cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
Thermal imaging-based identification of facial features in noisy environment Mahajan, Palak; Abrol, Pawanesh; Lehana, Parveen Kumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp333-343

Abstract

Face identification is amongst the most efficacious and extensive applications in biometrics involving extraction and locating facial features. With identification being monotonous task attributable to reliance on parameters like varied cameras, fluctuating backgrounds, and exposure to the environment in which an individual is present. Thermal imaging is endeavoring to resolve the accuracy issue of apparent imaging, such as lighting and brightness intensity, among all biometric variables. This paper presents a study of thermal imaging and effective methods involved in the feature extraction process for facial features with thermal imaging under the influence of varied noise. A novel face dataset is created TID comprising 27 thermal images and its corresponding visual band image using Fluke 480 Ti Pro camera. The study analyses detection efficiency of six feature extraction techniques in visible and thermal bands in facial features identification. Also, the influence of noise in the thermal band within the region of interest using feature points FIN, FOUT has been estimated. Throughout TID dataset, ORB extraction technique has been able to identify strongest inlier features FIN to a maximum extent with detection around the nose, eyes, and mouth. Further, results indicate feature detection in thermal images being invariant to effect of noise for detecting facial features.
A system architecture for mixed reality systems in vocational schools in Indonesia Suryodiningrat, Satrio Pradono; Prabowo, Harjanto; Ramadhan, Arief; Santoso, Harry Budi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp207-215

Abstract

In Indonesia, vocational schools are less favored compared to K -12 schools. Unfortunately, graduates from vocational schools do not fulfill the minimum requirements set by industries, particularly in the current era of industry revolution 5.0. This revolution aims to establish society 5.0, where humans and robots collaborate closely to achieve improved work outcomes. One technique to enhance the proficiency of graduates and prepare them for the workforce is by implementing a mixed-reality system. that will effectively address a multitude of issues and significantly enhance the caliber of graduates and before the implementation of mixed reality (MR) systems, it is necessary to create system architecture diagrams to ensures that the system can be utilized not only in specific schools but also in any vocational school in Indonesia. This study comprises 5 participants, including experts from both the professional and academic fields, who possess extensive knowledge in the domains of metaverse, MR systems, and information systems. The methodology employed in this study draws inspiration from James Martin’s rapid application development (RAD). The result of this study is a validated system architectural diagram, endorsed by experts, which depicts a metaverse-based MR system designed specifically for vocational schools in Indonesia
Srvycite: a hybrid scientific article recommendation system R, Sivasankari; Dhilipan, J
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp216-228

Abstract

A recommendation system is becoming part of every work done today to reduce the effort of work done by the users in searching for items in need by recommending new items that may be useful. This theme has also been used in research article recommendation systems for recommending articles of interest to researchers from a bulk of digital research documents spread across different databases on the internet. To ease the task of this article recommendation process, we have proposed a novel approach, Srvycite, by utilizing the survey article citation network along with the original research article network. The purpose of utilizing the survey article citation network is to detect the most influential articles that are considered to be important by other researchers in the same field. The Srvycite approach utilizes the text and meta features of articles to recommend papers. To preprocess the text features utilized, we have employed Word2Vec and bidirectional encoder representations from transformers (BERT) for vectorization. Then citation graph and survey citation graphs are generated to find the most influential nodes. The weighted text similarity score is finally computed by combining the cited by values and the text similarity score from the citation and survey citation graph to list articles as recommendations for the user. This system is proven to increase the accuracy of the article recommendation by 3.8 and 2.1 in the case of the precision and recall measures for performance evaluation.
Pilot study on deploying a wireless sensor-based virtual-key access and lock system for home and industrial frontiers Eboka, Andrew Okonji; Aghware, Fidelis Obukohwo; Okpor, Margaret Dumebi; Odiakaose, Christopher Chukufunaya; Okpako, Ejaita Abugor; Ojugo, Arnold Adimabua; Ako, Rita Erhovwo; Binitie, Amaka Patience; Onyemenem, Innocent Sunny; Ejeh, Patrick Ogholuwarami; Geteloma, Victor Ochuko
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp287-297

Abstract

The rise in data processing activities vis-à-vis the consequent rise in adoption and adaptation of information and communication tech related approaches to resolve societal challenges has become both critical and imperative. Virtualization have become the order of the day to bridge various lapses of human mundane tasks and endeavors. Its positive impacts on society cannot be underestimated. This study advances a virtual wireless sensor-based key-card access system with cost-effective solution to manage access to restricted areas within a facility. We seek to integrate virtual key card access, web-access control, solenoid lock integration, and ESP32- controller to create a dependable internet of things (IoT)-enabled access control system. Results show system benefit includes improved security, improved convenience, privacy, efficiency with real-time control capabilities that will allows building administrators to track and manage access to the facility remotely.
Utilizing deep learning algorithms for the resolution of partial differential equations Nouna, Soumaya; Nouna, Assia; Mansouri, Mohamed; Boujamaa, Achchab
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp370-379

Abstract

Partial differential equations (PDEs) are mathematical equations that are used to model physical phenomena around us, such as fluid dynamics, electrodynamics, general relativity, electrostatics, and diffusion. However, solving these equations can be challenging due to the problem known as the dimensionality curse, which makes classical numerical methods less effective. To solve this problem, we propose a deep learning approach called deep Galerkin algorithm (DGA). This technique involves training a neural network to approximate a solution by satisfying the difference operator, boundary conditions and an initial condition. DGA alleviates the curse of dimensionality through deep learning, a meshless approach, residue-based loss minimisation and efficient use of data. We will test this approach for the transport equation, the wave equation, the Sine-Gordon equation and the Klein-Gordon equation.
Real time hand gesture detection by using convolutional neural network for in-vehicle infortainment systems Yaakob Wan Bejuri, Wan Mohd; Asmai, Siti Azira; Ikram, Raja Rina Raja; Rahim, Nur Raidah; Khambari, Najwan; Azmi, Mohd Sanusi; Sholva, Yus
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp42-49

Abstract

Nowadays, a variety of technologies on autonomous vehicles have been extensively developed, including in-vehicle infotainment (IVI). It have been noted as one of the key services in the automobile industry. In the near future, people will be able to watch some virtual reality (VR) movies through the streaming service provided in the vehicle. However, a person sometime not tend to be joy while watching espcially when the remote controller or audio sensory controller lack of battery or too far from IVI panel. Thus, the purpose of this research is to design a scheme of real time hand gesture detection for in-vehicle infotainment system, in order to create human computer experience. In this research, the image of human palm hand will be taken by using camera for recognize the hand gesture action. This proposed scheme will recognize human gesture and convert to be computer intruction, that can be understood by IVI device. As a result, it show our proposed scheme can be the most consistent in term of accuracy and loss compared to others method. Overall, this research represents a significant step toward improving better user experience. Furthermore, the proposed scheme is anticipated to contribute significantly to the IVI field, benefiting both academia and societal outcomes.
Blockout 2024: digital mobilization movements’ role in raising global awareness and fostering change Sutikno, Tole; Handayani, Lina
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp436-444

Abstract

Blockout 2024, a social media mobilization campaign, gained traction in response to celebrities’ and powerful people’s silence following the Met Gala in New York. Users who have remained silent or unconcerned about the humanitarian situation in Gaza are encouraged to block influencers’ accounts. The review seeks to investigate the Blockout 2024 phenomenon and how it affects celebrities’ social media. This review examines the impact of social media on power dynamics. On social media platforms such as TikTok, Instagram, and X, users have blocked the accounts (especially celebrities’ account) of those who have not responded to the humanitarian disaster. The movement emphasizes the importance of implementing change and making underrepresented voices heard in digital environments. While some celebrities have expressed their support, others have chosen to remain silent, which has resulted in criticism and lost followers. Finally, the Blockout 2024 campaign has gained significant traction on social media platforms such as X, Instagram, and TikTok. Users of social media are becoming more aware of their responsibility to denounce crimes and fight for justice, as evidenced by this group effort. The Blockout 2024 movement has highlighted the potential of digital mobilization to raise global awareness, address humanitarian crises, and hold influencers accountable.
Predictive model for converting leads into repeat order customer using machine learning Maured, Deryan Everestha; Kusuma, Gede Putra
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp20-30

Abstract

In the competitive business landscape, customer relationship management (CRM) is pivotal for managing customer relationships. Lead generation and customer retention are critical aspects of CRM as they contribute to sustaining business growth and profitability. Also, identifying and converting leads into repeat customers is essential for optimizing revenue and minimizing promotional costs. This study focuses on developing a predictive model using machine learning techniques to convert leads into repeat order customers in conventional businesses. Leveraging data from a motorcycle distribution company in Jakarta and Tangerang, the study compares the performance of various models for predicting repeat orders. This includes individual models like DeepFM, random forest, and gradient boosting decision tree models. Additionally, it explores the effectiveness of stacking these models using logistic regression as a meta-learner. Furthermore, the study implements backward feature elimination for feature selection and hyperband for hyperparameter tuning to enhance model performance. The results indicate that Stacking model using base model default configuration stands out as the most robust, achieving the highest scores in accuracy (0.95), area under the curve receiver-operating characteristic curve (AUC-ROC) (0.67), log loss (0.19), weighted average precision (0.95), weighted average recall (0.95), and weighted average F1- score (0.92), effectively handling the imbalanced dataset.
Conceptualization of IoT architectures Paolone, Gaetanino; Paesani, Romolo; Camplone, Jacopo; Piazza, Andrea; Di Felice, Paolino
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 14, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v14i1.pp334-346

Abstract

Although there is a large interest about internet of things (IoT) architectures, still there is no consensus on their conceptualization in the extant literature. This lack of information in conceptualization is problematic because it hampers the deep understanding of the appeared proposals, as well as the adoption of a shared workflow by the involved architects of these systems. Thus, a concise and agreed-upon conceptualization of IoT architectures is called for. This paper aims at giving a contribution on the topic. We start by reviewing the available standards, then, in light of their suggestions, a workflow to be followed in the definition of the architecture descriptions (ADs) of IoT systems is detailed and, in addition, a sample case study, which implements that workflow, is proposed. The contributions are sufficiently abstract to be applicable also to the description of the architecture of artificial intelligence of things (AIoT) systems.
Mastering information security through standard implementation Ahmedi, Basri; Ibrahimi, Aferdita
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 13, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v13i3.pp428-435

Abstract

This paper aims to enhance information security within an organization, considering the perennial concern for security in organizations utilizing ICT applications. Educational institutions also exhibit deficiencies in the domain of data security. The adoption of international organization for standardization (ISO) 27001-2013 served to pinpoint potential vulnerabilities and non-compliance with safety standards, aiming to minimize associated risks. Through this framework, an assessment of data security within public educational institutions in our country was conducted, focusing on a public university as a case study. Given the sensitive nature of this field, guidance is provided on identifying security-related issues based on ISO 27001 standards and on-ground situations. Surveys were employed, aligning with the required standards, to scan the prevailing situation. Data from surveys at public academic institution were collected and analyzed using the SPSS application. The findings underscore instances where security protocols can prevent or mitigate abuses, consequently enhancing the overall level of data security. Emphasizing education as a pivotal recommendation, this study advocates for educating personnel who handle sensitive data, derived from the application of these standards. This paper accounts for potential risks that could expose organizational weaknesses and thoroughly elucidates the steps and procedures undertaken in this approach, substantiated by illustrated examples.