cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol 3, No 2: August 2014" : 7 Documents clear
Inteference Mitigation in Femtocellular Networks Amevi Acakpovi; Dominique Kogue; Koudjo Mawuefam Koumadi; Ibrahim Tahirou
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.328 KB) | DOI: 10.11591/ijict.v3i2.pp113-121

Abstract

Femtocells can significantly boost up wireless cellular network capacity by reducing communication distances to user equipment and also by reusing resources already utilized in the macrocell network on which they overlay. However, the deployment of femtocells within a macrocell coverage area, causes severe interference between the femtocell and the macrocell, which may have an impact on the overall performance of the femtocells. Avoiding such interference is very important for the effective co-existence of femtocells and macrocell. This paper proposes an algorithm to mitigate cross-tier interference between a femtocell and a macrocell using adaptive power control. The proposed approach is modeled and simulated using MATLAB. The impact on the performance of the femtocell using the proposed algorithm is analysed. Results show that the proposed adaptive power control algorithm has tremendously reduced the negative effects on the system throughput, delay and outage probability for voice and data traffics.
Continuous Real-time Monitoring of Patient’s Vital Signs Based on ZigBee Standard Saso Koceski; Olivera Kotevska; Elena Vlahu-Gjorgievska; Vladimir Trajkovik
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (454.286 KB) | DOI: 10.11591/ijict.v3i2.pp73-79

Abstract

This paper gives an understanding of what possibilities Wireless Body Area Network (WBAN) have when using shortrange wireless communications protocols. There advantages are used to facilitate versatility in the movements of health care patients. The paper investigates the feasibility of using the ZigBee protocol, givean analysis of methods for collection of received data from multi sensor environment, and mechanisms for privacy and data protection by using encryption techniques. This characteristics are applied on previously developed collaborative healthcare system model (COHESY).COHESY is aimed at continuous real time remote patients’ health monitoring.
Performance Measurement in ITG Based on Balanced Scorecard Haviluddin Haviluddin; Rayner Alfred
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (254.493 KB) | DOI: 10.11591/ijict.v3i2.pp122-128

Abstract

The article reports on our work in conducting performance measurement for the management of Information Technology (IT) by applying the Balanced Scorecard (BSC) at Mulawarman University, Samarinda, East Kalimantan, Indonesia. The results of this study are then used to propose a hybrid framework that applies both BSC and a artificial intelligence (AI) techniques in order to measure the performance of IT governance generally. This article also examines BSC’s abilities and its flexibility compared to other methods in measuring the performance of IT governance. The proposed hybrid framework is expected to yield a management that produces a scorecard measures that are more rigorous, accurate and consistent with the objectives and organizational strategies in non-profit organizations, especially educational ones.
Proposing a Practical Method for Conceptual Design Process in New Product Development: Medical Glasses as a Case Study Amir Mirzadeh Phirouzabadi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (693.518 KB) | DOI: 10.11591/ijict.v3i2.pp80-87

Abstract

Nowadays,improving the quality of products, reducing cost and meeting customer’srequirements are necessary to shorten the time of new product development(NPD). NPD is used to describe the complete process of bringing a new product to market and conceptual design process(CDP) is at its early stage and has mostly changed from passive respond toaggressive one. Thus, this study proposed a practical method for CDP in NPDthrough three phases as Converting customers’ requirements to product specifications,Generating and selecting of concepts and Testing and finalizing the concepts byusing some different management-engineering techniques. Firstly, this papertried to prioritize customer’s requirements related to product by AHP (AnalyticHierarchy Process) and convert them to engineering parameters of TRIZ (Theoryof Inventive Problem Solving) in order to define the inventive principals.Next, based on QFD (Quality Function Deployment), we measured the weight valuesof inventive principals. Finally, as FMEA (Failure Mode and Effect Analysis)can analyze the weight values and reduce the sequential risk, then finalconceptual design was generated. At the end, a medical glasses was used as acase study of innovative design to validate the method and explain how thestrategies of this research for CDP.
Decision Support System For A Customer Relationship Management Case Study Özge Kart; Alp Kut; Vladimir Radevski
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (965.48 KB) | DOI: 10.11591/ijict.v3i2.pp88-96

Abstract

Data mining is a computational approach aiming to discover hidden and valuable information in large datasets. It has gained importance recently in the wide area of computational among which many in the domain of Business Informatics. This paper focuses on applications of data mining in Customer Relationship Management (CRM). The core of our application is a classifier based on the naive Bayesian classification. The accuracy rate of the model is determined by doing cross validation. The results demonstrated the applicability and effectiveness of the proposed model. Naive Bayesian classifier reported high accuracy. So the classification rules can be used to support decision making in CRM field. The aim of this study is to apply the data mining model to the banking sector as example case study. This work also contains an example data set related with customers to predict if the client will subscribe a term deposit. The results of the implementation are available on a mobile platform.
Performance Evaluation of Filters of Discrete Wavelet Transforms for Biometrics Priya Bhirud; Nandana Prabhu
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.396 KB) | DOI: 10.11591/ijict.v3i2.pp97-102

Abstract

Biometrics associated with automated methods of identifying a person or verifying the identity of a person based on physiological or behavioral characteristics. Commonly used biometric features are facial features, fingerprints, voice, facial thermo grams, iris, posture/gait, palm print, hand geometry etc. Compared with other biometric characteristics iris is the most stable and hence the most reliable biometric characteristic over the period of a lifetime. This proposed work provides comparative study of various filters of Wavelet Transforms in terms of size and PSNR of images.
Chaos Based Image Encryption using Expand-Shrink Concept Naveenkumar S K; Panduranga H T; Kiran P
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (897.618 KB) | DOI: 10.11591/ijict.v3i2.pp103-112

Abstract

Image information security plays a vital role in computing and communication technologies. This paper describes a new concept of expand and shrink to enhance the strength of chaos based image encryption technique. This method consists of both permutations as well as substitution process for image scrambling and encryption. In permutation plain image is shuffled using chaos technique. Input image undergo two times chaos permutation in-between expand and shrink process leads to substitution. Permutation decreases the correlation between the pixel and substitution increases the entropy of encrypted image. Proposed encryption technique works for both gray-scale and color image. From the experiment highly scrambled image is obtained at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.

Page 1 of 1 | Total Record : 7