IJCT
- Volume 5, Issue 2 / March - April 2018
S.No
|
Title/Author Name
|
Serial No
|
1 |
Knowledge Management System in Rental Company with Socialization, Externalization, Combination, Internalization Method Case Study: PT Surya Sudeco
- Erick Indra Tara, Diky Wardhani, Sofian Lusa
10.29126/23942231/IJCT-V5I2P1
Abstract
Knowledge in an organization is an important thing to anticipate competition with business opponents. At this time, PT Surya Sudeco already have a way to transfer knowledge. However, to manage organizational knowledge, several problems found. First, no distinction found between obsolete forms and new forms that should be used in a corporate environment that will cause a repetitive job such as reprinting and collecting signatures. Second, urgent tasks could be delayed, due to employees’ permission / leave. Third, the occurrence of knowledge walkout. Fourth, centralized storage of knowledge-based assets is not found. Fifth, an occurrence of repeating mistakes, which should be avoided. The authors propose a prototype of knowledge management system (KMS) with nonaka model, socialization, externalization, combination, internalization (SECI) to convert knowledge from tacit to explicit and the other way around. The prototype method is used for this software development process. Sample collection techniques, questionnaires and interviews will be used for collecting data. This research has been tested by using user acceptance test (UAT), and the test results get a percentage of 82.5% which means the system is acceptable and as expected. Keyword: SECI, Knowledge Management System, UAT, Nonaka, Surya Sudeco. × Erick Indra Tara, Diky Wardhani, Sofian Lusa," Knowledge Management System in Rental Company with Socialization, Externalization, Combination, Internalization Method Case Study: PT Surya Sudeco" Vol. 5 - Issue 1 (1-15) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P1 |
2 |
Optimization Online Analytical Processing (OLAP) Data Sales Door Case Study CV Adilia Lestari
- Setiawansyah, Ayi Bayyinah, Nuroji.
10.29126/23942231/IJCT-V5I2P2
Abstract
Sales transaction data in the sales division related to sales data goods so large and many that require large storage media and difficult to process these data for the preparation of reports used by management for decision making. Online Analitycal Processing (OLAP) is a method of approach to present the answers to the demand for a rapidly dimensional analysis process, ie the design of applications and technologies that can collect, store, manipulate a multidimensional data for analyst purposes. OLAP is part of a more global category of business thinking, which also summarizes the relationship between reporting and data mining. Use of this prototype helps executive informations system in generating monthly goods sales report that is 0,022259399998 sec, sales report top 10 that is 0,0223899998998 second, sales report down 10 that is 0,0210279999301 second, report sales by province that is 0,0399869999535 second, report Sales by district are 0.0133039000143 seconds. So it can help generate reports faster sales data and compliance report generated from the resulting prototype has in common with the existing report format so that the prototype is right in generating the report. OLAP technology can facilitate stakeholders in making decisions based on existing transactional data because OLAP will display data from various sides or multidimens. Keyword: Data Warehouse, Online Analitycal Processing, Extraction, Transformation, Loading. × Setiawansyah, Ayi Bayyinah, Nuroji,"Optimization Online Analytical Processing (OLAP) Data Sales Door Case Study CV Adilia Lestari" Vol. 5 - Issue 2 (16-22) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P2 |
3 |
Design Model of Payroll System Integrated with Attendance System at PT. XYZ
- Sulis Sandiwarno.
10.29126/23942231/IJCT-V5I2P3
Abstract
Utilization of Information Technology (IT) is now entered in a very good condition that can be used in every aspect of life. Utilization of good IT will generate benefits for its users in utilizing IT. As well as in the field of employee payroll information systems are needed in every company, by utilizing IT media companies will be faster in processing data and generate payroll reports are also fast. However, although much work can be done by using computers, especially the internet at this time is not entirely the company still using the manual system. Thus, with the purpose of facilitating the application of IT media required a system to be integrated into the company level. In order for payroll data processing system employees can be done well, then the software development process is based on the correct software system and by going through the process of analysis and design of an object-oriented system. The hope of this study is to provide convenience for companies in performing payroll data processing employees. Keyword: Payroll, attendance, UML (Unified Modeling language), useful for users. × Sulis Sandiwarno,"Design Model of Payroll System Integrated with Attendance System at PT. XYZ" Vol. 5 - Issue 2 (23-27) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P3 |
4 |
Design Model of Booking Rooms and Ship for Trip to Island XYZ
- Sulis Sandiwarno.
10.29126/23942231/IJCT-V5I2P4
Abstract
Utilization of Information Technology (IT) has now reached a good stage. Utilization of IT is encouraging companies to use the system used to facilitate the work. Companies use IT as a means of disseminating information to their recipients. The recipient of the current information wants all access information to be viewed online, so without having to open print media they can receive information. From some case studies there are still many travel booking service providers for tourism that have not utilized IT yet, in the absence of a medium that provides online booking services will have an impact on the difficulty level of users in booking tickets. In this study see the opportunity of IT utilization on service providers to users, for example in a trip to the island of XYZ using tourism travel booking system online. Looking at the concept of online ordering, the method used is based on the relationship between the user and the system described in OOAD (Object Oriented Analysis Design). The ultimate goal of this research is to hope that online tourism travel reservations are expected to facilitate users in utilizing IT. Keyword: IT, reservations, tourism, OOAD, facilitate users. × Sulis Sandiwarno,"Design Model of Booking Rooms and Ship for Trip to Island XYZ" Vol. 5 - Issue 2 (28-32) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P4 |
5 |
SAware: Sensor-based Context Awareness for Smartphone Access Control
- Minqiang Deng
10.29126/23942231/IJCT-V5I2P5
Abstract
In this paper, we proposed a sensor-based context aware-ness system for access control of smarphone, named SAware. With sensors analysis and inferring, such as Wi-Fi-based and GPS-based location,SAware system can locate the coarse locations of user holding the smartphone during identity verification or data/application access control.Based on predefined role-based access control policies, SAware grandsthe user with corresponding authorization, such as reading, writing orpriority. In order to evaluate proposed SAware system, we implementedour experiments on Android mobiles (i.e., Google Nexus 5X). Experimental results show that proposed SAware system is efficiency, security,and valuable for user access control. Keyword: Access Control, Context Aware, Smartphone, Cloud Computing. × Minqiang Deng,"SAware: Sensor-based Context Awareness for Smartphone Access Control" Vol. 5 - Issue 2 (33-39) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P5 |
6 |
Consumer Behaviour Marketing Analysis Using Data mining Concepts
- G.Silambarasan, P.Santhosh Raj
10.29126/23942231/IJCT-V5I2P6
Abstract
The aim of marketing Nowadays, it is important to understand the interests of each customer to make the relationship between the customer and the merchant easier. By studying the purchases made by customers, companies can create campaigns and promotions based on their profile, avoiding that they receive unnecessary notifications [1]. Companies are using data mining to extract knowledge which helps marketers in creating custom services for certain customers based on their interests [2], and thus, the use of data mining techniques is important to create efficient marketing campaigns [3]. The use of data mining allows the extraction of potentially interesting patterns or information from large amounts of data. It is used by several types of companies and organizations with different purposes: marketing, finance, communication, among others. The use of these techniques also has several objectives, such as, sales behavior, customer satisfaction and corporate profits. Thus, data mining helps companies make better decisions [1]. In order to allow an efficient usage of Data Mining techniques on activities of different sectors, some methodologies have been defined. Cross-Industry Standard Process for Data Mining (CRISPDM) is one of them, and contains six topics: business understanding, data understanding, data preparation, modeling, evaluation and deployment .that time my paper developing to customer like lot of products and thinks people look very fashion moments for (eg) dress, bag, food, jewelry, baby goods etc. Still very viral looking for mobile phone usages that one all empire in the world. How to people share the feedbacks and cluster at working with usage Smartphone usages for all age for. Reports and company maintain the consumer data base then how to improve the customer touch points find out the A brand is defined as “a name, term, sign, symbol or special design or some combination of these elements that is intended to identify the goods or services of one seller or a group of sellers by usages of new idea methodology for data mining concepts. Keyword: Mining, Consumer. × G.Silambarasan, P.Santhosh Raj,"Consumer Behaviour Marketing Analysis Using Data mining Concepts" Vol. 5 - Issue 2 (40-43) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P6 |
7 |
Techniques for Extending Computation and Resources in Mobile Devices
- Mr.S.Jagadeesan, G.Nandhini
10.29126/23942231/IJCT-V5I2P7
Abstract
The project contains options to synchronize the offline folder contents to the web. The word documents, excel worksheets and other files can be selected and uploaded to the web application. In addition, they can be converted into bytes and saved in the database provided in the web server location. In any place, the administrator can view the contents in the server, select a file and download to the system wherever the administrator is working. the files can be uploaded from the web page also. The windows application can be used to download the content from the web site to the local machine. Thus the application synchronizes the web content and windows content. The application acts like content storage as well as document version manager. Like wise, all the documents are stored in database also with the name, the system from which it is uploaded, the data and time of uploading as well as the original file copy is also kept in the server. The files uploaded from the system in remote places other than the local office if presents in the web site, then the administrator can be intimated such that some files present in the web site is not downloaded to the local system. This helps the administrator to synchronize the document efficiently. Keyword: Mobile ad hoc networks (MANETs), certificate revocation, security and threshold. × Mr.S.Jagadeesan, G.Nandhini,"Techniques for Extending Computation and Resources in Mobile Devices" Vol. 5 - Issue 2 (44-53) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P7 |
8 |
Credit Card Nearest Neighbor Based Outlier Detection Techniques
- Mrs.C.Navamani, S.Krishnan
10.29126/23942231/IJCT-V5I2P8
Abstract
Popular payment mode accepted both offline and online is credit card that provides cashless transaction. It is easy, convenient and trendy to make payments and other transactions. Credit card fraud is also growing along with the development in technology. It can also be said that economic fraud is drastically increasing in the global communication improvement. It is being recorded every year that the loss due to these fraudulent acts is billions of dollars. These activities are carried out so elegantly so it is similar to genuine transactions. Hence simple pattern related techniques and other less complex methods are really not going to work. Having an efficient method of fraud detection has become a need for all banks in order to minimize chaos and bring order in place. There are several techniques like Machine learning, Genetic Programming, fuzzy logic, sequence alignment, etc are used for detecting credit card fraudulent transactions. Along with these techniques, KNN algorithm and outlier detection methods are implemented to optimize the best solution for the fraud detection problem. These approaches are proved to minimize the false alarm rates and increase the fraud detection rate. Any of these methods can be implemented on bank credit card fraud detection system, to detect and prevent the fraudulent transaction. Keyword: Classification, Fraud Detection, K-Nearest Neighbor Algorithm, Outlier Detection. × Mrs.C.Navamani, S.Krishnan,"Credit Card Nearest Neighbor Based Outlier Detection Techniques" Vol. 5 - Issue 2 (54-60) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P8 |
9 |
Detecting Malware and Searching Rank Fraudulent Behavior In Google Play
- Mr.S.Jagadeesan, B.VishnuVarthini
10.29126/23942231/IJCT-V5I2P9
Abstract
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps subjected to search rank fraud. FairPlay correlates review activities and uniquely combines detected review relations with linguistic and behavioral signals gleaned from Google Play app data (87 K apps, 2.9 M reviews, and 2.4M reviewers, collected over half a year), in order to identify suspicious apps. FairPlay achieves over 95 percent accuracy in classifying gold standard datasets of malware, fraudulent and legitimate apps. We show that 75 percent of the identified malware apps engage in search rank fraud. FairPlay discovers hundreds of fraudulent apps that currently evade Google Bouncer's detection technology. FairPlay also helped the discovery of more than 1,000 reviews, reported for 193 apps, which reveal a new type of “coercive” review campaign: users are harassed into writing positive reviews, and install and review other apps. Keyword: Android market, search rank fraud, malware detection. × Mr.S.Jagadeesan, B.VishnuVarthini,"Detecting Malware and Searching Rank Fraudulent Behavior In Google Play" Vol. 5 - Issue 2 (61-73) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P9 |
10 |
Enhancement and Performance Analysis of VoIP Algorithms in Wireless Networks
- Maghrib Abidalreda Maky Alrammahi, Haider Abdul Hassan Hadi Al Kim
10.29126/23942231/IJCT-V5I2P10
Abstract
Voice over Internet Protocol (VoIP) is currently one of the fastest spreading telephone technologies. In recent years, VoIP has been widely used in wired and wireless networks because of its compatibility with and adoption in IEEE 802.11 devices. This technology works in the second layer of data link layer, and thus, is compatible with the carrier-sense multiple access with collision avoidance protocol (CSMA/CA), which works in IEEE 802.11 networks. The operation of this protocol depends on various algorithms, including the distributed coordination function (DCF) algorithm. This algorithm is governed by the transmission of packets at any time without considering the priorities of other stations. A collision of packets may occur when transmitting simultaneously with the rest of the stations. Another algorithm is the enhanced distributed channel access (EDCA), which sets a priority when sending packets between stations. Thus, if more than one station is transmitting simultaneously, then one of the stations will have higher priority and the remaining stations in the transmitter will have to wait depending on the order of priority. Consequently, collisions do not occur. In this regard, EDCA is better than DCF. The parameters of these algorithms are modified to produce a new algorithm, called M_EDCA. The three algorithms are applied using a simulation program, i.e. OPNET. The final results are obtained, and the results of the new algorithm are compared with those of the existing algorithms. The best results are achieved using the new algorithm, and consequently, the best voice quality in transmission and reception, and the best performance and service in VoIP applications. Keyword: Voice over Internet Protocol (VoIP), Contention Window (CW), Distributed Coordination Function (DCF), Enhanced Distributed Channel Access (EDCA), OPNET. × Maghrib Abidalreda Maky Alrammahi, Haider Abdul Hassan Hadi Al Kim,"Enhancement and Performance Analysis of VoIP Algorithms in Wireless Networks" Vol. 5 - Issue 2 (74-82) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P10 |
11 |
Multilevel Security for Data as a Service (Spacebox) Using Cryptography
- Prof. Sachin H. Darekar, Sayali Zende, Prerana Pawar, Akanksha Pinglaskar
10.29126/23942231/IJCT-V5I2P11
Abstract
The management of human resource development in K sofware house is done in several ways, starting from new recruitment process, employee training, employee placement, employee development, and employee retention. After the training process, the following issues were found: First, the lack of enthusiasm of experienced senior employees on issues facing new employees. Second, after 1 week of basic training, the challenge faced by the new employee was identified and the impact of client satisfaction was not achieved. And finally, K does not yet have the media to share knowledge. The results of the model research yield the priority of making KMS prototype, such as: background of dominant white website, dominant black base font, preferably available dashboard menu, input your knowledge, approval knowledge, graphics, dominant head blue sea, black dominant menu, sea. The test result using UAT stage 75% with good result. This result is seen based on the criteria of functionality related to menu availability and recording employee knowledge. Menu related efficiency based on authorization level, and ease of progress update knowledge, interesting presentation of graph reports and easy access to various platforms. Keyword: Knowledge Management System, Model Quality Function Deployment, User Acceptance Test. × Prof. Sachin H. Darekar, Sayali Zende, Prerana Pawar, Akanksha Pinglaskar,"Multilevel Security for Data as a Service (Spacebox) Using Cryptography" Vol. 5 - Issue 2 (83-85) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P11 |
12 |
Prototype Knowledge Management System with Quality Function Deployment Method: a Case Study at K Software House
- Tutik Lestari, Sofian Lusa, Arni Retno Mariana, Nunung Nurmaesah
10.29126/23942231/IJCT-V5I2P12
Abstract
There Abstract- cryptanalyst are professional in how to fracture the encryption techniques. We require securing our programs and documents from cryptanalyst. Security of information means protecting data from unauthorized right to use in cloud environment. There are many techniques to reach the security of information from unauthorized entrance. There are two cryptographic techniques used for data encryption which are symmetric and Asymmetric techniques. Symmetric key encryption algorithms are computationally fast compared to asymmetric encryption algorithms (Like RSA). However, since the identical secret key is used for symmetric encryption and decryption, we have the crisis of securely distributing that secret key. Asymmetric key infrastructure in PKI does not rely on circulation of any private key. However, the familiar asymmetric algorithms are used for bulk encryption with recent computation capability. While SHA is collision resistant to a variety of block cipher algorithms. Thus for superior security performance, we propose a system which would integrate the advantages of these algorithms namely SHA, RSA which will be a hybrid approach of encrypting data. SHA is adopted in this mechanism to verify the integrity of the significance. Three major security principle such as authentication, confidentiality and integrity are achieved together using this method. Keyword: - - -. × Tutik Lestari, Sofian Lusa, Arni Retno Mariana, Nunung Nurmaesah,"Prototype Knowledge Management System with Quality Function Deployment Method: a Case Study at K Software House" Vol. 5 - Issue 2 (86-91) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P12 |
13 |
Machine Learning for Real Estate Contracts – Automatic Categorization of Text
- B.Gayathri, Prof.Kanchana Devi.V
10.29126/23942231/IJCT-V5I2P13
Abstract
This paper explains the generic strategy for automatic text classification and analyses existing solutions to major issues such as dealing with unstructured text, handling large number of features and selecting a machine learning technique appropriate to the text-classification application. This paper entitled as “machine learning for real estate contracts-Automatic text categorization“ is used to categorize the lease documents automatically as per the real estate terminologies using the concept of Natural language Processing(NLP). NLP is a field of computer science, Artificial Intelligence and computational linguistic concerned with the interactions computers and human. NLP has various concepts and this project uses the concept of “Text classification”. The Automatic categorization of text tool will consume an API which performs the text classification or categorization. Keyword: Artificial Intelligence, Machine Learning, Text classification,Automatic text categorization,Natural Language Processing(NLP).. × B.Gayathri,Prof.Kanchana Devi.V"Machine Learning for Real Estate Contracts – Automatic Categorization of Text" Vol. 5 - Issue 2 (92-97) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P13 |
14 |
Review Mining and Summarization
- G.Ezhilarasi, S.Manivelan
10.29126/23942231/IJCT-V5I2P14
Abstract
Probabilistic aspect mining model (PAMM) is one of the most important issues in the assessment of drug safety. In fact, many adverse drug reactions are not discovered during limited pre-marketing clinical trials; instead, they are only observed after long term post-marketing surveillance of drug usage. In light of this, the detection of adverse drug reactions, as early as possible, is an important topic of research for the pharmaceutical industry. Recently, large numbers of adverse events and the development of data mining technology have motivated the development of statistical and data mining methods. These stand-alone methods, with no integration into knowledge discovery systems, inconvenient for users and the processes for exploration are time-consuming. This paper proposes an interactive system platform for the detection of PAMMs. This reduces the chance of having aspects formed from mixing concepts of different classes; hence the identified aspects are easier to be interpreted by people. The aspects found also have the property that they are class distinguishing:- they can be used to distinguish a class from other classes. Keyword: PAMM, Data mining, key process. × G.Ezhilarasi, S.Manivelan, "Review Mining and Summarization" Vol. 5 - Issue 2 (98-101) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P14 |
15 |
A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique
- G.Gayathri, A.Soundarrajan
10.29126/23942231/IJCT-V5I2P15
Abstract
This paper explains the generic strategy for automatic text classification and analyses existing solutions to major issues such as dealing with unstructured text, handling large number of features and selecting a machine learning technique appropriate to the text-classification application. This paper entitled as “machine learning for real estate contracts-Automatic text categorization“ is used to categorize the lease documents automatically as per the real estate terminologies using the concept of Natural language Processing(NLP). NLP is a field of computer science, Artificial Intelligence and computational linguistic concerned with the interactions computers and human. NLP has various concepts and this project uses the concept of “Text classification”. The Automatic categorization of text tool will consume an API which performs the text classification or categorization. Keyword: Artificial Intelligence, Machine Learning, Text classification,Automatic text categorization,Natural Language Processing(NLP).. × G.Gayathri, A.Soundarrajan"A Novel Way of Deduplication Approach for Cloud Backup Services Using Block Index Caching Technique" Vol. 5 - Issue 2 (102-104) - March - April 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × |
IJCT-V5I2P15 |