cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN : 22528776     EISSN : 27222616     DOI : -
Core Subject : Science,
International Journal of Informatics and Communication Technology (IJ-ICT) is a common platform for publishing quality research paper as well as other intellectual outputs. This Journal is published by Institute of Advanced Engineering and Science (IAES) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Arjuna Subject : -
Articles 288 Documents
Efficient Encryption Technique for H.264/AVC Videos Based on CABAC and Logistic Map Fatma K Tabash; M. Izharuddin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 1: April 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.001 KB) | DOI: 10.11591/ijict.v7i1.pp39-48

Abstract

Nowadays, the demands of real-time video communication are increased rapidly. Search and rescue(SAR) applications like earthquake rescue, avalanche victims, wildfire monitoring in addition to highway surveillance are considered examples of real-time applications. In which, communication time is considered the most important metric to be optimized to ensure support for victims’ lives. Thus finding a simple and time efficient encryption technique for securing the transmitted data become mandatory. In this paper, we present an efficient encryption technique which has low computation complexity, low processing time and highly chaotic encrypted videos. The proposed technique is based on CABAC where the bin-string of Intra-Prediction Mode is encrypted with chaotic signals and the sign of MVD is toggled randomly. For residue coefficients the sign of the AC coefficients are flipped randomly and the first value of DC coefficients is encrypted by XORing the bin-string with random stream. All random streams are generated with chaotic systems using Logistic map. The experimental results shows that the proposed technique is highly effective for real-time application and robust against different types of attacks.
Design and Evaluation of Android Slide Kyeboard for Myanmar Language Nandar Pwint Oo; Ni Lar Thein
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 1, No 2: December 2012
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (754.334 KB)

Abstract

Because of the large character set nature of Myanmar character, currently used Myanmar language soft keyboard look like QWERTY layout on Android devices’s performance is degraded when using on small screens. The users are needed to switch keyboard layout frequently to get their desired characters. To reduce the user keyboard layout switching time, this paper proposed the slide keyboard to set the entire Myanmar character on one screen layout. User study was made by comparing slide keyboard with currently used Myanmar language soft keyboard that look like QWERTY layout (iTextMM). The user preferences and empirical evaluation is also analyzed. According to the evaluation, the parpicipants can take minimum learning time with slide keyboard and can type at a rate of 17 Character per Minutes (CPM) and have got average 0.65 error rates.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1378
Development of Algorithm for Preservation of Heritage Murals and Painting Using Image Processing S. Lalithakumari; Pandian R
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 7, No 3: December 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (321.921 KB) | DOI: 10.11591/ijict.v7i3.pp146-148

Abstract

Image archiving and preservation finds extensive application in culture heritage murals. The study of cultural heritage is of the extreme importance at national and international levels. Not only global organizations like UNESCO but also museums, libraries, culture, temples and private initiatives are working in these directions. During the last three decades, researchers in the field of imaging discipline have started to contribute an increasing set of algorithms for cultural heritage; in that way providing indispensable support to these efforts. A better comparison of the different compression methods presented in this proposed work for culture Heritage mural images. Compression methods usually applied some method to reduce the number of components within each spectrum. The effectiveness of mural image archiving and preservation is analyzed based on 2-D wavelets filtering. The optimum algorithm is also found based on the results.
Design of Registration and Validation Algorithm of Member’s Personal Data Solomia Fedushko; Yuriy Syerov
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 2, No 2: August 2013
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.179 KB)

Abstract

This paper deals with the methods of verification of web-forum members’ personal data, which are implemented in the algorithm of registration and validation of personal data on web-community member. The problem of personal data verifying and method of registration in an online community is investigated. These issues have the greatest influence on efficiency rise of virtual communities functioning and the level of data authenticity in web-members’ personal profiles. Solution of these problems is possible by using computer-linguistic analysis of web-members’ posts.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3960
Efficient datamining model for prediction of chronic kidney disease using wrapper methods Ramaswamyreddy A; Shiva Prasad S; K V Rangarao; A Saranya
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 8, No 2: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (716.562 KB) | DOI: 10.11591/ijict.v8i2.pp63-70

Abstract

In the present generation, majority of the people are highly affected by kidney diseases. Among them, chronic kidney is the most common life threatening disease which can be prevented by early detection. Histological grade in chronic kidney disease provides clinically important prognostic information. Therefore, machine learning techniques are applied on the information collected from previously diagnosed patients in order to discover the knowledge and patterns for making precise predictions. A large number of features exist in the raw data in which some may cause low information and error; hence feature selection techniques can be used to retrieve useful subset of features and to improve the computation performance. In this manuscript we use a set of Filter, Wrapper methods followed by Bagging and Boosting models with parameter tuning technique to classify chronic kidney disease. The capability of Bagging and Boosting classifiers are compared and the best ensemble classifier which attains high stability with better promising results is identified.
Performance of Relay Assisted STBC Coded MIMO Wireless Downlink Communication M.M. Kamruzzaman
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 1: April 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.369 KB) | DOI: 10.11591/ijict.v3i1.pp30-38

Abstract

In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where source (base Station) is equipped with multiple single transmit antenna, relay is equipped with multiple transmit and receive  antennas, and destination (mobile handset) has single receive antenna. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay assisted system having with different combination of transmit and receive antennas at relay provides 11-13 dB  gains compared to direct link at 10-5.
Enhanced wormhole optimizer algorithm for solving optimal reactive power problem Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 1: April 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (414.917 KB) | DOI: 10.11591/ijict.v9i1.pp1-8

Abstract

In this paper Enhanced Wormhole Optimizer (EWO) algorithm is used to solve optimal reactive power problem. Proposed algorithm based on the Wormholes which exploits the exploration space. Between different universes objects are exchanged through white or black hole tunnels. Regardless of the inflation rate, through wormholes objects in all universes which possess high probability will shift to the most excellent universe. In the projected Enhanced Wormhole Optimizer (EWO) algorithm in order to avoid the solution to be get trapped into the local optimal solution Levy flight has been applied.  Projected Enhanced Wormhole Optimizer (EWO) algorithm has been tested in standard IEEE 14, 30, 57,118,300 bus test systems and simulation results show that the EWO algorithm reduced the real power loss efficiently.
Decision Support System using Data Mining Method for a Cross Selling Strategy in Retail Stores Imam Tahyudin; Mohammad Imron; Siti Alvi Solikhatin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 3, No 3: December 2014
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.422 KB) | DOI: 10.11591/ijict.v3i3.pp171-177

Abstract

A sales transaction dataof a retail company which is collect edevery day is enormous. Very large data will bemore meaning fultoin crease the company’s profitsif itcanbe extracted properly. Based on the research resultsof Andhika, et al[1], ZhangandRuan[6], Herera et al [7], Witten [11], explained that one of the methods that can gather information from the transaction data is the method of association. With this method it can be determined the patterns of transactions performed simultaneously and repeatedly. Thus, it can be obtained amodel that can be used as a reference for cross selling sales strategy. The purpose of this research is to apply data mining association methods of data mining by using apriori algorithm to create a new sales strategy for cross selling. Based on calculations, Association Rule is implemented by applying Confidence value=0.8while the value of Support=0.1 of the defined minimum value, the total result are 77 rules.Keywords: Data Mining, Association, Apriori Algorithm, Cross Selling, Retail Stores
Power loss reduction by gryllidae optimization algorithm Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 9, No 3: December 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (272.708 KB) | DOI: 10.11591/ijict.v9i3.pp179-184

Abstract

This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
Prediction Status Nutrition using by Body Mass Index on Mobile Device Adri Vendi Esaku
International Journal of Informatics and Communication Technology (IJ-ICT) Vol 4, No 2: August 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (955.251 KB) | DOI: 10.11591/ijict.v4i2.pp56-65

Abstract

This paper is aim to predict nutrition status using by the Body Mass Index (BMI). BMI for men and women are obtained from the calorie needs. Calorie requirement is used to determine energy needs. The energy needs are determined by the needs of Protein, Carbohydrate, Fat, Vitamin and Mineral. The paper is made in the form of an application program using Mobile Programming. Mobile Programming by implementing Reverse Engineering. The tool used is a J2ME application on cell phone emulator having minimal CLDC, CDC 1.1, MIDP 2.0 and MIDlet. Main contribution, BMI as the simple, fast and easy to used method. BMI can be used to determine the nutrition status of individual. The benefit for individual reduce the cost of healthcare. The new result is the prediction of the nutrition status of individual using by BMI can be applied with new ways through the Mobile Application on Mobile Device, that is implemented to the cell phone. Mobile Application is a medium for the user can be accessed anytime and anywhere. It is known an application that can yield the rational decision in predicting the nutritious needs of families.

Page 5 of 29 | Total Record : 288