|
Submit Paper / Call for Papers
Journal receives papers in continuous flow and we will consider articles
from a wide range of Information Technology disciplines encompassing the most
basic research to the most innovative technologies. Please submit your papers
electronically to our submission system at http://jatit.org/submit_paper.php in
an MSWord, Pdf or compatible format so that they may be evaluated for
publication in the upcoming issue. This journal uses a blinded review process;
please remember to include all your personal identifiable information in the
manuscript before submitting it for review, we will edit the necessary
information at our side. Submissions to JATIT should be full research / review
papers (properly indicated below main title).
|
|
|
Journal of
Theoretical and Applied Information Technology
April 2022 | Vol. 100 No.07 |
Title: |
POLAR CODE PERFORMANCE ANALYSIS FOR HIGH-SPEED WIRELESS DATA COMMUNICATION
SYSTEM |
Author: |
LYDIA SARI , YESSI KARTINI GULTOM , SYAH ALAM3, INDRA SURJATI |
Abstract: |
Polar code is the first channel code proven to reach Shannon capacity and is
proposed for use in high-speed data communication system. However, the use of
independent Polar code with a finite number of bits shows poor performance
compared to earlier codes, namely Turbo and Tail-biting Convolutional codes. In
this study, the Polar code is equipped with the Cyclic Redundancy Check (CRC-11)
code and the Succesive Cancellation List (SCL) decoder according to the
recommendations in the 5G System Specifications. The code performance is
analyzed for a limited number of bits, using BLER and Es/N0 as performance
parameters. The number of bits of information encoded in this study were 32 and
64 bits, while the number of bits in the codeword were 432, 864, and 1728 bits,
so that the code performance for short blocks of information and codewords can
be observed. The list sizes on the decoder are 1, 2, and 4. The simulation
results show that the simulated code allows communication to take place with the
value of Es / N0 in the range -11.5 dB to -1.8 dB to achieve Block Error Rate
(BLER) 10- 2. This shows that a Polar code equipped with a CRC code and an SCL
decoder has a good performance for a limited number of bits. |
Keywords: |
5G, CRC, SCL decoder, Polar Code |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
STUDYING ADDITIONAL LOSSES OF STANDARD G.652 OPTICAL FIBER WITH PROTECTIVE
CLADDING DURING MULTIPLE BENDING TO DEVELOP WEIGHT CONTROL SENSOR |
Author: |
ALIYA ALKINA, ALI MEKHTIYEV, YELENA NESHINA, TANSAULE SERIKOV, PERIZAT MADI,
KANIBEK SANSYZBAY, ALEXEY YURCHENKO |
Abstract: |
The article deals with developing an alternative to fiber-optic data
transmission lines. One of the problems of telecommunication systems of the
Republic of Kazakhstan operation is considered attenuation of signals in FTT
data transmission systems. The main idea of using optical fiber of the G.652-656
standard, which is sufficiently sensitive to bends, has been described. Local
enterprises have mastered the production of fiber-optic cables and patch cords
based on the G.652 standard. Bending causes a loss of the light wave power,
changes the phase of propagation of the mode and leads to signal attenuation, in
which case users cannot work normally in the Internet. In this article, various
types of microbends have been simulated. Microbending of a small radius optical
fiber will damage it. This situation arises when the technology of installing a
fiber-optic cable is violated. There have been carried out studies aimed at
obtaining new scientific results related to the construction of characteristics
of additional losses arising from the bending of an optical fiber depending on
the number of angles, their degree and the wavelength of optical radiation.
Conclusions have been drawn on the further use for the development of sensors
based on the control of additional losses during microbending, as well as the
development of systems for protecting information transmitted over fiber-optic
lines. The studies are aimed at developing software for the numerical
calculation of additional losses with an estimate of the accuracy of
constructing an approximation according to the given parameters: the number of
bends, the angle and wavelength of optical radiation propagating along the fiber
core. |
Keywords: |
Optical Fiber, Signal Attenuation, Microbending, Photoelastic Effect, Light
Wave, Mode Propagation Phase, Radius, Methods And Means Of Protection,
Additional Losses. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
MULTI-CRITERIAL OPTIMIZATION COMPOSITION OF CYBER SECURİTY CIRCUITS BASED ON
GENETİC ALGORITHM |
Author: |
LAKHNO V. , AKHMETOV B. , MOHYLNYI H.3, BLOZVA A. , CHUBAIEVSKYI V. ,
KRYVORUCHKO O. , DESIATKO A. |
Abstract: |
The article proposes a method of multicriteria optimization (MCO) of costs for
an information security system (SIS) of an informatization object (OBI). The
technique is based on the use of the genetic algorithm (hereinafter GA) VEGA
(Vector Evaluated Genetic Algorithm). The modified algorithm for solving the
problem of multicriteria optimization of the parameters of the OBI multi-loop
SIS allows substantiating the rational characteristics of the DSS components,
taking into account the priority cybersecurity metrics of the OBI selected by
the expert. Unlike the existing classical VEGA algorithm, the modified algorithm
additionally applies the Pareto principle, as well as a new selection mechanism. |
Keywords: |
İnformation Protection, Cybersecurity, Protection Circuits, Multi-Criteria
Optimization, Genetic Algorithm |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
COMPUTATIONAL AND INTELLIGENT OPTIMIZATION TUNING METHOD FOR PID CONTROLLER |
Author: |
ROSALIA H. SUBRATA , FERRIANTO GOZALI , ENDANG DJUANA |
Abstract: |
Proportional Integral Derivative (PID) control systems are quite common in the
commercial, institutional, industrial plants and many real-life applications due
to their advantages over other kind of controllers. Proper application and
tuning of PID parameters can provide many benefits and increase process
efficiency. However, improper implementation, due to lack of understanding and
poor tuning processes, are often be the main cause behind many problems.
Conventional PID tuning methods can’t meet the demands as the system becomes
more and more complex due to trial and error approach, therefore a more
systematic and automated approach is needed. This paper discusses the background
and theory behind PID controller and bring a clear understanding how to perform
tuning process for PID controllers and presents computational and intelligent
optimization techniques such as Genetic Algorithms, Particle Swarm Optimization
and Differential Evolution used to make the control deviation of step response
close to zero, have faster response and smaller or even without overshoot.
Through literature survey from existing publications, several issues related to
the implementation of the PID controller to enhance the performance of such as
model plant development, parameter setting, control characteristics expected and
tuning processes are discussed and summarized. The conclusion is that
computational and intelligent optimization tuning method produce less overshoot,
shorter rise and settling time and less errors in system responses, therefore
producing more optimal tuning and at the end more optimal system performance. |
Keywords: |
PID Parameter, Computational Method, Tuning Optimization. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
FORENSIC ANALYSIS ON DISTRIBUTED DENIAL OF SERVICE ATTACK ON IOT ENVIRONMENT |
Author: |
HAFIZUDDIN SHAHRIL FADZIL, ZUL-AZRI IBRAHIM, FIZA ABDUL RAHIM, SAIFUL AMIN
SHARUL NIZAM, HARIS ISKANDAR MOHD ABDULLAH, MUHAMMAD ZULHUSNI MUSTAFFA |
Abstract: |
The Distributed Denial of Service (DDoS) attack is a malicious attempt to render
the users unable to access a server service, usually by temporarily disabling or
suspending its hosting server services. With the increase popularity of IoT
devices such as the massive deployment of smart meter in Advance Metering
Infrastructure, can create a situation where attacker can launch a DDoS attack
in this environment. This work will focus on analyzing the impact of DDoS attack
in AMI by performing data analysis from DDoS attacks that performed from IoT
testbed. The testbed is use as a platform to perform the testing using multiple
variation of DDoS attacks that can be launch from IoT devices. It also helps the
system detect any DDoS attacks against IoT devices by tracking any abnormalities
in the communication inside the testbed and connected IoT devices. |
Keywords: |
Internet of Things (IoT), IoT testbed, Distributed Denial of Service (DDoS). |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
FORECASTING OF CORRECTION СODES CHARACTERISTICS TO COUNTERACT NETWORK CHANNEL
OVERLOADS |
Author: |
EVGENY O. KARPUKHIN1 , KONSTANTIN V. MESHAVKIN |
Abstract: |
In various data transmission systems, often there are situations when one of the
nodes is less productive or more overloaded than the others. Where this node is
the only one on the way to data recipients, there is a strong slowdown in data
transmission from sources to recipients, and some packets begin to be lost when
a certain high load level is reached. The described situations are characterized
by a load on the channel without strong variations in intensity and without the
threat of a complete shutdown of the system, where the use of coding can have
high efficiency. As a method of protection, we chose the reaction method, based
on the use of correction codes that are able to restore lost packets due to the
occurrence of congestion in the networks. At the same time, due to the
variability in the intensity of the data flow in the channel in real systems, in
order to reduce the overhead costs when using encoding and generally increase
the data transfer rate, it is necessary to choose the data transfer mode (in
some cases, encoding will not be more effective than a simple mechanism for
re-requesting lost packets) and to determine the code parameters depending on
the average probability of packet loss in the channel, which will be sufficient
to restore all lost packets. In both cases, it was decided to choose the
parameters of the correction code by predicting certain characteristics of the
data transmission channel. These characteristics are the average delay between
two packets in the channel and the queue load p. After comparing the simulation
results with the optimal indicators for a similar system, the high efficiency of
the method under consideration was revealed, which suggests that it will provide
significant resistance to moderate loads in the channel. |
Keywords: |
Noise-Resistant Coding, Information Interaction, Overload Protection,
Telecommunications Systems and Networks. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
CONTRIBUTING FACTORS FOR STUDENT PERCEPTION TO USE E-LEARNING SYSTEMS |
Author: |
RAGAD M TAWAFAK , IBRAHIM YAUSSEF ALYOUSSEF , WALEED MUGAHED AL-RAHMI , SOHAIL
IQBAL MALIK |
Abstract: |
E-learning is considered an effective approach within higher education
institutions. However, e-learning is faced with several problems such as
e-learning engagement challenges, and limited types of developed models used
that affect students' continuity use of e-learning. This research argues how the
learning takes place; the conceptual acceptance model construction factors
needed for contributing factors. The deployment of factors includes the support
assessment, behaviour intention, and student perceptions that e-learning systems
validate learners' learning outcomes such as effectiveness, academic
performance, student satisfaction, and continuity to use. This study aims to
find the contributing factors that affect the continuity to use e-learning
systems. The model was developed of 11 construction relationships tested by the
PLS-SEM program. A survey was constructed and distributed among 95 participants
from Al-Buraimi University College, Oman (BUC). The research mentioned all
hypotheses with significant remarks that supported the proposed model impact.
This research combined two e-learning systems TAM and ECT models for e-learning
system continuity. |
Keywords: |
Contributing factors, ECT, TAM, PLS-SEM, E-learning. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
A NEW OPTIMIZED MACHINE LEARNING APPROACH FOR EXTRACTION AND CLASSIFICATION OF
INFORMATIONS IN CURRICULUM VITAE |
Author: |
SAFIA BAALI, HICHAM MOUTACHAOUEK, ABDELAZIZ MARZAK , IBRAHIM HAMZANE |
Abstract: |
The hiring process has evolved It refers to the process of finding, selecting
and recruiting new employees to a company/organisation through CVs. We have
presented in this paper a solution in the form of an automated and flexible
system to extract vital information from unstructured CVs and transform it into
a structured format and then use it in a recommendation system according to the
available positions. |
Keywords: |
CV; Machine Learning; Information extraction; NLP; Recommendation system. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
DEVELOPING AN INTELLIGENT SYSTEM FOR PREDICTING BANKRUPTCY |
Author: |
SAMAR ALY, MARCO ALFONSE, MOHAMED I. ROUSHDY, ABDEL-BADEEH M. SALEM |
Abstract: |
Bankruptcy prediction is a very important metric for making economic decisions.
It is a very critical element in credit risk analysis. Machine learning based
classifiers have been heavily utilized in predicting bankruptcy. In terms of
machine learning, predicting bankruptcy with imbalanced dataset is a very big
challenge. Despite the current existing models for bankruptcy prediction,
finding a model that achieves a high-performance measurement with imbalanced
datasets is still an interesting point of research. The reason behind this
challenge is the fact that imbalanced dataset leads to misclassification
results. This paper aims to develop a robust machine learning based model for
predicting bankruptcy with solving imbalanced dataset problem. Four different
re-sampling strategies were applied to solve the imbalanced class distribution
problem based on three popular datasets. The used datasets were downloaded from
the University of California, Irvine (UCI) machine learning repository. The
developed model based on different single and ensemble machine learning
classifiers. The overall experimental results showed that the best performance
of the developed model with the Polish dataset was 97% for accuracy and 95.4%
for AUC (Area Under the Curve). Moreover, the best performance with the
Australian dataset was 88.4% for accuracy and 92% for AUC. And the best
performance with the German dataset was 81.5% for accuracy and 83.4% for AUC
ratio. |
Keywords: |
Bankruptcy prediction, Artificial Intelligence, Ensemble Techniques, Machine
Learning Techniques, Imbalanced Dataset |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
FACIAL EMOTION RECOGNITION ON FER2013 USING VGGSPINALNET |
Author: |
BAMBANG EKO SANTOSO, GEDE PUTRA KUSUMA |
Abstract: |
Facial Emotion Recognition is a part of human-computer interaction research
whose results can be applied to society, ranging from social robots to accompany
elderly to video games that adjust the level of difficulty based on the player's
facial expressions. Many researchers attempt to create models for better
accuracy with deep learning techniques, especially using Convolutional Neural
Networks (CNN) that perform well in pattern recognition and image processing.
This research adopts the state-of-the-art models in ImageNet and modifies the
classification layer with SpinalNet and ProgressiveSpinalNet architecture to
improve the accuracy. The classification is performed on the dataset FER2013,
which is openly shared to the public in Kaggle contains over 35.000 face image
datasets for seven distinct emotions. After finishing the training process and
finetuning its hyperparameter, the resulting model with SpinalNet and
ProgressiveSpinalNet outperformed all the existing single standalone model
research on FER2013. One of the proposed architectures, VGGSpinalNet, has
achieved the highest single network accuracy of 74.45%. |
Keywords: |
Facial Emotion Recognition, FER2013 Dataset, VGG Model, SpinalNet,
ProgressiveSpinalNet |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
RESEARCH AND DEVELOPMENT OF PERSONAL DATA PROTECTION SYSTEMS IN ENTERPRISES |
Author: |
ZHANAT ABDUGULOVA, ZHULDYZ TASHENOVA, ELMIRA NURLYBAEVA, AMANDOS TULEGULOV,
DASTAN YERGALIYEV |
Abstract: |
The article proposes to develop software to protect against the spread of
personal information through information channels. The research paper considers
the classification and channels of information dissemination, the concept of
functioning of DLP systems, the analysis of the concept of DLP systems and their
types, the development of a DLP system and its comparison with similar types. At
the same time, the task of creating information security is envisaged, to solve
which the information system of the enterprise is characterized by threats to
information security and requirements for the information security protection
system. General problems of the functioning of DLP systems, their role and
features of use are considered, and a comparative overview of existing software
products is provided. This article is devoted to the development of an
additional subsystem that prevents the leakage of confidential information, in
particular, as part of the analysis of network packets at border communication
nodes. |
Keywords: |
Data Leak Prevention System, Printer (LPT), Modem (COM) Ports, Datascanner, SMS
Services |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
HYBRID CRYPTOSYSTEM USING ELGAMAL ALGORITHM AND BEAUFORT CIPHER ALGORITHM FOR
DATA SECURITY |
Author: |
HANDRIZAL, FAUZAN NURAHMADI, SILVIA DEWI SIREGAR |
Abstract: |
Exchanging information is very important in our public. We often exchange
information in the form of files with the *.docx extension. To maintain the
security of the information, it is necessary to have a data security system. In
this study, a data security solution for string data is given by using
cryptography. The Hybrid Cryptosystem method will be applied to the ElGamal
Algorithm and the Beaufort Cipher Algorithm to provide a high level of
information security. Beaufort Cipher Algorithm will be used to encrypt and
decrypt files with *.docx extension and ElGamal Algorithm will be used for
Beaufort Cipher’s key encryption and decryption process. The results of this
study indicate that the processing time required encryption and decryption
process in the Beaufort Cipher Algorithm and ElGamal Algorithm is linearly
compared to the length of the character in the file. The times required for the
encryption process in both algorithms are longer than the time required for the
decryption process. |
Keywords: |
Cryptography, Hybrid Cryptosystem, ElGamal, Beaufort Cipher. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
DESIGN AND DEVELOPMENT OF UWB PATCH ANTENNA WITH VARIABLE BAND NOTCHED USING
RING-SHAPED SLITS |
Author: |
M.M. HASAN MAHFUZ, MD RAFIQUL ISLAM, CHAN-WANG PARK, MOHAMED HADI HABAEBI,
NAZMUS SAKIB |
Abstract: |
ASEAN countries have recently proposed the frequency band (4.5–5.5) GHz for
fifth generation (5G) cellular communication, which necessitates the creation of
an ultra-wideband (UWB) antenna to accommodate the band-notched function. To
describe the compact shape of a UWB antenna in the context of 5G application,
this article has introduced a variable notched resonant characteristic at 5G
lower band. A tuning fork radiating patch with a simple defected ground plane
structure was used to create the UWB antenna. In order to create the
band-notched criteria, a pair of ring-shaped slits (RSS) has been applied to the
ground plane. This antenna has achieved a huge bandwidth from 2.9 GHz to 11 GHz
and an extremely low VSWR less than 2. It appears that the antenna covers all
frequencies except for notched frequency bands at lower 5G band (4.5–5.5) GHz.
The antenna has been archived a peak gain of 5 dBi for UWB, but the notched
frequency band produces less than -1 dBi. The notched-band can be shifted
gradually in response to changes in the different positions of RSS’s along the
vertical axis, resulting capability to design for variable band-notched
characteristics. The preliminary design was presented in [19]. The complete
design is fabricated and tested and presented in this paper. The proposed
antenna is small, with a surface area of 45×34 mm2, making it ideal for 5G lower
band application. |
Keywords: |
Microstrip Patch Antenna, UWB, RSS, 5G Lower Band, Variable Band-Notched |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
IMPLEMENTATION OF INTEGRATION SYSTEM BASED ON MICROSERVICES USING DOMAIN-DRIVEN
DESIGN METHODOLOGY |
Author: |
MUHAMAD FADHLY, AHMAD NURUL FAJAR |
Abstract: |
The Tangerang Government's development planning process is currently running
well, however, it is still constrained by the length of time it takes to input
basic data and poor data accuracy by manually inputting data. The applications
involved in providing basic data are still fragmented. So the data is not yet
integrated, starting from planning, budgeting, accounting, monitoring and
reporting. This study proposes a system integration that is in accordance
with the needs of the work plan reporting process in the monitoring and
evaluation system. With this service based enterprise architecture, an
integrated monitoring and evaluation system will be built. As a result, an
architectural enterprise based on Microservices will be built that can perform
data integration lightly and quickly using the Domain-Driven Design method
approach which is considered suitable and appropriate for designing architecture
in the performance monitoring and evaluation system of Tangerang City. |
Keywords: |
Enterprise Architecture, Integration System, Microservices, Domain-Driven
Design, Tangerang City |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
MULTI-OBJECTIVE RIDER BASED ELEPHANT HERD OPTIMIZATION FOR SPECTRAL UNMIXING OF
HYPERSPECTRAL IMAGES |
Author: |
RAJA NATARAJAN, VADIVEL RAMASAMY |
Abstract: |
Spectral unmixing (SU) is used for the identification of the end members and
fractional abundances present in the mixed pixels of the hyperspectral images
that are rich in data. The traditional methods for spectral unmixing are
affected with the artifacts requiring the effective method for spectral
unmixing. Thus, the paper uses an effective framework for Spectral unmixing
using the proposed Rider based Elephant Herd Optimization (R-EHO). The proposed
Rider based Elephant Herd Optimization estimates the fractional abundance using
the end members and proposed Rider based Elephant Herd Optimization is the
integration of the standard Elephant Herd optimization (EHO) in the Rider
Optimization algorithm (ROA). The proposed optimization uses the multi-objective
function that is modelled using the factors, such as Reconstruction Error (RSE),
sparsity (SPA), spatial neighbor (SNI), and spatial neighbour correlation (SNC),
and mutual information. The analysis is progressed using the Urban and Cuprite
datasets based on the performance metrics, Root-Mean-Square Error (RMSE),
Reconstruction Error (RE) and it is proved that the proposed R-EHO acquired the
minimal RE and minimal RMSE of 13.8576 and 0.0011, respectively. |
Keywords: |
Optimization, Spectral Unmixing, Hyperspectral Images, End Components,
Fractional Abundances |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
FACTORS THAT AFFECT THE E-FILLING USAGE IN INDONESIA: AN EXTENSION OF TECHNOLOGY
ACCEPTANCE MODEL AND THEORY OF PLANNED BEHAVIOR |
Author: |
HENWY WIBOWO, TUGA MAURITSIUS |
Abstract: |
This study will analyze the factors that can influence taxpayers in using
e-filing. The research model framework will use the Technology Acceptance Model
extension and the Theory of Planned Behavior external variable. The model will
be analyzed using Structural Equation Modeling (SEM). Based on the method, SEM
is a combination of factorial analysis and simultaneous equation modeling. The
population in this study is taxpayers in Indonesia, and the sampling technique
used is probability sampling, where the data are obtained from 431 respondents.
The research results show that the level of use of e-filing can be predicted
through behavioral intention to use. On the other hand, behavioral intention to
use can be predicted through perceived usefulness, interpersonal influence,
self-efficacy, and controllability. However, behavioral intention to use cannot
be predicted by attitude towards using and external influence. |
Keywords: |
Indonesian Taxation, Technology Acceptance Model, Theory of Planned Behavior,
Structural Equation Modeling (SEM) |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
UNDERSTANDING USER SATISFACTION IN USING MOBILE-BASED BEAUTY AND SKINCARE
E-COMMERCE APPLICATION IN INDONESIA |
Author: |
SHANIA IRENE APPOLITA SUSANTI, TUGA MAURITSIUS |
Abstract: |
The internet is currently an essential need for Indonesian people. Mainly
because of the covid-19 pandemic that makes activities must be done remotely,
including shopping. One of the best-selling products purchased online during a
pandemic is beauty and skincare. In Indonesia, there is one special e-commerce
application widely used and quite famous by the people of Indonesia who sell
beauty and skincare products. However, not a few are still dissatisfied with
using the application. This research aims to describe factors affecting user
satisfaction in using beauty and skincare e-commerce applications in Indonesia.
This research model adopts and modifies the ISSM model by DeLone and Mclean,
TAM, and the Trust. SEM-PLS is also used to analyze the results of a survey
collected by 185 respondents to validate the hypothesized model practically.
User satisfaction in using beauty and skincare e-commerce applications depends
on system quality, information quality, service quality, perceived ease of use,
perceived usefulness, and trust. In the end, the results showed that trust,
perceived usefulness, and system quality has a significant direct relationship
to user satisfaction. In addition, perceived ease of use and user satisfaction
has a significant relationship with completely mediated by perceived usefulness. |
Keywords: |
E-Commerce, ISSM DeLone & McLean, Technology Acceptence Model (TAM),
Trust, User Satisfaction, Modeling, SEM-PLS |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
USER ACCEPTANCE ANALYSIS OF THE E-HEALTH INFORMATION SYSTEM USING UTAUT2 METHOD |
Author: |
FARIZ HAIKAL, NIKEN KUSUMANING TYAS , XENA DIVA FELCIA , TANTY OKTAVIA, DAVID
SUNDARAM |
Abstract: |
E-health is an application that focuses on community services that offer
services in the health sector. Since the Covid-19 pandemic, e-health
applications have experienced an increase in users. The objective of this study
was to determine what factors influenced the level of acceptability of e-health
applications. The findings of this study indicated the most important aspects,
such as the application's success rate and improved e-health application
performance. Unified Theory of Acceptance and Use of Technology 2 (UTAUT 2) was
the research model used. The online questionnaires in the form of survey were
distributed and addressed for the e-health application users in Jakarta,
Indonesia. PLS-SEM was used for analyzing the data and it involved 190
respondents on the survey. The result showed that the 10 hypotheses proposed,
there is 5 hypotheses declared significant or accepted and others declared not
significant or rejected. |
Keywords: |
E-Health, User Acceptance, UTAUT2, PLS-SEM, Covid-19 |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
FACTORS THAT INFLUENCED PEOPLE INTEND TO REPURCHASE IN ONE OF THE TOP INDONESIAN
E-COMMERCE WITH UNICORN STATUS |
Author: |
DWIEKO SETIORINI, NILO LEGOWO |
Abstract: |
One of the e-commerce sites with unicorn status and placing the top 3 most
visitors turned out to have the highest number of complaints compared to other
e-commerce related to trust, poor service, and user disappointment with the
e-commerce. Therefore, this study aims to determine what factors influence the
repurchase intention of users on one of this e-commerce, which is intended to
determine the intention of the user to make a repurchase. The model used in this
study is a modification and amalgamation of previous research models, which are
in line with this research. By reviewing the literature review and the existing
problems, the relevant variables to use are E-Service Quality, Customer
Satisfaction, Trust, and Repurchase Intention. After distributing the
questionnaire to the e-commerce users online were 125 respondents whose data
were processed and analyzed using SMART-PLS software. It was found that from the
six hypotheses developed. There were five hypotheses that were approved and one
that was rejected. As previously shown, the trust variable does not have a
substantial association with repurchase intention. Meanwhile, the variables of
e-service quality and customer satisfaction have a significant positive effect
on repurchase intention. In addition, the e-service quality variable also has a
significant positive effect on customer satisfaction and trust. Besides that,
the relationship between e-service quality and customer satisfaction has the
most significant relationship compared to other hypothetical relationships.
Finally, the customer satisfaction variable has a significant positive effect on
repurchase intention. |
Keywords: |
E-commerce, Repurchase Intention, E-Service Quality, Trust, Customer
Satisfaction. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
A FULLY DISTRIBUTED SECURE APPROACH USING NONDETERMINISTIC ENCRYPTION FOR
DATABASE SECURITY IN CLOUD |
Author: |
SRINU. BANOTHU, A. GOVARDHAN, KARNAM. MADHAVI |
Abstract: |
Database-as-a-Service is one of the prime services provided by Cloud Computing.
It provides data storage and management services to individuals, enterprises and
organizations on pay and uses basis. In which any enterprise or organization can
outsource its databases to the Cloud Service Provider (CSP) and query the data
whenever and wherever required through any devices connected to the internet.
The advantage of this service is that enterprises or organizations can reduce
the cost of establishing and maintaining infrastructure locally. However, there
exist some database security, privacy challenges and query performance issues to
access data, to overcome these issues, in our recent research, developed a
database security model using a deterministic encryption scheme, which improved
query execution performance and database security level. As this model is
implemented using a deterministic encryption scheme, it may suffer from chosen
plain text attack, to overcome this issue. In this paper, we proposed a new
model for cloud database security using nondeterministic encryption, order
preserving encryption, homomorphic encryption and database distribution schemes,
and our proposed model supports execution of queries with equality check, range
condition and aggregate operations on encrypted cloud database without
decryption. This model is more secure with optimal query execution performance. |
Keywords: |
Cloud Computing, Database-as-a-Service (DBaaS), Cloud Service Provider (CSP),
Database Security, encryption. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
ETHEREUM-INSPIRED ACCESS MANAGEMENT ACCOUNT CONTROL FOR A SECURED DECENTRALIZED
CLOUD STORAGE |
Author: |
HALA A. ALBAROODI, MOHAMMED ANBAR |
Abstract: |
The exponential increase of data storage in cloud computing has raise issues in
term of data security and privacy due to data are usually stored on the cloud
server ciphertext from. When a user requests access to the encrypted data, an
access key distributed by a third party is needed. However, if the third party
is not trusted, the security of the system will be threatened easily. Therefore,
this paper proposes an approach of blockchain based access management account
control to enhance cloud storage security. The proposed approach is a
combination of Ethereum Blockchain Contract Accounts (CA) and ciphertext
encryption policy and it consists of two main stages. First, access control as
the creation and invocation of each contract can be stored in the Blockchain,
thus, the function of the trace is achieved. Second, data storage; where the
data owner can store ciphertext policy of data in a Blockchain network. In the
Blockchain technique data owner can set valid access periods for data usage so
that the ciphertext can only be decrypted during valid access periods. Finally,
the analysis of the security and experiment shows that proposed approach is
feasible in securing the cloud storage. |
Keywords: |
Security; Blockchain; Cloud Computing, Software as a Services (SaaS), Data
Storage, keystor, Accounts Manager, Cloud Storage Security. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
A HEURISTIC NOVEL APPROACH FOR DETERMINATION OF OPTIMAL EPSILON FOR DBSCAN
CLUSTERING ALGORITHM |
Author: |
HASSAN SAYED RAMADAN, HUDA AMIN MAGHAWRY, MOHAMMED EL-ELEAMY, KHALED EL-BAHNASY |
Abstract: |
Clustering algorithms for identifying, and defining patterns between data
elements. There are various types of clustering, and each type has different
clustering algorithms. Each clustering algorithm has its applications, and
requires parameter(s) to start the algorithm. These parameters are like a
challenge to researchers to find the optimal values of parameters, or even close
enough to get satisfying clustering results. Density-Based Spatial Clustering of
Applications with Noise (DBSCAN) is one of these clustering algorithms. Epsilon
is one of its parameters, and most of researchers choose it randomly. Therefore,
the objective of this work is to propose a heuristic approach to find the
optimal epsilon for DBSCAN clustering algorithm. The concept of this approach is
to repeat DBSCAN many times, and each time it calculates a different epsilon
value till it finds the optimal epsilon. Finding the optimal epsilon depends on
evaluating clusters each time, and of course optimal epsilon has the best
evaluation scores. Proposed approach uses the root mean square standard
deviation (RMSSTD), and the R-squared (RS) to evaluate clusters. We run the
proposed approach on three benchmark different dimensional datasets. Also, we
used Silhouette index to validate the clustering results of the proposed
approach. The proposed approach was successfully able to find the optimal
epsilon for all three datasets. |
Keywords: |
DBSCAN, Optimal Epsilon, Clustering, RMSSTD, RS, Silhouette |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
SYSTEMATIC LITERATURE REVIEW ON ENHANCING RECOMMENDATION SYSTEM BY ELIMINATING
DATA SPARSITY |
Author: |
DAPHNE BUNGA DWIPUTRIANE, ZURAIDA ABAL ABAS, NANNA SURYANA HERMAN |
Abstract: |
The aim of this project is to develop an approach using machine learning and
matrix factorization to improve recommendation system. Nowadays, recommendation
system has become an important part of our lives. It has helped us to make our
decision-making process easier and faster as it could recommend us products that
are similar with our taste. These systems can be seen everywhere such as online
shopping or browsing through film catalogues. Unfortunately, the system still
has its weakness where it faced difficulty in recommending products if there are
insufficient reviews left by the users on products. It is difficult for the
system to recommend said products because it is difficult to pinpoint what kind
of users would be interested in the products. Research studies have used matrix
factorization as the standard to solve this issue but lately, machine learning
has come up as a good alternative to solve data sparsity. This project compares
results of the recommendation system using RMSE to see how each proposed methods
performs using three different datasets from MovieLens. We have selected two
models – matrix factorization with SVD and deep learning-based model to evaluate
these approaches and understand why they are popular solution to data sparsity.
We have found that SVD brought in a lower RMSE as compared to deep learning. The
reason behind this was discussed in the latter chapter of this thesis. We have
also found possible research in capitalising categorical variables in
recommendation system and the experiment achieved a lower RMSE score as compared
to SVD and deep learning, showing the many possibilities of the future
directions of the research in recommendation system. |
Keywords: |
Recommendation System, SVD, Matrix Factorization, Deep Learning, Data Sparsity |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
SPECTRAL UNMIXING WITH HYPERSPECTRAL IMAGES: A MULTI-OBJECTIVE LION OPTIMIZATION
APPROACH |
Author: |
RAJA NATARAJAN, VADIVEL RAMASAMY |
Abstract: |
Spectral unmixing is an important phase in interpreting hyperspectral images to
estimate the endmembers and their corresponding fractional abundances from the
mixed pixels. Sparse unmixing approach is one among the promising spectral
unmixing methods; however, noises impair hyperspectral images, indicating that
the sparse unmixing model's performance getting degraded. This study uses a
multi-objective lion optimization technique for spectral unmixing from
hyperspectral satellite images to extract fractional abundances of valid
endmembers from mixed pixels. To estimate the fractional abundances of each
endmember, the proposed approach defines a multi-objective function which
includes Euclidean and Frobenius norms and optimization variables that are
associated with the abundance and mixing matrices. Based on the lion’s social
behaviors, the optimization function uses pride generation for finding
solutions, mating for generating new solutions, territorial takeover and
territorial defense to identify and remove worse solution by introducing a new
optimum solution. The major objectives used in the objective functions are
Spatial Neighbor, Sparsity, and Reconstruction Error. The proposed technique's
performance is evaluated using Urban and Cuprite datasets with 06 and 12
endmembers respectively. In the investigations, the proposed methodology
outperformed the Bilinear and Trilinear Multi-Objective Spectral Unmixing,
Robust Collaborative Nonnegative Matrix Factorization, Pareto-Multi-Objective
Spectral Unmixing, and Rider Optimization methods in estimating the enhanced
endmembers and their corresponding fractional abundances with lower
reconstruction error and root mean square error values of 119.11 and 0.0904,
respectively. |
Keywords: |
Spectral Unmixing, Hyperspectral Images, Multi-Objective Optimization,
Endmembers |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
DENIAL OF SERVICE CLASSIFICATION ON MESSAGE QUEUEING TELEMETRY TRANSPORT
PROTOCOL AT INDONESIA OIL SERVICES COMPANY |
Author: |
GRENDY E ALIANDY, RIYANTO JAYADI |
Abstract: |
In Indonesia, adopting the Internet of Things (IoT) platform, which employs the
Message Queuing Telemetry Transport (MQTT) protocol as a communication system,
is growing. Most IoT systems lack adequate security mechanisms, and MQTT is
vulnerable to various attack scenarios. Despite these security mechanisms being
inefficient for low-power devices, MQTT’s standard security is SSL/TLS. DoS
attacks, which are a sort of MQTT protocol attack, have the potential to damage
the entire IoT infrastructure. This attack can cause serious effects, such as
data transmission interruptions, server inaccessibility, and tool monitoring in
real-time. Based on data from attacks on IoT systems in Indonesian oil services
organizations and data from prior studies, this research aims to find the most
accurate machine learning system. This method assumes that a stack of machine
learning algorithms can efficiently detect DoS attacks. According to the
findings, the stacked ensemble approach has a 99.6489 percent accuracy rate in
identifying attacks. We present a systematic approach for detecting attacks on
IoT platforms in this study. This paper’s approach is intended to serve as a
standard for detecting DoS in MQTT-based IoT systems. |
Keywords: |
IoT, MQTT, Machine learning, DoS attack, Stacked ensemble |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
USING DATA MINING TECHNIQUES TO MEASURE STUDENTS’ ACADEMIC PERFORMANCE AND THE
EFFECTIVENESS OF LEARNING METHODS: A LITERATURE REVIEW |
Author: |
MARYAM AHMAD, NOREEN IZZA ARSHAD, ALIZA BT SARLAN |
Abstract: |
Analyzing students' academic performance in online learning to improve the
overall quality and effectiveness of education has been one of the main focuses
of Higher Educational Institutions (HEIs). A practical analysis utilizing the
academic performance data to improve the quality of online learning has become a
vital issue urgently required to guide HEIs for the improvement of the academic
performance of students. The changes affected in the Covid-19 framework have
affected the academic performance of students and educators. This study aims to
summarize the various aspects of educational data mining and how it can be
utilized to improve the teaching process. Using EDM, the study analyzed
students' academic performance for the past five years. It focused on the
various learning methods that the students used. The study provided a detailed
analysis of the multiple attributes that influenced the students' academic
performance. We presented 12 out of 56 papers/documents that fit the inclusion
and exclusion criteria of students' academic performance based on the
educational setting. This study revealed that the most commonly used methods for
assessing students' academic performance are not done in the face-to-face
learning method. |
Keywords: |
Data Mining Techniques, Academic Performance, Attributes, Variables, Learning
Methods |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
AN ADAPTIVE EMERGENCY VEHICLE SMART TRAFFIC CONTROL SYSTEM |
Author: |
MOHAMED GAMAL, AMAL F. A. EL-GAWAD , AMANY ABDELSAMEA, ISRAA MOHAMED |
Abstract: |
This paper proposes an algorithm that efficiently handles the management of
emergency vehicles in a congestion area. The proposed approach utilizes the
Dijkstra algorithm to calculate the shortest possible path for the emergency
vehicle to reach its destination. The proposed approach uses smart detectors to
monitor and manage real-time traffic data. Aside from traffic flow
understanding, detectors can track vehicles IDs and prioritize emergency
vehicles. The paper introduces a flexible, adaptive, distributed traffic control
system that efficiently processes data collected from smart detectors to control
traffic signals in a way that minimizes emergency vehicle response time.
Experimental results show that our proposed approach outperforms the state-of-
the-art of the average response time and the routing of emergency vehicles in a
congestion area. |
Keywords: |
Traffic Signal; Emergency Vehicles; Smart City; Smart Traffic Management System |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
STEGANOGRAPHIC METHOD FOR RESERVING HIDDEN INFORMATION BASED ON EDGE EXTRACTION
OPERATORS |
Author: |
AYMAN M MANSOUR, NASHAT AL BDOUR |
Abstract: |
The paper investigates the steganographic method for introducing secret messages
into a container represented by the image. The research task is improving of the
reliability of message storage in the event of various image distortions after
transmission over a communication channel. To solve this problem, a preliminary
division of the container image in a form of sectors was used. In the developed
method, each sector is embedding the same secret message. The geometric shape of
each sector can be different, and it depends on the distribution of the selected
pixels into which the message is embedded. Pixel selection is carried out in
this paper using edge pixel selection operators in the image, such as: Roberts,
Sobel and Prewitt operators. For each container image, there is a different
distribution of the extracted pixels and a different number in each sector.
Therefore, the size of the secret message is limited to the sector in which the
smallest number of extracted pixels is present. The bits of the secret message
in each sector are distributed differently since the extracted pixels in each
sector differ in their location. In case of destruction of a part of the
container image, the secret message is saved in the remaining parts, which
include non-destroyed sectors. To embed bits, the shape of the initial
container, the geometric shape and location of the sectors, as well as the
method for extracting pixels is required to be known. The developed method was
tested using different images and the achieved performance was excellent with
accuracy 92%. |
Keywords: |
Steganography, Image, Container, Embedded Message, Edge Pixel Extraction
Operator. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
OLDER ADULT’S ACCEPTANCE OF ONLINE SHOPPING (DIGITAL MARKETING): EXTENDED UTAUT
MODEL WITH COVID 19 FEAR |
Author: |
BILAL ENEIZAN, FATHI ALSHARE, ODAI ENAIZAN, MARWAN AL-SALAYMEH, RA'D
ALMESTARIHI, ASHRAF SALEH |
Abstract: |
The present work aims to examine the factors that influence the online shopping
acceptance by older adults during pandemic in Jordan. The current study
employees the Unified Theory of Acceptance along with a new variable i.e.
COVID-19 fear. The study was conduct on a sample of 274 respondents from Jordan.
The data analysis was performed using the variance approach of SEM i.e. the
partial least square. The SmartPLS3 software was used for the validity check of
the model and analysing the path coefficients. The result shows that older
adults’ online shopping acceptance was significantly influenced by social
influence, performance expectancy, effort expectancy, facilitating conditions,
and COVID 19 fear. The research model found 76.2% of the variance in BI, which
influences five construct i.e. PE, EE, SI, FC, and covid 19 fear. Furthermore,
this study contributes to the literature in the context of validating a model of
the study that highlights the factor of acceptance of online shopping by older
adults in the context of the COVID-19 pandemic. |
Keywords: |
Older Adults, Online Shopping, Digital Marketing, UTAUT, COVID 19 Fear |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
COMPARISON OF VARIOUS CONDUCTION MODES FOR THREE-PHASE INVERTER |
Author: |
KRISMADINATA KRISMADINATA1, IRMA HUSNAINI1, ASNIL ASNIL1, REMON LAPISA, ROSLI
OMAR |
Abstract: |
The root mean square (RMS) and totol harmonic distortion (THD) percentage of
voltage and current generated by the inverter greatly determines the power
quality of the inverter. This paper recount to analysis theorical and
investigate the effect of different conduction modes on the power quality of a
three-phase voltage source inverter. The design and employment of an Arduino
based on the gate pulse generation technique to fire three-phase voltage source
inverter’s various conduction modes is also discussed. The firing of angles
comprising of 1200, 1800, and 1500 in conduction modes are comprised. The
studies of various waveforms output voltage generated from various conduction
modes, RMS voltage at fundamental frequencies, THD percentage are also included
in this paper. Matlab/Simulink software has been employed in order to validate
the proven of the theories. Moreover, this work, then verified through an
experimental prototype setup based on Arduino implementation. Finally, the
results of simulation are good argument with the experimental results. |
Keywords: |
Three-phase inverter, Conduction Mode, Fire of Angles, Arduino, THD |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
Title: |
AUTOMATED DETECTION OF DESTRUCTIVE CONTENTS ON THE INTERNET USING DATA MINING
AND MACHINE LEARNING METHODS |
Author: |
RYSKUL MEDETBEKOVA, ZLIKHA MAKHANOVA, BAYAN MYRZAKHMETOVA, AIGERIM TOKTAROVA,
AIGUL IMANBAYEVA, KADRZHAN SHIYAPOV, GULNARA SEIDALIYEVA, GAUKHAR SEIDALIYEVA,
NURBEK KONYRBAEV, RUSTAM ABDRAKHMANOV |
Abstract: |
In the context of ensuring the information and psychological security of
society, the problem of uncontrolled growth of destructive content on the
Internet is considered. Solving the problem of searching and identifying
destructive information requires a minimum degree of subjectivity and maximum
automation, since currently it is solved mainly by expert methods with the
compilation of registers of prohibited sources. The existing search methods
(expert processing, thematic search, intelligent data processing methods) used
to find specific words in the text are considered, the advantages and
disadvantages of these methods are noted. To solve this problem, methods of data
mining and machine learning are proposed to search for destructive content using
the example of profanity in textual information. The proposed approach is
distinguished by the possibility of self-completion of the dictionary by a
system based on the judgment of the identification of an unfamiliar word
classified as non-normative. The correctness of the dictionary replenishment is
measured using different metrics. A detailed description of this study is
presented, starting from data collection to classification and detection of
destructive content. An example of the algorithm and the initial results of its
testing are given. |
Keywords: |
Destructive Data, Security, Internet, Machine Learning, Detection, Natural
Language Processing. |
Source: |
Journal of Theoretical and Applied Information Technology
15th April 2022 -- Vol. 100. No. 07 -- 2022 |
Full
Text |
|
|
|