cover
Contact Name
Yuliah Qotimah
Contact Email
yuliah@lppm.itb.ac.id
Phone
+622286010080
Journal Mail Official
jictra@lppm.itb.ac.id
Editorial Address
LPPM - ITB Center for Research and Community Services (CRCS) Building Floor 6th Jl. Ganesha No. 10 Bandung 40132, Indonesia Telp. +62-22-86010080 Fax. +62-22-86010051
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of ICT Research and Applications
ISSN : 23375787     EISSN : 23385499     DOI : https://doi.org/10.5614/itbj.ict.res.appl.
Core Subject : Science,
Journal of ICT Research and Applications welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless & Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.
Articles 302 Documents
Partition-Based GTS Adjustment for Wireless Sensor Networks M. Udin Harun Al Rasyid; Bih Hwang Lee; Amang Sudarsono
Journal of ICT Research and Applications Vol. 9 No. 2 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.2.4

Abstract

The personal area network (PAN) coordinator can assign a guaranteed time slot (GTS) to allocate a particular duration for requested devices in IEEE 802.15.4 beacon-enabled mode. The main challenge in the GTS mechanism is how to let the PAN coordinator allocate time slot duration for the devices which request a GTS. If the allocated devices use the GTS partially or the traffic pattern is not suitable, wasted bandwidth will increase, which degrades the performance of the network. In order to overcome the abovementioned problem, this paper proposes the Partitioned GTS Allocation Scheme (PEGAS) for IEEE 802.15.4 networks. PEGAS aims to decide the precise moment for the starting time, the end, and the length of the GTS allocation for requested devices taking into account the values of the superframe order, superframe duration, data packet length, and arrival data packet rate. Our simulation results showed that the proposed mechanism outperforms the IEEE 802.15.4 standard in terms of the total number of transmitted packets, throughput, energy efficiency, latency, bandwidth utilization, and contention access period (CAP) length ratio.
Generic Animation Method for Multi-Objects in IFS Fractal Form Tedjo Darmanto; Iping Supriana; Rinaldi Munir
Journal of ICT Research and Applications Vol. 10 No. 3 (2016)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2016.10.3.1

Abstract

Both non-metamorphic animation and metamorphic animation of objects or multi-objects in IFS fractal form as basic animation method can be implemented by a modified version of the random iteration algorithm as basic algorithm. In this way it is possible to create an attractive animation based on the combination of both animation methods as a generic animation method, as discussed in this paper. The proposed method can be used as an alternative for or as an extension of the existing animation methods in classical geometry, which are restricted to objects with regular forms. The proposed method can be used to produce more attractive media for interactively learning about the behavior of manipulated objects of any form.
Model for Evaluating the Effectiveness of Search Operations Kulik Sergey Dmitrievich
Journal of ICT Research and Applications Vol. 9 No. 2 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.9.2.5

Abstract

An automated search with human involvement consisting of two stages is given detailed consideration in this paper. In the first stage, a search without direct human involvement is implemented. In the second stage, the search assumes human involvement. Evaluations of the search operations' effectiveness are presented. These operations are implemented for searching one object exclusively among a variety of similar objects. The average number of similar objects recommended for further analysis was used as effectiveness indicator. A set of numerical evaluation criteria for search effectiveness is introduced. The basis of the search block is a pattern recognition algorithm characterized by two probabilities: 1) probability of missing a target, and 2) false alarm probability. An analytical model of the search block was developed. In this paper particular attention is given to the average length of the recommendatory list as an effectiveness indicator. Four properties of this indicator were determined.
A 2.3/3.3 GHz Dual Band Antenna Design for WiMax Applications Adit Kurniawan; Iskandar Iskandar; P.H. Mukti
Journal of ICT Research and Applications Vol. 4 No. 2 (2010)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2010.4.2.1

Abstract

A triangular-slot antenna with rectangular patch for 2.3/3.3 GHz WiMax applications has been implemented on DICLAD 527 substrate (relative permittivity εr = 2.5) with 1.524 mm of substrate thickness. A rectangular patch printed on one side of the substrate is fed by a 50 Ω microstrip line and acts as the frequency tuning stub, while the triangular slot is positioned on the opposite side of the substrate, center lined to the rectangular stub. From the measurement results based on VSWR = 2 or equal to the return loss of 9.53 dB, at the lower band of 2.3 GHz the resulting impedance bandwidth is 290 MHz (from 2.16 to 2.45 GHZ) and at the upper band of 3.3 GHz is  370 MHz (from 3.31 to 3.68GHz), providing services for 2.3 GHz and 3.3 GHz frequency bands allocated for WiMax applications. The antenna gain measurement at 2.3 GHz frequency band is almost agrees with the simulation result of 3.2 dBi. While at 3.3 GHz the gain is approximately 4.4 dBi and continues to decrease with increasing frequency. The antenna gain measurement achieves maximum of 4.8 dBi (6 dBi from simulation) at about 3 GHz. The simulation and measurement results are evaluated and discussed.
Ultrafuzziness Optimization Based on Type II Fuzzy Sets for Image Thresholding Agus Zainal Arifin; Aidila Fitri Fitri Heddyanna; Hudan Studiawan
Journal of ICT Research and Applications Vol. 4 No. 2 (2010)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2010.4.2.2

Abstract

Image thresholding is one of the processing techniques to provide high quality preprocessed image. Image vagueness and bad illumination are common obstacles yielding in a poor image thresholding output. By assuming image as fuzzy sets, several different fuzzy thresholding techniques have been proposed to remove these obstacles during threshold selection. In this paper, we proposed an algorithm for thresholding image using ultrafuzziness optimization to decrease uncertainty in fuzzy system by common fuzzy sets like type II fuzzy sets. Optimization was conducted by involving ultrafuzziness measurement for background and object fuzzy sets separately. Experimental results demonstrated that the proposed image thresholding method had good performances for images with high vagueness, low level contrast, and grayscale ambiguity.
Robust Reed Solomon Coded MPSK Modulation Emir M. Husni
Journal of ICT Research and Applications Vol. 4 No. 2 (2010)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2010.4.2.3

Abstract

In this paper, construction of partitioned Reed Solomon coded modulation (RSCM), which is robust for the additive white Gaussian noise channel and a Rayleigh fading channel, is investigated. By matching configuration of component codes with the channel characteristics, it is shown that this system is robust for the Gaussian and a Rayleigh fading channel. This approach is compared with non-partitioned RSCM, a Reed Solomon code combined with an MPSK signal set using Gray mapping; and block coded MPSK modulation using binary codes, Reed Muller codes. All codes use hard decision decoding algorithm. Simulation results for these schemes show that RSCM based on set partitioning performs better than those that are not based on set partitioning and Reed Muller Coded Modulation across a wide range of conditions. The novel idea here is that in the receiver, we use a rotated 2^(m+1)-PSK detector if the transmitter uses a 2^m-PSK modulator.
Determining the Standard Value of Acquisition Distortion of Fingerprint Images Based on Image Quality Rahmat Syam; Mochamad Hariadi; Mauridhi Herry Purnomo
Journal of ICT Research and Applications Vol. 4 No. 2 (2010)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.2010.4.2.4

Abstract

This paper describes a novel procedure for determining the standard value of acquisition distortion of fingerprint images. Knowledge about the standard value of acquisition distortion of the fingerprint images is very important in determining the method for improving image quality. In this paper, we propose a model to determine the standard value that can be used in classifying the type of distortion of the fingerprint images based on the image quality. The results show that the standard value of acquisition distortion of the fingerprint images based on the image quality have values of the local clarity scores (LCS) follows: dry parameter values are in the range of 0.0127-0.0149, neutral parameter values are less than 0.0127, and oily parameter values are greater than 0.0149. Meanwhile, the global clarity scores (GCS) are as follows: dry parameter values are in the range of 0.0117-0.0120, neutral parameter values are less than 0.0117, and oily parameter values are greater than 0.0120; and ridge-valley thickness ratios (RVTR) are as follows: dry parameter values are less than 7.75E-05, neutral parameter values are 7.75E-05-5.94E-05, and oily parameter values are greater than 5.94E-05.
Two-Step Injection Method for Collecting Digital Evidence in Digital Forensics Nana Rachmana Syambas; Naufal El Farisi
Journal of ICT Research and Applications Vol. 8 No. 2 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.2.5

Abstract

In digital forensic investigations, the investigators take digital evidence from computers, laptops or other electronic goods. There are many complications when a suspect or related person does not want to cooperate or has removed digital evidence. A lot of research has been done with the goal of retrieving data from flash memory or other digital storage media from which the content has been deleted. Unfortunately, such methods cannot guarantee that all data will be recovered. Most data can only be recovered partially and sometimes not perfectly, so that some or all files cannot be opened. This paper proposes the development of a new method for the retrieval of digital evidence called the Two-Step Injection method (TSI). It focuses on the prevention of the loss of digital evidence through the deletion of data by suspects or other parties. The advantage of this method is that the system works in secret and can be combined with other digital evidence applications that already exist, so that the accuracy and completeness of the resulting digital evidence can be improved. An experiment to test the effectiveness of the method was set up. The developed TSI system worked properly and had a 100% success rate.
An Adaptive Fuzzy Contrast Enhancement Algorithm with Details Preserving Jing Rui Tang; Nor Ashidi Mat Isa
Journal of ICT Research and Applications Vol. 8 No. 2 (2014)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2014.8.2.4

Abstract

This paper modifies the Adaptive Contrast Enhancement Algorithmwith Details Preserving (ACEDP) technique by integrating a fuzzy element inthe image type selection. The proposed technique, named the Adaptive FuzzyContrast Enhancement with Details Preserving (AFCEDP) technique, firstcomputes the degree of membership of the input image to three categories, i.e.low-, middle- or high-level images. The AFCEDP technique then clips thehistogram at different plateau limits that are computed from both the degree ofmembership and the clipping functions. The classification of an image in theACEDP technique is done based solely on the intensity range of the maximumnumber of pixels, which may be inaccurate. In the proposed AFCEDP technique,the image type classification is handled in a better way with the integration of afuzzy element. The performance of the proposed AFCEDP technique wascompared with the conventional ACEDP technique and several state-of-arttechniques described in the literature. The simulation results revealed that theAFCEDP technique demonstrates good capability in contrast enhancement anddetail preservation. In addition, the experiments using cervical cell images andHEp-2 cell images showed great potential of the AFCEDP technique as atechnique for enhancing medical microscopic images.
AIS Algorithm for Smart Antenna Application in WLAN Evizal Abdul Kadir; Siti Mariyam Shamsuddin; Tharek Abdul Rahman; Sharul Kamal Abdul Rahim; Eko Supriyanto; Sri Listia Rosa
Journal of ICT Research and Applications Vol. 8 No. 3 (2015)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2015.8.3.1

Abstract

Increasing numbers of wireless local area networks (WLAN) replacing wired networks have an impact on wireless network systems, causing issues such as interference. The smart antenna system is a method to overcome interference issues in WLANs. This paper proposes an artificial immune system (AIS) for a switch beam smart antenna system. A directional antenna is introduced to aim the beam at the desired user. The antenna consists of 8 directional antennas, each of which covers 45 degrees, thus creating an omnidirectional configuration of which the beams cover 360 degrees. To control the beam switching, an inexpensive PIC 16F877 microchip was used. An AIS algorithm was implemented in the microcontroller, which uses the received radio signal strength of the mobile device as reference. This is compared for each of the eight beams, after which the AIS algorithm selects the strongest signal received by the system and the microcontroller will then lock to the desired beam. In the experiment a frequency of 2.4 GHz (ISM band) was used for transmitting and receiving. A test of the system was conducted in an outdoor environment. The results show that the switch beam smart antenna worked fine based on locating the mobile device.

Page 9 of 31 | Total Record : 302