International Journal of Informatics and Communication Technology (IJ-ICT)

Journal Information
ISSN / EISSN : 2252-8776 / 2252-8776
Total articles ≅ 203
Archived in

Latest articles in this journal

Salah A. Alabady
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 104-115;

The main requirements in the design of wireless sensor network applications are to minimize energy consumption and maximize battery lifetime. Power is primarily consumed during wireless transmission and reception. Automatic repeat request (ARQ) and forward error correction (FEC) are the two basic methods to recover erroneous packets. As energy conservation is a major issue of concern in wireless sensor networks, repeat transmission because the error in the data received is not an option, and FEC would be preferred over ARQ. FEC is applied in situations where retransmissions are relatively costly or impossible. A successful data transmission means a higher energy saving and a long-life network. This paper presents a novel linear block forward error correction code for wireless sensor network applications called Low Complexity Parity Check (LCPC). The LCPC code offers lower encoding and decoding complexity than other types of codes. To validate the performance of the LCPC code, the proposed coding scheme was investigated at different values of data transmission with different types of modulations over Additive white Gaussian noise (AWGN) and Rayleigh fading channels. The simulation results show that the proposed code outperforms the renowned LDPC (8, 4), (255,175), and (576, 288) codes.
Amera I. Badran, Manar Y. Kashmoola
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 116-125;

Most of the research showed that the reason behind the agricultural lesions is the over usage of water in irrigation the matter which cause the appearance of fungicide on plants and salinity of the soil. From this point emerged the need for adapt some systems to work in farms in order to reduces the expenses of the product, improve its quality and lessen the consumption of water. Internet webs have been a preceding means in such a scope; and they also showed flexibility in designing such systems. In this paper; a smart irrigation system that depend on the values of moisture content and the agricultural constants (Feld Capacity, Wilt Point of the plant, Bulk Density, Depth of the root of the plant, the consumption of each water dripper and the passing area) in making the decision of irrigation and running the water pump, depending on the quantity of water to be added and the duration of irrigation time, and it is better. Field humidity levels at 0.32. This system was built by using the microcontroller ESP-32S&ESP8266 and moister sensor. The data was uploaded to Adafruit server for the sake of remote monitoring by MQTT protocol.
Asti Ratnasari, Avrillaila Akbar Harahap, Adib Arsyad Anshori, Mumtazul Alam
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 148-158;

E-voting is a tool to support the voting process starting from recording, voting, and counting votes using electronic devices. E-voting promises a faster voting process, reduced budget costs, lost votes due to damaged ballot papers during the voting process, and others. E-voting is also used in high school student council elections. Young people are more computer literate (computer literacy) and interested in using new technology (e-voting) than adults and older people. This study aims to determine the suitability of e-voting in the SMA OSIS election to the user's task support using the task-technology fit (TTF) model. The data analysis used is multiple regression analysis. This analysis is used to determine the effect of the independent variables on the dependent variable with a significance level of 5%. The results of this study indicate that the 4 formulated hypotheses can be accepted and the students of SMK Muhammadiyah 1 Bantul feel the suitability of technology support when voting using e-voting in the selection of the high school student council.
Oba Zubair Mustapha, Muhammad Ali, Yim Fun Hu, Raed A. Abd-Alhameed
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 126-139;

An essential solution is available in Multi-protocol label switching (MPLS), which solve the problems faced by present-day networks: speed, scalability, quality-of-service (QoS) management, and traffic engineering. This paper is an extension of work on Fuzzy based Packet Scheduling Algorithm (FPSA) combined with Packets Processing Algorithm (PPA) in an Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) networks. This will make provision for an intelligent service to the Label Switched Path (LSP) in MPLS networks. Several research work have been proposed on the MPLS Traffic Engineering. However, it is still imperative to further research on the effect of bandwidth increment on the core network using different mechanisms such as the analytical model of MPLS, expert-based packet scheduling algorithm for MPLS QoS support. Since MPLS is not able to provide intelligent routing, it is necessary to propose an intelligent expert system of FPSA combined with PPA. And analytical model of packet forwarding in the MPLS network would be given to provide suitable solution to traffic congestion and reliable services. Furthermore, the network model created using Network Simulator (NS 2), which carries non-real time application such as File Transfer Protocol (FTP) with bandwidth variations. The results obtained from trace files are interpreted by AWK script and used for the further analysis.
Chin-Ling Chen, Supaporn Punya
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 85-92;

Wi-Fi Protected Access 2 (WPA 2) currently is the most widely used mechanism for protecting the users in wireless networks. We have discussed the weakness of 4-way handshake procedure in Wi-Fi WPA2/PSK and proposed an enhance WPA2/PSK by adding timestamp parameter to prevent authentication cracking. The experiments have compared WPA2/PSK with Enhanced WPA2/PSK cracking and the result is also given.
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 93-103;

Today, cancer counted as the riskier disease than the other diseases in the globe. There are many cancer forms like leukemia, skin cancer, and stomach cancer but lung and breast cancer are the most common forms that many people suffered from. Cancer is the disease that cell has grown rapidly and abnormally that is why treating it is somehow tough in some cases but it can be controlled if it is detected in the initial stage. Data-mining classification algorithms had a vital role in predicting and recognizing both benign and malignant cell. Several classifiers are available to classify the usual and unusual cells such as decision-tree, artificial-neural net, SVM, and KNN. This paper presents a systematic review about the most well-known data-mining classification algorithms for lung and breast cancer diagnose. A brief review about KDD and the data-mining concept has demonstrated. The Decision-Tree (D-Tree), ANN, Support-vector-machine, and naïve Bayes classifier that is widely utilized in the biomedical field has been reviewed along with the some algorithms such as C4.5, Cart, and Iterative -Dichotomiser 3 ‘ID3’. A comparison has been done among various reviewed papers in terms of accuracy that used various data-mining classification algorithms to propose the lung and breast cancer diagnosis system. The experimental results of the reviewed papers showed that the Multilayer Perceptron (MLP) and Logistic Regression (LR) gave a higher accuracy of 99.04% and 98.1%, respectively.
Hassan Khani
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 75-84;

In ultra-wideband (UWB) communications, monobit receivers offer a low complexity implementation but at the same time exhibit a great performance loss. In this paper, a novel detection scheme, denoted as x-law detection (XLD), is proposed to diminish the performance loss caused by employing monobit analog-to-digital converters in transmitted-reference (TR) UWB receivers. Simulation results show that if the optimal value is employed for x, the XLD-based monobit weighted TR (MWTR) receiver can achieve 14.2~15.5 dB and 8~9.2 dB performance gain over the conventional MWTR receiver in LOS and NLOS scenarios, respectively. Moreover, the XLD-based MWTR receiver performance with the optimal value of x is only 1.6~3 dB away from the optimum MWTR receiver performance in intra-vehicle UWB channels. Additionally, the XLD-based MWTR receiver is not sensitive to the summation interval. This feature decreases the receiver complexity and guarantees a robust performance over different multipath channels. The significant performance improvement of the XLD scheme comes at a limited complexity increase. Thus, the XLD approach is a good candidate for TR-based and other training-based monobit receivers requiring low complexity, high performance, and low power consumption.
Brajlata Chauhan, Suresh Chandra Gupta, Sandip Vijay
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10, pp 140-147;

This work investigated a miniaturized slotted conformal antenna array for multiband application. Three guard lines are incorporated to the side of main patch and top of main patch to reduce surface current for planner surface and observe the effect of guard line due to which it resonate at three frequencies in X band and Ku band to be useful for multiband. A rectangular slot is etched at center of patches to increase the current path for wide band application. A quarter wavelength feeding network is used with good agreement of impedance matching. The main lobe width and direction shows through the radiation pattern which remains stable even it is significantly curved. This structure is wrapped around a cylinder with a diameter of 41.4 mm in the circumferential direction. It is observed that the planner antenna array operating at 8.4 GHz, 11.2 GHz &18.2 GHz with a return loss of -20 dB to -45 dB with fractional BW of 25% at 3rd frequency range and the directivity from 3.4 dBi-6.8 dBi. By doing some alteration in dimensions for the conformal antenna producing fractional BW of 20% and the directivity 5.5 to 9.1 dBi at resonating frequencies of 8.4 GHz, 11.4 GHz, and 17.5 GHz. This proposed array is simulated on CST software.
Mouna Gassara, Manel Elleuchi, Mohamed Abid
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10;

Internet of Things (IoT) establishes a smart communication system between the human being and the surrounding objects (or “things”) while using the internet as the backbone of this system. Cloud is the fundamental constituent of IoT. It offers important application services in numerous application domains. Indeed, many IoT cloud platforms are competing to provide appropriate and very specific IoT services. The LoRa platform in particular presents a long-range, low-bit rate, low-power, wireless telecommunication protocol for IoT. As such, end-devices make use of LoRa through a sole wireless hop in order to communicate to the gateway(s) that is (are) considered as relay messages and transparent bridges between these end-devices and an IoT cloud while connecting to the Internet. This article surveys the most used IoT cloud platforms suitable for the LoRa communication protocol through a deep and detailed study of previously published works related to this topic. Moreover, a comparison is made between these IoT cloud platforms according to their characteristics and application domains. The overall aim of the present paper is to provide researchers in the field with detailed knowledge concerning the IoT cloud platforms appropriate to the LoRa communication system including the advantages and drawbacks of each one of them.
Ahmad Mohammad Hassan, Ayuba John
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10;

Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.
Back to Top Top