Journal of ICT Research and Applications https://journals.itb.ac.id/index.php/jictra <p><img class="imgdesc" src="https://lppm.itb.ac.id/wp-content/uploads/sites/55/2021/08/JICTRA_ITB_small.png" alt="" /></p> <p style="text-align: justify;"><em>Journal of ICT Research and Applications</em> welcomes full research articles in the area of Information and Communication Technology from the following subject areas: Information Theory, Signal Processing, Electronics, Computer Network, Telecommunication, Wireless &amp; Mobile Computing, Internet Technology, Multimedia, Software Engineering, Computer Science, Information System and Knowledge Management.</p> <p style="text-align: justify;">Abstracts and articles published on Journal of ICT Research and Applications are available online at ITB Journal and indexed by <a href="https://www.scopus.com/sourceid/21100268428?origin=resultslist">Scopus</a>, <a href="https://scholar.google.co.id/citations?user=kv2tyQIAAAAJ&amp;hl=id">Google Scholar</a>, <a href="https://doaj.org/toc/2338-5499?source=%7B%22query%22%3A%7B%22filtered%22%3A%7B%22filter%22%3A%7B%22bool%22%3A%7B%22must%22%3A%5B%7B%22term%22%3A%7B%22index.issn.exact%22%3A%222338-5499%22%7D%7D%2C%7B%22term%22%3A%7B%22_type%22%3A%22article%22%7D%7D%5D%7D%7D%2C%22query%22%3A%7B%22match_all%22%3A%7B%7D%7D%7D%7D%2C%22from%22%3A0%2C%22size%22%3A100%7D">Directory of Open Access Journals</a>, <a href="https://rzblx1.uni-regensburg.de/ezeit/detail.phtml?bibid=AAAAA&amp;colors=7&amp;lang=en&amp;jour_id=167017">Electronic Library University of Regensburg</a>, <a href="https://atoz.ebsco.com/Titles/SearchResults/8623?SearchType=Contains&amp;Find=journal+of+ICT+RESEARCH+AND+APPLICATIONS&amp;GetResourcesBy=QuickSearch&amp;resourceTypeName=allTitles&amp;resourceType=&amp;radioButtonChanged=">EBSCO Open Science Directory</a>, <a href="https://iamcr.org/open-access-journals">International Association for Media and Communication Research (IAMCR)</a>, <a href="https://miar.ub.edu/issn/2337-5787">MIAR: Information Matrix for the Analysis of Journals Universitat de Barcelona</a>, Cabells Directories, <a href="https://www.jdb.uzh.ch/id/eprint/18193/">Zurich Open Repository and Archive Journal Database</a>, <a href="https://oaji.net/journal-detail.html?number=4569">Open Academic Journals Index</a>, Indonesian Publication Index and ISJD-Indonesian Institute of Sciences. The journal is under reviewed by Compendex, Engineering Village.</p> <p>ISSN: 2337-5787<br />E-ISSN: 2338-5499</p> <p>Reg. No. 691-SIC-UPPGT-SIT-1963, <a title="Accreditation Decree" href="https://lppm.itb.ac.id/wp-content/uploads/sites/55/2021/12/Salinan-SK-Hasil-Akresitasi-Jurnal-Ilmiah-Periode-II-Tahun-2018.pdf">Accreditation No. 30/E/KPT/ 2018</a></p> <p>Published by the Institute for Research and Community Services, Institut Teknologi Bandung, in collaboration with Indonesian Engineering Association (<em>Persatuan Insinyur Indonesia-PII</em>).</p> <p><span style="text-decoration: underline;"><strong>Publication History</strong></span></p> <p><strong>Formerly known as:</strong></p> <ul> <li>ITB Journal of Information and Communication Technology (2007 - 2012)</li> </ul> <p>Back issues can be read online at: http://journal.itb.ac.id</p> <p><span style="text-decoration: underline;"><strong>Scimago Journal Ranking</strong></span></p> <p><a title="SCImago Journal &amp; Country Rank" href="https://www.scimagojr.com/journalsearch.php?q=21100268428&amp;tip=sid&amp;exact=no"><img src="http://www.scimagojr.com/journal_img.php?id=21100268428&amp;title=true" alt="SCImago Journal &amp; Country Rank" border="0" /></a></p> LPPM ITB en-US Journal of ICT Research and Applications 2337-5787 Strengthening INORMALS Using Context-based Natural Language Generation https://journals.itb.ac.id/index.php/jictra/article/view/17167 <p>The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences generated by the proposed method was maintained, which was about 99% when using the proposed method, while it was 98.61% when using Wibowo’s method.</p> Soni Yora Ari Moesriami Barmawi Copyright (c) 2022 Journal of ICT Research and Applications 2022-08-31 2022-08-31 16 2 101 122 10.5614/itbj.ict.res.appl.2022.16.2.1 Medium Access Control Protocol for High Altitude Platform Based Massive Machine Type Communication https://journals.itb.ac.id/index.php/jictra/article/view/17318 <p>Massive Machine Type Communication (mMTC) can be used to connect a large number of sensors over a wide coverage area. One of the places where mMTC can be applied is in wireless sensor networks (WSNs). A WSN consists of several sensor nodes that send their sensing information to the cluster head (CH), which can then be forwarded to a high altitude platform (HAP) station. Sensing information can be sent by the sensor nodes at the same time through the same medium, which means collision can occur. When this happens, the sensor node must re-send the sensing information, which causes energy wastage in the WSN. In this paper, we propose a Medium Access Control (MAC) protocol to control access from several sensor nodes during data transmission to avoid collision. The sensor nodes send Round Robin, Interrupt and Query data every eight hours. The initial slot for transmission of the Round Robin data can be either randomized or reserved. Analysis performance was done to see the efficiency of the network with the proposed MAC protocol. Based on the series of simulations that was conducted, the proposed MAC protocol can support a WSN system-based HAP for monitoring every eight hours. The proposed MAC protocol with an initial slot that is reserved for transmission of Round Robin data has greater network efficiency than a randomized slot.</p> Veronica Windha Mahyastuty Iskandar Iskandar Hendrawan Hendrawan Mohammad Sigit Arifianto Copyright (c) 2022 Journal of ICT Research and Applications 2022-08-31 2022-08-31 16 2 123 137 10.5614/itbj.ict.res.appl.2022.16.2.2 Context-Aware Sentiment Analysis using Tweet Expansion Method https://journals.itb.ac.id/index.php/jictra/article/view/17342 <p>The large source of information space produced by the plethora of social media platforms in general and microblogging in particular has spawned a slew of new applications and prompted the rise and expansion of sentiment analysis research. We propose a sentiment analysis technique that identifies the main parts to describe tweet intent and also enriches them with relevant words, phrases, or even inferred variables. We followed a state-of-the-art hybrid deep learning model to combine Convolutional Neural Network (CNN) and the Long Short-Term Memory network (LSTM) to classify tweet data based on their polarity. To preserve the latent relationships between tweet terms and their expanded representation, sentence encoding and contextualized word embeddings are utilized. To investigate the performance of tweet embeddings on the sentiment analysis task, we tested several context-free models (Word2Vec, Sentence2Vec, Glove, and FastText), a dynamic embedding model (BERT), deep contextualized word representations (ELMo), and an entity-based model (Wikipedia). The proposed method and results prove that text enrichment improves the accuracy of sentiment polarity classification with a notable percentage.</p> Bashar Tahayna Ramesh Ayyasamy Rehan Akbar Copyright (c) 2022 Journal of ICT Research and Applications 2022-08-31 2022-08-31 16 2 138 151 10.5614/itbj.ict.res.appl.2022.16.2.3 Breast Cancer Diagnosis in Women Using Neural Networks and Deep Learning https://journals.itb.ac.id/index.php/jictra/article/view/17454 <p>Breast cancer is a deadly disease affecting women around the world. It can spread rapidly into other parts of the body, causing untimely death when undetected due to rapid growth and division of cells in the breast. Early diagnosis of this disease tends to increase the survival rate of women suffering from the disease. The use of technology to detect breast cancer in women has been explored over the years. A major drawback of most research in this area is low accuracy in the detection rate of breast cancer in women. This is partly due to the availability of few data sets to train classifiers and the lack of efficient algorithms that achieve optimal results. This research aimed to develop a model that uses a machine learning approach (convolution neural network) to detect breast cancer in women with significantly high accuracy. In this paper, a model was developed using 569 mammograms of various breasts diagnosed with benign and maligned cancers. The model achieved an accuracy of 98.25% and sensitivity of 99.5% after 80 iterations. </p> Ojo Fagbuagun Olaiya Folorunsho Lawrence Adewole Titilayo Akin-Olayemi Copyright (c) 2022 Journal of ICT Research and Applications 2022-09-09 2022-09-09 16 2 152 166 10.5614/itbj.ict.res.appl.2022.16.2.4 Towards Enhancing Keyframe Extraction Strategy for Summarizing Surveillance Video: An Implementation Study https://journals.itb.ac.id/index.php/jictra/article/view/16963 <p>The large amounts of surveillance video data are recorded, containing many redundant video frames, which makes video browsing and retrieval difficult, thus increasing bandwidth utilization, storage capacity, and time consumed. To ensure the reduction in bandwidth utilization and storage capacity to the barest minimum, keyframe extraction strategies have been developed. These strategies are implemented to extract unique keyframes whilst removing redundancies. Despite the achieved improvement in keyframe extraction processes, there still exist a significant number of redundant frames in summarized videos. With a view to addressing this issue, the current paper proposes an enhanced keyframe extraction strategy using k-means clustering and a statistical approach. Surveillance footage, movie clips, advertisements, and sports videos from a benchmark database as well as Compeng IP surveillance videos were used to evaluate the performance of the proposed method. In terms of compression ratio, the results showed that the proposed scheme outperformed existing schemes by 2.82%. This implies that the proposed scheme further removed redundant frames whiles retaining video quality. In terms of video playtime, there was an average reduction of 27.32%, thus making video content retrieval less cumbersome when compared with existing schemes. Implementation was done using MATLAB R2020b.</p> Bashir Olaniyi Sadiq Habeeb Bello-Salau Latifat Abduraheem-Olaniyi Bilyaminu Muhammed Sikiru Olayinka Zakariyya Copyright (c) 2022 Journal of ICT Research and Applications 2022-09-23 2022-09-23 16 2 167 183 10.5614/itbj.ict.res.appl.2022.16.2.5