cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 462 Documents
In Cryptanalysis and Improvement of the Zhu et al.'s Authentication Protocol Mahdi Azizi; Abdolrasoul Mirghadri; Nasour Bagheri
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (678.608 KB)

Abstract

Zhu et al. recently have proposed an authentication prpotocol forRFID systems. In this paper, we analyze its security and explain itssecurity drawbacks. More precisely, we present traceability attackagainst this protocol. In addition, we propose an improvement on theZhu et al.'s to resists these security drawbacks. Finally, weinvestigate the formal security of the improved protocol based on theBAN logic method.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2077 
Design and architecture of wireless body area network using android application Kumar Keshamoni
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (593.862 KB) | DOI: 10.11591/ijict.v8i2.pp71-76

Abstract

Patients in hospitals have issue with health instrumentality that's connected with wires to their body. Wired health instrumentality restricts the quality of the patient. Moreover, health caretaker’s area unit compelled to work the instrumentality and take the measurements. Hence, wireless observance of patient is incredibly effective resolution thereto drawback. The most target of this study was to analysis the present trend and prospect of wireless observance of patients within the hospitals. This study conjointly aims to create the epitome system to implement wireless observance. Additionally to that, this thesis conjointly studies most fitted technique for building the foremost effective wireless observance system. The sensing element nodes and receiver of the epitome were designed. Golem phone was used as entranceway to receive the information from sensing element node and forward the information into receiver. Bluetooth Low energy was wont to communicate between sensing element nodes and golem phone. LAN is employed to speak between golem phone and also the receiver that is connected to laptop. The sensing element readings were initially ascertained in Arduino Serial Monitor so sent to sink node. The sensing element readings of a body were displayed in golem phone and yet as within the web site. Real time information of sensing element was created and with success updated within the web site. The study of results and project showed that wireless observance would be terribly effective by exploitation Interference free, short vary and extremely secure suggests that of communication. Bluetooth low energy that is appropriate choice for the system. Style of sensing element nodes ought to be terribly tiny as a result of it's to be worn round the body. Therefore smaller parts ought to be used.
An Empirical Study on the Relation Between Types of Innovations: Pardis Technology Park as a Case Study Amir Mirzadeh Phirouzabadi; M Mahmoudian; Mohammad Asghari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (453.213 KB) | DOI: 10.11591/ijict.v3i1.pp39-46

Abstract

Nowadays, Innovation is known as an essential component of competitiveness, classified in different types in literature. For instance, on one hand it is classified based on OECD as product, process, marketing and organizational innovations and on the other hand as incremental, competence developing, market developing and radical ones based on the degree of internal and external newness. Also, innovation models have changed from “simple linear” to “networking interactions” and concepts such as ‘open innovation’ and ‘innovation network’ have become important to both academic and market society due to intensive global competition. Therefore, this paper tried to empirically study and analyze the types of innovation based on OECD regarding to other classification based on the degree of internal and external newness in a networking interaction. Thus, in order to empirically explore the relations between these two classifications, we used the data of last three years (2008-2011) of 50 companies from the network Pardis Technology Park (PTP) in Iran as a case study. The results showed that most of the innovations as product, marketing and organizational were new to the market. Also marketing and process innovations were more related to radical and incremental innovation respectively and less organizational innovations were incremental.
What universities in the Middle East can learn from the American online education system Mahmoud Al-Odeh
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (344.103 KB) | DOI: 10.11591/ijict.v9i1.pp31-39

Abstract

In this paper, the author provides insights and lessons that can be learned from colleagues at American universities about their online education experiences. The literature review and previous studies of online educations gains are explored and summarized in this research. Emerging trends in online education are discussed in detail, and strategies to implement these trends are explained. The author provides several tools and strategies that enable universities to ensure the quality of online education. At the end of this research paper, the researcher provides examples from Arab universities who have successfully implemented online education and expanded their impact on the society. This research provides a strategy and a model that can be used by universities in the Middle East as a roadmap to implement online education in their regions.
True power loss reduction by augmented mine blast algorithm Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 2: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (402.602 KB) | DOI: 10.11591/ijict.v9i2.pp83-91

Abstract

In this paper, Mine Blast Algorithm (MBA) has been intermingled with Harmony Search (HS) algorithm for solving optimal reactive power dispatch problem. MBA is based on explosion of landmines and HS is based on Creativeness progression of musicians – both are hybridized to solve the problem.  In MBA Initial distance of shrapnel pieces are reduced gradually to allow the mine bombs search the probable global minimum location in order to amplify the global explore capability. Harmony search (HS) imitates the music creativity process where the musicians supervise their instruments’ pitch by searching for a best state of harmony. Hybridization of Mine Blast Algorithm with Harmony Search algorithm (MH) improves the search effectively in the solution space. Mine blast algorithm improves the exploration and harmony search algorithm augments the exploitation. At first the proposed algorithm starts with exploration & gradually it moves to the phase of exploitation. Proposed Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) has been tested on standard IEEE 14, 300 bus test systems. Real power loss has been reduced considerably by the proposed algorithm. Then Hybridized Mine Blast Algorithm with Harmony Search algorithm (MH) tested in IEEE 30, bus system (with considering voltage stability index)- real power loss minimization, voltage deviation minimization, and voltage stability index enhancement has been attained.
One-Bit Hard Combination Decision Scheme for Cooperative Spectrum Sensing in Cognitive Radio Md. Shamim Hossain; Md. Ibrahim Abdullah; Mohammad Alamgir Hossain
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 2: August 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (442.801 KB) | DOI: 10.11591/ijict.v4i2.pp66-73

Abstract

In this paper, the performance of 1-bit hard combination decision scheme for cooperative spectrum sensing in Cognitive Radio has been studied to maximize the probability of primary user detection. Energy detector model is used to observe the presence of primary user signal. Simulation result shows that the probability of missed detection is decreasing for both conventional and 1-bit hard combination OR rule with increasing the probability of false alarm correspondingly. It also has demonstrated that 1-bit hard combination decision scheme exhibits comparable performance with the conventional one-bit scheme and thus achieves a good tradeoff between performance and complexity.
Prediction of the Next Question for the Question Answering System Manvi Breja
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (783.094 KB) | DOI: 10.11591/ijict.v5i2.pp51-59

Abstract

User profiling, one of the main issue faced while implementing the efficient question answering system, in which the user profile is made, containing the data posed by the user, capturing their domain of interest. The paper presents the method of predicting the next related questions to the first initial question provided by the user to the question answering search engine. A novel approach of the association rule mining is highlighted in which the information is extracted from the log of the previously submitted questions to the question answering search engine, using algorithms for mining association rules and predicts the set of next questions that the user will provide to the system in the next session. Using this approach, the question answering system keeps the relevant answers of the next questions in the repository for providing a speedy response to the user and thus increasing the efficiency of the system.
Tiarrah Computing: The Next Generation of Computing Yanish Pradhananga; Pothuraju Rajarajeswari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (390.126 KB) | DOI: 10.11591/ijict.v6i2.pp129-138

Abstract

The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
An Agent Architecture for Qos-Based Web Service Composition Using the Skyline Algorithm El-Alami Ayoub; Hair Abdellatif
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (779.441 KB) | DOI: 10.11591/ijict.v6i3.pp179-188

Abstract

Web service composition is a concept based on the built of an abstract process, by combining multiple existing class instances, where during the execution, each service class is replaced by a concrete service, selected from several web service candidates. This approach has as an advantage generating flexible and low coupling applications, based on its conception on many elementary modules available on the web. The process of service selection during the composition is based on several axes, one of these axes is the QoS-based web service selection. The Qos or Quality of Service represent a set of parameters that characterize the non-functional web service aspect (execution time, cost, etc...). The composition of web services based on Qos, is the process which allows the selection of the web services that fulfill the user need, based on its qualities. Selected services should optimize the global QoS of the composed process, while satisfying all the constraints specified by the client in all QoS parameters. In this paper, we propose an approach based on the concept of agent system and Skyline approach to effectively select services for composition, and reducing the number of candidate services to be generated and considered in treatment. To evaluate our approach experimentally, we use a several random datasets of services with random values of qualities.
Reduction Techniques of Peak-to-Average Power Ratio in MC-CDMA Systems Mayada Faris Ghanim; M.F.L Abdullah
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (620.092 KB)

Abstract

The high peak-to-average power ratio (PAPR) is one of the main disadvantages of multicarrier code division multiple access (MC-CDMA) system. To reduce the PAPR of multicarrier CDMA signals, a lot of studies have been focused on the power characteristics of spreading sequences. This paper presents the main techniques to reduce the PAPR in MC-CDMA like Amplitude Clipping and Filtering, Coding, Selective Mapping, The adaptive predistortion technique and DFT Spreading. Then a comparison of all these techniques is done in order to clarify the main advantages and disadvantages of each technique.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.558

Page 9 of 47 | Total Record : 462