cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 7 Documents
Search results for , issue "Vol. 14 No. 2 (2020)" : 7 Documents clear
Enhanced Image Encryption Using Two Chaotic Maps Fatimah Abdulnabi Salman; Khitam Abdulnabi Salman
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2020.14.2.3

Abstract

Information security is an important aspect in various communication areas, multimedia frameworks, medical imaging and militant communications. However, most of them encounter issues such as insufficient robustness or security. Recently, the approach of achieving information security by using chaotic techniques has gained popularity, since they provide ergodic and random generated keys. This paper introduces a combination of two chaotic maps (3D logistic map and Arnold's cat map) that meet the general security requirements of image transmission. First the image is encrypted using Arnold's cat map, which shuffles the image pixels. 3D logistic map is applied to the encrypted image for transformation and permutation purposes. Then the XOR operation for the encrypted image and a chaotic sequence key are used to provide more security after the pixel values have been changed. The performance of the proposed security method was evaluated using MATLAB by analyzing the correlation between adjacent pixels, histogram analysis, and entropy information. The simulation results showed that the proposed method is robust and resilient. It can achieve an average of 7.99 for entropy information, 99.6% for NPCR, and 33.77 % for UCAI.      
A Global Two-Stage Histogram Equalization Method for Gray-Level Images Khaled Almotairi
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/10.5614/itbj.ict.res.appl.2020.14.2.1

Abstract

Digital image histogram equalization is an important technique in image processing to improve the quality of the visual appearance of images. However, the available methods suffer from several problems such as side effects and noise, brightness and contrast problems, loss of information and details, and failure in enhancement and in achieving the desired results. Therefore, the Adaptive Global Two-Stage Histogram Equalization (GTSHE) method for visual property enhancement of gray-level images is proposed. The first stage aims to clip the histogram and equalize the clipped histogram based on the number of occurrences of gray-level values. The second stage adaptively adjusts the space between occurrences by using a probability density function and different cumulative distribution functions that depend on the available and missing gray-level occurrences. Experiments were conducted using a number of benchmark datasets of images such as the Galaxies, Biomedical, Miscellaneous, Aerials, and Texture datasets. The results of the experiments were compared with a number of well-known methods, i.e. HE, AHEA, ESIHE, and MVSIHE, to evaluate the performance of the proposed method. The evaluation analysis showed that the proposed GTSHE method achieved a higher accuracy rate compared to the other methods.
Decision Routing Problems in A Wireless Sensor Network Based on A Neural Mechanism Aybek Fayzullaevich Khaytbaev
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/10.5614/itbj.ict.res.appl.2020.14.2.2

Abstract

This article proposes a solution for the routing problem in wireless sensor networks (WSN) based on a neural mechanism. The basic concepts of wireless sensor networks, artificial neural networks (ANNs), and WSN routing protocols are presented. The Kohonen ANN was selected to solve the problem of routing in wireless sensor networks based on a neural mechanism. A radio visibility matrix is proposed, which is a mathematical description of the connectivity of network nodes and the radio visibility of each node with respect to all other network nodes. Based on the Kohonen ANN trained by the constructive method, a method for WSN neural network clustering was developed. Two software-modeling environments are presented that were created to confirm the theory with respect to the logic of the developed methods for WSN clustering, their correction and the verification of their adequacy. Numerical results of modeling the solution of the routing problem in a wireless sensor network based on a neural mechanism by neural network clustering, the WSN matrix clustering method and the energy distance neural clustering protocol (EDNCP) are presented. It was found that the developed EDNCP protocol was 29% more efficient than known analogs.
A Novel Boost-Buck Converter Architecture for Improving Transient Response and Output-Voltage Ripple Freddy Kurniawan; Lasmadi Lasmadi; Okto Dinaryanto; Bambang Sudibya; Mohammad Ridlo Erdata Nasution
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2020.14.2.4

Abstract

Buck-boost converters are widely used in the development of DC-DC converters. Several techniques and algorithms have been introduced to improve the transient response of buck-boost converters. However, due to the opposite trends of the output current change and the output voltage change, undershoot or overshoot in the output voltage still seems to be inevitable. In order to overcome this problem, a novel boost-buck converter architecture is proposed to build a fast transient response DC-DC converter. The converter consists of a cascaded configuration of the boost and buck stages. The boost stage converts the input voltage to the shared capacitor voltage and the buck stage supplies energy to the load by converting the shared capacitor voltage to the output voltage. By harnessing the energy stored in the shared capacitor, the transient response of the boost buck converter can be improved to 2 µs in a step-up load current change of 1 A with an output-voltage ripple of 15 mV.
Real Power Loss Reduction and Voltage Stability Enhancement by Stock Exchange, Product Demand-Availability, Affluent and Penurious Algorithms Kanagasabai Lenin
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2020.14.2.5

Abstract

In this paper, the Stock Exchange Algorithm (SEA), the Product Demand-Availability (PDA) algorithm, and the Affluent and Penurious (AP) algorithm are proposed to solve the power loss reduction problem. In the SEA approach, selling and buying shares in the stock exchange was imitated to design the algorithm. Stockholders are classified as Privileged, Average or Weak based on their fitness value. The PDA optimization algorithm is based on the consumer demand and availability of a product in the market. The Affluent and Penurious algorithm mimics the social behavior of people. The gap parameter (G) is defined to indicate the growing gap between affluent and penurious people when affluent people increase their wealth. The proposed Stock Exchange Algorithm, Product Demand-Availability optimization algorithm and the Affluent and Penurious optimization algorithm were tested in the IEEE 30 bus system. Real power loss minimization, voltage deviation minimization, and voltage stability index enhancement were successfully attained.
Research on Quality of Service Based Routing Protocols for Mobile Ad Hoc Networks Selman Hizal; Ahmet Zengin
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2020.14.2.6

Abstract

Quality of service (QoS) based routing protocols play a significant role in MANETs to maintain proper flow of data with efficient power consumption and without data loss. However, several network resource based technical challenges or issues are encountered in the design and implementation of QoS routing protocols that perform their routing function by considering the shortest route or the lowest cost. Furthermore, a secondary route is not reserved and alternative routes are not searched unless the established route is broken. The current structures of the state-of-the-art protocols for MANETs are not appropriate for today's high bandwidth and mobility requirements. Therefore, research on new routing protocols is needed, considering energy level, coverage, location, speed, movement, and link stability instead of only shortest path and lowest cost. This paper summarizes the main characteristics of QoS-based routing protocols to facilitate researchers to design and select QoS-based routing protocols. In this study, a wide range of protocols with their characteristics were classified according to QoS routing strategy, routing information update mechanism, interaction between network and MAC layer, QoS constraints, QoS guarantee type and number of discovered routes. In addition, the protocols were compared in terms of properties, design features, challenges and QoS metrics.
Cover JICTRA Vol. 14 No. 2, 2020 Journal of ICT Research and Applications
Journal of ICT Research and Applications Vol. 14 No. 2 (2020)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Page 1 of 1 | Total Record : 7