<html>
<HEAD>
<TITLE>Journal of Theoretical and Applied Information Technology - October 2020 Volume 98 No 20</TITLE>
<META http-equiv=Content-Type content="text/html; charset=windows-1252">
<META http-equiv=Content-Language content=en-us>
<meta name="keywords" content="Journal of information technology, IT Research, essay, essay paper, to publish research paper,Information Technology Journal, research on, the 
paper, Software Engineering Journal, SCOPUS, Quick Publication, Fast Publication time, Publish Research, journal of Computer Science, Volumes,electronic,Information systems,System Software,
Artificial Intelligence,Computer Architecture,Intelligent Systems,Software engineering,Genomics and Bio-informatics,Internet and Web,AI, Artificial Intelligence, Expert systems,
Computer Simulation,Database Systems,Neural Networks,Bioinformatics,Computational Intelligence,Language and Search Engine Design,E-commerce,Wireless Communications,Computer system, 
Artificial Intelligence Computer S/W &  H/W Architecture
Intelligent Systems
Software Engineering
Internet And Web
Ai & Expert Systems
Computer Simulation
Database Systems
Neural Networks
Bioinformatics 
Computational Intelligence
Programming Languages
Search Engine Design
E-Commerce
Wireless Communications
Computer Systems
Control Systems
System Engineering
 Theory Of Computation
Automata Theory 
(Formal Languages)
Computability Theory
Computational Complexity Concurrency Theory
Algorithms
Data Structures
Operating Systems
Computer Communications           Information Theory
Internet, World Wide Web
Wireless Computing 
Mobile Computing
Computer Security 
Reliability
Cryptography
Fault-Tolerant Computing
Distributed Computing
Grid Computing
Parallel Computing
High-Performance Computing
Quantum Computing
Computer Graphics
Image Processing
Scientific Visualization
Computational Geometry
Software Requirements 
Software Design
 Unified Modeling Language 
Software Development
 Software Testing
Software Maintenance
 Software Configuration Management & S/W 
Software Processes
Software Engineering Tools CASE
Software Quality
Formal Methods 
Programming Languages
Programming Paradigms
Program Semantics
Compilers
Concurrent Programming Languages
Information Science
Database
Multimedia, Hypermedia
Data Mining
Information Retrieval
Artificial Intelligence
Automated Reasoning
Computer Vision
Machine Learning
Artificial Neural Network
Natural Language Processing (Computational Linguistics)
Expert Systems
Robotics
Human-Computer Interaction
Numerical Analysis
Symbolic Computation
Computational Number Theory
Computational Mathematics
Scientific Computing (Computational Science) Computational Biology (Bioinformatics)
Computational Physics
Computational Chemistry
Computational Neuroscience
Computer-Aided Engineering
Finite Element Analysis
Computational Fluid Dynamics
Computing In Social Sciences, Arts And Humanities, Professions
Computational Economics
Computational Sociology
Computational Finance
Humanities Computing (Digital Humanities)
Information Systems (Business Informatics)
Management Information Systems
Health Informatics
Mathematical Logic 
Number Theory 	
Graph Theory
Type Theory 	
Category Theory 
Computational Geometry Quantum Computing Theory
Digital Logic 
Micro Architecture Multiprocessing
Bioinformatics 	
Cognitive Science Computational Chemistry Computational Neuroscience Computational Physics Numerical Algorithms 
Symbolic Mathematics
Data Transmission
Communication Network
Network Architecture
Network Simulation
Cryptography
Machine Translation
Machine Vision
Semantic Web
Virtual Reality
3D Technology
Laser Displays
Genetic Engineering
Swarm Robotics
Programmable Matter
 Computer Ethics
Rugged Computer, 
Portable Computing
Agri-Informatics
Computer Education
System Simulation
VLSI Design
Induction Motors
Multi-Agent Systems
Pattern Recognition
Computing in Technology
Computing In Mathematics Computing in Natural Sciences
Computing in Applied Sciences
Computing in Physical Sciences
Computing in Life Sciences
Computing in Social Sciences 
Computing in Engineering 
Computing in Medicine
Soft and Hard Computing">

<meta name="description" content="Journal of Theoretical and Applied Information Technology 

is a peer-reviewed electronic research papers & review papers journal with aim of promoting 

and publishing original high quality research dealing with theoretical and scientific 

aspects in all disciplines of IT (Informaiton Technology" >
<META name="revisit-after" content="7 days">


<link rel="stylesheet" type="text/css" href="http://jatit.org/css/style.css">
<style>
<!--
h2
	{margin-bottom:.0001pt;
	text-align:center;
	page-break-after:avoid;
	font-size:12.0pt;
	font-family:"Times New Roman";
	margin-left:0in; margin-right:0in; margin-top:0in}
.auto-style4 {
	text-align: center;
}
.auto-style5 {
	font-family: "Times New Roman", Times, serif;
	font-size: medium;
}
.auto-style6 {
	color: #FFFFFF;
}
.auto-style7 {
	text-decoration: underline;
}
.auto-style3 {
	font-family: "Times New Roman", Times, serif;
}
-->
</style>
</Head>

<body bgcolor="#e5e5e5">
<div align="justify"></div>
<table style="border-collapse: collapse" width="100%" cellspacing="0" cellpadding="0" 

border="0"><tbody><tr><td width="15%" height="5" align="center">
	&nbsp;</td><td width="28%" height="20"> &nbsp; </td><td width="57%" height="20" 

background="http://www.jatit.org/images/back1.gif">                       
<center>                        <font face="Verdana" color="#0c479d"><a class="blink" 

href="http://jatit.org/guest/addentry.php">
FeedBack</a> </font>                         &nbsp;&nbsp;                        <font 

face="Verdana" color="#003366">
|</font>                        <font face="Verdana" color="#0c479d"><a class="blink">
Contact Us</a>&nbsp;&nbsp;&nbsp;                        <font face="Verdana" 

color="#003366">
|</font>                        <font face="Verdana" color="#0c479d"><a class="blink" 

href="http://www.jatit.org/links/links.html">
Links</a>&nbsp;&nbsp;                             </font>                         <font 

face="Verdana" color="#003366">
|&nbsp;&nbsp;</font>                        <font face="Verdana" color="#003366"><a 

class="blink" href="http://jatit.org/sitemap.php">
Site Map&nbsp;</a> </font>                        </font></center><font face="Verdana" 

color="#0c479d">                                     </font></td></tr><tr><td width="20%" 

height="85">               <img width="100%" height="100" border="0" 

src="http://www.jatit.org/images/logo.jpg" alt="JATIT logo"></td><td width="80%" height="85" 

colspan="2">               <img width="100%" height="100%" border="0" 

src="http://jatit.org/images/1.jpg" alt="Jatit -Welcome Message"></td></tr></tbody></table> 
<table style="border-collapse: collapse" width="100%" cellspacing="6" cellpadding="0" 

border="0"><tbody><tr><td width="100%" height="26" 

background="http://jatit.org/images/back2.gif">             
<center>                  
<h1>                                         Welcome to Journal of Theoretical 
and Applied Information Technology                                    </h1>             

</center>                </td></tr><tr><td width="100%" height="385" rowspan="2">            
<table style="border-collapse: collapse" width="100%" height="398" cellspacing="1" 

cellpadding="2" border="0" id="body-table" class="Newsletter_Content"><tbody><tr 

valign="top"><td width="17%" height="100%" id="navigation">                               
<table style="border-collapse: collapse" width="100%" height="150" cellspacing="0" 

cellpadding="0" border="0"><tbody><tr><td width="100%" valign="top" height="75" 

align="left">                                                                                

                                                             
<p class="menu">                                                  <a href="/index.php">
Home</a></p>
<p class="menu">                                                  <A 

href="http://www.jatit.org/volumes.php">Volumes</a>

                                                  </p>

                                                  <p class="menu">
                                                  <A 

href="http://www.jatit.org/submit_paper.php">
                                                  Submit Paper</a><p class="menu">
                                                  <a 

href="http://www.jatit.org/enter_manuscript.php">
												

													Manuscript Status</a><p class="menu">
                                                  <A 

href="http://www.jatit.org/author_guidelines.php">
                                                  Author Guidelines
                                                 </a>
<p class="menu">
                                                 
                                                 <A 

href="http://www.jatit.org/Editorial_Board.php">
                                                  Editorial Board
                                                 </a>
                                                 
                                                 <p class="menu">                                                   
<a href="http://www.jatit.org/indexing.php">Indexing and Abstracting</a></p><p class="menu">
                                                  <a 

href="http://www.jatit.org/subscribe.php">
												

													Subscribe to JATIT</a><p class="menu">
                                                 <a 

href="http://www.jatit.org/contact_us.php">
                                                 Contact Us
                                                 </a>
                                              
                                          </P>
<p class="menu">                                                   
<a href="/contact_us.php">
&nbsp;</a></p>
<p class="menu">                                                   
<a href="/contact_us.php">
<font color="#008000">Frequency :</font><u><font color="#FF0000" face="Castellar" size="2">Monthly</font></u></a></p>                                                                     

          

                                                                                             

         
          </td></tr><tr><td width="100%" valign="top" height="75" align="left">              

                                                                                             

                                  &nbsp; <!--
Here was the subscribe message, but it should be changed to some thing else
-->                                                                                          

                                                     
<table style="border-collapse: collapse" width="100%" border="0" cellpadding="0" 

cellspacing="0" height="150">
<tbody>
<tr>
<td valign="top" width="100%" align="left" height="75">
<p align="justify"><br />
<br /><font color="#0000cc"><u><strong>Submit Paper / Call for Papers</strong></u></font><br 

/>
<br />
		Journal receives papers in continuous flow and we will consider articles 
from a wide range of Information Technology disciplines encompassing the most 
basic research to the most innovative technologies. Please submit your papers 
electronically to our submission system at http://jatit.org/submit_paper.php in 
an MSWord, Pdf or compatible format so that they may be evaluated for 
publication in the upcoming issue. This journal uses a blinded review process; 
please remember to include all your personal identifiable information in the 
manuscript before submitting it for review, we will edit the necessary 
information at our side. Submissions to JATIT should be full research / review 
papers (properly indicated below main title).</p></td></tr></tbody></table>                  

                                                                                             

                                </td></tr></tbody></table></td>
	<td width="66%" bgcolor="#e0e0e0" align="justify" rowspan="2">        
	
<div align="left">
<table bgcolor="#727476" border="0" cellpadding="10" cellspacing="1">
<tbody>
<tr>
<td valign="top" style="width: 674px; height: 55px;" class="auto-style4">
<span class="auto-style5"><strong><span class="auto-style6">Journal of 
Theoretical and Applied Informtion Technology</span><br></strong></span>
<span class="auto-style6"><span class="auto-style7">October 2020 | Vol. 98&nbsp; 
No.20</span> </span></td></tr>
<tr>
<td bgcolor="#e5e5e5" valign="top" style="height: 196px; width: 674px" class="auto-style4"> 			

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
TOWARD ACHIEVING SELF-RESOURCE DISCOVERY IN DISTRIBUTED SYSTEMS BASED ON 
DISTRIBUTED QUADTREE</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
SALEH ALI ALOMARI, MUHYEEDDIN ALQARALEH, EMRAN ALJARRAH, MOWAFAQ SALEM ALZBOON</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Shared computing infrastructures such as Peer-to-Peer (P2P) networks and grid 
technologies allow sharing resources between a large amount of geographically 
and dynamically distributed resources to achieve an efficient degree of the 
performance of supercomputing. The main issue of this performance refers to the 
resource discovery as it is considered an essential and significant part in the 
infrastructure of shared computing. Several approaches pertaining to the 
resource discovery are suggested to perform resource discovery objective. These 
approaches cause an extensive response time, higher query cost and exceptional 
network traffic where the reasons behind these causes refer back to the dynamic 
construction and the distribution call of these approaches. Additionally, very 
rare approaches could tackle the problems of query hitting rate, memory 
utilisation and locality. These issues are critical to performance of a system. 
Therefore, an in-network querying organisation method, namely, the Distributed 
Quadtree (DQT) is proposed in this paper. This method produces efficient 
in-network resources of values nod’s, including the distance conscious querying. 
The answering price of a query that is related to the value of definite 
resources at their maximum value is a static factor of the distance “d” to the 
close resources within the network. The construction of the DQT is local and 
does not include any existing announcements. Further, according to its stateless 
setting and orderly organisation, the proposed method is considered flexible 
within a failure intelligence.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Shared Computing, Resource Discovery, Quad-Tree.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/1Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
&nbsp;A MODEL OF THE E-WALLET ADOPTION IN SMALL AND MEDIUM ENTERPRISES (SME) 
INDONESIA</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
HENDRO GUNAWAN, SEK YONG WEE, RAJA RINA BINTI RAJA IKRAM</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Information technology (IT) is widely recognized as an important resource for 
increasing the productivity of a country's economy. New technological 
innovations in business transactions have a huge impact on current business 
activities. Electronic Wallet (E-Wallet) is one of the technological innovations 
that is currently developing. E-wallet is a software that uses electronic 
devices such as personal computers or smartphones to make transactions online. 
Along with the development of e-wallet in Indonesia, this study aims to find out 
the e-wallet adoption model to analyze the decisions of SMEs using e-wallet. To 
analyze an organization about the adoption of a technology, the adoption of 
suitable theories is the Technology-Organization-Environment (TOE) and Diffusion 
of Innovations (DOI). The proposed research model was developed by extending the 
TOE and DOI by adding the Technology acceptance model (TAM) and guanxi theories. 
The variables that will be used to analyze the determinant factors of e-wallet 
adoption in Small and Medium Enterprises (SME) in Indonesia are: perceived 
compatibility, perceived security, perceived cost, perceived benefits, firm's 
financial resources, perceived complexity, employee IT Knowledge, SME IT 
infrastructure, top management support, culture, competitive pressure, customer 
pressure, government support, perceived usefulness, perceived ease of use and 
knowledge sharing. The result of this study would be useful to understand about 
the adoption of E-Wallet in Small and Medium Enterprises (SME) Indonesia.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
E-Wallet, Small And Medium Enterprises (SME), Technology Acceptance Model (TAM), 
Diffusion Of Innovations (DOI), Technology-Organization-Environment (TOE), 
Guanxi.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/2Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
CHALLENGES AND OPPORTUNITIES FOR INTRUSION DETECTION SYSTEM IN CLOUD COMPUTING 
ENVIRONMENT</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
HESHAM M. EL MASRY , AYMAN E. KHEDR , HATEM M. ABDUL-KADER</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
The paper suggests an anomaly multi Phases intrusion detection technique for 
discovering the zero-day, fast-spreading and complicated network attacks on the 
cloud platform with the least amount of false alarm rate. Cloud computing is 
commonly regarded as an attractive business model, because it minimizes 
expenditure and its costs are directly related to use and demand. But the 
distributed nature of cloud computing environments, their vast aggregation of 
resources, large user access, efficient and automated resource sharing allow 
Intruders to use cloud to their advantage. The objective of this paper is to use 
the comparative approach to review, analyze and evaluate all of the existing 
Intrusion Detection Systems (IDSs) types, techniques, algorithms and all of the 
previous attempts related to securing and detecting the attacks on the cloud 
environment. The article concluded that the existing IDS techniques and 
algorithms are not capable in detecting the unknown attacks with minimum false 
alert rate in cloud platform. The effectiveness of the new intrusion detection 
technique can be evaluated by measuring the accuracy and false alert rate.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Intrusion Detection Systems (IDS), Hybrid Based IDS, Binary Classification and 
K-NN, PSO and Machine Learning, Genetic Algorithm and Artificial Neural Network.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/3Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
PSEUDO RANDOM NUMBER GENERATOR BASED ON LOOK-UP TABLE AND CHAOTIC MAPS </td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
MOHAMMED ABUTAHA, MOHAMMAD ABUJOODEH</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Pseudo-Random Number Generators (PRNGs) play an important role in many 
cryptographic applications. Many network security algorithms and protocols that 
are based on cryptography also require random or pseudorandom numbers at certain 
points. PRNG is an algorithm that is used to generate a random sequence that has 
the same behavior of truly random numbers. Each generated number should not 
depend on the previously generated numbers, and thus it is not possible to 
predict such numbers. However, not all PRNGs are suitable for cryptographic 
applications. Therefore, various statistical tests can be applied to the 
obtained sequence to evaluate and compare it with truly random sequences. A PRNG 
that passes all statistical tests can be considered as a statistically secure 
PRNG. Based on some properties of chaos, such as randomness, unpredictability, 
and high sensitivity to the secret key, we proposed a new PRNG. The proposed 
PRNG is based on a modified chaotic map proposed in [20], and a new lookup 
table, which is created in such way that the stored numbers will not be 
duplicated in the same row, column, or diameter. The proposed map and lookup 
table are used to produce non-linear and non-invertible functions, which are the 
main targets of any secure PRNG. As a result, the behavior of the proposed PRNG 
simulates the behavior of TRNGs. The obtained results from the cryptographic 
analysis and the standard statistical National Institute of Standards and 
Technology (NIST) tests indicate the robustness of the proposed PRNG. 
Furthermore, it is robust against known cryptographic attacks, and it has a 
strong non-linearity compared to the other systems. A comparison study of 
efficiency in terms of both speed performance and robustness against 
cryptanalysis was done, and the results demonstrate the superiority of the 
proposed algorithm.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
PRNG, Cryptographic, Randomness, Statistical Tests, Chaos. </td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/4Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
DORSAL FIN INTERACTION ANALYSIS OF A BIOINSPIRED SURFPERCHE ROBOT </td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
FAUSTO CABRERA, CLAUDIO ROSSI, DANIEL NOBOA</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Marine species such as fish have a morphology that has been adapted over time to 
reduce resistance in underwater displacement as well as staying submerged, 
therefore the present research focuses on the study of the bluebird fish robot, 
under four parameters of analysis, hydrodynamics, hydrostatics, kinematics and 
dynamics, to submerge the robot in the Amazonian rivers where the habitat of 
this species is found, there is in the future to monitor underwater life. A 
dorsal fin of 2 degrees of freedom was designed an built using a 3D printer, the 
rigid fin was driven by a servomotor and control system, all of them were 
waterproofed, the body can stay underwater near to zero buoyancy with tendency 
to submerge, the reaction of the movement of the dorsal fin and the reaction of 
the robot displacement was determined via some tests.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Dorsal fin, bioinspired robot, underwater vehicles, robot stability.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/5Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
ANALYSIS OF RELATIONSHIP CLV WITH 8 CORE DRIVES USING CLUSTERING K-MEANS AND 
OCTALYSIS GAMIFICATION FRAMEWORK</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
FITRI MARISA, SHARIFAH SAKINAH SYED AHMAD, ZERATUL IZZAH MOHD YUSOH, TUBAGUS 
MOHAMMAD AKHRIZA, ANASTASIA L MAUKAR, ANANG ARIS WIDODO</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
The CLV model is an indicator used to measure and evaluate the future value of 
customers to the company. But the CLV model is predictive where it will be more 
accurate if there are many supporting variables, one of which is customer 
motivation. Adopt the point of view of the Octalysis gamification framework, 
that behavior occurs because of an individual's motivation or drive. Therefore, 
it is important to explore what drives influence customer behavior, so that it 
can affect the customer's future value (Customer Lifetime Value). By using the 
K-Means clustering approach, CLV value weighting, and Octalysis framework, the 
study analyzes the relationship between CLV and 8 core drives to customer 
motivation to produce 3 contributions: (1) The results of K-Means analysis of 
customers based on variables L, R, F, M and CLV value weights have produced the 
best cluster k = 2 where segment-2 has a future value level (CLV) of the company 
higher than segment-1, (2) Likert scale comparison analysis and the relationship 
between the results of CLV segmentation on 8 core drives motivational resellers 
to produce similarity of ranking patterns on each core drive and its average, 
meaning that between the customer's future value (CLV) with 8 core drives the 
customer motivation is not interplay. (3) Comparative Octalysis analysis of the 
balance of 8 core drives resellers in the two segments results in a difference 
in the total Octagon score (segment-2 = 368, segment-1 = 419), and this means 
that the high or low future value of the customer against the company is 
inversely proportional to the high and low of 8 core drives reseller of 
companies.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Gamification, Octalysis, K-Means Clustering, CLV, SME</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/6Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
&nbsp;INVESTIGATING THE ROLE OF USER EXPERIENCE IN THE ONLINE SHOPPING SYSTEM: 
AN EXTENSION OF THE TECHNOLOGY ACCEPTANCE MODEL</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
QUYNH NGOHAI, HOAI NGUYENTHANH, VANLOI NGUYEN</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
The Internet is increasingly being used around the world as an innovative tool 
to conduct effective marketing policies of goods and services. Online retailers 
in Vietnam are beginning to pay more attention to the importance of developing 
online sales systems that engage customers as well as enables them to purchase 
products online. However, online shopping in Vietnam is not widely applied yet. 
This research develops an integrated theoretical model based on TAM to identify 
the factors that determine user attitude and their engagement towards online 
shopping. Gathering information from 365 respondents in Vietnam has been 
conducted via a self-administered questionnaire. The research results manifest 
that user experience and service quality have the power to predict users' 
perceived usefulness and perceived ease of use, which in turn are crucial 
drivers of attitude and intentions towards online purchasing. The findings 
provide some important implications and add more certain insights about the 
theoretical groundwork of TAM in the Vietnamese online shopping context.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
TAM; Perceived Usefulness; Ease of Use; Behavioral Intentions; Online Shopping</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/7Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
IMPACT ANALYSIS OF EXPERIENCE ON GAMIFICATION MARKETING ACTIVITIES, SOCIAL MEDIA 
MARKETING, AND OTHER FACTORS TOWARD BRAND LOYALTY IN ONLINE MARKETPLACE 
APPLICATION</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
MARIA THERESA VIEGA, TOGAR ALAM NAPITUPULU</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Gamified method or well known as gamification has been adapted to enhance the 
primary process in many fields, such as improving lecturing processes in higher 
education, improving information acceptance rates in health therapy, and 
recently increasing consumer interaction with different brands in the e-commerce 
market. Online marketplace application as a popular variety of e-commerce, also 
following this trend to implement gamification elements in their application to 
create a better buying experience for their users and to increase the brand 
loyalty of their users towards various online marketplace applications. Aside 
from gamification, social media is still one of the most chosen media to be a 
marketing channel of an online marketplace brand by creating official account 
and use them to interact intimately with their customers. In this research, we 
assess the impact of experience on gamification marketing activities and social 
media marketing, mediated brand attitude, consumer brand engagement, and 
customer satisfaction towards brand loyalty in Indonesian online marketplace 
using Structural Equations Modeling (SEM) type of analysis. The finding of the 
study showed that the brand attitude and customer satisfaction fully mediated 
the impact of gamification marketing practices on brand loyalty, while social 
media marketing and consumer brand engagement has no significant effect on brand 
loyalty.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
&nbsp;Brand Attitude, Brand Loyalty, Consumer Brand Engagement, Gamification 
Marketing Activities, Social Media Marketing, Online Marketplace</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/8Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
AUTHORSHIP VERIFICATION OF TWEETS CROSS TOPICS USING WEIGHTED WORD VECTORS 
SIMILARITY</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
SHAIMAA AYMAN, MOHAMED EISA, FIFI FAROUK</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Authorship Verification (AV) is one of the interesting topics that had developed 
rapidly and distinctly since the middle of the 19th century. With the social 
media era, there is always a problem in determining whether a given tweet, post, 
or comment was written by a certain user or not. We are proposing a new approach 
to verify if a tweet belongs to a claimed user. Our proposed method utilizes the 
benefits of one-shot learning. It is based on vectors similarity which depends 
on Term Frequency–Inverse Document Frequency (TF-IDF) and word embedding for 
better verification accuracy. After comparisons, our proposed approach 
outperforms existing methods in the case of cross topics.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Authorship Verification, Vectors Similarity, TF-IDF, Word Embedding, Cross 
Topics.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/9Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
THE DESIGN AND DEVELOPMENT OF A BLOCKCHAIN-BASED EPRO SYSTEM FOR COLLECTING 
CLINICAL DATA</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
KWANGSOO JANG , OOK LEE</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Objectives: The present study discussed the design and development of an ePRO 
system that records and manages clinical trial data on a blockchain network so 
as to prevent any arbitrary modification, forgery, or falsification and improve 
the reliability of the data. Methods: The overall system design and development 
of ePRO consists of (1) advancement and development of blockchain technology, 
(2) development of a blockchain clinical trial system model, (3) development of 
a clinical trial data collecting tool using blockchain, and (4) technological 
verification of the blockchain-based ePRO system. Results: The results of this 
study suggest a potential to save human resources and costs for CDM operation by 
increasing reliability through the implementation of an on-chain clinical trial 
system. Additionally, the on-chain clinical trial system is predicted to help 
prevent harm from serious abnormal reactions, including patients’ death, 
subsequent side effects, and birth defects caused by clinical trial errors. 
Conclusions: The ePRO system can serve as a platform for medical and clinical 
services to cope with expanding clinical data fields. When the system developed 
in this study is combined in the near future with state-of-the-art technologies 
such as IoT and AI, a new paradigm for clinical data repositories and management 
systems is predicted to develop. Based on the clinical data collected by this 
ePRO system, when a clinical data warehouse is established and linked to medical 
information systems, a servitization model that can accelerate innovation in the 
medical service market is expected to emerge.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Blockchain; Clinical Trials as Topic; Electronic Health Records; Mobile 
Applications; Pilot Projects</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/10Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
SKELETONIZATION-BASED PATH PLANNING ALGORITHM FOR AUTONOMOUS ROBOTS USING A 
COMBINATION OF GEOMETRIC ALGORITHMS AND RECURSION</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
EDWAR JACINTO GÓMEZ, HOLMAN MONTIEL ARIZA, FERNANDO MARTÍNEZ SANTA</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
This article presents a strategy for the calculation of paths in indoor and 
static labyrinth-type environments, using a camera on the stage as a sensor. An 
algorithm is applied that uses the skeletonization of a binary image as the 
basis for the calculation of the path, which, despite being a technique that 
comes from image processing, is used in a satisfactory way to this problem in a 
variety of scenarios with different degrees of difficulty, so that it can solve 
any type of labyrinth with different geometry and number of branches in its 
path. In this implementation a refined algorithm is used that applies two 
techniques derived from the skeletonization of the image and that take different 
paths to reach a possible solution; the algorithm determines the complexity of 
the problem by evaluating the amount of branches that the binary skeleton has, 
if the number of possible branches of the binary tree is less than a threshold, 
then, a technique that measures the distance of each path is applied as a 
strategy to calculate the shortest path, if the number of branches is greater 
than the determined threshold, a technique that removes points at the end of 
paths not connected to a possible path is applied, this is done by calling a 
routine in a recursive way until the only two end points in the path are the 
start and end points of the path.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Autonomous robot, Path planning, Skeleton Technique, Maze.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/11Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
OPTIMUM WLAN PROTOCOL AND NETWORK ARCHITECTURE IDENTIFICATION FOR VOIP 
APPLICATION</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
ALI MOHD ALI, MAHMOUD DHIMISH, MALEK M. ALSMADI</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
This research developed a novel algorithm to evaluate Voice over Internet 
Protocol (VoIP) metrics of different IEEE 802.11 technologies in order to 
identify the optimum network architecture among Basic Service Set (BSS), 
Extended Service Set (ESS), and the Independent Basic Service Set (IBSS). The 
proposed algorithm will yield the rank order of different IEEE 802.11 
technologies. By selecting the optimum network architecture and technology, the 
best overall network performance that provides a good voice quality is 
guaranteed. Furthermore, it meets the acceptance threshold values for the VoIP 
quality metrics. This algorithm was applied to various room sizes ranging from 
2x3m to 10x14m and the number of nodes ranged from one to forty. The spatial 
distributions considered were circular, uniform, and random. The Quality of 
Service (QoS) metrics used were delay, jitter, throughput and packet loss.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
&nbsp;VoIP, QoS, Performance Analysis; IEEE technologies.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/12Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
DESIGN OF ACCUMULATOR DUMP FOR RFID READERS USING 0.35 µM CMOS TECHNOLOGY</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
DYAH NUR’AININGSIH, JOKO PURNOMO, ERI PRASETYO WIBOWO , ROBBY KURNIAWAN HARAHAP, 
BUSONO SOEROWIRDJO</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
This research aims to design a dump accumulator being capable of producing bit 
values in parallel from the sigma-delta ADC output signal that is serial in the 
reader of the Radio Frequency Identification (RFID) system. RFID system consists 
of two parts, namely a tag and a reader. The tag uses the delta-sigma ADC to 
convert the input signals from the sensor which, then, become the digital serial 
data that are transmitted to the reader. The reader uses the dump accumulator 
method to convert digital bits serially into 8-bit parallel resolution. The 
accumulator dump uses the counter and register latch circuits as output parallel 
bits. The results are divided into 3 time- periods, namely period 1 (T0) during 
the initialization and the synchronization, period 2 (T1) shows 8-bit binary 
data equivalent to 127(10), and period 3 (T2) shows 8-bit binary data equivalent 
to 128(10). By using 0.35 µm CMOS technology, the number of transistor hardware 
resources needed is 1022 transistors with a power dissipation of 28.5 mW. These 
results can save 77.42% using fewer transistors and are more efficient than the 
comb decimator method. This method contributes and enriches knowledge on the 
development of on-chip systems with serial to parallel signal processing for 
RFID devices.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
ADC Delta-Sigma, Dump Accumulator, Efficiency, RFID, serial to parallel</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/13Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
DESIGNING BUSINESS ARCHITECTURE OF THE SHARED SERVICE - MASS PAYMENT SYSTEM FOR 
THE INDONESIA PUBLIC FINANCE MANAGEMENT USING TOGAF FRAMEWORK</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
SUDARTO, NILO LEGOWO</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Integrated Financial Management Information System (IFMIS) has become best 
practices for supporting the state financial management in every country. With 
the advancement of mass digital payment, IFMIS must also be able to include this 
practice to maintain the efficiency of state finance operation. In line with 
demands for efficiency and transparency, shared service centers are also 
increasingly becoming a common practice in government. Therefore, in an effort 
to get the full benefits of IFMIS investment in Indonesia, this paper designs 
one of business architectures for shared service-mass payment management of the 
Indonesia state finance based on the TOGAF-ADM framework. With this design, it 
is recommended that various mass payments such as payments for payrolls, 
government credit cards, official travel costs, common expenses and social 
assistances can be done more efficiently and transparently and consolidated in a 
shared service center. Hence, millions of mass payments which are previously 
carried out individually by thousands of working units across Indonesia could be 
simplified into smaller number of consolidated payments executed by a shared 
service center. It is also transforming millions of manual operation processes 
into much more efficient digital operation processes, maximizing the benefit of 
collaboration between state owned information systems with the availability of 
private information systems which are becoming very advanced. This proposed 
end-state business architectures obviously enhance the efficiency and 
transparency of state financial operation. This is the contribution of this 
paper, in addition to contributing to architectural enterprises of digital 
government in state financial sector which are very complex and still progress 
unevenly in many countries.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Enterprise Architecture, TOGAF, IFMIS, Shared Service, Mass Digital Payment</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/14Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
SOCIAL NETWORKS: GENERATOR OF PERFORMANCE TEST AND MEASUREMENT OF BIG DATA 
PUBLICATIONS' INFLUENCE</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
MOHCINE KODAD</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
This contribution consists in proposing a system allowing generating the 
performance tests on publications diffused in social networks by means of an 
automatic extraction of engagement data through the KPI (Key Performance 
Indicator) of social networks analysis. Our solution also collects all 
information related to individual behavior and posts that are published on 
social network sites, especially the number, nature and type of posts that are 
shared daily. This proposed system has three functions: first, it allows the 
extraction of data in an automatic way which will allow an ease of collecting a 
large number of data which arrives to Big Data; secondly, it helps all user, 
through indicators that will be generate, to analyze data and test the 
performance and influence of publications; and thirdly, it presents in the 
business intelligence aspect, all results and some comments with recommendations 
for better dissemination of publications, at the right time and with the right 
people.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Social Networks; KPI; SMA;SNA; Performance; Publication</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/15Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
E-VOTING READINESS MAPPING FOR GENERAL ELECTION IMPLEMENTATION</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
SLAMET RISNANTO , YAHAYA BIN ABD RAHIM , NANNA SURYANA HERMAN , ABDURROHMAN</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
General elections are a common thing in the world for democratic countries to 
elect their leaders and deputies in parliament. Today's technology offers an 
electronic-based electoral system called e-voting, a safer, faster and more 
efficient system. Due to privacy, verification and confidentiality of 
conventional elections, there are many countries, both developing countries and 
developed countries around the world, that have implemented e-voting, such as: 
India, Brazil, the Philippines, Argentina, United States, Belgium, Canada, 
Japan, Mexico, France, Peru, Australia, Costa Rica, Finland, Guatemala, United 
Kingdom, Ireland, Italy, Kazakhstan, Netherland, Germany, Paraguay, Norway, 
Switzerland and others. Of those countries, there are countries which are 
successful and sustainable, unsuccessful or canceled the program due to many 
problems, only limited the program to trial and not continued, or only limited 
the program to partial implementation. This research presents a mapping of the 
elements needed to deal with the implementation of e-voting by referring to the 
successful and unsuccessful countries in its implementation, as well as to the 
previous e-voting research. There are two contributions produced in this 
research. First, mapping the preparatory components in building the e-voting 
ecosystem. Second, the mapping of these components can be used as the basis for 
creating an e-voting framework. Hopefully the results of this research can give 
contribution to countries or organizations that will carry out e-voting or 
research of develop e-voting framework in the future.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
E-Voting, Election, Technology, Mapping, Framework</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/16Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
CAN CUSTOMER EQUITY BE THE MEDIATING VARIABLE BETWEEN SOCIAL MEDIA MARKETING 
ACTIVITIES AND PURCHASE INTENTION?</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
OKKY RIZKIA YUSTIAN</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Technological advances have changed the traditional marketing. The increasing 
number of social media users becomes an advantage for marketers to create new 
marketing patterns. This study focuses on the relationship between social media 
marketing, customer equity and purchase intention. The research was conducted in 
the mobile phones market in Bandung, Indonesia. The data were collected from the 
main electronics shopping district in the city of Bandung that has a high 
purchasing power for branded mobile phones and gadgets. In order to test the 
validity, reliability and hypothesis, the smartPLS 3.0 program was used. The 
results show that the significant effect on the three drivers of customer equity 
is due to social media marketing. In contrast to previous research indicating 
that from the three customer equity drivers, only value equity has a mediating 
role between purchase intention and social media marketing. From the three 
customer equity drivers, only value equity has a significant influence on 
purchase intention. This research provides theoretical and managerial 
contributions to the literature.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Social Media Marketing, Customer Equity, Value Equity, Relationship Equity, 
Brand Equity, Purchase Intention.</td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/17Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
<table style="border-width:0px; width: 643px; height: 134px" border="0" cellpadding="4" 

cellspacing="0">
<tbody>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;"> 									

				
<p class="MsoNormal"> 									

				
<font face="Times New Roman" size="2"> 								

					<strong> 	
	Title:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px; height: 23px;" class="auto-style2"> 									

			 
EFFICIENT MUTUAL USER AUTHENTICATION PROTOCOL TO SHARE FILES USING ID IN CLOUD 
STORAGE</td></tr>
<tr>
<td valign="top" width="53" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" height="25" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<font face="Times New Roman" size="2"> 								

					<strong>
Author:</strong></font></p></td>
<td valign="top" width="545" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify" height="25"> 			

									
K. SUJATHA , V.CERONMANI SHARMILA</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<b><font face="Times New Roman" size="2">Abstract:</font></b></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2" align="justify"> 			

									
Transpiring trends inq the world nowadays is cloud computing as a predominant 
interactive archetype for data to ensure user’s data in an online cloud server 
which is stored remotely. A cloud service provides tremendous conveniences to 
the users to relish the on-demand cloud applications without any limitations 
considered in the local infrastructure. In the process of data accessing, 
different users may be in a collaborative relationship, and thus data sharing 
becomes significant to achieve productive benefits. In recent days, with the 
adaptation of cloud services, many users are involved in it. But they are afraid 
about cloud environment due to security in cloud. In this paper, we proposed a 
Mutual User Authentication Protocol (MUAP) in which the users can safely share 
their data in a suspicious cloud servers. This MUAP provides assurance on data 
over user security and focussed mainly on data sharing among the users by an 
encrypted way. The data is encrypted and shared on public or private cloud 
servers due to that the manipulation of information is prohibited to the server. 
Users can easily spot the particular files from the cloud storage but the server 
cannot realize the identity of the user which leads that users can connect 
themselves to the cloud without endanger their privacy. Identity Issuer will 
keep user’s privacy safely. The protocol encrypts all information to get rid of 
MITM attack. Mutual Authentication is achieved by two level encryption using ID. 
This protocol deals with individual activities and communications when the 
legacy protocols deals with group activities. When compared to other protocols 
the proposed system has higher security with minimal computational and 
communicational overheads.</td></tr>
<tr>
<td valign="top" width="53" height="23" style="border-left-style: none; border-left-width: 

medium; border-right-style: solid; border-right-width: 1px; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" align="left"> 			

									
<p align="justify" class="MsoNormal"> 										

			
<b><font face="Times New Roman" size="2">Keywords:</font></b></p></td>
<td valign="top" width="545" height="23" style="border-left-style: solid; border-left-width: 

1px; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: solid; border-bottom-width: 1px" class="auto-style2"> 			

									
Cloud Computing, Sharing Files, Cloud Services, Mutual Authentication Protocol, 
Insecure Cloud Servers. </td></tr>
<tr>
<td valign="top" width="53" align="left" style="border-left-style: none; 

border-left-width: medium; border-right-style: solid; border-right-width: 1px; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" height="40"> 									

			
<p class="MsoNormal"> 									

			
<font face="Times New Roman" size="2"> 								

					<strong>
Source:</strong></font></td>
<td valign="top" width="545" align="justify" style="border-left-style: solid; 

border-left-width: 1px; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2" height="40"> 									

			
<p class="auto-style4">Journal of Theoretical and Applied Information Technology<br>
31<sup>st</sup>&nbsp;October 2020 -- Vol. 98.&nbsp; No. 20 -- 2020</td></tr>
	<tr>
<td valign="top" width="635" align="right" height="23" colspan="2" style="border-left-style: 

none; border-left-width: medium; border-right-style: none; border-right-width: medium; 

border-top-style: solid; border-top-width: 1px; border-bottom-style: solid; 

border-bottom-width: 1px" class="auto-style2"> 									

			
<font face="Times New Roman">
<a href="http://www.jatit.org/volumes/Vol98No20/18Vol98No20.pdf">&nbsp;<u><span class="auto-style3">Full 
Text</span></u></a></font></td>
	</tr>
<tr>
<td colspan="2" valign="top" width="635" style="border-left-style: none; border-left-width: 

medium; border-right-style: none; border-right-width: medium; border-top-style: solid; 

border-top-width: 1px; border-bottom-style: none; border-bottom-width: medium" class="auto-style1"> 		

										
<hr size="1" align="justify" noshade="noshade" /> 						

							</td></tr></tbody></table> 		

							
</td></tr></tbody></table></div> 	 
</body>
</html>