cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 302 Documents
Tweet-based Target Market Classification Using Ensemble Method Muhammad Adi Khairul Anshary; Bambang Riyanto Trilaksono
Journal of ICT Research and Applications Vol. 10 No. 2 (2016)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2016.10.2.3

Abstract

Target market classification is aimed at focusing marketing activities on the right targets. Classification of target markets can be done through data mining and by utilizing data from social media, e.g. Twitter. The end result of data mining are learning models that can classify new data. Ensemble methods can improve the accuracy of the models and therefore provide better results. In this study, classification of target markets was conducted on a dataset of 3000 tweets in order to extract features. Classification models were constructed to manipulate the training data using two ensemble methods (bagging and boosting). To investigate the effectiveness of the ensemble methods, this study used the CART (classification and regression tree) algorithm for comparison. Three categories of consumer goods (computers, mobile phones and cameras) and three categories of sentiments (positive, negative and neutral) were classified towards three target-market categories. Machine learning was performed using Weka 3.6.9. The results of the test data showed that the bagging method improved the accuracy of CART with 1.9% (to 85.20%). On the other hand, for sentiment classification, the ensemble methods were not successful in increasing the accuracy of CART. The results of this study may be taken into consideration by companies who approach their customers through social media, especially Twitter.
Evaluating e-Government and Good Governance Correlation Suhardi Suhardi; Alfira Sofia; Agustinus Andriyanto
Journal of ICT Research and Applications Vol. 9 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.3.3

Abstract

Assessing the achievement of Indonesian government institutions in implementing e-government has been conducted since around a decade ago. Several national assessments are available with almost the same ranking results. There is an agreement that the ultimate goal of e-government implementation is to achieve good government governance (GGG), while success stories of e-government require good governance practices. This study explored the correlation between e-government achievement and GGG achievement in Indonesia. Spearman's rank correlation was used to characterize the relationship strength between e-government assessment results and good governance assessment results. The data were collected from institutions that participated in e-government and good governance assessments. The results showed that the correlation between these two entities is not very strong. Most cases showed that e-government implementation and the achievement of good governance have only a moderate positive correlation and none of the studied cases indicated a significant connection. This result can be attributed to the lack of emphasis on goals achievement in the assessments. Thus, it is recommended that future Indonesian e-government assessments should involve impact indicators.
Business Value of Information Technology Service Quality Based on Probabilistic Business-Driven Model Jaka Sembiring
Journal of ICT Research and Applications Vol. 9 No. 1 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.1.3

Abstract

The business value of information technology (IT) services is often difficult to assess, especially from the point of view of a non-IT manager. This condition could severely impact organizational IT strategic decisions. Various approaches have been proposed to quantify the business value, but some are trapped in technical complexity while others misguide managers into directly and subjectively judging some technical entities outside their domain of expertise. This paper describes a method on how to properly capture both perspectives based on a  probabilistic business-driven model. The proposed model presents a procedure to calculate the business value of IT services. The model also covers IT security services and their business value as an important aspect of IT services that is not covered in previously published researches. The impact of changes in the quality of IT services on business value will also be discussed. A simulation and a case illustration are provided to show the possible application of the proposed model for a simple business process in an enterprise.
Strengthening Crypto-1 Cipher Against Algebraic Attacks Farah Afianti; Ari M. Barmawi
Journal of ICT Research and Applications Vol. 9 No. 1 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.1.5

Abstract

In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is proposed. It applies a primitive polynomial companion matrix. SAT solvers cannot directly attack the feedback shift register that uses the modified Boolean feedback function, the register has to be split into smaller groups. Experimental testing showed that the amount of memory and CPU time needed were highest when attacking the modified Crypto-1 using the modified feedback function and the original filter function. In addition, another modified Crypto-1, using the modified feedback function and a modified filter function, had the lowest percentage of revealed variables. It can be concluded that the security strength and performance of the modified Crypto-1 using the modified feedback function and the modified filter function are better than those of the original Crypto-1.
Ultrafast and Efficient Scalable Image Compression Algorithm Ali Kadhim Jaber Al-Janabi
Journal of ICT Research and Applications Vol. 9 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.3.2

Abstract

Wavelet-based image compression algorithms have good performance and produce a rate scalable bitstream that can be decoded efficiently at several bit rates. Unfortunately, the discrete wavelet transform (DWT) has relatively high computational complexity. On the other hand, the discrete cosine transform (DCT) has low complexity and excellent compaction properties. Unfortunately, it is non-local, which necessitates implementing it as a block-based transform leading to the well-known blocking artifacts at the edges of the DCT blocks. This paper proposes a very fast and rate scalable algorithm that exploits the low complexity of DCT and the low complexity of the set partitioning technique used by the wavelet-based algorithms. Like JPEG, the proposed algorithm first transforms the image using block-based DCT. Then, it rearranges the DCT coefficients into a wavelet-like structure. Finally, the rearranged image is coded using a modified version of the SPECK algorithm, which is one of the best well-known wavelet-based algorithms. The modified SPECK consumes slightly less computer memory, has slightly lower complexity and slightly better performance than the original SPECK. The experimental results demonstrated that the proposed algorithm has competitive performance and high processing speed. Consequently, it has the best performance to complexity ratio among all the current rate scalable algorithms.
Requirement Volatility, Standardization and Knowledge Integration in Software Projects: An Empirical Analysis on Outsourced IS Development Projects Rajesri Govindaraju; Angra Bramagara; Leksananto Gondodiwiryo; Tota Simatupang
Journal of ICT Research and Applications Vol. 9 No. 1 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.1.4

Abstract

Information systems development (ISD) projects are highly complex, with different groups of people having  to collaborate and exchange their knowledge. Considering the intensity of knowledge exchange that takes place in outsourced ISD projects, in this study a conceptual model was developed, aiming to examine the influence of four antecedents, i.e. standardization, requirement volatility, internal integration, and external integration, on two dependent variables, i.e. process performance and product performance. Data  were collected from 46 software companies in four big cities in Indonesia. The collected data were examined to verify the proposed theoretical model using the partial least square structural equation modeling (PLS-SEM) technique. The results show that process performance is significantly influenced by internal integration and standardization, while product performance is  significantly influenced by external integration and  requirement volatility. This study contributes  to a better understanding of how knowledge integration can be managed in outsourced ISD projects in view of increasing their success.
Disaster Recovery Framework for Commercial Banks in Sri Lanka Mueen Uddin; Sandun Hapugoda; Roop Chand Hindu
Journal of ICT Research and Applications Vol. 9 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.3.4

Abstract

The banking sector is the backbone of the entire financial economy of a country. In today's globalized world, most organizations use online transaction processing systems for transferring money and doing business. Natural or man-made disasters can lead to data loss which in turn can cause millions of dollars of money lost. This study focuses on disaster recovery practices in commercial banks in Sri Lanka. From our preliminary findings, it was concluded that commercial banks only have ad-hoc disaster recovery standards and practices, as there is no standard framework available. Fourteen (14) banks were selected for data collection and relevant authorities were interviewed. The results were translated as qualitative observations to understand the best practices. Similarly, international standards, compliance requirements of the central bank, and existing researches were used to develop a disaster recovery practice framework. The proposed framework was then validated for its efficiency and usefulness among commercial banks and found to be acceptable by the banking industry.  
Robust Image Watermarking Based on Psychovisual Threshold Ferda Ernawan
Journal of ICT Research and Applications Vol. 10 No. 3 (2016)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2016.10.3.3

Abstract

Because of the facility of accessing and sharing digital images through the internet, digital images are often copied, edited and reused. Digital image watermarking is an approach to protect and manage digital images as intellectual property. The embedding of a natural watermark based on the properties of the human eye can be utilized to effectively hide a watermark image. This paper proposes a watermark embedding scheme based on the psychovisual threshold and edge entropy. The sensitivity of minor changes in DCT coefficients against JPEG quantization tables was investigated. A watermark embedding scheme was designed that offers good resistance against JPEG image compression. The proposed scheme was tested under different types of attacks. The experimental results indicated that the proposed scheme can achieve high imperceptibility and robustness against attacks. The watermark recovery process is also robust against attacks.
Image Description using Radial Associated Laguerre Moments Bojun Pan; Yihong Li; Hongqing Zhu
Journal of ICT Research and Applications Vol. 9 No. 1 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.1.1

Abstract

This study proposes a new set of moment functions for describing gray-level and color images based on the associated Laguerre polynomials, which are orthogonal over the whole right-half plane. Moreover, the mathematical frameworks of radial associated Laguerre moments (RALMs) and associated rotation invariants are introduced. The proposed radial Laguerre invariants retain the basic form of disc-based moments, such as Zernike moments (ZMs), pseudo-Zernike moments (PZMs), Fourier-Mellin moments (OFMMs), and so on. Therefore, the rotation invariants of RALMs can be easily obtained. In addition, the study extends the proposed moments and invariants defined in a gray-level image to a color image using the algebra of quaternion to avoid losing some significant color information. Finally, the paper verifies the feature description capacities of the proposed moment function in terms of image reconstruction and invariant pattern recognition accuracy. Experimental results confirmed that the associated Laguerre moments (ALMs) perform better than orthogonal OFMMs in both noise-free and noisy conditions.
Design of Triple-Band Bandpass Filter Using Cascade Tri-Section Stepped Impedance Resonators Gunawan Wibisono; Teguh Firmansyah; Tierta Syafraditya
Journal of ICT Research and Applications Vol. 10 No. 1 (2016)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2016.10.1.4

Abstract

In this research, a triple-band bandpass filter (BPF) using a cascade tri section step impedance resonator (TSSIR), which can be operated at 900 MHz, 1,800 MHz, and 2,600 MHz simultaneously, was designed, fabricated and evaluated. Advanced Design System (ADS) was used to design and simulate the proposed BPF. The proposed BPF using cascade TSSIR was fabricated on an FR4 substrate with dielectric permittivity, substrate thickness and loss tangent at 4.3, 1.6 mm and 0.0017, respectively. The performance parameters of the proposed BPF were characterized by insertion loss, return loss, voltage standing wave ratio (VSWR) and group delay. The performance results from the simulation were compared to those of the fabricated BPF. The results showed that the performances from both the simulated and the fabricated BPF satisfied the design specifications and were in close agreement with each other. Furthermore, the results indicated that the proposed BPF using cascade TSSIR performed better than a hairpin BPF with TSSIR.