IJCT - Volume 5, Issue 6 / November- December 2018
S.No
|
Title/Author Name
|
Serial No
|
1 |
Credit Scoring Using Fuzzy AHP Method: Case Study PT. Batavia Prosperindo Finance TBK
- Nikko Chandra, Muhammad Fauzan Nur, Nano Pramono Soeryonegoro, Doni Tamzil
10.29126/23942231/IJCT-V5I6P1
Abstract
The rapid technological advances in the automotive industry make the manufacturers and distributors of motor vehicles competing strictly. Purchase on credit is one solution that can help consumers to make purchases of the dream vehicle. This is a good news for lenders to be able to attract more debtors. However, if the lenders do not analyze the prospective borrowers carefully, it will result in a significantly higher Non Performing Loan (NPL) ratio. If this happens, most likely the credit companies will suffer huge losses. To suppress the NPL ratio requires an appropriate method to analyze consumers who apply for credit. One method that can be solve the problem is Credit Scoring. Credit Scoring is an analytical method used by banks in analyzing credit applications proposed by customers. The Credit Scoring method conducted at PT Batavia Prosperindo Finance Tbk still lacks efficiency. To solve this inefficient process, a Credit Scoring model was developed based on the Fuzzy AHP method that aims to assist lenders in making decisions whether or not a customer obtains credit. Credit Scoring based on Fuzzy AHP method is expected to be the right solution for PT Batavia Prosperindo Finance Tbk in making decision. With this Decision Support System Credit Approval, approval process at PT Batavia Prosperindo Finance to be faster than before based on UAT score 92%. Keyword: Credit Scoring, Credit Analysis, Fuzzy AHP, Ratio Non Performing Loan, PT Batavia Prosperindo Finance Tbk. Nikko Chandra, Muhammad Fauzan Nur, Nano Pramono Soeryonegoro, Doni Tamzil "Credit Scoring Using Fuzzy AHP Method:Case Study PT. Batavia Prosperindo Finance TBK" Vol. 5 - Issue 6 (01 - 06) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P1 |
2 |
Camera Administration Information System Using Rapid Application Making Method (Rad): Soca Kamera Case Study
- Arif Komarudin, Beni Sungkawa, Hendi Supriatna, Mohammad Syafrullah
10.29126/23942231/IJCT-V5I6P2
Abstract
Camera is a fairly developed business, realizing that every businessman is trying to carry out an innovation so that the customer is not left behind. Recognizing that the camera rental business is very appropriate to do because in Pandeglang has many tourist attractions that are used as vacation spots by tourists so that every tourist will capture his visiting moments. For that entrepreneurs must be able to make a camera leasing administration information system that can support the performance of entrepreneurs so that they can assist transactions. In making this administrative information system using the rapid application development (RAD) method, it was chosen because it has a level of speed in completing a system. for testing the system itself using a black box test, and to determine the level of user acceptance of the system built using user acceptance testing (UAT). The results obtained in this study are very satisfying because of the five variables showing a number of not less than 80% which indicates that respondents strongly agree in the design of the administrative information system for camera rental services. Keyword: Black box test, user acceptance testing (UAT), Information Systems, respondents. Arif Komarudin, Beni Sungkawa, Hendi Supriatna, Mohammad Syafrullah "Camera Administration Information System Using Rapid Application Making Method (Rad): Soca Kamera Case Study" Vol. 5 - Issue 6 (07 - 11) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P2 |
3 |
A Study of Robotic Process Automation Use Cases Today for Tomorrow's Business
- Yuvaraja Devarajan
10.29126/23942231/IJCT-V5I6P3
Abstract
Historically,most of the companies across various industry domains,implemented multiple IT tools and processes (workflows), that often had a mix of automated and manual steps. These manual steps performed across these industries constantly required lot of manpower, generated human errors, reduced employee motivation due to mundane repetitive tasks, degraded productivity, increased operational expenses etc. The automated steps performed, had its own downside due to the implementation of multiple IT automation solutions adding up license/development/maintenance cost, increased integration timelines, continuous patching of code to accommodate underlying business logic changes. Businesses today and over the years had been constantly looking for IT solutions that could holistically augment their user’s performance improving customer satisfaction, increase productivity and quality, reduce costs etc. Robotic Process Automation (RPA) has recently emerged as a game-changing technology outperforming multiple solutions that evolved from Business Process Management (BPM) industry over the decades. Robotic Process Automation, since its inception, due to its capability to automate rudimentary rules-based tasks that are repetitive and manual, found its way across multiple industry domains, extending the use cases and continuing to evolve with business requirements. This paper study RPA’s application across various industry domains, benefits of RPA, and future of RPA. Keyword: Robotic Process Automation, RPA,Cognitive Automation. Yuvaraja Devarajan "A Study of Robotic Process Automation Use Cases Today for Tomorrows Business" Vol. 5 - Issue 6 (12-18) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P3 |
4 |
Analysis of Security Vulnerability Assessment in Web Application Environment Using Common Vulnerability Scoring System Method
- Faisal Ashari Firmansyah, Syaeful Machfud, Zaqi Kurniawan, Ikhsan Rahdiana, Ahmad Jurnaidi Wahidin
10.29126/23942231/IJCT-V5I6P4
Abstract
The development of this increasingly advanced era, many companies spend all means to be able to improve security on the side of the system used, the increasing crime in the digital world, one of which is cyber crime such as hacking activities. In order to maintain security in the data, the company needs to test the security of the information system, one of which is by testing the penetration testing. Security vulnerability in a web application system cannot be denied because the web is generally dynamic and accessible to the public, therefore penetration testing is needed to test the extent to which the security level in the system is running. The analysis of security vulnerability assessment in the Web Application Environment in this study uses the Common Vulnerability Scoring System (CVSS) with penetration testing as a testing technique, with the aim of measuring the level of vulnerability in a Common Vulnerability Scoring System (CVSS) system. found that it can be improved its vulnerability level, in this study found at the level of high vulnerability obtained the value of 8.50 using two tools namely nessus and acunetix with the method of penetration testing results obtained have similar vulnerability levels and the findings of vulnerability can be calculated manually using the Common Vulnerability Scoring System (CVSS). Keyword: CVSS, Vulnerability Assessment, Penetration Testing, System Security, System Vulnerabilities. Faisal Ashari Firmansyah, Syaeful Machfud, Zaqi Kurniawan, Ikhsan Rahdiana, Ahmad Jurnaidi Wahidin "Analysis of Security Vulnerability Assessment in Web Application Environment Using Common Vulnerability Scoring System Method" Vol. 5 - Issue 6 (19-24) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P4 |
5 |
Prototype of Development of Inventory Asset Information System for Project Management Company Using the Success Delone and Mclean Model Approach: Case Study Pt. Indosat Ooredoo TBK
- Intan Murniasih, Firdha Aprilyani
10.29126/23942231/IJCT-V5I6P5
Abstract
Asset Inventory company which is a basic facility for employees to carry out their daily work. Very large number of devices more than 1000 devices. At this time, the process of distributing device devices used by employees is still not good, because there are still frequent delays in device delivery and control of usage, maintenance of these devices. In every year there is always a system of changing devices (device updates). This has caused the asset and IT admin difficulties in carrying out their work, and makes manual recording an alternative. To improve the Asset Inventory Management system process that has been running all this time, it is necessary to develop a new inventory asset system, which is expected to be able to assist the management activities of the company's inventory assets up to its implementation. The development of the new information system Asset Inventory Management will be made with a prototype and measurement model or testing the success model of Delone and McLean (2003). Keyword: Asset Inventory, Information System, Delone and McLean, Prototype Model. Intan Murniasih, Firdha Aprilyani "Prototype of Development of Inventory Asset Information System for Project Management Company Using the Success Delone and Mclean Model Approach: Case Study Pt. Indosat Ooredoo TBK" Vol. 5 - Issue 6 (25-33) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P5 |
6 |
Decision Support System As A Method Of Determining Feasibility Of Debitural Candidates For Motorcycle Credit Using Naive Bayes Classifier Methods (Study Case : FIF Group Cabang Ciledug)
- Noviana Pratiwi, Muhammad Haikal Al Wahaby, Dr. Krisna Adiyarta M
10.29126/23942231/IJCT-V5I6P6
Abstract
PT. Federal International Finance (FIF Group) is a group of companies engaged in consumer financing. FIF Group serves financing primarily for retail financing and electronic products. Considering that there are a large number of participants in applying for credit every day, as well as various types of debtor candidates, it requires a system that can handle the issue of evaluating eligibility in applying for credit. One of the factors that causes long-term decision-making activities is in the presentation of data obtained from credit administration activities presented in qualitative form. In this study contains a classification system of risk classes in prospective candidates in submitting motorbike credit using the Naïve Bayes Classifier method. The method is a method of approach to probability in producing a classification for determining a possible grade in an object. From the results of the research that has been done, it is hoped that it can help the company work on the part of credit analysts in selecting prospective borrowers. Keyword: Credit, Risk Class, Classification, Naïve Baiyes Classifier, Decision Support System. Noviana Pratiwi, Muhammad Haikal Al Wahaby, Dr. Krisna Adiyarta M "Decision Support System as A Method Of Determining Feasibility Of Debitural Candidates For Motorcycle Credit Using Naive Bayes Classifier Methods (Study Case: FIF Group Cabang Ciledug)" Vol. 5 - Issue 6 (34-42) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P6 |
7 |
Analysis and Design of Mobile Attendance Applications Using Prototyping Methodsat PT. PAM Digital Teknologi
- Rahman Haryanto Prasetia, Inna Sabily Karima S.Kom, M.Kom
10.29126/23942231/IJCT-V5I6P7
Abstract
At PT. PAM Digital Teknologi, currently employee absences are still using a fingerprint machine, which is complained about by the Human Resources division because many of the employee's fingerprints are unreadable by the machine. One factor is like a wet fingerprint. So that PT. PAM Digital Teknologi requires a system that is able to provide solutions to these problems. Especially at this time, recording employee data, recording attendance is still manual, less structured filing leave and employee business trips, and also employees do not know the details of monthly salary slips received, including work management in a company.Along with the development of technology, PT. PAM Digital Teknologi requires applications that cover these problems so as not to interfere with employee management and better day by day.As a writer, want to analyze and design applications to facilitate employee attendance activities for PT. PAM Digital Teknologi. With interview and survey research methods centered on employees in the scope of the case study, especially in the Human Resources division, it is hoped that supporting data will be obtained for the analysis and design of the application.So the writer can make an application design that is useful for case studies and a solution to the problem of employee attendance at PT. PAM Digital Teknologi. Keyword: Prototyping, Mobile Application, Attendance, Human resources, pt. pam Digital Teknologi, Mercu Buana University. Rahman Haryanto Prasetia, Inna Sabily Karima S.Kom, M.Kom "Analysis and Design of Mobile Attendance Applications Using Prototyping Methodsat PT. PAM Digital Teknologi" Vol. 5 - Issue 6 (43-49) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P7 |
8 |
Creating Web-Based Academic Support Information System with Rapid Application Development Method(Case Study: 1 Gudo Junior High School, Jombang)
- Aldena Oktavian Permatasari, Inna Sabily Karima S.Kom, M.Kom
10.29126/23942231/IJCT-V5I6P8
Abstract
The development of technology in the current era provides great opportunities in all aspects that have taken place, especially on systems that are still done manually. However, the opinion that the manual system has been very effective has made people reluctant to switch to processes that are fully carried out by technology. Some manual processes that occur in the community, especially in the field of education at Gudo 1 Junior High School include management of attendance data, student score, student grade, creating schedule course, and creatingexam schedule. The process of being absent in the class that is still manually using paper makes the class leader have to collect attendance data for the homeroom every week, as well as when storing the UH, UTS and UAS scores of students, most of which are still written on paper. Then in the process of making the lesson schedule and the exam schedule that is still manual, it requires its own additional time, so it is not efficient in terms of time. These four points can be said as points that support the ongoing academic activities in schools, especially at Gudo 1 Junior High School, Jombang. Seeing that there are still obstacles experienced in meeting the needs that support academics, this study was made using the Rapid Application Development method. By using the Rapid Application Development method in addition to a faster process, it is also able to meet the needs of users who can be said to still not fully understand what technology needs are desired. Keyword: Academic information system,scheduling, attendance, information system , rapid application development. Aldena Oktavian Permatasari, Inna Sabily Karima S.Kom, M.Kom "Creating Web-Based Academic Support Information System with Rapid Application Development Method(Case Study: 1 Gudo Junior High School, Jombang)" Vol. 5 - Issue 6 (50-59) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P8 |
9 |
Information System of Human Resources in Supports the Operations and Planning of the Company (Case Study: PT. Cannet Electrics Indonesian)
- Siti Afifah, Anita Ratnasari
10.29126/23942231/IJCT-V5I6P9
Abstract
PT. Cannet Electric Indonesia is a PMA company engaged in the field of kWh Meter provider. Human Resources Management in a company is very important and very much needed in managing employee data within the company. Constraints that exist in this company are the absence of a system that supports the running of operations and company planning. Employee management such as employee data, department data, employee leave submission, employee permit submission, employee attendance management, salary calculation and employee performance evaluation that are still physical and done manually. Where each process is still recapitulated in the excel file and word and documentation is not well organized, thus making the company's performance slow and data not transparent. The purpose of implementing the human resources system is to raise awareness about the importance of quality for the survival of the company. This web-based information system development is used to manage all employee data in the company. With the development of information systems it is expected to produce a report of information in order to accelerate the performance of the company, the transparency of information between employees and top management. Keyword: Human resources management, web, unified modeling language, performance. Siti Afifah, Anita Ratnasari "Information System of Human Resources in Supports the Operations and Planning of the Company (Case Study: PT. Cannet Electrics Indonesian)" Vol. 5 - Issue 6 (60-67) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P9 |
10 |
The Prediction of Best-Selling Product Using Naive Bayes Algorithm (A Case Study at PT Putradabo Perkasa)
- Arif Budiyanto, Saruni Dwiasnati
10.29126/23942231/IJCT-V5I6P10
Abstract
Data Mining is a technique for processing and extracting large data into information which can form new data. The technique is applied by using Knowledge Discovery Process in Database (KDD). The objective of the research is determining which product is the best-selling in 2018, so that the increase of customer’s demand can be anticipated in the following year. In this research, the authors employ classification method in producing the best-selling product information by using algorithms naïve Bayes. There are some variables involved, such as type of goods, brand of goods, quality of goods, price of goods, and Target. Rapid minner Studio 9.0 is a tool for assessing data which calculated to produce a model. The analysis results are expected to be used by the company for preparation supply of the best-selling products. The findings reveal that the level of data accuracy is is 78,33% and the best-selling product based on sales is the IP Camera product with type Infinity I-993V. Keyword: Data Mining, Classification, Naïve Bayes , Sales Transaction, Rapidminer Studio 9.0. Arif Budiyanto, Saruni Dwiasnati "The Prediction of Best-Selling Product Using Naive Bayes Algorithm (A Case Study at PT Putradabo Perkasa)" Vol. 5 - Issue 6 (68-74) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P10 |
11 |
Decision Support Systems for Selection of Outstanding Teachers with Analytical Hierarchy Process (AHP) and Topsis Methods: Case Study of SMKN 8 Kabupaten Tangerang
- Hendi Supriatna, Sudianto, SuhendraAnjarDinata, Mohammad Syafrullah
10.29126/23942231/IJCT-V5I6P11
Abstract
Human resources have the competence and quality in educational institutions especially at SMKN 8 Kabupaten. Tangerang, is the most important thing for an educator, aims to increase the motivation of educators in learning and teaching activities. The headmaster will elect a prospective teacher who has good achievements, the election process is carried out at the school he leads, is a general matter a decision is always determined by the leader, namely the head and his representative. The difficulty of the school to conduct the selection of outstanding teachers, because there is no calculation method in producing alternative decisions, resulting in ineffective if you have to use a long time in the process of selecting outstanding teachers. In this study, there is a system need to be used by the school, the process and results that have not produced an alternative decisionwill be overcome by existing problems with the decision support system of the Analytical Hierarchy Process and TOPSIS (Technique for Order Preference by Similarity Ideal Solution).Obviously effective if applied in overcoming the difficulty of implementing the selection of outstanding teachers. The results of the study state that the method used shows the decision support system as an efficiency in decision making, as well as providing solutions for school institutions by saving time, costs and energy so as to strengthen the confidence with alternative decisions taken, if applied in solving a problem. In determining the decision as for the criteria and alternatives used, referring to the provisions of the school because according to the need and conditions at school. Based on user acceptance testing that respondents have done, it can be concluded that, the results of all respondents get a value of 89.57% Decision Support Systems determine the achievement teachers can be accepted and get the results of the statement agreed. Keyword: DSS(Decision Support Systems), AHP, TOPSIS, Outstanding Teacher. Hendi Supriatna, Sudianto, SuhendraAnjarDinata, Mohammad Syafrullah "Decision Support Systems for Selection of Outstanding Teachers with Analytical Hierarchy Process (AHP) and Topsis Methods: Case Study of SMKN 8 Kabupaten Tangerang" Vol. 5 - Issue 6 (75-84) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P11 |
12 |
A Hybrid Routing Protocol Based on GPSR Protocol and LTE in VANET
- Zhuocheng Lin, Hongbin Huang, Xincheng Huang, Weiping Liu
10.29126/23942231/IJCT-V5I6P12
Abstract
In vehicular ad hoc network, the position-based routing algorithm is considered to be a very promising routing strategy for communication. Greedy Perimeter Stateless Routing (GPSR) is a representative routing protocol of position-based routing algorithm. However, the GPSR protocol is likely to select the wrong next hop forwarding node in the greedy forwarding mode and cannot send data packets on the sparse path. To solve the above problems, we propose a hybrid routing protocol called Predict-LTE GPSR (PL-GPSR)based on the GPSR routing protocol and LTE technology. The PL-GPSR first predicts the position of the neighbor nodesin greedy forwarding mode and selects the neighbor node closest to the destination node within the communication range of the source node as the next hop node. When the greedy forwarding mode fails, the PL-GPSR will use LTE technology. By using the NS-3 and SUMO simulation tools to simulate GPSR and PL-GPSR, the results show that PL-GPSR is superior to GPSR in packet delivery ratio, average end-to-end delay, and throughput. Keyword: Vehicular ad hoc network, GPSR routing protocol, LTE, NS-3, SUMO. Zhuocheng Lin, Hongbin Huang, Xincheng Huang, Weiping Liu "A Hybrid Routing Protocol Based on GPSR Protocol and LTE in VANET" Vol. 5 - Issue 6 (85-89) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P12 |
13 |
Comparative Analysis of HAProxy & Nginx in Round Robin Algorithm to Deal with Multiple Web Request
- Raka Yusuf, Rizza Syah Pasha Ulin Nuha
10.29126/23942231/IJCT-V5I6P13
Abstract
Web based service providers like Google, have a large number of transactions every day. By using one web server, certainlyall ofthe transactions cannot be handled by it alone because of the excess user demand. Therefore we need a technology for distribution system and load balancing to minimize system failure. Load balancing server accepts request from each user then distributes to each of the back-end server. The purpose of this study is to verify software-based load balancing that runs on virtualization technology docker can run with its full capacity by distributing the load to each back-end server. Keyword: Load Balancing, HAproxy, Nginx, Virtualization, Docker. Raka Yusuf, Rizza Syah Pasha Ulin Nuha "Comparative Analysis of HAProxy and Nginx in Round Robin Algorithm to Deal with Multiple Web Request" Vol. 5 - Issue 6 (90-94) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P13 |
14 |
Effect of Noise and Rotation on 24-bit Bitmap (.bmp) Images That Have Been Done Embedding Text Using LSB Steganography Technique
- Fathulloh, RetnoWulandari, WindhyWidhyawaty, SitiMuryanah
10.29126/23942231/IJCT-V5I6P14
Abstract
Steganography is a science and art of hiding data on a media. Steganography is created as one of the methods used to secure data by hiding it in other media so that it is "not visible". LSB insertion is done by modifying the last bit in one byte of data. The final result of this application is a stego image that contains the inserted message. The stego image has the exact same size and shape as the original image media. Even though the pixel bits of the image media has changed due to insertion, the changes are not so significant, so that they cannot be detected by ordinary human eyes. The purpose of this study is to know the effect of giving noise and rotating objects by 180 degrees. From the research, it was found that giving light noise did not damage the information in the image. While large noise causes information in the image cannot be extracted. Likewise, when the image is rotated 180 degrees, the text cannot be extracted. Keyword: Steganography,LSB, Bitmap, PSNR. Fathulloh, RetnoWulandari, WindhyWidhyawaty, SitiMuryanah "Effect of Noise and Rotation on 24-bit Bitmap (.bmp) Images That Have Been Done Embedding Text Using LSB Steganography Technique" Vol. 5 - Issue 6 (95-100) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P14 |
15 |
Android-Based Boarding House Management Information System
- Anisah Nur, Deby Ecintia, Lukman Adel, Yudo Devianto
10.29126/23942231/IJCT-V5I6P15
Abstract
With the densely of the population in Indonesia, boarding housegreatly helps minimize the growth of urban planning space, especially in big cities to be the choice for most people because of the higher cost of buying or renting a house. Because of the large interestin boarding house, it createsa business opportunity for people to do business that provides huge profits that always flow every year. For this reason, it is necessary to manage a good boarding house business management by changing the manual method intoa system. The system is built so that it can help implement boarding house management become more effective and can be a solution to existing problems. Data collection method in this study is to use the interview method conducted with the boarding house owner in Tebet 22 in Jakarta to find out how the boarding house management is currently running. The final result of this study is Android-Based Boarding House Management Information System. Keyword: Management, boarding house, information systems, boarding house business. Anisah Nur, Deby Ecintia, Lukman Adel, Yudo Devianto "Android-Based Boarding House Management Information System" Vol. 5 - Issue 6 (101-107) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P15 |
16 |
A Survey on SPTAD: Spam Posting Twitter Account Detection
- Mr. Dayanand Argade, Prof.HydarAli Hingoliwala
10.29126/23942231/IJCT-V5I6P16
Abstract
Twitter is most popular micro blogging services administrations, or, generally which is used to share news and updates through short messages limited to 280 characters. In any case, it’s open nature and huge client base are as often as possible misused by automated spammers, content polluters, ill-intended users to commit various cyber-crimes, for example, cyber bullying, trolling, talk scattering, and stalking. As per necessity, a number of methodologies have been proposed by researchers to address these issues. Be that as it may, the vast majority of these methodologies are based on user characterization and totally ignoring mutual interactions. A cross breed approach for identifying automated parameters by amalgamating community based highlights with other component classes, to be specific metadata-, content-, and association based highlights. Nineteen different features, including six recently characterized features and two redefined features, are distinguished for learning three classifiers, to be specific, random forest, decision tree, and Bayesian network, on a real dataset that includes benign clients and spammers. The discrimination power of various element classifications is also analyzed, and interaction and community-based features most effective for spam detection, whereas metadata-based features are proven to be the least effective. Keyword: Aspect-based Opinion Mining, Maximum Entropy Model, Word Embedding. Mr. Dayanand Argade, Prof.HydarAli Hingoliwala "A Survey on SPTAD: Spam Posting Twitter Account Detection" Vol. 5 - Issue 6 (108-114) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P16 |
17 |
E-Document Safety AtUniversity Of Buana Perjuangan Karawang Using Qr Code Using Encryption Blowfis Method
- Agung Susilo Yuda Irawan, Tohirin Al Mudzakir, Kiki Ahmad Baihaqi, Cici Emilia Sukmawati, Candra Zonyfar
10.29126/23942231/IJCT-V5I6P17
Abstract
Academic information systems (SIAK) on a college employee was very helpful in terms of improving the services, many activities are carried out in the system starting from the Exchange that is casual are important and confidential. in the academic information system E-Document that is important and should be maintained its authenticity. E-Document Exchange that high intensitasnya not cover the possibility of causing vulnerability to theft, forgery of documents by a party which is not a responsible course would be bad. This need for awareness to all stakeholders in terms of securing an E-Document so that its authenticity remains awake. some of the ways that can be applied in E-Document security one way to secure E-Document with encryption on the document. The research on the algorithms used is various algorithms blowfish, blowfish or openPGP encryption Cipher4 is included in the symmetric cryptosystem. Blowfish algorithms are created to be used on computers that have large microprocessor (32 bit upward with the large data cache) and combined with a QR Code. QR Code itself began to be developed in 1994 by denso wave that aims to convey information quickly and get quick responses. For the process of testing conducted the first two processes, testing randomness encryption using the Avalanche Effect and user acceptance testing using User Acceptance Tersting. Keyword: Academic information systems, encryption, description, Algorithm blowfish, E-Document, QR Code. Agung Susilo Yuda Irawan, Tohirin Al Mudzakir, Kiki Ahmad Baihaqi, Cici Emilia Sukmawati, Candra Zonyfar "E-Document Safety AtUniversity Of Buana Perjuangan Karawang Using Qr Code Using Encryption Blowfis Method" Vol. 5 - Issue 6 (115-120) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P17 |
18 |
Quantum Cryptography Communication Between The Object In Space And Earth
- K.Poonguzhali, D.Kirubasankari, T.Karthikeyan
10.29126/23942231/IJCT-V5I6P18
Abstract
The mobile optical high-speed communication links between diverse platforms for example optical links from aircrafts, UAVs or satellites to ground are based on mobile FSO communication links have gained significant attention over the last years due to their increasing maturity. They are used in point to point links scenarios. This paper will give an overview on the current and future work of the optical communication regard to quantum communications. Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Keyword: FSO, Quantum Cryptography, Free Space Optical Communication. K.Poonguzhali, D.Kirubasankari, T.Karthikeyan "Quantum Cryptography Communication Between The Object In Space And Earth" Vol. 5 - Issue 6 (121-134) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P18 |
19 |
Comparison of Security Level between Control Flow Integrity (CFI) Method and Address Space Layout Randomization (ASLR) on Buffer Overflow Attack Protection on Windows 10 Operating Systems
- Avip Kurniawan, Nezim, Ridwan
10.29126/23942231/IJCT-V5I6P19
Abstract
The buffer overflow problem has been around for some time and continues to be a problem that is always there. Messages in memory corruption in programs are usually exploited by attackers in the form of stack and heap based attacks. The main purpose of this attack is to change the flow of programs that allow attackers to execute arbitrin code such as opening a shell with the same access rights during the attack process. Some examples of protection that have been adopted that make the benefits for software increasingly sharp. This study compares the ASLR and CFI methods on Windows 10-based applications. From different results it shows that flow control integrity (CFI) is superior in level based on the address of space randomization method (ASLR), but professionally the CFI method has twice execution time. fold compared to ASLR. Keyword: Security, address-space layout randomization, Buffer overflow, control flow integrit, memory corruption. Avip Kurniawan, Nezim, Ridwan "Comparison of Security Level between Control Flow Integrity (CFI) Method and Address Space Layout Randomization (ASLR) on Buffer Overflow Attack Protection on Windows 10 Operating Systems" Vol. 5 - Issue 6 (135-140) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P19 |
20 |
Algorithm Designing for Edges and Surfaces Extraction from Mesh Models
- AbdAlrazzakDabbour, RabieHabib, Mariam Saii
10.29126/23942231/IJCT-V5I6P20
Abstract
Many industrial tasks need geometry information from CAD files (STL, IGES etc.), to acquire these information, 3D mesh should be segmented to multi surfaces and edges should be extracted. TriFace’s Growing (TRIFGR) method has been proposed for surfaces and edges extraction from triangular mesh based on the orientation angle between two adjacent triangles. Depending on orientation angle value, the adjacent triangles will be marked as belong to the same surface or not. The experimental results show that the proposed method is performed efficiently to extract surfaces and edges on both computer graphics and CAD mesh models and segmentation result could be easily changed according to the aim of the application. Besides that, to allow users importing mesh model from STL file with ASCII or Binary format and getting geometry information about each extracted surface, a simple windows application has been designed based on C#. Keyword: 3D Mesh Segmentation, Surface Extraction, Edges Extraction, STL File. AbdAlrazzakDabbour, RabieHabib, Mariam Saii "Algorithm Designing for Edges and Surfaces Extraction from Mesh Models" Vol. 5 - Issue 6 (141-147) - November - Deceber 2018 , International Journal of Computer Techniques (IJCT) , ISSN: 2394 - 2231 , www.ijctjournal.org × | IJCT-V5I6P20 |