Journal of Applied Information, Communication and Technology

Journal Information
ISSN / EISSN : 2355-1771 / 2723-4827
Total articles ≅ 21
Filter:

Latest articles in this journal

Evan Tirta Wahyudi, Alva Erwin, Charles Lim
Journal of Applied Information, Communication and Technology, Volume 7, pp 99-105; doi:10.33555/jaict.v7i2.110

Abstract:
The research is conducted based on the nationwide goals of Indonesia proposed in the Nawacita document, where one of the big goals is to improve the human resource greatly. Providing a good medium such as a job marketplace can be part of improving the human resource. Since most of Indonesian citizen nowadays has easy access to internet, which can ease their way of using a job marketplace application. Creating a job marketplace application may minimize a number of unemployment in Indonesia. Addition to that, through a focus group discussion, it has been discovered that respondents find job marketplace such as JobStreet and Indeed jobs does not satisfy respondents’ UI and UX view towards the application. The objective of this research is to create a job marketplace mobile application that is useful and easy to use for users. The prototype mobile application is developed using react native, and a middleware that is developed using Express JS is made alongside to bridge data to the mobile application. To assess the prototype mobile application, two evaluation method is used which is User Experience Questionnaire (UEQ) and Questionnaire User Interface Satisfaction (QUIS). 6 respondents were allowed to examine prototype application, and answer the questionnaire. The result of the evaluation both shows positive results from both questionnaires.
Marchelno Leeson, James Purnama, Maulahikmah Galinium
Journal of Applied Information, Communication and Technology, Volume 7, pp 27-43; doi:10.33555/jaict.v7i1.104

Abstract:
The purpose of this research is to develop a self-service photo booth that implements augmented reality which is named as BildBox! where it allows the user of this product to try on different costumes virtually. There will be discussion on the Business Analysis that is conducted in this research to know the potential of the product as well as discussing the features that are implemented in the product. The development of the product’s software will be using Unity game engine and the depth image is taken by using Microsoft’s Kinect v2 depth camera. Aside from the discussions mentioned above, there will be also charts shown from the results of the surveys conducted. In the end, there will be a conclusion drawn from the survey results.
Stefanus Oliver, Tommy Winarta
Journal of Applied Information, Communication and Technology, Volume 7, pp 15-25; doi:10.33555/ejaict.v7i1.73

Abstract:
In this digital era, numerous copyrighted items such as music and movies can be enjoyed online. However, our activities in enjoying those entertainments are also limited by the copyright law. Some contents are also protected by Digital Rights Management, which makes sure that the user who purchases the item is the only person who has the right to enjoy the content. All of these rules are obviously made to make sure that everything is in order. Therefore, those illegal activities can be brought to justice. However, the lack of communication might present an ambiguity to the users, and those users might unconsciously do illegal things that are previously forbidden. Other than that, the law itself has its own limitation in the aspect of execution and enforcement, causing pirated versions of a content can be found easily on the internet. This paper is going to review the current condition of the execution of the law regarding the DRM protected contents.
Jason Yapri, Rinkel Hananto
Journal of Applied Information, Communication and Technology, Volume 7, pp 1-6; doi:10.33555/ejaict.v7i1.70

Abstract:
The term “hacker” has been spread around the world and has always been considered as a threat when we use the internet. We often hear hackers deface websites’ contents and break into system to steal private and confidential information, such as account’s username and password, credit card numbers and others. This is definitely an unethical behavior of irresponsible people who mostly aims to gain profit. However the term hacker, on the contrary actually originates from an expert computer technicians who tries to access the system to debug and fix security problems of the system. Nowadays there are dozens of websites out there and some of those websites have low level of security. Hacker can easily break through their system and steal their private confidential data but just because these websites have low level security, that doesn’t mean that it is ethical to break into someone’s system and read their data. It goes the same when someone entering other people’s house because the door was left open by the owner. As web development grows rapidly, security has become an essential part to make the website more secure and reliable. This is when a group of people decided to make a collaborative project on the implementation of SSL (Secure Socket Layer) and TLS (Transport Layer Security) that is available to be used by everyone. This project is called as OpenSSl and has been used by most of the websites in the internet today. What if this OpenSSL, which has been trusted and implemented by 2/3rd of the websites all around the world can be breached? Definitely it will attract dozens of hackers all around the world to do something unimaginably dangerous.
Jeffry Hirawan, Itmam Al Rasyid
Journal of Applied Information, Communication and Technology, Volume 7, pp 7-13; doi:10.33555/ejaict.v7i1.76

Abstract:
Nowadays social networks become very common. People use social media to keep people in touch, businesses, organizations, and many more. The information you share with your friends in the social media allows them easily to keep in touch with you. However beside friends, colleges, relatives, there are many people that are interested in the private information on social media. Identity thieves, scam artists, debt collectors, stalkers, companies use social networks to gather information. Companies that use social networks for getting information about people are intended to personalize their services for the users and to sell to advertisement. In this paper we will discuss the advantage and disadvantage of using social media and what kind of information is safe to post and how to protect it.
Nastassja Michelle, Maulahikmah Galinium, Kho I Eng
Journal of Applied Information, Communication and Technology, Volume 7, pp 45-60; doi:10.33555/jaict.v7i1.112

Abstract:
The aftermarket automotive company has a set of documents that is called Customer Information Folder (CIF). The CIF is used by the salesmen to record every activity, observation and sales made with their customers. Currently, the CIF is a pile of papers, in which paper misplacement can occur and data can be mixed up, and salesmen must return to the office at the end of the day to write down what they have done. The objective of this research is to create a mobile sales force system with a web application back-end that can help the company handle customer data and the system can also assist in managing others such as sales, orders, stocks and commissions. Based on request from the company, an ERP system is planned to be developed, starting from customer data (CIF / SFA), orders, stocks and commissions, which are developed for this research. The result of this research shows that the new system can help provide and manage data relating to customers, orders, stocks and commissions. Secondly, the new system can reduce paper usage by half through the simulation. Thirdly, the new system can provide organized, accurate and trustworthy data. Fourthly, the new system can help the Sales Department and company owner in determining sales trends and buying trends. Lastly, the new system is shown to have fulfilled user expectation as there are positive gaps between expectation and perception.
Timothy Dicky, Alva Erwin, Heru Purnomo Ipung
Journal of Applied Information, Communication and Technology, Volume 7, pp 71-78; doi:10.33555/jaict.v7i2.108

Abstract:
The purpose of this research is to develop a job recommender system based on the Hadoop MapReduce framework to achieve scalability of the system when it processes big data. Also, a machine learning algorithm is implemented inside the job recommender to produce an accurate job recommendation. The project begins by collecting sample data to build an accurate job recommender system with a centralized program architecture. Then a job recommender with a distributed system program architecture is implemented using Hadoop MapReduce which then deployed to a Hadoop cluster. After the implementation, both systems are tested using a large number of applicants and job data, with the time required for the program to compute the data is recorded to be analyzed. Based on the experiments, we conclude that the recommender produces the most accurate result when the cosine similarity measure is used inside the algorithm. Also, the centralized job recommender system is able to process the data faster compared to the distributed cluster job recommender system. But as the size of the data grows, the centralized system eventually will lack the capacity to process the data, while the distributed cluster job recommender is able to scale according to the size of the data.
Livani Livani, Kho I Eng, James Purnama
Journal of Applied Information, Communication and Technology, Volume 7, pp 61-69; doi:10.33555/jaict.v7i2.114

Abstract:
Batik industry has mostly been producing apparels only for standard size and none of the online platform that sells batik has been supported body positivity campaign. Another problem is found in the online stores, which do not support multi stores. Most of the existed marketplaces do not provide multi store for the users. There exists platform with multi store capability. However, the users have to pay a substantial amount of fee for the activation [magento]. Therefore, the purpose of this research is to analyze the business process of creating an online platform to sell batik specifically to people with oversize condition with multi stores capability. The multi store capability (done by other research fellows) is part of a project, which includes this research. We have conducted preliminary online research and interview and surveys after the prototype has been launched to get feedback from users. Users believe the idea of the platform and the development is a good start and it has contributed to positive .
Gianino Masasi, James Purnama, Maulahikmah Galinium
Journal of Applied Information, Communication and Technology, Volume 7, pp 91-97; doi:10.33555/jaict.v7i2.109

Abstract:
Existing handwriting recognition solution on mobile app provides off premise service which means the handwriting is processed in overseas servers. Data sent to abroad servers are not under our control and could be possibly mishandled or misused. As recognizing handwriting is a complex problem, deep learning is needed. This research has the objective of developing an on premise Indonesian handwriting recognition using open source deep learning solution. Comparison of various deep learning solution to be used in the development are done. The deep learning solution will be used to build architectures. Various database format are also compared to decide which format is suitable to gather Indonesian handwriting database. The gathered Indonesian handwriting database and built architectures are used for experiments which consists of number of Convolutional Neural Network (CNN) layers, rotation and noise data augmentation, and Gated Recurrent Unit (GRU) vs Long Short Term Memory (LSTM). Experiment results shows that rotation data augmentation is the parameter to be change to improve word accuracy and Character Error Rate (CER). The improvement is 64.8% and 23.2% to 69.6% and 20.6% respectively.
Indra Swarna, James Purnama, Randy Anthony
Journal of Applied Information, Communication and Technology, Volume 7, pp 79-89; doi:10.33555/jaict.v7i2.106

Abstract:
Kunyahku is an online catering platform that provides catalogs of menus from local caterer near the user and become the distributor that will take the order and deliver them. In developing an application, the most important aspect for small start-up companies is to have a development stack that can deliver the app into multiple platform by using a single code base to reduce the cost of developers, improve efficiency and reduce the time to develop the application itself. To provide the necessity of building an application for Kunyahku, this paper is aimed to find the most suitable cross platform framework for developing the Kunyahku application. This research focuses on comparison between existing popular cross-platform and proving the suitable one to be used in development cycle in the case of Kunyahku requirements. Sets of test and comparison were conducted in order to compare the most suitable cross platform between React Native and Flutter such as render test and comparing each advantage coming out from using each of the cross-platform.After all the requirements are gathered and then the most suitable framework will be chosen which is Flutter. Performance analysis and the benefits of using Flutter framework are elaborated and thus proving it is the most suitable development stack to be used in Kunyahku case and the development time can be reduced since it is a cross-platform technology that output the application into three different platform rather than managing separate platform for each different one. Testing shows that flutter also met all the requirements thus proving flutter address the problems of scalability and faster development compared to developing each native platform one by one.
Back to Top Top