International Journal of Informatics and Communication Technology (IJ-ICT)

Journal Information
ISSN / EISSN : 2252-8776 / 2252-8776
Current Publisher: Institute of Advanced Engineering and Science (10.11591)
Total articles ≅ 112
Archived in

Latest articles in this journal

Adoyi Boniface, A.Y. Nasir, A. M. Hassan
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9; doi:10.11591/ijict.v9i3.pp171-178

Gas leakage is a major problem with industrial sectors, residential premises and gas powered vehicles like CNG (Compressed Natural Gas) buses etc. One of the preventive methods to stop accidents associated with the gas leakage is to install a gas leakage detection device at vulnerable places. The aim of this project is to develop such a device that can automatically detect and control gas leakages and also monitor temperature in vulnerable areas. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor and then also monitors the temperature using a temperature sensor. When the LPG concentration in the air exceeds a certain level, the gas sensor senses the gas leakage and the output of the sensor goes LOW, the system then opens the exit windows, and then uses the GSM to alert the person about the gas leakage via SMS. Also, when the temperature of the environment exceeds a certain limit, it then turns ON the LED (indicator) and make an alarm through the buzzer. An LCD (16x2) displays the current temperature and gas leakage status in degree Celsius and PPM respectively.
Arnold Adimabua Ojugo, Debby Oghenevwede Otakore
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 185-194; doi:10.11591/ijict.v9i3.pp185-194

Graphs have become the dominant life-form of many tasks as they advance a structural system to represent many tasks and their corresponding relationships. A powerful role of networks and graphs is to bridge local feats that exist in vertices or nodal agents as they blossom into patterns that helps explain how nodes and their corresponding edges impacts a complex effect that ripple via a graph. User cluster are formed as a result of interactions between entities – such that many users today, hardly categorize their contacts into groups such as “family”, “friends”, “colleagues”. The need to analyze such user social graph via implicit clusters, enables the dynamism in contact management. Study seeks to implement this dynamism via a comparative study of the deep neural network and friend suggest algorithm. We analyze a user’s implicit social graph and seek to automatically create custom contact groups using metrics that classify such contacts based on a user’s affinity to contacts. Experimental results demonstrate the importance of both the implicit group relationships and the interaction-based affinity in suggesting friends.
S. Mary Praveena, R. Kanmani, A. K. Kavitha
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 195-204; doi:10.11591/ijict.v9i3.pp195-204

Image fusion is a sub field of image processing in which more than one images are fused to create an image where all the objects are in focus. The process of image fusion is performed for multi-sensor and multi-focus images of the same scene. Multi-sensor images of the same scene are captured by different sensors whereas multi-focus images are captured by the same sensor. In multi-focus images, the objects in the scene which are closer to the camera are in focus and the farther objects get blurred. Contrary to it, when the farther objects are focused then closer objects get blurred in the image. To achieve an image where all the objects are in focus, the process of images fusion is performed either in spatial domain or in transformed domain. In recent times, the applications of image processing have grown immensely. Usually due to limited depth of field of optical lenses especially with greater focal length, it becomes impossible to obtain an image where all the objects are in focus. Thus it plays an important role to perform other tasks of image processing such as image segmentation, edge detection, stereo matching and image enhancement. Hence, a novel feature-level multi-focus image fusion technique has been proposed which fuses multi-focus images. Thus the results of extensive experimentation performed to highlight the efficiency and utility of the proposed technique is presented. The proposed work further explores comparison between fuzzy based image fusion and neuro fuzzy fusion technique along with quality evaluation indices.
Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 179-184; doi:10.11591/ijict.v9i3.pp179-184

This paper projects Gryllidae Optimization Algorithm (GOA) has been applied to solve optimal reactive power problem. Proposed GOA approach is based on the chirping characteristics of Gryllidae. In common, male Gryllidae chirp, on the other hand some female Gryllidae also do as well. Male Gryllidae draw the females by this sound which they produce. Moreover, they caution the other Gryllidae against dangers with this sound. The hearing organs of the Gryllidae are housed in an expansion of their forelegs. Through this, they bias to the produced fluttering sounds. Proposed Gryllidae Optimization Algorithm (GOA) has been tested in standard IEEE 14, 30 bus test systems and simulation results show that the projected algorithms reduced the real power loss considerably.
O. A. Simon, U. I. Bature, K. I. Jahun, N. M. Tahir
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 212-220; doi:10.11591/ijict.v9i3.pp212-220

In our homes or offices, security has been a vital issue. Control of home security system remotely always offers huge advantages like the arming or disarming of the alarms, video monitoring, and energy management control apart from safeguarding the home free up intruders. Considering the oldest simple methods of security that is the mechanical lock system that has a key as the authentication element, then an upgrade to a universal type, and now unique codes for the lock. The recent advancement in the communication system has brought the tremendous application of communication gadgets into our various areas of life. This work is a real-time smart doorbell notification system for home Security as opposes of the traditional security methods, it is composed of the doorbell interfaced with GSM Module, a GSM module would be triggered to send an SMS to the house owner by pressing the doorbell, the owner will respond to the guest by pressing a button to open the door, otherwise, a message would be displayed to the guest for appropriate action. Then, the keypad is provided for an authorized person for the provision of password for door unlocking, if multiple wrong password attempts were made to unlock, a message of burglary attempt would be sent to the house owner for prompt action. The main benefit of this system is the uniqueness of the incorporation of the password and messaging systems which denies access to any unauthorized personality and owner's awareness method.
Vallidevi Krishnamurth, Nagarajan K. K., D.Venkata Vara Prasad, Ganesh Kumar, Arjith Natarajan, Shailesh Saravanan, Akshaya Natarajan, Shankaran Murugan, Dattuluri Rushitaa
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 205-211; doi:10.11591/ijict.v9i3.pp205-211

Augmented reality, the new age technology, has widespread applications in every field imaginable. This technology has proven to be an inflection point in numerous verticals, improving lives and improving performance. In this paper, we explore the various possible applications of Augmented Reality (AR) in the field of Medicine. The objective of using AR in medicine or generally in any field is the fact that, AR helps in motivating the user, making sessions interactive and assist in faster learning. In this paper, we discuss about the applicability of AR in the field of medical diagnosis. Augmented reality technology reinforces remote collaboration, allowing doctors to diagnose patients from a different locality. Additionally, we believe that a much more pronounced effect can be achieved by bringing together the cutting edge technology of AR and the lifesaving field of Medical sciences. AR is a mechanism that could be applied in the learning process too. Similarly, virtual reality could be used in the field where more of practical experience is needed such as driving, sports, neonatal care training.
Kanagasabai Lenin
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 151-156; doi:10.11591/ijict.v9i3.pp151-156

In this paper Gentoo Penguin Algorithm (GPA) is proposed to solve optimal reactive power problem. Gentoo Penguins preliminary population possesses heat radiation and magnetizes each other by absorption coefficient. Gentoo Penguins will move towards further penguins which possesses low cost (elevated heat concentration) of absorption. Cost is defined by the heat concentration, distance. Gentoo Penguins penguin attraction value is calculated by the amount of heat prevailed between two Gentoo penguins. Gentoo Penguins heat radiation is measured as linear. Less heat is received in longer distance, in little distance, huge heat is received. Gentoo Penguin Algorithm has been tested in standard IEEE 57 bus test system and simulation results show the projected algorithm reduced the real power loss considerably.
Hadeel N. Alshaer, Mohammed A. Otair, Laith Abualigah
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9; doi:10.11591/ijict.v9i3.pp157-170

Feature selection problem is one of the main important problems in the text and data mining domain. This paper presents a comparative study of feature selection methods for Arabic text classification. Five of the feature selection methods were selected: ICHI square, CHI square, Information Gain, Mutual Information and Wrapper. It was tested with five classification algorithms: Bayes Net, Naive Bayes, Random Forest, Decision Tree and Artificial Neural Networks. In addition, Data Collection was used in Arabic consisting of 9055 documents, which were compared by four criteria: Precision, Recall, F-measure and Time to build model. The results showed that the improved ICHI feature selection got almost all the best results in comparison with other methods.
Jafar Asgari Arani
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 140-150; doi:10.11591/ijict.v9i2.pp140-150

This research has thrown up many questions in need of further investigation.There was an expressive quantitative-qualitative research, which a common investigation form was used in.The dialogue item was also applied to discover if the contributors asserted the media-based attitude supplements their learning of academic English writing classes or not.Data recounted academic” insights toward using Skype as a sustaining implement for lessons releasing based on chosen variables: their occupation, year of education, and knowledge with Skype discovered that there were no important statistical differences in the use of Skype units because of medical academics major knowledge. There are statistically important differences in using Skype units. The findings also, disclosed that there are statistically significant differences in using Skype units due to the practice with Skype variable, in favors of academics with no Skype use practice. Skype instrument as an instructive media is a positive medium to be employed to supply academic medical writing data and assist education. Academics who do not have enough time to contribute in classes believe comfortable using the Skype-based attitude in scientific writing. They who took part in the course claimed that their approval of this media is due to learning academic innovative medical writing.
Wajid Hassan, Te-Shun Chou, Omar Tamer, John Pickard, Patrick Appiah-Kubi, Leslie Pagliari
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 117-139; doi:10.11591/ijict.v9i2.pp117-139

Cloud computing has sweeping impact on the human productivity. Today it’s used for Computing, Storage, Predictions and Intelligent Decision Making, among others. Intelligent Decision Making using Machine Learning has pushed for the Cloud Services to be even more fast, robust and accurate. Security remains one of the major concerns which affect the cloud computing growth however there exist various research challenges in cloud computing adoption such as lack of well managed service level agreement (SLA), frequent disconnections, resource scarcity, interoperability, privacy, and reliability. Tremendous amount of work still needs to be done to explore the security challenges arising due to widespread usage of cloud deployment using Containers. We also discuss Impact of Cloud Computing and Cloud Standards. Hence in this research paper, a detailed survey of cloud computing, concepts, architectural principles, key services, and implementation, design and deployment challenges of cloud computing are discussed in detail and important future research directions in the era of Machine Learning and Data Science have been identified.
Back to Top Top