cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve Manoj Kumar Chande; Balwant Singh Thakur
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (786.37 KB) | DOI: 10.11591/ijict.v3i1.pp67-72

Abstract

In this work, we propose a proxy-protected proxy multi-signature scheme based on EllipticCurve Digital Signature Algorithm (ECDSA), which aims at providing data authenticity,integrity, and non-repudiation to satisfy the basic properties of partial delegation proxy signaturedescribed by Mambo et al. as well as strong proxy signature properties defined byLee et. al. The proposed signing/verifying scheme combines the advantages of proxyprotectedsignature and multi-signature scheme. The security of the proposed schemes isbased on the difficulty of breaking the elliptic curve discrete logarithm problem (ECDLP).The scheme proposed is faster and secure than the multi-signature based on factoring ordiscrete logarithm problem (DLP). The final multi-signature of a message can be verifiedindividually for each signer or collectively for a subgroup or entire group as well. Finally,the proposed proxy-protected proxy multi-signature schemes can be used in E-commerceand E-government application, which can be implemented using low power and small processingdevices.
Session based cooperation in cognitive radio networks: network level approach Sunil Ghildiyal; Himanshu Goel; Anupam Semwal
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (165.098 KB) | DOI: 10.11591/ijict.v9i1.pp40-45

Abstract

The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain the spectrum access opportunity by supporting primary users (PU’s) in cognitive radio networks (CRNs). In present generation, spectrum access is endowed through cooperative communication based link-level frame-based cooperative (LLC) principle. In this SUs independently act as conveyors for PUs to achieve spectrum access opportunities. Unfortunately, this LLC approach cannot fully exploit spectrum access opportunities to enhance the throughput of CRNs and fails to motivate PUs to join the spectrum sharing processes. Therefore to overcome this con, network level cooperative (NLC) principle was used, where SUs are integrated mutually to collaborate with PUs session by session, instead of frame based cooperation for spectrum access opportunities. NLC approach has justified the challenges facing in LLC approach. In this paper we make a survey of some models that have been proposed to tackle the problem of LLC. We show the relevant aspects of each model, in order to characterize the parameters that we should take in account to achieve a spectrum access opportunity.
Performance & grading Pattern of serving low-priced Airlines Chowdhury, Anil Bikas Kumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp%p

Abstract

Objective:    To establish a resolution on the accomplishment of the economical airways with a view to help the aviation industry in framing strategies about such airlines.Methodology - Data have been procured from DGCA, India website. Here, the yearly data of each of the airlines have been utilized. The duration of sampling includes six years 2006-07 to 2011-12 taken for the purpose of classification of operating economical airlines in India. The empirical analysis has been performed on the basis of Discriminant Analysis (DA) using SPSS version 16.0.Findings - The model has classified 22 (87.5%) cases accurately out of 24 cases which is considerably large; hence, the model can be justified as a sound one.Impact - The work will help one perceive the key areas of strength and accordingly frame feasible strategies in order to improve performance.
Cloud-based platforms for LoRa internet of things: a survey Mouna Gassara; Manel Elleuchi; Mohamed Abid
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp54-64

Abstract

Internet of Things (IoT) establishes a smart communication system between the human being and the surrounding objects (or “things”) while using the internet as the backbone of this system. Cloud is the fundamental constituent of IoT. It offers important application services in numerous application domains. Indeed, many IoT cloud platforms are competing to provide appropriate and very specific IoT services. The LoRa platform in particular presents a long-range, low-bit rate, low-power, wireless telecommunication protocol for IoT. As such, end-devices make use of LoRa through a sole wireless hop in order to communicate to the gateway(s) that is (are) considered as relay messages and transparent bridges between these end-devices and an IoT cloud while connecting to the Internet. This article surveys the most used IoT cloud platforms suitable for the LoRa communication protocol through a deep and detailed study of previously published works related to this topic. Moreover, a comparison is made between these IoT cloud platforms according to their characteristics and application domains. The overall aim of the present paper is to provide researchers in the field with detailed knowledge concerning the IoT cloud platforms appropriate to the LoRa communication system including the advantages and drawbacks of each one of them.
Design and Implementation of High Speed-Low Power Compressors as standard cells for ASIC’s chaitanya, kommu
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp%p

Abstract

The 3-2, 4-2, 5-2 find many applications in the evolution of integrated circuits. One of the major applications of them is to add partial products that are generated at one stage in Multipliers. In this paper a newly proposed 3-2, 4-2, 5-2 architectures having less delay and reduced power consumption than the conventional architectures are presented. The key idea of designing these multipliers with better performance characteristics leads to the implementation of pass transistors, transmission gates and domino logic circuits. All the CMOS circuits used in proposed architectures are having better performances than their existing CMOS counterparts. The proposed 3-2 model offer 66.6-82.69% less power and 52.48-64.62% reduction in propagation delay than the conventional 3-2 model. The proposed 4-2 model offer 52.37-55.367% less delay and 7.8-16.86% reduction in propagation delay than the conventional 4-2 model. The proposed 5-2 model offer 54.93-57.4% less power and 9.2-74.82% reduction in propagation delay. With all these significance improvements in their performance, they are chosen as a best option in designing Multipliers.
Diagnosing MERS-CoV using dempster-shafer method Memen Akbar; Fandy Hidayat; Wenda Novayani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp19-26

Abstract

MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is a respiratory syndrome disease caused by the coronavirus which attacks the respiratory tract from mild to severe. MERS-CoV was first reported in Saudi Arabia; total cases of MERS-CoV have continued to increase. In Indonesia, the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But not many people know about this disease and its symptoms. For this reason, an expert system was developed to diagnose MERS-CoV using the Dempster-Shafer method. The system can detect the disease from the symptoms inputted by user. The output of the system is the value of the probability of the disease, the level of the disease and the suggested. The levels of the disease are Stage 1, Stage 2, and Stage 3 where each has a different treatment based on the level of the disease. The system contains information about MERS-CoV in the form of videos and text. The system was built using the PHP programming language. The testing result shows that all system functionalities have been fulfilled. The expert validation testing had obtained at 76.7%, which prove that the system is good enough in diagnosing MERS-CoV and the results obtained from the questionnaire is at an average of 84.13% which is very good in helping users in diagnosing disease. The expert system that has been developed can help people in diagnosing the disease before consulting with a doctor.MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is arespiratory syndrome disease caused by the coronavirus which attacks therespiratory tract from mild to severe. MERS-CoV was first reported in SaudiArabia; total cases of MERS-CoV have continued to increase. In Indonesia,the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But notmany people know about this disease and its symptoms. For this reason, anexpert system was developed to diagnose MERS-CoV using the DempsterShafer method. The system can detect the disease from the symptomsinputted by user. The output of the system is the value of the probability ofthe disease, the level of the disease and the suggested. The levels of thedisease are Stage 1, Stage 2, and Stage 3 where each has a different treatmentbased on the level of the disease. The system contains information aboutMERS-CoV in the form of videos and text. The system was built using thePHP programming language. The testing result shows that all systemfunctionalities have been fulfilled. The expert validation testing had obtainedat 76.7%, which prove that the system is good enough in diagnosing MERSCoV and the results obtained from the questionnaire is at an average of84.13% which is very good in helping users in diagnosing disease. Theexpert system that has been developed can help people in diagnosing thedisease before consulting with a doctor. 
Electronic doorbell system using keypad and GSM O. A. Simon; U. I. Bature; K. I. Jahun; N. M. Tahir
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.446 KB) | DOI: 10.11591/ijict.v9i3.pp212-220

Abstract

In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
A neuro fuzzy image fusion using block based feature level method S. Mary Praveena; R. Kanmani; A. K. Kavitha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (528.482 KB) | DOI: 10.11591/ijict.v9i3.pp195-204

Abstract

Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented.  The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Smart Museum for Nepal Cultural Heritage Information Exchange System Sharma, Gajendra; Chandra Gurung, Ravi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp%p

Abstract

Smart Museum is a study focus on Nepal Cultural Heritage information exchange system. The main objective is to provide innovative and interactive approaches which could enhance visitors experience in the museum. Its concept is based upon smart museum that is integrating digital museum contents with information exchange by using Near Field Communication (NFC) smart tags and Quick Response (QR) code. Visitors can use their smart phone to get detail information without help of anyone. The study focuses on detail research about short distance communication network that includes NFC and QR code as of RFID technologies. Back-end system is used for providing detail information of artefacts and preservation of museum in the digital format. Mobile Software Development Life Cycle (MSDLC) was chosen for the development of the application. It was used for its development criteria covered all the aspects. The study requirements were straight forward where many factories were not much changed. MSDLC was found shorter life cycle since mobile applications needs to develop in rapid due to the market competition. Most of the museums were found under-developed as per the requirements. The direct museums visited done were found also interested on the upgrading the museum services however lack of the proper management leaded to not able to do so.
Arduino based gas leakage and temperature monitoring and control system Adoyi Boniface; A.Y. Nasir; A. M. Hassan
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (375.421 KB) | DOI: 10.11591/ijict.v9i3.pp171-178

Abstract

Gas leakage is a major problem with industrial sectors, residential premises and gas powered vehicles like CNG (Compressed Natural Gas) buses etc. One of the preventive methods to stop accidents associated with the gas leakage is to install a gas leakage detection device at vulnerable places. The aim of this project is to develop such a device that can automatically detect and control gas leakages and also monitor temperature in vulnerable areas. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor and then also monitors the temperature using a temperature sensor. When the LPG concentration in the air exceeds a certain level, the gas sensor senses the gas leakage and the output of the sensor goes LOW, the system then opens the exit windows, and then uses the GSM to alert the person about the gas leakage via SMS. Also, when the temperature of the environment exceeds a certain limit, it then turns ON the LED (indicator) and make an alarm through the buzzer. An LCD (16x2) displays the current temperature and gas leakage status in degree Celsius and PPM respectively.