cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 35 Documents
Search results for , issue "Vol 14, No 1: April 2025" : 35 Documents clear
Symmetrical cryptographic algorithms in the lightweight internet of things Dhingra, Akshaya; Sindhu, Vikas; Sangwan, Anil
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp307-314

Abstract

The internet of things (IoT) has emerged as a prominent area of scrutiny. It is being deployed in multiple applications like smart homes, smart agriculture, intelligent surveillance systems, and even innovative industries. Security is a significant issue that needs to be addressed in these types of networks. This paper aims to describe symmetrical lightweight cryptographic algorithms (SLCAs) for lightweight IoT networks. The article focuses on discussing the principal difficulties of using cryptography in lightweight IoT devices, exploring SLCAs and their types based on structure formation throughout the literature survey, and comparing and evaluating different LCAs proposed in recent research. The main goal is to demonstrate how to solve the issues associated with conventional cryptography techniques and how lightweight cryptography algorithms aid limited IoT devices in achieving cybersecurity objectives.
Factors influencing the integration of web accessibility in Moroccan public e-services Ezzahra, Chadli Fatima; Moumen, Aniss; Gretete, Driss; Sabri, Zineb
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp77-90

Abstract

Governments worldwide are increasingly digitizing their services to enhance efficiency, transparency, and accessibility for citizens. Morocco has made significant strides in adopting information and communication technology (ICT) and has implemented various initiatives to promote digital transformation across sectors. However, ensuring that digital content and e-services are accessible to everyone, including people with disabilities, is crucial to building an inclusive digital environment. Against this background, this study, based on a qualitative analysis, explores the main factors influencing the integration of web accessibility in the Moroccan public sector from the perspective of web developers and information technology (IT) managers. Through semi-structured interviews and thematic analysis, the findings reveal key barriers such as limited awareness, training deficiencies, and lack of legal framework and available guidelines. Additionally, the study highlights the need for robust managerial backing and greater collaboration with stakeholders, including people with disabilities. By raising awareness and providing actionable insights, this study offers valuable recommendations for policymakers and moves the field forward, providing a foundation for future strategies to enhance web accessibility in the Moroccan public sector.
The 360° beach video: a supporting mindfulness intervention with virtual reality Naini, Rohmatus; Wibowo, Mungin Eddy; Purwanto, Edy; Mulawarman, Mulawarman; Anwas, E. Oos M.
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp250-258

Abstract

This article describes optimizing virtual reality (VR) with a 360° beach video model used for mindfulness interventions. Using VR with 360° beach videos to support the presence of an immersive environment can effectively support mindfulness practices. Students are interested in the integration of technology in school counseling. VR helps in creating immersive environments such as forests, beaches, waterfalls, etc. so that students focus more on practicing mindfulness and attention in the current moment. This article focuses on optimizing 360° beach videos in the breathing mindfulness process so that it helps bring out real experiences. Obstacles to practicing mindfulness include lack of focus, mind wandering and not concentrating. through the use of 360° beach videos with VR can increase focus and be more effective in mindfulness practice.
Memory management of firewall filtering rules using modified tree rule approach Hakani, Dhwani; Mann, Palvinder Singh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp141-152

Abstract

Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks like “cloud.” In order to improve cloud network security, this study suggests a modified tree rule firewall (MTRF cloud) that eliminates rule discrepancies. For the matching firewall policy, this work creates a tree rule firewall. There are no duplicate rules created by the proposed improved tree rule firewall. Also, memory utilization of different size rules is compared.
Online reviews on E-commerce platforms in Vietnam: The role of trust in behavioral intention Phuong Duy, Nguyen Binh; Kien, Dang Trung; Thinh, Vuong Minh; Phuong Thuy, Nguyen Binh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp195-206

Abstract

This comprehensive study thoroughly explores the factors related to online reviews that influence users’ purchase intention through trust. Drawing on robust theoretical foundations and relevant research, the study establishes connections between trust-promoting factors and user behavioral intentions on e-commerce platforms in Vietnam. The study, which involved a survey of 680 users for data collection and partial least squares structural equation modeling (PLS-SEM) analysis, unveils that the usefulness of online reviews is the key driver of behavioral intention. Moreover, trust plays a pivotal mediating role in linking the quality and rating of online reviews to users’ purchase intentions. These findings not only enrich the theoretical foundation of behavioral research on online platforms but also offer practical managerial implications, empowering e-commerce platforms to develop a comprehensive review system and enhancing users’ online shopping experience.
A survey on novel approach to semantic computing for domain specific multi-lingual man-machine interaction Bohra, Anjali; Barwar, Nemi Chand
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp1-10

Abstract

Natural language processing (NLP) helps computational linguists to understand, process, and extract information from natural languages. Linguist Panini signifies ’information coding’ in a language and explains that Karakas are semanticosyntactic relations between nouns and verbs that resemble participant roles of modern case grammar. Computational grammar maps vibhakti (inflections) of nominals and verbs to their participant roles. Karaka’s theory extracts semantic roles in the sentences which act as intermediate steps for various NLP tasks. The survey shows that NLP seeks to bridge the gap for man-machine interaction. The work presents the impact of machine learning on natural language processing with changing trends from traditional to modern scenarios with Panini’s classification scheme for semantic computing facilitating machine understanding. The study presents the significance of Karaka for semantic computing, methodologies for extracting semantic roles, and analysis of various deep learning-based language processing systems for applications like question answering. The survey covered around 50 research articles and 21 Karaka-based NLP systems performing multiple tasks like machine translation, question-answering systems, and text summaries using machine learning tools and frameworks. The work includes surveys from renowned journals, books, and relevant conferences, as well as descriptions of the latest trends and technologies in the machine learning domain.
Ensemble approach to rumor detection with BERT, GPT, and POS features Pattanaik, Barsha; Mandal, Sourav; Tripathy, Rudra Mohan; Sekh, Arif Ahmed
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp276-286

Abstract

As vast amounts of rumor content are transmitted on social media, it is very challenging to detect them. This study explores an ensemble approach to rumor detection in social media messages, leveraging the strengths of advanced natural language processing (NLP) models. Specifically, we implemented three distinct models: (i) generative pre-trained transformer (GPT) combined with a bidirectional long short-term memory (BiLSTM) network; (ii) a model integrating part-of-speech (POS) tagging with bidirectional encoder representations from transformers (BERT) and BiLSTM, and (iii) a model that merges POS tagging with GPT and BiLSTM. We included additional features from the dataset in all these models. Each model captures different linguistic, syntactical, and contextual features within the text, contributing uniquely to the classification task. To enhance the robustness and accuracy of our predictions, we employed an ensemble method using hard voting. This technique aggregates the predictions from each model, determining the final classification based on the majority vote. Our experimental results demonstrate that the ensemble approach significantly outperforms individual models, achieving superior accuracy in identifying rumors. To determine the performance of our model, we used PHEME and Weibo datasets available publicly. We found our model gave 97.6% and 98.4% accuracy, respectively, on the datasets and has outperformed the state-of-the-art models.
Automatic vehicle accident detection and alerting notification using internet of things Savani, Vijay; Pandya, Viranchi; Senghani, Dhairya; Nahta, Shreya; Agrawal, Risheen
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp315-324

Abstract

Immigrants in developing countries have indirectly encouraged increased automobile use, leading to a strong association between automobile accidents and their victims. However, recent technological developments, especially artificial intelligence and electronics, seem promising in overcoming these risks. This research paper focuses on complex systems developed using internet of things (IoT) technology. The system integrates various components such as micro controller, radio frequency identification (RFID) card reader for license validation, liquid crystal display (LCD), Ultrasonic sensor for interference, measuring device and global positioning system (GPS) unit. Additionally, the system has a simple mail transfer protocol (SMTP) server that can send timely email alerts to emergency responds and log email addresses for real-time emergency detection. This facilitates rapid response and emergency rescue, thereby reduces the risk of accidents and increases overall safety.
Enhancing credit card security using RSA encryption and tokenization: a multi-module approach Saha, Mainak; Basu, M. Trinath; Gupta, Arpita; Ashrith, K.; Vardhan Reddy, Chevella Vamshi; Reddy, Shashanth; Reddy, Rohith
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp132-140

Abstract

The security of credit card information remains a critical challenge, with existing methods often falling short in safeguarding data integrity, confidentiality, and privacy. Traditional approaches frequently transmit sensitive information in unencrypted formats, exposing it to significant risks of unauthorized access and breaches. This study introduces a robust security framework that leverages Rivest-Shamir-Adleman (RSA) encryption and tokenization to protect credit card information during transactions. The proposed solution is structured into three key modules: merchant, tokenization, and token vault. The merchant module works in tandem with the tokenization module to generate transaction validation tokens and securely transmit credit card data. The token vault, maintained on a secure cloud storage platform, acts as a restricted-access database, ensuring that sensitive information is encrypted and inaccessible to unauthorized entities. Through this multi-layered approach, the study demonstrates a significant enhancement in the security of credit card transactions, effectively mitigating the risks of data breaches and unauthorized disclosures. The findings indicate that the proposed method not only addresses existing security vulnerabilities but also offers a scalable and efficient solution for protecting financial transactions.
Advanced optimization load frequency control for multi - islanded micro grid system with tie-line loading by using PSO Pavan, Gollapudi; Babu, A. Ramesh; Prabhakar, Bollu; Venkata Sai, T. Datta; Rajeshwari, M.; Reddy, N. Raj; Kishore, P. Venkata
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp298-306

Abstract

This manuscript presents the design of a microgrid featuring solar and wind as uncontrollable energy sources, alongside controllable sources like batteries and a diesel generator, aiming to address power supply variations resulting from load fluctuations. Controllers are imperative to mitigate these challenges, and the manuscript emphasizes the need for precise tuning of gain values for optimal electrical energy utilization. In lieu of the trial-and-error approach, particle swarm optimization (PSO) is employed for enhanced steady-state response in the Microgrid. The study also introduces the application of proportional-integral (PI), proportional-integral-derivative (PID), and PID with feed forward (PIDF) controllers to effectively address and resolve identified issues ensuring improved system performance and consistent power supply stability in the microgrid system.

Page 2 of 4 | Total Record : 35