首页 > 最新文献

2019 International Conference on ICT for Smart Society (ICISS)最新文献

英文 中文
Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company) 信息技术投资的可行性研究(以ODOO ERP项目管理模块在印尼公司实施为例)
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969810
Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti
IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.
IT治理是管理企业级IT的需求之一。本研究显示了IT治理帮助的部分决策领域,即IT投资和优先级。本研究的目的是确定实施开源ERP系统Odoo项目管理模块的可行性,以取代基于运营,经济和技术方面的现有系统。使用的方法是适合/差距分析和使用经济影响工作表的成本效益模型。通过与现有系统和Odoo ERP系统的特点进行对比分析。本研究结果表明,Odoo ERP系统在3个方面是可行的,运营可行性Odoo达到72% Fit,经济可行性ROI达到84%,技术可行性通过租赁AWS服务器可以满足技术需求。通过对开源ERP系统Odoo项目管理模块在运营、经济、技术三个方面的研究,得出了Odoo项目管理模块在应用上是可行的。
{"title":"Feasibility study of Information Technology Investment (a case study of ODOO ERP: Project Management Module Implementation in Indonesia Based Company)","authors":"Fredy Jingga, R. Kosala, S. Supangkat, B. Ranti","doi":"10.1109/ICISS48059.2019.8969810","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969810","url":null,"abstract":"IT Governance are one of the needs in managing Enterprise Level IT. This study shows part of the decision domain of IT Governance Help, which are IT Investment and Prioritization. The purpose of this study is to determine feasibility of implementation open source ERP system Odoo project management module that replaces current system based on operational, economic, and technical aspects. The method used are Fit / Gap Analysis and Cost Benefit model using economic impact worksheet. The analysis is done by comparing the requirement with features owned by current system and Odoo ERP system. This research resulted that Odoo ERP System is feasible in the 3 aspects, the operational feasibility Odoo reaching 72% Fit, the economic feasibility with ROI of 84%, and technical feasibility indicating the technical requirement can be fulfilled by leasing AWS server. The conclusion is the open source ERP system Odoo project management module is feasible to be applied in terms of 3 aspects that have been studied, those are operational, economic, and technical.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"9 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114128416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Smart Trip Planner 智能出行计划的设计与实现
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969814
A. Osmond, S. Supangkat, F. Hidayat
Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.
在旅游业中使用信息技术,可以提高旅游业和旅游业参与者的服务质量,增加该地区的收入。旅游趋势现在已经转向数字化或称为旅游4.0。旅游4.0以千禧一代游客为目标,有多重增长目标。这一4.0旅游趋势的特点是游客行为的变化趋向于独立和个性化。通过数字技术,消费者行为开始向移动化、个性化和互动性的方向转变。在本文中,我们提出了一个智能旅行计划,以支持独立旅行者自动安排他们的行程。
{"title":"Design and Implementation of Smart Trip Planner","authors":"A. Osmond, S. Supangkat, F. Hidayat","doi":"10.1109/ICISS48059.2019.8969814","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969814","url":null,"abstract":"Utilization of information technology in the tourism has the potency to improve the quality of services for tourism and tourism industry players in increasing the amount of revenue for the region. The tourism trend has now shifted towards digital or called tourism 4.0. Tourism 4.0 is aimed at millennial tourists with multiple growth targets. This 4.0 tourism trend is marked by changes in tourist behavior that tends to be independent and individual. Through digital technology, consumer behavior begins to change in an increasingly mobile, personal and interactive direction. In this paper, we propose a smart trip planner to support independent traveler to facilitate their itinerary automatically.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114187125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Relations Between Influencers in Social Media and The Election Winning Party 2019 社交媒体影响者与2019年大选获胜党之间的关系
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969801
Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja
In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select "Pemilu Presiden 2019" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, "Gerindra" and "PDI Perjuangan" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate "PDI Perjuangan" has more a good sentiment than "Gerindra". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.
在这个时代,大多数人使用社交媒体来交流和了解任何一种新闻。政治是使用社交媒体传播新闻的部门之一。通过利用舆论和其他政治家的信息,将增加另一个重要的信息,以增加赢得选举的可能性。本文采用社会网络分析法,通过社会媒体网络来衡量公众的会话活动。我们选择“Pemilu Presiden 2019”作为案例研究,因为这是印度尼西亚最大的政治事件,这一事件不仅对印度尼西亚而且对世界其他国家都有巨大的影响。除此之外,本文还利用社交媒体平台Twitter中的会话活动,收集了2018年3月29日至4月8日期间的4564条推文。我们分析了“Gerindra”和“PDI Perjuangan”这两个政党作为总统候选人的政党。我们还发现网络中的一些影响者表明“PDI Perjuangan”比“Gerindra”更有好感。我们收集并总结了所有影响者与每个政党相关的对话,发现影响者、政党和总统候选人之间存在高度相关性。这表明,影响力越大,就越有可能给总统候选人和政党的形象带来风险。
{"title":"The Relations Between Influencers in Social Media and The Election Winning Party 2019","authors":"Olga Monica, Firda Wahyu Wahida, Hanif Fakhruroja","doi":"10.1109/ICISS48059.2019.8969801","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969801","url":null,"abstract":"In this era, most people use social media to communicate and keep up with any kind of news. Politic is one of the sectors that use social media to spread the news. By utilizing information from public opinion and other politicians, will add another important information in order to increase the possibility of winning the elections. This paper uses social network analysis to measure public conversational activity through social media network. We select \"Pemilu Presiden 2019\" as the case study since this is the biggest politic event in Indonesia and this event also has a massive impact not only for Indonesia but also other countries in the world. In addition to that, this paper uses conversational activity in social media platform which is Twitter and collected 4.564 tweets between March 29 until April 8, 2018. We analyze two political parties such as, \"Gerindra\" and \"PDI Perjuangan\" as the parties from the presidential candidates. We also found a number of influencers in the network that indicate \"PDI Perjuangan\" has more a good sentiment than \"Gerindra\". We collect and summarize all the influencer’s conversations related to each party and found a high correlation between the influencers, parties, and presidential candidates. It shows the bigger influencers are able to provide more risks for the presidential candidates image, also the parties.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121256212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ) 基于COBIT 2019的电子政务安全治理体系设计(在巴丹市试点)
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969808
Vira Septiyana Kasma, S. Sutikno, K. Surendro
e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.
电子政务是实现廉洁、有效、透明和负责任的治理以及优质可靠的公共服务的必要条件。电子政务的实施目前受到制约,因为没有衍生法规,其中之一就是电子政务安全法规。针对这一需求,本研究旨在为电子政务安全的绩效管理和治理系统提供意见,以期满足电子政务安全的控制设计。本文的研究结果是基于COBIT 2019的28个核心模型构建的电子政务安全治理体系。采用CSF法和风险法取28只核心模型。此外,该治理系统的绩效管理由能力和成熟度级别组成,这是PAN & RB部发布的电子政务评估指南中评估过程的延伸。通过确定巴丹XYZ的能力和成熟度水平的现状,对设计进行评估。评价结果表明,该设计方案是可行的,是需要的。
{"title":"Design of e-Government Security Governance System Using COBIT 2019 : (Trial Implementation in Badan XYZ)","authors":"Vira Septiyana Kasma, S. Sutikno, K. Surendro","doi":"10.1109/ICISS48059.2019.8969808","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969808","url":null,"abstract":"e-Government is needed to actualize clean, effective, transparent and accountable governance as well as quality and reliable public services. The implementation of e-Government is currently constrained because there is no derivative regulation, one of which is the regulation for e-Government Security. To answer this need, this study aims to provide input on performance management and governance systems for e-Government Security with the hope that the control design for e-Government Security can be met. The results of this study are the e-Government Security Governance System taken from 28 core models of COBIT 2019. The 28 core models were taken using CSF and risk. Furthermore, performance management for this governance system consists of capability and maturity levels which is an extension of the evaluation process in the e-Government Evaluation Guidelines issued by the Ministry of PAN & RB. The evaluation of the design carried out by determining the current condition of capability and maturity level in Badan XYZ. The result of the evaluation shows that the design possible to be implemented and needed.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125221821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment 探讨基于USB的分叉炸弹攻击Windows环境的可能性
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969789
Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo
The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.
目前对数据交换和存储的需求正在增加。对数据交换和存储需求的增加也增加了对数据交换设备和媒体的需求。最常用的媒体交换和数据存储之一是USB闪存驱动器。USB闪存驱动器被广泛使用,因为它们易于携带,并且具有相当大的存储空间。不幸的是,对于USB闪存驱动器设备和用作主存储设备的计算机设备来说,这种增加的需求与设备安全意识的提高并不成正比。这项研究显示了使用USB闪存驱动器设备可能产生的威胁。本研究中使用的威胁是在Arduino Pro Micro设备上实现的分叉炸弹,该设备可转换为USB闪存驱动器。分叉炸弹的目的是破坏受影响设备的内存性能。这样,执行进程的内存性能就会变慢。使用USB闪存驱动器作为攻击媒介,使用分叉炸弹方法导致用户无法访问被攻击的操作系统。结果表明,USB闪存驱动器可以作为对Windows操作系统进行分叉炸弹攻击的媒介。
{"title":"Exploring the Possibility of USB based Fork Bomb Attack on Windows Environment","authors":"Rezky Aulia Efendy, A. Almaarif, Avon Budiono, M. Saputra, Warih Puspitasari, E. Sutoyo","doi":"10.1109/ICISS48059.2019.8969789","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969789","url":null,"abstract":"The need for data exchange and storage is currently increasing. The increased need for data exchange and storage also increases the need for data exchange devices and media. One of the most commonly used media exchanges and data storage is the USB Flash Drive. USB Flash Drive are widely used because they are easy to carry and have a fairly large storage. Unfortunately, this increased need is not directly proportional to an increase in awareness of device security, both for USB flash drive devices and computer devices that are used as primary storage devices. This research shows the threats that can arise from the use of USB Flash Drive devices. The threat that is used in this research is the fork bomb implemented on an Arduino Pro Micro device that is converted to a USB Flash drive. The purpose of the Fork Bomb is to damage the memory performance of the affected devices. As a result, memory performance to execute the process will slow down. The use of a USB Flash drive as an attack vector with the fork bomb method causes users to not be able to access the operating system that was attacked. The results obtained indicate that the USB Flash Drive can be used as a medium of Fork Bomb attack on the Windows operating system.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"5 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019 推特上的危机沟通:2019年克赖斯特彻奇恐怖袭击的社会网络分析
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969839
Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar
Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.
基督城恐怖袭击是2019年3月15日发生在新西兰的一起近期悲剧。克赖斯特彻奇的袭击共造成50人死亡。在两天内,至少有722,295条推特是由推特用户创建的,他们在推特上表达了他们对袭击的想法和祈祷。这意味着社交媒体在危机情况下在世界范围内传播信息是非常重要的,它也能够提供和促进信息的流动。为了理解这个问题,本文考察了新西兰悲剧发生后2天Twitter的使用情况。关于克赖斯特彻奇袭击的对话中的网络结构必须受到关注,因为许多社区和行动者在Twitter上关于袭击的信息流中发挥了作用。我们的研究结果表明,个人可能比权威机构或政府机构拥有更多的信息传播能力。非权威行动者在推特网络中的影响力凸显了一个明显的现实,即个人在不知道正义的情况下,可能会比权威更广泛地传播信息。
{"title":"Crisis Communication on Twitter: A Social Network Analysis of Christchurch Terrorist Attack in 2019","authors":"Hanif Fakhrurroja, Muhammad Nashir Atmaja, Joe Nathan C.G Panjaitan, A. Alamsyah, A. Munandar","doi":"10.1109/ICISS48059.2019.8969839","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969839","url":null,"abstract":"Christchurch terrorist attack is a recent tragedy that happened in New Zealand on 15 March 2019. There are total 50 deaths caused by the attack in Christchurch. In two days, at least, 722,295 tweets are created by users of Twitter, they tweet about their thoughts and prayers about the attack. That means that social media is very important to spread information throughout the world while in a crisis condition, which also able to provide and facilitate how the information flow. To understand the issue, this paper examines the use of Twitter during post-tragedy, which is 2 days after the tragedy happened in New Zealand. The network structures within the conversation about Christchurch attack must be concerned, because many communities and actors play a part in the flow of information about the attack on Twitter. Our findings show an individual might have more information-spreading power than authority or government institutions. The influence of non-authority actors in Twitter network highlights an apparent reality that an individual might be spread information wider than authority without knowing the righteousness.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130153841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design of Distributed Academic-record System Based on Blockchain 基于区块链的分布式学籍系统设计
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969849
A. Rachmat, Albarda
As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a "trust-less operation", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.
区块链作为一个分布式系统,由于其优势,目前是公共服务后端的一个有吸引力的选择。去中心化并带有共识机制,将数据存储到不可逆转的分类账中是区块链的优势。本研究讨论了印度尼西亚学术记录系统的架构设计,该系统目前在允许的网络中集中到分散。网络系统的参与者,即学术人员、教师、学生和外部各方等机构,每个参与者都有智能合约的权限和安排。评估结果显示,拟议系统完成业务流程的时间比当前系统短。可以消除验证活动的任务,并在内部执行智能合约功能,成为“无信任操作”,确保学术数据不因人为错误而被滥用或损坏。分类帐中包含的数据包括学生要求的学术活动历史中的个人表现,这些数据可以被相关方追踪,例如希望招聘员工的组织,以及需要获得潜在申请人所需的特定信息的教育机构。
{"title":"Design of Distributed Academic-record System Based on Blockchain","authors":"A. Rachmat, Albarda","doi":"10.1109/ICISS48059.2019.8969849","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969849","url":null,"abstract":"As a distributed system, blockchain is currently an attractive choice for the back-end of public services because of its benefits. Decentralized and carries a consensus mechanism making data stored into irreversible ledger is an advantage of the blockchain. This study discusses the architecture design of academic recording systems in Indonesia, which is currently centralized to be decentralized in permitted networks. Participants involved in the network system, namely institutions as academic staff, teachers, students, and external parties, which each participant has the authority and arrangement with smart-contracts. Evaluation results show less time on the proposed system to complete business processes than the currently system. The task of validation activities can be eliminated and perform smart-contract functions inside to become a \"trust-less operation\", in which academic data are ensured to be protected from abused or damage due to human error. The data that has been included in the ledger consists of personal performance from the history of academic activities required by students that can be traced by interested parties such as organizations wishing to recruit employees, as well as educational institutions that require the achievement of specific information needed by prospective applicants.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection 基于噪声注入深度强化学习的无人机障碍物检测导航系统
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969798
Alonica R. Villanueva, Arnel C. Fajardo
This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.
本文是深度强化学习和噪声注入技术在无人机导航中的应用。最近的研究利用了增强其对环境导航的探索性,如灾害监测和搜救等民用任务。一些研究包括在深度学习算法中注入噪声以提高其性能。因此,本研究在双决斗深度Q网络中应用并比较了高斯噪声层和噪声网络两种注入高斯噪声的方式。使用标准差为1.0的高斯噪声层进行的测试在q学习、损失和飞行导航方面都有稳定的探索性能。研究结果对进一步研究高斯噪声注入对无人机深度强化算法的优化具有重要意义,并可进一步应用于未来的导航技术。
{"title":"UAV Navigation System with Obstacle Detection using Deep Reinforcement Learning with Noise Injection","authors":"Alonica R. Villanueva, Arnel C. Fajardo","doi":"10.1109/ICISS48059.2019.8969798","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969798","url":null,"abstract":"This paper is an application of deep reinforcement learning and noise injection to the navigation of the Unmanned Aerial Vehicle. Recent studies take advantage of the enhancement of the exploratory of its navigation to the environment like civilian missions such as disaster monitoring and, search and rescue. Some research studies include noise injection in the deep learning algorithm to improve its performance. Therefore, this study applied the ad compared two ways to inject Gaussian noise namely Gaussian Noise Layer and Noisy Network in Double Dueling Deep Q Network. The tests conducted with the Gaussian Noise Layer with a standard deviation of 1.0 gives stable exploration performance in terms of q learning, loss and flight navigation. The noticeable results give the significance to further research in Gaussian Noise injection in optimizing the deep reinforcement algorithm of unmanned aerial vehicles where can be further applied to future technology of navigation.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131198318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology 智能停车自动收银系统利用物联网技术
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969793
Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang
The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.
停车难的问题成为本文创作的主要考虑因素之一,并重点开发了我们所提出的智能停车系统。除此之外,物联网(IoT)技术的利用已经成为以最少的硬件使用匹配复杂系统的伟大技术之一。随着基于云计算的物联网、多种智能设备以及智能自动化机器的实施,智能停车系统的概念有望通过移动应用提供停车位搜索和停车位分配服务。
{"title":"Smart Parking System With Automatic Cashier Machine Utilize the IoT Technology","authors":"Agustina Ampuni, Sopater Fonataba, Adi Fitrianto, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969793","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969793","url":null,"abstract":"The difficulty of finding car parking spot has become one of main consideration to create this paper and focusing on develop our proposed smart parking system. Other than that, the utilization of internet of things (IoT) technology has become one of great technology that match for complex system with a minimal use of hardware. With the implementation of IoT based on cloud computing, several smart devices, and also smart automatic machine, the concept of smart parking system are expected to be able to provide services for car parking spot searching and car parking spot allocation through the mobile application.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Developing Forecasting System with Zachman Approach 用Zachman方法开发预测系统
Pub Date : 2019-11-01 DOI: 10.1109/ICISS48059.2019.8969794
M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang
Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.
如今的大数据可以提供独特的洞察,市场趋势,需求和供应预测,库存报应,销售评分概况,库存再分配,有利于降低成本,使更有效的商业决策。本文讨论了如何使用Zachman框架来应对挑战,以及如何成功实现大数据优化。本文以Astra International子公司Auto2000为例进行了案例研究,Auto2000是一家汽车经销商公司,在处理库存和需求预测方面面临着一些缺乏灵活性和复杂性的挑战。本文运用大数据的优势,并结合Zachman方法来解决从业务角度到IT操作的转换。本文论述了品牌主体在降低低效率成本中的作用。本文的目的是研究在大数据的帮助下使用Zachman方法,以及机器学习领域的分析工具,以调查用户需求,如何预测3个月的有效库存需求,并通过业务流程理解在国家和分支机构层面进行库存规划优化。
{"title":"Developing Forecasting System with Zachman Approach","authors":"M. Rakhmanto, S. Royani, Riesda Triyanti, Gunawan Wang","doi":"10.1109/ICISS48059.2019.8969794","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969794","url":null,"abstract":"Big data nowadays can provide unique insights into, market trends, demand and supply forecasting, stock retribution, sales scoring profile, stock redistribution with purpose benefit into lowering cost and enabling more efficient business decision. The article addressed the use of Zachman Framework to address challenges, and for successful implementation of Big Data Optimization. The article takes the case study in Astra International subsidiary such as Auto2000, an automotive dealer company that faced some challenges in inflexibility and complexity with handling stock and demand forecasting. The article applies the advantages of big data and combined with Zachman approach to address the transformation from business perspective into IT operation. The article addresses the role of brand principal to cut inefficient cost. The objective of this article to examine the use of Zachman approach with assistance of big data, and its analytic tools in the area of machine learning to investigate the user requirements how to predict the efficient the 3-month stock demand and allow stock planning optimisation at Country and Branch level through business flow understanding.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115658772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on ICT for Smart Society (ICISS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1