|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Informtion Technology
October 2021 | Vol. 99
No.19 |
Title: |
METHOD AND SOFTWARE SYSTEM FOR ASSESSING THE RELIABILITY OF INFORMATION SYSTEMS |
Author: |
ASKAR BORANBAYEV, SEILKHAN BORANBAYEV, NURBEK SISSENOV, NIKOLAJ GORANIN |
Abstract: |
The article proposes a method that allows you to assess the level of fault
tolerance of information systems. Fault tolerance is assessed according to
several criteria and various areas of optimization. The method allows you to
evaluate and rank alternative solutions. The level of the alternative solution
is determined by comparing the analyzed version of the alternative with the
ideally best one. A corresponding software system has been developed that
implements the proposed method. The method and software system make it possible
to determine the fault tolerance of information and automated systems. The
developed software system and the proposed method were used and tested in
practice to assess the fault tolerance of the information system according to
several criteria. During the practical application of the method, the levels of
fault tolerance of each of the components of a real information system were
identified. Thus, in practice, it was shown that the method can be used to
assess the level of fault tolerance of information systems. |
Keywords: |
Information System, Fault Tolerance, Reliability, Method, Expert Assessment. |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
OPTIMAL PATH PLANNING FOR WAITER ROBOT USING MODIFIED ANT COLONY OPTIMIZATION |
Author: |
NUKMAN HABIB, DJOKO PURWANTO, ADI SOEPRIJANTO |
Abstract: |
The waiter robot is utilized to give a quick service for customer's satisfaction
in the restaurant. In performing its task, the waiter robot facing problems such
as many obstacles consist of tables, chairs, or customers along the path in the
workspace. Therefore, it has capable of path planning before moving to the goal.
A traditional algorithm such as A-star and Dijkstra algorithm can solve path
planning for the environment like this easily, they produce the shortest path
but not safely motion. Modified Ant Colony Optimization (M-ACO) algorithm is
presented in this paper used to get optimal path planning for waiter robot in
the restaurant. We evaluate the M-ACO algorithm for the waiter robot by
optimizing some parameters to observe the performance of this approach in terms
safely motion and path length. At the same time, we also examine A-star and
Dijkstra algorithms in the same working environment, so we can compare the
performance of each approach. The experiment results for case 1 show that M-ACO
with global transfer factor (P0) value of 0.9 gives path length 79.5264 cm
without crashing any obstacles while A-star and Dijkstra give path length 73.907
cm with crashing any obstacles, and another experiment result for case 2 show
that M-ACO with P0 value 0.9 give path length 99.745 cm without crashing any
obstacles while Astar and Dijkstra give path length 84.5617 cm with crashing any
obstacles. |
Keywords: |
Waiter Robot, Path Planning, Modified Ant Colony Optimization |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
CRYPTOCURRENCY ADOPTION IN E-PAYMENT: BARRIER OF ITS IMPLEMENTATION |
Author: |
NABY NOUHOU N CONDE, ADAMU ABUBAKAR IBRAHIM, NORBIK IDRIS, HAZWANI BT MOHD
MOHADIS |
Abstract: |
Cryptocurrency is a type of cryptographic e-currency generated by the
computational result of mathematical techniques throughout blockchain
technology. It has bitcoin as the world's first decentralized anonymous digital
currency which allows online transactions without relying on any third-party
institutions or government. Though, its technology is considered as one of the
secure online integrated payment systems in financial transactions for many
different businesses, it is still struggling for its integration and people are
reluctant to embrace its adoption. Therefore, to address this gap, we discussed
several implications for theory within information system adoption in light with
the study’s objective. the research utilized a quantitative method survey built
on theories of Technological Acceptance Model (TAM), Theory of Reasoned Action
(TRA), Delone and McLean Information System Success Model and Self-determination
Theory Model (SDT) to examine the factors influencing its adoption in e-payment.
We used a sample of 402 participants for the analysis where seven main variables
and nine hypotheses got formulated and tested using PLS-SEM path modeling with
SPSS. The result shows that the analysis of the data provided support for all
the hypotheses and established a positive relation between variables and the
findings obtained have both academic and practical worth in terms of Information
Systems technology adoption for improving the understanding of factors
influencing cryptocurrency adoption in e-transaction. |
Keywords: |
Cryptocurrency, E-currency, Blockchain, Bitcoin, E-payment |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
PERSONAL BRANDING: PRO BASKETBALL PLAYER BRANDING STRATEGY ON SOCIAL MEDIA |
Author: |
ARDELIA FADIYAH PRINGGODANI PUTRI, MUHAMMAD ARAS |
Abstract: |
Indonesia is a country with many talented sports individuals and professional
athletes who can be competitive both at the national and international levels.
However, skills and talents in sports alone may not be sufficient to ensure
athletes’ career development and the lifespan of their career in the long run,
due to the high risk of athletes being injured and unpredictable career period
of athletes. Personal branding is something that should be considered for
athletes as an element that will help athletes in achieving their present and
future success, even after retirement. In this digital era, personal branding
can be easily done online through social media platforms. Daniel Timothy Wenas
is Indonesian Professional Athlete who are the importance of personal branding
in social media – making him a professional basketball athlete with the highest
numbers of followers on social media and has done many collaborations with
numerous popular brands. This research was done by semi-structured interview
sessions with several respondents: Daniel Timothy Wenas, Daniel’s manager, CEO
of the brand who made Daniel as the brand ambassador, sports branding
practitioner, and also Daniel Wenas follower on Instagram. This research doing
validation triangulation method. The research results shown that before starting
his personal branding, Daniel first learnt to identify his strengths and
weaknesses, and then established a strategy of showcasing a message that an
athlete can obtain many achievements and has a healthy lifestyle, while at the
same time being good in cooperating and actively interacting with fans,
partners, and the community. |
Keywords: |
Personal Branding, Instagram, Self Concept, Endorsement, Relationships. |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
INDOOR NAVIGATION SYSTEM FOR BLIND PEOPLE USING COLOR QR CODE |
Author: |
BAKRI BADAWI, TEH NORANIS MOHD ARIS. MASLINA ZOLKEPLI, NOR AZURA HUSIN, NORAINI
CHE PA |
Abstract: |
In this paper, we proposed an indoor navigation system to support blind and
partially sighted people. The system consists of two parts. First part is the
encoder or the QR code generator which will be used by the building manager to
generate three different QR codes namely building information QR code, floor
information QR code and room information QR code. The building manager is
required to install this QR code in the building. Second part is the decoder
which needs a mobile phone. The decoder will take the destination room from the
blind person and then using the information stored inside the QR code will build
the floor map and provide the navigation instruction. The experiment was done
using our generated data set for three different virtual buildings. The result
shows that the decoder succeeded to decode and build the virtual map for all QR
code with distance less than 60 centimeters. |
Keywords: |
Aiding Blind People, Indoor Navigation, Virtual Map, Color QR Code. |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
ARTIFICIAL INTELLIGENCE APPLICATION TO MAXIMIZE SOCIAL WELFARE IN THE
ELECTRICITY MARKET BY INSTALLING SSSC |
Author: |
PADMANABHA RAJU CHINDA, RAGALEELA DALAPATI RAO |
Abstract: |
Congestion leads to a decrease in social welfare in a competitive electricity
market. Social Welfare Maximization is thus an independent operator's technical
challenge (ISO). The congestion can be eliminated by increasing the transmitting
power of a network. The Static Synchronous Series Capacitor (SSSC) is very
useful in optimizing the operation of the transmission system by being able to
directly control the power flow. A corrective solution has been proposed in this
paper to congestion management by SSSC. The Interior Point Approach Integrated
with the Evolutionary Particle Swarm Optimization (IPM-EPSO) is recommended for
congestion control to optimize social welfare. For checking congestion reduction
Fuzzy logic has been used. IEEE 30-bus system tests the proposed methodology.
The findings evaluated with and without SSSC indicate that this system is
appropriate for long-term congestion management |
Keywords: |
Management of congestions; Deregulated power system; SSSC; Social Welfare;
IPM-EPSO |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
STEADY STATE ANALYSIS OF DYNAFLOW CONTROLLER |
Author: |
RAGALEELA DALAPATI RAO, PADMANABHA RAJU CHINDA |
Abstract: |
A new member in flexible ac transmission systems (FACTS) known as dynaflow
controller is presented in this paper. It is being used to regulate the flow of
power in electrical transmission networks. Dynaflow controller can provide both
series and shunt compensation, so, it can be called as hybrid compensator. It
basically consists of a thyristor controlled phase shifting transformer (TCPST)
and thyristor switched series capacitor (TSSC). This paper presents the
equivalent circuit, the load flow model and the simple linear operation of the
dynaflow controller. The newton-raphson power flow integrates the Dynaflow
controller design and assesses various network parameters. The device's
efficiency is evaluated on the conventional IEEE 30 bus system and the load flow
analysis results are reported. |
Keywords: |
Flexible AC Transmission System (FACTS); Dynaflow Controller; Thyristor
Controlled Phase Shifting Transformer (TCPST); Thyristor Switched Series
Capacitor (TSSC); power flow analysis |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
«SQL-ATTACK RESEARCH AND PROTECTION» |
Author: |
ZHULDYZ TASHENOVA, ELMIRA NURLYBAEVA, AMANDOS TULEGULOV, ZHANAT ABDUGULOVA |
Abstract: |
The purpose of this article was based on research, identifying SQL attacks in
databases and demonstrating effective ways to protect against them. This article
provides a general explanation of SQL injection. In particular, we are talking
about the problem of injections, the importance of the threat of the attack and
the principles of the attack. The second chapter deals with the detection and
prevention of SQL attacks and the methods used at that time. In addition, it
also includes SQL attack analysis. Also discusses how SQL introduces the attack
and how it is implemented in practice, as well as how to defend against it. |
Keywords: |
SQL Attack, ,Security SQL Injection, DB, Protection |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
APPLICATION OF DECISION TREE ALGORITHM FOR PREDICTING STUDENTS’ PERFORMANCE VIA
ONLINE LEARNING DURING CORONAVIRUS PANDEMIC |
Author: |
HUSSAIN MOHAMMAD. ABU-DALBOUH |
Abstract: |
The novel coronavirus (SARS-CoV-2) pandemic has resulted in the worldwide
closure of educational institutions such as universities. Accordingly, teaching
in most countries now takes place remotely via digital platforms. As education
moves from conventional to online instruction, student performance is a key
concern for management because numerous factors could affect learning. This
study proposes to evaluate the attributes of distance learning that could affect
student performance and then adopt a classification algorithm to recommend
improvements to higher education organizations. The relevant educational data
for the algorithm were gathered in the 2020–2021 academic year from student
surveys in four classes at the College of Sciences and Arts at Qassim University
(Unaizah, Kingdom of Saudi Arabia). The data were then subjected to decision
tree analysis, which generated a model based on 66 classification rules. The
results of the present study showed that the model developed using data-mining
rule-based classifiers is efficient for predicting a student’s final course
grade. In order to evaluate the accurate of the correctly classified instances;
three different classification methods were tested, i.e., Bayes Net-D, naive
Bayes, and J48. As a percentage of the correctly identified cases using the
three separate algorithms, the overall accuracies of the evaluation results were
90.2439%, 87.8049% and 95.0617 % respectively. |
Keywords: |
Artificial Intelligence, Machine Learning, Classification; Learning; Algorithm,
Model; Education |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
THE EFFECT OF USER EXPERIENCE, BRAND IMAGE, AND TRUST ON PURCHASE DECISION
IN SOCIAL COMMERCE FACEBOOK |
Author: |
SABIQ ADZHANI HAMMAM, EMIL ROBERT K. |
Abstract: |
The purpose of this study was to determine the factors that effect purchasing
decisions on Social Commerce Facebook. First, whether user experience has a
significant effect, second is whether the brand image has a significant effect
and third is whether the trust has a significant effect on purchasing decisions.
The data source used in this research is primary data, namely data directly
sourced from respondents without any intermediaries, in this case, the answers
to the questions in the questionnaire distributed online. Primary data produced
in this study is the result of respondents' responses to the research variables
to be tested. Because the population object to be studied is very broad, the
researchers chose the cluster sampling technique. So the researchers decided to
use the slovin formula to determine the number of samples to be used. The
population size refers to the total number of Facebook users in the DKI Jakarta
area as of January 2018, amounting to 16 million users. From the above
calculations, a sample of 400 people was obtained, so to support this study the
number of respondents consisted of 400 respondents. Furthermore, in this study,
the data analysis used multiple regression analysis. This study shows that user
experience, brand image, and trust significantly influence the purchase decision
in social commerce Facebook. |
Keywords: |
Social Commerce, User Experience, Brand Image, Trust, Purchase Decision,
Facebook |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
A METHOD OF DESIGN OF NEURAL NETWORKS BUILT ON FPGA |
Author: |
A.V. KOVALEV, O.B. SPIRIDONOV, I.E. LYSENKO, 4O.A. EZHOVA |
Abstract: |
Artificial intelligence technologies are based on the use of neural networks. At
the same time, the actual issue is the implementation of neural networks on
various software and hardware platforms. In this paper, we consider an effective
method to design fully connected neural networks or convolutional neural
networks and to implement these networks on FPGAs using the Xilinx System
Generator for DSP and Matlab/Simulink package. The developed method is design of
neural networks using the Xilinx System Generator for DSP library imported into
the Matlab/Simulink environment and using the built-in MatlabC language to
generate a given ANN neural networks structure automatically. The artificial
neural networks designed according to this method are easily reconfigurable.
Also such neural networks allow solving the following tasks: image recognition,
optimal filtering. This method based on neural networks gives an opportunity to
improve recognition procedures of technical conditions of monitor and
diagnostics of complex objects. Also such methods could be a practical
alternative of strict mathematical methods to solve problems of identification
of objects of various types. Based on the results of the work, the following
conclusions can be done. Using developed method it is impossible to implement
even the input layer consisting of 6400 neurons (image 80x80). The structure of
the neuron could be parallelized the multiplication and accumulation operations
to speed up the work. At the same time the requirements to FPGA resources
increase. |
Keywords: |
Neural Networks, Integrated circuits, FPGA, Method, Xilinx, Simulink. |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
DESIGN OF AN INTEGRATED TELECOM SYSTEM FOR PERFORMANCE ENHANCEMENT ON SMART
SHIPS |
Author: |
JUNGWOO KIM, JOOYOUNG SON |
Abstract: |
Smart ship is a next-generation ship to improve ship operation efficiency and
management technology by utilizing big data-based information technology. It
will lead to the development of smart ships' remote control and autonomous
navigation. Currently, smart ships are equipped with various functions on a
differentiated platform to secure competitiveness for each shipyard. Smart ships
are expected to bring a lot of changes from the life cycle of ships, from
construction to the aftermarket to decommissioning. However, even though a lot
of time has passed since the emergence of smart ships, it is still at the level
of collecting and analyzing ship data. These factors include low data
reliability, unstable communication conditions, and invisible ship-to-shore
anxiety. The unstable communication state is analyzed as the biggest cause that
hinders the development of smart ships. The unstable communication conditions
between the ship and the land as well as on board the ship will transfer trust
and responsibility to each other, slowing the development of key functions of
smart ships such as real-time monitor and control. Therefore, in order to
improve the communication quality of the ship and further improve the
performance of the smart ship, the ship's telecom system must be improved and
integrated. An integrated telecom system will bring digitalization of smart
ships, breaking the boundaries between land and ships, speeding up the shift to
autonomous and unmanned vessels. This paper proposes a design method of an
integrated telecom system in smart ships and the performance was evaluated in a
field environment. |
Keywords: |
Smart ship, Integrated Telecom System, Data Communication Networks |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
DESIGN OF AN INTEGRATED TELECOM SYSTEM FOR PERFORMANCE ENHANCEMENT ON SMART
SHIPS |
Author: |
JUNGWOO KIM, JOOYOUNG SON |
Abstract: |
Smart ship is a next-generation ship to improve ship operation efficiency and
management technology by utilizing big data-based information technology. It
will lead to the development of smart ships' remote control and autonomous
navigation. Currently, smart ships are equipped with various functions on a
differentiated platform to secure competitiveness for each shipyard. Smart ships
are expected to bring a lot of changes from the life cycle of ships, from
construction to the aftermarket to decommissioning. However, even though a lot
of time has passed since the emergence of smart ships, it is still at the level
of collecting and analyzing ship data. These factors include low data
reliability, unstable communication conditions, and invisible ship-to-shore
anxiety. The unstable communication state is analyzed as the biggest cause that
hinders the development of smart ships. The unstable communication conditions
between the ship and the land as well as on board the ship will transfer trust
and responsibility to each other, slowing the development of key functions of
smart ships such as real-time monitor and control. Therefore, in order to
improve the communication quality of the ship and further improve the
performance of the smart ship, the ship's telecom system must be improved and
integrated. An integrated telecom system will bring digitalization of smart
ships, breaking the boundaries between land and ships, speeding up the shift to
autonomous and unmanned vessels. This paper proposes a design method of an
integrated telecom system in smart ships and the performance was evaluated in a
field environment. |
Keywords: |
Smart ship, Integrated Telecom System, Data Communication Networks |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
DYNAMIC TIME WARPING AND HIDDEN MARKOV MODEL CLASSIFIER IN TEXT DEPENDENT
SPEAKER VERIFICATION SYSTEM WITH DIFFERENT SPEAKING VARIANT |
Author: |
KEVIN KURNIAWAN, RAYMOND SAMUEL, BENFANO SOEWITO |
Abstract: |
One of the main focus on IoT is how to make the facility more secure in order to
increase the safety and convenience of the facility. While traditional
authentication approach for verifying identity such as Personal Identification
Number (PIN) or password is widely used, traditional authentication approach
have major flaws that can make the verified user lost access to the protected
resource or even pose a major security breach. Speaker verification is one of
the many biometric system solutions to solve that problem. In speaker
verification, a different speaking pattern and loudness of the voice may affect
the performance for the system to verify an individual identity, which a change
of speaker speaking pattern will occur very likely since a speaking pattern is
highly affected by the speaker’s mental and physical condition, and loudness of
the voice is affected by how far the speaker away from the microphone. In this
paper, we compare two well research text-dependent speaker verification methods,
dynamic time warping and hidden markov model, on verifying user’s identity on
different voice variant (loud, normal, quiet, shout, and soft) to replicate the
condition when the speaker is experiencing mental or physical conditions and the
distance between the speaker and the microphone that affects the loudness of the
voice and speaker speaking pattern. This paper uses 330 total train data and
1,600 total test voice data where every test voice data will be retested for
every registered user. Research done in this paper shows hidden markov model
achieved better accuracy on normal, shout, and soft voice variant by 2,6%, 0,5%,
and 0.74% respectively, whereas dynamic time warping achieves better accuracy on
loud and quiet voice variant by 2,79% and 2,3% respectively. |
Keywords: |
Speaker Verification, Text Dependent Speaker Verification, Hidden Markov Model,
Dynamic Time Warping |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
WIRELESS SENSOR NETWORKS: OPTIMAL ROUTING STRATEGY BY BLUETOOTH MESH LOW POWER
NODES USING ACO ALGORITHM |
Author: |
HUSSEIN ALMUSLEHI, AMRAN AHMAD, FIRAS M SALBI, ALAA JABBAR QASIM |
Abstract: |
As smart homes, factories, and farms developed, it has used sensors that
communicate with wireless signals such as Bluetooth mesh-low power node (M-LPN)
with the wireless sensor network (WSN) system, which causes them to be
interfered with by different signals coming from different sources, which causes
them not to function properly. The Bluetooth M-LPN is critical that enables the
wireless sensor network to function. t makes up the inter-node controller of a
WSN and collects information about nodes and sends commands to them on behalf of
the founder/client node. A mesh system uses each node as a sensor and repeater.
This means that each node must always listen for, relay, and route network
traffic. This most likely results in decreased battery life. This proposed takes
advantage of Bluetooth M-LPNWSN systems and algorithm-based efficient approach
by using label-based Ant Colony Optimization (ACO) in the clustering process for
allocating routing. Theoretical analysis and simulation results show that the
proposed algorithm has a better performance in terms of total routing length,
number of hops, and communication load when compared with the other existing
algorithms such as Artificial Neural Networks (ANNs) that were used with the
Bluetooth low energy system. |
Keywords: |
Bluetooth M-LPN; WSN; Bluetooth M-LPNWSN; ACO; ANN |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
ANALYSIS OF FACTORS AFFECTING USE BEHAVIORS OF WAREHOUSE BONDS APPLICATION IN
MERAK BANTEN |
Author: |
MUHAMMAD ARYA PRIASTAMA PUTRA, SFENRIANTO |
Abstract: |
Warehouse Bonds Application is an integrated system of all Bonded Place services
aimed at monitoring the entry and exit of goods in the customs area under the
supervision of Customs and Excise officers. Utilization of Information
Technology can provide implications for better performance of Information
technology at Bonded Places in Cilegon Merak City. Researchers use the Unified
Theory Of Acceptance And Use Of The Technology 2 (UTAUT2) model which is one of
the acceptance models of Information Technology User acceptance or better known
with the name user acceptance is an important factor that affects the successful
implementation of a technology. Primary data was obtained from distributing
questionnaires to 116 Bonded Place Application users in Cilegon Merak City. The
research data were analyzed using multiple linear regression analysis. In the
results of this study, habit factors have the most significant influence on the
use of bonded place applications, followed by facilitation conditions. The
Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model in this
study can explain the success of research on acceptance of information
technology at bonded places in Cilegon Merak City by 75.7%. |
Keywords: |
Bonded Place Application, Acceptance of Technology, UTAT 2 |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
INVESTIGATING THE SUCCESSFUL OF E-COMMERCE MARKETPLACE SYSTEM IN JABODETABEK TO
INCREASE CONSUMER ATTRACTIVENESS AND SATISFACTION OF USING THE SYSTEM |
Author: |
REFITO ILHAM, AHMAD NURUL FAJAR |
Abstract: |
Case study in Indonesia, has 238 million people with the fourth largest
developing country in the world with a total internet user of around 28.07
million people. The development of Information System Technology lately reflects
the development of online business, especially the e-Commerce market. During a
pandemic condition, most consumers choose to buy or sell a product online with
the help of e-Commerce information technology. In fact, e-Commerce provider must
keep up with the consumer needs by implementing the strategy which is related
between their business process and technology information that they used.
Provide an excellence services and reliable system at all times to compete with
other competitors in pandemic condition. To implement competitive strategies
during a pandemic, the formulation of the problem in this case is very necessary
to conduct an evaluation of a system that has been implemented with the aim of
knowing the effect of the attractiveness of using the e-Commerce application and
can maximize consumer satisfaction with the system provided they are required to
develop, better quality in terms of services, information or systems. Determine
what factors influence the use of E-commerce marketplace applications in order
to increase consumer satisfaction by adopting Information System Success Model
with 3 main quality in order to know and explain what dimensions affect the
successful implementation of a system. Data analysis method is tested by
structural equation model - partial least square using SmartPLS software. It has
collected 400 e-Commerce user respondents have transacted. The questionnaire is
distributed with google form through social media in the Jabodetabek area. The
model is suitable for the evaluation of the success of information systems, in
the e-Commerce sector in Indonesia. The result shows the dimensions to increase
the attractiveness of using the e-Commerce system are system quality,
information quality, and service quality. The findings also indicate to improve
user satisfaction with the system are influenced by system quality, service
quality, and trust. It could indicate an evaluation of the success of the system
to increase consumer attractiveness and satisfaction with an e-Commerce system
by paying attention to these variable factors. This study provides theoretical
findings to encourage business strategies in the field of e-Commerce, especially
during a pandemic and enhance the measuring information system success using
modified Information System Success Model that has never been done by other
researchers. |
Keywords: |
e-Commerce, DeLone & McLean, SEM-PLS, trust |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
A NEW METHODOLOGY FOR EFFICIENT FLOOD RISK MAPPING USING MACHINE LEARNING
TECHNIQUES |
Author: |
SWATI SHARMA, VINEET SHARMA |
Abstract: |
The flood is the cause of destruction for many places in the world. Flood
prediction is a complex method due to its nature. The flood arrives with vast
destruction in the society. The flood assessment is an essential task for the
government bodies to take measures at the right time. In this study, a new
procedure is designed to choose the best machine learning model for efficient
flood mapping using machine learning techniques. An automated algorithm is
created using a Decision Tree, Random Forest, Gradient Boosting Classifier, and
KNN techniques. The Random Forest Classifier gave the highest accuracy with
88.58% with this (the considered) dataset. For the evaluation of the model,
confusion matrix, learning curve, and classification reports are used. In this
study, Open Flood Risk by postcode dataset is used. |
Keywords: |
Flood Risk Mapping, Machine Learning, Decision Tree, Random Forest, KNN |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
CRISIS PHENOMENA AS AN INCENTIVE TO INTENSIFY E-COMMERCE OF THE ENTERPRISE |
Author: |
VALENTYNA PAVLOVA, TETIANA MUROVANA, NATALIIA SARAI, VIKTORIIA VELYCHKO,
KOSTYANTYN ILLYASHENKO, HANNA HRYSHYNA |
Abstract: |
The latest global crisis has negatively affected the global economy as a whole,
but it has had a stimulating effect on e-commerce. Electronic commerce around
the world has intensified with a breakthrough in sales and transactions. While
virtually the entire world has imposed restrictions to contain the spread of the
pandemic, Internet technology and e-commerce have helped many enterprises stay
afloat and the impetus for a massive transition to online. Today, global
digitalization allows you to make purchases without leaving your home. At the
same time, customers get a complete picture of the product using modern IT
technologies, such as AR & Video Consultations, Voice robots and Assistants,
make payments using new payment systems, and receive the goods as soon as
possible. At the same time, e-commerce faced several challenges. The article
examines the trends in the development of e-commerce in the world and the
correction of the share of e-commerce in total retail sales in connection with
the crisis. Changes in the structure of the e-commerce market of enterprises
under the influence of the crisis phenomena are noted. The article identifies
the main problems that e-commerce enterprises faced during the last global
crisis and the ways to solve them. Technological trends in the global
e-commerce market are noted, such as chatbots, blockchain, artificial
intelligence, mobile commerce, etc. The article also indicates the main trends
in the development of e-commerce under the influence of the crisis. These
tendencies are aimed at creating conditions that will quickly or even
automatically close the questions and doubts of the user regarding the purchase
of goods in the online store and at attracting the most "hot" visitors. The
surge in e-commerce due to the crisis has led to increased online businesses and
increased competition. Each salesperson fights for a customer, and searching for
solutions to win customers generates new trends in online sales. The article
highlights the following trends that are necessary to maintain positions in
e-commerce: process automation; focus on m-commerce; the use of voice assistants
and robots; the use of new different payment methods, including new ones;
organization of fast delivery, etc. |
Keywords: |
Chatbots, Crisis, Customer Data Platform, E-Commerce, Online Scam. |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
Title: |
BIG DATA TECHNOLOGY FOR VILLAGE STATUS CLASSIFICATION BASED ON VILLAGE INDEX
BUILDING INVOLVING K-MEANS ALGORITHM IN PROGRAMS TO SUPPORT THE WORK OF THE
MINISTRY OF THE VILLAGE |
Author: |
PASKA MARTO HASUGIAN, HARVEI DESMON HUTAHAEAN, BOSKER SINAGA, SRIADHI, SARONOM
SILABAN |
Abstract: |
The problem that is used as part of the research is village status data which is
only used and utilized in the current year and has been going on since 2014 so
that there is an accumulation of data in the database and no in-depth analysis
has been carried out to obtain information related to village status. This
research aims to analyze the village status group using the k-means algorithm
and provide the best cluster information using the Elbow Method by finding the
SSE (sum of squared-error) value by utilizing the cluster closest to the elbow
on the graph. The Ministry of Villages has described the method of solving
problems using secondary data through the website https://idm.kemendesa.go. Id/
followed by the application of the K-means algorithm and determining the best
cluster. The results obtained in the study are a comparison of sets from the
village ministry with cluster information provided by the K-Means algorithm,
namely the status of independent villages has increased by 761 villages,
developed villages from 202 experienced an increase in data of 1095 data,
growing villages with the K-Means algorithm decreased. With a difference of 1150
villages, underdeveloped villages decreased based on the K-Means Algorithm with
a difference of 1158, and very disadvantaged villages increased up to a
difference of 452. Testing with the Elbow Method provides information and offers
the best cluster for grouping village status. The number of groups is four
groups with an independent position, Forward, Develop, lag. |
Keywords: |
Status Village, K-Means, Elbow, SSE |
Source: |
Journal of Theoretical and Applied Information Technology
15th
October 2021 -- Vol. 99. No. 19 -- 2021 |
Full
Text |
|
|
|