cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Determination of Number of Channels in Multiple Access Techniques for Wireless Communications Venkata Raghavendra Miriampally; G. Subba Rao; V Sudheer Raja
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 1: April 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (401.381 KB) | DOI: 10.11591/ijict.v4i1.pp1-6

Abstract

In wireless communications system, it is desirable to allow the subscriber to send simultaneously information to the base station while receiving information from base station. Multiple access techniques are used to allow many mobile users to share simultaneously a finite amount of radio spectrum. Frequency division multiple access (FDMA), time division multiple access(TDMA), and code division multiple access (CDMA) are the three major access techniques used to share the available bandwidth in a wireless communication system. In this paper we calculated the number of channels required for FDMA & TDMA techniques depending on various factors such as spectrum, channel band width etc.
The Comparison of Access Point Signal Gain with Beverage Cans Ni Wayan Sri Ariyani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 3: December 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (594.657 KB) | DOI: 10.11591/ijict.v4i3.pp124-130

Abstract

Computer network development depends on the development of information technology and communication. Several things as the reasons to develop the technology of computer network are implementing communication flexibly which in this case in the theory of computer network is to build wireless network communication. The existence of wireless communication as the comparison against wired network, having different impairment compared to wired communication. One of which is the weakening of wireless signal strength towards the ongoing communication distance. Therefore in wireless communication currently plenty of it being implemented, to handle the occurring impairment due to distance influence, it is needed for signal amplifier device. One of signal amplifier that can be used in the surroundings which is economical and practical is by using used beverage can.
Future Tech 5g Virtual Zero Latency Nikitha Nikitha Nikitha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 3: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (74.821 KB) | DOI: 10.11591/ijict.v5i3.pp106-110

Abstract

With the point of conveying any data in whenever and anyplace, the people to come (5G) remote communication systems turn into a style theme in the remote examination territories and new waveform, as one of the key empowering advances in 5G physical layer, pulls in developing exploration considerations lately. Be that as it may, the current method for waveform examination or investigation depends on the change of range productivity or use, while the majority of them neglects to research the vitality proficiency conduct, which is appeared to be the key execution metric of 5G frameworks. In this paper, the most part is concentrated on looking over the waveforms from the vitality proficiency perspective. Two classifications of waveforms, specifically channel based waveform and spreading-based waveform, are broke down and the related execution issues are talked about. Besides, we actualize the above waveforms utilizing programming characterized radio based model stage and produce the estimation results for the vitality productivity correlation.
Improving the Network Life Time Based on Energy Efficient Routing in Ad Hoc Networks P. Parthiban; G. Sundararaj
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 1: April 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (382.688 KB) | DOI: 10.11591/ijict.v6i1.pp49-57

Abstract

The maximization of a networks lifetime is an important part of research in the present scenario. In ad hoc network, the topology of network changes frequently due to the mobility of mobile nodes where the communication is possible without any network infrastructure. Mobile nodes have limited energy resources so that the energy efficient routing should be provided which increases the life time of the network. The existing routing mechanisms do not consider energy of nodes for data transmission. In this paper a novel approach is analyzed to improve the networks lifetime where the data transfer is based on the minimum hop count and residual energy of the mobile nodes. The analysis is carried out by using the network simulator and the simulation results shows that the proposed work provides an energy efficient routing in ad hoc networks. 
Novel TEA Algorithm for IP Telephony System Samah Osama M Kamel
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 1: June 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1124.351 KB)

Abstract

IP telephony that transmit voice calls over an IP network such as the Internet, IP telephony are growing very fast replace the traditional circuit switched infrastructure for telephony services. So we must protect all data that are transmitted from all attacks. To implement this process, the voice is encrypted, authenticated and decrypted to get the original data. The paper examines and evaluates the six encryption algorithm to minimize delay time to achieve minimum encryption time. A Novel TEA encryption Algorithm is examined for the minimum processing time to be suitable for IP Telephony which takes minimum timeDOI: http://dx.doi.org/10.11591/ij-ict.v1i1.485
Face Recognition in the Scrambled Domain Using MK-RDA and ANN Kavita Kadam; C.R Jadhav
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.552 KB) | DOI: 10.11591/ijict.v7i1.pp16-23

Abstract

Facial look identity is a vital mission by means of human-interacting structures that goal to be aware of versions within the human’s emotional state. the principle challenge or the crucial part in surveillance society is the privacy-shielding era. because the rapid improvement in the internet international it turns into very essential to scramble the pics in the video or files for the duration of transmission. in this the biometric identity of photographs or faces from scrambled pictures plays a completely tough mission. Numbers of various technology are carried out to provide privateness for the duration of surveillance or during transmission of video however they're lack of essential traits, like reversibility or visible fine maintenance. in lots of scrambling methods the faces are covered by a few animation which may additionally or may not cover all faces or it receives hard to recover pics from this technique. Many guide method also are us used by which we will unscramble an photo but they are no longer powerful that a good deal. to overcome all this matters we proposed a novel approach- Many-Kernel Random Discriminate analysis (MK-RDA) to find out discriminative patterns from chaotic indicators. structures get better accuracy bring about best photos. To PIE and ORL datasets has getting above ninety% accuracy.
Optimal Solution of Minmax 0/1 Knapsack Problem using Dynamic Programming Ani Dijah Rahajoe; Edi Winarko
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 1: April 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (704.037 KB)

Abstract

Knapsack problem is a problem that occurs when looking for optimal selection of objects that will be put into a container with limited space and capacity. On the issue of loading goods into the container, optimal selection of objects or items to be sent must fulfilled to minimize the total weight of the capacity or volume limits without exceeding the maximum capacity of containers that have been determined. The types of knapsack that has been discussed so far is only to maximize the use not to exceed the limits specified capacity so it cannot be applied to the problem. This study aims to develop a dynamic programming algorithm to solve the MinMax 0/1 knapsack, which is an extension of the 0/1 knapsack with minimal and maximal constrain.  The result study showed that application of the MinMax 0/1 knapsack is used to generate the optimal solution to the problem of loading system goods into the container to optimize container space available compared with the loading of goods by PT DFI.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1299
Detection and Separation of Eeg Artifacts Using Wavelet Transform R. Suresh Kumar; P. Manimegalai
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (993.609 KB) | DOI: 10.11591/ijict.v7i3.pp149-156

Abstract

Bio-medical signal processing is one of the most important techniques of multichannel sensor network and it has a substantial concentration in medical application. However, the real-time and recorded signals in multisensory instruments contains different and huge amount of noise, and great work has been completed in developing most favorable structures for estimating the signal source from the noisy signal in multichannel observations. Methods have been developed to obtain the optimal linear estimation of the output signal through the Wide-Sense-Stationary (WSS) process with the help of time-invariant filters. In this process, the input signal and the noise signal are assumed to achieve the linear output signal. During the process, the non-stationary signals arise in the bio-medical signal processing in addition to it there is no effective structure to deal with them. Wavelets transform has been proved to be the efficient tool for handling the non-stationary signals, but wavelet provide any possible way to approach multichannel signal processing. Based on the basic structure of linear estimation of non-stationary multichannel data and statistical models of spatial signal coherence acquire through the wavelet transform in multichannel estimation. The above methods can be used for Electroencephalography (EEG) signal denoising through the original signal and then implement the noise reduction technique to evaluate their performance such as SNR, MSE and computation time.
Technical Challenges of Tower Sharing in Multi-Operator Mobile Communication Environments Koudjo Mawuefam Koumadi; Raymond Folley; Kester Quist-Aphetsi; Amevi Acakpovi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 3: December 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (624.629 KB)

Abstract

The traditional mobile communications business model was based on full ownership of network infrastructure. However, network infrastructure sharing has been a trend among mobile network operators. Sharing traditional mobile network infrastructure which were not designed originally for sharing has become prevalent in the face of stiff competition, regulatory requirement and declining revenues. This, despite the reduction in capital expenditure for operators, brings technical challenges with regards to network planning, optimization and expansion in multi-operator shared environments. This paper briefly introduces models of passive infrastructure sharing and their advantages, and investigates the technical challenges which are inherent to communications tower sharing. The effects of non-optimal antenna height on coverage and signal quality, as well as those of tower loading constraints on transmission link quality are investigated among others. Simulation results and on-site measurements confirm these challenges, which may increase the operation expenditure of mobile networks.Our findings challenge the current perception in both academia and industry that passive infrastructure sharing can only produce positive effects, and therefore call for further investigations on the financial benefits of infrastructure sharing.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4553 
Tailored flower pollination (TFP) algorithm for diminution of real power loss Lenin Kanagasabai
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (506.096 KB) | DOI: 10.11591/ijict.v8i2.pp94-101

Abstract

In this paper, Tailored Flower Pollination (TFP) algorithm is proposed to solve the optimal reactive power problem. Comprising of the elements of chaos theory, Shuffled frog leaping search and Levy Flight, the performance of the flower pollination algorithm has been improved. Proposed TFP algorithm has been tested in standard IEEE 118 & practical 191 bus test systems and simulation results show clearly the better performance of the proposed algorithm in reducing the real power loss.