
Contact Email
ijict@iaescore.com
International Journal of Informatics and Communication Technology (IJ-ICT)
ISSN:2252-8776/E-ISSN:2722-2616
International Journal of Informatics and Communication Technology (IJ-ICT), p-ISSN 2252-8776, e-ISSN 2722-2616 is a common platform for publishing quality research paper as well as other intellectual outputs. This journal is published by Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU) and Universitas Ahmad Dahlan (UAD) whose aims is to promote the dissemination of scientific knowledge and technology on the Information and Communication Technology areas, in front of international audience of scientific community, to encourage the progress and innovation of the technology for human life and also to be a best platform for proliferation of ideas and thought for all scientists, regardless of their locations or nationalities. The journal covers all areas of Informatics and Communication Technology (ICT) focuses on integrating hardware and software solutions for the storage, retrieval, sharing and manipulation management, analysis, visualization, interpretation and it applications for human services programs and practices, publishing refereed original research articles and technical notes. It is designed to serve researchers, developers, managers, strategic planners, graduate students and others interested in state-of-the art research activities in ICT.
Sourabh Shrivastava,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 33-42
Wetlands are the transitional zones between permanently aquatic and dry terrestrial ecosystems. Wetland systems directly and indirectly support millions of people, providing goods and services to them. The use of remote sensing technology for the mapping, identification, inventory and classification of the wetlands has been a common application of satellite imagery. Remote sensing has provided a great mean to study various ecosystems of the earth including wetlands by providing cost and time effective data. For a country like India, with its vast biological and cultural diversity, a comprehensive use of remote sensing, GIS and other related technologies is of great use in their conservation.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.547
Myint Myint Sein, Thin Lai LaiThein,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 20-25
This paper presents the effective method for the whole view synthesizing of the large-scale object. This synthesizing method is developed based on the image registration approach. The foreground object is extracted from each image by color image processing. The information of the feature points of an object is obtained from a foreground image and establishing the correspondence among views. The translation and rotation parameters between two successive images are estimated by the computed camera calibration parameters. The second image is transformed by using these parameters and combine to first image. The integrated image is obtained by combining the overlapping parts of these images. A whole view of the large scale object is reconstructed image by applying the above process successively. Preliminary investigations with sampled images of a real scene have been done to confirm the effectiveness of the proposed method.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.597
Sumit Goyal, Gyanendra Kumar Goyal,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 1-5
Feedforward multilayer models were developed for predicting shelf life of processed cheese stored at 30o C. Input variables were Soluble nitrogen, pH, Standard plate count, Yeast & mould count and Spore count. Sensory score was taken as output parameter for developing feedforward multilayer models. Mean square error, root mean square error, coefficient of determination and nash - sutcliffo coefficient performance measures were implemented for testing prediction potential of the soft computing models. The study revealed that soft computing multilayer models can predict shelf life of processed cheese.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.506
Aws Yonis, M.F.L. Abdullah,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 43-53
In LTE-Advanced, orthogonal frequency division multiple access (OFDMA) has been selected as the multiple access scheme for downlink and single-carrier frequency division multiple access (SC-FDMA) for uplink. OFDM is an attractive modulation technique in a cellular environment to combat frequency selective fading channels with a relatively low- complexity receiver. However, OFDM requires an expensive and inherently inefficient power amplifier in the transmitter due to the high peak-to-average power ratio (PAPR) of the multicarrier signal. This paper, presents the main components of LTE-Advanced including the all the details of Uplink (SC-FDMA) and Downlink (OFDMA). Also this paper clarifies the main reasons of using SC-FDMA in uplink and using OFDMA in downlink only, in order to obtain flexible mobile communication technology.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.557
I. A. K. Sita Laksmita, A. A. Kompiang Oka Sudana, Putu Wira Buana,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 54-62
Rabies is still a serious threat in the province of Bali. Because of that Bali need a good management system service that can process data and information to support the government to make decision for preventing rabies outbreak. Nowadays, data management still uses spreadsheet technology that oriented to attribute data. Geographic Information System (GIS) is a system that has the ability to process, analysis the process and analyzes spatial data or data with geographic coordinates. This article will discuss the implementation of GIS that show the spread of rabies in the province of Bali by using GeoServer as the Open Geospatial Consortium (OGC) standards-compliant server to provide geospatial data via web services. These GIS application, supported by PostGIS database as storage and processing of spatial data and OpenLayers as an interface. This application can support government for making priority decision to focus on areas which has the most high of rabies outbreak.DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.589
Abimbola Basiru Owolabi,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 26-32
This paper will actually focus on the issues relating to the growth and developmental challenges of Information and Communication Technologies (ICT), literacy needs, enlightenment and absence of ICT devices for human development and lack of formal skilled approaches to the understanding and application of ICT in sub Sahara Africa.Several data on ICT efforts were collated from documented materials, literature, Journals, electronic and non electronic media and other sources to assist in this discussion; including historical and analytical reports on ICT in some Africa country like Nigeria, South Africa, Togo to mention but few relating to the impact, capacity building and citizenship participation on the ICT process. Recommendations for ICT policy improvement in the field of literacy, special education, formal and non-formal education for urban and rural dwellers in Africa nations were also provided. DOI: http://dx.doi.org/10.11591/ij-ict.v1i1.263
Samah Osama M Kamel,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 1: June 2012 , pp. 6-19
IP telephony that transmit voice calls over an IP network such as the Internet, IP telephony are growing very fast replace the traditional circuit switched infrastructure for telephony services. So we must protect all data that are transmitted from all attacks. To implement this process, the voice is encrypted, authenticated and decrypted to get the original data. The paper examines and evaluates the six encryption algorithm to minimize delay time to achieve minimum encryption time. A Novel TEA encryption Algorithm is examined for the minimum processing time to be suitable for IP Telephony which takes minimum timeDOI: http://dx.doi.org/10.11591/ij-ict.v1i1.485
Thuzar Hlaing,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 109-118
Extra features can increase computation time, and can impact the accuracy of the Intrusion Detection System. Feature selection improves classification by searching for the subset of features, which best classify the training data. This paper proposed approach uses Mutual Correlation for feature selection which reduces from 34 continuous attributes to 10 continuous attributes and Fuzzy Decision Tree for detection and diagnosis of attacks. Experimental results on the 10% KDD Cup 99 benchmark network intrusion detection dataset demonstrate that the proposed learning algorithm achieved high true positive rate (TPR) and significant reduce false positive rate (FP ).DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.591
Mayada Faris Ghanim, M.F.L Abdullah,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 82-90
The high peak-to-average power ratio (PAPR) is one of the main disadvantages of multicarrier code division multiple access (MC-CDMA) system. To reduce the PAPR of multicarrier CDMA signals, a lot of studies have been focused on the power characteristics of spreading sequences. This paper presents the main techniques to reduce the PAPR in MC-CDMA like Amplitude Clipping and Filtering, Coding, Selective Mapping, The adaptive predistortion technique and DFT Spreading. Then a comparison of all these techniques is done in order to clarify the main advantages and disadvantages of each technique.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.558
Awad Ali, Moawia Elfaki, Dayang Norhayati,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 63-71
Both Data Mining techniques and Machine Learning algorithms are tools that can be used to provide beneficial support in constructing models that could effectively assist medical practitioners in making comprehensive decisions regarding potential problematic cases in Tuberculosis (TB). This study introduces two machine learning techniques which are Naïve Bayes inductive learning technique and the state of the art Bayesian Networks. These two techniques can be used towards constructing a model that can be used for predicting potential problematic cases in Tuberculosis. To construct a model, this study made have use of data collected from an Epidemiology laboratory. The volume of data was collated and divided into two data sets which are the training dataset and the investigation dataset. The model constructed by this study has shown a high predictive capability strength compared to other models presented on similar studies.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1424
Swati Verma, Birendra Kumar Sharma,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 136-142
During electronic communication, proxy signature helps the signer to sign message on behalf of the original signer. This type of signature scheme is used when the signatory is not available to sign this document. In this paper, we propose a new protected proxy signature scheme. In the proposed scheme, the proxy signer can sign message on behalf of the original signer with the different type of public key. The proposed scheme satis es unforgeability, undeniability, non-transferability and distinguishability properties which are the most important security requirements for a proxy signature.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1479
Jyoti Sarup, Vimal Shukla,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 91-99
Web GIS is an advance technology to manage and display all geographical locations on the earth surface. This paper deals with road analysis, to find the shortest path of route etc. so that these types of information can be displayed using Geographical Information System (GIS) technique. The approach combines both spatial and non-spatial data. This paper highlight, the suitability to handle spatial and non-spatial attributes of road features and to display and publish in web based GIS platform. This also commences the suitable software server. This paper deals with Web mapping application using different free tools and Open Source Software server (FOSS) and provides the free server solutions. Open-source software has the advantages of low cost, high stability and security, so it is preferred by the small and medium-sized Web GIS project. In this paper Web based Web-GIS architecture is described and implemented using open source Web-GIS tools like GeoServer, PostGIS and OpenLayers. An area of Bhopal City, M.P. Nagar has been chosen and road network was created in Q-GIS and published in WebGIS Server solutions. This has been used for centralized visualization of geospatial data present in various spatial databases located in different locations. This may have help to developing countries which cannot afford to use such solution. Hence there was a necessity of an open source Web-GIS application that should be both powerful for visualizing and cost effective.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1490
Nandar Pwint Oo, Ni Lar Thein,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 119-125
Because of the large character set nature of Myanmar character, currently used Myanmar language soft keyboard look like QWERTY layout on Android devices’s performance is degraded when using on small screens. The users are needed to switch keyboard layout frequently to get their desired characters. To reduce the user keyboard layout switching time, this paper proposed the slide keyboard to set the entire Myanmar character on one screen layout. User study was made by comparing slide keyboard with currently used Myanmar language soft keyboard that look like QWERTY layout (iTextMM). The user preferences and empirical evaluation is also analyzed. According to the evaluation, the parpicipants can take minimum learning time with slide keyboard and can type at a rate of 17 Character per Minutes (CPM) and have got average 0.65 error rates.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1378
Aiman Mobiu, Dr. Widyawan, Rudy Hartanto,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 100-108
IPTV was convergency product between broadcasting, telecommunication and information technology because gave multimedia service such TV broadcasting, video, audio, text, and data that transmitted by using IP protocol. IPTV service had better quality than conventional TV, such as voice over internet protocol (VoIP), data (internet), and video on demand (VoD). This research had purpose to analyze QoS (delay, jitter, MOS and throughput) from IPTV service such as VoIP, internet (HTTP, FTP), and IPTV in the simulation. The QoS resulted from simulation will be compared with standard ITU-T. The result showed bandwidth requirement for downlink and uplink from the services for VoIP 50 kbps, internet 54 kbps, and the IPTV service 6.5 Mbps. The QoS result showed that used bandwidth less than 15 Mbps, resulted jitter and delay that can not tolerated or QoS more than 250 ms and MOS less than 2. The QoS resulted from queue method had applied on the node DSLAM with bandwidth 8 Mbps, only can decreased the value of delay and jitter as 50% - 65% at VoIP and internet services. PQ method became one of the queue method that can be optimalizing of QoS eventhough only decreased the jitter 10%.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.594
Souhaib Besrour, Imran Ghani,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 72-81
The aim of this paper is to measure the security and related verification method in requirements engineering (RE). There are a few existing approaches to measure RE performance like IEEE Software Requirements Specification (SRS) and Security Quality Requirements Engineering (SQUARE). However, these existing approaches have some limitations such as lack of flexibility and require long implementation period. In order to address these issues, this paper intends to propose a new set of tools. First is the Effective Security Check List (ESCL), which is a check list with security questions that should be considered for measuring security. Secondly, the Traceability Matrix(TM), which is a two dimensional matrix to measure security during RE. Thirdly, Requirement Engineering Assessment Document (READ), which is a tool containing all statistical information about security performance during RE. The combination of presented approaches had been implemented in a case study. The outcome results are encouraging and illustrated integrated outcomes within existing RE model. The security level had also been properly measured.DOI: http://dx.doi.org/10.11591/ij-ict.v1i2.695
Ibikunle Frank, Olowononi Felix,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 1, No 2: December 2012 , pp. 126-135
The evolution of mobile Broadband over the years has been phenomenal and worthy of attention by academics, researchers, the corporate world and users alike. From the days of the First Generation (1G) through the Third Generation (3G) communication systems, the evolution has continued and has been largely influenced by an ever increasing demand for improved services and greater capacity evident in higher data rates, wider and improved coverage, improved spectral efficiency and lower latency. In response to these demands and to address some of the loopholes of the 3G networks, the 3rd Generation Partnership defined the Long Term Evolution (LTE). LTE though an evolving technology is widely accepted due to its unprecedented promised performance. As the evolution continues, the design of the ‘LTE-Advanced’ is already in progress and has been tagged different names such as the ‘4G’ and ‘Beyond 3G’ (B3G). The main backbones behind these evolutions are technological developments in the underlying mobile radio technology such as multicarrier technology (majorly OFDMA), multiple-antenna technology (MIMO) and the application of packet-switching to the radio-interface through improvements in techniques like adaptive scheduling in both the frequency and spatial dimensions, link adaptation of modulation and code-rate and several modes of fast channel state reporting. This paper is set to present the multiple antenna technology and how it contributes to the delivery of the expectations of the wireless communication systems beyond 3GDOI: http://dx.doi.org/10.11591/ij-ict.v1i2.1482
Pankaj Kr Das,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 51-56
This paper presents a necessary and sufficient condition on the number of paritycheck digits required for the existence of codes correcting periodic errors of different ordersin different blocks of a code. An example of such a code has also been provided.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1332
Ayako Hashizume, Masaaki Kurosu,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 31-37
People have started to use ICT(Information and Communication Technology) devices to acieve various goals in many situations. But a gap still exsists between high end users and low end users that is related to their demographic group. One of the important traits is the generation or the age group. Authors conducted field research by the contextual inquiry method and analyzed the data by applying M-GTA, then summarized the information into a category relationship diagram. In this diagram,factors such as the motivation for using ICTs, active involvement in the communication and ICT literacy were regarded as three major components.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1506
Lazim Abdullah, Hui Mei Ling,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 17-24
The importance of measuring service quality perceived by customers is an issue since the service quality is a key to success in service oriented industry. The estimation of service quality should be carried out with suitable measurement scales according to the types of service provided. To the best of authors’ knowledge, there have been little discussion about the applications of interval-valued intuitionistic fuzzy sets- based evaluation in measuring service quality. This paper proposes an evaluation for service quality of five vehicle insurance companies using interval-valued intuitionistic fuzzy entropy measure. Linguistic data were collected from customers using a questionnaire. An averaged interval-valued intuitionistic fuzzy number is used to construct decision matrix. Interval-valued intuitionistic fuzzy weighted averaging operator is used to aggregate the interval-valued intuitionistic fuzzy numbers for alternatives. It is found that PCF Insurance was evaluated as the best vehicle insurance company in providing service quality to customersDOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1525
Win Lai Hnin,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 1-8
The Semantic Web is an extention of the current Web that will allow to find, share and combine information more easily. The meaning in the Semantic Web is mostly represented by Resource Description Framework (RDF). To harvest such power requires robust and scalable data repositories that can store RDF data. Most of the existing RDF storage techniques rely on relation model and relational database technologies for these tasks. The mis-match between the graph model of the RDF data and the rigid 2D tables of relational model jeopardizes the scalability of such repositories and frequently renders a repository inefficient for some types of data and queries. This paper proposed a system that can store RDF data in the XML repository and discuss the basic idea of conversion from RDF Schema to XML Schema and XPath queries for extract information from XML database.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1503
Remani Naga Venkata Jagan Mohan, Kurra RajaSekhara Rao,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 38-45
One of the major difficulties in face recognition system is an in-depth pose verification problem. Face recognition is a broad area of research over the last 25 years. However, the field is highly unsolved, largely due to variations in pose, illumination and expression. In this paper, a Ternary based Angle Oriented Face Recognition algorithm is proposed. In this algorithm, the data is made into two clusters namely, Clock wise and Anti-clock wise rotations using Fuzzy method. The image is extracted using angle oriented DCT (Discrete Cosine Transform) that invokes certain normalization techniques. Face Matching is compared to the technique of k-means. Based on Image Recognition pattern, the reliability of clusters is studied using Nelson model. The experimental results are verified.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1779
Nishikant C Dhande,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 46-50
A Botnet is a collection of computers infected with malicious code that use FTP, TFTP, and HTTP protocol based services for infecting the computers. They keep on spreading till a desired strength of Botnet is assembled. Since social networking users have inclination to grow the Social Networks, a poorly designed social networking website can have some loop holes which could invoke a Botnet to spread around the users connected to it. In this paper attempt is made to elaborate assimilation of social networks and to show how they can turn into Botnet. This study is based on the analysis of spam, Internet blogs, newsgroups & Cases for converging into conclusionsDOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1819
Pwint Hay Mar Lwin,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 25-30
Ranking is the central problem for information retrieval (IR), and employing machine learning techniques to learn the ranking function is viewed as a promising approach to IR. In information retrieval, the users’ queries often vary a lot from one to another. In this paper we take into account the diversity of query type by clustering the queries. Instead of deriving a single function, this system attempt to develop several ranking functions based on the resulting query clusters in the sense that different queries of the same cluster should have similar characteristics in terms of ranking. Before the queries are clustered, query features are generated based on the average scores of its associated retrieved documents. So, for each query cluster, there will be its associated ranking model. To rank the documents for a new query, the system first find the most suitable cluster for that query and produce the scoring results depend on that cluster. The effectiveness of the system will be tested on LETOR, publicly available benchmark dataset.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1505
Ani Dijah Rahajoe, Edi Winarko,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 1: April 2013 , pp. 9-16
Knapsack problem is a problem that occurs when looking for optimal selection of objects that will be put into a container with limited space and capacity. On the issue of loading goods into the container, optimal selection of objects or items to be sent must fulfilled to minimize the total weight of the capacity or volume limits without exceeding the maximum capacity of containers that have been determined. The types of knapsack that has been discussed so far is only to maximize the use not to exceed the limits specified capacity so it cannot be applied to the problem. This study aims to develop a dynamic programming algorithm to solve the MinMax 0/1 knapsack, which is an extension of the 0/1 knapsack with minimal and maximal constrain. The result study showed that application of the MinMax 0/1 knapsack is used to generate the optimal solution to the problem of loading system goods into the container to optimize container space available compared with the loading of goods by PT DFI.DOI: http://dx.doi.org/10.11591/ij-ict.v2i1.1299
Jogendra Kumar,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 85-92
A Mobile Ad-Hoc Network (MANET) is a collection of wireless mobile nodes that communicates with each other without using any existing infrastructure, access point or centralized administration .wireless LAN is an IEEE 802.11 standard supported DCF and MAC features. In this article discuss performance on Distributed Coordination Function (DCF) in Dynamic MANET on demand routing protocols on constant bit rate (CBR).Using Qualnet simulation tools 5.0.2 and finally discuss combine comparative performance analysis 802.11 DCF .The effective performance of 802.11 DCF in Dynamic MANET on demand routing protocol on the performance metrics such as 802.11 DCF: Broadcasts sent, Broadcasts received, Unicasts sent, Unicasts received, CTS packet sent, packet drops due to retransmissions limit, RTS packet sent, ACK packet sent, RTS retransmissions due to time out and packet retransmissions due to ACK timeout..DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3959
Reski Mai Candra, Noorminshah A. Iahad,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 64-70
This study examines consumer’s perception related to perceived risk while doing transaction in e-auction system. Previous researches found there are some features in e-auction system recognized unclarity features as they indicate having fraud or cheating. In the online auction environment, perception could be categorized in two types such as privacy and security. This study proposed a conceptual framework based on perceived risks from consumer’s investigation, associated directly with four cost features of e-auction system: payment method, auction fee, bidding fee and third party services that combined with four perceived risk components: performance risk, psychological risk, financial risk, and time risk. Researcher has developed a questionnaire for collecting data from consumer’s who has experience in using e-auction. Through statistical analysis using multiple regressions, this study found that payment method, auction fee, and bidding fee have a positive impact on perceived risk. However, third party services have a significant effect upon consumer perceived risk on financial risk but not significant effect to time risk. Furthermore, the online auction features is directly related to reducing consumers' risk perception. As a summary, online auction features associated with financial play a crucial role in reducing consumers' perceived risk in online auction transactions.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2529
Putu Indah Ciptayani, Reza Pulungan,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 106-115
Hypoxia inducible factor (HIF) is the main protein in hypoxia pathway. The response of HIF to changes of oxygen pressure is regulated by 2 oxygen sensors, prolyl hydroxylase (PHD) and factor inhibiting HIF (FIH). Studies have shown that biochemical reactions at molecular level actually exhibit stochastic and random behaviors. Modeling biochemical reactions using purely deterministic method, therefore, ignore these characteristics. Hence, we use stochastic modeling using CTMC to model this regulation. Nevertheless, the use of pure CTMC on complex biochemical reaction networks, such as hypoxia, results in an infeasible computation time and typically requires very large memory. Therefore, we use a numerical hybrid method that combines pure CTMC and deterministic methods. The purpose is to reduce time complexity and to obtain a better accuracy than deterministic method. Using this model, we can observe that an increase of oxygen pressure results in a decrease in the amount of HIF and that oxygen sensor FIH only inhibits C-TAD activity. The model is also able to classify 84% genes that were observedDOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3845
Amel Ltifi, Ahmed Zouinkhi,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 71-78
In a VANET, the network topology is constantly changing. In fact, it requires distributed self-organizing security systems. In this article, we propose a distributed self-organizing trust management system for vehicular ad-hoc networks (VANETs), given the disastrous consequences of acting on false information sent by the malicious peers in this context. Our application can verify the correctness of alert messages sent by other vehicles about road accident. We opted to apply ambient communication technology to provide a self-organized network. We introduce the concept of “ambient intelligent vehicle” that consists in integrating ambient intelligence features in VANET. Vehicles are considered as intelligent agents that communicate in an ambient environment. Such vehicles are able to control and to detect false warning based on trust management system depicted in this article. Vehicles are arranged into clusters in order to facilitate communication and to reduce overhead. We model how vehicle operate using UML state diagram.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2980
Kiran P, Mohana HS, Vijaya PA,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 116-123
The research of human-computer interfaces has become a growing field in computer science, which aims to attain the development of more natural, intuitive, unobtrusive and efficient interfaces. The present work describes a Human Machine Interface Based on Eye Wink Detection for helping the severely handicapped people to manipulate the household devices and to perform day to day activities. Algorithm for eye detection that is conductedthrough a process of extracting the face image from the video image followed by evaluating the eye region and then eventually detecting the eye state based on skin colour segmentation. Binary values 1 and 0 is assigned based on the opening and closing of eye. Finally applying the dynamic programming to translate the code sequences to a certain valid command. Experiment conducted for different test video displayed significant results which is carried out with different set of inputs.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3927
Solomia Fedushko, Yuriy Syerov,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 93-98
This paper deals with the methods of verification of web-forum members’ personal data, which are implemented in the algorithm of registration and validation of personal data on web-community member. The problem of personal data verifying and method of registration in an online community is investigated. These issues have the greatest influence on efficiency rise of virtual communities functioning and the level of data authenticity in web-members’ personal profiles. Solution of these problems is possible by using computer-linguistic analysis of web-members’ posts.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3960
Ammy Amelia Faisal,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 79-84
As a project is a lifeline of any organization, the critical success factors (CSFs) affect the success of the project in project management. This paper provides the literatures and reports as the concept paper which have been made by various researchers regarding the project success factors and change management. The critical success factors which have been applied and brought success to the different organizations will be elaborated in order to identify the factors are applied in Malaysian Institutions of Higher Learning (IHL). Furthermore, the value-driven relationship which consider three project elements, the Business, Project Management Office and Project Team have to be well understood. Lastly, the proposed framework of how the 3 elements mentioned above can lead to the successful in project development implementation which create competitive advantage, will be discussed as for the next step to conduct the empirical study.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.3351
Isiaka Ajewale Alimi, Jide Julius Popoola, Kayode Francis Akingbade, Michael O. Kolawole,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 57-63
In wireless communication systems (WCS), channel characteristics are random and unpredictable. The resultant effect of the randomness is the multipath effect that leads to multipath fading. Multipath fading is a major contributor to the unreliability of wireless communication links. In this paper, Multiple-Input, Multiple-Output (MIMO) schemes were investigated in mitigating the effect of signal fading. Space-time coded MIMO-OFDM was developed to enhance the performance of the WCS. The performance of the developed space-time coded MIMO-OFDM over both flat and frequency selective channels were compared with that of conventional WCS. The simulation results show that the space-time coded MIMO-OFDM considerably reduced the effect of multipath fading in WCS with improved bit error rate (BER) value.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2014
Mahdi Azizi, Abdolrasoul Mirghadri, Nasour Bagheri,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 2: August 2013 , pp. 99-105
Zhu et al. recently have proposed an authentication prpotocol forRFID systems. In this paper, we analyze its security and explain itssecurity drawbacks. More precisely, we present traceability attackagainst this protocol. In addition, we propose an improvement on theZhu et al.'s to resists these security drawbacks. Finally, weinvestigate the formal security of the improved protocol based on theBAN logic method.DOI: http://dx.doi.org/10.11591/ij-ict.v2i2.2077
Aleksandar Stojmenski, Ivan Chorbev, Dragan Mihajlov,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 190-196
This paper presents an online playlist management system designed to provide easy and intuitive management of audio and video playlists. Playlists can be uploaded, combined, downloaded, but also created online and stored for listening. Sharing of playlists is also enabled. State of the art AJAX technologies have been used to developed a fast and intuitive user interface. Automatic online playlist generation based on recognizing local songs and automated Youtube searching and queuing is also part of the system.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.5667
Amir Mirzadeh Phirouzabadi, M. Aminnayeri, M. Mahmoudian,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 175-182
Noting the problem of increasing airports congestion, it is crucial to obtain a practical and efficient scheduling for departure and landing. The problem of deciding how to land an aircraft on the airport involves assigning each aircraft to an appropriate runway, computing a landing sequence for each runway and scheduling the landing time for each aircraft. The objective was to achieve effective runway use. In this paper, a multiple runway case of the static Aircraft Landing Problem was considered. It was assumed that one of the runways is not available. A mixed integer formulation approach was proposed to deal with the problem. The approach of solving this problem was breaking down the main problem into several sub problems. To validate the model, eight test problems were extracted from the OR-Library and discussions made on their solutions.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.5284
Zeeshan Ahmad, Zain ul Abidin Jaffri, Iftikhar Ali,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 144-154
Current internet is incompetent and inept for the current trends of communication. The architecture of current internet was drafted almost 40 years ago and it is unable to cop up the problems aroused in context of security, mobility, robustness, congested traffic and vice versa of this millennium. In this paper, publish–subscribe internet routing paradigm (PSIRP) a reengineered architecture of internet is comprehensively studied, which will resolve many of the problems faced by the internet today. Keeping in view the importance of information/data, the reengineered architecture of PSIRP proffers the information–centric communication instead of host–centric communication, in response to which many of the problems of current internet will be resolved automatically. As major portion of internet is publish/subscribe in nature so PSIRP can provide a flexible, efficient and powerful architecture for future internet network design.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.3562
Yaser Rahimi,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 132-136
Previous predictions about future of computers, such as Moore’s law are analyzed, at first. Then developments in basic science such as quantum physics, spintronics, and also developments in technologies such as biology, nanoelectronics, photonics and nanophotonics, communications technologies, and medical engineering that are applicable in computers, are introduced. Then expected future goals are discussed: Reduction of cost and weight, increase of processing speed, increase of intelligence and integration with other systems.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4726
Zain ul Abidin Jaffri, Zeeshan Ahmad, Muhammad Tahir,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 155-165
To envision and evolve the Internet into the future, what required is a simple but a vital architectural modification which focuses on “What (the contents)” rather than “Where (the addresses)”, that the Internet users and the applications are more concern about. So the communication can be more in effect if the customers can simply identify that what content they want to have instead of from where the content can be possessed. To achieve this and also to make the system more efficient and effective, new internet architecture emerged which we baptized as “Named Data Networking” or simply “NDN” in which packets bring with it the hierarchical data names instead of carrying the source and destination address. In NDN when the customer needs some data, he sends the interest packet which carries the name, is first received by the router and the router then forwards it as per instructed by FIB and uphold the status of pending interest , in further which is used for guiding the retrieved data back to the customer. The main objectives behind developing this architecture are to bring the scalability, efficiency, security and robustness in the current internet state, facilitating the user choice and competition as well. In this paper an overview of different future internet architectural approaches are provided such as CCN, NetInf, PRISP and DONA. NDN as a brand new architectural design among them remains the leading focus and its altered architectural design as a source of fulfilling the above mentioned major issues and objectives.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.5122
Franklyn Chukwunonso, Michael. C Oguike,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 183-189
The advent of new Information and Communication Technologies (ICTs) poses several challenges for its use and adoption particularly for teaching and learning purposes in most Higher Educational Institutions (HEIs). Understanding the criteria to use and how to measure success are some of the challenges faces by most departments of Architecture in Nigerian Universities. Thus, this paper has attempted to address these challenges by proposing an evaluation framework for the adoption of new ICTs in tertiary institutions of learning with particular interest in Architectural education. Baseline information collected from the department of architecture in five different Nigerian Universities was used to identify the major constraints encountered in Information and Communication Technologies adoption in Architectural education and the best approach that will promote better rate of Information Technology (IT) adoption. The major contribution of the study is that the proposed framework can be used to interpret specific results as to whether the use of technology within a particular literacy program led to improved learning, and provide a better understanding of such results in larger contexts and various aspects of other issues related to evaluation, access, and literacy learning in Architectural education.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.5285
Rahul Yadav,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 166-174
The paper demonstrates design of helical antenna to achieve stable frequency response and impedance matching beyond C-band microwave frequency. An impedance matching cavity is developed for excitation of higher order modes along with the fundamental mode in the helical antenna. Triple frequency bands are resonated by loading the designed helical antenna inside the cavity and a dual band response is realized by introducing variation in feed pin height with an incremental offset of 0.1λ to the initial height which is taken as 0.2λ. The broadband gain for all the designs and a detail analysis of modes along the helical antenna loaded in rectangular cavity is reported. A highest measured bandwidth of 5.4 GHz and a peak gain of 10.65 dB is obtained. The antenna being compact and conformal in design may find its application for terrestrial, aerospace communication and personal wireless communication.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4861
Made Sudarma,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 137-143
Transformation technology brings importance consequence to the management system improvement and expansion. In this case exploiting of Information Technology (IT) is hardly required to manage because of it affect to efficiency and effectiveness of the system. The purpose of this paper is to design Integrated Academic Management Information System (IAMIS) with concept of Human Computer Interaction (HCI). The method which be applied is qualitative method by using inductive analysis approach by ignoring initial hypothesis of the research, but to find patterns, forms and themes to expose data systematically. The final result is HCI applied in IAMIS system has been applied, so that found usability and functional system, effective and efficient of AIMIS system are fully be able to carry out well. Furthermore, the analysis results show using IAMIS system affected the staff productivity increasing by 12%, it also means affected in improvement of information services to the academic community. The writer recommended to design system on the concepts of HCI and accommodated is able to online (web-based) system.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4115
Koudjo Mawuefam Koumadi, Raymond Folley, Kester Quist-Aphetsi, Amevi Acakpovi,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 2, No 3: December 2013 , pp. 124-131
The traditional mobile communications business model was based on full ownership of network infrastructure. However, network infrastructure sharing has been a trend among mobile network operators. Sharing traditional mobile network infrastructure which were not designed originally for sharing has become prevalent in the face of stiff competition, regulatory requirement and declining revenues. This, despite the reduction in capital expenditure for operators, brings technical challenges with regards to network planning, optimization and expansion in multi-operator shared environments. This paper briefly introduces models of passive infrastructure sharing and their advantages, and investigates the technical challenges which are inherent to communications tower sharing. The effects of non-optimal antenna height on coverage and signal quality, as well as those of tower loading constraints on transmission link quality are investigated among others. Simulation results and on-site measurements confirm these challenges, which may increase the operation expenditure of mobile networks.Our findings challenge the current perception in both academia and industry that passive infrastructure sharing can only produce positive effects, and therefore call for further investigations on the financial benefits of infrastructure sharing.DOI: http://dx.doi.org/10.11591/ij-ict.v2i3.4553
Made Sudarma,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 23-29
Computer network traffic is computer activity information in a network which explains interconnection between communication processes. The complexity of network traffic itself depends on the number of communication models used. The utilization of classification analyzing of network incident traffic is one of utilization forms of network traffic. The accuracy of classification model itself depends heavily on the formation of data training. The usage of C4.5 method in the establishment of decision tree in data training toward network incident traffic is with the basis to see the efficiency of decision tree formation. Wireshark tool is used as network capture tool to perform data acquisition in the formation of data training.
Nasaruddin Syafie, Yudha Nurdin, Roslidar Roslidar,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 47-58
Indonesia is geographically located in the disaster vulnerable area and frequently hit by various disasters such as earthquake, flood, etc. So that Indonesian people aware that the disaster information system is very important. Thus, the development of information and communication technology application is needed for disaster management. For this purpose, this paper proposes on the development of online disaster information system based on location based service (LBS) technology by using short message service (SMS) gateway and global positioning system (GPS). Then,the web-based prototype of online disaster information system is designed and developed as the media to provide information of location and situation of the disaster area. Furthermore, a user interface is also designed and developed to transmit input data as the location information using manual SMS and automatically using smartphone based on SMS/GPS. The research method used in this research is a spiral method that begins with conceptual design, prototype development, application test, and evaluation. The results of this research are the web-based information system and the implemented user interface application (we called ASIKonLBS) for Android based smartphone. The online mapping of input data from smartphone to the web-based system has been tested. It shows that the disaster location information can be mapped to Google Maps timely and accurately that can be accessed using the Internet connection. The evaluation to mapping delay time shows that it is lower than the refresh time of the web-based system. Therefore, the proposed online system can be categorized as a real-time system.
Velimir Graorkoski, Ana Madevska-Bogdanova,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 59-66
The adaptive learning systems are changing the learning process as we know it. One of the advantages they have over the traditional ways of learning is the attempt to adapt to the learner's capabilities in order to deliver the knowledge as optimizing as possible. Even in such sophisticated implementations there are differences in the treatment of the adaptive learning. During the past years spent in research of different aspects of the adaptive learning, we made a distinction of our latest development phase as an advanced adaptive learning, having more specific approach to the problem from the phase where the problem of adaptive learning is treated as a general case. Considering the conditions of advanced adaptive learning rather than basic adaptive learning, the process of learning is different and closely related to the human learner. In order to demonstrate this key improvement, we presented a general learner model through its learning mechanism and its behavior in the adaptive learning environment together with the instantiation process. In this paper we present a new way of learning with learning environment instances, constructed by choosing different ways to obtain the knowledge for a target unit.
Trajche Manev, Sonja Filiposka,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 1-12
Internet changes the way people communicate with each other and also affects the business flow. Technology changes affect how people live and communicate with each other, but they themselves also transform and become more human like. The agent oriented programming and multi-agent systems are relatively new example technologies that manifest these changes in a multifacet way. The goal of this paper is to explore the possibilities one can obtain by combining multi agent systems with the emerging semantic web technologies. This powerful combination leads towards new types of complex system development. Using a case study example, together with a comparison with the traditional system design approach, the paper also discusess the possibilities of semantic agent platforms and their development and shows how developers can benefit from following the standards to agent development.
M.M. Kamruzzaman,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 30-38
In this paper, performance of relay assisted wireless link is evaluated in the presence of rayleigh fading where source (base Station) is equipped with multiple single transmit antenna, relay is equipped with multiple transmit and receive antennas, and destination (mobile handset) has single receive antenna. Data are modulated using QPSK or 16 QAM or 64 QAM modulator at handset and send to relay which combined and decode the incoming signal using Maximum Likelihood decoding and further encode the symbols using STBC, and the encoded data are split into n streams which are simultaneously transmitted using n transmit antennas of relay. It is observed that relay assisted system having with different combination of transmit and receive antennas at relay provides 11-13 dB gains compared to direct link at 10-5.
Toni Malinovski, Marina Vasileva, Vladimir Trajkovik,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 13-22
The integration of computer games in the primary school program is a challenging task which requires changes in the pedagogical approach and teaching practices. Since it is important to understand students, this study follows student-centered approach while evaluating different variables in computer game enhanced classes, which impact the overall students’ Quality of Experience (QoE). We involved a total of 114 students in several primary schools in Macedonia which participated in traditional and game-based learning environment. Students’ feedback was collected through surveys and the data set was analyzed with a path analysis model that illustrates relationships between relevant variables which influence students’ QoE in classes enhanced with computer games. We found that students’ motivation mostly influenced students’ QoE, which was also determined by the increased effectiveness and simplified way of learning. The research results correlated students’ QoE and learning outcomes during integration of computer games in primary schools, which were altogether increased against the traditional environment.
Manoj Kumar Chande, Balwant Singh Thakur,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 67-72
In this work, we propose a proxy-protected proxy multi-signature scheme based on EllipticCurve Digital Signature Algorithm (ECDSA), which aims at providing data authenticity,integrity, and non-repudiation to satisfy the basic properties of partial delegation proxy signaturedescribed by Mambo et al. as well as strong proxy signature properties defined byLee et. al. The proposed signing/verifying scheme combines the advantages of proxyprotectedsignature and multi-signature scheme. The security of the proposed schemes isbased on the difficulty of breaking the elliptic curve discrete logarithm problem (ECDLP).The scheme proposed is faster and secure than the multi-signature based on factoring ordiscrete logarithm problem (DLP). The final multi-signature of a message can be verifiedindividually for each signer or collectively for a subgroup or entire group as well. Finally,the proposed proxy-protected proxy multi-signature schemes can be used in E-commerceand E-government application, which can be implemented using low power and small processingdevices.
Amir Mirzadeh Phirouzabadi, M Mahmoudian, Mohammad Asghari,
International Journal of Informatics and Communication Technology (IJ-ICT), Vol 3, No 1: April 2014 , pp. 39-46
Nowadays, Innovation is known as an essential component of competitiveness, classified in different types in literature. For instance, on one hand it is classified based on OECD as product, process, marketing and organizational innovations and on the other hand as incremental, competence developing, market developing and radical ones based on the degree of internal and external newness. Also, innovation models have changed from “simple linear” to “networking interactions” and concepts such as ‘open innovation’ and ‘innovation network’ have become important to both academic and market society due to intensive global competition. Therefore, this paper tried to empirically study and analyze the types of innovation based on OECD regarding to other classification based on the degree of internal and external newness in a networking interaction. Thus, in order to empirically explore the relations between these two classifications, we used the data of last three years (2008-2011) of 50 companies from the network Pardis Technology Park (PTP) in Iran as a case study. The results showed that most of the innovations as product, marketing and organizational were new to the market. Also marketing and process innovations were more related to radical and incremental innovation respectively and less organizational innovations were incremental.