Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969810
Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti
IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.
{"title":"Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company)","authors":"Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti","doi":"10.1109/ICISS48059.2019.8969810","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969810","url":null,"abstract":"IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969814
A. Osmond, S. Supangkat, F. Hidayat
Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.
{"title":"Design and Implementation of Smart Trip Planner","authors":"A. Osmond, S. Supangkat, F. Hidayat","doi":"10.1109/ICISS48059.2019.8969814","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969814","url":null,"abstract":"Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969801
Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja
In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select "Pemilu Presiden 2019" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, "Gerindra" and "PDI Perjuangan" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate "PDI Perjuangan" has more a good sentiment than "Gerindra". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.
在这个时代,大多数人使用社交媒体来交流和了解任何一种新闻。政治是使用社交媒体传播新闻的部门之一。通过利用舆论和其他政治家的信息,将增加另一个重要的信息,以增加赢得选举的可能性。本文采用社会网络分析法,通过社会媒体网络来衡量公众的会话活动。我们选择“Pemilu Presiden 2019”作为案例研究,因为这是印度尼西亚最大的政治事件,这一事件不仅对印度尼西亚而且对世界其他国家都有巨大的影响。除此之外,本文还利用社交媒体平台Twitter中的会话活动,收集了2018年3月29日至4月8日期间的4564条推文。我们分析了“Gerindra”和“PDI Perjuangan”这两个政党作为总统候选人的政党。我们还发现网络中的一些影响者表明“PDI Perjuangan”比“Gerindra”更有好感。我们收集并总结了所有影响者与每个政党相关的对话,发现影响者、政党和总统候选人之间存在高度相关性。这表明,影响力越大,就越有可能给总统候选人和政党的形象带来风险。
{"title":"The Relations Between Influencers in Social Media and The Election Winning Party 2019","authors":"Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja","doi":"10.1109/ICISS48059.2019.8969801","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969801","url":null,"abstract":"In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select \"Pemilu Presiden 2019\" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, \"Gerindra\" and \"PDI Perjuangan\" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate \"PDI Perjuangan\" has more a good sentiment than \"Gerindra\". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969808
Vira Septiyana Kasma, S. Sutikno, K. Surendro
e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.
{"title":"Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ)","authors":"Vira Septiyana Kasma, S. Sutikno, K. Surendro","doi":"10.1109/ICISS48059.2019.8969808","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969808","url":null,"abstract":"e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969789
Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo
The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.
目前对数据交换和存储的需求正在增加。对数据交换和存储需求的增加也增加了对数据交换设备和媒体的需求。最常用的媒体交换和数据存储之一是USB闪存驱动器。USB闪存驱动器被广泛使用,因为它们易于携带,并且具有相当大的存储空间。不幸的是,对于USB闪存驱动器设备和用作主存储设备的计算机设备来说,这种增加的需求与设备安全意识的提高并不成正比。这项研究显示了使用USB闪存驱动器设备可能产生的威胁。本研究中使用的威胁是在Arduino Pro Micro设备上实现的分叉炸弹,该设备可转换为USB闪存驱动器。分叉炸弹的目的是破坏受影响设备的内存性能。这样,执行进程的内存性能就会变慢。使用USB闪存驱动器作为攻击媒介,使用分叉炸弹方法导致用户无法访问被攻击的操作系统。结果表明,USB闪存驱动器可以作为对Windows操作系统进行分叉炸弹攻击的媒介。
{"title":"Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment","authors":"Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo","doi":"10.1109/ICISS48059.2019.8969789","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969789","url":null,"abstract":"The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969839
Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar
Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.
{"title":"Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019","authors":"Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar","doi":"10.1109/ICISS48059.2019.8969839","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969839","url":null,"abstract":"Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969849
A. Rachmat, Albarda
As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a "trust-less operation", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.
{"title":"Design of Distributed Academic-record System Based on Blockchain","authors":"A. Rachmat, Albarda","doi":"10.1109/ICISS48059.2019.8969849","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969849","url":null,"abstract":"As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a \"trust-less operation\", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969798
Alonica R. Villanueva, Arnel C. Fajardo
This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.
{"title":"UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection","authors":"Alonica R. Villanueva, Arnel C. Fajardo","doi":"10.1109/ICISS48059.2019.8969798","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969798","url":null,"abstract":"This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969793
Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang
The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.
{"title":"Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology","authors":"Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969793","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969793","url":null,"abstract":"The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/ICISS48059.2019.8969794
M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang
Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.
{"title":"Developing Forecasting System with Zachman Approach","authors":"M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969794","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969794","url":null,"abstract":"Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}