International Journal of Informatics and Communication Technology (IJ-ICT)
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Articles
462 Documents
XML-Based RDF Data Management for XPath Query Language
Win Lai Hnin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 1: April 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (481.598 KB)
The Semantic Web is an extention of the current Web that will allow to find, share and combine information more easily. The meaning in the Semantic Web is mostly represented by Resource Description Framework (RDF). To harvest such power requires robust and scalable data repositories that can store RDF data. Most of the existing RDF storage techniques rely on relation model and relational database technologies for these tasks. The mis-match between the graph model of the RDF data and the rigid 2D tables of relational model jeopardizes the scalability of such repositories and frequently renders a repository inefficient for some types of data and queries. This paper proposed a system that can store RDF data in the XML repository and discuss the basic idea of conversion from RDF Schema to XML Schema and XPath queries for extract information from XML database.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1503
Intelligent Information System for Suspicious Human Activity Detection in Day and Night
J L Mazher Iqbal;
S. Arun
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (708.418 KB)
|
DOI: 10.11591/ijict.v7i3.pp117-123
The detection of human beings in a camera attracts more attention because of its wide range of applications such as abnormal event detection, person counting in a dense crowd, person identification, fall detection for care to elderly people, etc. Over the time, various techniques have evolved to enhance the visual information. This article presents a novel 3-D intelligent information system for identifying abnormal human activity using background subtraction, rectification, morphology, neural networks and depth estimation with a thermal camera and a pair of hand held Universal Serial Bus (USB) camera to visualize un-calibrated images. The proposed system detects strongest points using Speed-Up Robust Features (SURF). The Sum of Absolute Difference (SAD) algorithm match the strongest points detected by SURF. 3-D object model and image stitching from image sequences are carried out in the proposed work. A series of images captured from different cameras are stitched into a geometrically consistent mosaic either horizontally/vertically based on the image acquisition. 3-D image and depth estimation of un-calibrated stereo images are acquired using rectification and disparity. The background is separated from the scene using threshold approach. Features are extracted using morphological operators in order to get the skeleton. Junction points and end points of the skeleton image are obtained from the skeleton. Data set of abnormal human activity is created using supervised learning such as neural network with a thermal camera and a pair of webcam. The feature vector of an activity is compared with already created data set, if a match occurs the classifier detects abnormal human activity. Additionally the proposed algorithm performs depth estimation to measure real time distance of objects dynamically. The system use thermal camera, Intel computing stick, converter, video graphics array (VGA) to high-definition multimedia interface (HDMI) and webcams. The proposed novel intelligent information system gives 94% maximum accuracy and 89% minimum accuracy for different activities, thus it effectively detects suspicious activity during day and night.
Human Machine Interface Based on Eye Wink Detection
Kiran P;
Mohana HS;
Vijaya PA
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (5408.892 KB)
The research of human-computer interfaces has become a growing field in computer science, which aims to attain the development of more natural, intuitive, unobtrusive and efficient interfaces. The present work describes a Human Machine Interface Based on Eye Wink Detection for helping the severely handicapped people to manipulate the household devices and to perform day to day activities. Algorithm for eye detection that is conductedthrough a process of extracting the face image from the video image followed by evaluating the eye region and then eventually detecting the eye state based on skin colour segmentation. Binary values 1 and 0 is assigned based on the opening and closing of eye. Finally applying the dynamic programming to translate the code sequences to a certain valid command. Experiment conducted for different test video displayed significant results which is carried out with different set of inputs.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3927
Random routing scheme with misleading dead ends
Chitra Rajarama;
Jagadeesha Narasimhamurthy Sugatoor;
Yerri Swamy T
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (495.954 KB)
|
DOI: 10.11591/ijict.v8i2.pp87-93
A new method of sink location security in a Wireless Sensor Network is proposed. In the proposed scheme, all the node addresses are encrypted and an attacker cannot determine the real sink address by capturing the packets and analyzing its contents for the final destination. The main contribution of our proposed method is to use random routing scheme with misleading dead ends. This provides security against traffic analysis attack.
Instantiation in Partial Learning
Velimir Graorkoski;
Ana Madevska-Bogdanova
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (735.815 KB)
|
DOI: 10.11591/ijict.v3i1.pp59-66
The adaptive learning systems are changing the learning process as we know it. One of the advantages they have over the traditional ways of learning is the attempt to adapt to the learner's capabilities in order to deliver the knowledge as optimizing as possible. Even in such sophisticated implementations there are differences in the treatment of the adaptive learning. During the past years spent in research of different aspects of the adaptive learning, we made a distinction of our latest development phase as an advanced adaptive learning, having more specific approach to the problem from the phase where the problem of adaptive learning is treated as a general case. Considering the conditions of advanced adaptive learning rather than basic adaptive learning, the process of learning is different and closely related to the human learner. In order to demonstrate this key improvement, we presented a general learner model through its learning mechanism and its behavior in the adaptive learning environment together with the instantiation process. In this paper we present a new way of learning with learning environment instances, constructed by choosing different ways to obtain the knowledge for a target unit.
Real power loss reduction by tundra wolf algorithm
Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (231.719 KB)
|
DOI: 10.11591/ijict.v9i2.pp100-104
In this work Tundra wolf algorithm (TWA) is proposed to solve the optimal reactive power problem. In the projected Tundra wolf algorithm (TWA) in order to avoid the searching agents from trapping into the local optimal the converging towards global optimal is divided based on two different conditions. In the proposed Tundra wolf algorithm (TWA) omega tundra wolf has been taken as searching agent as an alternative of indebted to pursue the first three most excellent candidates. Escalating the searching agents numbers will perk up the exploration capability of the Tundra wolf wolves in an extensive range. Proposed Tundra wolf algorithm (TWA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show the proposed algorithm reduced the real power loss effectively.
Speech enhancement using modified wiener filter based MMSE and speech presence probability estimation
V. Vijayasari Bolisetty;
U. Yedukondalu;
I. Santiprabha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (567.737 KB)
|
DOI: 10.11591/ijict.v9i2.pp63-72
In the present-day communications speech signals get contaminated due to various sorts of noises that degrade the speech quality and adversely impacts speech recognition performance. To overcome these issues, a novel approach for speech enhancement using Modified Wiener filtering is developed and power spectrum computation is applied for degraded signal to obtain the noise characteristics from a noisy spectrum. In next phase, MMSE technique is applied where Gaussian distribution of each signal i.e. original and noisy signal is analyzed. The Gaussian distribution provides spectrum estimation and spectral coefficient parameters which can be used for probabilistic model formulation. Moreover, a-priori-SNR computation is also incorporated for coefficient updation and noise presence estimation which operates similar to the conventional VAD. However, conventional VAD scheme is based on the hard threshold which is not capable to derive satisfactory performance and a soft-decision based threshold is developed for improving the performance of speech enhancement. An extensive simulation study is carried out using MATLAB simulation tool on NOIZEUS speech database and a comparative study is presented where proposed approach is proved better in comparison with existing technique.
DSS using AHP in Selection of Lecturer
Adriyendi Adriyendi;
Yeni Melia
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 2: August 2015
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (287.775 KB)
|
DOI: 10.11591/ijict.v4i2.pp79-85
This paper was conducted to apply Analytical Hierarcy Process (AHP), applied as Decision Support System (DSS) model in selection of lecturer at STAIN Batsangkar. Data collected by through observation and interview done in shares of administration academic data center at college. Here in data analyzed to learn the pattern from method used and added with the reference from literature. Experiment done using Microsoft Excel and Expert Choice Software, known that method can yield the optimal decision in selection of lecturer. There by the method recommended to be applied to getting optimal result in decision making.
Development of System Tracer of Lost Aircraft
Siswayudi Azhari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (563.48 KB)
|
DOI: 10.11591/ijict.v5i2.pp68-72
Today the world has entered the era of modern air transport where human movement needed to support facilities and infrastructure that support for the movement of activity. The number of routes and flights are always growing by leaps and bounds every year.In Indonesia alone by more than 10 of the largest airliner in which two, namely Garuda Indonesia and Lion Airline, based on data in 2012 each have no less than 50 routes per day and more than 4,000 flights per week [1] (web magazine ZonaAero). To support the security and safety of air transport, the government through the aviation authorities are trying to build an adequate infrastructure. A number of local governments and central government together with Angkasa Pura and Airnav Indonesia (LPPNPI) has a lot to develop the airport terminal, lengthen and widen the runway, install instrument flight (radar, DVOR, ILS etc.), and make the regulations more guarantees The good level of a security and aviation safety.However, for things that are not desirable that may occur as aircraft accidents, it is necessary to support the system also prepared to facilitate the search for the location of the accident. Still clear in our memory how when, on May 9, 2012 a plane Sukhoi Superjet 100 has crashed in the promotion and demonstration flights. It takes more than one day to find the crash site in the area around Mount Salak located less than 100 kilometers from the capital city of Jakarta [2] (Indonesia Wikipedia).The distance of time ranging from a loss of communication with the aircraft until the discovery of the accident scene will be very good if it can be reduced to as small as possible. This will help Basarnas and NTSC accelerate the process of investigation and to provide certainty for the families of the victims as well as those of other interested parties.Location tracking system of aircraft accident would be able to find the location of a plane crash just a few moments after the breakdown of communication between the aircraft control tower / flight controller.
A Markov Decision Model for Area Coverage in Autonomous Demining Robot
Abdelhadi Larach;
Cherki Daoui;
Mohamed Baslam
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (953.891 KB)
|
DOI: 10.11591/ijict.v6i2.pp105-116
A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.