cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 302 Documents
Medium Access Control Protocol for High Altitude Platform Based Massive Machine Type Communication: - Veronica Windha Mahyastuty; Iskandar Iskandar; Hendrawan Hendrawan; Mohammad Sigit Arifianto
Journal of ICT Research and Applications Vol. 16 No. 2 (2022)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.2.2

Abstract

Massive Machine Type Communication (mMTC) can be used to connect a large number of sensors over a wide coverage area. One of the places where mMTC can be applied is in wireless sensor networks (WSNs). A WSN consists of several sensor nodes that send their sensing information to the cluster head (CH), which can then be forwarded to a high altitude platform (HAP) station. Sensing information can be sent by the sensor nodes at the same time through the same medium, which means collision can occur. When this happens, the sensor node must re-send the sensing information, which causes energy wastage in the WSN. In this paper, we propose a Medium Access Control (MAC) protocol to control access from several sensor nodes during data transmission to avoid collision. The sensor nodes send Round Robin, Interrupt and Query data every eight hours. The initial slot for transmission of the Round Robin data can be either randomized or reserved. Analysis performance was done to see the efficiency of the network with the proposed MAC protocol. Based on the series of simulations that was conducted, the proposed MAC protocol can support a WSN system-based HAP for monitoring every eight  hours. The proposed MAC protocol with an initial slot that is reserved for transmission of Round Robin data has greater network efficiency than a randomized slot.
Context-Aware Sentiment Analysis using Tweet Expansion Method Bashar Tahayna; Ramesh Ayyasamy; Rehan Akbar
Journal of ICT Research and Applications Vol. 16 No. 2 (2022)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.2.3

Abstract

The large source of information space produced by the plethora of social media platforms in general and microblogging in particular has spawned a slew of new applications and prompted the rise and expansion of sentiment analysis research. We propose a sentiment analysis technique that identifies the main parts to describe tweet intent and also enriches them with relevant words, phrases, or even inferred variables. We followed a state-of-the-art hybrid deep learning model to combine Convolutional Neural Network (CNN) and the Long Short-Term Memory network (LSTM) to classify tweet data based on their polarity. To preserve the latent relationships between tweet terms and their expanded representation, sentence encoding and contextualized word embeddings are utilized. To investigate the performance of tweet embeddings on the sentiment analysis task, we tested several context-free models (Word2Vec, Sentence2Vec, Glove, and FastText), a dynamic embedding model (BERT), deep contextualized word representations (ELMo), and an entity-based model (Wikipedia). The proposed method and results prove that text enrichment improves the accuracy of sentiment polarity classification with a notable percentage.
Breast Cancer Diagnosis in Women Using Neural Networks and Deep Learning Ojo Fagbuagun; Olaiya Folorunsho; Lawrence Adewole; Titilayo Akin-Olayemi
Journal of ICT Research and Applications Vol. 16 No. 2 (2022)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.2.4

Abstract

Breast cancer is a deadly disease affecting women around the world. It can spread rapidly into other parts of the body, causing untimely death when undetected due to rapid growth and division of cells in the breast. Early diagnosis of this disease tends to increase the survival rate of women suffering from the disease. The use of technology to detect breast cancer in women has been explored over the years. A major drawback of most research in this area is low accuracy in the detection rate of breast cancer in women. This is partly due to the availability of few data sets to train classifiers and the lack of efficient algorithms that achieve optimal results. This research aimed to develop a model that uses a machine learning approach (convolution neural network) to detect breast cancer in women with significantly high accuracy. In this paper, a model was developed using 569 mammograms of various breasts diagnosed with benign and maligned cancers. The model achieved an accuracy of 98.25% and sensitivity of 99.5% after 80 iterations. 
A Questions Answering System on Hadith Knowledge Graph Kemas Rahmat Saleh Wiharja; Danang Triantoro Murdiansyah; Muhammad Zakiyullah Romdlony; Tiwa Ramdhani; Muhammad Ramadhan Gandidi
Journal of ICT Research and Applications Vol. 16 No. 2 (2022)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.2.6

Abstract

Several works have presented the Hadith on different digital platforms, ranging from websites to mobile apps. These works were successful in presenting the text of the Hadith to users, but this does not help them to answer any particular questions about religious matters. Therefore, in this work we propose a question-answering system that was built on a Hadith knowledge graph. To interpret the user questions correctly, we used the Levenshtein distance function, and for storing the Hadith in graph format we used Neo4J as the graph database. Our main findings were: (i) a knowledge graph is suitable for representing the Hadith and also for doing the reasoning task, and (ii) our proposed approach achieved 95% for top-1 accuracy.
Energy Consumption Prediction Using Data Reduction and Ensemble Learning Techniques Marsa Thoriq Ahmada; Saiful Akbar
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.1

Abstract

Building energy problems have various kinds of aspects, one of which is the difficulty of measuring energy efficiency. With current data development, energy efficiency measurements can be made by developing predictive models to estimate future building needs. However, with the massive amount of data, several problems arise regarding data quality and the lack of scalability in terms of computation memory and time in modeling. In this study, we used data reduction and ensemble learning techniques to overcome these problems. We used numerosity reduction, dimension reduction, and a LightGBM model based on boosting added with a bagging technique, which we compared with incremental learning. Our experimental results showed that the numerosity reduction and dimension reduction techniques could speed up the training process and model prediction without reducing the accuracy. Testing the ensemble learning model also revealed that bagging had the best performance in terms of RMSE and speed, with an RMSE of 262.304 and 1.67 times faster than the model with incremental learning.
Accuracy of Various Methods to Estimate Volume and Weight of Symmetrical and Non-Symmetrical Fruits using Computer Vision Hurriyatul Fitriyah
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.2

Abstract

Many researchers have used images to measure the volume and weight of fruits so that the measurement can be done remotely and non-contact. There are various methods for fruit volume estimation based on images, i.e., Basic Shape, Solid of Revolution, Conical Frustum, and Regression. The weight estimation generally uses Regression. This study analyzed the accuracy of these methods. Tests were done by taking images of symmetrical fruits (represented by tangerines) and non-symmetrical fruits (represented by strawberries). The images were processed using segmentation in saturation color space to get binary images. The Regression method used Diameter, Projection Area, and Perimeter as features that were extracted from the binary images. For symmetrical fruits, the best accuracy was obtained with the Linear Regression based on Diameter (LDD), which gave the highest R2 (0.96 for volume and 0.93 for weight) and the lowest RMSE (5.7 mm3 for volume and 5.3 gram for volume). For non-symmetrical fruits, the highest accuracy for non-symmetric fruits was given by the Linear Regression based on Diameter (LRD) and Linear Regression based on Area (LRA) with an R2 of 0.8 for volume and weight. The RMSE for LRD and LRA for strawberries was 3.3 mm3 for volume and 1.4 grams for weight.
Compact and Robust MFCC-based Space-Saving Audio Fingerprint Extraction for Efficient Music Identification on FM Broadcast Monitoring Myo Thet Htun
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.3

Abstract

The Myanmar music industry urgently needs an efficient broadcast monitoring system to solve copyright infringement issues and illegal benefit-sharing between artists and broadcasting stations. In this paper, a broadcast monitoring system is proposed for Myanmar FM radio stations by utilizing space-saving audio fingerprint extraction based on the Mel Frequency Cepstral Coefficient (MFCC). This study focused on reducing the memory requirement for fingerprint storage while preserving the robustness of the audio fingerprints to common distortions such as compression, noise addition, etc. In this system, a three-second audio clip is represented by a 2,712-bit fingerprint block. This significantly reduces the memory requirement when compared to Philips Robust Hashing (PRH), one of the dominant audio fingerprinting methods, where a three-second audio clip is represented by an 8,192-bit fingerprint block. The proposed system is easy to implement and achieves correct and speedy music identification even on noisy and distorted broadcast audio streams. In this research work, we deployed an audio fingerprint database of 7,094 songs and broadcast audio streams of four local FM channels in Myanmar to evaluate the performance of the proposed system. The experimental results showed that the system achieved reliable performance.
Translating SIBI (Sign System for Indonesian Gesture) Gesture-to-Text in Real-Time using a Mobile Device Misael Jonathan; Erdefi Rakun
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.5

Abstract

The SIBI gesture translation framework by Rakun was built using a series of machine learning technologies: MobileNetV2 for feature extraction, Conditional Random Field for finding the epenthesis movement frame, and Long Short-Term Memory for word classification. This high computational translation system was previously implemented on a personal computer system, which lacks portability and accessibility. This study implemented the system on a smartphone using an on-device inference method: the translation process is embedded into the smartphone to provide lower latency and zero data usage. The system was then improved using a parallel multi-inference method, which reduced the average translation time by 25%. The final mobile SIBI gesture-to-text translation system achieved a word accuracy of 90.560%, a sentence accuracy of 64%, and an average translation time of 20 seconds.
A Low Computational Cost RGB Color Image Encryption Scheme Process based on PWLCM Confusion, Z/nZ Diffusion and ECBC Avalanche Effect Faiq Gmira; Wafae Sabbar; Said Hraoui
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.4

Abstract

In this work, three sub-processes are serially integrated into just one process in order to construct a robust new image encryption scheme for all types of images, especially color images. This integration architecture aims to create a robust avalanche effect property while respecting the constraints of confusion and diffusion that have been identified by Claude Shannon as properties required of a secure encryption scheme. The performance of the proposed encryption scheme is measured and discussed with several analyses, including computational cost analysis, key space analysis, randomness metrics  analysis, histogram analysis, adjacent pixel correlation, and entropy analysis. The experimental results demonstrated and validated the performance and robustness of the proposed scheme.
Cognitive Complexity Applied to Software Development: An Automated Procedure to Reduce the Comprehension Effort Dinuka R. Wijendra; K. P. Hewagamage
Journal of ICT Research and Applications Vol. 16 No. 3 (2022)
Publisher : DRPM - ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2022.16.3.6

Abstract

The cognitive complexity of a software application determines the amount of human effort required to comprehend its internal logic, which results in a subjective measurement. The quantification process of the cognitive complexity as a metric is problematic since the factors representing the computation do not represent the exact human cognition. Therefore, the determination of cognitive complexity requires expansion beyond its quantification. The human comprehension effort related with a software application is associated with each phase of its development process. Correct requirements identification and accurate logical diagram generation prior to code implementation can lead to proper logical identification of software applications. Moreover, human comprehension is essential for software maintenance. Defect identification, correction and handling of code quality issues cannot be maintained without good comprehension. Therefore, cognitive complexity can be effectively applied to demonstrate human understandability inside the respective phases of requirements analysis, design, defect tracking, and code quality optimization. This study involved automation of the above-mentioned phases to reduce the manual human cognitive load and reduce cognitive complexity. It was found that the proposed system could enhance the average accuracy of requirements analysis and class diagram generation by 14.44% and 9.89% average accuracy incrementation through defect tracking and code quality issues compared to manual procedures.