|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Informtion Technology
October 2021 | Vol. 99
No.20 |
Title: |
ANALYSIS OF FACTORS THAT AFFECTING CUSTOMER LOYALTY ON NETFLIX APPLICATION |
Author: |
DEVI PURI, AHMAD NURUL FAJAR |
Abstract: |
The main objective of this research is to view the factors that influences
user's loyalty acceptation on Netflix streaming application by using the
previous valid literature indicators based. The method being used in the data
collection is questionnaire through Google Form media. All is being processed
using Smart PLS 3. The result of this research shows that there is a direct
significant influence between perceived ease of use on perceived usefulness and
perceived usefulness is confirmed to effect on Satisfaction and Customer
Loyalty, then Fairness factor is confirmed to significantly effects Trust and
trust has effects on satisfaction and Customer Loyalty, Quality Dimensions, and
Price also has direct significant influence on satisfaction and satisfaction has
direct significant influence on customer loyalty. And for the specific value,
the indirect effect of trust has an indirect role on customer loyalty through
mediation role on perceived usefulness and satisfaction. |
Keywords: |
Netflix, Digital Video Streaming, Customer Loyalty, Purposive Sampling
Technique. |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
MONITORING SYSTEM DESIGN BASED ON INTERNET OF THINGS (IOT) AT THE XYZ COMPANY
DATA CENTER |
Author: |
ADITIYA KELANA, DITDIT NUGERAHA UTAMA |
Abstract: |
XYZ company is an engaged consumer electronics and mobile communications
company. The use of information technology plays a significant role in this
company to run business. Therefore, XYZ companies need to change the DC
environment due to the utilization of information technology to adapt to the
increasingly competitive competition. The new solutions are going to expect to
benefit from a more efficient IT budget. Currently, there is a monitoring system
on the DC that provides alerts in the form of indicators that are difficult to
be accessed by PT XYZ because of the location is far from the DC; it is indeed
challenging to analyze the cause of the server when experiencing downtime or
failure. Monitoring is currently in the form of reports provided by DC service
providers. Furthermore, this study aims to design a monitoring system using
temperature, humidity, and voltage sensors on DC-based Internet of Things (IoT)
to identify the air condition and energy consumption used for maximum server
performance. The device used is a DHT11 sensor as a temperature and humidity
sensor. The voltage sensor operated here is ZMPT101B, which serves to read
voltage values, on the microcontroller side using Arduino that serves to process
data read from the sensor. The entire process performed by IoT that is going to
be sent by ethernet shield to the database server and visualized using Grafana
as a monitoring dashboard. This study explains how IoT is able to measure the
temperature, humidity, voltage, and availability service providers offer. The
method used for availability measurement is AST to classify the DC tier used.
The new solution expected that this research could be an input for companies in
monitoring DC SLA offered by service providers to meet the company's needs. |
Keywords: |
Internet of Things, Data Center, Availability Service Time, Monitoring,
Micro-Controler |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
MODELLING AND SIMULATION OF SYMMETRICAL AND UNSYMMETRICAL FAULTS ON 14 BUS
IEEE-POWER SYSTEMS |
Author: |
AGUS JUNAIDI, RAHMANIAR, RUDI SALMAN, JONI S. RAMBEY, ABD. HAMID K, BAHARUDDIN |
Abstract: |
Short circuit disturbance in the electric power system, is the relationship
between one voltage system and another directly connected system with a very
small impedance. The direct connection results in the distribution of electric
current at the fault point exceeding the nominal current. This situation has an
impact on system instability, the system works in an unbalanced state and can
damage equipment, if the disturbance is not neutralized (secured). The study of
short circuit faults fundamentally consists of symmetrical faults and
unsymmetrical faults (line to Ground Fault). In the simulation study, it is
observed that three-phase symmetrical faults can be analyzed based on parametric
data of the sub-switch reactance of the system, and one-phase asymmetrical
faults to ground. Symmetrical fault analysis can be used as a reference in
determining the breaker capacity, while for asymmetrical faults, L-G faults are
implemented in determining the protection relay settings. The determination of
the value of symmetrical and asymmetrical faults applies the analytical method
of the Zbus model, carried out with system impedance data from the line diagram
of the electric power system, then the system reactance data entry is carried
out, then the symbolic notation of the connecting points is referred to as Bus.
The number of buses will determine the number of orders of the bus impedance
matrix (ZBUS). This ZBUS matrix becomes a reference in determining the value of
short circuit impedance on each bus, by observing the diagonal of the ZBUS
matrix. Calculations using the Matlab software tool, to determine the amount of
fault current for each bus. From the data of 14 BUS-IEEE Power Systems, a trial
was carried out for the fundamental study of the largest analysis results on
buses 2, and from the characteristics of the comparison results, it can be seen
that the value of the symmetrical fault current is greater than that of the
non-symmetrical fault. |
Keywords: |
Symmetrical, Short Circuit, 14 Bus, Power Systems |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
GROUP DECISION SUPPORT SYSTEM MODEL TO DETERMINE PROSPECTIVE PARTICIPANTS FOR
LECTURER STRENGTHENING ACTIVITIES |
Author: |
M. MIFTAKUL AMIN, YEVI DWITAYANTI |
Abstract: |
Sriwijaya State Polytechnic is one of the state vocational universities in
Indonesia which plays an important role in producing alumni with adequate
expertise. Efforts are being made to achieve this goal through increasing the
competence of lecturers in the Higher Education environment. The program is
realized by carrying out lecturer strengthening activities which are divided
into 5 activities, namely 1) assignment research, 2) assignment service, 3)
workshops and training, 4) competency certification, and 5) industrial
internship. This study aims to build a model group decision support system
(GDSS) for management in universities to determine lecturers who will
participate in lecturer strengthening activities. The method used is a
combination of Multifactor Evaluation Process (MFEP) and Borda. The MFEP method
is used to generate recommendations from each decision maker independently,
while the Borda method is used to perform aggregation and final ranking of the
recommended alternatives. In this built GDSS model, there are 8 criteria and 20
alternatives involved in testing the proposed model. The results of this study
can be used by management in universities in group decision making, and as a
research model in group decision support systems. |
Keywords: |
Group Decision Support System (GDSS), Multifactor Evaluation Process (MFEP),
Borda. |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
VIDEO REPRESENTATION BASED ON OPTICAL FLOW FOR DYNAMIC CONTENT ANALYSIS |
Author: |
NARRA DHANALAKSHMI, Y. MADHAVEE LATHA, AVULA DAMODARAM |
Abstract: |
The efficient organization of multimedia databases challenges content -based
representation to retrieve the video of interest. This paper aims to represent
given video by considering its dynamic content through the analysis of optical
flow. It is tended to have video segmented into overlapped sequence of frames
based on gray content similarity. This step can facilitate analysis of complex
video into elementary scenes. The principle involved in representing the content
of video is considering the spatial movement of video content across the frames.
The algorithm is designed to find the dynamic content by observing all levels of
motion in the video through pyramid generation. Then, an optical flow is derived
in terms of spatial and temporal information of motion regions. The histogram
representation is created with both the rank and orientation of the optical
flow. This kind of methodology contributes to efficient representation which
enhances effective content analysis to improve the efficiency of further stages.
The videos of You Tube 8M and UCF Sports data sets have used to evaluate the
algorithm. |
Keywords: |
Temporal video segmentation, Gaussian Pyramid, Optical flow, Normalized
Histogram Intersection Similarity, Video Representation |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
DUAL LINEAR POLARIZATION RECONFIGURABLE PATCH ANTENNAS FOR LOWER 5G FREQUENCY
BAND |
Author: |
ABDELLAH ATTALHAOUI, ABDELHAK BENDALI, ABID-REDA El WARDI, MOHAMED HABIBI |
Abstract: |
Linear polarization reconfigurable patch antennas for 5G application are
presented in this paper. The first type is U-shaped antenna which has been
proposed and analyzed and can switch among two symmetric polarizations. The
second type is Y-shaped antenna which has been analyzed and can switch among two
orthogonal polarizations. The two types of antennas can generate the
polarization diversity without affecting the other performances such as the
radiation pattern and the frequency. These types of antennas are required for
wireless communication systems because they can avoid the fading loss and
increase the channel capacity. To achieve the linear polarization
reconfigurability, two diodes are integrated into microstrip feed. For both
states of operation of antennas, the resonant frequency was determined to be
between (3.4–3.6) GHz. The simulated results of reflection coefficient and gain
are carried out using HFSS (high frequency structural simulator) and CST
(computer simulation technology) software. The operation frequency, the simple
structure, and good gain make these antennas good candidates for 5G
communication. |
Keywords: |
Polarization Reconfigurable Patch Antenna, U-Shaped Antenna, Y-Shaped Antenna,
HFSS, CST |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
CCLRSP - A COLLABORATIVE CROSS LAYER ROUTE SELECTION PROTOCOL FOR LOW-POWER
LOSSY WIRELESS NETWORKS |
Author: |
B. UMARANI, A. R. NASEER |
Abstract: |
Route selection in low-power lossy networks (LLN) is a challenging task due to
the constrained nature of wireless devices. With the LLN providing the
underlying network for several IoT applications, which require devices with high
network activity, energy efficiency becomes more crucial in comparison to
typical wireless sensor networks (WSNs). Also, most of the works in this
direction that are based on cross-layer designs only rely on either physical
layer or medium access control (MAC) sub-layer optimizations to select routes.
The majority of the contributions identified with Cross Layer Design that depend
on just physical layer grandstand where by changing the transmitting power, the
energy devoured by the nodes can be upgraded. Additionally, the works that
depend on just MAC sub-layer can only target on the issues like contention,
impacts with least yields towards the collective advantages. In this work, a
novel attempt is made to achieve the collaborative benefits of the node and as
well as the network. In this paper, we initially show that considering both
physical and MAC layer properties can benefit the route selection process by
lowering the individual devices’ energy and also the overall network lifetime.
Then, we propose a collaborative cross-layer route selection protocol - CCLRSP
that relies on physical layer and MAC layer properties to choose a low-cost
route. At the physical layer, we employ the adaptive and robust topology control
mechanism (ART) that is based on determining the optimal transmission power for
a transmitter to reach the next-hop neighbor. At the MAC level, the physical
layer findings are cross verified to minimize the contention and interference
through the expected transmission count. The proposed protocol combines the
parameters from these two layers to select an energy efficient route that
employs a balanced approach to prevent few network nodes from draining energy
quickly by load-balancing. The proposed protocol is evaluated using extensive
simulations and is shown to perform better than existing works. |
Keywords: |
Low-Power Lossy Networks, Cross-layer Design, Cross Layer Route Selection, PHY &
MAC Layers, Wireless Sensor Networks, Internet of Things, |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
PIRACY IN UNIVERSITY: FACTORS ASSOCIATED WITH DIGITAL PIRACY AMONG MULTIMEDIA
STUDENTS |
Author: |
DING CHIU SIN, SYARULNAZIAH ANAWAR, ZAKIAH AYOP, ASLINDA HASSAN, NUR FADZILAH
OTHMAN, NOR RAIHANA MOHD ALI |
Abstract: |
Internet is especially important during the Covid-19 pandemic, where there is
wide adoption of an online learning platform for teaching and learning. Students
always utilize the Internet in many ways to meet their academic needs.
Therefore, considerable attention has been given to the problem of digital
piracy behavior among university students. This study aims to investigate the
factors to be considered as part of digital piracy behavior among multimedia
students. Guided by a theoretical perspective from Deterrence Theory, Ethics
Theory, and Neutralization Theory, this study adopted a quantitative methodology
where data from a survey (N=200) of multimedia students in public and private
universities in Malaysia is analyzed. This study proposed a model that offers
understandings of the contributing factors that may influence digital piracy
behavior among multimedia students. Based on the findings, this study concluded
that fear of legal consequences has the highest influence on digital piracy
behavior, followed by perceived likelihood of punishment and neutralization
techniques. This study may benefit other researchers attempting to understand
multimedia students' standpoints on digital piracy behavior and increase user
awareness in the computer ethics research area. |
Keywords: |
Digital Piracy, Intellectual Property, Computer Ethics |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
AN EFFICIENT APPROACH TO DETECT AUTISM IN CHILD USING MACHINE LEARNING AND DEEP
LEARNING |
Author: |
T. AMALRAJ VICTOIRE, A. RAMALINGAM, A. NARESH, K.M NASIMUDEEN, M S JAYA KUMAR |
Abstract: |
Autism spectrum disorder (ASD) is growing among children. Detecting of autism
through screening test is very time consuming and cost effective. Unfortunately
there is no proper method to heal autism. Autism spectrum disorders (ASD) are
complex neuro-development disorders that include shortage in interaction with
social, communication, and the existence of duplicative and restricted
behaviours. The symptoms are generally identified in children’s aging less than
three years and have to be amid impairment in cognitive functioning, learning,
attention, and sensory processing. Autism Spectrum Disorder (ASD) is a
neuro-developmental disorder that has become one of the major health problems
and for controlling the disease early diagnosis is very much important. The
increase within the number of autoimmune influenza and ASD cases within the
world reveals an urgent got to develop easily applied and effective screening
methods. But if it is detected earlier, we can motivate them to move socially
and decrease the level of autism in them. So, we detect autism using machine
learning and deep learning techniques to find the symptom in earlier stages. A
coherent iterative algorithm is designed and the proof of convergence is given. |
Keywords: |
Machine Learning, Autism Spectrum Disorder, Deep Learning. |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
MULTIDIMENSIONAL INSIDER THREAT DETECTION MODEL FOR ORGANIZATION |
Author: |
GANTHAN NARAYANA SAMY, NURAZEAN MAAROP, BHARANIDHARAN SHANMUGAM, MUGILRAJ
RADHAKRISHNAN, SUNDRESAN PERUMAL, FIZA ABDUL RAHIM |
Abstract: |
Insider threat is a most worrying threat that haunts many organizations today
that cause enormous financial losses and damages. As a frontline, Information
Technology (IT) organizations has to implement necessary countermeasures to
protect critical infrastructure. Although, many approaches proposed before to
detect and mitigate insider threat, significant rise of cases in past few years
and unavailability of a widely accepted solution paves way to conduct more
researches. Moreover, the pandemic situation has brought in a new challenge for
IT organizations to review the existing safeguards. This paper aims to
contribute an interdisciplinary approach at proposing a multidimensional model
that scrutinize factors from multiple dimensions such as psychological,
behavioral, technological, organizational and environmental dimension that
triggers insider threat. The constructed model coordinates organizations to
counter insider threat by addressing issues in more effective and efficient way
by applying the multidimensional approach for mitigation. |
Keywords: |
Insider Threat, Psychological Dimension, Behavioral Dimension, Technological
Dimension, Organizational Dimension, Environmental Dimension |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
CONSTRUCTING THE NOVELTY OF SME COLLABORATION PARAMETER IN GAMIFICATION BASED ON
“SILATURRAHMI” CULTURE |
Author: |
FITRI MARISA, SHARIFAH SAKINAH SYED AHMAD, ZERATUL IZZAH MOHD YUSOH, MARDIANA
ANDARWATI, NOVI DIAN NATHASIA, CHAULIAH FATMA PUTRI |
Abstract: |
Collaboration is one of the essential strategies to maintain Small Medium
Enterprise (SME) in facing the global market. However, there has been no agreed
formulation of a collaboration model as a benchmark in previous studies,
including the parameters used to measure collaboration performance. Weak
motivation to collaborate is also an actual problem faced by SMEs. On the one
hand, culture is one of the roots of individual thought and behavior as an
essential aspect that influences the behavior of SME actors in running their
business. Therefore, a culture-based SME collaboration model is proposed in the
gamification platform to present a more adaptive model and increase
collaboration motivation. This research is focused on building novelty
parameters to measure collaboration performance as the primary basis for
realizing collaboration gamification models. Based on the literature review,
there are four principles of "silaturrahmi" culture that have similar
characteristics with collaboration, including Relationship Building (X1),
Reciprocal Sustainment (X2), Reciprocal Assistant (X3), and Active Support (X4).
The test was started by collecting questionnaire data from 63 respondents who
were the movers of SMEs. The theme of the question is about the influence of the
four principles of silaturrahmi on collaboration. Data analysis was carried out
using the linear regression method and all test requirements (validity,
reliability, normality, linearity, heteroscedasticity) to measure the influence
of the four principles of "silaturrahmi" (Variable X1, X2, X2, X4) on
collaboration (Variable Y). The results show that four variables have met all
test requirements for linear regression analysis, resulting in a significance
value (sig.) < 0.05, t value > t table, the value of the regression coefficient
(B) is positive. It means that the four variables have a positive effect on
collaboration because all hypotheses are accepted. The four can be a parameter
to measure collaboration performance with the proportion of the role of each
variable that can be considered from the R-Square value. Thus, these four
parameters can be used as the primary basis for building a collaboration
gamification model as a reference for measuring collaboration. To implement the
four parameters, they were included in the collaborative gamification mechanics
material. |
Keywords: |
Collaboration Parameters, Silaturrahmi Culture, Collaboration Gamification, SME |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
DYNAMIC RECOMMENDATION BASED ON USERS' LONG-TERM AND SHORT-TERM PREFERENCES AND
SOCIAL IMPACT |
Author: |
LI FEI DA, YIN SI ZHE, HAN SONG HE, LIU YU JING, SUN HAO |
Abstract: |
Aiming at the irrationality of existing social recommendation algorithms, such
as not fully mining the preference correlation between users and not fully
considering the dynamic change of user preferences in time, this paper proposes
a dynamic recommendation algorithm based on user long-term and short-term
preferences and social influence. From the dynamic change of user preferences
and the social relationship of users, the improved gating cycle unit is used to
model the user rating information and extract the long-term and short-term
preference features; According to the user correlation matrix, the social impact
of learning target users is expressed. Experiments on two real datasets show
that the proposed algorithm is better than the comparison algorithm. |
Keywords: |
Social Recommendation, Preference Learning, Collaborative Filtering, GRU,
Recommendation Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
ANALYSIS AND DESIGN OF VOICE ASSISTANT FOR INDONESIAN BANKING TRANSACTION |
Author: |
DYAH YUNIATI, RIYANTO JAYADI |
Abstract: |
The number of FinTechs in Indonesia requires banks to have the right strategy to
attract new customers and retain their customers. Therefore, banks are competing
to create more innovative products and services than their competitors. Several
banks in developed countries such as U.S. Bank, Barclays U.K. and OCBC Singapore
have innovated by implementing voice assistants for financial transactions so
that customers can transact anytime and anywhere easily. However, no banks in
Indonesia provide voice assistant services for financial transactions such as
transfers and bill payments. Even studies on this feature have never been
conducted in Indonesia. Therefore, this study analyzes the feasibility of
developing voice assistants for banking financial transactions in Indonesia
using the PESTLE framework. The authors then propose a service model and
application design by adapting the Design Science Research (DSR) methodology.
The study results provide a service model that includes checking balances and
recent transaction history, adding bank contact, checking the amount of credit
card bills, internal bank transfers, interbank transfers, e-wallet top-ups and
bill payments. The study results also found three challenges that will be faced
by the Bank in implementing voice assistant services. Those are determining the
most secure authentication system, the level of accuracy of voice assistants in
capturing user voice commands that need to be tested and education to customers
that is accurate, clear, and transparent. |
Keywords: |
Bank, Banking Transaction, Dialogflow, Pestle Analysis, Voice Assistant |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
NEW CROSSOVER VIA HYBRID ANT COLONY SYSTEM WITH GENETIC ALGORITHM AND MAKING
STUDY OF DIFFERENT CROSSOVER FOR TSP |
Author: |
ASMAA HEKAL OMAR, AMANY AHMED NAIM |
Abstract: |
The traveling salesman problem (TSP) is a very famous NP-hard problem in
computer science and operations research. In this study, proposed a new hybrid
crossover (SPMX) combining the shuffle crossover and partially mapping crossover
which served to develop Genetic algorithm (GA) to solve this problem since
crossover is the main component of GA. And, apply the proposed SPMX on hybrid
ant colony system with GA with Ant colony system (ACS), which called by (ACSGA)
to solve TSP. Experimental results on some well-known TSPLIB instances of
different types and sizes. The obtained comparative study clearly demonstrates
the utility of the proposed a (SPMX) to enhance ACSGA for resolving TSP and the
distance decrease by 0.82% with average 0.47%. |
Keywords: |
Travelling Salesman Problem (TSP), Genetic Algorithm (GA), Crossover Operators,
Ant Colony System (ACS) |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
CURRICULUM MANAGEMENT INFORMATION SYSTEM DESIGN IN EARLY CHILDHOOD EDUCATION |
Author: |
EDI WALUYO, DIANA, DESTY CITRA SARI, NURUL AIDA LESTARI |
Abstract: |
This article aimed to examine and develop a curriculum management information
system design to provide convenience for principals and teachers in curriculum
development. This study used a qualitative design to find new relationships to
problems in the early development of curriculum management information system
design. The research subjects were the principal and teachers in the ECE Lab
school UNNES institution. Data collection techniques were carried out through
focus group discussions (FGD) and questionnaires. Based on the research data, an
initial model of the curriculum management information system design was
obtained which could provide systematic steps for planning and organizing.
Furthermore, based on the questionnaire, it was found that the design of the
management information system was practical and received a good response from
the respondents. |
Keywords: |
Design, MIS, Curriculum, ECE |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
A SYSTEMATIC LITERATURE REVIEW OF AUTOMATIC KEYWORD EXTRACTION ALGORITHMS:
TEXTRANK AND RAKE |
Author: |
MANAR YAHYA , DERAR ELEYAN , AMNA ELEYAN |
Abstract: |
There are various techniques available in text mining for text summarization
which will provide the concise meaningful text from the original text document.
Keywords give the summary of the text and help to understand the information
described in the text document. Traditional approaches to extract useful
Keywords from a text depends on human effort heavily, and because of the
difficult manual extraction and consuming much time, the Automatic Keyword
Extraction algorithm has been used to extract a keyword efficiently that reduces
the scope for human errors and saves time. TextRank and RAKE are approaches
based on unsupervised techniques to extract the keywords from the text. This
research systematically identifies peer-reviewed literature that discusses to
utilize TextRank and RAKE algorithms for automatic keyword extraction from texts
and presents a comparison between these keyword extraction approaches. Also,
this systematic review presents the latest applications which use keyword
extraction approaches. |
Keywords: |
Text Summarization, Automatic Keyword Extraction, TextRank, RAKE, Unsupervised
Approach |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
THE MYTH OF WOMEN'S HEALTHY LIFE AS THE PERSONIFICATION OF HEALTH PRODUCTS IN
WEB SERIES ADS ON YOU TUBE |
Author: |
AHMAD MULYANA, MUHAMAD ARAS, RAMANOV BAREZKI |
Abstract: |
In the era of social media, advertisements generally create messages in a
dramatized format, long duration and serial. With the strategy of wanting to
build the involvement of netizens as consumers. Unfortunately, the message
created often leads to manipulating the message when highlighting the advantages
of the advertised product. Like the Stevia Sweetener ad on YouTube which
visualizes the superiority of the product through the personification of the
role of women in the domestic sphere. This study analyzes how the myth of women
is manipulated by involving consumers to form product awareness. The concept of
media strategy and advertising creative strategy is the reference in this
research. The analysis was carried out using the semiotic analysis method of
Roland Barthes, where through denotative and connotative analysis, the meaning
of the myth was carried out. The results of the Stevia Tropicana Slim product
advertisement show that there is an affirmation of the values of the role of
women who are shackled in a culture that places women's roles in the domestic
sphere. Personification here presents two sides of meaning: (1) women are shown
to be dominant in their role as wives who regulate husbands to live healthy
lives; (2) On the other hand, mythically, advertising actually strengthens
women's shackles in domestic affairs. The analysis also finds the myth that
advertising represents cultural values of patriarchal ideology. The
representation found that what appeared in the SORE Web Series advertisement on
YouTube represented gender ideology to support product marketing. |
Keywords: |
Semiotics, Myth Woman, Advertising, Personification |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
DYNAMIC MAP PATHFINDING USING HIERARCHICAL PATHFINDING THETA STAR
ALGORITHM |
Author: |
IRFAN DARWIN, SURYADIPUTRA LIAWATIMENA |
Abstract: |
Theta Star is an efficient algorithm that can be used to find an optimal path in
a map with better performance compared to the A-Star algorithm. Combining the
Theta Star with Hierarchical Pathfinding further enhances its performance by
abstracting a large map into several clusters. What this combination lacks are
the capability to handle a dynamic element in the map. Without that capability,
the agent could potentially collide with elements in the map that is undesirable
in certain conditions, while adding that capability might reduce the pathfinding
algorithm's performance. The proposed algorithm aims to provide the capability
to handle dynamic elements without severe negative impact on the performance of
the algorithm. The effectiveness of the proposed algorithm is verified in terms
of execution time, number of nodes explored, final path length, and the number
of collisions that occurred. |
Keywords: |
Artificial Intelligence, Dynamic Map, Grid-Based, Hierarchical Pathfinding,
Theta Star |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
ASSOCIATION ANALYSIS ON JOB VACANCY CRITERIA |
Author: |
ALBERT HENDERSON, IMAN HERWIDIANA KARTOWISASTRO |
Abstract: |
IT Based job openings have a various criterion of needed skills. University
graduates are required to fulfill the industry needed. The purpose of this work
is to help improve university’s graduate awareness about criteria mostly need by
industries. By using association analysis and utilizing existing job openings
data are expected to find any association in the several vacancy group with the
expected skills by the industry. The technique will be used is association
analysis. The process is carried out in four major steps, consist of Data
Collection, Pre-Processing Data, Text Processing, and Association Analysis.
Produced rules grouped into four, based on support and lift value. Result of
this work shows that only criteria from IT/MIS-Quality Assurance (2016),
IT/MIS-Administrator (2017), Engineering-Computer, IT/MIS-Multimedia Designer,
IT/MIS-Product Management, IT/MIS-Technical Support (2018), and IT/MIS-Technical
/ Functional Consultancy (2019) that qualified as mostly appear criteria also
often appear together. With the discovered knowledge of this work, related
students and university faculties can obtain information in a better way from
existing job openings and can fulfill the industry terms and needs based on the
needed criteria. |
Keywords: |
Association Analysis, Association Rule, Data Mining, Job Vacancy |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
DESKTOP APPLICATION DEVELOPMENT FOR IMPLEMENTING MERGE SORT ALGORITHM ON
DISTRIBUTED SYSTEM TO SORTING NUMBERS |
Author: |
HANDRIZAL, SRI MELVANI HARDI, WINTO JUNIOR KHOSASIH |
Abstract: |
A long way back to 2008, the google infrastructure team reported that the google
data center handles around 20 Petabytes per day with an average of 100.000
MapReduce jobs spread across its massive computing cluster with standard machine
cluster node setup costs approximately $2400 each. According to how google
handles things we can conclude even high-performance computers could have
difficulties in processing large data, and even not all agencies could afford
this kind of setup. Sorting is any process of arranging an item according to a
rule with two common, yet ascending (ordering from smallest to largest item) or
descending (ordering from largest to smallest item). Sorting is very important
for indexing an item to ease searching the item by the system, human, or
algorithm. There are many sorting algorithms with time complexity O(N log N) for
sorting n items one of them is merge sort. Based on google’s case, computing
performance could be increased by dividing tasks to another node in the cluster
computing environment, with this similar approach we could increase the
performance of the merge sort algorithm. Merge sort algorithm based on divide
and conquer technique that eases converting sequential process to parallel
process with dividing it to another computer processor in divide phase. Using
this similar dividing approach the system will divide the process into several
hosts separated physically in cluster computing by utilizing java RMI as
middleware. A research test was conducted using 4 computers hosted for
distributed merge sort computing as well as a comparative computer for parallel
merge sort computing. The system was tested on two and four-processor usage of
parallel merge sort and four hosts to three hosts configuration with two
processors and four processors for distributed merge sort, respectively.
Performance is measured by comparing computation time of distributed merge sort
and parallel merge sort. |
Keywords: |
Distributed MergeSort, High-Performance Computing MergeSort, Distributed System,
MergeSort Algorithm, Parallel MergeSort, Java RMI, number sorting, Distributed
MergeSort VS Parallel MergeSort, Cluster computing, Computer Network |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
Title: |
USERS PERCEPTIONS AND ONLINE EDUCATION ACCEPTANCE IN THE NEW NORMAL AT IMAM
MOHAMMAD IBN SAUD ISLAMIC UNIVERSITY (IMSIU), SAUDI ARABIA |
Author: |
BILAL AHMAD ALI AL-KHATEEB |
Abstract: |
Research on Information Technology has demonstrated that IT is an indispensable
tool for achieving better and effective education among others, as it provides
both educators and learners with easy-to-access information, accelerated
learning, and makes people to gain 21st-century technical skills necessary for
future occupations etc. however, research on IT is still ongoing, giving room
for more contributions. One aspect of IT cutting the attention of researchers in
the recent times is online education. It is in-thing in this present era
particularly with the current situation of Covid-19 pandemic which brought about
some changes in the way education is being conducted in terms of teaching and
learning among teachers and students. Although, online education is gaining more
popularity day by day, however, its acceptance among different categories of
users is a major issue of concerned which has resulted to several divergent
views and findings. Unfortunately, majority of the effort is concentrated on one
user particularly between the teachers and the students. It is critical to know
that both academic staff and students are indispensable when you talk about
online education and therefore should be included in any research of this nature
for better insight. This deficiency provided the present study the opportunity
to investigate the user’s perceptions and online education acceptance. Thus, the
study investigates user’s perceptions and online education acceptance in the new
normal at Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia. It
adopted a survey research design while the population covered all the lecturers
and teachers in Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia.
Of all the copies of questionnaires sent out to the respondents, only 218
returned filled. The returned questionnaires were analysed using STATA version
13 statistical tool. The finding revealed that User’s perception is generally a
significant predictor of Online Education Acceptance with F(1,214)=94.40,
p>0.001; Prob. > F =0.0000. Additionally, it revealed that user’s perception
also affect Perceived Usefulness (PU), Perceived Ease-of-Use (PEOU) and
Attitudes towards Usage (ATU). The conclusion based on the finding is that
user’s perception significantly affects how users accept or reject online
education among the respondents. The study offered several implications. |
Keywords: |
Users, Perception, Online, Education, Teaching, Learning, Acceptance |
Source: |
Journal of Theoretical and Applied Information Technology
31st
October 2021 -- Vol. 99. No. 20 -- 2021 |
Full
Text |
|
|
|