IJSTR

International Journal of Scientific & Technology Research

Home Contact Us
ARCHIVES
ISSN 2277-8616











 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

IJSTR Volume 9 - Issue 7, July 2020 Edition - ISSN 2277-8616

All listed papers are published after full consent of respective author or co-author(s).
For any discussion on research subject or research matter, the reader should directly contact to undersigned authors.

IJSTR Terms and Conditions


Michael Farayola, Aman Dureja

Face recognition is the capability to ascertain the identification of a person solitary or amidst multitudes of individuals. In lieu to this, deep learning has dominated and it has been used in recent years due to its momentous performance to solve the face recognition challenges using convolutional neural networks (CNN). It is a technology with enormous capabilities and diversities used in computer vison problems such as modelling and saliency detection, semantic segmentation, handwriting digital recognition, emotion recognition and many more. CNN architectures such has Alex Net, VGG are the practically known architectures that have immensely prompt new dataset for CNN model designs. This paper contributes to actualization of a propose CNN based on a pre-trained VGG Face for face recognition from set of faces tracked in video or image capture achieving a 97% accuracy. Also, implementing the use of metric learning to actualized a discriminative feature from our instances.

[View Full Paper]   [Download]   [References]

1-6  



Ali Mohamed Ali Akasha, Albattat Ahmad, Jacquline Tham

The tourist services sector is currently undergoing a distinct phase characterized by radical changes, excluding traditional ways and means of doing business, which have been carried out outside the sector. The objectives of this study are to study local tourists in the tourism areas of the central region of Libya; The descriptive analytical method to describe the problem of the study and then analyze it to reach the results. The sample of the study included the visitors and tourists of the different tourist areas with their different scientific qualifications. The descriptive statistics, and the package of statistical programs for social sciences (SPSS). In Libyan central region industry, Tourist Attraction to the company is very crucial to the ‘Tourism marketing’ concept knowledge especially regarding engineering, procurement, and construction. Employees from that equipment product assembly who able to share their ‘Tourism marketing’ knowledge to their customer will bring satisfaction from the customer as well. Thus, it is a high recommendation for the entire production equipment assembly organisation to implement and distribute the ‘Tourism marketing’ knowledge among the employees. Operation management will have much easier distribute all the organisation knows when they able to implement an effective knowledge distribution method. Usually, barrier happened in the knowledge distribution due to information from the creator is biased through words understanding by the applier. This knowledge barrier and biased issue typically happen for those activities which often apply Tourism Service.

[View Full Paper]   [Download]   [References]

7-14  



Mohamed Ahmed Salem, Khalil Md Nor

Individuals’ adoption has been reckoned as an important indicator of the success of new technology. Hence, it is crucial to identify the reasons why individuals choose to use or not to use a particular technology. Understanding one’s behaviour towards accepting or rejecting technologies has been proven as one of the most challenging issues within the information systems (IS) domain, not to mention during exceptional circumstances, such as during pandemic times. As such, this study empirically assessed the factors that affect consumers’ intention to adopt e-commerce during Coronavirus Disease 2019 (COVID-19) in Saudi Arabia. The 10 factors examined in this study are perceived usefulness (PU), perceived ease of use (PEOU), subjective norms (SN), perceived behavioural control (PBC), perceived lack of alternatives, perceived risk, perceived punishable infractions, risk-taking propensity, perceived external pressure, and government support. Data were collected online among social media users by employing the snowball sampling technique. A total of 190 valid responses were obtained. The data analysis showed that PU, risk taking propensity, PBC, perceived lack of alternatives, and government support significantly influenced consumers’ intention to adopt e-commerce during the COVID-19 outbreak in Saudi Arabia. Meanwhile, PEOU, SN, perceived external pressure, perceived risk, and perceived punishable infractions exerted insignificant effect on consumers’ intention to adopt e-commerce.

[View Full Paper]   [Download]   [References]

15-28  



Sunok Lim, Seokhwan Shin, Youngjun Kim, Taegyong Kwon

The purpose of this study was to perform experiments with a golf-putting task to investigate the effect of the internal focus of attention and the external focus of attention, as well as the focus of attention of the control group, according to the difference in putting distance (1 m, 3 m, and 5 m). The subjects were composed of 20 male and 10 female college students with no experience in golf (all were right-handed). They were randomly assigned into three groups with 10 participants per group: the internal focus of attention, external focus of attention, and control groups. After the exercise was performed three times for each distance (1 m, 3 m, and 5 m) as a trial, it was performed 10 times for each single putting distance. The experiment was performed for a total of 300 times (100 times for each distance). The groups were analyzed by distance (1 m, 3 m, and 5 m) to measure the absolute error; the direction was analyzed to measure the accuracy of the variable error for measuring the consistency; and the average of the total error was obtained to determine the general trend. Moreover, the standard deviations of the differences were determined. To analyze the differences in the errors, a two-way ANOVA with repeated measures was performed. As a result, first, according to the differences found from the putting challenge. However, no differences between groups were found. Second, learning the exercise for beginners through to the external focus of attention seemed to be more effective than through the internal focus of attention.

[View Full Paper]   [Download]   [References]

29-32  



Ariady Arsal, Darmawan Salman, Imam Mujahidin Fahmid, Mahyudin

Agricultural competitiveness is mentioned in various definitions, including the ability of agricultural products to dominate the market and as a form of healthy competition and life among agricultural actors. Factors driving agricultural competitiveness come from land ownership, and capital owned by farmers, both fixed capital or human capital. The study was conducted by measuring the competitiveness of agriculture between regions in South Sulawesi through 3 pillars, Infrastructure, capital and technology. The research objective is to compile an agricultural competitiveness index and map regions in South Sulawesi based on the pillars of infrastructure, capital and technology. The study uses a quantitative approach with composite index measurements and is designed using descriptive verification research type. The data comes from secondary data in 5 (five) years (2014-2018). South Sulawesi's agricultural competitiveness of the 3 pillars of infrastructure, capital and technology, has a value of 0.96, with a low level of competitiveness. Most regions in South Sulawesi have a low index of competitiveness of the technology pillars of 22 districts (91.67%), while infrastructure pillars have better conditions, ie only 14 districts (58.33%) with low competitiveness. The capital pillar provides the highest agricultural competitiveness support with an index value of 0.55 at a medium level of competitiveness. This can be seen from the level of competitiveness in the capital pillar which is 8 districts (33.33%) for each level of competitiveness, high, medium and low. Soppeng occupies the highest competitiveness index in the infrastructure pillar with a value of 0.57, the highest Enrekang in the capital pillar with an index value of 0.70 and Sidrap excels in the technology pillar with an index value of 0.53. To increase the agricultural competitiveness of South Sulawesi, it is necessary to increase the equitable distribution of agricultural development, especially in the pillars of technology, especially the distribution of the use of harvest processing machines and tractor engines. In addition, it is also necessary to increase credit to the agricultural sector.

[View Full Paper]   [Download]   [References]

33-39  



Ibnu Teguh Ghifary, Deden Witarsyah, Rachmadita Andreswari, Ahmad Musnansyah

E-Government is a public service carried out by all government agencies that are coordinated with each other optimally using telematics technology. In order for the implementation of e-government to be carried out properly, it is necessary to consider technical and non-technical factors that can influence success. In general, non-technical factors are more dominant than technical factors, therefore an in-depth understanding of non-technical factors is needed when designing and implementing e-government. The implementation of e-government that is associated with efforts to meet the needs of all sectors of activity both in government and society requires patrons from leaders who can provide examples and shared commitment. For this reason, an analysis of interest in the use of e-government using the K-means algorithm on RapidMiner tools that uses supporting variables is a survey question of service factors, namely performance expectancy, effort expectancy, and social influence to be studied. The output of this study is the interest in using e-government to the UTAUT factor which is more dominant in the community. Based on the results of the study, K-means has an accuracy rate of analysis that can reach 91%.

[View Full Paper]   [Download]   [References]

40-43  



Yevhenii Rudnichenko, Lyudmyla Krymchak, Vasyl Franchuk, Nataliia Havlovska, Stepan Melnyk

The aim of the study is a comprehensive assessment of the economic security of an enterprise foreign economic activity, taking into account the main financial indicators and financial results in order to make quality management decisions by enterprise management. An assessment based on criteria for maximizing marginal profit from foreign economic activity and minimizing the share of imports in the total revenue of an enterprise, which allows to quickly determine the level of economic security of foreign economic activity when considering these indicators in dynamics. This approach allows to reasonably make management decisions and form options for analyzing scenarios for achieving levels of economic security and a corresponding reaction of an enterprise management system to them. This technique was tested at industrial enterprises. Based on the analysis, a complex of scenarios for achieving levels of economic security of foreign economic activity and corresponding reaction options for an enterprise management system is proposed, which implementation allows an enterprise management to make rational management decisions and ensure a sufficient level of financial income. The presented methodology focuses on enterprises engaged in foreign economic operations, which is a certain limitation, however, from the perspective of the methodology and practical application of the proposed methodology for assessing the economic security level, the results are verifiable and can be used not only by Ukrainian enterprises, but also by other foreign enterprises-subjects of foreign economic activity. Based on this study, a methodology for assessing the level of economic security of an enterprise foreign economic activity is presented, which combines export and import components and takes into account the main financial results of enterprises. The main criteria of this technique is to maximize marginal profits from foreign economic activity and minimize the import dependence of the enterprise. This approach allows to quickly determine the level of economic security of an enterprise foreign economic activity and ensure the adoption of high-quality management decisions.

[View Full Paper]   [Download]   [References]

44-49  



Walid A. Aboraya, Mohamed A. Elkot

Flipped learning is an effective pedagogical model that has recently gained momentum among educators and educational researchers worldwide. The main goal of the current research was to assess if using a developed smart tool or mobile app will help with increasing learners’ motivation in order to accomplish the intended learning outcomes of a course in “Web programming” within a flipped learning environment. In addition, the study sought to measure students’ attitudes towards employing the developed app in supporting learning. Under the flipped model, students enrolled in the “Web programming” course were divided into two groups and examined: (1) an experimental group which learned using the developed mobile app, and (2) a control group, learned through the classical flipped model. Post-administration scores of a motivation scale and skills test were used to compare between the two research groups. Besides, interviews were applied to the experimental group so as to reach deeper understanding of students’ attitudes towards using the app in supporting their learning. Statistical treatment of the motivation scale scores revealed significant differences in favour of the experimental group. But no significance was found out in raising web programming skills between the groups. Moreover, interviews’ analysis showed that learners highly favoured using the developed app. Finally, pedagogical and methodological implications were introduced.

[View Full Paper]   [Download]   [References]

50-56  



P. Subhashini, K. Sai Nithin, Ms. E. Hemalatha, Dr. Akalpita Das

Distributed Denial of Service (DDoS) attack is a Denial of Service (DoS) attack that is made in large scale over a potential service in distributed environment. Adversaries targeting such attack makes a sustainable effort to exploit software vulnerabilities in computers through which attack is made on a target server. Such computers that unwittingly cooperate attacker are known as zombies where attacker keeps malicious piece of software known as agent. As countermeasures are being developed from time to time, the attackers are enhancing their tools to launch DDoS attacks. In this context, it is essential to have counter measures that defend existing and future DDoS variants. However, it needs thorough understanding pertaining to scope and detection methods for handling such massive attacks. This paper provides insights on different terms associated with DDoS attacks, different attack types and counter-measures existing. It also covers the attacks and countermeasures in cloud computing. Provided comprehension of the DDoS attacks and their scope, it is possible to device new countermeasures for well-known and future DDoS attacks.

[View Full Paper]   [Download]   [References]

57-61  



Vijaita Kashyap, Shikha Jain

In recent years the use of cloud computing is rapidly growing day by day, as we know that the cloud computing mechanism provides the storage of large amount of data, any user can access the data from anywhere with the help of internet. Cloud computing provide to users a centralized virtual environment and infrastructure without using the cost for physical or active infrastructure in a multiple way. Cloud provides the access of large multimedia data such as the video, audio, image and text etc. In this paper, we have presents the comparative performance analysis for the key generation, encryption time and decryption time for the encryption and decryption standard techniques.

[View Full Paper]   [Download]   [References]

62-64  



Sakdillah

In the world of mining, calculation of reserves was the most decisive in exploration activities. The results of the calculation of coal reserves were needed to evaluate the economic value of a mining operation to be planned. Observation of fundamental data in the calculation of reserves was in accordance with the level and accuracy in retrieving the data. Therefore, so that mining activities can be done easily then the required supporting software that can simplify the calculation and modeling. The purpose of this research was to calculate the reserves of coal by using two methods include methods of block model and cross-section method. In this study, the acquisition of the coal obtained from the comparison between the methods of block model and cross-section method. Calculation of coal reserves by stripping ratiowas not more than 7: 1. The block method model the obtained results 13,646,218.25 MT of coal reserves and overburden volume of 91,472,579.44 BCM. While the section method the results obtained by 14,540,371.3 MT of coal reserves and overburden volume of 92,547,132 BCM. Comparison of the two methods produce different amount of coal reserves in the same mining pit design. because the accuracy of the calculation was not the same. Factors that lead to differences in methods of calculation of reserve block model of the method was calculated based on the volume of blocks with dimensions adapted to the conditions of the sediment in the area. While the cross-sectiol method was that the volume was calculated based on a model that can represent a cross-section model of sediment in the area

[View Full Paper]   [Download]   [References]

65-73  



Farhan Salem, Awad M. Aljuaid

In this work, an artificial hybrid fuzzy PID control algorithm is successfully designed and tested, for employing in master-slave motion synchronizing control technique, intended for industrial conveyor lines speed synchroniser , but also can be applied where actions require synchronization with conveyor system motions including in industry, production processes, business and facilities, the algorithm is designed to get a good balance amongst desired system performance and system parameter variations. The overall conveyer system mathematical and simulation models were built by integrating the derived submodels of all subsystems and components including; the main actuator, loads, control unit with algorithm and sensor. MATALB/Simulink environment was used to develop the design; test the submodels and overall system model. Testing the overall system design by subjecting it to different scenarios, including to achieve the needed speed of one conveyer with desired performance, also to achieve and synchronize this speed by the other conveyer, show that the algorithm can result in synchronized motion with fast acceptable response speed, short setting time, and minimum both error and overshoot.

[View Full Paper]   [Download]   [References]

74-82  



Sana’ Ali Al-Awamleh, Shaker Jaralla Alkshali

The study aimed to verify the impact of proactive behavior on strategic success in Jordanian commercial banks. The study adopted a four-dimensional scale to measure proactive behavior (prevention of problems, the voice of employees, the responsibility and creativity of employees), while strategic success was measured through three dimensions: survival, adaptation and growth. The researchers used the descriptive analytical approach to achieve the goals of the study. The study was conducted on a sample consisting of (132) bank managers, data were collected from them through the questionnaire. The study found that there are high levels for the dimensions of Proactive behavior, which are advanced for Prevention of problems of relative importance, and high levels of importance for after survival and adaptation, in terms of the level of growth at an intermediate level. The results also showed that there was a significant impact of Proactive duty (voice of employees, responsibility and creativity of employees) on strategic success, although the prevention of problems did not have a significant impact. It also shows a significant impact of proactive behavior on all dimensions of strategic success (survival, adaptation and growth).

[View Full Paper]   [Download]   [References]

83-88  



Santiago Rubiños, Juan Apesteguia, Juan Grados, Cesar santos, Wilver Auccahuasi

A leak is an uncontrolled outflow of water into any of the components of the drinking water distribution system; most often occurs at pipe joints, elbows, conduit and valve breaks. The service of detection of non-visible leaks of emergency leaks as its name indicates is reported by the Sedapal Zones themselves (service and collection center offices strategically located in various districts of the capital). The information reported by the areas is collected by various means: telephone calls, inspections carried out by Sedapal, face-to-face complaints, breakage of tracks due to the passage of heavy vehicles, etc. These Emergency leaks are taken care of by the mobile units according to their importance and / or urgency and it is determined if there is indeed a water leak or not, after which it proceeds, makes its respective report, cataloging and classifying the leak and its report is entered to the system database for subsequent repair and / or filing in case the leak has not been detected. That is why the design of a predictive control algorithm system is proposed that can be anticipated in which the next emergency leaks are distributed, and what type they could be, analyzing the information obtained to date, processing what is known like Big Data.

[View Full Paper]   [Download]   [References]

19-22