cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 6, No 2: August 2017" : 8 Documents clear
Design and Simulation of Automatic Temperature Control and Alert System Based PIC16F887 Jabbar Shaati Jahlool
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (346.887 KB) | DOI: 10.11591/ijict.v6i2.pp95-104

Abstract

In this research, the design and simulation of an automatic system for temperature control using embedded system in order to automatically control of multi appliances depend on the temperature value. The appliances will be controlled are ventilation, cooling, heating and alert. this is an order to avoid or reduce to human intervention and increase system reliability. An important feature of this automation process is to reduce or eliminate the possibility of relying on the human factor operator for industries, warehouses and laboratories, and to improve working and performance environments. The system in this paper used the microcontroller PIC16F887 as the central control unit, LM35 temperature sensor as a temperature source,16x2 liquid crystal display (LCD) as indicator to display the different system working status an addition to some of drivers, relay and light emitting diodes (LED) as indicators to display the corresponding working appliance driver. The implementation and simulation of the system work has been achieved by using proteus professional software v8.0 and mikroc pro for pic v .6.6.1 software to write the equivalent program and generate .hex file for system working. The result shows in figures 5, 6, 7, and 8 that explain the system working cases
Analysis of Competition Fronting the Popularity of Content in Social Networks Siham Hafidi; Mohamed Baslam; Rachid El Ayachi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.407 KB) | DOI: 10.11591/ijict.v6i2.pp86-94

Abstract

In recent years, on the Internet, there is a real phenomenon: the development of social networks that are becoming more popular and more used. Social networks have millions of users worldwide. This provides an opportunity for companies to reach out a large and diverse audience for their advertising campaigns. They do this by creating and spreading content across the social network, which will increase the chance of visibility for their contents, which for them is the assurance of being popular. Every content requires time to reach a specific destination on the networks. In this article, we study competition between several contents that look for attracting more consultations, each characterized by some given popularity. There is competition between the contents of a limited set of destinations. We first model our system, we then study the competition between contents by using the game theory to analyze this behavior. We finally provide numerical results, which provide insights into the effect of various parameters of the system.
Energy Optimization of Routing Protocols in Wireless Sensor Networks Fatima Es-sabery; Hicham Ouchitachen; Abdellatif Hair
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (742.544 KB) | DOI: 10.11591/ijict.v6i2.pp76-85

Abstract

The hierarchical routing of data in WSNs is a specific class of routing protocols it encompasses solutions that take a restructuring of the physical network in a logical hierarchy system for the optimization of the consum-ption of energy. Several hierarchical routing solutions proposed, namely: the protocol LEACH (Low Energy Adaptive Clustering Hierarchy) consist of dividing the network in distributed clusters at one pop in order of faster data delivery and PEGASIS protocol (Power-Efficient Gathering in Sensor Information Systems) which uses the principle of constructing a chain’s sensor node. Our contribution consists of a hierarchical routing protocol, which is the minimization of the energy consumption by reducing the transmission distance of data and reducing the data delivery time. Our solution combines the two hierarchical routing approaches: chain based approach and the cluster based approach. Our approach allows for multi-hop communications, intra- and intercluster, and a collaborative aggregation of data in each Cluster, and a collaborative aggregation of data at each sensor node.
Tiarrah Computing: The Next Generation of Computing Yanish Pradhananga; Pothuraju Rajarajeswari
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (390.126 KB) | DOI: 10.11591/ijict.v6i2.pp129-138

Abstract

The evolution of Internet of Things (IoT) brought about several challenges for the existing Hardware, Network and Application development. Some of these are handling real-time streaming and batch bigdata, real- time event handling, dynamic cluster resource allocation for computation, Wired and Wireless Network of Things etc. In order to combat these technicalities, many new technologies and strategies are being developed. Tiarrah Computing comes up with integration the concept of Cloud Computing, Fog Computing and Edge Computing. The main objectives of Tiarrah Computing are to decouple application deployment and achieve High Performance, Flexible Application Development, High Availability, Ease of Development, Ease of Maintenances etc. Tiarrah Computing focus on using the existing opensource technologies to overcome the challenges that evolve along with IoT. This paper gives you overview of the technologies and design your application as well as elaborate how to overcome most of existing challenge.
A Novel Approach to Study the Effects of Anesthesia on Respiratory Signals by using the EEG Signals Mohd Suhaib Kidwai; S. Hasan Saeed
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (600.452 KB) | DOI: 10.11591/ijict.v6i2.pp117-122

Abstract

General anesthesia plays a crucial role in many surgical procedures. It is a drug-induced, reversible state characterized by unconsciousness, anti-nociception or analgesia, immobility and amnesia. On rare occasions, however, the patient can remain unconscious longer than intended, or may regain awareness during surgery. There are no precise measures for maintaining the correct dose of anesthetic, and there is currently no fully reliable instrument to monitor depth of anesthesia. Although a number of devices for monitoring brain function or sympathetic output are commercially available, the anesthetist also relies on clinical assessment and experience to judge anesthetic depth. The undesirable consequences of overdose or unintended awareness might in principle be ameliorated by improved control if we could understand better the changes in function that occur during general anesthesia. Coupling functions prescribe the physical rule specifying how the inter-oscillator interactions occur. They determine the possibility of qualitative transitions between the oscillations, e.g. routes into and out of phase synchronization. Their decomposition can describe the functional contribution from each separate subsystem within a single coupling relationship. In this way, coupling functions offer a unique means of describing mechanisms in a unified and mathematically precise way. It is a fast growing field of research, with much recent progress on the theory and especially towards being able to extract and reconstruct the coupling functions between interacting oscillations from data, leading to useful applications in cardio respiratory interactions.In this paper, a novel approach has been proposed for detecting the changes in synchronism of brain signals, taken from EEG machine. During the effect of anesthesia, there are certain changes in the EEG signals. Those signals show changes in their synchronism. This phenomenon of synchronism can be utilized to study the effect of anesthesia on respiratory parameters like respiration rate etc, and hence the quantity of anesthesia can be regulated, and if any problem occurs in breathing during the effect of anesthesia on patient, that can also be monitored
Improving Performance of Mobile Ad Hoc Network Using Clustering Schemes Mohamed Er-Rouidi; Houda Moudni; Hassan Faouzi; Hicham Mouncif; Abdelkrim Merbouha
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.947 KB) | DOI: 10.11591/ijict.v6i2.pp69-75

Abstract

Mobile ad hoc network become nowadays more and more used in different domains, due to its flexibility and low cost of deployment. However, this kind of network still suffering from several problems as the lack of resources. Many solutions are proposed to face these problems, among these solutions there is the clustering approach. This approach tries to partition the network into a virtual group. It is considered as a primordial solution that aims to enhance the performance of the total network, and makes it possible to guarantee basic levels of system performance. In this paper, we study some schemes of clustering such as Dominating-Set-based clustering, Energy-efficient clustering, Low-maintenance clustering, Load-balancing clustering, and Combined-metrics based clustering.
Dynamic Cryptographic Algorithm to Provide Password Authentication using Cued Click Points P. Ashok
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (551.617 KB) | DOI: 10.11591/ijict.v6i2.pp123-128

Abstract

Nowadays, password based authentication is one the most common way of authentication for most of the user logins. However, the advancement in technology also posing many threats for the password authentication systems. Everybody will be keen to know others password. But there exists a very few who is very keen to devise a new authentication. In this paper, we have proposed a more advanced password authentication method yet a simple one which gives a tough competition for the attacker to break the password. For this, we are providing a special key-display interface to assist the modified cued click point’s technique which helps in the more sophisticated dynamic authentication method. This interface helps to break the single password into a combination of 4 passwords and also adds three more password strings to the current password which is entered. It also uses a special one way encryption algorithm called Nesting 93 which is developed explicitly for this system. It helps to prevent almost any kind of attacks.
A Markov Decision Model for Area Coverage in Autonomous Demining Robot Abdelhadi Larach; Cherki Daoui; Mohamed Baslam
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 6, No 2: August 2017
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (953.891 KB) | DOI: 10.11591/ijict.v6i2.pp105-116

Abstract

A review of literature shows that there is a variety of works studying coverage path planning in several autonomous robotic applications. In this work, we propose a new approach using Markov Decision Process to plan an optimum path to reach the general goal of exploring an unknown environment containing buried mines. This approach, called Goals to Goals Area Coverage on-line Algorithm, is based on a decomposition of the state space into smaller regions whose states are considered as goals with the same reward value, the reward value is decremented from one region to another according to the desired search mode. The numerical simulations show that our approach is promising for minimizing the necessary cost-energy to cover the entire area.

Page 1 of 1 | Total Record : 8