cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 7, No 1: April 2018" : 8 Documents clear
Notice of Retraction Digital Image Steganography Using Bit Flipping Aditya Kumar Sahu; Gandharba Swain
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijict.v7i1.pp1-7

Abstract

Notice of Retraction-----------------------------------------------------------------------After careful and considered review of the content of this paper by a duly constituted expert committee, this paper has been found to be in violation of IAES's Publication Principles.We hereby retract the content of this paper. Reasonable effort should be made to remove all past references to this paper.The presenting author of this paper has the option to appeal this decision by contacting info@iaesjournal.com.-----------------------------------------------------------------------This article proposes bit flipping method to conceal secret data in the original image. Here a section consists of 2 pixels and there by flipping one or two LSBs of the pixels to hide secret information in it. It exists in 2 variants. The variant-1 and variant-2 both use 7th and 8th bit to conceal the secret data. Variant-1 hides 3 bits per a pair of pixels and the variant-2 hides 4 bits per a pair of pixels. Our proposed method notably raises the capacity as well as bits per pixel that can be hidden in the image compared to existing bit flipping method. The image steganographic parameters such as, peak signal to noise ratio (PSNR), hiding capacity, and the quality index of the proposed techniques has been compared with the existing bit flipping technique
Avoidance of Over Speed Through Intelligent Speed Breaking System M S Satyanarayana; Aruna T M; Divya G N
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (154.614 KB) | DOI: 10.11591/ijict.v7i1.pp13-15

Abstract

Accidents have become major issue in Developing countries like India now a day. As per the Surveys 60% of the accidents are happening due to over speed. Though the government has taken so many initiatives like Traffic Awareness & Driving Awareness Week etc.., but still the percentage of accidents are not getting reduced. In this paper a new technique has been introduced in order to reduce the percentage of accidents. The new technique is implemented using the concept of Intelligent Speed Braking System. The Intelligent Speed Braking systems can be implemented any where essential in order to avoid the accidents. The main objective of this system is to calculate the speed of the vehicle at three different locations based on the place where the vehicle speed has to be controlled and if the speed is greater than the designated speed in that road then it will automatically open up the speed breaker to control the speed of the vehicle. If the speed is less or equal to the designated speed in that road then the vehicle will be passed without any disturbance. This system though it won’t avoid 100% accidents at least it will reduce the percentage of accidents. This is system is not only to avoid accidents it will also intelligently controls the speed of the vehicles and creates awareness amongst the drivers.
Efficient Encryption Technique for H.264/AVC Videos Based on CABAC and Logistic Map Fatma K Tabash; M. Izharuddin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.001 KB) | DOI: 10.11591/ijict.v7i1.pp39-48

Abstract

Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue(SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims’ lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
An Optimum Approach for Preprocessing of Web User Query Sunny Sharma; Sunita Sunita; Arjun Kumar; Vijay Rana
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (310.444 KB) | DOI: 10.11591/ijict.v7i1.pp8-12

Abstract

The emergence of the Web technology generated a massive amount of raw data by enabling Internet users to post their opinions, comments, and reviews on the web. To extract useful information from this raw data can be a very challenging task. Search engines play a critical role in these circumstances. User queries are becoming main issues for the search engines. Therefore a preprocessing operation is essential. In this paper, we present a framework for natural language preprocessing for efficient data retrieval and some of the required processing for effective retrieval such as elongated word handling, stop word removal, stemming, etc. This manuscript starts by building a manually annotated dataset and then takes the reader through the detailed steps of process. Experiments are conducted for special stages of this process to examine the accuracy of the system.
Slot Loaded Capacitive fed Suspended RMSA with Meandered Ground Plane Ravi M. Yadahalli; Nandini M. Ammanagi
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (343.936 KB) | DOI: 10.11591/ijict.v7i1.pp49-56

Abstract

In this paper, variations in the Capacitive fed suspended RMSA configurations have been proposed. Initially, the reference antenna consists of rectangular patch of size of (35.5 X 45.6) mm2 and a small rectangular feed patch of size of (1.4 X 4) mm2 residing on the same substrate suspended above the ground plane. Coaxial probe is used to feed the small patch which in turn excites the radiator patch electromagnetically, yielding a large impedance bandwidth (BW) of 39%, with good gain and broadside radiation pattern.  By, meandering the ground plane of reference antenna with three rectangular slots, the prototype antenna is fabricated and measurement has been carried out to validate the result for compact broadband response. Later, by loading a pair of rectangular slots in the radiating patch of the reference antenna in addition to the rectangular slots in the ground plane, the prototype antenna is fabricated and measurement has been carried out to validate the result for compact dual band response.
A Proposed DDS Enabled Model for Data Warehouses with Real Time Updates Munesh Chandra Trivedi; Virendra Kumar Yadav; Avadhesh Kumar Gupta
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.6 KB) | DOI: 10.11591/ijict.v7i1.pp31-38

Abstract

Data warehouse generally contains both types of data i.e. historical & current data from various data sources. Data warehouse in world of computing can be defined as system created for analysis and reporting of these both types of data. These analysis report is then used by an organization to make decisions which helps them in their growth. Construction of data warehouse appears to be simple, collection of data from data sources into one place (after extraction, transform and loading). But construction involves several issues such as inconsistent data, logic conflicts, user acceptance, cost, quality, security, stake holder’s contradictions, REST alignment etc. These issues need to be overcome otherwise will lead to unfortunate consequences affecting the organization growth. Proposed model tries to solve these issues such as REST alignment, stake holder’s contradiction etc. by involving experts of various domains such as technical, analytical, decision makers, management representatives etc. during initialization phase to better understand the requirements and mapping these requirements to data sources during design phase of data warehouse.
Improve Security of Cloud Storage by Using Third Parity Authentication, One Time Password and Modified AES Encryption Algorithm Firas A. Abdulatif; Maan Zuhiar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.378 KB) | DOI: 10.11591/ijict.v7i1.pp24-30

Abstract

Cloud computing is a new term to provide application and hardware as service over the internet. Demand for cloud has increased dramatically in recent years. However, a major drawback for cloud adoption is lack of security so that we will try to solve some security issues related to cloud storage by design and implement a secure system to store privet data in cloud storage. This secure system provide secure login to cloud by using third parity authentication (smart phone) and one time password depend on chaotic system to prevent unauthorized people from get access to cloud and modified AES algorithms to encrypt the data in the cloud storage.
Face Recognition in the Scrambled Domain Using MK-RDA and ANN Kavita Kadam; C.R Jadhav
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (479.552 KB) | DOI: 10.11591/ijict.v7i1.pp16-23

Abstract

Facial look identity is a vital mission by means of human-interacting structures that goal to be aware of versions within the human’s emotional state. the principle challenge or the crucial part in surveillance society is the privacy-shielding era. because the rapid improvement in the internet international it turns into very essential to scramble the pics in the video or files for the duration of transmission. in this the biometric identity of photographs or faces from scrambled pictures plays a completely tough mission. Numbers of various technology are carried out to provide privateness for the duration of surveillance or during transmission of video however they're lack of essential traits, like reversibility or visible fine maintenance. in lots of scrambling methods the faces are covered by a few animation which may additionally or may not cover all faces or it receives hard to recover pics from this technique. Many guide method also are us used by which we will unscramble an photo but they are no longer powerful that a good deal. to overcome all this matters we proposed a novel approach- Many-Kernel Random Discriminate analysis (MK-RDA) to find out discriminative patterns from chaotic indicators. structures get better accuracy bring about best photos. To PIE and ORL datasets has getting above ninety% accuracy.

Page 1 of 1 | Total Record : 8