cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
X-law detection scheme for monobit transmitted-reference ultra wideband receivers Hassan Khani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i2.pp75-84

Abstract

In ultra-wideband (UWB) communications, monobit receivers offer a low complexity implementation but at the same time exhibit a great performance loss. In this paper, a novel detection scheme, denoted as x-law detection (XLD), is proposed to diminish the performance loss caused by employing monobit analog-to-digital converters in transmitted-reference (TR) UWB receivers. Simulation results show that if the optimal value is employed for x, the XLD-based monobit weighted TR (MWTR) receiver can achieve 14.2~15.5 dB and 8~9.2 dB performance gain over the conventional MWTR receiver in LOS and NLOS scenarios, respectively. Moreover, the XLD-based MWTR receiver performance with the optimal value of x is only 1.6~3 dB away from the optimum MWTR receiver performance in intra-vehicle UWB channels. Additionally, the XLD-based MWTR receiver is not sensitive to the summation interval. This feature decreases the receiver complexity and guarantees a robust performance over different multipath channels. The significant performance improvement of the XLD scheme comes at a limited complexity increase. Thus, the XLD approach is a good candidate for TR-based and other training-based monobit receivers requiring low complexity, high performance, and low power consumption.
Electronic health record to predict a heart attack used data mining with Naïve Bayes method Johanes Fernandes Andry; Fabio Mangatas Silaen; Hendy Tannady; Kevin Hadi Saputra
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i3.pp182-187

Abstract

A heart attack is a medical emergency. A heart attack usually occurs when a blood clot blocks the flow of blood to the heart. Cardiovascular disease is a variety of diseases that attack the body's cardiovascular system including the heart and blood vessels. Cardiovascular diseases (CVD) include angina, arrhythmia, heart attack, heart failure, atherosclerosis, stroke, and so on. To resolving (CVD) is to evaluate large scores of datasets, to compare for any information that can be used to forecast, to take care of organize. The method used Naïve Bayes classification because that method can determine target which can be used to answer some questions like whether the patient has the potential for heart disease. After data analyst, authors can use data to electronic health records (EHR).
Design and implementation of an integrated pipeline security system with optmized scheduling Akpovi Oyubu Oyubu; Ufuoma Kazeem Okpeki
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp65-74

Abstract

Offshore equipment and facilities are some of the most capital intensive and strategically located assets that require millions to billions of dollars to setup. Thus, it is important to put in place a stout security and surveillance system to ultimately protect these assets from vandalisation and theft. Monitoring of intruders/ unfamiliar objects within and outside the offshore platform requires a round-the-clock observation through provided security personnel who are stationed so as to quickly respond to any threat within a safe distance in the event of any physical intrusion but this measure is fraught with some challenges. Some of these challenges include fatigue, error in human judgement, and the limited vision of humans to mention but a few. To remedy these weaknesses and ensure a robust protection, the design and implementation/ setting up of a surveillance system to detect and track real time security concerns with a much wider and effective coverage area to enable the control unit make a well informed decision appropriately is an imperative. The system presented in this paper is designed to operate in harsh (sea waves, and fog) and unprotected (extreme heat, cold precipitation) environment.
Experimental Realization of Finger Gesture Recognizing Glove Sensor for Deaf and Dumb Person Kumar, Vikash
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i1.pp%p

Abstract

A majority of the human beings on this planet are deaf and dumb. The exchange of information between a deaf persons who knows sign language and the person doesn't poses a serious problem for them as compared to between who doesn't know the sign language. Since communication is the fundamental and one of the very important things to have in life therefore the person who doesn't know sign language feels alien in the atmosphere he lives in. Sign language is the non-verbal form of language which uses hand gestures to express feelings and to convey information and sign language is very popular among deaf community. This paper aim is to create a helping hand glove sensor for deaf people to communicate easily with other people. The glove has five flex sensors which are glued along lengths of five fingers on the glove. The glove produces a proportional change in resistance for every particular gesture. The analogue values which are the output of the sensors are converted into digital format. These gestures are analyzed using Arduino controller. This board compares the predefined voltage levels stored in the memory with the output of the flex sensor. And thus according to that a suitable match is found and a particular sentence is displayed on the LCD and also can be heard on the speaker. This is how the proposed sensor helps the deaf people to make their life easier than before and brings new colors to their life.
Electronic control of water resources using smart field irrigation systems Amera I. Badran; Manar Y. Kashmoola
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i2.pp116-125

Abstract

Most of the research showed that the reason behind the agricultural lesions is the over usage of water in irrigation the matter which cause the appearance of fungicide on plants and salinity of the soil. From this point emerged the need for adapt some systems to work in farms in order to reduces the expenses of the product, improve its quality and lessen the consumption of water. Internet webs have been a preceding means in such a scope; and they also showed flexibility in designing such systems. In this paper; a smart irrigation system that depend on the values of moisture content and the agricultural constants (Feld Capacity, Wilt Point of the plant, Bulk Density, Depth of the root of the plant, the consumption of each water dripper and the passing area) in making the decision of irrigation and running the water pump, depending on the quantity of water to be added and the duration of irrigation time, and it is better. Field humidity levels at 0.32. This system was built by using the microcontroller ESP-32S&ESP8266 and moister sensor. The data was uploaded to Adafruit server for the sake of remote monitoring by MQTT protocol.
Adopting task technology fit model on e-voting technology Asti Ratnasari; Avrillaila Akbar Harahap; Adib Arsyad Anshori; Mumtazul Alam
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i2.pp148-158

Abstract

E-voting is a tool to support the voting process starting from recording, voting, and counting votes using electronic devices. E-voting promises a faster voting process, reduced budget costs, lost votes due to damaged ballot papers during the voting process, and others. E-voting is also used in high school student council elections. Young people are more computer literate (computer literacy) and interested in using new technology (e-voting) than adults and older people. This study aims to determine the suitability of e-voting in the SMA OSIS election to the user's task support using the task-technology fit (TTF) model. The data analysis used is multiple regression analysis. This analysis is used to determine the effect of the independent variables on the dependent variable with a significance level of 5%. The results of this study indicate that the 4 formulated hypotheses can be accepted and the students of SMK Muhammadiyah 1 Bantul feel the suitability of technology support when voting using e-voting in the selection of the high school student council.
Automated smart car parking system for smart cities demand employs internet of things technology Rahman Atiqur
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp46-53

Abstract

The use of smart cities rises quickly with the fast progress of the Internet of Things (IoT) advances. The smart city idea essentially getting city life; as well raises the capability of municipal jobs and facilities plus form viable economic progress of the city. The point of convergence of this paper is to introduce an automated smart automobile parking system for smart cities demand employs internet of things (IoT) technology. The offered automobile parking system covers an IoT entity sent nearby for getting sorted out the existing parking spots which are quicker contrasted with different frameworks. It is a viewpoint gave as an iOS application for reservation, entrance, supervision, and leaving the car park places.
An efficient coverage and maximization of network lifetime in wireless sensor networks through metaheuristics A. Nageswar Rao; B. Rajendra Naik; L. Nirmala Devi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 3: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i3.pp159-170

Abstract

In wireless sensor networks (WSNs), energy, connectivity, and coverage are the three most important constraints for guaranteed data forwarding from every sensor node to the base station. Due to continuous sensing and transmission tasks, the sensor nodes deplete more quickly and hence they seek the help of data forwarding nodes, called relay nodes. However, for a given set of sensor nodes, finding optimal locations to place relay nodes is a very challenging problem. Moreover, from the earlier studies, the relay node placement is defined as a non-deterministic polynomial tree hard (NP-Hard) problem. To solve this problem, we propose a multi-objective firefly algorithm-based relay node placement (MOFF-RNP) to deploy an optimal number of relay nodes while considering connectivity, coverage, and energy constraints. To achieve network lifetime, this work adopted energy harvesting capabilities to the sensor nodes and backup relay strategy such that every sensor node is always connected to at least one relay to forward the data. The optimal relay placement is formulated as an objective function and MOFF is applied to achieve a better solution. Extensive Simulations are carried out over the proposed model to validate the performance and the obtained results are compared with state-of-art methods)
An enhanced WPA2/PSK for preventing authentication cracking Chin-Ling Chen; Supaporn Punya
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 2: August 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i2.pp85-92

Abstract

Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
Comparative analysis on different software piracy prevention techniques Ahmad Mohammad Hassan; Ayuba John
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 10, No 1: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v10i1.pp1-8

Abstract

Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.