cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 288 Documents
Improved ICHI square feature selection method for Arabic classifiers Hadeel N. Alshaer; Mohammed A. Otair; Laith Abualigah
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (657.26 KB) | DOI: 10.11591/ijict.v9i3.pp157-170

Abstract

Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
Mitigating the Effects of Intereference in a Multipath Prone Environment for a DVB-T Transmission Oluwaseun Yinka Alabi; Michael Kolawole
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 2: August 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.137 KB) | DOI: 10.11591/ijict.v4i2.pp86-89

Abstract

This paper develops a novel simulation method that seeks to mitigate the effects of interference in a multipath prone environment for a DVB-T transmission by using the AWGN and the Multipath Rayleigh Fading Channel. The channel parameters were optimized until desired result was obtained. The reception performance of the DVB-T system shows that interference though not totally eliminated, can be minimized while transmitting in a multipath prone environment.
Tele-immersion Jayanthila Devi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 5, No 2: August 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (267.887 KB) | DOI: 10.11591/ijict.v5i2.pp73-78

Abstract

Tele-immersion is an advanced form of virtual reality that will allow users in different places to interact in real time in a shared simulated environment. Tele-immersion is a technology to be implemented with Internet that will enable users in different geographic locations to come together in a simulated environment to interact. Users will feel like they are actually looking, talking, and meeting with each other face-to-face in the same room.This technology causes users to feel as if they were in the same room. The tele-immersion technology uses a "tele-cubicle" which is equipped with large screens, scanners, sensors, and cameras. The tele-cubicles are linked together in real-time so that they form one larger cubicle. Through the virtual environment, participants are able to interact with other group members. Also, virtual objects and data can be passed through the walls between participants, and placed on the shared table in the middle for viewing.
Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887 Jabbar Shaati Jahlool
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (346.887 KB) | DOI: 10.11591/ijict.v6i2.pp95-104

Abstract

In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Crops Diseases Detection and Solution System Md. Abdul Awal; Mohammad Jahangir Alam; Md. Nurul Mustafa
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 3: December 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (605.791 KB) | DOI: 10.11591/ijict.v6i3.pp209-217

Abstract

The technology based modern agriculture industries are today’s requirement in every part of agriculture in Bangladesh. In this technology, the disease of plants is precisely controlled. Due to the variable atmospheric circumstances these conditions sometimes the farmer doesn’t know what type of disease on the plant and which type of medicine provide them to avoid diseases. This research developed for crops diseases detection and to provides solution by using image processing techniques. We have used Android Studio to develop the system. The crops diseases detection and solution system is compared the image of affected crops with database of CDDASS (Crops Diseases Detection and Solution system). If CDDASS detect any disease symptom, then provide suggestion so that farmers can take proper decision to provide medicine to the affected crops. The application has developed with user friendly features so that farmers can use it easily.
Feature Selection and Fuzzy Decision Tree for Network Intrusion Detection Thuzar Hlaing
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (615.422 KB)

Abstract

Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection System. Feature selection improves classification by searching for the subset of features, which best classify the training data. This paper proposed approach uses Mutual Correlation for feature selection which reduces from 34 continuous attributes to 10 continuous attributes and Fuzzy Decision Tree for detection and diagnosis of attacks. Experimental results on the 10% KDD Cup 99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved high true positive rate (TPR) and significant reduce false positive rate (FP ).DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.591
Notice of Retraction Digital Image Steganography Using Bit Flipping Aditya Kumar Sahu; Gandharba Swain
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v7i1.pp1-7

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
802.11 DCF in Dynamic MANET On-demand Routing Jogendra Kumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (508.937 KB)

Abstract

A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration .wireless LAN is an IEEE 802.11 standard supported DCF and MAC features. In this article discuss performance on Distributed Coordination Function (DCF) in Dynamic MANET on demand routing protocols on constant bit rate (CBR).Using Qualnet simulation tools 5.0.2 and finally discuss combine comparative performance analysis 802.11 DCF .The effective performance of 802.11 DCF in Dynamic MANET on demand routing protocol on the performance metrics such as 802.11 DCF: Broadcasts sent, Broadcasts received, Unicasts sent, Unicasts received, CTS packet sent, packet drops due to retransmissions limit, RTS packet sent, ACK packet sent, RTS retransmissions due to time out and packet retransmissions due to ACK timeout..DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3959
Predicting heart ailment in patients with varying number of features using data mining techniques T R Stella Mary; Shoney Sebastian
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 1: April 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (915.042 KB) | DOI: 10.11591/ijict.v8i1.pp56-62

Abstract

Data mining can be defined as a process of extracting unknown, verifiable and possibly helpful data from information. Among the various ailments, heart ailment is one of the primary reason behind death of individuals around the globe, hence in order to curb this, a detailed analysis is done using Data Mining. Many a times we limit ourselves with minimal attributes that are required to predict a patient with heart disease. By doing so we are missing on a lot of important attributes that are main causes for heart diseases. Hence, this research aims at considering almost all the important features affecting heart disease and performs the analysis step by step with minimal to maximum set of attributes using Data Mining techniques to predict heart ailments. The various classification methods used are Naïve Bayes classifier, Random Forest and Random Tree which are applied on three datasets with different number of attributes but with a common class label. From the analysis performed, it shows that there is a gradual increase in prediction accuracies with the increase in the attributes irrespective of the classifiers used and Naïve Bayes and Random Forest algorithms comparatively outperforms with these sets of data.
The Establishment of Decision Tree Model in Network Traffic Incident Using C4.5 Method Made Sudarma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (437.793 KB) | DOI: 10.11591/ijict.v3i1.pp23-29

Abstract

Computer network traffic is computer activity information in a network which explains interconnection between communication processes. The complexity of network traffic itself depends on the number of communication models used. The utilization of classification analyzing of network incident traffic is one of utilization forms of network traffic. The accuracy of classification model itself depends heavily on the formation of data training. The usage of C4.5 method in the establishment of decision tree in data training toward network incident traffic is with the basis to see the efficiency of decision tree formation. Wireshark tool is used as network capture tool to perform data acquisition in the formation of data training.

Page 1 of 29 | Total Record : 288