cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Ensemble stacking classifier model for prediction of diabetes Bhandarkar, Mrunalini; Bendre, Varsha S.; Bellary, Yash Venkatesh; Bhole, Anuj Kiran; Bhadange, Abhishek Abasaheb
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp499-508

Abstract

Diabetes, being a chronic condition, possesses the capacity to instigate a global healthcare catastrophe. This condition can be managed and potentially cured with prompt diagnosis and treatment. Integrating machine learning technology with medical science enables precise prognosis of an individual’s susceptibility to diabetes. The proposed work presents the ensemble stacking classifier model. This efficient and effective diabetes prediction model predicts a patient’s diabetes risk by combining the output of multiple machine-learning techniques into a single model. The performance parameters of four distinct machine learning classification algorithms K-nearest neighbors (KNN), random forest (RF), support vector machine (SVM), and decision tree (DT) are compared in this study with those of the proposed stacked classifier model. The suggested model is developed using ensemble methods, where the previously discussed algorithms are integrated to create the base classifier layer of the stack classifier. The meta-classifier is implemented in the form of the logistic regression (LR) algorithm. Upon evaluating the performance of both the developed model and its algorithms, it is proved that the proposed model attains a testing accuracy of 88.5%, surpassing the accuracy of all baseline classification algorithms. As a result, this work determines that the ensemble stacking classifier model exhibits higher prediction accuracy than the base classifier algorithms. This finding underscores the model’s potential as a viable instrument for predicting diabetes in individuals.
Symmetrical cryptographic algorithms in the lightweight internet of things Dhingra, Akshaya; Sindhu, Vikas; Sangwan, Anil
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp307-314

Abstract

The internet of things (IoT) has emerged as a prominent area of scrutiny. It is being deployed in multiple applications like smart homes, smart agriculture, intelligent surveillance systems, and even innovative industries. Security is a significant issue that needs to be addressed in these types of networks. This paper aims to describe symmetrical lightweight cryptographic algorithms (SLCAs) for lightweight IoT networks. The article focuses on discussing the principal difficulties of using cryptography in lightweight IoT devices, exploring SLCAs and their types based on structure formation throughout the literature survey, and comparing and evaluating different LCAs proposed in recent research. The main goal is to demonstrate how to solve the issues associated with conventional cryptography techniques and how lightweight cryptography algorithms aid limited IoT devices in achieving cybersecurity objectives.
Factors influencing the integration of web accessibility in Moroccan public e-services Ezzahra, Chadli Fatima; Moumen, Aniss; Gretete, Driss; Sabri, Zineb
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp77-90

Abstract

Governments worldwide are increasingly digitizing their services to enhance efficiency, transparency, and accessibility for citizens. Morocco has made significant strides in adopting information and communication technology (ICT) and has implemented various initiatives to promote digital transformation across sectors. However, ensuring that digital content and e-services are accessible to everyone, including people with disabilities, is crucial to building an inclusive digital environment. Against this background, this study, based on a qualitative analysis, explores the main factors influencing the integration of web accessibility in the Moroccan public sector from the perspective of web developers and information technology (IT) managers. Through semi-structured interviews and thematic analysis, the findings reveal key barriers such as limited awareness, training deficiencies, and lack of legal framework and available guidelines. Additionally, the study highlights the need for robust managerial backing and greater collaboration with stakeholders, including people with disabilities. By raising awareness and providing actionable insights, this study offers valuable recommendations for policymakers and moves the field forward, providing a foundation for future strategies to enhance web accessibility in the Moroccan public sector.
Entanglement classification – a comparative study of ??(?) and ??(?) developed operator model Zhahir, Amirul Asyraf; Mohd, Siti Munirah; M. Shuhud, Mohd Ilias; Idrus, Bahari; Zainuddin, Hishamuddin; Mohamad Jan, Nurhidaya; Wahiddin, Mohamed Ridza
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp556-562

Abstract

Entanglement classification is a core aspect of quantum information theory. It ensures successful quantum information processing. This article presents a comparative study of entanglement classification using developed operator models for the special unitary group and special linear group. This study was built upon prior work in entanglement classification in a pure three-qubit quantum system environment, where the operator models for each mathematical group were independently developed. Through extensive analysis, both synthesized models are functionally effective and yield the desired results. However, the comparative analysis reveals that the operator model exhibits certain limitations, particularly in its early phase of development compared to. This study provides significant enlightenments into the practical abilities of the developed operator models in entanglement classification and underlines the theoretical distinction between and paving the path for future research in quantum information theory, specifically entanglement classification.
The 360° beach video: a supporting mindfulness intervention with virtual reality Naini, Rohmatus; Wibowo, Mungin Eddy; Purwanto, Edy; Mulawarman, Mulawarman; Anwas, E. Oos M.
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp250-258

Abstract

This article describes optimizing virtual reality (VR) with a 360° beach video model used for mindfulness interventions. Using VR with 360° beach videos to support the presence of an immersive environment can effectively support mindfulness practices. Students are interested in the integration of technology in school counseling. VR helps in creating immersive environments such as forests, beaches, waterfalls, etc. so that students focus more on practicing mindfulness and attention in the current moment. This article focuses on optimizing 360° beach videos in the breathing mindfulness process so that it helps bring out real experiences. Obstacles to practicing mindfulness include lack of focus, mind wandering and not concentrating. through the use of 360° beach videos with VR can increase focus and be more effective in mindfulness practice.
Security analysis and evaluation of mobile banking applications in Nigeria Imam, Abdullahi Yahya; Usman, Hamisu Ibrahim; Abba, Abdulrazaq
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp354-361

Abstract

Rapid fintech adoption across the world is so ubiquitous. To facilitate more adoption in Nigeria, recently the Central Bank of Nigeria (CBN) introduced several policies that support cashless banking. Nowadays, Nigerian banks users could perform most of their daily transactions from any desired location using mobile banking applications. In the literature, there are insufficient studies that comprehensively evaluate the security strength or risks of these applications. Generally, insecure mobile banking applications could lead to financial fraud, violations of privacy, identity theft and eroded user confidence. Considering the situation, there is need to conduct research which comprehensively assess security of the applications. Consequently, in this paper we analyzed and evaluated the security of identified popular mobile banking applications in Nigeria. We conducted the analysis work using automated and manual static analysis methods. Then, we evaluated the security of the applications using multi-criteria decision-making technique. Our results revealed that most of the applications have several security challenges in form of vulnerabilities and insecure coding practices. Hence, our findings have shown the applications need further improvements for better security and safety.
Memory management of firewall filtering rules using modified tree rule approach Hakani, Dhwani; Mann, Palvinder Singh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp141-152

Abstract

Firewalls are essential for safety and are used for protecting a great deal of private networks. A firewall’s goal is to examine every incoming and outgoing data before granting access. A notable kind of conventional firewall is the rule-based firewall. However, when it comes to job performance, traditional listed-rule firewalls are limited, and they become useless when utilized with some networks that have extremely big firewall rule sets. This study proposes a model firewall architecture called “TreeRule Firewall,” which has benefits and functions effectively in large-scale networks like “cloud.” In order to improve cloud network security, this study suggests a modified tree rule firewall (MTRF cloud) that eliminates rule discrepancies. For the matching firewall policy, this work creates a tree rule firewall. There are no duplicate rules created by the proposed improved tree rule firewall. Also, memory utilization of different size rules is compared.
Application of artificial intelligence in modern public administration: new opportunities and challenges Shvets, Kateryna; Onyshchenko, Andrii; Kudin, Volodymyr; Korchak, Nataliia; Ivanii, Olena
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp509-518

Abstract

Humanity is entering a technological era of convergence of artificial intelligence (AI), cyber and biotechnology, robotics and additive manufacturing, which creates unprecedented opportunities and risks on a global scale. AI has quickly become an important topic for global development. Not only the corporate sector but also governments are interested in creating a favourable environment for these technologies. This article explores the role and impact of AI in the context of modern public administration. The authors assess how AI opens up new opportunities for improving public services and the efficiency of management processes. Particular emphasis is placed on the ability of AI to analyse large amounts of data to inform decision-making, improve interaction with citizens, and optimise internal management processes. Potential challenges are also discussed, including ethical issues, privacy concerns, and automation risks. The article proposes strategies for a balanced implementation of AI in public administration, with a special emphasis on the need to develop skills and competencies among civil servants to use these technologies effectively.
Online reviews on E-commerce platforms in Vietnam: The role of trust in behavioral intention Phuong Duy, Nguyen Binh; Kien, Dang Trung; Thinh, Vuong Minh; Phuong Thuy, Nguyen Binh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp195-206

Abstract

This comprehensive study thoroughly explores the factors related to online reviews that influence users’ purchase intention through trust. Drawing on robust theoretical foundations and relevant research, the study establishes connections between trust-promoting factors and user behavioral intentions on e-commerce platforms in Vietnam. The study, which involved a survey of 680 users for data collection and partial least squares structural equation modeling (PLS-SEM) analysis, unveils that the usefulness of online reviews is the key driver of behavioral intention. Moreover, trust plays a pivotal mediating role in linking the quality and rating of online reviews to users’ purchase intentions. These findings not only enrich the theoretical foundation of behavioral research on online platforms but also offer practical managerial implications, empowering e-commerce platforms to develop a comprehensive review system and enhancing users’ online shopping experience.
A survey on novel approach to semantic computing for domain specific multi-lingual man-machine interaction Bohra, Anjali; Barwar, Nemi Chand
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp1-10

Abstract

Natural language processing (NLP) helps computational linguists to understand, process, and extract information from natural languages. Linguist Panini signifies ’information coding’ in a language and explains that Karakas are semanticosyntactic relations between nouns and verbs that resemble participant roles of modern case grammar. Computational grammar maps vibhakti (inflections) of nominals and verbs to their participant roles. Karaka’s theory extracts semantic roles in the sentences which act as intermediate steps for various NLP tasks. The survey shows that NLP seeks to bridge the gap for man-machine interaction. The work presents the impact of machine learning on natural language processing with changing trends from traditional to modern scenarios with Panini’s classification scheme for semantic computing facilitating machine understanding. The study presents the significance of Karaka for semantic computing, methodologies for extracting semantic roles, and analysis of various deep learning-based language processing systems for applications like question answering. The survey covered around 50 research articles and 21 Karaka-based NLP systems performing multiple tasks like machine translation, question-answering systems, and text summaries using machine learning tools and frameworks. The work includes surveys from renowned journals, books, and relevant conferences, as well as descriptions of the latest trends and technologies in the machine learning domain.