Results (189)
Search Parameters:
Keyword: SecurityFactors Affecting Behavioural Intention to Shop in Self-Service Retail Case Study: JD.ID X Mart
This paper aims to measure the acceptance level of Indonesian customers to JD.ID X retail and to reveal the driving factors of behavioral intention to shop at the retail. JD.ID X is new retail that implements a new shopping technology called Just walk-out technology (JWOT) also known as retail without a cashier. JWOT is one…
Read MoreBlockchain Technology-Based Good Distribution Practice Model of Pharmacy Industry in Indonesia
Distribution is the main activity in integrated product supply chain management. In the pharmaceutical industry, the process of drug distribution is important because of the handling, storage, and distribution of medicinal products with good standards and quality. The problem that occurs in the pharmaceutical industry is the circulation of counterfeit drugs by related parties, for…
Read MoreHow Ready is Renewable Energy? A Review Paper on Educational Materials and Reports Available for the Teaching of Hydrogen Fuel Cells in Schools
Today, the costs of most Renewable Energy (RE) technologies especially hydrogen energy technologies such as fuel cells, are still beyond the means of poorer economies in developing countries. Hence, there is little public awareness and local expertise in RE in these countries and even lesser in hydrogen energy. To solve this problem, it is important…
Read MoreAn Operational Responsibility and Task Monitoring Method: A Data Breach Case Study
As a result of digitalization, services become highly dependent on information systems thus increasing the criticality of security management. However, with system complexity and the involvement of more human resources, it becomes more arduous to monitor and track tasks and responsibilities. This creates a lack of visibility hindering decision making. To support operational monitoring, we…
Read MoreOptimized use of RFID at XYZ University Library in Doing Auto Borrowing Book by Utilizing NFC Technology on Smartphone
NFC (Near Field Communication) is a contactless communication technology based on a radio frequency (RF) field using a base frequency of 13.56 MHz. NFC technology is perfectly designed to exchange data between two devices via simple touch gestures. RFID is the process of identifying an object directly by radio frequency. There are two important components…
Read MoreWaste To Energy Feedstock Sources for the Production of Biodiesel as Fuel Energy in Diesel Engine – A Review
In the recent past, there has been a renewed shift into biomass and other recycled waste sources for biodiesel production and utilization. This is a critical area of research and study in which this present work intends to review and identify gaps in literature by shifting the focus of review to non-plant based sources for…
Read MoreMathematical Modelling of Output Responses and Performance Variations of an Education System due to Changes in Input Parameters
“This paper is an extension of work originally presented in the 4th International Conference on Systems of Collaboration, Big Data, Internet of Things & Security -SysCoBIoTS’19”. The use of complex and dynamic systems modelling to social systems is quite recent and its pertinence in the case of an educational system is continually increasing. For the…
Read MoreModified Blockchain based Hardware Paradigm for Data Provenance in Academia
Educational organizations often need to distribute academic transcripts and certificates upon student’s request since they are mandatory for admission into new scholarly programs including placement activities. Manual procedures involved with the transmission process of academic document is indeed a tedious task that results in substantial overhead. Thus the necessity for an autonomous electronic system for…
Read MoreA Computational Modelling and Algorithmic Design Approach of Digital Watermarking in Deep Neural Networks
In this paper we propose an algorithmic approach for Convolutional Neural Network (CNN) for digital watermarking which outperforms the existing frequency domain techniques in all aspects including security along with the criteria in the neural networks such as conditions embedded, and types of watermarking attack. This research addresses digital watermarking in deep neural networks and…
Read MoreTime Granularity-based Privacy Protection for Cloud Metering Systems
Due to the advent of cloud computing and Internet of Things, smart meters have become a crucial part of smart cities. Smart meters generate vast amounts of fine-grained data that can immediately provide useful information to electricity consumers, such as automatic billing, load monitoring, and dynamic time pricing. This will make the electricity consumers more…
Read MoreTowards a Documents Processing Tool using Traceability Information Retrieval and Content Recognition Through Machine Learning in a Big Data Context
In 1980, an application was developed to track, manage and store documents in electronic format. Scan technology has enabled organizations to digitize papers for easier document storage and tracking. Document management tools have since developed by introducing new functionalities, related to security, users services, workflow and audit. Our research is part of the context of…
Read More5G, Vehicle to Everything Communication: Opportunities, Constraints and Future Directions
The 5G, as a new source of telecommunication infrastructure technology, has attracted many stakeholders to promote the progress of its standards and the development of its technology industry. The 5G reinforces new technologies and delivers vehicles for everything services (V2X) to drivers and passengers. It also offers several advantages. On the other hand, due to…
Read MoreMobile Money Wallet Attack Resistance using ID-based Signcryption Cryptosystem with Equality Test
This paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto- graphic method proposed by Alornyo et al. resisted the service provider from peddling with users data for economic gains. Our improved scheme achieves a…
Read MoreHand-Based Biometric Recognition Technique – Survey
In today’s modern world, reliable automatic personal recognition is a crucial area of discussion, primarily because of the increased security risks. A large number of systems first require the recognition of a person before they can access their services. Biometric recognition can be used, which can be understood as automatic identification or automatic verification of…
Read MoreDense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone
The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…
Read MoreIT GRC Smart Adviser: Process Driven Architecture Applying an Integrated Framework
This article is a continuation of the work presented in the Third World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). In this version we focus on matching IT and business processes from different management levels by using IT-Governance (ITG) Risk and Compliance frameworks in a smart way. In fact, every information system…
Read MoreEffective Segmented Face Recognition (SFR) for IoT
Face recognition technology becoming pervasive in the fields of computer vision, image processing, and pattern recognition. However, face recognition accuracy rates will decrease if training is done on disguised images with covered objects on a face area. This paper aims to propose a state-of-the-art face recognition methodology which could be applied in Internet of Things…
Read MoreAn Overview on CryptDb and Word2vec Approaches
Big data is a vast data set that was used in many areas. Online applications are subject to theft of confidential information because opponents can exploit software errors to access private data, and because curious or malicious officials can capture and lose data. CryptDB is a functional system that provides security and confidentiality through a…
Read MorePrototype for the Management of Engineering Companies and the ICT to Improve the Quality of Services
Information on alternative technologies or new prototypes was analyzed to help improve the quality of business management services. The problem is the lack of application of new technologies that improve the quality of service and reduce disagreements in the management of organizations. The objective is to present a prototype for the management of engineering and…
Read MoreComparative Study of Cryptocurrency Algorithms: Coronavirus Towards Bitcoin’s Expansion
The widespread presence of Coronavirus (COVID-19) is causing organizations and individuals major economics downsizing. The way this virus is transmitted from one individual to another is the real cause of the problem. For that, researchers in different fields started seriously looking for touch-less and contact-less exchange. Particularly in the finance world, cash transactions and keypad…
Read MoreFactors Influencing the Intention to Use Technology Services to Implement Self-Service Technology Case Study: Situation Pandemic Covid-19
This study aims to analyze a person’s intention in using self-service technology (SST) services during the pandemic COVID-19. Where this time, raising problems one of the social distancing that affects a service provided, especially on services that use technology that applies SST. This study develops from previous research where the customer has satisfaction in using…
Read MoreA Smart Updater IT Governance Platform Based on Artificial Intelligence
This Information technology (IT) has a crucial role to improve business processes in companies. Getting the best technologies rapidly becomes as significant as understanding and developing the business plan of organizations. Thus, different IT best practices and norms are used by companies to help their services and IT business. These standards are set of best…
Read MoreExploring the Performance Characteristics of the Naïve Bayes Classifier in the Sentiment Analysis of an Airline’s Social Media Data
Airline operators get much feedback from their customers which are vital for both operational and strategic planning. Social media has become one of the most popular platforms for obtaining such feedback. However, to analyze, categorize, and generate useful insight from the huge quantity of data on social media is not a trivial task. This study…
Read MoreCitizen Behavior: The Evaluation of Complaint Application that Connected to Smart City
SIARAN is application which is created by Government of South Tangerang City, Indonesia. The application is e-government services social media based. It is designed for citizens to be able to report problems that occur around South Tangerang City. The research was conducted to find out the factors that affect the intention of SIARAN’s users. The…
Read MoreDegradation Process in Pipeline and Remaining Useful Lifetime Estimation Based on Extended Kalman Filtering
Degradation measurements are often treated and analyzed for improvement the reliability of system. Our objective in this paper is to study a class of non linear systems, whose dynamics and observations are non linear functions of the state. Obviously, we develop an Extended Kalman Filtering (EKF) algorithm for detecting the additive failures in a two…
Read More
