cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 2, No 2: August 2013" : 9 Documents clear
802.11 DCF in Dynamic MANET On-demand Routing Jogendra Kumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (508.937 KB)

Abstract

A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration .wireless LAN is an IEEE 802.11 standard supported DCF and MAC features. In this article discuss performance on Distributed Coordination Function (DCF) in Dynamic MANET on demand routing protocols on constant bit rate (CBR).Using Qualnet simulation tools 5.0.2 and finally discuss combine comparative performance analysis 802.11 DCF .The effective performance of 802.11 DCF in Dynamic MANET on demand routing protocol on the performance metrics such as 802.11 DCF: Broadcasts sent, Broadcasts received, Unicasts sent, Unicasts received, CTS packet sent, packet drops due to retransmissions limit, RTS packet sent, ACK packet sent, RTS retransmissions due to time out and packet retransmissions due to ACK timeout..DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3959
Design of Registration and Validation Algorithm of Member’s Personal Data Solomia Fedushko; Yuriy Syerov
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.179 KB)

Abstract

This paper deals with the methods of verification of web-forum members’ personal data, which are implemented in the algorithm of registration and validation of personal data on web-community member. The problem of personal data verifying and method of registration in an online community is investigated. These issues have the greatest influence on efficiency rise of virtual communities functioning and the level of data authenticity in web-members’ personal profiles. Solution of these problems is possible by using computer-linguistic analysis of web-members’ posts.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3960
Performance Analysis of Bit-Error-Rate and Channel Capacity of MIMO Communication Systems over Multipath Fading Channels Isiaka Ajewale Alimi; Jide Julius Popoola; Kayode Francis Akingbade; Michael O. Kolawole
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (438.156 KB)

Abstract

In wireless communication systems (WCS), channel characteristics are random and unpredictable. The resultant effect of the randomness is the multipath effect that leads to multipath fading. Multipath fading is a major contributor to the unreliability of wireless communication links. In this paper, Multiple-Input, Multiple-Output (MIMO) schemes were investigated in mitigating the effect of signal fading. Space-time coded MIMO-OFDM was developed to enhance the performance of the WCS. The performance of the developed space-time coded MIMO-OFDM over both flat and frequency selective channels were compared with that of conventional WCS. The simulation results show that the space-time coded MIMO-OFDM considerably reduced the effect of multipath fading in WCS with improved bit error rate (BER) value.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2014
In Cryptanalysis and Improvement of the Zhu et al.'s Authentication Protocol Mahdi Azizi; Abdolrasoul Mirghadri; Nasour Bagheri
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (678.608 KB)

Abstract

Zhu et al. recently have proposed an authentication prpotocol forRFID systems. In this paper, we analyze its security and explain itssecurity drawbacks. More precisely, we present traceability attackagainst this protocol. In addition, we propose an improvement on theZhu et al.'s to resists these security drawbacks. Finally, weinvestigate the formal security of the improved protocol based on theBAN logic method.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2077 
Analysis of Consumer Risk Perception on Online Auction Features Reski Mai Candra; Noorminshah A. Iahad
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.183 KB)

Abstract

This study examines consumer’s perception related to perceived risk while doing transaction in e-auction system. Previous researches found there are some features in e-auction system recognized unclarity features as they indicate having fraud or cheating. In the online auction environment, perception could be categorized in two types such as privacy and security. This study proposed a conceptual framework based on perceived risks from consumer’s investigation, associated directly with four cost features of e-auction system: payment method, auction fee, bidding fee and third party services that combined with four perceived risk components: performance risk, psychological risk, financial risk, and time risk. Researcher has developed a questionnaire for collecting data from consumer’s who has experience in using e-auction. Through statistical analysis using multiple regressions, this study found that payment method, auction fee, and bidding fee have a positive impact on perceived risk. However, third party services have a significant effect upon consumer perceived risk on financial risk but not significant effect to time risk. Furthermore, the online auction features is directly related to reducing consumers' risk perception. As a summary, online auction features associated with financial play a crucial role in reducing consumers' perceived risk in online auction transactions.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2529
Modeling Gene Regulation in Graded Hypoxia Using Continuous-Time Markov Chains Putu Indah Ciptayani; Reza Pulungan
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (869.317 KB)

Abstract

Hypoxia inducible factor (HIF) is the main protein in hypoxia pathway. The response of HIF to changes of oxygen pressure is regulated by 2 oxygen sensors, prolyl hydroxylase (PHD) and factor inhibiting HIF (FIH). Studies have shown that biochemical reactions at molecular level actually exhibit stochastic and random behaviors. Modeling biochemical reactions using purely deterministic method, therefore, ignore these characteristics. Hence, we use stochastic modeling using CTMC to model this regulation. Nevertheless, the use of pure CTMC on complex biochemical reaction networks, such as hypoxia, results in an infeasible computation time and typically requires very large memory. Therefore, we use a numerical hybrid method that combines pure CTMC and deterministic methods. The purpose is to reduce time complexity and to obtain a better accuracy than deterministic method. Using this model, we can observe that an increase of oxygen pressure results in a decrease in the amount of HIF and that oxygen sensor FIH only inhibits C-TAD activity. The model is also able to classify 84% genes that were observedDOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3845
A Trust Management System Through Ambient Communication for VANET Amel Ltifi; Ahmed Zouinkhi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (492.187 KB)

Abstract

In a VANET, the network topology is constantly changing. In fact, it requires distributed self-organizing security systems. In this article, we propose a distributed self-organizing trust management system for vehicular ad-hoc networks (VANETs), given the disastrous consequences of acting on false information sent by the malicious peers in this context. Our application can verify the correctness of alert messages sent by other vehicles about road accident. We opted to apply ambient communication technology to provide a self-organized network. We introduce the concept of “ambient intelligent vehicle” that consists in integrating ambient intelligence features in VANET. Vehicles are considered as intelligent agents that communicate in an ambient environment. Such vehicles are able to control and to detect false warning based on trust management system depicted in this article. Vehicles are arranged into clusters in order to facilitate communication and to reduce overhead. We model how vehicle operate using UML state diagram.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2980
Human Machine Interface Based on Eye Wink Detection Kiran P; Mohana HS; Vijaya PA
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (5408.892 KB)

Abstract

The research of human-computer interfaces has become a growing field in computer science, which aims to attain the development of more natural, intuitive, unobtrusive and efficient interfaces. The present work describes a Human Machine Interface Based on Eye Wink Detection for helping the severely handicapped people to manipulate the household devices and to perform day to day activities. Algorithm for eye detection that is conductedthrough a process of extracting the face image from the video image followed by evaluating the eye region and then eventually detecting the eye state based on skin colour segmentation. Binary values 1 and 0 is assigned based on the opening and closing of eye. Finally applying the dynamic programming to translate the code sequences to a certain valid command. Experiment conducted for different test video displayed significant results which is carried out with different set of inputs.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3927
Value-Driven Approach for Project Success and Change Management in Malaysian Institutions of Higher Learning (IHL) Ammy Amelia Faisal
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (357.869 KB)

Abstract

As a project is a lifeline of any organization, the critical success factors (CSFs) affect the success of the project in project management. This paper provides the literatures and reports as the concept paper which have been made by various researchers regarding the project success factors and change management. The critical success factors which have been applied and brought success to the different organizations will be elaborated in order to identify the factors are applied in Malaysian Institutions of Higher Learning (IHL). Furthermore, the value-driven relationship which consider three project elements, the Business,  Project Management Office and Project Team have to be well understood. Lastly,  the proposed framework of how the 3 elements mentioned above can lead to the successful in project development implementation which create competitive advantage, will be discussed as for the next step to conduct the empirical study.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3351

Page 1 of 1 | Total Record : 9