cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 3, No 1: April 2014" : 8 Documents clear
The Establishment of Decision Tree Model in Network Traffic Incident Using C4.5 Method Made Sudarma
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (437.793 KB) | DOI: 10.11591/ijict.v3i1.pp23-29

Abstract

Computer network traffic is computer activity information in a network which explains interconnection between communication processes. The complexity of network traffic itself depends on the number of communication models used. The utilization of classification analyzing of network incident traffic is one of utilization forms of network traffic. The accuracy of classification model itself depends heavily on the formation of data training. The usage of C4.5 method in the establishment of decision tree in data training toward network incident traffic is with the basis to see the efficiency of decision tree formation. Wireshark tool is used as network capture tool to perform data acquisition in the formation of data training.
Performance of Relay Assisted STBC Coded MIMO Wireless Downlink Communication M.M. Kamruzzaman
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.369 KB) | DOI: 10.11591/ijict.v3i1.pp30-38

Abstract

In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where source (base Station) is equipped with multiple single transmit antenna, relay is equipped with multiple transmit and receive  antennas, and destination (mobile handset) has single receive antenna. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay assisted system having with different combination of transmit and receive antennas at relay provides 11-13 dB  gains compared to direct link at 10-5.
An Empirical Study on the Relation Between Types of Innovations: Pardis Technology Park as a Case Study Amir Mirzadeh Phirouzabadi; M Mahmoudian; Mohammad Asghari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (453.213 KB) | DOI: 10.11591/ijict.v3i1.pp39-46

Abstract

Nowadays, Innovation is known as an essential component of competitiveness, classified in different types in literature. For instance, on one hand it is classified based on OECD as product, process, marketing and organizational innovations and on the other hand as incremental, competence developing, market developing and radical ones based on the degree of internal and external newness. Also, innovation models have changed from “simple linear” to “networking interactions” and concepts such as ‘open innovation’ and ‘innovation network’ have become important to both academic and market society due to intensive global competition. Therefore, this paper tried to empirically study and analyze the types of innovation based on OECD regarding to other classification based on the degree of internal and external newness in a networking interaction. Thus, in order to empirically explore the relations between these two classifications, we used the data of last three years (2008-2011) of 50 companies from the network Pardis Technology Park (PTP) in Iran as a case study. The results showed that most of the innovations as product, marketing and organizational were new to the market. Also marketing and process innovations were more related to radical and incremental innovation respectively and less organizational innovations were incremental.
The Development of Online Disaster Information System Using Location Based Service (LBS) Technology Nasaruddin Syafie; Yudha Nurdin; Roslidar Roslidar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1068.716 KB) | DOI: 10.11591/ijict.v3i1.pp47-58

Abstract

Indonesia is geographically located in the disaster vulnerable area and frequently hit by various disasters such as earthquake, flood, etc. So that Indonesian people aware that the disaster information system is very important. Thus, the development of information and communication technology application is needed for disaster management. For this purpose, this paper proposes on the development of online disaster information system based on location based service (LBS) technology by using short message service (SMS) gateway and global positioning system (GPS). Then,the web-based prototype of online disaster information system is designed and developed as the media to provide information of location and situation of the disaster area. Furthermore, a user interface is also designed and developed to transmit input data as the location information using manual SMS and automatically using smartphone based on SMS/GPS. The research method used in this research is a spiral method that begins with conceptual design, prototype development, application test, and evaluation. The results of this research are the web-based information system and the implemented user interface application (we called ASIKonLBS) for Android based smartphone. The online mapping of input data from smartphone to the web-based system has been tested. It shows that the disaster location information can be mapped to Google Maps timely and accurately that can be accessed using the Internet connection. The evaluation to mapping delay time shows that it is lower than the refresh time of the web-based system. Therefore, the proposed online system can be categorized as a real-time system.
Semantic Aware Multi-Agent System Advantages Trajche Manev; Sonja Filiposka
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.18 KB) | DOI: 10.11591/ijict.v3i1.pp1-12

Abstract

Internet changes the way people communicate with each other and also affects the business flow. Technology changes affect how people live and communicate with each other, but they themselves also transform and become more human like. The agent oriented programming and multi-agent systems are relatively new example technologies that manifest these changes in a multifacet way. The goal of this paper is to explore the possibilities one can obtain by combining multi agent systems with the emerging semantic web technologies. This powerful combination leads towards new types of complex system development. Using a case study example, together with a comparison with the traditional system design approach, the paper also discusess the possibilities of semantic agent platforms and their development and shows how developers can benefit from following the standards to agent development.
Instantiation in Partial Learning Velimir Graorkoski; Ana Madevska-Bogdanova
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (735.815 KB) | DOI: 10.11591/ijict.v3i1.pp59-66

Abstract

The adaptive learning systems are changing the learning process as we know it. One of the advantages they have over the traditional ways of learning is the attempt to adapt to the learner's capabilities in order to deliver the knowledge as optimizing as possible. Even in such sophisticated implementations there are differences in the treatment of the adaptive learning. During the past years spent in research of different aspects of the adaptive learning, we made a distinction of our latest development phase as an advanced adaptive learning, having more specific approach to the problem from the phase where the problem of adaptive learning is treated as a general case. Considering the conditions of advanced adaptive learning rather than basic adaptive learning, the process of learning is different and closely related to the human learner. In order to demonstrate this key improvement, we presented a general learner model through its learning mechanism and its behavior in the adaptive learning environment together with the instantiation process. In this paper we present a new way of learning with learning environment instances, constructed by choosing different ways to obtain the knowledge for a target unit.
Students’ Perceptions during Integration of Computer Games in Primary Education: QoE Analysis Toni Malinovski; Marina Vasileva; Vladimir Trajkovik
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (683.573 KB) | DOI: 10.11591/ijict.v3i1.pp13-22

Abstract

The integration of computer games in the primary school program is a challenging task which requires changes in the pedagogical approach and teaching practices. Since it is important to understand students, this study follows student-centered approach while evaluating different variables in computer game enhanced classes, which impact the overall students’ Quality of Experience (QoE). We involved a total of 114 students in several primary schools in Macedonia which participated in traditional and game-based learning environment. Students’ feedback was collected through surveys and the data set was analyzed with a path analysis model that illustrates relationships between relevant variables which influence students’ QoE in classes enhanced with computer games. We found that students’ motivation mostly influenced students’ QoE, which was also determined by the increased effectiveness and simplified way of learning. The research results correlated students’ QoE and learning outcomes during integration of computer games in primary schools, which were altogether increased against the traditional environment.
Proxy-Protected Proxy Multi-Signature Based on Elliptic Curve Manoj Kumar Chande; Balwant Singh Thakur
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (786.37 KB) | DOI: 10.11591/ijict.v3i1.pp67-72

Abstract

In this work, we propose a proxy-protected proxy multi-signature scheme based on EllipticCurve Digital Signature Algorithm (ECDSA), which aims at providing data authenticity,integrity, and non-repudiation to satisfy the basic properties of partial delegation proxy signaturedescribed by Mambo et al. as well as strong proxy signature properties defined byLee et. al. The proposed signing/verifying scheme combines the advantages of proxyprotectedsignature and multi-signature scheme. The security of the proposed schemes isbased on the difficulty of breaking the elliptic curve discrete logarithm problem (ECDLP).The scheme proposed is faster and secure than the multi-signature based on factoring ordiscrete logarithm problem (DLP). The final multi-signature of a message can be verifiedindividually for each signer or collectively for a subgroup or entire group as well. Finally,the proposed proxy-protected proxy multi-signature schemes can be used in E-commerceand E-government application, which can be implemented using low power and small processingdevices.

Page 1 of 1 | Total Record : 8