Journal of Information Technology and Cyber Security最新文献

筛选
英文 中文
Diabetic Retinopathy Blood Vessel Detection Using CNN and RNN Techniques 利用 CNN 和 RNN 技术检测糖尿病视网膜病变血管
Journal of Information Technology and Cyber Security Pub Date : 2024-01-31 DOI: 10.30996/jitcs.8716
Adithya Kusuma Whardana, Parma Hadi Rentelinggi, Hezkiel Dokta Timothy
{"title":"Diabetic Retinopathy Blood Vessel Detection Using CNN and RNN Techniques","authors":"Adithya Kusuma Whardana, Parma Hadi Rentelinggi, Hezkiel Dokta Timothy","doi":"10.30996/jitcs.8716","DOIUrl":"https://doi.org/10.30996/jitcs.8716","url":null,"abstract":"This research aims to detect diabetic retinopathy using Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). The main objective is to compare these two methods in detecting the condition. Based on the study’s result after training 10 times on each method, the accuracy results were 92% for the CNN method and 50% for the RNN method. These results show, this study with the dataset used, the CNN method is much more effective in detecting diabetic retinopathy than the RNN method. The CNN method is better due to its ability to extract spatial features from images, which is important in image classification tasks.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"7 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139591342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age 驾驭网络威胁格局:全面分析数字时代的攻击和安全问题
Journal of Information Technology and Cyber Security Pub Date : 2024-01-10 DOI: 10.30996/jitcs.9715
Akinul Islam Jony, Sultanul Arifeen Hamim
{"title":"Navigating the Cyber Threat Landscape: A Comprehensive Analysis of Attacks and Security in the Digital Age","authors":"Akinul Islam Jony, Sultanul Arifeen Hamim","doi":"10.30996/jitcs.9715","DOIUrl":"https://doi.org/10.30996/jitcs.9715","url":null,"abstract":"In this contemporary digital age, cybersecurity stands as a crucial linchpin amid the expanding role of technology in our lives, encountering numerous challenges. This review addresses the imperative need for robust cybersecurity measures as malicious actors continually innovate methods to exploit vulnerabilities in computer systems, networks, and data. The exploration delves into the multifaceted realm of cybersecurity attacks, unveiling the evolving threat landscape and their profound implications. From cybercriminals utilizing phishing attacks to the covert tactics of malware and the disruptive potential of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, including Phishing, Zero-Day Exploits, Man-in-the-Middle, and SQL Injection Attacks, the cybersecurity battleground is ever-expanding. The study systematically categorizes cyber threats, scrutinizes their distinctive characteristics, and elucidates the modus operandi of each attack type. Through a meticulous dissection of cybercriminal methods and motivations and a comprehensive evaluation of countermeasure efficacy, this review offers indispensable insights for securing our digital future in an era marked by escalating interconnectivity and technological dependence.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"16 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139439117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Task-Technology Fit on the Design and Use of a Hotel Management System 任务技术契合在酒店管理系统设计与使用中的作用
Journal of Information Technology and Cyber Security Pub Date : 2023-08-20 DOI: 10.30996/jitcs.8712
Intan Dzikria, Muhammad Lutfi Syahindra Solihin
{"title":"The Role of Task-Technology Fit on the Design and Use of a Hotel Management System","authors":"Intan Dzikria, Muhammad Lutfi Syahindra Solihin","doi":"10.30996/jitcs.8712","DOIUrl":"https://doi.org/10.30996/jitcs.8712","url":null,"abstract":"Hotels have many problems regarding how to improve their service performance by using technologies, especially when the hotels have a bit of understanding the importance of their employees’ tasks and the technology fitness. This study designed a hotel management system based on the tasks that the employees use to provide services. The purpose of this research is to investigate the influence of task-technology fit on the intention to use the designed hotel management system. In addition, statistical testing methods are also carried out on the system by measuring the impact of task-technology fit on the suitability between user task needs and technology, on user perceptions of technology and how these perceptions affect user intentions and behavior in accepting and using technology. The results of this study indicate that task-technology fit has a significant impact in facilitating its use. The results of this study contribute to the academic implementation of task-technology fit theory in the hotel reservation management system.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124147723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Utilization of Information System for Crime Rate Modelling in Surabaya Using K-means 基于K-means的泗水市犯罪率建模信息系统的应用
Journal of Information Technology and Cyber Security Pub Date : 2023-02-07 DOI: 10.30996/jitcs.7676
S. Supangat, M. M. Sholiq
{"title":"The Utilization of Information System for Crime Rate Modelling in Surabaya Using K-means","authors":"S. Supangat, M. M. Sholiq","doi":"10.30996/jitcs.7676","DOIUrl":"https://doi.org/10.30996/jitcs.7676","url":null,"abstract":"This study aims to model the crime rate in the city of Surabaya using the k-means clustering method. The data used is crime data that occurred in Surabaya in previous years, which includes the type of crime, location of crime, and crime rate. The k-means clustering method is used to classify crime data in the Surabaya area for 2020-2022 consisting of cluster 3, namely areas with moderate crime rates covering 6 sub-districts (1,260 cases), cluster 1 with areas with high crime rates, namely 12 sub-districts with 2,363 cases, and cluster 2 areas with low crime rates consisting of 13 districts with 2,178 cases based on data on the number of crimes. The geospatial visualization system is used to visually display modeling results, making it easier for interested parties to identify the location of a crime. The results of this study are expected to provide useful information for interested parties, such as the police and the community, in taking preventive action regarding crime rates in Surabaya.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123548099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Child Growth and Development Evaluation Using Weighted Product Method 基于加权积法的儿童生长发育评价
Journal of Information Technology and Cyber Security Pub Date : 2023-02-07 DOI: 10.30996/jitcs.7613
Ardy Januantoro, F. Mandita
{"title":"A Child Growth and Development Evaluation Using Weighted Product Method","authors":"Ardy Januantoro, F. Mandita","doi":"10.30996/jitcs.7613","DOIUrl":"https://doi.org/10.30996/jitcs.7613","url":null,"abstract":"Child development is one of the factors that must be considered in improving a country's education. The level of maturity of human resources is able to maximize starting from childhood. The guidebook of the Ministry of Education and Culture of the Republic of Indonesia (Kemendikbud RI) in 2018 contained six indicators to assess children's learning ability, namely: 1) Moral, 2) Social, 3) Language, 4) Cognitive, 5) Motor, and 6) Art. This study implements these indicators to evaluate children's growth and development. The evaluation method uses the Weighted Product Method (WPM). WPM provides a ranking of the result of the evaluation. In addition, WPM also has an assessment of Beneficial and non-beneficial as a more relevant assessment between indicators. Data were collected by questionnaire at kindergarten schools with the respondents' age average of 5-6 years. The results will be calculated with indicators criteria weights given. The test results recommended for students between 0.65 to 0.62 are as follows: Mahmud, Diko, Cindy, Denny, and Riko. The kindergarten manager can use these recommendations to increase the student's aptitude.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delivery Route Estimation on a Web-Based Restaurant Delivery System Using Greedy Algorithm 基于贪心算法的基于web的餐厅外卖系统配送路线估计
Journal of Information Technology and Cyber Security Pub Date : 2023-01-12 DOI: 10.30996/jitcs.7611
Carmelita Margaretha Jawa Wando, Intan Dzikria
{"title":"Delivery Route Estimation on a Web-Based Restaurant Delivery System Using Greedy Algorithm","authors":"Carmelita Margaretha Jawa Wando, Intan Dzikria","doi":"10.30996/jitcs.7611","DOIUrl":"https://doi.org/10.30996/jitcs.7611","url":null,"abstract":"Food delivery application services have been significantly developed in Indonesia. However, several areas have not received application services like this. Orders made by several restaurants still use social media such as Whatsapp, Facebook, and cell phones. Traditional ordering does not have sufficient means to calculate the cost of delivery of orders resulting in cost-efficiency problems. In addition, order delivery routes are a problem for couriers who have to deliver several orders at once. This research builds a web-based restaurant delivery system by applying a greedy algorithm to optimize routes and shipping costs. The results of this study indicate that the greedy algorithm can determine the best route for couriers to make deliveries so that shipping costs become lower. This research contributes as one proof of the application of the greedy algorithm to business problems and restaurants may use the resulting system to increase the effectiveness of order delivery.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124013270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sales Forecasting Analysis Using Trend Moment Method: A Study Case of a Fast Moving Consumer Goods Company in Indonesia 趋势矩法销售预测分析——以印尼某快速消费品公司为例
Journal of Information Technology and Cyber Security Pub Date : 2023-01-01 DOI: 10.30996/jitcs.7572
Ammar Fauzan, Dania Gusmi Rahayu, A. Handayani, Imam Tahyudin, D. Saputra, P. Purwadi
{"title":"Sales Forecasting Analysis Using Trend Moment Method: A Study Case of a Fast Moving Consumer Goods Company in Indonesia","authors":"Ammar Fauzan, Dania Gusmi Rahayu, A. Handayani, Imam Tahyudin, D. Saputra, P. Purwadi","doi":"10.30996/jitcs.7572","DOIUrl":"https://doi.org/10.30996/jitcs.7572","url":null,"abstract":"The market of Fast-Moving Consumer Goods (FMCG) companies in Indonesia is enormous. Unilever has 400 brands in more than 190 countries, making it a global business that is as influential in the consumer product market as it is in Indonesia. Sales forecasting at this company is very useful for planning expenses and the company's total costs on the business strategy. This study uses trend moment method to forecast the sales and earnings of Unilever Indonesia companies at the end of the year. This article aims to test the performance of the trend moment method calculation on the prediction of net sales and profits in FMCG companies. At the end of the analysis process, it can be concluded that forecasting using trend moment method is going very well. This indicator of success is shown by the error level of MAPE, which is below 10%.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124308490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recommendation System Using the K-Nearest Neighbor Approach: A Case Study of Dual Camera Quality as a Smartphone Selection Criterion 使用k近邻方法的推荐系统:双摄像头质量作为智能手机选择标准的案例研究
Journal of Information Technology and Cyber Security Pub Date : 2022-12-31 DOI: 10.30996/jitcs.7559
Parcelliana Binar Pasha, Yusrida Muflihah
{"title":"Recommendation System Using the K-Nearest Neighbor Approach: A Case Study of Dual Camera Quality as a Smartphone Selection Criterion","authors":"Parcelliana Binar Pasha, Yusrida Muflihah","doi":"10.30996/jitcs.7559","DOIUrl":"https://doi.org/10.30996/jitcs.7559","url":null,"abstract":"Many smartphones today need to be more precise about choosing one that suits the user's needs. In fact, smartphone sellers sometimes need help recommending smartphones that suit buyers' needs. Generally, buyers search for smartphone specifications with keywords they desire, but the results appear different from what they expected. Users need the main specifications, such as Random Access Memory (RAM) and Read Only Memory (ROM) capacity, battery, and high camera quality. This research aims to implement the K-Nearest Neighbor (KNN) algorithm for recommendation smartphone selection based on the criteria mentioned. The data test results show that the combination of KNN with four criteria has good performance, as indicated by the accuracy, precision, recall, and f-measure values of 95%, 94%, 97%, and 95%, respectively.","PeriodicalId":382744,"journal":{"name":"Journal of Information Technology and Cyber Security","volume":"15 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116849244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信