|                                                                                 
                                                             
                                                  
                                                                     
          
                                                                                             
         
           |                
                                                                                             
                                                                                                                              
                                                     
| 
  
 Submit Paper / Call for Papers 
 
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).
  |                     
                                                                                             
                                 |  
  | 
	        
	
Journal of 
Theoretical and Applied Informtion Technology 
October 2021 | Vol. 99  
No.20 |  
 			
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
 ANALYSIS OF FACTORS THAT AFFECTING CUSTOMER LOYALTY ON NETFLIX APPLICATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
 DEVI PURI, AHMAD NURUL FAJAR |  
|  			
									
Abstract: | 
 			
									
 The main objective of this research is to view the factors that influences 
user's loyalty acceptation on Netflix streaming application by using the 
previous valid literature indicators based. The method being used in the data 
collection is questionnaire through Google Form media. All is being processed 
using Smart PLS 3. The result of this research shows that there is a direct 
significant influence between perceived ease of use on perceived usefulness and 
perceived usefulness is confirmed to effect on Satisfaction and Customer 
Loyalty, then Fairness factor is confirmed to significantly effects Trust and 
trust has effects on satisfaction and Customer Loyalty, Quality Dimensions, and 
Price also has direct significant influence on satisfaction and satisfaction has 
direct significant influence on customer loyalty. And for the specific value, 
the indirect effect of trust has an indirect role on customer loyalty through 
mediation role on perceived usefulness and satisfaction. |  
|  			
									
  										
			
Keywords:  | 
 			
									
 Netflix, Digital Video Streaming, Customer Loyalty, Purposive Sampling 
Technique. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MONITORING SYSTEM DESIGN BASED ON INTERNET OF THINGS (IOT) AT THE XYZ COMPANY 
DATA CENTER |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ADITIYA KELANA, DITDIT NUGERAHA UTAMA |  
|  			
									
Abstract: | 
 			
									
XYZ company is an engaged consumer electronics and mobile communications 
company. The use of information technology plays a significant role in this 
company to run business. Therefore, XYZ companies need to change the DC 
environment due to the utilization of information technology to adapt to the 
increasingly competitive competition. The new solutions are going to expect to 
benefit from a more efficient IT budget. Currently, there is a monitoring system 
on the DC that provides alerts in the form of indicators that are difficult to 
be accessed by PT XYZ because of the location is far from the DC; it is indeed 
challenging to analyze the cause of the server when experiencing downtime or 
failure. Monitoring is currently in the form of reports provided by DC service 
providers. Furthermore, this study aims to design a monitoring system using 
temperature, humidity, and voltage sensors on DC-based Internet of Things (IoT) 
to identify the air condition and energy consumption used for maximum server 
performance. The device used is a DHT11 sensor as a temperature and humidity 
sensor. The voltage sensor operated here is ZMPT101B, which serves to read 
voltage values, on the microcontroller side using Arduino that serves to process 
data read from the sensor. The entire process performed by IoT that is going to 
be sent by ethernet shield to the database server and visualized using Grafana 
as a monitoring dashboard. This study explains how IoT is able to measure the 
temperature, humidity, voltage, and availability service providers offer. The 
method used for availability measurement is AST to classify the DC tier used. 
The new solution expected that this research could be an input for companies in 
monitoring DC SLA offered by service providers to meet the company's needs. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Internet of Things, Data Center, Availability Service Time, Monitoring, 
Micro-Controler |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MODELLING AND SIMULATION OF SYMMETRICAL AND UNSYMMETRICAL FAULTS ON 14 BUS 
IEEE-POWER SYSTEMS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AGUS JUNAIDI, RAHMANIAR, RUDI SALMAN, JONI S. RAMBEY, ABD. HAMID K, BAHARUDDIN |  
|  			
									
Abstract: | 
 			
									
Short circuit disturbance in the electric power system, is the relationship 
between one voltage system and another directly connected system with a very 
small impedance. The direct connection results in the distribution of electric 
current at the fault point exceeding the nominal current. This situation has an 
impact on system instability, the system works in an unbalanced state and can 
damage equipment, if the disturbance is not neutralized (secured). The study of 
short circuit faults fundamentally consists of symmetrical faults and 
unsymmetrical faults (line to Ground Fault). In the simulation study, it is 
observed that three-phase symmetrical faults can be analyzed based on parametric 
data of the sub-switch reactance of the system, and one-phase asymmetrical 
faults to ground. Symmetrical fault analysis can be used as a reference in 
determining the breaker capacity, while for asymmetrical faults, L-G faults are 
implemented in determining the protection relay settings. The determination of 
the value of symmetrical and asymmetrical faults applies the analytical method 
of the Zbus model, carried out with system impedance data from the line diagram 
of the electric power system, then the system reactance data entry is carried 
out, then the symbolic notation of the connecting points is referred to as Bus. 
The number of buses will determine the number of orders of the bus impedance 
matrix (ZBUS). This ZBUS matrix becomes a reference in determining the value of 
short circuit impedance on each bus, by observing the diagonal of the ZBUS 
matrix. Calculations using the Matlab software tool, to determine the amount of 
fault current for each bus. From the data of 14 BUS-IEEE Power Systems, a trial 
was carried out for the fundamental study of the largest analysis results on 
buses 2, and from the characteristics of the comparison results, it can be seen 
that the value of the symmetrical fault current is greater than that of the 
non-symmetrical fault. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Symmetrical, Short Circuit, 14 Bus, Power Systems |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
GROUP DECISION SUPPORT SYSTEM MODEL TO DETERMINE PROSPECTIVE PARTICIPANTS FOR 
LECTURER STRENGTHENING ACTIVITIES |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
M. MIFTAKUL AMIN, YEVI DWITAYANTI |  
|  			
									
Abstract: | 
 			
									
Sriwijaya State Polytechnic is one of the state vocational universities in 
Indonesia which plays an important role in producing alumni with adequate 
expertise. Efforts are being made to achieve this goal through increasing the 
competence of lecturers in the Higher Education environment. The program is 
realized by carrying out lecturer strengthening activities which are divided 
into 5 activities, namely 1) assignment research, 2) assignment service, 3) 
workshops and training, 4) competency certification, and 5) industrial 
internship. This study aims to build a model group decision support system 
(GDSS) for management in universities to determine lecturers who will 
participate in lecturer strengthening activities. The method used is a 
combination of Multifactor Evaluation Process (MFEP) and Borda. The MFEP method 
is used to generate recommendations from each decision maker independently, 
while the Borda method is used to perform aggregation and final ranking of the 
recommended alternatives. In this built GDSS model, there are 8 criteria and 20 
alternatives involved in testing the proposed model. The results of this study 
can be used by management in universities in group decision making, and as a 
research model in group decision support systems. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Group Decision Support System (GDSS), Multifactor Evaluation Process (MFEP), 
Borda. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
VIDEO REPRESENTATION BASED ON OPTICAL FLOW FOR DYNAMIC CONTENT ANALYSIS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
NARRA DHANALAKSHMI, Y. MADHAVEE LATHA, AVULA DAMODARAM |  
|  			
									
Abstract: | 
 			
									
The efficient organization of multimedia databases challenges content -based 
representation to retrieve the video of interest. This paper aims to represent 
given video by considering its dynamic content through the analysis of optical 
flow. It is tended to have video segmented into overlapped sequence of frames 
based on gray content similarity. This step can facilitate analysis of complex 
video into elementary scenes. The principle involved in representing the content 
of video is considering the spatial movement of video content across the frames. 
The algorithm is designed to find the dynamic content by observing all levels of 
motion in the video through pyramid generation. Then, an optical flow is derived 
in terms of spatial and temporal information of motion regions. The histogram 
representation is created with both the rank and orientation of the optical 
flow. This kind of methodology contributes to efficient representation which 
enhances effective content analysis to improve the efficiency of further stages. 
The videos of You Tube 8M and UCF Sports data sets have used to evaluate the 
algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Temporal video segmentation, Gaussian Pyramid, Optical flow, Normalized 
Histogram Intersection Similarity, Video Representation  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DUAL LINEAR POLARIZATION RECONFIGURABLE PATCH ANTENNAS FOR LOWER 5G FREQUENCY 
BAND |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ABDELLAH ATTALHAOUI, ABDELHAK BENDALI, ABID-REDA El WARDI, MOHAMED HABIBI |  
|  			
									
Abstract: | 
 			
									
Linear polarization reconfigurable patch antennas for 5G application are 
presented in this paper. The first type is U-shaped antenna which has been 
proposed and analyzed and can switch among two symmetric polarizations. The 
second type is Y-shaped antenna which has been analyzed and can switch among two 
orthogonal polarizations. The two types of antennas can generate the 
polarization diversity without affecting the other performances such as the 
radiation pattern and the frequency. These types of antennas are required for 
wireless communication systems because they can avoid the fading loss and 
increase the channel capacity. To achieve the linear polarization 
reconfigurability, two diodes are integrated into microstrip feed. For both 
states of operation of antennas, the resonant frequency was determined to be 
between (3.4–3.6) GHz. The simulated results of reflection coefficient and gain 
are carried out using HFSS (high frequency structural simulator) and CST 
(computer simulation technology) software. The operation frequency, the simple 
structure, and good gain make these antennas good candidates for 5G 
communication. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Polarization Reconfigurable Patch Antenna, U-Shaped Antenna, Y-Shaped Antenna, 
HFSS, CST  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CCLRSP - A COLLABORATIVE CROSS LAYER ROUTE SELECTION PROTOCOL FOR LOW-POWER 
LOSSY WIRELESS NETWORKS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
B. UMARANI, A. R. NASEER |  
|  			
									
Abstract: | 
 			
									
Route selection in low-power lossy networks (LLN) is a challenging task due to 
the constrained nature of wireless devices. With the LLN providing the 
underlying network for several IoT applications, which require devices with high 
network activity, energy efficiency becomes more crucial in comparison to 
typical wireless sensor networks (WSNs). Also, most of the works in this 
direction that are based on cross-layer designs only rely on either physical 
layer or medium access control (MAC) sub-layer optimizations to select routes. 
The majority of the contributions identified with Cross Layer Design that depend 
on just physical layer grandstand where by changing the transmitting power, the 
energy devoured by the nodes can be upgraded. Additionally, the works that 
depend on just MAC sub-layer can only target on the issues like contention, 
impacts with least yields towards the collective advantages. In this work, a 
novel attempt is made to achieve the collaborative benefits of the node and as 
well as the network. In this paper, we initially show that considering both 
physical and MAC layer properties can benefit the route selection process by 
lowering the individual devices’ energy and also the overall network lifetime. 
Then, we propose a collaborative cross-layer route selection protocol - CCLRSP 
that relies on physical layer and MAC layer properties to choose a low-cost 
route. At the physical layer, we employ the adaptive and robust topology control 
mechanism (ART) that is based on determining the optimal transmission power for 
a transmitter to reach the next-hop neighbor. At the MAC level, the physical 
layer findings are cross verified to minimize the contention and interference 
through the expected transmission count. The proposed protocol combines the 
parameters from these two layers to select an energy efficient route that 
employs a balanced approach to prevent few network nodes from draining energy 
quickly by load-balancing. The proposed protocol is evaluated using extensive 
simulations and is shown to perform better than existing works.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Low-Power Lossy Networks, Cross-layer Design, Cross Layer Route Selection, PHY & 
MAC Layers, Wireless Sensor Networks, Internet of Things, |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
PIRACY IN UNIVERSITY: FACTORS ASSOCIATED WITH DIGITAL PIRACY AMONG MULTIMEDIA 
STUDENTS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DING CHIU SIN, SYARULNAZIAH ANAWAR, ZAKIAH AYOP, ASLINDA HASSAN, NUR FADZILAH 
OTHMAN, NOR RAIHANA MOHD ALI |  
|  			
									
Abstract: | 
 			
									
Internet is especially important during the Covid-19 pandemic, where there is 
wide adoption of an online learning platform for teaching and learning. Students 
always utilize the Internet in many ways to meet their academic needs. 
Therefore, considerable attention has been given to the problem of digital 
piracy behavior among university students. This study aims to investigate the 
factors to be considered as part of digital piracy behavior among multimedia 
students. Guided by a theoretical perspective from Deterrence Theory, Ethics 
Theory, and Neutralization Theory, this study adopted a quantitative methodology 
where data from a survey (N=200) of multimedia students in public and private 
universities in Malaysia is analyzed. This study proposed a model that offers 
understandings of the contributing factors that may influence digital piracy 
behavior among multimedia students. Based on the findings, this study concluded 
that fear of legal consequences has the highest influence on digital piracy 
behavior, followed by perceived likelihood of punishment and neutralization 
techniques. This study may benefit other researchers attempting to understand 
multimedia students' standpoints on digital piracy behavior and increase user 
awareness in the computer ethics research area. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Digital Piracy, Intellectual Property, Computer Ethics |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
AN EFFICIENT APPROACH TO DETECT AUTISM IN CHILD USING MACHINE LEARNING AND DEEP 
LEARNING |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
T. AMALRAJ VICTOIRE, A. RAMALINGAM, A. NARESH, K.M NASIMUDEEN, M S JAYA KUMAR |  
|  			
									
Abstract: | 
 			
									
Autism spectrum disorder (ASD) is growing among children. Detecting of autism 
through screening test is very time consuming and cost effective. Unfortunately 
there is no proper method to heal autism. Autism spectrum disorders (ASD) are 
complex neuro-development disorders that include shortage in interaction with 
social, communication, and the existence of duplicative and restricted 
behaviours. The symptoms are generally identified in children’s aging less than 
three years and have to be amid impairment in cognitive functioning, learning, 
attention, and sensory processing. Autism Spectrum Disorder (ASD) is a 
neuro-developmental disorder that has become one of the major health problems 
and for controlling the disease early diagnosis is very much important. The 
increase within the number of autoimmune influenza and ASD cases within the 
world reveals an urgent got to develop easily applied and effective screening 
methods. But if it is detected earlier, we can motivate them to move socially 
and decrease the level of autism in them. So, we detect autism using machine 
learning and deep learning techniques to find the symptom in earlier stages. A 
coherent iterative algorithm is designed and the proof of convergence is given. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Machine Learning, Autism Spectrum Disorder, Deep Learning. |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
MULTIDIMENSIONAL INSIDER THREAT DETECTION MODEL FOR ORGANIZATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
GANTHAN NARAYANA SAMY, NURAZEAN MAAROP, BHARANIDHARAN SHANMUGAM, MUGILRAJ 
RADHAKRISHNAN, SUNDRESAN PERUMAL, FIZA ABDUL RAHIM |  
|  			
									
Abstract: | 
 			
									
Insider threat is a most worrying threat that haunts many organizations today 
that cause enormous financial losses and damages. As a frontline, Information 
Technology (IT) organizations has to implement necessary countermeasures to 
protect critical infrastructure. Although, many approaches proposed before to 
detect and mitigate insider threat, significant rise of cases in past few years 
and unavailability of a widely accepted solution paves way to conduct more 
researches. Moreover, the pandemic situation has brought in a new challenge for 
IT organizations to review the existing safeguards. This paper aims to 
contribute an interdisciplinary approach at proposing a multidimensional model 
that scrutinize factors from multiple dimensions such as psychological, 
behavioral, technological, organizational and environmental dimension that 
triggers insider threat. The constructed model coordinates organizations to 
counter insider threat by addressing issues in more effective and efficient way 
by applying the multidimensional approach for mitigation.  |  
|  			
									
  										
			
Keywords:  | 
 			
									
Insider Threat, Psychological Dimension, Behavioral Dimension, Technological 
Dimension, Organizational Dimension, Environmental Dimension |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CONSTRUCTING THE NOVELTY OF SME COLLABORATION PARAMETER IN GAMIFICATION BASED ON 
“SILATURRAHMI” CULTURE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
FITRI MARISA, SHARIFAH SAKINAH SYED AHMAD, ZERATUL IZZAH MOHD YUSOH, MARDIANA 
ANDARWATI, NOVI DIAN NATHASIA, CHAULIAH FATMA PUTRI |  
|  			
									
Abstract: | 
 			
									
Collaboration is one of the essential strategies to maintain Small Medium 
Enterprise (SME) in facing the global market. However, there has been no agreed 
formulation of a collaboration model as a benchmark in previous studies, 
including the parameters used to measure collaboration performance. Weak 
motivation to collaborate is also an actual problem faced by SMEs. On the one 
hand, culture is one of the roots of individual thought and behavior as an 
essential aspect that influences the behavior of SME actors in running their 
business. Therefore, a culture-based SME collaboration model is proposed in the 
gamification platform to present a more adaptive model and increase 
collaboration motivation. This research is focused on building novelty 
parameters to measure collaboration performance as the primary basis for 
realizing collaboration gamification models. Based on the literature review, 
there are four principles of "silaturrahmi" culture that have similar 
characteristics with collaboration, including Relationship Building (X1), 
Reciprocal Sustainment (X2), Reciprocal Assistant (X3), and Active Support (X4). 
The test was started by collecting questionnaire data from 63 respondents who 
were the movers of SMEs. The theme of the question is about the influence of the 
four principles of silaturrahmi on collaboration. Data analysis was carried out 
using the linear regression method and all test requirements (validity, 
reliability, normality, linearity, heteroscedasticity) to measure the influence 
of the four principles of "silaturrahmi" (Variable X1, X2, X2, X4) on 
collaboration (Variable Y). The results show that four variables have met all 
test requirements for linear regression analysis, resulting in a significance 
value (sig.) < 0.05, t value > t table, the value of the regression coefficient 
(B) is positive. It means that the four variables have a positive effect on 
collaboration because all hypotheses are accepted. The four can be a parameter 
to measure collaboration performance with the proportion of the role of each 
variable that can be considered from the R-Square value. Thus, these four 
parameters can be used as the primary basis for building a collaboration 
gamification model as a reference for measuring collaboration. To implement the 
four parameters, they were included in the collaborative gamification mechanics 
material. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Collaboration Parameters, Silaturrahmi Culture, Collaboration Gamification, SME |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DYNAMIC RECOMMENDATION BASED ON USERS' LONG-TERM AND SHORT-TERM PREFERENCES AND 
SOCIAL IMPACT |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
LI FEI DA, YIN SI ZHE, HAN SONG HE, LIU YU JING, SUN HAO |  
|  			
									
Abstract: | 
 			
									
Aiming at the irrationality of existing social recommendation algorithms, such 
as not fully mining the preference correlation between users and not fully 
considering the dynamic change of user preferences in time, this paper proposes 
a dynamic recommendation algorithm based on user long-term and short-term 
preferences and social influence. From the dynamic change of user preferences 
and the social relationship of users, the improved gating cycle unit is used to 
model the user rating information and extract the long-term and short-term 
preference features; According to the user correlation matrix, the social impact 
of learning target users is expressed. Experiments on two real datasets show 
that the proposed algorithm is better than the comparison algorithm. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Social Recommendation, Preference Learning, Collaborative Filtering, GRU, 
Recommendation Algorithm |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ANALYSIS AND DESIGN OF VOICE ASSISTANT FOR INDONESIAN BANKING TRANSACTION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
DYAH YUNIATI, RIYANTO JAYADI |  
|  			
									
Abstract: | 
 			
									
The number of FinTechs in Indonesia requires banks to have the right strategy to 
attract new customers and retain their customers. Therefore, banks are competing 
to create more innovative products and services than their competitors. Several 
banks in developed countries such as U.S. Bank, Barclays U.K. and OCBC Singapore 
have innovated by implementing voice assistants for financial transactions so 
that customers can transact anytime and anywhere easily. However, no banks in 
Indonesia provide voice assistant services for financial transactions such as 
transfers and bill payments. Even studies on this feature have never been 
conducted in Indonesia. Therefore, this study analyzes the feasibility of 
developing voice assistants for banking financial transactions in Indonesia 
using the PESTLE framework. The authors then propose a service model and 
application design by adapting the Design Science Research (DSR) methodology. 
The study results provide a service model that includes checking balances and 
recent transaction history, adding bank contact, checking the amount of credit 
card bills, internal bank transfers, interbank transfers, e-wallet top-ups and 
bill payments. The study results also found three challenges that will be faced 
by the Bank in implementing voice assistant services. Those are determining the 
most secure authentication system, the level of accuracy of voice assistants in 
capturing user voice commands that need to be tested and education to customers 
that is accurate, clear, and transparent. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Bank, Banking Transaction, Dialogflow, Pestle Analysis, Voice Assistant |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
NEW CROSSOVER VIA HYBRID ANT COLONY SYSTEM WITH GENETIC ALGORITHM AND MAKING 
STUDY OF DIFFERENT CROSSOVER FOR TSP |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ASMAA HEKAL OMAR, AMANY AHMED NAIM |  
|  			
									
Abstract: | 
 			
									
The traveling salesman problem (TSP) is a very famous NP-hard problem in 
computer science and operations research. In this study, proposed a new hybrid 
crossover (SPMX) combining the shuffle crossover and partially mapping crossover 
which served to develop Genetic algorithm (GA) to solve this problem since 
crossover is the main component of GA. And, apply the proposed SPMX on hybrid 
ant colony system with GA with Ant colony system (ACS), which called by (ACSGA) 
to solve TSP. Experimental results on some well-known TSPLIB instances of 
different types and sizes. The obtained comparative study clearly demonstrates 
the utility of the proposed a (SPMX) to enhance ACSGA for resolving TSP and the 
distance decrease by 0.82% with average 0.47%. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Travelling Salesman Problem (TSP), Genetic Algorithm (GA), Crossover Operators, 
Ant Colony System (ACS)  |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
CURRICULUM MANAGEMENT INFORMATION SYSTEM DESIGN IN EARLY CHILDHOOD EDUCATION |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
EDI WALUYO, DIANA, DESTY CITRA SARI, NURUL AIDA LESTARI |  
|  			
									
Abstract: | 
 			
									
This article aimed to examine and develop a curriculum management information 
system design to provide convenience for principals and teachers in curriculum 
development. This study used a qualitative design to find new relationships to 
problems in the early development of curriculum management information system 
design. The research subjects were the principal and teachers in the ECE Lab 
school UNNES institution. Data collection techniques were carried out through 
focus group discussions (FGD) and questionnaires. Based on the research data, an 
initial model of the curriculum management information system design was 
obtained which could provide systematic steps for planning and organizing. 
Furthermore, based on the questionnaire, it was found that the design of the 
management information system was practical and received a good response from 
the respondents. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Design, MIS, Curriculum, ECE |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
A SYSTEMATIC LITERATURE REVIEW OF AUTOMATIC KEYWORD EXTRACTION ALGORITHMS: 
TEXTRANK AND RAKE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
MANAR YAHYA , DERAR ELEYAN , AMNA ELEYAN |  
|  			
									
Abstract: | 
 			
									
There are various techniques available in text mining for text summarization 
which will provide the concise meaningful text from the original text document. 
Keywords give the summary of the text and help to understand the information 
described in the text document. Traditional approaches to extract useful 
Keywords from a text depends on human effort heavily, and because of the 
difficult manual extraction and consuming much time, the Automatic Keyword 
Extraction algorithm has been used to extract a keyword efficiently that reduces 
the scope for human errors and saves time. TextRank and RAKE are approaches 
based on unsupervised techniques to extract the keywords from the text. This 
research systematically identifies peer-reviewed literature that discusses to 
utilize TextRank and RAKE algorithms for automatic keyword extraction from texts 
and presents a comparison between these keyword extraction approaches. Also, 
this systematic review presents the latest applications which use keyword 
extraction approaches. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Text Summarization, Automatic Keyword Extraction, TextRank, RAKE, Unsupervised 
Approach |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
THE MYTH OF WOMEN'S HEALTHY LIFE AS THE PERSONIFICATION OF HEALTH PRODUCTS IN 
WEB SERIES ADS ON YOU TUBE |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
AHMAD MULYANA, MUHAMAD ARAS, RAMANOV BAREZKI |  
|  			
									
Abstract: | 
 			
									
In the era of social media, advertisements generally create messages in a 
dramatized format, long duration and serial. With the strategy of wanting to 
build the involvement of netizens as consumers. Unfortunately, the message 
created often leads to manipulating the message when highlighting the advantages 
of the advertised product. Like the Stevia Sweetener ad on YouTube which 
visualizes the superiority of the product through the personification of the 
role of women in the domestic sphere. This study analyzes how the myth of women 
is manipulated by involving consumers to form product awareness. The concept of 
media strategy and advertising creative strategy is the reference in this 
research. The analysis was carried out using the semiotic analysis method of 
Roland Barthes, where through denotative and connotative analysis, the meaning 
of the myth was carried out. The results of the Stevia Tropicana Slim product 
advertisement show that there is an affirmation of the values of the role of 
women who are shackled in a culture that places women's roles in the domestic 
sphere. Personification here presents two sides of meaning: (1) women are shown 
to be dominant in their role as wives who regulate husbands to live healthy 
lives; (2) On the other hand, mythically, advertising actually strengthens 
women's shackles in domestic affairs. The analysis also finds the myth that 
advertising represents cultural values of patriarchal ideology. The 
representation found that what appeared in the SORE Web Series advertisement on 
YouTube represented gender ideology to support product marketing. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Semiotics, Myth Woman, Advertising, Personification |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
 DYNAMIC MAP PATHFINDING USING HIERARCHICAL PATHFINDING THETA STAR 
ALGORITHM |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
IRFAN DARWIN, SURYADIPUTRA LIAWATIMENA |  
|  			
									
Abstract: | 
 			
									
Theta Star is an efficient algorithm that can be used to find an optimal path in 
a map with better performance compared to the A-Star algorithm. Combining the 
Theta Star with Hierarchical Pathfinding further enhances its performance by 
abstracting a large map into several clusters. What this combination lacks are 
the capability to handle a dynamic element in the map. Without that capability, 
the agent could potentially collide with elements in the map that is undesirable 
in certain conditions, while adding that capability might reduce the pathfinding 
algorithm's performance. The proposed algorithm aims to provide the capability 
to handle dynamic elements without severe negative impact on the performance of 
the algorithm. The effectiveness of the proposed algorithm is verified in terms 
of execution time, number of nodes explored, final path length, and the number 
of collisions that occurred. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Artificial Intelligence, Dynamic Map, Grid-Based, Hierarchical Pathfinding, 
Theta Star |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
ASSOCIATION ANALYSIS ON JOB VACANCY CRITERIA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
ALBERT HENDERSON, IMAN HERWIDIANA KARTOWISASTRO |  
|  			
									
Abstract: | 
 			
									
IT Based job openings have a various criterion of needed skills. University 
graduates are required to fulfill the industry needed. The purpose of this work 
is to help improve university’s graduate awareness about criteria mostly need by 
industries. By using association analysis and utilizing existing job openings 
data are expected to find any association in the several vacancy group with the 
expected skills by the industry. The technique will be used is association 
analysis. The process is carried out in four major steps, consist of Data 
Collection, Pre-Processing Data, Text Processing, and Association Analysis. 
Produced rules grouped into four, based on support and lift value. Result of 
this work shows that only criteria from IT/MIS-Quality Assurance (2016), 
IT/MIS-Administrator (2017), Engineering-Computer, IT/MIS-Multimedia Designer, 
IT/MIS-Product Management, IT/MIS-Technical Support (2018), and IT/MIS-Technical 
/ Functional Consultancy (2019) that qualified as mostly appear criteria also 
often appear together. With the discovered knowledge of this work, related 
students and university faculties can obtain information in a better way from 
existing job openings and can fulfill the industry terms and needs based on the 
needed criteria. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Association Analysis, Association Rule, Data Mining, Job Vacancy |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
DESKTOP APPLICATION DEVELOPMENT FOR IMPLEMENTING MERGE SORT ALGORITHM ON 
DISTRIBUTED SYSTEM TO SORTING NUMBERS |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
HANDRIZAL, SRI MELVANI HARDI, WINTO JUNIOR KHOSASIH |  
|  			
									
Abstract: | 
 			
									
A long way back to 2008, the google infrastructure team reported that the google 
data center handles around 20 Petabytes per day with an average of 100.000 
MapReduce jobs spread across its massive computing cluster with standard machine 
cluster node setup costs approximately $2400 each. According to how google 
handles things we can conclude even high-performance computers could have 
difficulties in processing large data, and even not all agencies could afford 
this kind of setup. Sorting is any process of arranging an item according to a 
rule with two common, yet ascending (ordering from smallest to largest item) or 
descending (ordering from largest to smallest item). Sorting is very important 
for indexing an item to ease searching the item by the system, human, or 
algorithm. There are many sorting algorithms with time complexity O(N log N) for 
sorting n items one of them is merge sort. Based on google’s case, computing 
performance could be increased by dividing tasks to another node in the cluster 
computing environment, with this similar approach we could increase the 
performance of the merge sort algorithm. Merge sort algorithm based on divide 
and conquer technique that eases converting sequential process to parallel 
process with dividing it to another computer processor in divide phase. Using 
this similar dividing approach the system will divide the process into several 
hosts separated physically in cluster computing by utilizing java RMI as 
middleware. A research test was conducted using 4 computers hosted for 
distributed merge sort computing as well as a comparative computer for parallel 
merge sort computing. The system was tested on two and four-processor usage of 
parallel merge sort and four hosts to three hosts configuration with two 
processors and four processors for distributed merge sort, respectively. 
Performance is measured by comparing computation time of distributed merge sort 
and parallel merge sort. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Distributed MergeSort, High-Performance Computing MergeSort, Distributed System, 
MergeSort Algorithm, Parallel MergeSort, Java RMI, number sorting, Distributed 
MergeSort VS Parallel MergeSort, Cluster computing, Computer Network |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
|  									
				
  									
				
 								
					 	
	Title:  | 
 									
			 
USERS PERCEPTIONS AND ONLINE EDUCATION ACCEPTANCE IN THE NEW NORMAL AT IMAM 
MOHAMMAD IBN SAUD ISLAMIC UNIVERSITY (IMSIU), SAUDI ARABIA |  
|  			
									
  										
			
 								
					
Author:  | 
 			
									
BILAL AHMAD ALI AL-KHATEEB |  
|  			
									
Abstract: | 
 			
									
Research on Information Technology has demonstrated that IT is an indispensable 
tool for achieving better and effective education among others, as it provides 
both educators and learners with easy-to-access information, accelerated 
learning, and makes people to gain 21st-century technical skills necessary for 
future occupations etc. however, research on IT is still ongoing, giving room 
for more contributions. One aspect of IT cutting the attention of researchers in 
the recent times is online education. It is in-thing in this present era 
particularly with the current situation of Covid-19 pandemic which brought about 
some changes in the way education is being conducted in terms of teaching and 
learning among teachers and students. Although, online education is gaining more 
popularity day by day, however, its acceptance among different categories of 
users is a major issue of concerned which has resulted to several divergent 
views and findings. Unfortunately, majority of the effort is concentrated on one 
user particularly between the teachers and the students. It is critical to know 
that both academic staff and students are indispensable when you talk about 
online education and therefore should be included in any research of this nature 
for better insight. This deficiency provided the present study the opportunity 
to investigate the user’s perceptions and online education acceptance. Thus, the 
study investigates user’s perceptions and online education acceptance in the new 
normal at Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia. It 
adopted a survey research design while the population covered all the lecturers 
and teachers in Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia. 
Of all the copies of questionnaires sent out to the respondents, only 218 
returned filled. The returned questionnaires were analysed using STATA version 
13 statistical tool. The finding revealed that User’s perception is generally a 
significant predictor of Online Education Acceptance with F(1,214)=94.40, 
p>0.001; Prob. > F =0.0000. Additionally, it revealed that user’s perception 
also affect Perceived Usefulness (PU), Perceived Ease-of-Use (PEOU) and 
Attitudes towards Usage (ATU). The conclusion based on the finding is that 
user’s perception significantly affects how users accept or reject online 
education among the respondents. The study offered several implications. |  
|  			
									
  										
			
Keywords:  | 
 			
									
Users, Perception, Online, Education, Teaching, Learning, Acceptance |  
|  									
			
  									
			
 								
					
Source:  | 
 									
			
 Journal of Theoretical and Applied Information Technology 
31st 
October 2021 -- Vol. 99.  No. 20 -- 2021  |  
	
|  									
			
 Full 
Text | 
	 
 		
										
  						
							 |    		
							
  		
							
 |     	 
 |