Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS <div class="JL3"> <div class="journalboxline"> <div class="JL3"> <div class="journalboxline"> <p><img src="https://journals.riverpublishers.com/public/site/images/wendym/jict-small.jpg" alt="" width="250" height="333" align="left" hspace="10"></p> <h1>Journal of ICT Standardization</h1> <p>The aims of this journal is to publish standardized as well as related work making "standards" accessible to a wide public - from practitioners to new comers. The journal aims at publishing in-depth as well as overview work including papers discussing standardization process and those helping new comers to understand how standards work.</p> <p>&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;</p> <p>&nbsp;&nbsp;</p> </div> </div> </div> </div> <p>&nbsp;</p> en-US jicts@riverpublishers.com (JICTS) biswas.kajal@riverpublishers.com (Kajal Biswas) Tue, 26 Nov 2024 17:36:34 +0100 OJS 3.3.0.7 http://blogs.law.harvard.edu/tech/rss 60 Enhancing Communication for People with Autism Through the Design of a Context-aware Mobile Application for PECS https://journals.riverpublishers.com/index.php/JICTS/article/view/25471 <p>Autism is a neurodevelopmental condition characterized by difficulties with social skills and communication. Autistic individuals require different types of assistance to cope with these challenges. The Picture Exchange Communication System (PECS) is a commonly used program for teaching nonverbal and symbolic communication skills, particularly for children with limited or no communication abilities. However, despite the development of various technology-based PECS systems, there is a lack of features that can simplify their use by children with autism. In our work, we are developing a design of a personalized and context-aware PECS system. Our system not only presents pictures as content but also adapts and enhances the content using contextual information.</p> Fatima Ez Zahra El Arbaoui, Kaoutar El Hari, Rajaa Saidi Copyright (c) 2024 Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS/article/view/25471 Tue, 26 Nov 2024 00:00:00 +0100 An Intelligent Algorithm for Semantic Feature Analysis and Translation of English Texts https://journals.riverpublishers.com/index.php/JICTS/article/view/26673 <p>Accurate and rapid translation is conducive to the cultural communication of different languages. This paper briefly introduces the long short-term memory (LSTM) algorithm. To enhance the performance of the LSTM algorithm, semantic features were introduced, and semantic similarity was used to screen the translations that are more in line with the semantics of the source text. Then, simulation experiments were conducted. The experiments first examined the effects of the quantity of hidden layer nodes and the type of activation function in LSTM on the translation performance. Then, the LSTM algorithm was compared with the recurrent neural network (RNN) and traditional LSTM algorithms.The proposed translation algorithm showed the best performance when there were 512 hidden layer nodes and the activation function was sigmoid, it performed better than the other two translation algorithms, and the obtained result was consistent with the semantic meaning of the source text and smooth.</p> Sha Chen Copyright (c) 2024 Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS/article/view/26673 Tue, 26 Nov 2024 00:00:00 +0100 Transforming Public Policy in Developing Countries: A Comprehensive Review of Digital Implementation https://journals.riverpublishers.com/index.php/JICTS/article/view/26475 <p>This article discusses the process of digitization in the implementation of public policy within developing countries, its critical success factors, challenges, and lessons learned from case studies. Public administration can improve efficiencies, transparency, and effectiveness through the infusion of digital technologies into processes implicated in the making, execution, and evaluation of public policies. Key success factors identified include robust digital infrastructure, clear strategic vision and leadership, effective stakeholder engagement, capacity building, and a supportive regulatory framework. In light of these potential benefits, developing countries experience enormous challenges such as inadequate infrastructure, political instability, socio-political resistance, and gaps in digital literacy. Through a review of empirical case studies from countries such as Estonia, South Korea, China, Bangladesh, and Rwanda, the article identifies key lessons that can inform the digital strategies of other developing nations. The discussion addresses the challenges of sustaining digital infrastructure, including ongoing maintenance costs, the need for continuous technology updates, and the risks of obsolescence. Furthermore, the article explores the significance of capacity building, public-private partnerships, and evolving regulatory frameworks in ensuring the long-term viability of digital policies. The future directions proposed underscore the necessity of adopting adaptable, resilient, and well-governed digital infrastructures to fully realize the benefits of digital public policy in the context of developing countries.</p> Asmawa, Abdul Hakim, Hermawan, Ainul Hayat Copyright (c) 2024 Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS/article/view/26475 Tue, 26 Nov 2024 00:00:00 +0100 Research on Distributed Access Simulation of Large-Scale Multi-Source Terminals for 5G https://journals.riverpublishers.com/index.php/JICTS/article/view/26617 <p>Large-scale machine communication scenarios are faced with the characteristics of a large number of terminal devices, small communication packets and frequent transmissions. Traditional multiple access technology can’t fully apply to these characteristics, so it needs to be improved and designed. In order to further improve the effect of distributed access strategy formulation of large-scale multi-source terminal for 5G, this paper proposes a distributed access technology for large-scale multi-source terminals for 5G. For distributed access scenarios, antenna units in the distributed system are scattered in the system, and each antenna unit keeps communication with the surrounding terminal equipment, which can expand the number of terminal devices randomly accessed in the same time slot. Then, taking advantage of this inherent advantage and the advantage of time-shifted pilot, this paper proposes a distributed random access scheme based on time-shifted pilot. Finally, through analysis and simulation, this paper proves that this scheme can effectively reduce the pilot collision probability of each antenna element and the average access delay in the system, which provides a technical reference for the subsequent distributed access of large-scale multi-source terminals.</p> Lihong Ge, Pengyu Zhang, Kaiwen Hou, Wei Ao, Lin Zhou, Yindong Li Copyright (c) 2024 Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS/article/view/26617 Tue, 26 Nov 2024 00:00:00 +0100 Cross-layer Authentication Mechanism Model Combined with 5G Converged Channel Fingerprint https://journals.riverpublishers.com/index.php/JICTS/article/view/26625 <p>In the actual communication environment, once the attacker successfully steals the legitimate channel information, the key information can be cracked according to the authentication response, so there is a security risk of key leakage. This paper combines the physical layer channel characteristics with the shared key, and combines it into a joint key to design a challenge-response physical layer authentication mechanism based on interpolation polynomial. Then, this method is applied to the EAP-AKA’ authentication protocol of 5G network, and a cross-layer authentication mechanism for 5G converged channel fingerprint is proposed. Finally, using the captured high-level authentication challenge response data, a simulation environment is built in MATLAB and the feasibility and security of the scheme are verified. The experimental results show that the authentication mechanism has better authentication performance and security performance. Compared with the traditional high-level authentication mechanism, it has certain advantages in computing overhead and can meet the 5G application scenarios of large-scale IoT terminals. Moreover, it combines physical layer authentication with high-level authentication, realizes mutual complementarity and mutual enhancement, and enhances the security performance of authentication.</p> Wei Ao, Jian Wei, Yindong Li, Xiaolong Zhang, Bin Yu, Kaiwen Hou Copyright (c) 2024 Journal of ICT Standardization https://journals.riverpublishers.com/index.php/JICTS/article/view/26625 Tue, 26 Nov 2024 00:00:00 +0100