1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
In Coastal area plants do not grow properly because of the seawater. So to overcome these difficulties, the use of this technique can provide a proper plant growth. The seawater combines a solar desalination system with an environment for cultivating crops in which transpiration is minimized. To provide fresh water we use sunlight, seawater and cooled humid air to supply more sustainable environment condition for cultivation of crops in arid coastal region. This project tries to describe simulation the seawater considering condition of the arid region in district like Kutch (Gujarat) and in many countries like Iran, Oman. With desalination of seawater, it aims to provide sustainable local production of food by combining a growing environment in which water usage is minimized by solar energy. The technique is adapted for farms in arid coastal region that are suffering from salt infected soils and shortages of potable ground water. This technique may produce around 90-95% of total fresh water.
A secure architecture for m commerce users using biometerics and pin distribu...pradip patel
In Coastal area plants do not grow properly because of the seawater. So to overcome these difficulties, the use of this technique can provide a proper plant growth. The seawater combines a solar desalination system with an environment for cultivating crops in which transpiration is minimized. To provide fresh water we use sunlight, seawater and cooled humid air to supply more sustainable environment condition for cultivation of crops in arid coastal region. This project tries to describe simulation the seawater considering condition of the arid region in district like Kutch (Gujarat) and in many countries like Iran, Oman. With desalination of seawater, it aims to provide sustainable local production of food by combining a growing environment in which water usage is minimized by solar energy. The technique is adapted for farms in arid coastal region that are suffering from salt infected soils and shortages of potable ground water. This technique may produce around 90-95% of total fresh water.
Social Media Platforms, which have grown in recent years in parallel with the increase in mobile internet usage, are an alternative to common communication tools at many points. The fact that social media provides access to large amounts of data brings up the issue of Social Media Mining for companies.
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYMENTSijcsit
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
Awareness about E banking among indian consumers pptAnurag Singh
This is a power-point presentation of E banking research report
My research is based on Seconday data.
I did a thoroughly research on the awareness of E-banking services amongst indian customers.
The objectives of my research are:
1) To study about the role, need, types, frauds, impact of Internet banking on banks, customers and society, various frauds and ways to overcome them in internet banking, services offered by internet banking and its benefit to the customers and banks.
2) To study about the future perspective and awareness of internet banking among Indian customers and ways to increase awareness among the customers.
E-Payment System on E-Commerce in IndiaIJERA Editor
E-commerce provides the capability of buying and selling products, information and services on the Internet and other online environments. In an e-commerce environment, payments take the form of money exchange in an electronic form, and are therefore called Electronic Payment. E-Payment system is secure there should be no threat to the user credit card number, smart card or other personal detail, payment can be carried out without involvement of third party, It makes E payment at any time through the internet directly to the transfer settlement and form E-business environment. Studied have been carried out on E-Payment system .E-Payment system an integral part of electronic commerce.An efficient payments system reduces the cost of exchanging goods and services, and is indispensable to the functioning of the interbank, money, and capital markets. Questions are related to E-Payment system in which given options are Agree, Disagree, Strongly disagree, Strongly agree, Neutral. After analysis and comparison of various modes of electronic payment systems, it is revealed that it is quite difficult, if not impossible, to suggest that which payment system is best. Some systems are quite similar, and differ only in some minor details. Thus there are number of factors which affect the usage of e-commerce payment systems. Among all these user base is most important success of e-commerce payment systems also depends on consumer preferences, ease of use, cost, industry agreement, authorization, security, authentication, non-refutability, accessibility and reliability and anonymity and public policy
The appearance of data innovation to each part of human life and business has been obvious to
the point that it doesn't should be complemented more. Data innovation has been of extraordinary
substance in managing an account framework. This examination expects to explore the impact of
data innovation in the saving money arrangement of Bank. The information are acquired both
through the clients and the workers. The information were then broke down utilizing the correct
rate and the 5-point Liker scale to decide the effect of Information innovation in the saving money
framework undertakings. The discoveries at that point demonstrated that Information innovation
adds to the saving money framework in three diverse routes as tails: IT spares the season of the
clients and the representatives obviously, IT chops down the costs and IT encourages the system
exchanges.
Research Report on Net banking with reference to HDFC BankKumail Raza Muni
Project report is prepared to study various e banking services with reference of HDFC Bank.
It can be referred for those who are working for their bachelor thesis.
This chapter introduces banking technology as a confluence of several disparate disciplines such as finance (including risk management), information technology, computer science, communication technology, and marketing science. It presents the evolution of banking, the tremendous influence of information and communication technologies on banking and its products, the quintessential role played by computer science in full filing banks’ marketing objective of servicing customers better at less cost and thereby reaping more profits. It also highlights the use of advanced statistics and computer science to measure, mitigate, and manage various risks associated with banks’ business with its customers and other banks. The growing influence of customer relationship management and data mining in tackling various marketing-related problems and fraud detection problems in the banking industry is well documented.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
Biometrics is a highly reliable technology where it has become possible to use the characteristics of a person or user (biometrics) along with traditional passwords, and we can even say that it has become an indispensable complement in modern authentication systems today, especially with regard to bank accounts, banks, financial technology (FinTech) internet of things (IoT) devices and all a process related to money and privacy, and biometric methods are multiple and increasing day by day, the most famous of which is (iris, face chart, palm, fingerprint, and others). Biometric systems are immune and immune from modern electronic attacks, such as plagiarism or electronic theft, because the authentication here takes place when all conditions are met. Then the authentication is done and the process is completed, and the aim is to reach the highest levels of accuracy and security and to make the user more comfortable to deal with these modern systems that provide him with many advantages and high privacy.
Social Media Platforms, which have grown in recent years in parallel with the increase in mobile internet usage, are an alternative to common communication tools at many points. The fact that social media provides access to large amounts of data brings up the issue of Social Media Mining for companies.
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYMENTSijcsit
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
Awareness about E banking among indian consumers pptAnurag Singh
This is a power-point presentation of E banking research report
My research is based on Seconday data.
I did a thoroughly research on the awareness of E-banking services amongst indian customers.
The objectives of my research are:
1) To study about the role, need, types, frauds, impact of Internet banking on banks, customers and society, various frauds and ways to overcome them in internet banking, services offered by internet banking and its benefit to the customers and banks.
2) To study about the future perspective and awareness of internet banking among Indian customers and ways to increase awareness among the customers.
E-Payment System on E-Commerce in IndiaIJERA Editor
E-commerce provides the capability of buying and selling products, information and services on the Internet and other online environments. In an e-commerce environment, payments take the form of money exchange in an electronic form, and are therefore called Electronic Payment. E-Payment system is secure there should be no threat to the user credit card number, smart card or other personal detail, payment can be carried out without involvement of third party, It makes E payment at any time through the internet directly to the transfer settlement and form E-business environment. Studied have been carried out on E-Payment system .E-Payment system an integral part of electronic commerce.An efficient payments system reduces the cost of exchanging goods and services, and is indispensable to the functioning of the interbank, money, and capital markets. Questions are related to E-Payment system in which given options are Agree, Disagree, Strongly disagree, Strongly agree, Neutral. After analysis and comparison of various modes of electronic payment systems, it is revealed that it is quite difficult, if not impossible, to suggest that which payment system is best. Some systems are quite similar, and differ only in some minor details. Thus there are number of factors which affect the usage of e-commerce payment systems. Among all these user base is most important success of e-commerce payment systems also depends on consumer preferences, ease of use, cost, industry agreement, authorization, security, authentication, non-refutability, accessibility and reliability and anonymity and public policy
The appearance of data innovation to each part of human life and business has been obvious to
the point that it doesn't should be complemented more. Data innovation has been of extraordinary
substance in managing an account framework. This examination expects to explore the impact of
data innovation in the saving money arrangement of Bank. The information are acquired both
through the clients and the workers. The information were then broke down utilizing the correct
rate and the 5-point Liker scale to decide the effect of Information innovation in the saving money
framework undertakings. The discoveries at that point demonstrated that Information innovation
adds to the saving money framework in three diverse routes as tails: IT spares the season of the
clients and the representatives obviously, IT chops down the costs and IT encourages the system
exchanges.
Research Report on Net banking with reference to HDFC BankKumail Raza Muni
Project report is prepared to study various e banking services with reference of HDFC Bank.
It can be referred for those who are working for their bachelor thesis.
This chapter introduces banking technology as a confluence of several disparate disciplines such as finance (including risk management), information technology, computer science, communication technology, and marketing science. It presents the evolution of banking, the tremendous influence of information and communication technologies on banking and its products, the quintessential role played by computer science in full filing banks’ marketing objective of servicing customers better at less cost and thereby reaping more profits. It also highlights the use of advanced statistics and computer science to measure, mitigate, and manage various risks associated with banks’ business with its customers and other banks. The growing influence of customer relationship management and data mining in tackling various marketing-related problems and fraud detection problems in the banking industry is well documented.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
Biometrics is a highly reliable technology where it has become possible to use the characteristics of a person or user (biometrics) along with traditional passwords, and we can even say that it has become an indispensable complement in modern authentication systems today, especially with regard to bank accounts, banks, financial technology (FinTech) internet of things (IoT) devices and all a process related to money and privacy, and biometric methods are multiple and increasing day by day, the most famous of which is (iris, face chart, palm, fingerprint, and others). Biometric systems are immune and immune from modern electronic attacks, such as plagiarism or electronic theft, because the authentication here takes place when all conditions are met. Then the authentication is done and the process is completed, and the aim is to reach the highest levels of accuracy and security and to make the user more comfortable to deal with these modern systems that provide him with many advantages and high privacy.
CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN NIGERIAijistjournal
The purpose of this paper is to examine how we can achieve a cashless society in Nigeria especially given her infrastructure deficits. This study examines the cashless economic system so as to assess its feasibility in Nigeria with regards to timeless, preparedness and adequacy against the backdrop of our level of development both technologically and educationally. Nigeria has continued to evolve in different realms. The economy is being reformed, the institutions are being reshaped and laws are being re-examined so as to reposition the nation to take its rightful position in the international community. As a way of fasttracking the Nigerian economy so as to be among the first 20 world economies come 2020, Nigeria proposed 2012 for the adoption of the cashless economy system starting with Lagos State but could not realized its objective. The study used structured questionnaire as a means of data collection and the collected data were analyzed using simple percentage procedure. The results indicate that: majority of Nigerians are already aware of the policy and majority agree that the policy will help fight against corruption/money laundering and reduce the risk of carrying cash and can also foster economic growth. Major problems envisaged that can hinder the implementation of the policy are: cyber fraud, limited point of sales and numeracy illiteracy. Based on the findings some recommendations made are: the government should adopt a different strategy to educate the non-literate Nigerians about the cashless economy; and the Federal Government of Nigerian should establish a Cybercrime law.
Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near-field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Dr. B Srinivasa Rao | Ch. Sphoorthi | K. TejaSree | G. Sai Snigdha | V. S R Harika"Pay-Cloak:Biometric" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11430.pdf http://www.ijtsrd.com/computer-science/other/11430/pay-cloakbiometric/dr-b-srinivasa-rao
Implementation of NFC Technology was developed to facilitate instant payment transaction such
as purchase tickets, goods, or service to become one of the digital wallet besides to using credit cards.
The high rate of mobile devices usage in Indonesia make many companies take advantage of this device
as a media in electronic payment transactions, a lot of banking and financial product in Indonesia used this
technology such as E-money, T-cash, Flazz, Ooredoo, Dompetku, XL-Tunaiku, Doku Wallet, Skye card,
Artajasa MYNT and many more. The technique that used in this research to prove the hypotheses was
Structural Equation Model (SEM) using Smart PLS software, we will used questionnaire and literature
review method to found trend of NFC use. The population from which to draw conclusion was defined as
all individual capable use NFC Technology for payment transaction .In this study, we will investigate NFC
use in Indonesia, The proposed research model was develop by TAM Framework with some dimension
from NFC study literature that is Mobile Payment Knowledge, Technology, Trust, Behaviour and
Compatibility into the model, in order to determine the significant factor that influence of NFC use in
Indonesia.
A Study on Role of Technology in Banking Sectorijtsrd
The purpose of this study is to examine the relationship between new technology implementation in banking sector and customers How they are aware about the technologies and how they are using it Data for this study was collected from the customers of various Banking Sectors under the Reserve Bank of India A simple percentage analysis and pie chart will be done According to questioners 30 samples are collected and interpretations are given Findings suggest that most of the customers of bank using ATM facility So the banks need to give awareness about the E-banking services Lastly, the paper is of few papers that focus on technology development in banking industry Aswin Raj. T | Mr. Bala Nageshwara Rao "A Study on Role of Technology in Banking Sector" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18357.pdf
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
Mobile payment allows consumers to make more flexible payments through convenient mobile devices.
While mobile payment is easy and time save, the operation and security of mobile payment must ensure that
the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore,
this study based on technology acceptance model to explore the impact of external variables through
perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in
this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis
and regression analysis to verify the hypotheses. The results show that all hypotheses are supported.
However, mobile payment is still subject to many restrictions on development and there are limited related
researches. The results of this study provided insight into the factors that affect the users’ satisfaction for
mobile payment. Related services development of mobile payment and future research suggestions are also
offered.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution
for payment users. In view of rapid development in electronic payment system there is rise in fraudulent
activity in banking transactions associated with credit cards and card-not-present transaction.
M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to
the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging
in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions
could be confined by considering various parameters like user and device authentication, consumer
behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment
fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will
provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and
cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every
transaction for fraud risk and take pertinent decision.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Prototype mobile contactless transaction system in traditional markets to support the covid-19 physical distancing program
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3303~3312
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3205 3303
Journal homepage: http://beei.org
Prototype mobile contactless transaction system in traditional
markets to support the covid-19 physical distancing program
Irawan Afrianto, Mouhamad Hatta Hiroshi Sasmita, Sufa Atin
Department of Informatics Engineering, Universitas Komputer Indonesia, Bandung, Indonesia
Article Info ABSTRACT
Article history:
Received Aug 9, 2021
Revised Oct 10, 2021
Accepted Oct 21, 2021
One way to prevent and reduce the spread of the covid-19 pandemic is
through physical distancing program. This research aims to develop a
prototype contactless transaction system using digital payment mechanisms
and QR code technology that will be applied in traditional markets. The
method used in the development of electronic market systems is a prototype
approach. The application of QR code and digital payments are used as a
solution to minimize money exchange contacts that are common in traditional
markets. The results showed that the system built was able to accelerate and
facilitate the buying and selling transaction process in traditional market
environment. Alpha testing shows that all functional systems are running well.
Meanwhile, beta testing shows that the user can very well accept the system
that was built. The results of the study also show acceptance of the usefulness
of the system being built, as well as the optimism of its users to be able to take
advantage of this system both technologically and functionally, so its can be a
part of the digital transformation of the traditional market to the electronic
market and has become one of the solutions in reducing the spread of the
current covid-19 pandemic.
Keywords:
Contactless transaction
Covid-19
Digital payment
Prototype
QR code
Traditional market
This is an open access article under the CC BY-SA license.
Corresponding Author:
Irawan Afrianto
Department of Informatics Engineering
Universitas Komputer Indonesia (UNIKOM)
112-116 Dipati Ukur Street, Bandung 40132, Indonesia
Email: irawan.afrianto@email.unikom.ac.id
1. INTRODUCTION
The development of traditional markets or people's markets has contributed greatly to increasing
employment opportunities, economic growth, and people's income [1]. The number of traditional markets in
Indonesia reached 14,182 units in 2018, making traditional markets one of the basic foundations for regional
economies in Indonesia [2].
Traditional markets are markets that in practice are still traditional in nature where sellers and
buyers can fully interact and use cash payments in their transactions. The use of cash when transacting takes
more time to prepare money that fits your needs and time to wait for changes from sellers. In addition, by
transacting using cash, there is the potential for the spread of various diseases, this is because viruses and
bacteria can be attached to the exchange of money during the buying and selling process. In the face of
Indonesia's shifting cash-to-non-cash transaction trend, a new mechanism in the conventional market
environment is required to address these issues. Digital transformation can change business processes [3],
provide added value, and increase productivity [4], [5] can be used as a solution to these problems. In
addition, the current covid-19 virus outbreak has become a momentum for the acceleration of digital
transformation with various technologies that support it [6]. Research carried out in the context of
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3304
accelerating digital transformation in the covid-19 pandemic era includes changes in cash to non-cash
transactions in cities [7], changes in education models and methods [8], [9] as well as the role of e-wallets
during the covid-19 pandemic [10].
Electronic money-based digital payments in Indonesia are now starting to get the attention and trust
of their users. Electronic money is a means of payment in electronic form where the value of money is stored
in certain electronic media [11]. The user must first deposit the money to the publisher and keep it in
electronic media before using it for transaction purposes [12]. Electronic money is divided into two types,
namely e-money and e-wallet. E-money is a type of electronic money in the form of cards (chip-based).
Examples of e-money products include Flazz BCA, Brizzi BRI, JakCard Bank DKI. Meanwhile, e-wallets
are electronic money in the form of applications (server-based). Examples of e-wallet products include T-
Cash, Go-Pay, OVO, etc. E-wallets are a type of electronic money that can be accessed via smartphones [13].
E-wallets allow transactions to be carried out more quickly and safely without requiring change. So,
sellers can focus more on serving buyers and transaction activities are completed more quickly. In previous
research with the integration of a mobile payment system with NFC, it is proven that transactions between
two android smartphones can be completed quickly, namely 141.50 ms and transactions with NFC assistance
take 270.87 ms [14]. In other studies on mobile payments, it is revealed that since smartphones are an
inseparable part of the lives of all humans, the use of mobile payments will continue to increase in the future [15].
QR code was chosen as a medium for data interaction between two android smartphones because all
smartphones have cameras. So that it allows all smartphones to interact with the data needed in transaction
activities. Previous research has implemented QR code as a document licensing tool which contains
important information and enables fast and safe access to that information [16]. In other studies also revealed
that QR code has several advantages such as speed of access, storing more information, and the presence of
pattern recognition that allows the orientation of the QR code to be scanned in all positions [17], [18]. The
application of QR code technology and e-wallet payment has been implemented in areas such as public
transportation where QR codes and e-Wallets are used as a substitute for travel tickets, which are paid
automatically via e-wallets of passengers [19], [20]. Another application is in research [21], where QR codes
are used as a substitute for tickets for parking areas and are integrated with IoT devices and digital payments.
The use of QR codes and E-Wallet is also used in menu ordering and food payments at restaurants [22].
Another aspect that needs to be considered is the acceptance of the use of QR code technology and electronic
payments [23], both in terms of convenience [24] and how to create a sense of trust and usefulness of this
technology by users [25].
However, previous research that has been done, takes the theme of activities and environments that
are easy to adapt to new technologies. Meanwhile, the research developed leads to a traditional market
ecosystem, where users are ordinary people and still use traditional transactions. The aims of this research is
to integrate digital payments (e-wallets) and QR code by developing a prototype non-cash transaction system
which can be accessed on smartphones owned by sellers and buyers in traditional markets, as an alternative
of payment that can make transactions more practical, fast and secure. Furthermore, the prototype developed
will be tested as part of digital transformation in the traditional market environment, evaluated usefulness and
optimism the direct impacts on intention to adopt by users, and it is hoped that it can reduce the spread of the
covid-19 virus because the system used in transactions is contactless.
2. RESEARCH METHOD
To achieve the objectives of the research carried out, researchers used a prototyping approach. The
activities carried out in this study include problem identification, communication processes, planning
processes, rapid modeling and design, development processes, implementation and feedback, and finally
making conclusions and recommendations. Figure 1 shows the activities of the research activities carried out.
The first stage of this research is the problem identification activity, where the researcher identifies the
phenomena that become the problem and the potential solutions that can be used to solve the problem. The
second stage is communication, where the activity is by conducting interviews and observations, giving
questionnaires and conducting literature reviews, which are intended to get a clearer picture of the problem
and solutions that have been done before. The third stage is rapid planning, modeling, and design. This
activity begins with a system analysis in which the process includes analysis of current conditions and
analysis of system requirements to be developed, followed by system modeling, which aims to provide a
functional description of the software that will be built, as well as the functional design of the system to be
developed. The fourth stage of this research includes the stages of system development by coding the
software using the appropriate programming language and framework, implementing and testing the system
being built, and providing feedback on the system that has been built. The final stage of this research is to
provide conclusions and provide recommendations from the research that has been done.
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3305
Figure 1. The research methodology
3. RESULTS AND DISCUSSION
3.1. Proposed system architecture
The modeling stage of a system is used to make it easier for system developers to translate it into
the next stage. System modeling can use the rich picture mechanism as the first step towards system design
[26]. The proposed system consists of frontend and backend systems. The backend is made as a website-
based application while the frontend is made as an android based application. The frontend system consists of
two types of sub-systems, namely sub-systems for sellers and buyers, while the backend system is intended
for market managers. As an interactive tool for the two types of frontend systems for sellers and buyers in
sharing detailed shopping information on this system, QR code technology is used. And the payment
instrument used in this application is the Go-Pay e-wallet from Go-Jek based on the payment gateway. The
proposed system shows in Figure 2. The application involved in the transaction system architecture is the
frontend application of sellers and buyers. This architecture describes a series of processes Figure 3.
Figure 2. Proposed system architecture
Figure 3 explanation:
1) The buyer initializes the details of the shopping the buyer will buy.
2) The merchant application generates a transaction id that has been obtained from the data that has just been
stored into the database into a QR-Code.
3) The buyer scans the QR-Code on the merchant's device screen using the buyer application.
4) The buyer checks the shopping details on the application.
5) The buyer makes a payment from the buyer's application.
6) The system changes the transaction status concerned to "Paid".
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3306
Figure 3. Transaction system architecture
3.2. Functional requirements analysis
Functional requirements analysis describes the process of activities that will be applied in a system
and explains the requirements needed by the system for the system to run well [27]. Use case diagrams to
describe an interaction between one or more actors with the system to be created. Roughly, use cases are used
to find out what functions are in a system and who has the right to use these functions. Analysis of use case
diagrams on the system to be built can be seen in Figure 4.
Figure 4. Use case diagram of contactless system
The QR code in this system is used as a mechanism for sending transaction IDs from the merchant
application to the buyer's application. So that sellers and buyers can access the same transaction data in the
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3307
database according to the transaction id that has been raised. A general description of how QR code works in
the system is shown in Figure 5.
Figure 5. QR code analysis of contactless system
The payment gateway used in this system is the Midtrans payment gateway. Midtrans is used as an
intermediary so the system can make payments using Go-Pay. The architectural description of how midtrans
payment gateway and Go-Pay work can be seen in Figure 6.
Figure 6. Payment gateway analysis of contactless system
The payment mechanism that occurs uses an authentication token by utilizing the client key and
server key provided by the Midtran payment gateway. The transfer of payment transactions from the buyer's
application to the Go-Jek application will be carried out directly when the buyer's application has received
the transaction token from Midtrans.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3308
3.3. System implementation
The interfaces implemented in the system built are divided into three different parts, namely:
backend interfaces for a market manager: Figure 7 shows the application interface used by market managers
to manage data sellers, kiosks, and financial transaction data in their market.
Figure 7. Backend application for market manager
Frontend application for sellers: Figure 8 shows the application interface from the seller's side.
This interface is used to store data on products sold, prices, generate QR codes, and find out about financial
transactions at the kiosk. Frontend application for buyers: Figure 9 shows the interface from the buyer's side.
This interface is used to make transactions, scan the QR code of purchased goods, and pay for them using the
e-wallet it owns.
Figure 8. Frontend application for sellers
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3309
Figure 9. Frontend application for buyers
3.4. Discussion
Application testing is carried out using two test methods, namely the black box method and using a
questionnaire. Blackbox testing is focused on system testing activities that are built to see the extent to which
each function in the application has been running correctly, as expected, and free from errors. In addition to
testing the application from a functional side, system testing is also carried out by users who will take
advantage of the application. Acceptance of the use of applications is conducted with a questionnaire to
obtain conclusions about acceptance of application use from the user's side [28]. The black box test results
show that all functions from the perspective of market managers, sellers, and buyers have been able to run
properly according to their functions and there are no errors in the transactions. Meanwhile, Figure 10 shows
the results of the user acceptance test with a questionnaire, processed using a Linkert scale consisting of 5
intervals and 6 questions, the conclusion is that the average user acceptance, namely traders, is 86.04% and
buyers are 89%. This shows that the system has been very well received by its users. QRcode-based
transaction modules and payments using e-wallet have worked well to provide contactless transaction
services between sellers and buyers.
Figure 10. Result of user acceptance test
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3310
The implementation of a payment gateway in the system makes this service have a transaction
authentication process as well as ease of data processing, where the monitoring process can be carried out in
real-time, making it easier to confirm every incoming fund, make sales reports, and find out customer details.
However, the security of the electronic payment system is also something that needs to be considered by
applying multiple security methods [29], as well as considering factors related to its advantages and
disadvantages when used [30]. In addition, the prototype that was built still only uses one e-wallet service
where this limits the flexibility of users in the payment process for their transactions, as well as the trust of
users who are still unfamiliar with the use of e-wallet in their transactions.
4. CONCLUSION
The system that has been built can be used as a contactless transaction medium for transactions in
the traditional market environment. Transaction activities can be done quickly and instantaneously by
implementing the QR code feature and digital payments via smartphones. The use of alternative e-wallet
payments and features of sharing transaction details between sellers and buyers can increase the convenience
and speed of transactions. The existence of a payment gateway in the system makes it easier for users to find
out transactions in real-time, create reports, to their financial transactions. The measurements taken also show
acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take
advantage of this system both technologically and functionally. However, this research still has the potential
for development related to the strategy for implementing this technology so that the system and architecture
can increase trust in its use, especially the use of digital payments which are still not commonly used by
people in traditional market environments. As a result, digital transformation in traditional markets can be
done using this prototype. QR code and the use of e-wallet can be done as an alternative transaction medium
to replace traditional transactions. This study demonstrates how digital transformation may be used in
traditional market transactions such as buying and selling. By utilizing this technology, conventional money
exchanges can be minimized because they can be replaced with electronic payments so that the spread of the
covid-19 virus pandemic can be reduced. The next step of this research is to develop a smart traditional
market model where the digital transaction data that has been obtained will be used as the basic of market big
data and its analysis using artificial intelligence and business intelligence mechanisms.
ACKNOWLEDGEMENTS
The researcher expresses his deepest gratitude to the sellers and buyers in Cihapit traditional market
in Bandung who are willing to be a pilot project for system development and testing, as well as the
Indonesian Computer University (UNIKOM) who provided funding assistance for this research.
REFERENCES
[1] N. N. Ardhiansyah and T. Mahendarto, “Revitalizing And Reimagining The Indonesian Traditional Market (Case
Study : Salaman Traditional Market Indonesia),” IOP Conference Series: Earth and Environmental Science, vol.
436, no. 1, 2020, doi: 10.1088/1755-1315/436/1/012010.
[2] D. Ferricha and H. Fauzan, “How The Policy And Empowerment Of Traditional Markets In Indonesia?,”
International Journal Of Scientific & Technology Research, vol. 9, no. 4, pp. 3649–3652, 2020.
[3] N. T. H. Giang, P. T. T. Hai, N. T. T. Tu and P. X. Tan, “Exploring The Readiness For Digital Transformation In A
Higher Education Institution Towards Industrial Revolution 4.0.,” International Journal of Engineering Pedagogy,
vol. 11, no. 2, 2021.
[4] S. J. Berman, “Digital Transformation: Opportunities To Create New Business Models,” Strategy & Leadership.,
vol. 40, no. 2, pp. 16-24, 2012, doi: /10.1108/10878571211209314 .
[5] C. Ebert and C. H. C. Duarte, “Digital Transformation.,” Ieee Softw., vol. 35, no. 4, pp. 16–21, 2018.
[6] S. Kudyba, “Covid-19 And The Acceleration Of Digital Transformation And The Future Of Work,” Information
Systems Management, vol. 37, no. 4, pp. 284–287, 2020, doi: 10.1080/10580530.2020.1818903.
[7] Z. Allam, “The Forceful Reevaluation Of Cash-Based Transactions By Covid-19 And Its Opportunities To
Transition To Cashless Systems In Digital Urban Networks,” Surveying the Covid-19 Pandemic and its
Implication, pp. 107–117, 2020, doi: 10.1016/B978-0-12-824313-8.00008-5.
[8] N. Iivari, S. Sharma and L. Ventä-Olkkonen, “Digital Transformation Of Everyday Life–How Covid-19 Pandemic
Transformed The Basic Education Of The Young Generation And Why Information Management Research Should
Care?,” International Journal of Information Management, vol. 55, 2020, doi: 10.1016/j.ijinfomgt.2020.102183.
[9] I. Mustapha, N. T. Van, M. Shahverdi, M. I. Qureshi and N. Khan, “Effectiveness Of Digital Technology In
Education During Covid-19 Pandemic. A Bibliometric Analysis.,” International Journal of Interactive Mobile
Technologies, vol. 15, no. 8, 2021.
[10] H. M. Aji, I. Berakon and M. M. Husin, “Covid-19 And E-Wallet Usage Intention: A Multigroup Analysis Between
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3311
Indonesia And Malaysia,” Cogent Business & Management, vol. 7, no. 1, pp. 1-6, 2020, doi:
10.1080/23311975.2020.1804181.
[11] Y. Zhu, “The Development Of E-Commerce Practice Teaching Software Based On Online Payment And
Settlement,” International Journal of Online Engineering (iJOE), vol. 10, no. 2, pp. 4–9, 2014.
[12] T. Pambudi, A. Raden and S. T. Rahadi, “The Impact Of Pandemic Covid-19 On Digital Payment: Case Study On
Electronic Money In Indonesia,” International Journal of Advanced Research in Economics and Finance, vol. 3,
no. 1, pp. 70–79, 2021.
[13] D. A. Pramesti, E. K. Pratiwi, Z. B. Pambuko, F. Medias, A. Triyanto and N. Usman, “Digital Payment: User
Experience In Indonesia,” Test Engineering & Management, pp. 22536–22541, 2020.
[14] E. Husni and A. Ariono, "Development of integrated mobile money system using Near Field Communication
(NFC)," 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA),
2014, pp. 1-6, doi: 10.1109/TSSA.2014.7065959.
[15] Z. Bezovski, “The Future Of The Mobile Payment As Electronic Payment System,” European Journal of Business
and Management, vol. 8, no. 8, pp. 127–132, 2016.
[16] A. Wibiyanto and I. Afrianto, “Qr Code And Transport Layer Security For Licensing Documents Verification,”
IOP Conference Series: Materials Science and Engineering, vol. 407, no. 1, 2018, doi: 10.1088/1757-
899x/407/1/012069.
[17] S. K. Chatterjee, S. Saha, Z. Khalid, H. N. Saha, P. Paul and R. Karlose, "Space effective and encrypted QR code
with sender authorized security levels," 2018 IEEE 8th Annual Computing and Communication Workshop and
Conference (CCWC), 2018, pp. 439-443, doi: 10.1109/CCWC.2018.8301640.
[18] W. Widyasari, H. Sutopo and M. Agustian, “Qr Code-Based Learning Development: Accessing Math Game For
Children Learning Enhancement,” International Journal of Interactive Mobile Technologies (iJIM), 2019, doi:
10.3991/ijim.v13i11.10976.
[19] N. Anwar, R. Rasjidin, D. S. Najoan, C. Rolando and H. L. H. S. Warnars, “E-Payment For Jakarta Smart Public
Transportation, Using The Point System For E-Commerce,” Journal Of Physics: Conference Series, vol. 1477, no.
2, 2020, doi: 10.1088/1742-6596/1477/2/022035.
[20] H. L. H. S. Warnars, Y. Lanita, A. Prasetyo and R. Randriatoamanana, “Smart Integrated Payment System For
Public Transportation In Jakarta,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 3, pp. 241–249,
2017, doi: 10.11591/eei.v6i3.655.
[21] A. A. Saleem, H. U. R. Siddiqui, R. Shafique, A. Haider and M. Ali, “A Review On Smart Iot Based Parking
System,” International Conference On Soft Computing And Data Mining, Springer, Cham, pp. 264–273, 2020, doi:
10.1007/978-3-030-36056-6_26.
[22] S. A. A. Tarmazi, W. R. W. Ismail, N. A. S. N. Azmin and A. R. A. Bakar, “Consumer Purchase Intention Toward
Online Food Delivery Service: The Implication For Future Research,” Malaysian Journal of Social Sciences and
Humanities (MJSSH), vol. 6, no. 9, pp. 347–354, 2021, doi: 10.47405/mjssh.v6i9.972.
[23] V. Chang, W. Chen, Q. A. Xu and C. Xiong, “Towards The Customers’ Intention To Use Qr Codes In Mobile
Payments,” Journal of Global Information Management (JGIM), vol. 29, no. 6, pp. 1–21, 2021, doi:
10.4018/JGIM.20211101.oa37.
[24] R. Liu, J. Wu and G. F. Yu-Buck, “The Influence Of Mobile Qr Code Payment On Payment Pleasure: Evidence
From China,” International Journal of Bank Marketing, vol. 39, no. 2, pp. 337-356, 2021, doi: 10.1108/IJBM-11-
2020-0574.
[25] G. F. Djayapranata and A. Setyawan, “Trust Or Usefulness? Qr Code Payment Among Millennials In A Disrupted
Market,” 18th International Symposium on Management (INSYMA 2021). Atlantis Press, pp. 194–199, 2021.
[26] I. Afrianto, A. Heryandi, A. Finandhita and S. Atin, “E-Document Autentification With Digital Signature Model
For Smart City In Indonesia”Journal of Engineering Science and Technology, vol. 15, pp. 28-35, 2020.
[27] A. Heryandi and I. Afrianto, “Online Diploma Supplement Information System Modelling For Indonesian Higher
Education Institution,” IOP Conference Series: Materials Science And Engineering, vol. 662, no. 2, 2019, doi:
10.1088/1757-899x/662/2/022092.
[28] S. Basak And M. S. Hosain, “Software Testing Process Model From Requirement Analysis To Maintenance,”
International Journal of Computer Applications, vol. 107, no. 11, 2014.
[29] G. Ali, M. Ally Dida and A. Elikana Sam, “Two-Factor Authentication Scheme For Mobile Money: A Review Of
Threat Models And Countermeasures,” Future Internet, vol. 12, no. 10, 2020, doi: 10.3390/fi12100160.
[30] S. Yakean, “Advantages And Disadvantages Of A Cashless System In Thailand During The Covid-19 Pandemic,”
The Journal of Asian Finance, Economics, and Business, vol. 7, no. 12, pp. 385–388, 2020, doi:
10.13106/jafeb.2020.vol7.no12.385.
10. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3312
BIOGRAPHIES OF AUTHORS
Irawan Afrianto is a lecturer at the Department of Informatics, Universitas Komputer
Indonesia (UNIKOM) Bandung. Currently completing the Computer Sci-ence Doctoral
program at IPB University Bogor with the research field of Blockchain Technology in
agroindustry.
Mouhamad Hatta Hiroshi Sasmita is an alumni of Informatics Department, Universitas
Komputer Indonesia (UNIKOM) Bandung. Currently working as an Android Developer at PT.
Nostra Technology.
Sufa Atin is a lecturer at Informatics Department, Universitas Komputer Indonesia
(UNIKOM) Bandung. The areas of research undertaken are in information systems, software
project management and socio-informatics.