cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 1, No 2: December 2012" : 9 Documents clear
Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection Thuzar Hlaing
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.422 KB)

Abstract

Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection System. Feature selection improves classification by searching for the subset of features, which best classify the training data. This paper proposed approach uses Mutual Correlation for feature selection which reduces from 34 continuous attributes to 10 continuous attributes and Fuzzy Decision Tree for detection and diagnosis of attacks. Experimental results on the 10% KDD Cup 99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved high true positive rate (TPR) and significant reduce false positive rate (FP ).DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.591
Using Naïve Bayes and Bayesian Networkfor Prediction of Potential Problematic Cases in Tuberculosis Awad Ali; Moawia Elfaki; Dayang Norhayati
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (603.142 KB)

Abstract

Both Data Mining techniques and Machine Learning algorithms are tools that can be used to provide beneficial support in constructing models that could effectively assist medical practitioners in making comprehensive decisions regarding potential problematic cases in Tuberculosis (TB). This study introduces two machine learning techniques which are Naïve Bayes inductive learning technique and the state of the art Bayesian Networks. These two techniques can be used towards constructing a model that can be used for predicting potential problematic cases in Tuberculosis. To construct a model, this study made have use of data collected from an Epidemiology laboratory. The volume of data was collated and divided into two data sets which are the training dataset and the investigation dataset. The model constructed by this study has shown a high predictive capability strength compared to other models presented on similar studies.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1424
Design and Evaluation of Android Slide Kyeboard for Myanmar Language Nandar Pwint Oo; Ni Lar Thein
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.334 KB)

Abstract

Because of the large character set nature of Myanmar character, currently used Myanmar language soft keyboard look like QWERTY layout on Android devices’s performance is degraded when using on small screens. The users are needed to switch keyboard layout frequently to get their desired characters. To reduce the user keyboard layout switching time, this paper proposed the slide keyboard to set the entire Myanmar character on one screen layout. User study was made by comparing slide keyboard with currently used Myanmar language soft keyboard that look like QWERTY layout (iTextMM). The user preferences and empirical evaluation is also analyzed. According to the evaluation, the parpicipants can take minimum learning time with slide keyboard and can type at a rate of 17 Character per Minutes (CPM) and have got average 0.65 error rates.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1378
Measuring Security in Requirements Engineering Souhaib Besrour; Imran Ghani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (481.534 KB)

Abstract

The aim of this paper is to measure the security and related verification method in requirements engineering (RE). There are a few existing approaches to measure RE performance like IEEE Software Requirements Specification (SRS) and Security Quality Requirements Engineering (SQUARE). However, these existing approaches have some limitations such as lack of flexibility and require long implementation period. In order to address these issues, this paper intends to propose a new set of tools. First is the Effective Security Check List (ESCL), which is a check list with security questions that should be considered for measuring security. Secondly, the Traceability Matrix(TM), which is a two dimensional matrix to measure security during RE. Thirdly, Requirement Engineering Assessment Document (READ), which is a tool containing all statistical information about security performance during RE.  The combination of presented approaches had been implemented in a case study. The outcome results are encouraging and illustrated integrated outcomes within existing RE model. The security level had also been properly measured.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.695
Application of MIMO Technology to Systems Beyond 3G Ibikunle Frank; Olowononi Felix
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1764.688 KB)

Abstract

The evolution of mobile Broadband over the years has been phenomenal and worthy of attention by academics, researchers, the corporate world and users alike. From the days of the First Generation (1G) through the Third Generation (3G) communication systems, the evolution has continued and has been largely influenced by an ever increasing demand for improved services and greater capacity evident in higher data rates, wider and improved coverage, improved spectral efficiency and lower latency. In response to these demands and to address some of the loopholes of the 3G networks, the 3rd Generation Partnership defined the Long Term Evolution (LTE). LTE though an evolving technology is widely accepted due to its unprecedented promised performance. As the evolution continues, the design of the ‘LTE-Advanced’ is already in progress and has been tagged different names such as the ‘4G’ and ‘Beyond 3G’ (B3G). The main backbones behind these evolutions are technological developments in the underlying mobile radio technology such as multicarrier technology (majorly OFDMA), multiple-antenna technology (MIMO) and the application of packet-switching to the radio-interface through improvements in techniques like adaptive scheduling in both the frequency and spatial dimensions, link adaptation of modulation and code-rate and several modes of fast channel state reporting. This paper is set to present the multiple antenna technology and how it contributes to the delivery of the expectations of the wireless communication systems beyond 3GDOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1482
Reduction Techniques of Peak-to-Average Power Ratio in MC-CDMA Systems Mayada Faris Ghanim; M.F.L Abdullah
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (620.092 KB)

Abstract

The high peak-to-average power ratio (PAPR) is one of the main disadvantages of multicarrier code division multiple access (MC-CDMA) system. To reduce the PAPR of multicarrier CDMA signals, a lot of studies have been focused on the power characteristics of spreading sequences. This paper presents the main techniques to reduce the PAPR in MC-CDMA like Amplitude Clipping and Filtering, Coding, Selective Mapping, The adaptive predistortion technique and DFT Spreading. Then a comparison of all these techniques is done in order to clarify the main advantages and disadvantages of each technique.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.558
A New Proxy-Protected Signature Scheme Based on DLP Swati Verma; Birendra Kumar Sharma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (228.274 KB)

Abstract

During electronic communication, proxy signature helps the signer to sign message on behalf of the original signer. This type of signature scheme is used when the signatory is not available to sign this document. In this paper, we propose a new protected proxy signature scheme. In the proposed scheme, the proxy signer can sign message on behalf of the original signer with the different type of public key. The proposed scheme satis es unforgeability, undeniability, non-transferability and distinguishability properties which are the most important security requirements for a proxy signature.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1479
Web-Based Solution for Mapping Application using Open-Source Software Server Jyoti Sarup; Vimal Shukla
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (744.356 KB)

Abstract

Web GIS is an advance technology to manage and display all geographical locations on the earth surface. This paper deals with road analysis, to find the shortest path of route etc. so that these types of information can be displayed using Geographical Information System (GIS) technique. The approach combines both spatial and non-spatial data. This paper highlight, the suitability to handle spatial and non-spatial attributes of road features and to display and publish in web based GIS platform. This also commences the suitable software server. This paper deals with Web mapping application using different free tools and Open Source Software server (FOSS) and provides the free server solutions. Open-source software has the advantages of low cost, high stability and security, so it is preferred by the small and medium-sized Web GIS project. In this paper Web based Web-GIS architecture is described and implemented using open source Web-GIS tools like GeoServer, PostGIS and OpenLayers. An area of Bhopal City, M.P. Nagar has been chosen and road network was created in Q-GIS and published in WebGIS Server solutions. This has been used for centralized visualization of geospatial data present in various spatial databases located in different locations. This may have help to developing countries which cannot afford to use such solution. Hence there was a necessity of an open source Web-GIS application that should be both powerful for visualizing and cost effective.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1490
Analysis Quality of Service from Internet Protocol Television (IPTV) Service Aiman Mobiu; Dr. Widyawan; Rudy Hartanto
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.024 KB)

Abstract

IPTV was convergency product between broadcasting, telecommunication and information technology because gave multimedia service such TV broadcasting, video, audio, text, and data that transmitted  by using IP protocol. IPTV service had better quality than conventional TV, such as voice over internet protocol (VoIP), data (internet), and video on demand (VoD). This research had purpose to analyze QoS (delay, jitter, MOS and throughput) from IPTV service such as VoIP, internet (HTTP, FTP), and IPTV in the simulation. The QoS resulted from simulation will be compared with standard ITU-T. The result showed bandwidth requirement for downlink and uplink from the services for  VoIP 50 kbps,  internet  54 kbps, and the IPTV service  6.5 Mbps. The QoS result showed that used bandwidth  less than 15 Mbps, resulted jitter and delay that can not tolerated or  QoS more than 250 ms and MOS less than 2. The QoS resulted from queue method had applied on the node DSLAM with bandwidth 8 Mbps, only can decreased the value of delay and jitter as 50% - 65% at VoIP and internet services. PQ method became one of the queue method that can be optimalizing of QoS eventhough only decreased the jitter 10%.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.594

Page 1 of 1 | Total Record : 9