Journal of Artificial Intelligence and Engineering Applications (JAIEA)最新文献

筛选
英文 中文
Implementation Of Decision Making in Determining Employee Bonus Giving Using the VIKOR Method (Visekriterijumsko Kompromisno Rangiranje) at PTPN IV Kebun Marjandi 在 PTPN IV Kebun Marjandi 使用 VIKOR 方法(Visekriterijumsko Kompromisno Rangiranje)决定员工奖金发放的决策实施情况
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-15 DOI: 10.59934/jaiea.v3i3.511
Kurnia Cindy, Wilda Rina Hasibuan
{"title":"Implementation Of Decision Making in Determining Employee Bonus Giving Using the VIKOR Method (Visekriterijumsko Kompromisno Rangiranje) at PTPN IV Kebun Marjandi","authors":"Kurnia Cindy, Wilda Rina Hasibuan","doi":"10.59934/jaiea.v3i3.511","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.511","url":null,"abstract":"At PTPN IV Kebun Marjandi, employees will of course get bonuses every year. The amount of bonuses given to employees depends on the profits obtained by the company. Determining employee bonuses is currently still done manually where the assessment criteria for each employee are still recorded one by one in paper form and then transferred to Excel for the calculation process. Of course, this process will take a long time. So, to overcome this problem, a decision support system is needed that can help determine employee bonuses according to the assessment criteria that have been determined and the calculation process. Having a decision support system can help companies make decisions and manage data on bonus recipients in more detail and more objectively. This system will be assisted by using the VIKOR method. There are 20 alternatives taken in this research and 4 criteria, namely class, dependents, position and performance. The results of this research are which alternative is more appropriate to get the highest bonus after carrying out the calculation process from the determined assessment. And from the results of tests carried out using the VIKOR method, the employee who deserves to get the highest bonus is A16 with a value of 0,026.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"4 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141336602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cooperative Health Performance and Assessment Information System Using the SAW (Simple Additive Weighting) Method 使用 SAW(简单加权法)的合作保健绩效与评估信息系统
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-15 DOI: 10.59934/jaiea.v3i3.510
Slamet Rahayu, Nunu Nugraha
{"title":"Cooperative Health Performance and Assessment Information System Using the SAW (Simple Additive Weighting) Method","authors":"Slamet Rahayu, Nunu Nugraha","doi":"10.59934/jaiea.v3i3.510","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.510","url":null,"abstract":"The cooperative sector seeks to digitize all services, including the management of performance data that has duplicated data, the cooperative health assessment is slow in its calculations, the difficulty of communicating between cooperatives and the cooperative sector directly and reports that are difficult to obtain when needed. So a cooperative performance information and health assessment system was designed which is a performance data management system, cooperative health assessment using the SAW (Simple Additive Weighting) decision- making method, and there is a chat feature to communicate and report presentation features that are easy to obtain. The design and development of a cooperative health and performance information system adopts the waterfall method using UML (Unified Modeling Language) modeling and the implementation of the system uses the PHP (Hypertext Preprocessor) programming language in the codeigniter framework and blackbox testing is carried out with an average result of 100% and the test results UAT (User Acceptance Testing) with an average result of 95.66%.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"3 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141336784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Employee Payment Information System at PT Kawan Kita Mandiri PT Kawan Kita Mandiri 公司员工薪酬信息系统的设计
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-15 DOI: 10.59934/jaiea.v3i3.513
Kawan Kita, Mandiri Muliadi
{"title":"Design of Employee Payment Information System at PT Kawan Kita Mandiri","authors":"Kawan Kita, Mandiri Muliadi","doi":"10.59934/jaiea.v3i3.513","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.513","url":null,"abstract":"The payroll system is one of the things related to the management of workforce welfare so it must be given special attention by the company in order to achieve its goals. Salary has a very important meaning for employees because salary is a reflection of the value of their work and performance both for the company, society and themselves. Like other systems in companies, payroll systems are vulnerable to various forms of deviation and human error.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"7 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141337066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Based Outdoor Equipment Rental Information System 基于 Android 的户外设备租赁信息系统
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.505
Irma Yunita, Suendri, Aninda Muliani Harahap
{"title":"Android Based Outdoor Equipment Rental Information System","authors":"Irma Yunita, Suendri, Aninda Muliani Harahap","doi":"10.59934/jaiea.v3i3.505","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.505","url":null,"abstract":"Entering the modern era today, a lot of knowledge has been discovered related to technological development, both in theory and real evidence from the development of the world of technology, one example of a theory of technological development is \"information systems\". The use of information systems is very important in people's lives in Indonesia, many activities or jobs apply information systems to make it easier for people to interact and communicate, one use of information systems is in the business world, namely the outdoor equipment rental system, but many people still don't know about rentals. Outdoor equipment which is usually done manually can be done in an effective and efficient way, therefore research was made which will be discussed in the thesis is Android Based Outdoor Equipment Rental Information System.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"23 14","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Selection of the Best Employees Using the Copras Method at PT. Gosyen Retail Indonesia 在 PT.印度尼西亚 Gosyen 零售公司
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.499
Desvita Ramanda, Nur Widisetyo, Achmad Rifai, Irmawati
{"title":"Selection of the Best Employees Using the Copras Method at PT. Gosyen Retail Indonesia","authors":"Desvita Ramanda, Nur Widisetyo, Achmad Rifai, Irmawati","doi":"10.59934/jaiea.v3i3.499","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.499","url":null,"abstract":"The most important asset of a company is its human resources. So that the quality and existence of its people need to be maintained. Therefore, the company has an obligation to always maintain the quality of its employees. One way that companies can maintain the quality of their employees is by giving rewards for their success at work. Rewards are certainly not given to all employees but are given to someone or several employees for their achievements. The purpose of this research is to find the best employee by being influenced by several criteria, namely performance, work attitude, teamwork, accuracy and discipline. The research method used is the Copras (Complex Proportional Assessment) method. The data sources used are secondary type data sources by reviewing articles in journals and secondary data books in supporting this research, all of which are in accordance with the research objectives or research relevance. The results of this study obtained the best employee with alternative U22 with a final result of 100 on behalf of Tasya Qanita. \u0000 ","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"63 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141347046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development of a Web-Based Sales Information System at Dapur Bubu 在达普尔布布设计和开发基于网络的销售信息系统
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.502
Dewi Yuliandari, Ahmad Hilmi Prayogi, Mareanus Lase, Dian Ardiansyah, Walim
{"title":"Design and Development of a Web-Based Sales Information System at Dapur Bubu","authors":"Dewi Yuliandari, Ahmad Hilmi Prayogi, Mareanus Lase, Dian Ardiansyah, Walim","doi":"10.59934/jaiea.v3i3.502","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.502","url":null,"abstract":"The sales process at Dapur Bubu is still using a manual system, which is prone to fraud during manual transactions, causing harm to various parties such as customers, store employees, and the store owner. Developing a web-based food and beverage sales system for Dapur Bubu will make the sales system more efficient. The author conducted research by directly visiting the Dapur Bubu business in Bekasi to accurately understand the current sales system in place and identify its weaknesses. With the advancement of technology, more and more SMEs (Small and Medium Enterprises) are utilizing the internet for their businesses, as it makes it easier for them to market their products, which can be easily seen and accessed by the public. Before implementing this web system, the author suggests conducting training for the admin who will be using the web. It is also recommended to use paid web hosting before implementing this web-based online sales system.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"29 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141348512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Analysis of Ethical Marketing Strategies and Customer Engagement in TikTok Business 全面分析 TikTok 业务中的道德营销策略和客户参与情况
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.509
S. Suhardi, Nurul Ichsan, Hananda Priyandaru, Fauzi Ikhwanul Ihsan
{"title":"Comprehensive Analysis of Ethical Marketing Strategies and Customer Engagement in TikTok Business","authors":"S. Suhardi, Nurul Ichsan, Hananda Priyandaru, Fauzi Ikhwanul Ihsan","doi":"10.59934/jaiea.v3i3.509","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.509","url":null,"abstract":"This research explores the ethical marketing strategies utilized by TikTok Business and their influence on customer engagement. As a dominant force in the social media sector, TikTok's marketing practices serve as a benchmark for both the technology and entertainment industries. This study provides an in-depth analysis of TikTok Business's core marketing strategies, highlighting the company’s commitment to ethical practices and social responsibility. By examining various customer touchpoints, the research illustrates how TikTok Business effectively engages with its audience across multiple platforms and services.The study employs a SWOT analysis to evaluate the strengths, weaknesses, opportunities, and threats related to TikTok Business's marketing strategies, with a particular focus on ethical considerations and social responsibility. Strengths identified include TikTok's innovative content creation tools and its ability to foster a highly engaged user base. Weaknesses involve concerns over data privacy and the potential for content moderation issues. Opportunities lie in expanding markets and partnerships with creators, while threats include regulatory scrutiny and competitive pressure.Findings suggest that ethical marketing strategies, when effectively implemented, significantly enhance customer engagement and trust. TikTok Business's approach to creating authentic and creative content, combined with transparent and responsible practices, can serve as a model for other companies seeking to balance commercial success with ethical integrity. The study concludes that in the rapidly evolving digital landscape, ethical marketing is not only a moral imperative but also a strategic advantage that can drive sustained engagement and loyalty among customers.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"50 22","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141349558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of RSA Using Algebraic and Lattice Methods 使用代数和网格方法对 RSA 进行密码分析
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.507
F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly
{"title":"Cryptanalysis of RSA Using Algebraic and Lattice Methods","authors":"F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly","doi":"10.59934/jaiea.v3i3.507","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.507","url":null,"abstract":"This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results. We believe that this field is still underexplored, and that much more work can be done utilizing connections between lattices and cryptography. This paper studies the security of the RSA public key cryptosystem under partial key exposure. We show that for short public exponent RSA, given a quarter of the bits of the private key an adversary can recover the entire private key. Similar results (though not as strong) are obtained for larger values of the public exponent e. Our results point out the danger of partial key exposure in the RSA public key cryptosystem. This paper shows that if the secret exponent d used in the RSA public key cryptosystem is less than N0.292, then the system is insecure. This is the first improvement over an old result of Wiener showing that when d is less than N0.25 the RSA system is insecure.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"46 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141349730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Markov Blanket Based Feature Ranking for Android Malware Detection 基于马尔可夫空白的安卓恶意软件特征排序分析
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.506
Yusfrizal Yusfrizal, Andrian Syahputra, Yahya Tanjung, Safrizal
{"title":"Analysis of Markov Blanket Based Feature Ranking for Android Malware Detection","authors":"Yusfrizal Yusfrizal, Andrian Syahputra, Yahya Tanjung, Safrizal","doi":"10.59934/jaiea.v3i3.506","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.506","url":null,"abstract":"The ubiquity of Android applications in our daily lives has brought forth an indispensable need for robust app security mechanisms. Malware-infested applications not only jeopardize user privacy but also compromise data integrity and overall device security. Detecting and mitigating malicious behavior within Android applications is becoming increasingly challenging due to the high-dimensional nature of the data. Moving forward, employing Machine Learning (ML) techniques to detect malware in Android apps has become the norm. High dimensional feature space poses several formidable challenges, including data scarcity, over fitting, and heightened computational demands. While dimensionality reduction techniques are a potential remedy, they often result in loss of crucial information essential for comprehending and identifying malicious behaviors accurately. Feature ranking based feature subset selection emerges as a promising alternative, as it allows us to retain the original feature space, ensuring precise representation of app behaviors. This article explores various Markov Blanket (MB) based feature ranking techniques, proposes a variant of Grow Shrink (GS) MB technique, GS++ which demonstrates enhanced performance within the context of Android malware detection.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"64 32","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141346897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of RSA Using Algebraic and Lattice Methods 使用代数和网格方法对 RSA 进行密码分析
Journal of Artificial Intelligence and Engineering Applications (JAIEA) Pub Date : 2024-06-13 DOI: 10.59934/jaiea.v3i3.507
F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly
{"title":"Cryptanalysis of RSA Using Algebraic and Lattice Methods","authors":"F. Harahap, Yusfrizal Yusfrizal, Mutiara Sovina, Ivi Lazuly","doi":"10.59934/jaiea.v3i3.507","DOIUrl":"https://doi.org/10.59934/jaiea.v3i3.507","url":null,"abstract":"This paper applies tools from the geometry of numbers to solve several problems in cryptanalysis. We use algebraic techniques to cryptanalyze several public key cryptosystems. This paper focuses on RSA and RSA-like schemes, and use tools from the theory of integer lattices to get our results. We believe that this field is still underexplored, and that much more work can be done utilizing connections between lattices and cryptography. This paper studies the security of the RSA public key cryptosystem under partial key exposure. We show that for short public exponent RSA, given a quarter of the bits of the private key an adversary can recover the entire private key. Similar results (though not as strong) are obtained for larger values of the public exponent e. Our results point out the danger of partial key exposure in the RSA public key cryptosystem. This paper shows that if the secret exponent d used in the RSA public key cryptosystem is less than N0.292, then the system is insecure. This is the first improvement over an old result of Wiener showing that when d is less than N0.25 the RSA system is insecure.","PeriodicalId":320979,"journal":{"name":"Journal of Artificial Intelligence and Engineering Applications (JAIEA)","volume":"86 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141347872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信