International Journal of Informatics and Communication Technology (IJ-ICT)

Journal Information
ISSN / EISSN : 2252-8776 / 2252-8776
Current Publisher: Institute of Advanced Engineering and Science (10.11591)
Total articles ≅ 120
Archived in
SHERPA/ROMEO
Filter:

Latest articles in this journal

Saraju Prasad Padhy, Madhusmita Panda, Srinivas Sethi, Aruna Tripathy
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp27-36

Abstract:
Relaying is one of the latest communication technologies developed for wireless networks like WiMAX, LTE Advanced and 5G Ultra Reliable Low Latency Communication (URLLC) networks to provide coverage extension as well as higher bitrates for cell edge users. Thus they are included in the design of next generation wireless communication systems to provide performance improvement in terms of coverage and capacity over their predecessors. Other promising features of this technology include easy to implement and reduction in deployment cost. The objective of this paper is to analyze both cooperative and non-cooperative relaying techniques in the Infinite Block length regime and findout the benefits of Relay implementation. A single Amplify and Forward (A&F) Relay is used for this purpose. Reduction in power requirement for Simple Relay is shown in comparison to the direct transmission, using experimental analysis with Matlab simulation. SER (Symbol error rate) is calculated at the receiver for no relay, simple Relay and Cooperative Relaying scenario to show the improvements of cooperative Relaying implementation.The performance enhancement of the Relay is then carried out using Particle Swam Optimization (PSO) optimization technique where allocation of power between Base station and Relay Node is effectively distributed for optimum performance.
Sushil Shrestha, Manish Pokharel
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp9-18

Abstract:
The main purpose of this research paper is to analyze the moodle data and identify the most influencing features to develop the predictive model. The research applies a wrapper-based feature selection method called Boruta for the selection of best predicting features. Data were collected from eighty-one students who were enrolled in the course called Human Computer Interaction (COMP341), offered by the Department of Computer Science and Engineering at Kathmandu University, Nepal. Kathmandu University uses Moodle as an e-learning platform. The dataset contained eight features where Assignment.Click, Chat.Click, File.Click, Forum.Click, System.Click, Url.Click, and Wiki.Click was used as the independent features and Grade as the dependent feature. Five classification algorithms such as K Nearest Neighbour, Naïve Bayes, and Support Vector Machine (SVM), Random Forest, and CART decision tree were applied in the moodle data. The finding shows that SVM has the highest accuracy in comparison to other algorithms. It suggested that File.Click and System.Click was the most significant feature. This type of research helps in the early identification of students’ performance. The growing popularity of the teaching-learning process through an online learning system has attracted researchers to work in the field of Educational Data Mining (EDM). Varieties of data are generated through several online activities that can be analyzed to understand the student’s performance which helps in the overall teaching-learning process. Academicians especially course instructors who use e-learning platforms for the delivery of the course contents and the learners who use these platforms are highly benefited from this research.
Memen Akbar, Fandy Hidayat, Wenda Novayani
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp19-26

Abstract:
MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is a respiratory syndrome disease caused by the coronavirus which attacks the respiratory tract from mild to severe. MERS-CoV was first reported in Saudi Arabia; total cases of MERS-CoV have continued to increase. In Indonesia, the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But not many people know about this disease and its symptoms. For this reason, an expert system was developed to diagnose MERS-CoV using the Dempster-Shafer method. The system can detect the disease from the symptoms inputted by user. The output of the system is the value of the probability of the disease, the level of the disease and the suggested. The levels of the disease are Stage 1, Stage 2, and Stage 3 where each has a different treatment based on the level of the disease. The system contains information about MERS-CoV in the form of videos and text. The system was built using the PHP programming language. The testing result shows that all system functionalities have been fulfilled. The expert validation testing had obtained at 76.7%, which prove that the system is good enough in diagnosing MERS-CoV and the results obtained from the questionnaire is at an average of 84.13% which is very good in helping users in diagnosing disease. The expert system that has been developed can help people in diagnosing the disease before consulting with a doctor.MERS-CoV (Middle East Respiratory Syndrome-Coronavirus) is arespiratory syndrome disease caused by the coronavirus which attacks therespiratory tract from mild to severe. MERS-CoV was first reported in SaudiArabia; total cases of MERS-CoV have continued to increase. In Indonesia,the MERS-CoV enters through the pilgrimage of Hajj and Umrah. But notmany people know about this disease and its symptoms. For this reason, anexpert system was developed to diagnose MERS-CoV using the DempsterShafer method. The system can detect the disease from the symptomsinputted by user. The output of the system is the value of the probability ofthe disease, the level of the disease and the suggested. The levels of thedisease are Stage 1, Stage 2, and Stage 3 where each has a different treatmentbased on the level of the disease. The system contains information aboutMERS-CoV in the form of videos and text. The system was built using thePHP programming language. The testing result shows that all systemfunctionalities have been fulfilled. The expert validation testing had obtainedat 76.7%, which prove that the system is good enough in diagnosing MERSCoV and the results obtained from the questionnaire is at an average of84.13% which is very good in helping users in diagnosing disease. Theexpert system that has been developed can help people in diagnosing thedisease before consulting with a doctor.
Rahman Atiqur
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp46-53

Abstract:
The use of smart cities rises quickly with the fast progress of the Internet of Things (IoT) advances. The smart city idea essentially getting city life; as well raises the capability of municipal jobs and facilities plus form viable economic progress of the city. The point of convergence of this paper is to introduce an automated smart automobile parking system for smart cities demand employs internet of things (IoT) technology. The offered automobile parking system covers an IoT entity sent nearby for getting sorted out the existing parking spots which are quicker contrasted with different frameworks. It is a viewpoint gave as an iOS application for reservation, entrance, supervision, and leaving the car park places.
Vivien Arief Wardhany, Herman Yuliandoko, Subono Subono, A Wildan J, Tomy Iskandar, M. Udin Harun A. L, I Gede Puja A
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp37-45

Abstract:
Feeding is one of the most important factors in vanammei shrimp culture. Feeding time must be scheduled regulary and it is prohibit from being late. Because it can affect to the development and growth of vanammei shrimp. The Research of monitoring and control system of vanammei shrimp feeding continues to be developed. The development of hardware and software in this study prioritizes monitoring of pH conditions, oxygen levels, and pond temperatures. The measurement results of pH, oxygen levels and pond temperature can be used as decision makers for vanammei shrimp feeding schedules. The decision making system using the Fuzzy Logic method. The development of control devices for feeding aims to set a schedule for feeding automatically. The use of monitoring devices and automatic Feeder control of shrimp feeding can reduce the accumulation of leftover shrimp feed, so that feeding can be more efficient.
Akpovi Oyubu Oyubu, Ufuoma Kazeem Okpeki
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp65-74

Abstract:
Offshore equipment and facilities are some of the most capital intensive and strategically located assets that require millions to billions of dollars to setup. Thus, it is important to put in place a stout security and surveillance system to ultimately protect these assets from vandalisation and theft. Monitoring of intruders/ unfamiliar objects within and outside the offshore platform requires a round-the-clock observation through provided security personnel who are stationed so as to quickly respond to any threat within a safe distance in the event of any physical intrusion but this measure is fraught with some challenges. Some of these challenges include fatigue, error in human judgement, and the limited vision of humans to mention but a few. To remedy these weaknesses and ensure a robust protection, the design and implementation/ setting up of a surveillance system to detect and track real time security concerns with a much wider and effective coverage area to enable the control unit make a well informed decision appropriately is an imperative. The system presented in this paper is designed to operate in harsh (sea waves, and fog) and unprotected (extreme heat, cold precipitation) environment.
Mouna Gassara, Manel Elleuchi, Mohamed Abid
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp54-64

Abstract:
Internet of Things (IoT) establishes a smart communication system between the human being and the surrounding objects (or “things”) while using the internet as the backbone of this system. Cloud is the fundamental constituent of IoT. It offers important application services in numerous application domains. Indeed, many IoT cloud platforms are competing to provide appropriate and very specific IoT services. The LoRa platform in particular presents a long-range, low-bit rate, low-power, wireless telecommunication protocol for IoT. As such, end-devices make use of LoRa through a sole wireless hop in order to communicate to the gateway(s) that is (are) considered as relay messages and transparent bridges between these end-devices and an IoT cloud while connecting to the Internet. This article surveys the most used IoT cloud platforms suitable for the LoRa communication protocol through a deep and detailed study of previously published works related to this topic. Moreover, a comparison is made between these IoT cloud platforms according to their characteristics and application domains. The overall aim of the present paper is to provide researchers in the field with detailed knowledge concerning the IoT cloud platforms appropriate to the LoRa communication system including the advantages and drawbacks of each one of them.
Ahmad Mohammad Hassan, Ayuba John
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 10; doi:10.11591/ijict.v10i1.pp1-8

Abstract:
Numerous type of software piracy known today, have several prevention techniques which has been established against them. Although, different software piracy techniques have been established, but the choice of which one should be the best to develop any software is the challenge for most software developers. Consequently, example of the types of piracy in software development can be categorise as follows: cracks and serials, softlifting and hard disk loading, internet piracy and software forging, mischaneling, reverse engineering, and tampering. We have several types of prevention techniques which aimed to resolved piracy in software development, although the methods have been wrecked. In this work a critical analysis has been carryout on different software piracy techniques and a simple model software was designed using the best technique to validate the results of the analysis.
Adoyi Boniface, A.Y. Nasir, A. M. Hassan
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9; doi:10.11591/ijict.v9i3.pp171-178

Abstract:
Gas leakage is a major problem with industrial sectors, residential premises and gas powered vehicles like CNG (Compressed Natural Gas) buses etc. One of the preventive methods to stop accidents associated with the gas leakage is to install a gas leakage detection device at vulnerable places. The aim of this project is to develop such a device that can automatically detect and control gas leakages and also monitor temperature in vulnerable areas. The system detects the leakage of the LPG (Liquefied Petroleum Gas) using a gas sensor and then also monitors the temperature using a temperature sensor. When the LPG concentration in the air exceeds a certain level, the gas sensor senses the gas leakage and the output of the sensor goes LOW, the system then opens the exit windows, and then uses the GSM to alert the person about the gas leakage via SMS. Also, when the temperature of the environment exceeds a certain limit, it then turns ON the LED (indicator) and make an alarm through the buzzer. An LCD (16x2) displays the current temperature and gas leakage status in degree Celsius and PPM respectively.
, Debby Oghenevwede Otakore
International Journal of Informatics and Communication Technology (IJ-ICT), Volume 9, pp 185-194; doi:10.11591/ijict.v9i3.pp185-194

Abstract:
Graphs have become the dominant life-form of many tasks as they advance a structural system to represent many tasks and their corresponding relationships. A powerful role of networks and graphs is to bridge local feats that exist in vertices or nodal agents as they blossom into patterns that helps explain how nodes and their corresponding edges impacts a complex effect that ripple via a graph. User cluster are formed as a result of interactions between entities – such that many users today, hardly categorize their contacts into groups such as “family”, “friends”, “colleagues”. The need to analyze such user social graph via implicit clusters, enables the dynamism in contact management. Study seeks to implement this dynamism via a comparative study of the deep neural network and friend suggest algorithm. We analyze a user’s implicit social graph and seek to automatically create custom contact groups using metrics that classify such contacts based on a user’s affinity to contacts. Experimental results demonstrate the importance of both the implicit group relationships and the interaction-based affinity in suggesting friends.
Back to Top Top