cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Performance Measurement for “Es Puter Bang Karim” Use Supply Chain Operation Reference Christofora Desi Kusmindari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 3: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (625.865 KB) | DOI: 10.11591/ijict.v4i3.pp111-116

Abstract

“Es puter Bang Karim “ is the one company that produces ice cream in the city of Palembang . This company does not have a good performance measurement . Performance measurement systems in use today are not able to measure the actual value of the company's performance , because the valuation is only based on the perspective of the production output . supply chain operations reference is one of the performance measurement tool used to streamline material and machinery . Supply chain operations reference is considered more complete , systematic and more integrated . The purpose of this study was to determine the value of the performance of companies using supply chain operations reference . Results of this experiment showed that the value of the highest performance occurred in June with a value indicator ( 60.3 ) and lowest values in April with a value of ( 58.2 ) so that the average indicator 59.3 . This value includes the category average performance indicators . Need to improve performance in order to better index future.
Performance Improvement of MU-MIMO System by Optimizing the K-Factor for the K-Mean User Grouping Algorithm Ankush Kansal; Pawandeep Singh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 3: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.537 KB) | DOI: 10.11591/ijict.v5i3.pp89-93

Abstract

In this paper, downlink multiuser-MIMO system with large number of transmitting antennas at the base station and R user terminals each having single antenna is considered. According to this design, an access point communicates with large number of users in the Rayleigh fading scenario. Due to large number of users, it becomes difficult to accommodate all of them in the system simultaneously. So, a user grouping technique known as K-mean clustering is used, such that a group of users with similar conditions at that particular time are served together. While making groups, the interference is surely reduced but the number of users being served at a time also reduces. So, it is necessary to make out the balance such that the performance of the system is maintained while accommodating maximum number of users. So, optimum number of user groups needs to be formed. The results show that when groups are increased from two till four sum rate increases but when five groups are made the sum rate decreases to a point but, is still higher than two groups. 
Improving Performance of Mobile Ad Hoc Network Using Clustering Schemes Mohamed Er-Rouidi; Houda Moudni; Hassan Faouzi; Hicham Mouncif; Abdelkrim Merbouha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.947 KB) | DOI: 10.11591/ijict.v6i2.pp69-75

Abstract

Mobile ad hoc network become nowadays more and more used in different domains, due to its flexibility and low cost of deployment. However, this kind of network still suffering from several problems as the lack of resources. Many solutions are proposed to face these problems, among these solutions there is the clustering approach. This approach tries to partition the network into a virtual group. It is considered as a primordial solution that aims to enhance the performance of the total network, and makes it possible to guarantee basic levels of system performance. In this paper, we study some schemes of clustering such as Dominating-Set-based clustering, Energy-efficient clustering, Low-maintenance clustering, Load-balancing clustering, and Combined-metrics based clustering.
A Proposed DDS Enabled Model for Data Warehouses with Real Time Updates Munesh Chandra Trivedi; Virendra Kumar Yadav; Avadhesh Kumar Gupta
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.6 KB) | DOI: 10.11591/ijict.v7i1.pp31-38

Abstract

Data warehouse generally contains both types of data i.e. historical & current data from various data sources. Data warehouse in world of computing can be defined as system created for analysis and reporting of these both types of data. These analysis report is then used by an organization to make decisions which helps them in their growth. Construction of data warehouse appears to be simple, collection of data from data sources into one place (after extraction, transform and loading). But construction involves several issues such as inconsistent data, logic conflicts, user acceptance, cost, quality, security, stake holder’s contradictions, REST alignment etc. These issues need to be overcome otherwise will lead to unfortunate consequences affecting the organization growth. Proposed model tries to solve these issues such as REST alignment, stake holder’s contradiction etc. by involving experts of various domains such as technical, analytical, decision makers, management representatives etc. during initialization phase to better understand the requirements and mapping these requirements to data sources during design phase of data warehouse.
A New Proxy-Protected Signature Scheme Based on DLP Swati Verma; Birendra Kumar Sharma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (228.274 KB)

Abstract

During electronic communication, proxy signature helps the signer to sign message on behalf of the original signer. This type of signature scheme is used when the signatory is not available to sign this document. In this paper, we propose a new protected proxy signature scheme. In the proposed scheme, the proxy signer can sign message on behalf of the original signer with the different type of public key. The proposed scheme satis es unforgeability, undeniability, non-transferability and distinguishability properties which are the most important security requirements for a proxy signature.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1479
A State of Art on Energy Efficient Multipath Routing In Wireless Sensor Networks Swedika Sharma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (233.079 KB) | DOI: 10.11591/ijict.v7i3.pp111-116

Abstract

Wireless sensor network is the combination of sensor nodes where sensor nodes are distributed all over the network. There are some challenges that come into the wireless sensor network n context to energy efficiency, network lifetime, storage and battery backup. The most important feature of a routing protocol, in order to be efficient for WSNs, is the energy consumption and the extension of the network’s lifetime. In this paper, we have analyzed various routing techniques for WSN that increases the network lifetime and energy consumption.
Modeling Gene Regulation in Graded Hypoxia Using Continuous-Time Markov Chains Putu Indah Ciptayani; Reza Pulungan
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (869.317 KB)

Abstract

Hypoxia inducible factor (HIF) is the main protein in hypoxia pathway. The response of HIF to changes of oxygen pressure is regulated by 2 oxygen sensors, prolyl hydroxylase (PHD) and factor inhibiting HIF (FIH). Studies have shown that biochemical reactions at molecular level actually exhibit stochastic and random behaviors. Modeling biochemical reactions using purely deterministic method, therefore, ignore these characteristics. Hence, we use stochastic modeling using CTMC to model this regulation. Nevertheless, the use of pure CTMC on complex biochemical reaction networks, such as hypoxia, results in an infeasible computation time and typically requires very large memory. Therefore, we use a numerical hybrid method that combines pure CTMC and deterministic methods. The purpose is to reduce time complexity and to obtain a better accuracy than deterministic method. Using this model, we can observe that an increase of oxygen pressure results in a decrease in the amount of HIF and that oxygen sensor FIH only inhibits C-TAD activity. The model is also able to classify 84% genes that were observedDOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3845
A secure deduplication scheme for encrypted data Vishal Passricha; Ashish Chopra; Pooja Sharma; Shubhanshi Singhal
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.347 KB) | DOI: 10.11591/ijict.v8i2.pp77-86

Abstract

Cloud storage (CS) is gaining much popularity nowadays because it offers low-cost and convenient network storage services. In this big data era, the explosive growth in digital data moves the users towards CS to store their massive data. This explosive growth of data causes a lot of storage pressure on CS systems because a large volume of this data is redundant. Data deduplication is a most-effective data reduction technique that identifies and eliminates the redundant data. Dynamic nature of data makes security and ownership of data as a very important issue. Proof-of-ownership schemes are a robust way to check the ownership claimed by any owner. However to protect the privacy of data, many users encrypt it before storing in CS. This method affects the deduplication process because encryption methods have varying characteristics. Convergent encryption (CE) scheme is widely used for secure data deduplication, but it destroys the message equality. Although, DupLESS provides strong privacy by enhancing CE, but it is also found insufficient. The problem with the CE-based scheme is that the user can decrypt the cloud data while he has lost his ownership. This paper addresses the problem of ownership revocation by proposing a secure deduplication scheme for encrypted data. The proposed scheme enhances the security against unauthorized encryption and poison attack on the predicted set of data.
The Development of Online Disaster Information System Using Location Based Service (LBS) Technology Nasaruddin Syafie; Yudha Nurdin; Roslidar Roslidar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1068.716 KB) | DOI: 10.11591/ijict.v3i1.pp47-58

Abstract

Indonesia is geographically located in the disaster vulnerable area and frequently hit by various disasters such as earthquake, flood, etc. So that Indonesian people aware that the disaster information system is very important. Thus, the development of information and communication technology application is needed for disaster management. For this purpose, this paper proposes on the development of online disaster information system based on location based service (LBS) technology by using short message service (SMS) gateway and global positioning system (GPS). Then,the web-based prototype of online disaster information system is designed and developed as the media to provide information of location and situation of the disaster area. Furthermore, a user interface is also designed and developed to transmit input data as the location information using manual SMS and automatically using smartphone based on SMS/GPS. The research method used in this research is a spiral method that begins with conceptual design, prototype development, application test, and evaluation. The results of this research are the web-based information system and the implemented user interface application (we called ASIKonLBS) for Android based smartphone. The online mapping of input data from smartphone to the web-based system has been tested. It shows that the disaster location information can be mapped to Google Maps timely and accurately that can be accessed using the Internet connection. The evaluation to mapping delay time shows that it is lower than the refresh time of the web-based system. Therefore, the proposed online system can be categorized as a real-time system.
Enhanced whale optimization algorithm for active power loss diminution Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (259.13 KB) | DOI: 10.11591/ijict.v9i1.pp19-23

Abstract

In this paper Enhanced whale Optimization Algorithm (EWO) proposed to solve the optimal reactive power problem. Whale optimization algorithm is modeled by Bubble-net hunting tactic. In the projected optimization algorithm an inertia weight ω ∈ [1, 0] has been introduced to perk up the search ability. Whales are commonly moving 10-16 meters down then through the bubbles which are created artificially then they encircle the prey and move upward towards the surface of sea. Proposed Enhanced whale optimization algorithm (EWO) is tested in standard IEEE 57 bus systems and power loss reduced considerably.