance administration.
In distributed systems,to search out information is costly task because they have to be compel led to transfer information from node containing information to the node wherever query is generated,this will l consume latency,network traffic etc.For reducing these parameters mobile agents are accustomed fetch information from nodes wherever i nformation resides. Alongside mobile agents directory containing information concerning database kept on completely different nodes is employed to focus retrieval method solely to those nodes that are containing answers to the query. 3 kinds of agents area unit accustomed fetch data specifically ly coordi nator,search and local agent.
BUSINESS CASE CAPSTONE2BUSINESS CASE CAPSTONE3.docxjasoninnes20
BUSINESS CASE CAPSTONE 2
BUSINESS CASE CAPSTONE 3
Business Case Capstone
Connie Farris
Raphael Brown
Jim Chambers
Shaun Cummings
Deandre Kralevic
Colorado Technical University
IT Capstone II
(IT488-1904B-01)
Henrietta Okora
Running head: BUSINESS CASE CAPSTONE 1
Business Case Capstone
Table of Contents
(Week 1) Section 1: Overview of the project (from IT487)3
Overview3
I75 Corridor4
Section 2: Requirements (from IT487)5
Section 3: Design (from IT487)7
Section 4: System development methodology9
Section 5: Work breakdown structure11
Section 6: Communication Plan13
(WEEK 2) Section 7: Quality Assurance Plan TBD15
(WEEK 3) Section 8: Documentation Plan TBD16
(Week 4) Section 9: Quality Assurance and results of test-case execution TBD17
Section 10: Project Closure18
References:19
(Week 1) Section 1: Overview of the project (from IT487)Overview
The Galactic Customer IT Services is IT Support Company with over 250,000 employees with companies in over 50 states with the main headquarters located in Gainesville, FL. The location chosen for the headquarters is based on a Telco Gateway Infrastructure that the main fiber-optic truck line runs along the I75 corridor, from Miami Lakes FL to the northern part of Michigan. This I75 corridor plays an important part of the Networking ability for the organization. The Galactic Customer IT Services is an IT support company, which provides IT support to various small to large companies both within the Unites States and support to various military bases overseas. This large customer service company has installed application software to its large Help Desk ticketing system. The next phase being implemented is the upgrading of its Networking Infrastructure, which also includes cloud-based networking. This Organization has several new updated Servers ready to install on the network. With the previous project being accepted the organization has decided to move forward to improving its networking infrastructure, however the organization has request the project team to draft a plan that requires the following in the plan: Requirements, Design, System Development Methodology, WBS (Work Breakdown Structure), Communications Plan, Quality Assurance Plan, Documentation Plan, and Quality Assurance and results of test-case execution be the project can be closed. I75 Corridor
http://gregkantner.com/blog/wp-content/uploads/2012/05/interstate-75-map.gif
Section 2: Requirements (from IT487)
The project requirements here are derived from the software requirements for the Galactic customer services. The project was to create new ticketing software that the customer wanted upgraded and to completely replace the previous product. The requirements are the following:
• Ticket system
• Ticke ...
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
In this paper, snake optimization algorithm (SOA) is used to find the optimal gains of an enhanced controller for controlling congestion problem in computer networks. M-file and Simulink platform is adopted to evaluate the response of the active queue management (AQM) system, a comparison with two classical controllers is done, all tuned gains of controllers are obtained using SOA method and the fitness function chose to monitor the system performance is the integral time absolute error (ITAE). Transient analysis and robust analysis is used to show the proposed controller performance, two robustness tests are applied to the AQM system, one is done by varying the size of queue value in different period and the other test is done by changing the number of transmission control protocol (TCP) sessions with a value of ± 20% from its original value. The simulation results reflect a stable and robust behavior and best performance is appeared clearly to achieve the desired queue size without any noise or any transmission problems.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
2. TELKOMNIKA ISSN: 1693-6930 ◼
Hybrid distributed application in banking transaction using remote .... (Agus Cahyo Nugroho)
2209
2. Research Method
This research is different from other research before because we are trying to create
two different applications which are desktop and web application that are using the same
methods or functions located in desktop application, so everytime we are going to changed
methods or functions we do not have to work twice. We only work once to changed methods or
functions in the desktop application after that both desktop and web application can used or
called that methods or functions. The web application is capable to call methods or functions in
desktop application through servlet. This make the development time more effective
and efficient.
Earlier research [6] stated that unlike previous approaches where only application
services can be invoked, Android RMI allows users to invoke system services as well as
application services between devices using remote parcel format. By reducing the number of
marshalling and unmarshalling steps, the time taken for remote method invocation is shortened
by 148% in 4 KBytes and by up to 432% in 100 KBytes compared to distributed intent where
additional marshalling and unmarshalling steps are needed.
Another earlier research [7] stated that present day's amount of computational
requirements has shifted the processing of data from the regular way to parallel way of
computation. Pipelined processors, array processors can be employed to construct design of
parallel hardware. These systems constructed can be further extended with the help of scalar
and super scalar systems. We provide an efficient way of implementing Winograd's variant of
Strassen's matrix multiplication on parallel systems by making use of RMI (Remote Method
Invocation) which provides us distributed object oriented programming, multithreading
programming. Multithreading approach helps a lot in concurrent, dynamic and
asynchronous programming.
2.1. Remote Method Invocation (RMI)
Remote Method Invocation is a specification that allows a Java Virtual Machine
(JVM) [8] to call methods of that object located on another Java Virtual Machine (JVM). Both
JVM's can run on a different computer or running as a separate process on same one
computer. RMI is implemented in middle-tier [9] of three-tier framework architecture, this
facilitates programmer to invoke distributed components over network. Sun introduced RMI as
an easy to complex alternative in server-socket programming [10]. In using RMI, programmer
does not need to master socket or multi-threading programming [11], as needed just
concentrate on developing business logic [12].
RMI distributed application has two components: RMI Server [13] and RMI Client [14].
RMI Server consists of objects whose methods will called remotely. The server created some
remote objects later create references from those objects in RMI Registry [15]. RMI Registry is
service that runs on RMI Server. Remote objects created by server then listed in this registry
according to unique name of the object. Client refers one or more remote objects from RMI
Registry to see name of object. Then client calls methods on remote object. Once client refers
to the remote object, methods on remote object called as calling method on local object. This
difference can not be identified whether method is called on remote object or called on local
object in client.
RMI architecture consist of three layer: Stub/Skeleton Layer [16], Remote Reference
Layer [17] and Transport Layer [18]. Stub/Skeleton Layer is waiting for remote method call by
client and forward it to the remote RMI Service on server. This layer consists of a Stub and a
Skeleton. To call methods on remote object, request on the client side starts with Stub. Stub is a
proxy on client side representing remote object. Stub is referenced as another local object by
program that runs on client and provide methods of remote objects. Stub communicates method
call on remote object via implementation of skeleton on server. So, Stub on client collects
information consisting of: identifier of remote object to be used, description of method we will
call and parameters that have been marshalled.
Skeleton is a server-side proxy that forwards communication with Stub, by reading
parameters at method call, then make a call to remote service object that is implemented,
receive return value, then write return value to Stub. So Skeleton on server does things below
every time there is a Remote Method Invocation: unmarshals parameters, search for called
object, calling desired method, catch and marshals return or exception value of calling and
submitting a packet consisting of returned value marshalled to Stub on client.
3. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2208-2217
2210
Remote Reference Layer interprets and manages references of client to remote object
on server. This layer is present both on client and server. RRL on client side receives a request
method from Stubs are sent as marshaled streams from data to RRL on server side.
Marshalling [19] is a process which are parameters passed by client converted to a format that
can be sent over network. RRL on server side unmarshals parameters sent to remote method
through Skeleton. Unmarshaling is a process which are marshaled parameters passed by RRL
on client side via RRL on server side changed to the format which is understood by Skeleton.
When returning value from Skeleton, data marshaled back and communicated to client via RRL
on server side.
Transport Layer is a link between RRL on server side and RRL on client side. Transport
Layer is responsible for setting up new connections and setting up an existing connection.
Transport Layer is also responsible for handling remote object in address space. Below are
steps that explain how client connected to server: when receiving request from RRL on client
side, Transport Layer create a socket connection to server via RRL on server side. Then,
Transport Layer skips connection that already connect to RRL on client side and add remote
reference to connection on connection table.
Based on the RMI specification, steps in developing distributed RMI application: defines
remote interface class, defines and implement various remote method in server class. Defines
and implement client class. Compile source files. Source files include those files contains
definition of remote interface, which server class defines the implementation of remote interface
and client class. Generating Stub and Skeleton. Create a security policy [20]. Run RMI Remote
Registry [21]. Run server. Run client.
In a three-tier architecture, presentation logic is on client-side, access database is
controlled by server-side, and business logic lies between two other layers. Business logic layer
is also known as application server or middle-tier of component-based three-tier architecture.
This type of architecture, too known as server-centric [22], because it allows application
components to path on middle-tier application server then implements business rule, so it
separated between presentation interface and database implementation. This component can
be developed using any programming language that allows component creation. These
components can be created centralized to facilitate the development, maintenance, and
deployment. Because middle-tier handles business logic, workload becomes balanced between
client, database server and server that handles business logic. This architecture leads to
efficient data access. Problem regarding limitations of connection to database is minimized
because database only view business logic layer and not whole client. Unlike in two-tier
application, database connection occurs at beginning and then set as long as it is still access
data, while in three-tier application database connection takes place only when data access is
required and released when data is returned or sent to server.
This various advantages motivated author to use RMI in case of banking transactions.
This method is considered very appropriate for banking transactions that handle large number
of customers and prospective customers. Because of that reasons data access needed
efficiently and minimize limitations of connections to database.
2.2. Servlet
Servlet [23] is a Java program that can be deployed on Java enabled Web server [24] to
make maximum functionality of Web server. Servlet can be used to develop various web-based
applications. Servlet developed using Java so we can use various advantages of Java API, this
is why we can use servlet to access RMI. Therefore, author uses servlet in development of
application that handle banking transactions via browser. Servlet works by client or browser to
send request to server using GET or POST method. Example: servlet can be called as a result
of user pressing user-interface component, such as buttons on web page form. After request
processed by servlet, output is returned to client in form of html page.
Java supports servlet implementation through javax.servlet and javax.servlet.http
package. Interface javax.servlet.Servlet provides general framework in manufacture of servlets.
Servlet can implement equally either directly or indirectly by extend class
javax.servlet.GenericServlet or javax.servlet.http.HttpServlet. GenericServlet class of
javax.servlet package is used to create servlets that can work with various protocols. Package
javax.servlet.htpp is used to create a HTTP servlet generate output in form of HTML pages.
4. TELKOMNIKA ISSN: 1693-6930 ◼
Hybrid distributed application in banking transaction using remote .... (Agus Cahyo Nugroho)
2211
Class used to make HTTP servlet called HttpServlet and derived from class GenericServlet.
Complete description about this HttpServlet class/interface can be seen in Table 1.
Table 1. Class/Interface Description
Class/Interface Name Description
HttpServlet class
Provide specific HTTP implementations from Servlet interface.
This class is extended GenericServlet class that provides
framework to handle different types of networks and
Web service.
HttpServletRequest interface Provides methods to process requests from clients.
HttpServletResponse interface
Responding to requests from clients sent back in HTML page
format through object of HttpServletResponse interface.
ServletConfig interface
Used to store start servlets value configuration and initialization
parameters. getServletConfig () method of Servlet interface
used to obtain information about configuration values of servlet.
Servlet is loaded only once in memory and initialized during init () method called.
After servlet is initialized, servlet is ready to accept request from client and process request
through service () method until it is stopped by the destroy () method. Service () method is
called every time there is a request. Life cycle of servlet is described as we can seen in
Figure 1. Table 2 illustrates some of methods used in servlet creation.
Figure 1. Servlet lifecycle
Table 2. Function Method in Servlet Creation
Method Name Function
Servlet.init(ServletConfig config) throws ServletException
Contains all servlet initialization code and called when
servlet is first loaded.
Servlet.service(Servlet Request, Servlet Response)
Receive all requests from client, identify request type,
and dispatch request to doGet () or Post () for
processing.
Servlet.destroy()
Executed only once when servlet is on remove from
server.
ServletResponse.getWriter()
Returns reference to object PrintWriter. Class
PrintWriter is used to write an object that is formatted
as text-output stream in the client.
ServletResponse.setContentType (String type)
Set the type of content that is sent as a response to
client. Example: setContentType ("text / html") is used
to set response type as text.
5. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2208-2217
2212
2.3. Java 2 Enterpise Edition (J2EE) Server
Java 2 Enterprise Edition (J2EE) [25] is a set of specifications that define standards in
manufacture of distributed objects. J2EE also set up how this technology can be integrated to
provide that complete solution. J2EE is also standard architecture that facilitate to multi-tiered
programming model. J2EE server is used to deploy servlets and JSP [26] files allow users to
access it by applying proper security.
2.4. Data Flow Diagram (DFD)
Data Flow Diagrams [27] are diagrams that describe data process along with flow in
business system. We are going to make two Data Flow Diagrams. The first one is for Web
Application, second one for Desktop Application.
2.5. Data Flow Diagram Web Application
The first one is Data Flow Diagram for Web Application, we can see in Figure 2.
Complete explanation about this Data Flow Diagram for Web Application we can see
below Figure 2.
Figure 2. DFD web application
Explanation of Data Flow Diagram (DFD) Web Application above:
- Customers send their data (customer info) as a registration condition to bank customers.
System stores customer’s personal data on Bank database Registration table.
- After becoming a bank customer, user obtains account number and Personal Identification
Number (PIN) that can be used for login to system. System checks account number and
Personal Identification Number (PIN) user to Bank database Login table, if true then user
can log into system.
6. TELKOMNIKA ISSN: 1693-6930 ◼
Hybrid distributed application in banking transaction using remote .... (Agus Cahyo Nugroho)
2213
- On the next page user can transfer to account other customers. This transaction is recorded
on Bank database Account Holder Transaction table. Then there is an adjustment (balance)
both on sender's account and transfer recipient on Bank database Account Holder table.
- Customer receives report that transfer succeeded and their last balance.
2.6. Data Flow Diagram Desktop Application
The second one is Data Flow Diagram for Desktop Application, we can see in Figure 3.
Complete explanation about this Data Flow Diagram for Desktop Application we can see in
Figure 3.
Figure 3. DFD desktop application
Explanation of Data Flow Diagram (DFD) Desktop Application above:
- Officer (Teller) to register data of prospective customers to Bank database
Registration table.
- Officer (Teller) must login to system for using all system facilities.
- Officers (Teller) can perform transactions such as deposits, withdrawals and transfers, all
transactions are recorded as AccountHolderTransaction Info on Bank database table
AccountHolderTransaction.
- After transaction done, made account adjustment (account balance) on Bank database
Account Holder table.
- All transactions that have occurred in branches are recorded at Bank database
CounterTransaction table.
- Lastly adjusted branch balance (counter balance) on Bank database Counter table.
- System gives report that transaction has been successful or failed and last balance.
7. ◼ ISSN: 1693-6930
TELKOMNIKA Vol. 17, No. 5, October 2019: 2208-2217
2214
3. Results and Analysis
Here is the implementation of system.
3.1. Implementation of Servlet
We are using Servlet to access same method that desktop application used. In Figure 4
is web login page that call method in the firstservlet. We are using Account Server
server=(Account Server)Naming.lookup ("rmi://localhost/ AccountServer"); in Figure 5 to get
reference from remote object implementation. Method lookup using name that we are registered
to the server as parameter. Beside that, we are calling menuservlet not because of button click
but by Request Dispatcher interface. We are sharing account number attribute in Figure 6 using
Servlet Context context=getServletContext(); Object obj=context.getAttribute("accountnumber");
Because account number data type is integer then we need to parsed it to String so we can
compared it. After that checked the session.
Figure 4. Web login page
Figure 5. First servlet
Figure 6. Menu servlet
8. TELKOMNIKA ISSN: 1693-6930 ◼
Hybrid distributed application in banking transaction using remote .... (Agus Cahyo Nugroho)
2215
3.2. Desktop Application
Registration menu is menu that appears when teller input customer information for first
time like in Figure 7. If registration is successful system will give output that registration is
successful and inform customer account number as well as initial PIN to login via web
application. A window informing you that registration was successful can be seen in Figure 8.
In Figure 9 we can see login page of desktop application. Teller must insert username and
password for using menus in system.
Figure 7. Registration menu
Success
Your Account Number YG04507
PIN 90945
Tell Customer to change Password through Website.
Ok
Figure 8. Successful information window
Earnest Bank – Login Page _ X
User Name ........................................................
Password ........................................................
Submit
Figure 9. Desktop login page
3.3. Web Application
Login web page is page that appears when customer already registration through teller
(desktop application) and get PIN to login through web page like in Figure 10. In Figure 11 we
can see main menu of web system. In Figure 12 we can see transfer menu of web system.
Earnest Bank
Enter your account number here ........................................................
Enter your PIN here ........................................................
Submit
Figure 10. Web login page
10. TELKOMNIKA ISSN: 1693-6930 ◼
Hybrid distributed application in banking transaction using remote .... (Agus Cahyo Nugroho)
2217
[13] KJ Chou, MIW Huang, T Lee, BN Soetarman, RN Summers, MPT Vo. Architecture and
implementation of a dynamic RMI server configuration hierarchy to support federated search and
update across heterogeneous datastores. U.S. Patent 7,197,491. International Business Machines
Corp. 2007.
[14] D Hou, H Xia. Design of distributed architecture based on java remote method invocation
technology. Environmental Science and Information Application Technology, 2009. ESIAT 2009.
International Conference on. 2009; 2: 618-621.
[15] K Kang, J Lee, H Choi. Extended service registry for distributed computing support in osgi
architecture. Advanced Communication Technology, 2006. ICACT 2006. The 8th International
Conference. 2006; 3: 1631-1634.
[16] MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko. Comparison of performance of Web services,
WS-Security, RMI, and RMI–SSL. Journal of Systems and Software. 2006; 79(5): 689-700.
[17] EH Page, RL Moose Jr, SP Griffin. Web-based simulation in Simjava using remote method
invocation. Proceedings of the 29th conference on Winter simulation. IEEE Computer Society.
1997: 468-474.
[18] P Bajpai, VK Jain, AS Akella. Method and node for employing network connections over a
connectionless transport layer protocol. U.S. Patent 8,750,112. Echo Star Technologies LLC. 2014.
[19] AS Huang, E Olson, DC Moore. LCM: Lightweight communications and marshalling. Intelligent robots
and systems (IROS), 2010 IEEE/RSJ international conference on. 2010: 4057-4062.
[20] J Aarnos, P Pentikainen, Nokia Oy AB. Method for enforcing a Java security policy in a multi virtual
machine system. U.S. Patent Application 11/126,651. 2006.
[21] MB Juric, I Rozman, B Brumen, M Colnaric, M Hericko. Comparison of performance of Web services,
WS-Security, RMI, and RMI–SSL. Journal of Systems and Software. 2006; 79(5): 689-700.
[22] C Guo, G Lu, D Li, H Wu, X Zhang, Y Shi, C Tian, Y Zhang, S Lu. BCube: a high performance,
server-centric network architecture for modular data centers. ACM SIGCOMM Computer
Communication Review. 2009; 39(4): 63-74.
[23] H Cai, W Lu, B Yang, LH Tang. Method for accessing and collaborating between servlets located on
different Java virtual machines. U.S. Patent 7,543,289. International Business Machines Corp. 2009.
[24] N Karapanos. Strengthening Authentication and Integrity in Web Applications (Doctoral dissertation,
ETH Zurich). 2018.
[25] J Pachouly, V Dange. Automating live update for J2EE applications over distributed environment.
International Journal of Advanced Technology and Engineering Exploration. 2018; 5(43): 99-106.
[26] TD Samaranayake, WPJ Pemarathane, B Hettige. Solution for event-planning using multi-agent
technology. Advances in ICT for Emerging Regions (ICTer), 2017 Seventeenth International
Conference on. 2017: 1-6.
[27] K Tiwari, A Tripathi, S Sharma, V Dubey. Merging of Data Flow Diagram with Unified Modeling.
International Journal of Scientific and Research Publications. 2012: 2(8): 1-6.