Showing 1–8 of 48 results
Usability Evaluation of Main Function on Three Mobile Banking Application$15.00
Abstract: E-banking or electronic banking is used to facilitate the bank customers when conducting financial transaction in easy and convinient way. As one of the e-banking form, Mobile banking (m-banking) is a banking service that allows its customers to conduct financial transactions in real time using mobile devices such as smartphones or tablets. Although there is an increasing number of mobile banking service users every year in Indonesia, the utilization of the actual mobile banking apps is still very low compared to other country in Asia. One of the problems that is often encountered by mobile banking’s customers is the aspect of trust that can be influenced by interface and usability of mobile banking applications. Therefore, in order to achieve effective interaction between human-computers with minimal effort, various aspects of usability need to be the main focus in developing an application to support the effectiveness of human-computer interaction so that the initial goal of creating mobile banking to facilitate customer banking transactions can be achieved. Using four criteria of usability mesurement set by ISO, this research aim to evaluate three m-banking application from the largest bank in Indonesia which are Mandiri Mobile, BNI Mobile, and BCA Mobile. Evaluation and analysis from this research shows that BNI Mobile has the best usability among the other two application. Overall, the three mobile banking have quite good usability although there are still several aspects that need to be improved.
Keywords: ergonomics, usability, mobile banking, SUS, PSSUQ
An l1-l1-norm minimization solution using ADMM with FISTA$15.00
Abstract: This paper discusses compressed sensing which reconstructs original sparse signal from observed data. Our approach formulates the weighted sum of l1-norm error and l1-norm regularization terms, and applies Alternating Direction Method of Multipliers (ADMM) to solve it. Many works employ ADMM for the l1–l1-norm minimization problems, where ADMM obtains solutions in an iterative fashion for the problems formed as an augmented Lagrangian. The ADMM process is divided into three steps: an error minimization, a coefficient-norm minimization, and a dual variable update of an augmented Lagrangian. However, the coefficient-minimization step is not clear and replaced with an approximation. Our contribution is to adopt the Fast Iterative Shrinkage-Thresholding Algorithm (FISTA) for the minimization step and achieves faster implementation than a conventional method.
Keywords: Compressed sensing; First Iterative Shrinkage-Thresholding Algorithm (FISTA); Alternating Direction Method of Multipliers (ADMM)
Coefficient Constraint LIC with ADMM$15.00
Abstract: Local Intensity Compensation (LIC) is an intra-frame motion compensation for video coding, and was a candidate for HEVC. LIC compensates a target block using motion vectors of reference blocks and linear coefficients of the blocks; thus, from a view point of data compression, not only compensation error but also the range of the motion vectors and coefficients should be as small as possible. Our previous work employs Alternating Direction Method of Multipliers (ADMM) to obtain reference blocks and their coefficients of LIC. This paper proposes to limit the range of coefficients, and experimental results tell us that the proposed method shows almost equivalent compensation accuracy to the conventional method.
Keywords: Convex Optimization; Alternating Direction Method of Multiply; norm regularization
User Experience Evaluation on the Cryptocurrency Website by Trust Aspect$15.00
Abstract: A portal into the public ledger cryptocurrency makes a competition of the best web sites and easily trusted by the public. These are believed to constitute a measurable dimensions of User Experience (UX). This study aims to evaluate the user experience of the use of the three web sites most frequently accessed cryptocurrency from Indonesia. The evaluation conducted aimed at knowing the factors that influence user trust through the design of the interface and can be installed on a new design. Methods include Performance Metrics, Post-Task Rating, Post-Session Rating, and Experiential Overview and eye-tracking device. Based on the results of research, in the overall evaluation of the web site, the web site is the most superior of Indodax. The results of the evaluation are then applied on a new design using the software Invision and examined again to see a comparison of the respondent at the time of first use. The result of the research is the assessment, recommendations, and design the look of the web site cryptocurrency are trustworthy based on user experience
Keywords: Cognitive Ergonomics, Human-Computer Interaction, User Experience, Cryptocurrency, Website, Emotional Design, Online Design
Linear Active Disturbance Rejection Control Using Plant Inverse Property$15.00
Abstract: In this paper, we propose a control law in a linear active disturbance rejection control (LADRC) for removal of ramp disturbance. We use plant inverse characteristics as a control law. We calculate the steady-state error of the conventional method and that of the proposed method using the final-value theorem. In a conventional and a proposed LADRC, each plant output has no steady-state error when a step signal is assumed as a plant input-side disturbance. However, in a conventional LADRC, the plant output has a steady-state error when a ramp signal is assumed as a plant input-side disturbance. On the other hand, in a proposed method, the plant output has no steady-state error. In comparison with a conventional method, the proposed method has almost the same control performance for a plant with a modeling error.
Keywords: Active disturbance rejection control. Extended state observer. Steady-state error. Plant inverse characteristics.
Detection of Black Hole Attack and Performance Analysis of AODV Protocol in MANET (Mobile Ad Hoc Network)$15.00
Abstract: A Mobile Ad hoc Network is an aggregation of mobile terminal that form a volatile network with wireless interfaces. Mobile Ad Hoc Network has no central administration. MANET is more vulnerable to attacks than wired network, as there is no central management and no clear defense mechanism. Black Hole Attack is one of the attacks against network integrity in MANET. In this type of attack all data packets are absorbed by Black Hole node. There are lot of techniques to eliminate the black hole attack on AODV protocol in MANET. In this paper a solution named Black Hole Detection System is used for the detection of Black Hole attack on AODV protocol in MANET. The Black Hole Detection System considers the first route reply as the response from malicious node and deletes it, then the second one is chosen using the route reply saving mechanism as it comes from the destination node. We use NS-2.35 for the simulation and compare the result of AODV and BDS solution under Black Hole attack. The BDS solution against Black hole node has high packet delivery ratio as compared to the AODV protocol under Black hole attack and it’s about 46.7%.The solution minimize data loss, reduces the average Jitter by 5% and increases the Throughput.
Keywords: MANET, AODV, blackholeAODV, bdsAODV
Accuracy Evaluation for Mental Health Indicator Based on Vocal Analysis in Noisy Environments$15.00
Abstract: Mental health care is one of the important challenges in our modern stressful society. The authors proposed a method for measuring mental health based on the quality of the patient’s voice, and implemented a system that monitors the state of mental health based on voice during a phone conversation via smartphone. However, there has been little consideration of the analysis of mental health using voices in a noisy environment thus far. Therefore, this study investigated the impact of noise on the mental health indicator based on vocal analysis. The results showed that the mental health level was judged to be low when the analyzed voice included noise. The study also revealed that a decreased precision in the detection of utterances had a significant impact on mental health analysis.
Keywords: Mental health care; noisy environment; vocal analysis
Visualization of Individual Feature Amount Appearing in Daily Performance Based on Electrostatic Induction$15.00
Abstract: In this paper, a new technique to measure daily human body motion without using cameras and video images is presented. The change in the electric potential of the human body that is caused by the daily performance induces an electrostatic induction current in the electrode placed at a distance of a few meters from the human body. Using this technology, I have developed an effective non-contact technique for the detection of human daily performance by detecting the change in this human-generated body charge. This technique based on the detection of an electrostatic induction current of the order of approximately sub-picoamperes flowing through an electrode that is placed at a distance of 5 m from the subject. It is shown that the characteristics of the individual are included in walking motion, sitting on a chair and retiring motion. This technique effectively explains the behavior of the waveform of the electrostatic induction current flowing through a given measurement electrode through a capacitance model of the human body.
Keywords: Daily performance, Electrostatic induction current, Non-contact measurement, Wavelet transform