cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 36 Documents
Search results for , issue "Vol 14, No 2: August 2025" : 36 Documents clear
Prediction and classification of diabetic retinopathy using machine learning techniques Chaouki, Makhlouf; Laouar, Mohamed Ridda; Cheddad, Abbas; Salima, Bourougaa; Eom, Sean
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp516-528

Abstract

Diabetic retinopathy (DR) is a progressive and sight-threatening complication of diabetes mellitus, characterized by damage to the blood vessels in the retina. Early detection of DR is vital for timely intervention and effective management to prevent irreversible vision loss. This paper provides a comprehensive review of recent advancements in integrating machine learning (ML) and deep learning (DL) techniques for diagnosing DR, aiming to assist ophthalmologists in their manual diagnostic process. The paper presents a comprehensive definition of DR, elucidating the underlying pathological processes, clinical signs, and the various stages of DR classification, ranging from mild non-proliferative to severe proliferative DR. Integrating ML and DL in DR diagnosis has developed the field by offering automated and efficient methods and techniques to analyze retinal images. With high sensitivity and specificity, these techniques demonstrate their efficacy in accurately identifying DR-related lesions, such as microaneurysms, exudates, and hemorrhages. Furthermore, the paper examines diverse datasets employed in training and evaluating ML and DL models for DR diagnosis. These datasets range from publicly available repositories to specialized datasets curated by medical institutions. The role of large-scale and diverse datasets in enhancing model robustness and generalizability is emphasized.
Cloud application design for financial reporting in Indonesia’s small and medium enterprises Erin, Erin; Gui, Anderes
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp457-466

Abstract

Small and medium enterprises (SMEs) in Indonesia are increasingly developing, but the application of information technology (IT) in small medium businesses is still lacking because for small medium business owners, doing their own bookkeeping without a system will maximize profits. However, this makes bookkeeping ineffective and inefficient because it requires manual data input and reconciliation. Utilizing a cloud-based accounting information system (CAIS) can integrate data, increase productivity, and minimize infrastructure costs because there is no need to provide costs for physical infrastructure. In this research, CAIS was designed to produce financial reports that focus on small medium businesses in Indonesia. The method used is a qualitative method by conducting observations through literature study for data collection and the rational unified process (RUP) which is limited to the elaboration stage to produce a prototype design. So, the result of this paper is a system design that can be used as a guide to continue with system development. This system aims to simplify transaction records so that they can be more efficient and effective in producing financial reports. The use of CAIS is also expected to increase profits and maximize the use of internet and technology in small medium businesses.
Automated rice leaf disease detection using artificial intelligence deep learning M. P., Suhaila; S., Hemalatha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp405-415

Abstract

As one of the top five rice-producing countries, India relies heavily on rice for both economic management and food needs. To ensure healthy rice plant growth, early detection of diseases and timely treatment are essential. Since manual disease detection is time-consuming and labor-intensive, an automated approach is more practical. This work presents a deep neural network (DNN)-based artificial intelligence (AI) method for recognizing rice leaf diseases. The method detects three common diseases: leaf smut, bacterial leaf blight, and brown spot, as well as healthy images. The approach uses an AI-based attention network and semantic batch normalized DeepNet (AN-SBNDN) combined with a channel attention mechanism to improve disease detection accuracy. Experiments with rice leaf datasets and comparison with conventional networks like residual attention network (Res ATTEN) and dynamic speeded up robust features (DSURF) validate the effectiveness of the method. Key performance metrics include average accuracy, time, precision, and recall, achieved at 21%, 44%, 26%, and 31%, respectively.
A hybrid framework for enhanced intrusion detection in cloud environments leveraging autoencoder Alagarsamy, Abinaya; Elumalai, Thenmozhi; Ramesh, S. P.; Karuppiah, Tamilarasi; Kaliyaperumal, Prabu; Perumal, Rajakumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp555-564

Abstract

In today’s world, the significance of network security and cloud environments has grown. The rising demand for data transmission, along with the versatility of cloud-based solutions and widespread availability of global resources, are key drivers of this growth. In response to rapidly evolving threats and malicious attacks, developing a robust intrusion detection system (IDS) is essential. This study addresses the imbalanced data and utilizes an unsupervised learning approach to protect network data. The suggested hybrid framework employs the CIC-IDS2017 dataset, integrating methods for handling imbalanced data with unsupervised learning to enhance security. Following preprocessing, principal component analysis (PCA) reduces the dimensionality from eighty features to twenty-three features. The extracted features are input into density-based spatial clustering of applications with noise (DBSCAN), a clustering algorithm. particle swarm optimization (PSO) optimizes DBSCAN, grouping similar traffic and enhancing classification. To address the imbalances in the learning process, the autoencoder (AE) algorithm demonstrates unsupervised learning. The data from the cluster is input into the AE, a deep learning algorithm, which classifies traffic as normal or an attack. The proposed approach (PCA+DBSCAN+AE) attains remarkable intrusion detection accuracy exceeding 98%, and outperforms five contemporary methodologies.
Cyber-physical resilience system for anomaly detection in industrial environments Mishra, Debani Prasad; Lenka, Rakesh Kumar; Yagyna Duthsharma, Rampa Sri Sai; Kumar, Pavan; Bhardwaj, Lakshay; Salkuti, Surender Reddy
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp497-505

Abstract

This work explores the topic of cybersecurity in the context of electric vehicles (EVs). It ensures the resilience of cyber-physical systems against anomalies, which is paramount for maintaining operational efficiency and safety. This paper presents a cyber-physical resilience system (CPRS) customized for anomaly detection. Maintaining operational efficiency and safety in today’s networked industrial contexts requires that cyber-physical systems be resilient to abnormalities. With an emphasis on EVs, this research introduces a unique CPRS designed for anomaly detection in industrial settings. By utilizing the combination of digital and physical elements, the CPRS uses sophisticated monitoring and reaction systems to identify and address irregularities instantly. The process includes creating algorithms for anomaly detection and putting in place a framework that is responsive enough to change with the dangers that it faces. The efficiency of the CPRS in detecting unusual behaviors in EVs is demonstrated by experimental findings, which also improve the overall resilience of the system. Moreover, the research’s ramifications go beyond EVs to include a variety of industrial settings, providing valuable information for the development and execution of resilient cyber-physical systems. This paper highlights the significance of proactive resilience measures in protecting critical infrastructure and advances anomaly detection approaches.
Enhanced n-party Diffie Hellman key exchange algorithm using the divide and conquer algorithm Ashioba, Nwanze Chukwudi; Ejeh, Patrick Ogholorunwalomi; Maduabuchuku, Azaka
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp438-445

Abstract

Cryptographic algorithms guarantee data and information security via a communication system against unauthorized users or intruders. Numerous encryption techniques have been employed to safeguard this data and information from hackers. By supplying a distinct shared secret key, the n-party Diffie Hellman key exchange approach has been used to protect data from hackers. Using a quadratic time complexity, the n-party Diffie-Hellman method is slow when multiple users use the cryptographic key interchange system. To solve this issue, the researchers created an effective shared hidden key for the n-party Diffie Hellman key exchange of a cryptographic system using the divide-and-conquer strategy. The current research recommends the use of the divide and conquer algorithm, which breaks down the main problem into smaller subproblems until it reaches the base solution, which is then merged to generate the solution of the main problem. The comparative analysis indicates that the developed system generates a shared secret key faster than the current n-party Diffie Hellman system.
Exploring user feedback on sharia FinTech apps: a Netnographic study in Indonesia Alam, Azhar; Raihan, Fadhiil Arkanur; Al Bagir, Muhamad; Kurniawan, Adityo Wiwit; Yusuf, Jibrail Bin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp663-672

Abstract

The rapid growth of Sharia FinTech applications in Indonesia has raised questions about user perceptions and experiences. This study employs a Netnographic approach to explore user feedback on Sharia FinTech apps through reviews posted on the Google Play store. The research analyzed 129 reviews from five Sharia FinTech applications between July and December 2023. The study reveals that 55.10% of users expressed overall satisfaction with the apps, appreciating their ease of use and Sharia compliance. However, significant challenges were identified, with 37.50% of negative reviews related to payment delays and interest issues. Other concerns included system errors, account creation difficulties, and poor customer service. These findings highlight the complex dynamics of user experiences with Sharia FinTech applications, demonstrating a generally positive reception but also pointing to critical areas for improvement. The study contributes to the understanding of Sharia FinTech adoption in Indonesia and provides valuable insights for application developers and Islamic microfinance institutions to enhance their services and address user concerns.
Consumer behavior switching from human agents to chatbots in the health service industry Yulianto, Dwi Fajar; Pratiwi, Titik; Irsan, Fatih Akbarul; Mustikasari, Faranita
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp355-365

Abstract

Artificial intelligence (AI) technology is used in organizations to replace human services with technology, altering customer service experiences. Only a limited number of studies have explored how consumers change their behavior from human-assisted to technology-assisted services when using AI in frontline and specialty healthcare services. This study examined the elements that impact consumers’ transition from human agents to AI-based conversational agents using the push-pull mooring framework. Data from 147 healthcare users was evaluated using structural equation modeling. The data indicates that push effects, specifically adaptability, have a negative impact on switching behavior, while pull effects, such as responsiveness and accessibility, have a positive impact on the switching behavior of customers.
Techniques of deep learning neural network-based building feature extraction from remote sensing images: a survey Khandare, Shrinivas B.; Chandak, Manoj B.
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp614-624

Abstract

Recently, due to earthquake disaster, many people have lost their lives and homes, and not able to settle to new locations immediately. Therefore, a framework or a plan should be ready to immediately relocate the people to different locations or do resettlement. Much research has been done in this field but still there are problems of identifying clear building boundaries, rectangular houses, due to the problem of different shapes of the buildings. These techniques were explored for identification of clear building boundaries, rectangular houses, buildings which are more highlighted and smaller size buildings for pre-disaster and post-disaster building extraction scenarios. In this survey of building extraction techniques, most of the approach is training the network, second approach is refining the trained output features, running the trained samples on the predefined models of neural network. Several issues and their assessment are studied in these techniques. These are beneficial to the various researchers for different building extractions.
Enhancing database query interpretation: a comparative analysis of semantic parsing models Keswani, Gunjan; Chandak, Manoj B.
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 2: August 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i2.pp467-477

Abstract

The rapid proliferation of NoSQL databases in various domains necessitates effective parsing models for interpreting NoSQL queries, a fundamental aspect often overlooked in database management research. This paper addresses the critical need for a comprehensive understanding of existing semantic parsing models tailored for NoSQL query interpretation. We identify inherent issues in current models, such as limitations in precision, accuracy, and scalability, alongside challenges in deployment complexity and processing delays. This review is pivotal, shedding light on the intricacies and inefficiencies of existing systems, thereby guiding future advancements in NoSQL database querying. This methodical comparison of these models across key performance metrics-precision, accuracy, recall, delay, deployment complexity, and scalability-reveals significant disparities and areas for improvement. By evaluating these models against both individual and combined parameters, we identify the most effective methods currently available. The impact of this work is far-reaching, providing a foundational framework for developing more robust, efficient, and scalable parsing models. This, in turn, has the potential to revolutionize the way NoSQL databases are queried and managed, offering significant improvements in data retrieval and analysis. Through this paper, we aim to bridge the gap between theoretical model development and practical database management, paving the way for enhanced data processing capabilities in diverse NoSQL database applications.

Page 2 of 4 | Total Record : 36