cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 8 Documents
Search results for , issue "Vol 8, No 3: December 2019" : 8 Documents clear
Financial stock application using websocket in real time application Chika Ogochukwu Yinka-Banjo; Ogundeyi Kehinde Esther
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (510.401 KB) | DOI: 10.11591/ijict.v8i3.pp139-151

Abstract

Real time web application involves clients which is also known as a browser getting updates from the server as they happen. The finance world is moving fast, and human brains cannot sustain processing data at that speed, so algorithms are used with regards to the limit observed in old-style real-time communication which include long polling, polling server-sent events and comets, this paper uses WebSocket technology when dealing with real time applications. The Web Socket offers improved result as compared to the conventional approaches that are considered to be good solution of providing real time information and lessens overhead acquired while communicating over the internet and offers stateful, efficient communication among web servers and clients. When there is need to track companies worth/stock using a dashboard immediately and not some seconds ago, WebSocket can be used to stream data without delays.
Classifiers ensemble and synthetic minority oversampling techniques for academic performance prediction Abdulazeez Yusuf; Ayuba John
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (424 KB) | DOI: 10.11591/ijict.v8i3.pp122-127

Abstract

The increasing need for data driven decision making recently has resulted in the application of data mining in various fields including the educational sector which is referred to as educational data mining. The need for improving the performance of data mining models has also been identified as a gap for future researcher. In Nigeria, higher educational institutions collect various students’ data, but these data are rarely used in any decision or policy making to improve the academic performance of students. This research work, attempts to improve the performance of data mining models for predicting students’ academic performance using stacking classifiers ensemble and synthetic minority over-sampling techniques. The research was conducted by adopting and evaluating the performance of J48, IBK and SMO classifiers. The individual classifiers models, standard stacking classifier ensemble model and stacking classifiers ensemble model were trained and tested on 206 students’ data set from the faculty of science federal university Dutse. Students’ specific previous academic performance records at Unified Tertiary Matriculation Examination, Senior Secondary Certificate Examination and first year Cumulative Grade Point Average of students are used as data inputs in WEKA 3.9.1 data mining tool to predict students’ graduation classes of degrees at undergraduate level. The result shows that application of synthetic minority over-sampling technique for class balancing improves all the various models performance with the proposed modified stacking classifiers ensemble model outperforming the various classifiers models in both performance accuracy and RSME values making it the best model.
Developing the indonesian government enterprise architecture framework appropriate for Indonesian government agencies Asbartanov Lase; Benny Ranti
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (334.314 KB) | DOI: 10.11591/ijict.v8i3.pp152-161

Abstract

This research was conducted to develop the Indonesian Government Enterprise Architecture (IGEA) framework which is suitable for Indonesian government agencies. Due to their complexity and expensive implementation cost, existing EA frameworks such as TOGAF and Zachman have so far not been the choice for building GEA by some countries including Australia and New Zealand. Those countries have built their own GEA namely Australia’s AGA and New Zealand’s GEA-NZ, respectively. Learning from this experience, the authors did a research to build Indonesia’s GEA or IGEA. This paper explains the research process which starts from mapping or comparing TOGAF, AGA, and GEA-NZ frameworks to get the underlying foundation for building GEA, analyzing framework artifacts, to building IGEA by adding specific Indonesian regulations and policies such as RPJMN and Nawacita. This IGEA framework is expected to become a reference for developing EA not only at institutional level but also the most important thing at national or cross institutional level, in order to increase the effectiveness of government IT spending.
Power loss reduction by arctic wolf optimization algorithm Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (566.721 KB) | DOI: 10.11591/ijict.v8i3.pp111-116

Abstract

This paper proposes Arctic Wolf optimization (AWO) algorithm to solve the optimal reactive power problem. Deeds of the Arctic wolf have been imitated to formulate the proposed algorithm. Arctic wolf also identified as the white wolf or polar wolf is a breed of gray wolf inhabitant from Melville Island to Ellesmere Island. It is average size, very smaller when compared to north western wolf, it possess whiter coloration, narrower braincase and big carnassials. Particle swarm optimization, Genetic algorithm has been used to improve the Exploration & Exploitation ability of the algorithm by utilizes flag vector & position, velocity update properties. Proposed Arctic Wolf optimization (AWO) algorithm has been tested in standard IEEE 30 bus test system and simulation results show the projected algorithms reduced the real power loss considerably.
Performance analysis of CIC multirate filter in cognitive radio for efficient pulse shaping in wireless domain A. S. Kang; Er.Vishal Sharma; Prof.Renu Vig
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.909 KB) | DOI: 10.11591/ijict.v8i3.pp184-190

Abstract

In this paper, the Performance Analysis of Cascade Integrator Comb Filter in context of Filter Bank Multicarrier Transmission has been presented for Cognitive radio. A benefit of the chosen technique is that, a CIC filter can be designed with a slight adjustment in parameters of interest. The entire performance of the filters designed is analyzed and evaluated by analyzing Normalized Amplitude versus Normalized Frequency plots at typical K and N values. The roll off factor plays a significant role in performance analysis of CIC filter. The results shown are a useful advance for rf design engineers working in the domain of multirate signal processing in wireless communication. To ensure the acceptable performance of Enhanced FBMC, computational complexity, and transmission burst length need to be reduced. The effect of Stop band attenuation on the edges of Magnitude and Frequency responses has been studied under constraints such as Lp, K and M during different simulation runs.
Cloud connected smart home gas cylinder platform based wifi control C.R. Balamurugan; P. Vijayakumar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.845 KB) | DOI: 10.11591/ijict.v8i3.pp117-121

Abstract

Gas sensing technology has become topical research work for quite some time and we also want to protect our home asserts from any kind of hazards. In this work we take an overview on how to protect our home from fire and its safety issues based on wireless sensor network using wifi and cloud technologies. It also showcases the research done on the detection mechanism of leakage of domestic cooking gas at ambient condition. It can detect the fire, leakage of gas or smoke and sends an auto-generated email remotely to intimate the owner. We survey and examine the existing work in security system and its applications.
Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks Wajid Hassan; Te-Shun Chou; Xiaoming Li; Patrick Appiah-Kubi; Tamer Omar
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.875 KB) | DOI: 10.11591/ijict.v8i3.pp162-183

Abstract

The emergence of cloud computing has changed perception of all regarding software delivery, development models and infrastructure. Cloud computing has a potential of providing elastic, easily manageable, powerful and cost effective solutions. The rapid transition to cloud computing has fueled concerns on the security issues. The migration of the user’s data and applications in a shared environment of a cloud, where there is a collocation of several users increases security related concerns. Several research efforts have been made in evaluating challenges related to security faced by the cloud computing environments, a number of solutions of such problems have also been proposed. Integrated security solutions should be devised to deal with the increasing security risks. In this paper, a detailed cloud computing survey, key services and concepts are being presented.  This paper attempts to evaluate various security threats to cloud computing and a number of security solutions have also been discussed. Furthermore, a brief view of the cloud security regulatory bodies and compliance have also been presented. Despite the research efforts in cloud security field, there are still some open research problems and challenges which are discussed in this paper.
Inventory prediction and management in Nigeria using market basket analysis associative rule mining: memetic algorithm based approach Arnold Adimabua Ojugo; Andrew Okonji Eboka
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 3: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (108.674 KB) | DOI: 10.11591/ijict.v8i3.pp128-138

Abstract

A key challenge in businesses today is determining inventory level for each product (to be) sold to clients. A pre-knowledge will suppress inventory stock-up and help avert unnecessary demurrage. It will also avoid stock out and avert loss of clients to competition. Study aims to unveil customer’s behavior in purchasing goods and thus, predict a next time purchase as well as serve as decision support to determine the required amount of each goods inventory. Study is conducted for Delta Mall (Asaba and Warri branches) department store. We adapt the memetic algorithm on market basket dataset to examine buying behavior of customers, their preference and frequency at which goods are purchased in common (basket). Result shows some items placed in basket allow customers to purchase items of similar value, or best combined with the selected items due to shelf-placement via concept of feature drift. Model yields 21-rules for eight items obtained from data transaction mining dataset acquired from Delta Mall.

Page 1 of 1 | Total Record : 8