cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Audio Watermarking Based on Hybrid Low and High Wavelet Frequencies Aree Ali Mohammed
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 1: April 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (809.576 KB) | DOI: 10.11591/ijict.v5i1.pp28-35

Abstract

Transform-domain digital audio watermarking has a performance advantage over time-domain watermarking by virtue of the fact that frequency  transforms offer better exploitation of the human auditory system (HAS). In this research paper an adaptive audio watermarking is proposed based on the low and high wavelet frequencies band (LF, HF). The embedded watermark can be of any types of signal (text, audio and image). The insertion of the watermark data is performing in a frequency domain after applying discrete wavelet transformation on the cover audio segments. The normalize correlation and the signal to noise ratio metrics are used to test the performance of the proposed method in terms of the robustness and imperceptibility. Test results show that an improvement of the robustness against some type of attacks when the watermark is adaptively embedded in a different wavelet bands.
Comparison of the Resonant Frequency Determination of a Microstrip Patch Antenna using ANN and Analytical Methods Lahcen Aguni; Samira Chabaa; Saida Ibnyaich; Abdelouhab Zeroual
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 1: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (765.67 KB) | DOI: 10.11591/ijict.v6i1.pp1-9

Abstract

In this paper we are interested to calculate the resonant frequency of rectangular patch antenna using artificial neural networks based on the multilayered perceptrons. The artificial neural networks built, transforms the inputs which are, the width of the patch W, the length of the patch L, the thickness of the substrate h and the dielectric permittivity to the resonant frequency fr which is an important parameter to design a microstrip patch antenna.The proposed method based on artificial neural networks is compared to some analytical methods using some statistical criteria. The obtained results demonstrate that artificial neural networks are more adequate to achieve the purpose than the other methods and present a good argument with the experimental results available in the literature. Hence, the artificial neural networks can be used by researchers to predict the resonant frequency of a rectangular patch antenna knowing length (L), width (W), thickness (h) and dielectric permittivity with a good accuracy.
Customers’ Perception Towards Services of Telecommunications Operators Driss Ait Omar; Mohamed Baslam; Mourad Nachaoui; And Mohamed Fakir
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (653.872 KB) | DOI: 10.11591/ijict.v6i3.pp146-154

Abstract

Currently the operators in the telecommunications market present offers of subscription to the consumers,and given that competition is strong in this area, most of these advertising offers are prepared to attract and / or keep customers.For this reason, customers face problems in choosing operators that meet their needs in terms of price, quality of service (QoS), etc..., while taking into account the margin between what is advertising and what is real. Therefore, we are led to solve a problem of decision support. Mathematical modeling of this problem led to the solution of an inverse problem. Specifi-cally, the inverse problem is to find the real Quality of Service (QoS) function knowing the theoretical QoS. To solve this problem we have reformulated in an optimization problem of minimizing the difference between the real quality of service (QoS) and theoretical (QoS). This model will help customers who seek to know the degree of sincerity of Their operators, as well as it is an opportunity for operators who want to maintain their resources so that they gain the trust of customers. The resulting optimization problem is solved using evolutionary algorithms. The numerical results showed the reliability and credibility of our inverse model and the performance and effectiveness of our approach.
Web-based Geographic Information System Design of Rabies Spread in Bali I. A. K. Sita Laksmita; A. A. Kompiang Oka Sudana; Putu Wira Buana
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 1: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (719.511 KB)

Abstract

Rabies is still a serious threat in the province of Bali. Because of that Bali need a good management system service that can process data and information to support the government to make decision for preventing rabies outbreak. Nowadays, data management still uses spreadsheet technology that oriented to attribute data. Geographic Information System (GIS) is a system that has the ability to process, analysis the process and analyzes spatial data or data with geographic coordinates. This article will discuss the implementation of GIS that show the spread of rabies in the province of Bali by using GeoServer as the Open Geospatial Consortium (OGC) standards-compliant server to provide geospatial data via web services. These GIS application, supported by PostGIS database as storage and processing of spatial data and OpenLayers as an interface. This application can support government for making priority decision to focus on areas which has the most high of rabies outbreak.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.589
Microstrip Antenna with Photographic Paper Substrate for WLAN D. S. Marotkar; P. L Zade
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 2: August 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (264.692 KB) | DOI: 10.11591/ijict.v7i2.pp67-70

Abstract

In this paper a compact, flexible, Multiband antenna is designed. It is having flexible Substrate of photographic paper which makes the antenna conformal. The antenna with two U slots cut in radiating patch is offset fed by microstrip lines gives the multiple bands of WLAN /WIMAX Application and two parasitic Elements improves the bandwidth of a typical microstrip antenna. The Measured results shows that the antenna resonates between Frequency band 2.10-2.95 GHz, 3.35-3.54 GHz and 5.04-6.0Hz.which are used for application such as Bluetooth, Wi-Fi, Zigbee, ISM 2.4GHz,WLAN WiMAX, and WLAN 5.2GHz.
Botnet Prevention Strategies for Social Network Users: Cases and Remedies Nishikant C Dhande
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 1: April 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (366.98 KB)

Abstract

A Botnet is a collection of computers infected with malicious code that use FTP, TFTP, and HTTP protocol based services for infecting the computers. They keep on spreading till a desired strength of Botnet is assembled. Since social networking users have inclination to grow the Social Networks, a poorly designed social networking website can have some loop holes which could invoke a Botnet to spread around the users connected to it.  In this paper attempt is made to elaborate assimilation of social networks and to show how they can turn into Botnet. This study is based on the analysis of spam, Internet blogs, newsgroups & Cases for converging into conclusionsDOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1819
Security in wireless sensor networks Bahae Abidi; Abdelillah Jilbab; Mohamed El Haziti
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (196.669 KB) | DOI: 10.11591/ijict.v8i1.pp13-18

Abstract

Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between severely resource constrained sensor nodes while maintaining the flexibility of the topology changes. Recently, several secure data aggregation schemes have been proposed for wireless sensor networks, it provides better security compared with traditional aggregation. In this paper, we try to focus on giving a brief statement of the various approaches used for the purpose of secure data aggregation in wireless sensor networks.
Demonstration of Helical Antenna Stability Beyond C-Band Frequency Rahul Yadav
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 3: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1173.839 KB)

Abstract

The paper demonstrates design of helical antenna to achieve stable frequency response and impedance matching beyond C-band microwave frequency. An impedance matching cavity is developed for excitation of higher order modes along with the fundamental mode in the helical antenna. Triple frequency bands are resonated by loading the designed helical antenna inside the cavity and a dual band response is realized by introducing variation in feed pin height with an incremental offset of 0.1λ to the initial height which is taken as 0.2λ. The broadband gain for all the designs and a detail analysis of modes along the helical antenna loaded in rectangular cavity is reported. A highest measured bandwidth of 5.4 GHz and a peak gain of 10.65 dB is obtained. The antenna being compact and conformal in design may find its application for terrestrial, aerospace communication and personal wireless communication.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4861
Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm based approach Arnold Adimabua Ojugo; Andrew Okonji Eboka
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (108.674 KB) | DOI: 10.11591/ijict.v8i3.pp128-138

Abstract

A key challenge in businesses today is determining inventory level for each product (to be) sold to clients. A pre-knowledge will suppress inventory stock-up and help avert unnecessary demurrage. It will also avoid stock out and avert loss of clients to competition. Study aims to unveil customer’s behavior in purchasing goods and thus, predict a next time purchase as well as serve as decision support to determine the required amount of each goods inventory. Study is conducted for Delta Mall (Asaba and Warri branches) department store. We adapt the memetic algorithm on market basket dataset to examine buying behavior of customers, their preference and frequency at which goods are purchased in common (basket). Result shows some items placed in basket allow customers to purchase items of similar value, or best combined with the selected items due to shelf-placement via concept of feature drift. Model yields 21-rules for eight items obtained from data transaction mining dataset acquired from Delta Mall.
Chaos Based Image Encryption using Expand-Shrink Concept Naveenkumar S K; Panduranga H T; Kiran P
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 2: August 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (897.618 KB) | DOI: 10.11591/ijict.v3i2.pp103-112

Abstract

Image information security plays a vital role in computing and communication technologies. This paper describes a new concept of expand and shrink to enhance the strength of chaos based image encryption technique. This method consists of both permutations as well as substitution process for image scrambling and encryption. In permutation plain image is shuffled using chaos technique. Input image undergo two times chaos permutation in-between expand and shrink process leads to substitution. Permutation decreases the correlation between the pixel and substitution increases the entropy of encrypted image. Proposed encryption technique works for both gray-scale and color image. From the experiment highly scrambled image is obtained at the end of encryption process. Decryption process employs exactly reverse process of encryption which results in the reconstructed images.