cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 11, No 2: August 2022" : 9 Documents clear
Enterprise architecture-based ISA model development for ICT benchmarking in construction-case study Ehab Juma Adwan; Ali Al-Soufi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp160-176

Abstract

Building on a coincided in progress paper, this paper constructs and evaluate an information systems architecture (ISA) model for the Bahraini architecture, engineering and construction (AEC) sector, from the lens of enterprise architecture (EA). This model acts as an information and communication technology (ICT) barometer tool to identify and benchmark the ICT’s gaps, duplicative levels, and future investments. Following the design science research, this paper and throughout a utilization of a tailored version of the open group architectural framework (TOGAF), embedded into a rigorous case study approach, the construction, testing, and evaluation of the conceptual ISA model is approached to benchmark the ICT measurement. Empirically, the study revealed the appropriateness of the model and the ability to identify the availability of 28 groups of 38 individual ICT applications in the Bahraini AEC sector and benchmark them to score an average of 18.5% against 17 countries that scored an average of 18.6%.
Empirical studies on the effect of electromagnetic radiation from multiple sources in Dhaka Mohammad Quamruzzaman; Shohag Hossain; S. M. Sahidur Rahaman; Munima Haque
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp116-127

Abstract

Just after the invention of electricity by Michael Faraday, there has been a revolution in the communication technology, which lead to the invention of radio, television, radar, satellite, and mobile. While these machines transformed our life high quality, safer and simpler, they have been associated with alarming probable health hazards owing to their electromagnetic radiation (EMR) emission. Couple of cases it has been reported by personals regarding various health related issues relating to exposure on electromagnetic field (EMF) and EMR. Although couple of persons showed light symptoms and respond by avoiding the electrical field (EF) and EMR fields as much as possible, some others are so much affected that they have changed their entire lifestyle. In this paper, empirical survey study has been carried out in the laboratories of Daffodil International University (DIU) main and permanent campus. It was found that some of the instrument had higher EMFs. The findings from this survey may be helpful for the students to take precautionary measurement who work for long duration in the various laboratories for their practical classes and for the users of the domestic appliances as well as office equipment and industrial instruments.
A persuasive agent architecture for behavior change intervention Adegoke Ojeniyi; Adam Khalid; Obafunmiso Christiana Kehinde
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp128-139

Abstract

A persuasive agent makes use of persuasion attributions to ensure that its predefined objective(s) is achieved within its immediate environment. This is made possible based on the five unique features namely sociable, persuasive, autonomy, reactive, and proactive natures. However, there are limited successes recorded within the behavioural intervention and psychological reactance is responsible for these failures. Psychological reactance is the stage where rejection, negative response and frustration are felt by the users of the persuasive system. Thus, this study proposes a persuasive agent (PAT) architecture that limits the experience of psychological reactance to achieve an improved behavioural intervention. PAT architecture adopted the combination of the reactance model for behavior change and the persuasive design principle. The architecture is evaluated by conducting an experimental study using a user-centred approach. The evaluation reflected that there is a reduction in the number of users who experienced psychological reactance from 70 per cent to 3 per cent. The result is a better improvement compared with previous outcomes. The contribution made in this study would provide a design model and a steplike approach to software designers on how to limit the effect of psychological reactance on persuasive system applications and interventions.
Restaurant food ordering method using NFC technology Prashant Sangulagi; Sangamesh J Kalyane; Arvind M Bhavikatti; Shivpuje Pooja Sharad
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp96-104

Abstract

Mobile apps of various kinds continue to emerge as smartphones become more popular and mobile telecommunication matures. NFC is the most common wireless technology used in smartphones presently. It is used in mobile devices having built-in NFC to allow consumers to input payments, receive messages, and do nearer device recognition, among other things. The paper proposes the NFC technology-based food ordering system for all the customers who want to have food at their residence only. The results show that the application works properly in finding the nearby restaurants and completing the food order without any hustle.
Performance analysis on self organization based clustering scheme for FANETs using K-means algorithm and firefly optimization Yashu Pulhani; Ankur Singh Kang; Vishal Sharma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp148-159

Abstract

With the fast-increasing development of wireless communication networks, unmanned aerial vehicle (UAV) has emerged as a flying platform for wireless communication with efficient coverage, capacity, reliability, and its network is called flying ad-hoc network (FANET); which keeps changing its topology due to its dynamic nature, causing inefficient communication, and therefore needs cluster formation. In this paper, we proposed a cluster formation, selection of cluster head and its members, connectivity and transmission with the base station using the K-means algorithm, and choice of an optimized path for transmission using firefly optimization algorithm for efficient communication. Evaluation of performance with experimental results are obtained and compared using the K-means algorithm and firefly optimization algorithm in cluster building time, cluster lifetime, energy consumption, and probability of delivery success. On comparison of firefly optimization algorithm with firefly optimization algorithm, i.e., K-means algorithm results proved than without firefly optimization algorithm, better in terms of cluster building time, energy consumption, cluster lifetime, and also the probability of delivery success.
Prediction analysis on the pre and post COVID outbreak assessment using machine learning and deep learning Ishaan Walecha; Divya Jain
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp140-147

Abstract

In this time of a global urgency where people are losing lives each day in a large number, people are trying to develop ways/technology to solve the challenges of COVID-19. Machine learning (ML) and artificial intelligence (AI) tools have been employed previously as well to the times of pandemic where they have proven their worth by providing reliable results in varied fields this is why ML tools are being used extensively to fight this pandemic as well. This review describes the applications of ML in the post and pre COVID-19 conditions for contact tracing, vaccine development, prediction and diagnosis, risk management, and outbreak predictions to help the healthcare system to work efficiently. This review discusses the ongoing research on the pandemic virus where various ML models have been employed to a certain data set to produce outputs that can be used for risk or outbreak prediction of virus in the population, vaccine development, and contact tracing. Thus, the significance and the contribution of ML against COVID-19 are self-explanatory but what should not be compromised is the quality and accuracy based on which solutions/methods/policies adopted or produced from this analysis which will be implied in the real world to real people.
Model Online Industrial Technology Programs Raj L Desai
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp%p

Abstract

This paper outlines a proposal for serving working professionals in industry by offering them two programs of study to enhance their education and improve their job prospects. The programs were specifically designed to meet the needs of the manufacturing industry in Texas. The courses are proposed to be offered online because we expected working people to be interested in these programs. By offering courses online we can attract a new group of working students that are constrained by their jobs from being able to take regular courses
Cyber attack awareness and prevention in network security Zolkipli Mohamad Fadli; Shu See Yong; Low Kai Kee; Gan Hui Ching
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp105-115

Abstract

This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
Meliorating usable document density for online event detection Manisha Samanta; Yogesh Kumar Meena; Arka Prokash Mazumdar; Girdhari Singh; Dinesh Gopalani
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 11, No 2: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v11i2.pp85-95

Abstract

Online event detection (OED) has seen a rise in the research community as it can provide quick identification of possible events happening at times in the world. Through these systems, potential events can be indicated well before they are reported by the news media, by grouping similar documents shared over social media by users. Most OED systems use textual similarities for this purpose. Similar documents, that may indicate a potential event, are further strengthened by the replies made by other users, thereby improving the potentiality of the group. However, these documents are at times unusable as independent documents, as they may replace previously appeared noun phrases with pronouns, leading OED systems to fail while grouping these replies to their suitable clusters. In this paper, a pronoun resolution system that tries to replace pronouns with relevant nouns over social media data is proposed. Results show significant improvement in performance using the proposed system.

Page 1 of 1 | Total Record : 9