1) Researchers developed a prototype contactless transaction system using QR codes and digital payments to support physical distancing during the COVID-19 pandemic in traditional markets.
2) The system allows sellers and buyers in traditional markets to conduct fast, secure transactions via smartphones without direct cash exchange. Buyers scan sellers' QR codes to view product details and make e-wallet payments.
3) Testing showed the system's functions worked properly and users found it easy to use and useful for supporting contactless transactions and digital transformation of traditional markets. However, further development is needed to increase trust in digital payments for users unfamiliar with the technology.
This document discusses e-banking issues and challenges in India. It summarizes the key issues as follows:
1) Lack of customer awareness and adoption of e-banking services due to satisfaction with traditional banking, difficulty using online services, and security/privacy concerns.
2) Government issues such as failure to properly implement projects, lack of clear guidelines from the Reserve Bank of India, and need for speedy decisions.
3) Challenges for small businesses in obtaining loans through e-banking due to small loan sizes and collateral/guarantee requirements.
4) Online security and fraud risks pose major issues, including hacking, data theft, and unclear liability policies.
14 e payment system in rural india issues and chellenges
The document discusses e-payment systems in rural India and associated issues and challenges. It notes that while e-payment has developed rapidly in cities, adoption in rural areas still lags behind due to several factors. These include low literacy rates, a lack of technological skills, slow internet speeds, low financial literacy, a lack of trust in cashless transactions, and lack of awareness about e-payment methods. Addressing these challenges through improved education and awareness efforts will be important to expanding digital payments across India.
Social media mining analyzes large amounts of user-generated data from social media platforms to obtain meaningful insights. It involves collecting data from platforms like Facebook, Twitter, and YouTube, processing the data, then applying techniques like classification, sentiment analysis, and predictive analytics to identify patterns and correlations. The results can be used in applications like marketing, customer relationship management, and public relations. As social media usage grows, the analysis of user data from these platforms is becoming more important for both individual and business purposes.
This document is a synopsis submitted by Santosh Malaiah Ralabandi to RTM Nagpur University in partial fulfillment of an MBA degree. It examines the impact of technology on financial services. Technology plays a major role in modern industries and financial institutions must invest in information technology to remain competitive. The financial industry relies heavily on advanced technologies to process high volumes of transactions that could not be handled manually. The synopsis will focus on how technology influences competition and service delivery in the financial sector.
This document provides an overview of the use of information technology in the Indian banking sector. It discusses how IT is helping banks provide better customer service through automated processes and digital channels while reducing costs. Some key points:
- Indian banks have embraced technologies like ATMs, internet banking, and mobile banking but still have a long way to go to become fully technology-driven.
- IT is allowing banks to service more customers with lower investments and improve services like funds management and customer profiling.
- Technologies are reducing service costs and improving staff productivity, adding to bank profits.
- While private and foreign banks have led the way, public sector banks are also increasing their technology usage.
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYMENTS
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
This document presents a study that develops a framework for exploring factors affecting trust in mobile commerce using the Analytic Hierarchy Process (AHP). The study identifies four main factors (customer desires, mobile and wireless technology, security and privacy, and reputation) and 29 sub-criteria that influence trust in mobile commerce based on a literature review and expert opinions. An online questionnaire was used to evaluate the factors through AHP. The results found that customer desires is the most important main factor for building trust in mobile commerce. Security was identified as the most important sub-criterion under customer desires. The framework can help customers make informed decisions when shopping via mobile and address the trust issues that are hindering the growth of mobile commerce.
This document presents a study on electronic banking (e-banking) in India. It introduces e-banking and examines its objectives, advantages, disadvantages and popularity among customers. The study analyzes awareness, security and the reach of internet banking services offered by State Bank of India. Primary data was collected through online sources and books, while secondary data came from various websites. The findings show that education levels influence e-banking adoption and security remains a key challenge. While e-banking offers convenience, some customers still prefer traditional banking or cannot afford internet fees. The conclusion is that improved security and guidelines will help e-banking growth in India.
The document discusses the role of electronic banking (e-banking) in Pakistan's banking sector. It defines e-banking as using technology like the internet, ATMs, phones, and mobile banking for financial transactions. Foreign banks introduced e-banking in Pakistan in the 1990s, and domestic banks soon followed with services like ATM cards and debit cards. The document examines how e-banking impacts customer satisfaction in Pakistan and discusses various e-banking services offered by banks. It analyzes the performance of banks that offer internet banking compared to those that do not.
This document discusses e-banking issues and challenges in India. It summarizes the key issues as follows:
1) Lack of customer awareness and adoption of e-banking services due to satisfaction with traditional banking, difficulty using online services, and security/privacy concerns.
2) Government issues such as failure to properly implement projects, lack of clear guidelines from the Reserve Bank of India, and need for speedy decisions.
3) Challenges for small businesses in obtaining loans through e-banking due to small loan sizes and collateral/guarantee requirements.
4) Online security and fraud risks pose major issues, including hacking, data theft, and unclear liability policies.
The document discusses e-payment systems in rural India and associated issues and challenges. It notes that while e-payment has developed rapidly in cities, adoption in rural areas still lags behind due to several factors. These include low literacy rates, a lack of technological skills, slow internet speeds, low financial literacy, a lack of trust in cashless transactions, and lack of awareness about e-payment methods. Addressing these challenges through improved education and awareness efforts will be important to expanding digital payments across India.
Social media mining analyzes large amounts of user-generated data from social media platforms to obtain meaningful insights. It involves collecting data from platforms like Facebook, Twitter, and YouTube, processing the data, then applying techniques like classification, sentiment analysis, and predictive analytics to identify patterns and correlations. The results can be used in applications like marketing, customer relationship management, and public relations. As social media usage grows, the analysis of user data from these platforms is becoming more important for both individual and business purposes.
This document is a synopsis submitted by Santosh Malaiah Ralabandi to RTM Nagpur University in partial fulfillment of an MBA degree. It examines the impact of technology on financial services. Technology plays a major role in modern industries and financial institutions must invest in information technology to remain competitive. The financial industry relies heavily on advanced technologies to process high volumes of transactions that could not be handled manually. The synopsis will focus on how technology influences competition and service delivery in the financial sector.
This document provides an overview of the use of information technology in the Indian banking sector. It discusses how IT is helping banks provide better customer service through automated processes and digital channels while reducing costs. Some key points:
- Indian banks have embraced technologies like ATMs, internet banking, and mobile banking but still have a long way to go to become fully technology-driven.
- IT is allowing banks to service more customers with lower investments and improve services like funds management and customer profiling.
- Technologies are reducing service costs and improving staff productivity, adding to bank profits.
- While private and foreign banks have led the way, public sector banks are also increasing their technology usage.
AN EXPLORATION OF THE FACTORS AFFECTING USERS’ SATISFACTION WITH MOBILE PAYMENTSijcsit
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
Awareness about E banking among indian consumers pptAnurag Singh
This is a power-point presentation of E banking research report
My research is based on Seconday data.
I did a thoroughly research on the awareness of E-banking services amongst indian customers.
The objectives of my research are:
1) To study about the role, need, types, frauds, impact of Internet banking on banks, customers and society, various frauds and ways to overcome them in internet banking, services offered by internet banking and its benefit to the customers and banks.
2) To study about the future perspective and awareness of internet banking among Indian customers and ways to increase awareness among the customers.
A STUDY ON PERCEPTION TOWARDS E-PAYMENT APPS AMONG YOUNGSTERS WITH SPECIAL PR...Jagadeeswaran Muniappan
The document summarizes a study on perceptions of e-payment apps among young people in Malumichampatti village, Coimbatore. It finds that Paytm is the most preferred e-payment app, with 32 respondents choosing it. It also finds that mobile recharge is the service most frequently used by respondents on e-payment apps, with 36 respondents using it for that purpose. Overall, the majority (61) of respondents reported being satisfied with using e-payment apps.
E-Payment System on E-Commerce in IndiaIJERA Editor
E-commerce provides the capability of buying and selling products, information and services on the Internet and other online environments. In an e-commerce environment, payments take the form of money exchange in an electronic form, and are therefore called Electronic Payment. E-Payment system is secure there should be no threat to the user credit card number, smart card or other personal detail, payment can be carried out without involvement of third party, It makes E payment at any time through the internet directly to the transfer settlement and form E-business environment. Studied have been carried out on E-Payment system .E-Payment system an integral part of electronic commerce.An efficient payments system reduces the cost of exchanging goods and services, and is indispensable to the functioning of the interbank, money, and capital markets. Questions are related to E-Payment system in which given options are Agree, Disagree, Strongly disagree, Strongly agree, Neutral. After analysis and comparison of various modes of electronic payment systems, it is revealed that it is quite difficult, if not impossible, to suggest that which payment system is best. Some systems are quite similar, and differ only in some minor details. Thus there are number of factors which affect the usage of e-commerce payment systems. Among all these user base is most important success of e-commerce payment systems also depends on consumer preferences, ease of use, cost, industry agreement, authorization, security, authentication, non-refutability, accessibility and reliability and anonymity and public policy
Problems encountered in e-banking in selected bank Lily Monilla
This document discusses problems encountered with e-banking in selected banks in Quezon City, Philippines. It provides background on the introduction and growth of e-banking in the Philippines. Security issues are one of the main problems discussed, including security flaws that have allowed access to other customers' accounts. Regulatory approaches by the Bangko Sentral ng Pilipinas and security controls implemented by banks are also mentioned. The document aims to determine problems encountered with e-banking and provide recommendations.
9 prerna sharma bamoriya, dr. preeti singh final_paperAlexander Decker
This document summarizes a research study that explored issues in mobile banking from customers' perspectives in India. The study identified key issues related to mobile handsets, security/privacy, standardization of services, customization, and telecom service quality. A survey was conducted of 50 mobile banking users and 50 non-users in Indore, India. The results showed that mobile handset operability, security/privacy, and lack of service standardization were seen as the most critical issues by respondents. However, there were no statistically significant differences found between users and non-users in their perceptions of the issues. Overall, most respondents were indifferent about the perceived utility of mobile banking compared to traditional retail and online banking.
The document is a project report submitted by Arpan Mukherjee to the University of Mumbai for a Bachelor of Management Studies degree. The report examines awareness and usage of e-banking in India. It provides background on the development of e-banking in India, including how private banks have embraced new technologies more readily than public sector banks. The report also analyzes the opportunities and challenges of e-banking adoption in India, such as security concerns, low internet penetration rates, and the need for regulatory clarity.
The appearance of data innovation to each part of human life and business has been obvious to
the point that it doesn't should be complemented more. Data innovation has been of extraordinary
substance in managing an account framework. This examination expects to explore the impact of
data innovation in the saving money arrangement of Bank. The information are acquired both
through the clients and the workers. The information were then broke down utilizing the correct
rate and the 5-point Liker scale to decide the effect of Information innovation in the saving money
framework undertakings. The discoveries at that point demonstrated that Information innovation
adds to the saving money framework in three diverse routes as tails: IT spares the season of the
clients and the representatives obviously, IT chops down the costs and IT encourages the system
exchanges.
Research Report on Net banking with reference to HDFC BankKumail Raza Muni
Project report is prepared to study various e banking services with reference of HDFC Bank.
It can be referred for those who are working for their bachelor thesis.
IRJET- Ecommerce Transactions: Secure Gateway in Payment SystemIRJET Journal
The document discusses secure payment systems for e-commerce transactions. It describes how credit/debit card transactions currently work over the internet, noting security risks due to lack of authentication and encryption. The proposed work aims to explore using Secure Sockets Layer (SSL) protocol, Secure Electronic Transaction (SET) protocol, and secure communication tunnel techniques to securely transmit payment information. It provides flowcharts depicting the system flow and data flow between users, merchants and payment gateways. The secure payment system would encrypt transaction data and authenticate all parties to prevent fraud and theft of financial information online. A table compares the key security features of SET, SSL and secure tunnels for implementing a secure electronic payment system over the internet.
This chapter introduces banking technology as a confluence of several disparate disciplines such as finance (including risk management), information technology, computer science, communication technology, and marketing science. It presents the evolution of banking, the tremendous influence of information and communication technologies on banking and its products, the quintessential role played by computer science in full filing banks’ marketing objective of servicing customers better at less cost and thereby reaping more profits. It also highlights the use of advanced statistics and computer science to measure, mitigate, and manage various risks associated with banks’ business with its customers and other banks. The growing influence of customer relationship management and data mining in tackling various marketing-related problems and fraud detection problems in the banking industry is well documented.
Design and implementation a network mobile application for plants shopping ce...IJECEIAES
During the revolution of developing mobile phone applications, they can be used in different fields like business, health, transportation, communications and tourism, and other uses. This paper presents QR based information management system for plants shopping centers. This system includes two main sides: mobile and server. The proposed application is used as a substitute for the human guide that each visitor needs in the plants shopping center. The complete information can be provided on any seedling displayed in the shop depending on the QR code technology. Each branch of the same enterprise includes sub-server that is linked to the main server using a private computer network. The server side contains information of all plants and all branches for such enterprise in the form of text and image in different languages. The proposed application facilitates the movement of the customer inside the place, the ease in preparing bills electronically that helps the visitor to save the time of queue to preparing the bill and paying. The proposed system is tested over different case studies to prove the efficiency in terms of information and selling management.
Design and develop authentication in electronic payment systems based on IoT ...TELKOMNIKA JOURNAL
The document describes a proposed electronic payment system that uses both Internet of Things (IoT) devices and biometric authentication via fingerprint scanning. The system is designed with three levels of authentication - using an RFID card, a PIN entered on a keypad, and fingerprint scanning. Fingerprint authentication involves capturing a fingerprint image, extracting features, and comparing the fingerprint to stored templates. The system is implemented using an Arduino microcontroller connected to a fingerprint sensor. Software is programmed to enroll and authenticate fingerprints. Sensitive user information is encrypted for security. The system aims to provide secure authentication for electronic payments by combining IoT devices and biometric fingerprint identification.
A Literature Study Of Consumer Perception Towards Digital Payment Mode In IndiaJoe Osborn
This literature study analyzes consumer perceptions of digital payment methods in India. It finds that digital transactions are increasing yearly in India due to factors like government programs promoting financial inclusion, the Unified Payments Interface (UPI), and demonetization. The study reviews literature on the advantages of digital payments like convenience and the challenges like lack of technology adoption and cybersecurity issues. The objectives are to understand digital payment concepts and modes, and consumer perceptions of and safety concerns with online payments. The methodology uses secondary data from literature reviews from India.
Presentasi INCITEST 2021-Contactless Transaction System in Traditional Market...IrawanAfrianto1
This document describes a contactless transaction system using QR codes and digital payments that was developed to support physical distancing during the COVID-19 pandemic in traditional markets in Indonesia. The system was developed through problem identification, research, system modeling, development, and testing. It allows traders and buyers in traditional markets to complete transactions quickly and remotely through a mobile app using QR codes and e-wallet payments. User testing found high acceptance rates of 86-89% among traders and buyers. The system can help digitalize transactions in traditional markets while reducing the spread of COVID-19, but further research is needed on implementation strategies and security.
CASHLESS SOCIETY: DRIVE’S AND CHALLENGES IN NIGERIAijistjournal
This document discusses moving towards a cashless society in Nigeria. It examines the benefits of a cashless economy such as reduced costs, increased efficiency and reduced crime. However, it also notes challenges including potential cyber fraud, limited payment infrastructure, and financial illiteracy among some Nigerians. The study found that most Nigerians support the idea of a cashless economy but recognize challenges in implementation. It recommends strategies for educating non-literate Nigerians and establishing laws against cybercrime to address these issues.
This document summarizes a research paper on smart wallets. It discusses the limitations of traditional online wallets, where private keys are stored centrally and there is a risk of losing funds if the storage is hacked. The proposed system, called E-Wallet, addresses these issues by storing private keys separately in multiple locations. It also introduces a second service unit for high availability. E-Wallet has three operation models that can switch smoothly depending on the states of each service unit. Theoretical analysis and tests show E-Wallet can achieve higher availability than traditional wallets, and users will not lose funds as long as less than 50% of private keys are lost.
Implementation of Online Shopping and Auction System (SPAROO).IRJET Journal
This document describes the implementation of an online shopping and auction system called SPAROO. It was created by students and a lecturer from Cox's Bazar International University in Bangladesh. The system allows users to shop online for products and participate in auctions to buy and sell rare items. It uses an Android app and website to function as an online marketplace. Key aspects of the system include a live auction bidding feature, an online shopping platform, a payment system, and admin features to manage products and categories. The goal was to create a more convenient alternative to traditional shopping and auctions using modern technology and e-commerce approaches.
Continuous improvements in technology and quality of life have had a strong impact on the development of payment techniques. With the evolution of near-field communication (NFC) technology, contactless payment has received recent attention because of its short-range, conducive nature. As mobile computing made great leaps due to enormous development in the smart phone platform, companies like Google, Samsung, and Apple embedded NFC in smart phones to provide on-the-go payment capabilities, eliminating the need for payment cards. But due to interoperability and high cost, these technologies are not available to everyone. Dr. B Srinivasa Rao | Ch. Sphoorthi | K. TejaSree | G. Sai Snigdha | V. S R Harika"Pay-Cloak:Biometric" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd11430.pdf http://www.ijtsrd.com/computer-science/other/11430/pay-cloakbiometric/dr-b-srinivasa-rao
Implementation of NFC Technology was developed to facilitate instant payment transaction such
as purchase tickets, goods, or service to become one of the digital wallet besides to using credit cards.
The high rate of mobile devices usage in Indonesia make many companies take advantage of this device
as a media in electronic payment transactions, a lot of banking and financial product in Indonesia used this
technology such as E-money, T-cash, Flazz, Ooredoo, Dompetku, XL-Tunaiku, Doku Wallet, Skye card,
Artajasa MYNT and many more. The technique that used in this research to prove the hypotheses was
Structural Equation Model (SEM) using Smart PLS software, we will used questionnaire and literature
review method to found trend of NFC use. The population from which to draw conclusion was defined as
all individual capable use NFC Technology for payment transaction .In this study, we will investigate NFC
use in Indonesia, The proposed research model was develop by TAM Framework with some dimension
from NFC study literature that is Mobile Payment Knowledge, Technology, Trust, Behaviour and
Compatibility into the model, in order to determine the significant factor that influence of NFC use in
Indonesia.
A Study on Role of Technology in Banking Sectorijtsrd
The purpose of this study is to examine the relationship between new technology implementation in banking sector and customers How they are aware about the technologies and how they are using it Data for this study was collected from the customers of various Banking Sectors under the Reserve Bank of India A simple percentage analysis and pie chart will be done According to questioners 30 samples are collected and interpretations are given Findings suggest that most of the customers of bank using ATM facility So the banks need to give awareness about the E-banking services Lastly, the paper is of few papers that focus on technology development in banking industry Aswin Raj. T | Mr. Bala Nageshwara Rao "A Study on Role of Technology in Banking Sector" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-6 , October 2018, URL: http://www.ijtsrd.com/papers/ijtsrd18357.pdf
IRJET- A Study on the Perception of the Impact of Payment TechnologyIRJET Journal
This document summarizes a study on perceptions of the impact of payment technology. The study examined how users' age, gender, education level, and marital status relate to their perceptions of convenience and security of electronic payment technologies like e-wallets, debit/credit cards, etc. A survey was conducted in Andhra Pradesh, India. The results found that males felt payments were more convenient than females, while females were more concerned with security. The study aimed to understand user perceptions of new payment technologies and how demographic factors influence those perceptions.
Mobile payment allows consumers to make more flexible payments through convenient mobile devices.
While mobile payment is easy and time save, the operation and security of mobile payment must ensure that
the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore,
this study based on technology acceptance model to explore the impact of external variables through
perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in
this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis
and regression analysis to verify the hypotheses. The results show that all hypotheses are supported.
However, mobile payment is still subject to many restrictions on development and there are limited related
researches. The results of this study provided insight into the factors that affect the users’ satisfaction for
mobile payment. Related services development of mobile payment and future research suggestions are also
offered.
Mobile payment allows consumers to make more flexible payments through convenient mobile devices. While mobile payment is easy and time save, the operation and security of mobile payment must ensure that the payment is fast, convenient, reliable and safety in order to increase the users’ satisfaction. Therefore, this study based on technology acceptance model to explore the impact of external variables through perceived usefulness and perceived ease of use on users’ satisfaction. The data analysis methods used in this study are descriptive statistical analysis, reliability and validity analysis, Pearson correlation analysis and regression analysis to verify the hypotheses. The results show that all hypotheses are supported. However, mobile payment is still subject to many restrictions on development and there are limited related researches. The results of this study provided insight into the factors that affect the users’ satisfaction for mobile payment. Related services development of mobile payment and future research suggestions are also offered.
This document summarizes a study that analyzed factors influencing the use of e-money in Indonesia. The study examined how perceived usefulness, perceived ease of use, subjective norm, technological innovativeness, and perceived credibility impact e-money usage. A literature review covered relevant theories and prior studies. Hypotheses were developed that perceived usefulness, ease of use, technological innovativeness, and credibility would positively influence e-money use, while subjective norm would negatively influence it. Data was collected through surveys in Semarang, Indonesia and analyzed using regression. The study found perceived credibility significantly impacts e-money use but the other factors do not.
Secured e-payment system based on automated authentication data and iterated ...TELKOMNIKA JOURNAL
Electronic payment has been considered as one of the most significant and convenient applications of modern electronic services e-University compared to traditional methods that impose time-consuming, human resources, and inefficiency. Different automatic identification technologies have been widely used, such as radio frequency identification (RFID). Extensive research and several applications are focusing on taking the maximum advantage of RFID technology. Data and information security had considered a crucial role when information concerning e-commerce, e-banking, or e-payments, especially due to it required real data to establish accessed illegally. Hence, data originality and security fall a very significant and critical issue in data communication services in recent years. Applications such as e-banking or e-commerce regularly contain sensitive and personal information that should be managed and controlled by authorized persons. Thus, keeping a secure password is important to prevent unauthorized users from illegal access. The password hashing is one of the safety methods and means of preventing attacks. In this article, focuses on proposing an RFID based electronic payment and also provide multi-level security privileges for an academic domain by using RFID technology besides the programmable logic circuit as well the system used C# language in visual studio environment also desktop and web-based application for system working purposes. The proposed system aims to manage student payments in a secure manner and provides the capabilities of getting a bus ticket, copying books, buying food, paying registration fees, and other services. The results have shown the system is secured by using the confirmation code in addition to password encryption.
This document provides a literature review of mobile payment. It begins by introducing mobile payment and its growth. It then discusses the characteristics and security concerns of mobile payment. The document summarizes existing mobile payment methods such as payment amount, basis of payment, timing of payment, location of payment, and technologies used. It also describes the components of mobile payment systems including engaging parties, primitive transactions, and the payment transaction process. Finally, it reviews several existing mobile payment protocols and their security properties.
The document is a research paper on the impact of mobile payments among youth. It contains an abstract, introduction, literature review, objectives, research methodology, hypotheses, data analysis and findings. The paper analyzes data on the association between age and mode of payment, and the relationship between age and period of usage. It finds that mobile payments are most popular among younger users and are growing rapidly. The paper provides suggestions to further promote mobile payments.
An empiric path towards fraud detection and protection for NFC-enabled mobile...TELKOMNIKA JOURNAL
The synthesis of NFC technology accompanying mobile payment is a state-of-the-art resolution
for payment users. In view of rapid development in electronic payment system there is rise in fraudulent
activity in banking transactions associated with credit cards and card-not-present transaction.
M-Commerce aid the consumers and helps to bestow real-time information in payment system. Due to
the familiarization of m-commerce there is cogent increase in the number of fraudulent activities, emerging
in billions of dollar loss every year worldwide. To absolute the security breaches, payment transactions
could be confined by considering various parameters like user and device authentication, consumer
behavior pattern, geolocation and velocity. In this paper we formally assay NFC-enabled mobile payment
fraud detection ecosystem using score-based evaluation method. The fraud detection ecosystem will
provide a solution based on transaction risk-modeling, scoring transaction, business rule-based, and
cross-field referencing. The score-based evaluation method will analyze the transaction and reckon every
transaction for fraud risk and take pertinent decision.
Impact of Pandemic on Fintech Services among Young NetizensIRJET Journal
This document summarizes a research paper that studied the impact of the COVID-19 pandemic on fintech service usage among young internet users in India. It found that factors like financial awareness, fintech trends, and financial inclusion were interrelated and positively impacted by the pandemic. Fintech usage increased significantly during the pandemic as many apps helped enable cashless transactions. A survey was conducted among 200 young Indian internet users which found that financial awareness and fintech trends were positively correlated with financial inclusion. The pandemic increased awareness and usage of fintech services and helped promote financial inclusion.
Similar to Prototype mobile contactless transaction system in traditional markets to support the covid-19 physical distancing program (20)
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
The document proposes using a particle swarm optimization (PSO) algorithm to optimize the hyperparameters of a convolutional neural network (CNN) for image classification. The PSO algorithm is used to find optimal values for CNN hyperparameters like the number and size of convolutional filters. In experiments on the MNIST handwritten digit dataset, the optimized CNN achieved a testing error rate of 0.87%, which is competitive with state-of-the-art models. The proposed approach finds optimized CNN architectures automatically without requiring manual design or encoding strategies during training.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
This document describes the implementation of a double-layer structure on an octagon microstrip yagi antenna (OMYA) to improve its performance at 5.8 GHz. The double-layer consists of two double positive (DPS) substrates placed above the OMYA. Simulation and experimental results show that the double-layer configuration increases the gain of the OMYA by 2.5 dB compared to without the double-layer. The measured bandwidth of the OMYA with double-layer is 14.6%, indicating the double-layer can increase both the gain and bandwidth of the OMYA.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
The document provides an overview of the key performance indicators (KPIs) for 6G wireless networks compared to 5G networks. Some of the major KPIs discussed for 6G include: achieving data rates of up to 1 Tbps and individual user data rates up to 100 Gbps; reducing latency below 10 milliseconds; supporting up to 10 million connected devices per square kilometer; improving spectral efficiency by up to 100 times through technologies like terahertz communications and smart surfaces; and achieving an energy efficiency of 1 pico-joule per bit transmitted through techniques like wireless power transmission and energy harvesting. The document outlines how 6G aims to integrate terrestrial, aerial and maritime communications into a single network to provide ubiquitous connectivity with higher
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
A multi-task learning based hybrid prediction algorithm for privacy preservin...journalBEEI
There is ever increasing need to use computer vision devices to capture videos as part of many real-world applications. However, invading privacy of people is the cause of concern. There is need for protecting privacy of people while videos are used purposefully based on objective functions. One such use case is human activity recognition without disclosing human identity. In this paper, we proposed a multi-task learning based hybrid prediction algorithm (MTL-HPA) towards realising privacy preserving human activity recognition framework (PPHARF). It serves the purpose by recognizing human activities from videos while preserving identity of humans present in the multimedia object. Face of any person in the video is anonymized to preserve privacy while the actions of the person are exposed to get them extracted. Without losing utility of human activity recognition, anonymization is achieved. Humans and face detection methods file to reveal identity of the persons in video. We experimentally confirm with joint-annotated human motion data base (JHMDB) and daily action localization in YouTube (DALY) datasets that the framework recognises human activities and ensures non-disclosure of privacy information. Our approach is better than many traditional anonymization techniques such as noise adding, blurring, and masking.
A brief introduction to quadcopter (drone) working. It provides an overview of flight stability, dynamics, general control system block diagram, and the electronic hardware.
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large...YanKing2
Pre-trained Large Language Models (LLM) have achieved remarkable successes in several domains. However, code-oriented LLMs are often heavy in computational complexity, and quadratically with the length of the input code sequence. Toward simplifying the input program of an LLM, the state-of-the-art approach has the strategies to filter the input code tokens based on the attention scores given by the LLM. The decision to simplify the input program should not rely on the attention patterns of an LLM, as these patterns are influenced by both the model architecture and the pre-training dataset. Since the model and dataset are part of the solution domain, not the problem domain where the input program belongs, the outcome may differ when the model is trained on a different dataset. We propose SlimCode, a model-agnostic code simplification solution for LLMs that depends on the nature of input code tokens. As an empirical study on the LLMs including CodeBERT, CodeT5, and GPT-4 for two main tasks: code search and summarization. We reported that 1) the reduction ratio of code has a linear-like relation with the saving ratio on training time, 2) the impact of categorized tokens on code simplification can vary significantly, 3) the impact of categorized tokens on code simplification is task-specific but model-agnostic, and 4) the above findings hold for the paradigm–prompt engineering and interactive in-context learning and this study can save reduce the cost of invoking GPT-4 by 24%per API query. Importantly, SlimCode simplifies the input code with its greedy strategy and can obtain at most 133 times faster than the state-of-the-art technique with a significant improvement. This paper calls for a new direction on code-based, model-agnostic code simplification solutions to further empower LLMs.
An Internet Protocol address (IP address) is a logical numeric address that is assigned to every single computer, printer, switch, router, tablets, smartphones or any other device that is part of a TCP/IP-based network.
Types of IP address-
Dynamic means "constantly changing “ .dynamic IP addresses aren't more powerful, but they can change.
Static means staying the same. Static. Stand. Stable. Yes, static IP addresses don't change.
Most IP addresses assigned today by Internet Service Providers are dynamic IP addresses. It's more cost effective for the ISP and you.
Conservation of Taksar through Economic RegenerationPriyankaKarn3
This was our 9th Sem Design Studio Project, introduced as Conservation of Taksar Bazar, Bhojpur, an ancient city famous for Taksar- Making Coins. Taksar Bazaar has a civilization of Newars shifted from Patan, with huge socio-economic and cultural significance having a settlement of about 300 years. But in the present scenario, Taksar Bazar has lost its charm and importance, due to various reasons like, migration, unemployment, shift of economic activities to Bhojpur and many more. The scenario was so pityful that when we went to make inventories, take survey and study the site, the people and the context, we barely found any youth of our age! Many houses were vacant, the earthquake devasted and ruined heritages.
Conservation of those heritages, ancient marvels,a nd history was in dire need, so we proposed the Conservation of Taksar through economic regeneration because the lack of economy was the main reason for the people to leave the settlement and the reason for the overall declination.
Encontro anual da comunidade Splunk, onde discutimos todas as novidades apresentadas na conferência anual da Spunk, a .conf24 realizada em junho deste ano em Las Vegas.
Neste vídeo, trago os pontos chave do encontro, como:
- AI Assistant para uso junto com a SPL
- SPL2 para uso em Data Pipelines
- Ingest Processor
- Enterprise Security 8.0 (Maior atualização deste seu release)
- Federated Analytics
- Integração com Cisco XDR e Cisto Talos
- E muito mais.
Deixo ainda, alguns links com relatórios e conteúdo interessantes que podem ajudar no esclarecimento dos produtos e funções.
https://www.splunk.com/en_us/campaigns/the-hidden-costs-of-downtime.html
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-leading-observability-practice.pdf
https://www.splunk.com/en_us/pdfs/gated/ebooks/building-a-modern-security-program.pdf
Nosso grupo oficial da Splunk:
https://usergroups.splunk.com/sao-paulo-splunk-user-group/
20CDE09- INFORMATION DESIGN
UNIT I INCEPTION OF INFORMATION DESIGN
Introduction and Definition
History of Information Design
Need of Information Design
Types of Information Design
Identifying audience
Defining the audience and their needs
Inclusivity and Visual impairment
Case study.
A brand new catalog for the 2024 edition of IWISS. We have enriched our product range and have more innovations in electrician tools, plumbing tools, wire rope tools and banding tools. Let's explore together!
A vernier caliper is a precision instrument used to measure dimensions with high accuracy. It can measure internal and external dimensions, as well as depths.
Here is a detailed description of its parts and how to use it.
Prototype mobile contactless transaction system in traditional markets to support the covid-19 physical distancing program
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 6, December 2021, pp. 3303~3312
ISSN: 2302-9285, DOI: 10.11591/eei.v10i6.3205 3303
Journal homepage: http://beei.org
Prototype mobile contactless transaction system in traditional
markets to support the covid-19 physical distancing program
Irawan Afrianto, Mouhamad Hatta Hiroshi Sasmita, Sufa Atin
Department of Informatics Engineering, Universitas Komputer Indonesia, Bandung, Indonesia
Article Info ABSTRACT
Article history:
Received Aug 9, 2021
Revised Oct 10, 2021
Accepted Oct 21, 2021
One way to prevent and reduce the spread of the covid-19 pandemic is
through physical distancing program. This research aims to develop a
prototype contactless transaction system using digital payment mechanisms
and QR code technology that will be applied in traditional markets. The
method used in the development of electronic market systems is a prototype
approach. The application of QR code and digital payments are used as a
solution to minimize money exchange contacts that are common in traditional
markets. The results showed that the system built was able to accelerate and
facilitate the buying and selling transaction process in traditional market
environment. Alpha testing shows that all functional systems are running well.
Meanwhile, beta testing shows that the user can very well accept the system
that was built. The results of the study also show acceptance of the usefulness
of the system being built, as well as the optimism of its users to be able to take
advantage of this system both technologically and functionally, so its can be a
part of the digital transformation of the traditional market to the electronic
market and has become one of the solutions in reducing the spread of the
current covid-19 pandemic.
Keywords:
Contactless transaction
Covid-19
Digital payment
Prototype
QR code
Traditional market
This is an open access article under the CC BY-SA license.
Corresponding Author:
Irawan Afrianto
Department of Informatics Engineering
Universitas Komputer Indonesia (UNIKOM)
112-116 Dipati Ukur Street, Bandung 40132, Indonesia
Email: irawan.afrianto@email.unikom.ac.id
1. INTRODUCTION
The development of traditional markets or people's markets has contributed greatly to increasing
employment opportunities, economic growth, and people's income [1]. The number of traditional markets in
Indonesia reached 14,182 units in 2018, making traditional markets one of the basic foundations for regional
economies in Indonesia [2].
Traditional markets are markets that in practice are still traditional in nature where sellers and
buyers can fully interact and use cash payments in their transactions. The use of cash when transacting takes
more time to prepare money that fits your needs and time to wait for changes from sellers. In addition, by
transacting using cash, there is the potential for the spread of various diseases, this is because viruses and
bacteria can be attached to the exchange of money during the buying and selling process. In the face of
Indonesia's shifting cash-to-non-cash transaction trend, a new mechanism in the conventional market
environment is required to address these issues. Digital transformation can change business processes [3],
provide added value, and increase productivity [4], [5] can be used as a solution to these problems. In
addition, the current covid-19 virus outbreak has become a momentum for the acceleration of digital
transformation with various technologies that support it [6]. Research carried out in the context of
2. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3304
accelerating digital transformation in the covid-19 pandemic era includes changes in cash to non-cash
transactions in cities [7], changes in education models and methods [8], [9] as well as the role of e-wallets
during the covid-19 pandemic [10].
Electronic money-based digital payments in Indonesia are now starting to get the attention and trust
of their users. Electronic money is a means of payment in electronic form where the value of money is stored
in certain electronic media [11]. The user must first deposit the money to the publisher and keep it in
electronic media before using it for transaction purposes [12]. Electronic money is divided into two types,
namely e-money and e-wallet. E-money is a type of electronic money in the form of cards (chip-based).
Examples of e-money products include Flazz BCA, Brizzi BRI, JakCard Bank DKI. Meanwhile, e-wallets
are electronic money in the form of applications (server-based). Examples of e-wallet products include T-
Cash, Go-Pay, OVO, etc. E-wallets are a type of electronic money that can be accessed via smartphones [13].
E-wallets allow transactions to be carried out more quickly and safely without requiring change. So,
sellers can focus more on serving buyers and transaction activities are completed more quickly. In previous
research with the integration of a mobile payment system with NFC, it is proven that transactions between
two android smartphones can be completed quickly, namely 141.50 ms and transactions with NFC assistance
take 270.87 ms [14]. In other studies on mobile payments, it is revealed that since smartphones are an
inseparable part of the lives of all humans, the use of mobile payments will continue to increase in the future [15].
QR code was chosen as a medium for data interaction between two android smartphones because all
smartphones have cameras. So that it allows all smartphones to interact with the data needed in transaction
activities. Previous research has implemented QR code as a document licensing tool which contains
important information and enables fast and safe access to that information [16]. In other studies also revealed
that QR code has several advantages such as speed of access, storing more information, and the presence of
pattern recognition that allows the orientation of the QR code to be scanned in all positions [17], [18]. The
application of QR code technology and e-wallet payment has been implemented in areas such as public
transportation where QR codes and e-Wallets are used as a substitute for travel tickets, which are paid
automatically via e-wallets of passengers [19], [20]. Another application is in research [21], where QR codes
are used as a substitute for tickets for parking areas and are integrated with IoT devices and digital payments.
The use of QR codes and E-Wallet is also used in menu ordering and food payments at restaurants [22].
Another aspect that needs to be considered is the acceptance of the use of QR code technology and electronic
payments [23], both in terms of convenience [24] and how to create a sense of trust and usefulness of this
technology by users [25].
However, previous research that has been done, takes the theme of activities and environments that
are easy to adapt to new technologies. Meanwhile, the research developed leads to a traditional market
ecosystem, where users are ordinary people and still use traditional transactions. The aims of this research is
to integrate digital payments (e-wallets) and QR code by developing a prototype non-cash transaction system
which can be accessed on smartphones owned by sellers and buyers in traditional markets, as an alternative
of payment that can make transactions more practical, fast and secure. Furthermore, the prototype developed
will be tested as part of digital transformation in the traditional market environment, evaluated usefulness and
optimism the direct impacts on intention to adopt by users, and it is hoped that it can reduce the spread of the
covid-19 virus because the system used in transactions is contactless.
2. RESEARCH METHOD
To achieve the objectives of the research carried out, researchers used a prototyping approach. The
activities carried out in this study include problem identification, communication processes, planning
processes, rapid modeling and design, development processes, implementation and feedback, and finally
making conclusions and recommendations. Figure 1 shows the activities of the research activities carried out.
The first stage of this research is the problem identification activity, where the researcher identifies the
phenomena that become the problem and the potential solutions that can be used to solve the problem. The
second stage is communication, where the activity is by conducting interviews and observations, giving
questionnaires and conducting literature reviews, which are intended to get a clearer picture of the problem
and solutions that have been done before. The third stage is rapid planning, modeling, and design. This
activity begins with a system analysis in which the process includes analysis of current conditions and
analysis of system requirements to be developed, followed by system modeling, which aims to provide a
functional description of the software that will be built, as well as the functional design of the system to be
developed. The fourth stage of this research includes the stages of system development by coding the
software using the appropriate programming language and framework, implementing and testing the system
being built, and providing feedback on the system that has been built. The final stage of this research is to
provide conclusions and provide recommendations from the research that has been done.
3. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3305
Figure 1. The research methodology
3. RESULTS AND DISCUSSION
3.1. Proposed system architecture
The modeling stage of a system is used to make it easier for system developers to translate it into
the next stage. System modeling can use the rich picture mechanism as the first step towards system design
[26]. The proposed system consists of frontend and backend systems. The backend is made as a website-
based application while the frontend is made as an android based application. The frontend system consists of
two types of sub-systems, namely sub-systems for sellers and buyers, while the backend system is intended
for market managers. As an interactive tool for the two types of frontend systems for sellers and buyers in
sharing detailed shopping information on this system, QR code technology is used. And the payment
instrument used in this application is the Go-Pay e-wallet from Go-Jek based on the payment gateway. The
proposed system shows in Figure 2. The application involved in the transaction system architecture is the
frontend application of sellers and buyers. This architecture describes a series of processes Figure 3.
Figure 2. Proposed system architecture
Figure 3 explanation:
1) The buyer initializes the details of the shopping the buyer will buy.
2) The merchant application generates a transaction id that has been obtained from the data that has just been
stored into the database into a QR-Code.
3) The buyer scans the QR-Code on the merchant's device screen using the buyer application.
4) The buyer checks the shopping details on the application.
5) The buyer makes a payment from the buyer's application.
6) The system changes the transaction status concerned to "Paid".
4. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3306
Figure 3. Transaction system architecture
3.2. Functional requirements analysis
Functional requirements analysis describes the process of activities that will be applied in a system
and explains the requirements needed by the system for the system to run well [27]. Use case diagrams to
describe an interaction between one or more actors with the system to be created. Roughly, use cases are used
to find out what functions are in a system and who has the right to use these functions. Analysis of use case
diagrams on the system to be built can be seen in Figure 4.
Figure 4. Use case diagram of contactless system
The QR code in this system is used as a mechanism for sending transaction IDs from the merchant
application to the buyer's application. So that sellers and buyers can access the same transaction data in the
5. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3307
database according to the transaction id that has been raised. A general description of how QR code works in
the system is shown in Figure 5.
Figure 5. QR code analysis of contactless system
The payment gateway used in this system is the Midtrans payment gateway. Midtrans is used as an
intermediary so the system can make payments using Go-Pay. The architectural description of how midtrans
payment gateway and Go-Pay work can be seen in Figure 6.
Figure 6. Payment gateway analysis of contactless system
The payment mechanism that occurs uses an authentication token by utilizing the client key and
server key provided by the Midtran payment gateway. The transfer of payment transactions from the buyer's
application to the Go-Jek application will be carried out directly when the buyer's application has received
the transaction token from Midtrans.
6. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3308
3.3. System implementation
The interfaces implemented in the system built are divided into three different parts, namely:
backend interfaces for a market manager: Figure 7 shows the application interface used by market managers
to manage data sellers, kiosks, and financial transaction data in their market.
Figure 7. Backend application for market manager
Frontend application for sellers: Figure 8 shows the application interface from the seller's side.
This interface is used to store data on products sold, prices, generate QR codes, and find out about financial
transactions at the kiosk. Frontend application for buyers: Figure 9 shows the interface from the buyer's side.
This interface is used to make transactions, scan the QR code of purchased goods, and pay for them using the
e-wallet it owns.
Figure 8. Frontend application for sellers
7. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3309
Figure 9. Frontend application for buyers
3.4. Discussion
Application testing is carried out using two test methods, namely the black box method and using a
questionnaire. Blackbox testing is focused on system testing activities that are built to see the extent to which
each function in the application has been running correctly, as expected, and free from errors. In addition to
testing the application from a functional side, system testing is also carried out by users who will take
advantage of the application. Acceptance of the use of applications is conducted with a questionnaire to
obtain conclusions about acceptance of application use from the user's side [28]. The black box test results
show that all functions from the perspective of market managers, sellers, and buyers have been able to run
properly according to their functions and there are no errors in the transactions. Meanwhile, Figure 10 shows
the results of the user acceptance test with a questionnaire, processed using a Linkert scale consisting of 5
intervals and 6 questions, the conclusion is that the average user acceptance, namely traders, is 86.04% and
buyers are 89%. This shows that the system has been very well received by its users. QRcode-based
transaction modules and payments using e-wallet have worked well to provide contactless transaction
services between sellers and buyers.
Figure 10. Result of user acceptance test
8. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3310
The implementation of a payment gateway in the system makes this service have a transaction
authentication process as well as ease of data processing, where the monitoring process can be carried out in
real-time, making it easier to confirm every incoming fund, make sales reports, and find out customer details.
However, the security of the electronic payment system is also something that needs to be considered by
applying multiple security methods [29], as well as considering factors related to its advantages and
disadvantages when used [30]. In addition, the prototype that was built still only uses one e-wallet service
where this limits the flexibility of users in the payment process for their transactions, as well as the trust of
users who are still unfamiliar with the use of e-wallet in their transactions.
4. CONCLUSION
The system that has been built can be used as a contactless transaction medium for transactions in
the traditional market environment. Transaction activities can be done quickly and instantaneously by
implementing the QR code feature and digital payments via smartphones. The use of alternative e-wallet
payments and features of sharing transaction details between sellers and buyers can increase the convenience
and speed of transactions. The existence of a payment gateway in the system makes it easier for users to find
out transactions in real-time, create reports, to their financial transactions. The measurements taken also show
acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take
advantage of this system both technologically and functionally. However, this research still has the potential
for development related to the strategy for implementing this technology so that the system and architecture
can increase trust in its use, especially the use of digital payments which are still not commonly used by
people in traditional market environments. As a result, digital transformation in traditional markets can be
done using this prototype. QR code and the use of e-wallet can be done as an alternative transaction medium
to replace traditional transactions. This study demonstrates how digital transformation may be used in
traditional market transactions such as buying and selling. By utilizing this technology, conventional money
exchanges can be minimized because they can be replaced with electronic payments so that the spread of the
covid-19 virus pandemic can be reduced. The next step of this research is to develop a smart traditional
market model where the digital transaction data that has been obtained will be used as the basic of market big
data and its analysis using artificial intelligence and business intelligence mechanisms.
ACKNOWLEDGEMENTS
The researcher expresses his deepest gratitude to the sellers and buyers in Cihapit traditional market
in Bandung who are willing to be a pilot project for system development and testing, as well as the
Indonesian Computer University (UNIKOM) who provided funding assistance for this research.
REFERENCES
[1] N. N. Ardhiansyah and T. Mahendarto, “Revitalizing And Reimagining The Indonesian Traditional Market (Case
Study : Salaman Traditional Market Indonesia),” IOP Conference Series: Earth and Environmental Science, vol.
436, no. 1, 2020, doi: 10.1088/1755-1315/436/1/012010.
[2] D. Ferricha and H. Fauzan, “How The Policy And Empowerment Of Traditional Markets In Indonesia?,”
International Journal Of Scientific & Technology Research, vol. 9, no. 4, pp. 3649–3652, 2020.
[3] N. T. H. Giang, P. T. T. Hai, N. T. T. Tu and P. X. Tan, “Exploring The Readiness For Digital Transformation In A
Higher Education Institution Towards Industrial Revolution 4.0.,” International Journal of Engineering Pedagogy,
vol. 11, no. 2, 2021.
[4] S. J. Berman, “Digital Transformation: Opportunities To Create New Business Models,” Strategy & Leadership.,
vol. 40, no. 2, pp. 16-24, 2012, doi: /10.1108/10878571211209314 .
[5] C. Ebert and C. H. C. Duarte, “Digital Transformation.,” Ieee Softw., vol. 35, no. 4, pp. 16–21, 2018.
[6] S. Kudyba, “Covid-19 And The Acceleration Of Digital Transformation And The Future Of Work,” Information
Systems Management, vol. 37, no. 4, pp. 284–287, 2020, doi: 10.1080/10580530.2020.1818903.
[7] Z. Allam, “The Forceful Reevaluation Of Cash-Based Transactions By Covid-19 And Its Opportunities To
Transition To Cashless Systems In Digital Urban Networks,” Surveying the Covid-19 Pandemic and its
Implication, pp. 107–117, 2020, doi: 10.1016/B978-0-12-824313-8.00008-5.
[8] N. Iivari, S. Sharma and L. Ventä-Olkkonen, “Digital Transformation Of Everyday Life–How Covid-19 Pandemic
Transformed The Basic Education Of The Young Generation And Why Information Management Research Should
Care?,” International Journal of Information Management, vol. 55, 2020, doi: 10.1016/j.ijinfomgt.2020.102183.
[9] I. Mustapha, N. T. Van, M. Shahverdi, M. I. Qureshi and N. Khan, “Effectiveness Of Digital Technology In
Education During Covid-19 Pandemic. A Bibliometric Analysis.,” International Journal of Interactive Mobile
Technologies, vol. 15, no. 8, 2021.
[10] H. M. Aji, I. Berakon and M. M. Husin, “Covid-19 And E-Wallet Usage Intention: A Multigroup Analysis Between
9. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Prototype mobile contactless transaction system in traditional markets to support the … (Irawan Afrianto)
3311
Indonesia And Malaysia,” Cogent Business & Management, vol. 7, no. 1, pp. 1-6, 2020, doi:
10.1080/23311975.2020.1804181.
[11] Y. Zhu, “The Development Of E-Commerce Practice Teaching Software Based On Online Payment And
Settlement,” International Journal of Online Engineering (iJOE), vol. 10, no. 2, pp. 4–9, 2014.
[12] T. Pambudi, A. Raden and S. T. Rahadi, “The Impact Of Pandemic Covid-19 On Digital Payment: Case Study On
Electronic Money In Indonesia,” International Journal of Advanced Research in Economics and Finance, vol. 3,
no. 1, pp. 70–79, 2021.
[13] D. A. Pramesti, E. K. Pratiwi, Z. B. Pambuko, F. Medias, A. Triyanto and N. Usman, “Digital Payment: User
Experience In Indonesia,” Test Engineering & Management, pp. 22536–22541, 2020.
[14] E. Husni and A. Ariono, "Development of integrated mobile money system using Near Field Communication
(NFC)," 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA),
2014, pp. 1-6, doi: 10.1109/TSSA.2014.7065959.
[15] Z. Bezovski, “The Future Of The Mobile Payment As Electronic Payment System,” European Journal of Business
and Management, vol. 8, no. 8, pp. 127–132, 2016.
[16] A. Wibiyanto and I. Afrianto, “Qr Code And Transport Layer Security For Licensing Documents Verification,”
IOP Conference Series: Materials Science and Engineering, vol. 407, no. 1, 2018, doi: 10.1088/1757-
899x/407/1/012069.
[17] S. K. Chatterjee, S. Saha, Z. Khalid, H. N. Saha, P. Paul and R. Karlose, "Space effective and encrypted QR code
with sender authorized security levels," 2018 IEEE 8th Annual Computing and Communication Workshop and
Conference (CCWC), 2018, pp. 439-443, doi: 10.1109/CCWC.2018.8301640.
[18] W. Widyasari, H. Sutopo and M. Agustian, “Qr Code-Based Learning Development: Accessing Math Game For
Children Learning Enhancement,” International Journal of Interactive Mobile Technologies (iJIM), 2019, doi:
10.3991/ijim.v13i11.10976.
[19] N. Anwar, R. Rasjidin, D. S. Najoan, C. Rolando and H. L. H. S. Warnars, “E-Payment For Jakarta Smart Public
Transportation, Using The Point System For E-Commerce,” Journal Of Physics: Conference Series, vol. 1477, no.
2, 2020, doi: 10.1088/1742-6596/1477/2/022035.
[20] H. L. H. S. Warnars, Y. Lanita, A. Prasetyo and R. Randriatoamanana, “Smart Integrated Payment System For
Public Transportation In Jakarta,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 3, pp. 241–249,
2017, doi: 10.11591/eei.v6i3.655.
[21] A. A. Saleem, H. U. R. Siddiqui, R. Shafique, A. Haider and M. Ali, “A Review On Smart Iot Based Parking
System,” International Conference On Soft Computing And Data Mining, Springer, Cham, pp. 264–273, 2020, doi:
10.1007/978-3-030-36056-6_26.
[22] S. A. A. Tarmazi, W. R. W. Ismail, N. A. S. N. Azmin and A. R. A. Bakar, “Consumer Purchase Intention Toward
Online Food Delivery Service: The Implication For Future Research,” Malaysian Journal of Social Sciences and
Humanities (MJSSH), vol. 6, no. 9, pp. 347–354, 2021, doi: 10.47405/mjssh.v6i9.972.
[23] V. Chang, W. Chen, Q. A. Xu and C. Xiong, “Towards The Customers’ Intention To Use Qr Codes In Mobile
Payments,” Journal of Global Information Management (JGIM), vol. 29, no. 6, pp. 1–21, 2021, doi:
10.4018/JGIM.20211101.oa37.
[24] R. Liu, J. Wu and G. F. Yu-Buck, “The Influence Of Mobile Qr Code Payment On Payment Pleasure: Evidence
From China,” International Journal of Bank Marketing, vol. 39, no. 2, pp. 337-356, 2021, doi: 10.1108/IJBM-11-
2020-0574.
[25] G. F. Djayapranata and A. Setyawan, “Trust Or Usefulness? Qr Code Payment Among Millennials In A Disrupted
Market,” 18th International Symposium on Management (INSYMA 2021). Atlantis Press, pp. 194–199, 2021.
[26] I. Afrianto, A. Heryandi, A. Finandhita and S. Atin, “E-Document Autentification With Digital Signature Model
For Smart City In Indonesia”Journal of Engineering Science and Technology, vol. 15, pp. 28-35, 2020.
[27] A. Heryandi and I. Afrianto, “Online Diploma Supplement Information System Modelling For Indonesian Higher
Education Institution,” IOP Conference Series: Materials Science And Engineering, vol. 662, no. 2, 2019, doi:
10.1088/1757-899x/662/2/022092.
[28] S. Basak And M. S. Hosain, “Software Testing Process Model From Requirement Analysis To Maintenance,”
International Journal of Computer Applications, vol. 107, no. 11, 2014.
[29] G. Ali, M. Ally Dida and A. Elikana Sam, “Two-Factor Authentication Scheme For Mobile Money: A Review Of
Threat Models And Countermeasures,” Future Internet, vol. 12, no. 10, 2020, doi: 10.3390/fi12100160.
[30] S. Yakean, “Advantages And Disadvantages Of A Cashless System In Thailand During The Covid-19 Pandemic,”
The Journal of Asian Finance, Economics, and Business, vol. 7, no. 12, pp. 385–388, 2020, doi:
10.13106/jafeb.2020.vol7.no12.385.
10. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 6, December 2021 : 3303 – 3312
3312
BIOGRAPHIES OF AUTHORS
Irawan Afrianto is a lecturer at the Department of Informatics, Universitas Komputer
Indonesia (UNIKOM) Bandung. Currently completing the Computer Sci-ence Doctoral
program at IPB University Bogor with the research field of Blockchain Technology in
agroindustry.
Mouhamad Hatta Hiroshi Sasmita is an alumni of Informatics Department, Universitas
Komputer Indonesia (UNIKOM) Bandung. Currently working as an Android Developer at PT.
Nostra Technology.
Sufa Atin is a lecturer at Informatics Department, Universitas Komputer Indonesia
(UNIKOM) Bandung. The areas of research undertaken are in information systems, software
project management and socio-informatics.