Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708840
Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo
Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.
{"title":"The Decision Accuracy of Acquaintance List from Different Risk-cost Analysis","authors":"Yudha Purwanto, Kuspriyanto, Hendrawan, B. Rahardjo","doi":"10.1109/TSSA.2018.8708840","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708840","url":null,"abstract":"Consultation-based Collaborative Intrusion Detection Network (CIDN) aims to improve the detection accuracy of an Intrusion Detection System (IDS). Acquaintance management has become a vital process which responsible for the acquaintance selection in CIDN. In an acquaintance management algorithm, the trustworthiness of the IDS is estimated by the used of risk-cost analysis. However, the inaccurate estimation of the risk cost value has lead to a poor acquaintance list quality. As there is more than one risk-cost analysis, it is beneficial to analyze the used of different risk-cost analysis in an acquaintance management algorithm. We implement three different risk-cost analysis in four different environments of CIDN. The result shows that in the mix component of the DDoS attack, our proposed risk-cost analysis provide higher acquaintance detection accuracy.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708797
T. Setiadi, Syauqi Bima Premapasha
The majority of e-class hospitals in Indonesia still apply manual, non-computerized systems to conduct operational activities every day. This causes problems especially for hospital directors, because as a director requires a system that can evaluate the operations of the hospital. This problem was initiated due to the data of operational activities that are currently available are not well managed. This happens because there is no system for employees so that employees have difficulty managing data from each process.In this paper, we discuss Online Transaction Processing (OLTP) application development using the Scrum Framework. Scrum can address complex adaptive problems, by increasing productivity and creativity of all stakeholders involved. The test results with User Accepted Testing (UAT), Usability Testing and Scrum analysis based on the results of the development of the project show the OLTP system with the Scrum method has met the needs of the functional aspects and the development of the X hospital system
{"title":"Scrum Implementation for Online Transaction Processing (OLTP) in Hospital Management","authors":"T. Setiadi, Syauqi Bima Premapasha","doi":"10.1109/TSSA.2018.8708797","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708797","url":null,"abstract":"The majority of e-class hospitals in Indonesia still apply manual, non-computerized systems to conduct operational activities every day. This causes problems especially for hospital directors, because as a director requires a system that can evaluate the operations of the hospital. This problem was initiated due to the data of operational activities that are currently available are not well managed. This happens because there is no system for employees so that employees have difficulty managing data from each process.In this paper, we discuss Online Transaction Processing (OLTP) application development using the Scrum Framework. Scrum can address complex adaptive problems, by increasing productivity and creativity of all stakeholders involved. The test results with User Accepted Testing (UAT), Usability Testing and Scrum analysis based on the results of the development of the project show the OLTP system with the Scrum method has met the needs of the functional aspects and the development of the X hospital system","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131156946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708833
Raditya Muhammad, Ian Yosef Matheus Edward
The Universal Service Obligation (USO) program mandated by the Ministry of Communication and Information (KOMINFO) through the Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti) is the foundation of the Internet Access Program for underdeveloped regions, frontier and outermost regions in Indonesia. The Internet Access Program aims to reduce the gap in understanding information and communication technology (ICT) between rural and urban areas. With the amount of technology investment costs managed in this program, it is necessary to standardize information technology governance in the implementation of this program, so the objectives can be realized. In this research, information technology governance system will be developed that refers to international standards COBIT 5. Case studies were carried out at one of the target locations of the Internet Access program at BLK Kendari with the assessment of the current capability level, gap analysis, risk analysis, and proposed recommendations. The proposed recommendations are expected to be able to help program management so that the goal of using information technology to form IT-based communities can be achieved.
通讯与资讯部(KOMINFO)透过Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti)授权的普遍服务义务(USO)计划,是印尼欠发达地区、边境和最偏远地区互联网接入计划的基础。互联网接入计划旨在缩小农村和城市地区在了解信息通信技术(ICT)方面的差距。鉴于本方案所管理的技术投资成本数额,在本方案的实施过程中,有必要规范信息技术治理,使目标得以实现。本研究将参照国际标准COBIT 5开发信息技术治理体系。案例研究是在BLK Kendari的互联网接入项目的一个目标地点进行的,评估了当前的能力水平、差距分析、风险分析和建议。所提出的建议预计能够帮助项目管理,从而实现使用信息技术形成基于it的社区的目标。
{"title":"Assessment of IT Governance of Bakti Internet Access Program Based on the COBIT5 Framework : Case Study: Balai Latihan Kerja Kendari","authors":"Raditya Muhammad, Ian Yosef Matheus Edward","doi":"10.1109/TSSA.2018.8708833","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708833","url":null,"abstract":"The Universal Service Obligation (USO) program mandated by the Ministry of Communication and Information (KOMINFO) through the Badan Aksesibilitas Telekomunikasi dan Informatika (Bakti) is the foundation of the Internet Access Program for underdeveloped regions, frontier and outermost regions in Indonesia. The Internet Access Program aims to reduce the gap in understanding information and communication technology (ICT) between rural and urban areas. With the amount of technology investment costs managed in this program, it is necessary to standardize information technology governance in the implementation of this program, so the objectives can be realized. In this research, information technology governance system will be developed that refers to international standards COBIT 5. Case studies were carried out at one of the target locations of the Internet Access program at BLK Kendari with the assessment of the current capability level, gap analysis, risk analysis, and proposed recommendations. The proposed recommendations are expected to be able to help program management so that the goal of using information technology to form IT-based communities can be achieved.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Distributed Mobility Management (DMM) is considered by many to be a suitable mobility management system for future 5G network. This approach implements flatter and more flexible architecture by distributing the data plane among the networks. Data traffic is not traversed to core but segregated locally, making it closer to the edge of the network. This can be achieved by implementing Software Defined Network (SDN) paradigm, i.e. separating control and data plane This paper surveys and analyzes numerous related work on DMM for 5G network particularly on handover protocol Those proposed solutions are in different in terms of architectures and procedures. Some of them can also be referring to quite similar concept under different nomenclature There are two proposed solutions for handover in DMM, SDN-based handover without tunneling and SDN-based handover with tunneling. The comparative analysis between those two are presented as well
{"title":"Leveraging SDN for Handover in Distributed Mobility Management of 5G Network","authors":"Rifqy Hakimi, Harashta Tatimma Larasati, Alvin Mustafa, Abdallah Abu-Arabiya","doi":"10.1109/TSSA.2018.8708820","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708820","url":null,"abstract":"Distributed Mobility Management (DMM) is considered by many to be a suitable mobility management system for future 5G network. This approach implements flatter and more flexible architecture by distributing the data plane among the networks. Data traffic is not traversed to core but segregated locally, making it closer to the edge of the network. This can be achieved by implementing Software Defined Network (SDN) paradigm, i.e. separating control and data plane This paper surveys and analyzes numerous related work on DMM for 5G network particularly on handover protocol Those proposed solutions are in different in terms of architectures and procedures. Some of them can also be referring to quite similar concept under different nomenclature There are two proposed solutions for handover in DMM, SDN-based handover without tunneling and SDN-based handover with tunneling. The comparative analysis between those two are presented as well","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114823415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708810
Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan
Region of Interest (ROI) Image Quality Assessment is an image quality assessment model based on Structural Similarity Index (SSI) used in the specific designated image region to be assessed. The output assessment value used by this image assessment model is 1 which means identical and -1 which means not identical. The assessment model of ROI Quality Assessment in this research is used to measure image quality on Kinect sensor capture result used in Mobile HD Robot after applying Multiple Localized Filtering Technique. The filter is applied to each capture sensor depth result on Kinect, aiming to eliminate structural noise which occurs in the Kinect sensor. Assessment is done by comparing the image quality before and after filter applied to certain regions. The Kinect sensor will be conditioned to capture a square black object measuring 10cm x 10cm perpendicular to a homogeneous background (white with RGB code 255,255,255). The results of Kinect sensor data will be taken through EWRF 3022 by visual basic 6.0 program periodically, 10 times each session with frequency 1 time per minute. The results of this trial show the same similar index (value 1: identical) in the luminance, contrast and structural section of the edge region or edge region of the specimen. The value indicates that the Multiple Localized Filtering Technique is applied to the noise generated by the Kinect sensor. Based on the ROI Image Quality Assessment model, there is no effect on the image quality generated by the sensor.
感兴趣区域(Region of Interest, ROI)图像质量评估是一种基于结构相似指数(Structural Similarity Index, SSI)的图像质量评估模型,用于特定的待评估图像区域。本图像评价模型使用的输出评价值为1,表示相同,-1表示不相同。本研究的ROI质量评估评估模型用于测量移动高清机器人使用的Kinect传感器捕获结果在应用多重局部滤波技术后的图像质量。该滤波器应用于Kinect上的每个捕获传感器深度结果,旨在消除Kinect传感器中出现的结构噪声。评估是通过比较应用于特定区域的滤波前后的图像质量来完成的。Kinect传感器将被设定为捕捉一个垂直于均匀背景(白色,RGB代码为255,255,255)的10cm x 10cm的方形黑色物体。用visual basic 6.0程序定期通过EWRF 3022采集Kinect传感器数据的结果,每次10次,频率每分钟1次。本试验结果在试样的边缘区域或边缘区域的亮度、对比度和结构截面上显示相同的相似指数(值1:相同)。该值表示对Kinect传感器产生的噪声应用多重局部滤波技术。基于ROI图像质量评估模型,不影响传感器生成的图像质量。
{"title":"ROI Based Post Image Quality Assessment Technique on Multiple Localized Filtering Method on Kinect Sensor","authors":"Kholilatul Wardani, A. Kurniawan, E. Mulyana, Hendrawan","doi":"10.1109/TSSA.2018.8708810","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708810","url":null,"abstract":"Region of Interest (ROI) Image Quality Assessment is an image quality assessment model based on Structural Similarity Index (SSI) used in the specific designated image region to be assessed. The output assessment value used by this image assessment model is 1 which means identical and -1 which means not identical. The assessment model of ROI Quality Assessment in this research is used to measure image quality on Kinect sensor capture result used in Mobile HD Robot after applying Multiple Localized Filtering Technique. The filter is applied to each capture sensor depth result on Kinect, aiming to eliminate structural noise which occurs in the Kinect sensor. Assessment is done by comparing the image quality before and after filter applied to certain regions. The Kinect sensor will be conditioned to capture a square black object measuring 10cm x 10cm perpendicular to a homogeneous background (white with RGB code 255,255,255). The results of Kinect sensor data will be taken through EWRF 3022 by visual basic 6.0 program periodically, 10 times each session with frequency 1 time per minute. The results of this trial show the same similar index (value 1: identical) in the luminance, contrast and structural section of the edge region or edge region of the specimen. The value indicates that the Multiple Localized Filtering Technique is applied to the noise generated by the Kinect sensor. Based on the ROI Image Quality Assessment model, there is no effect on the image quality generated by the sensor.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132265290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708758
Dewi Soyusiawaty, Yahya Zakaria
A library always tries to complete its book collection, yet visitors often find it difficult to search for an alternative book of an unfound book they search. Based on the questionnaire result, 83.3% respondents of library visitors take a long time in finding the exact data content of a book as an alternative of an unfound book. There are some books having similar title but the content is different. As a result, the visitors get it more difficult. For now digilib.uad.ac.id has not been able to give an alternative book when book searching done by visitors. The aim of this research is to ease the library visitors to find the exact reference book as an alternative book of an unfound book in the library by implementing Cosine Similarity method in detecting similarity.The research subject was the similarity detector system of the book data content in the library by using Cosine Similarity method. The data collection method was literature study, interview, and questionnaire. The system development phases included database design, interface design, flowchart design of book data content similarity and system evaluation with Blackbox Test, Alpha Test, and Accuracy Testing.This research developed a web-based application to detect book data content similarity by comparing the resume of a book that visitor searches with other books by using Cosine Similarity method based on the highest to the lowest score rank. System evaluation result with Blackbox test to librarians shows that the system runs well, the input can be received properly, and the output meets the expectation. On the Alpha Test evaluation, the system is also accepted by the users with 92.5% of respondent evaluation shows a highly positive response towards it. This application is reasonably used with the result of Accuracy Testing of system comparison of 82.14% relevant.
{"title":"Book Data Content Similarity Detector With Cosine Similarity (Case study on digilib.uad.ac.id)","authors":"Dewi Soyusiawaty, Yahya Zakaria","doi":"10.1109/TSSA.2018.8708758","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708758","url":null,"abstract":"A library always tries to complete its book collection, yet visitors often find it difficult to search for an alternative book of an unfound book they search. Based on the questionnaire result, 83.3% respondents of library visitors take a long time in finding the exact data content of a book as an alternative of an unfound book. There are some books having similar title but the content is different. As a result, the visitors get it more difficult. For now digilib.uad.ac.id has not been able to give an alternative book when book searching done by visitors. The aim of this research is to ease the library visitors to find the exact reference book as an alternative book of an unfound book in the library by implementing Cosine Similarity method in detecting similarity.The research subject was the similarity detector system of the book data content in the library by using Cosine Similarity method. The data collection method was literature study, interview, and questionnaire. The system development phases included database design, interface design, flowchart design of book data content similarity and system evaluation with Blackbox Test, Alpha Test, and Accuracy Testing.This research developed a web-based application to detect book data content similarity by comparing the resume of a book that visitor searches with other books by using Cosine Similarity method based on the highest to the lowest score rank. System evaluation result with Blackbox test to librarians shows that the system runs well, the input can be received properly, and the output meets the expectation. On the Alpha Test evaluation, the system is also accepted by the users with 92.5% of respondent evaluation shows a highly positive response towards it. This application is reasonably used with the result of Accuracy Testing of system comparison of 82.14% relevant.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127561681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708798
I. Riadi, Arizona Firdonsyah
The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.
{"title":"Forensic Analysis of Android-based Instant Messaging Application","authors":"I. Riadi, Arizona Firdonsyah","doi":"10.1109/TSSA.2018.8708798","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708798","url":null,"abstract":"The rapid development of Android technology has an impact on the increasing number of devices that use Android as operating system. Applications developed for the Android platform are also very diverse, including instant messaging applications. Short Message Service, Blackberry Messenger, Line, and WhatsApp are multi-platform instant messaging applications with lots of users, so the possibility of digital crime that occurs by digital crime perpetrators has also increased significantly. The process of investigating digital crime cases require digital evidence to solve it. The process of obtaining digital evidence requires a forensic investigation technique against the physical evidence that has been obtained using certain methods. This research focuses on forensic steps to obtain digital evidence from Instant Messaging application on Android smartphones and smartwatches using widely used mobile forensic software, namely, Andriller, Oxygen Forensic Suite, WhatsApp DB / Key Extractor, and Metasploit using a framework developed by the National Institute of Standard Technology (NIST). The results of this research are presented in the form of a comparison table of artifact extraction success rate from each tool. The conclusions obtained from this research are: forensic measures carried out based on the NIST Mobile Forensics framework can be applied to the digital evidence retrieval process Instant Messaging applications on smartphones and Android smartwatches with Oxygen Forensic Suite has the highest successful rate at 57.14% on BBM and WhatsApp artifact extraction and 42.85 on Smartwatch’s SMS and LINE Messenger artifact extraction. WhatsApp DB/ Key Extractor has the highest successful rate at 42.85 on Smartphone’s WhatsApp artifact extraction but has weakness in Smartwatch’s SMS, BBM, and LINE Messenger artifact extraction and Metasploit has the lowest success ratio.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708814
Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa
Rice is one of nine main commodities in Indonesia and it has been the main food for Indonesian people for over decades. Indonesian Bureau of Logistics (Bulog) is a company under Indonesian Government which is responsible to manage the distribution of the Rice Commodity. Sourcing process of the Rice Commodity is the most crucial process in Bulog. In spite of the importance of the process, the sourcing process was not maintained using any system at all. For such an important organization, which manages important product, the sourcing process of rice commodity at Bulog should be measured and monitored. Supply chain processes, such as sourcing product, have to be measured and monitored in order to assure that the processes are well executed and to give aid for improvements. Hence, in this paper, Supply Chain Measurement System is designed based on the Supply Chain Operations Reference model and Analytical Hierarchy Process. Thereafter, a monitoring system that is capable to monitor each of the metrics in the system is designed in a web-based application. This research leads to seventeen metrics in total which are distributed into four performance attributes on the designed Supply Chain Measurement System. The most important performance attribute in rice sourcing process was Reliability with 0.593 in AHP weighting. The designed monitoring system was able to provide a compact summary and a brief insight into the condition of the monitored process to the executives of the organization.
{"title":"SCOR and AHP Based Monitoring Dashboard to Measure Rice Sourcing Performance at Indonesian Bureau of Logistics","authors":"Muhammad Fadil Novar, Ari Yanuar Ridwan, B. Santosa","doi":"10.1109/TSSA.2018.8708814","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708814","url":null,"abstract":"Rice is one of nine main commodities in Indonesia and it has been the main food for Indonesian people for over decades. Indonesian Bureau of Logistics (Bulog) is a company under Indonesian Government which is responsible to manage the distribution of the Rice Commodity. Sourcing process of the Rice Commodity is the most crucial process in Bulog. In spite of the importance of the process, the sourcing process was not maintained using any system at all. For such an important organization, which manages important product, the sourcing process of rice commodity at Bulog should be measured and monitored. Supply chain processes, such as sourcing product, have to be measured and monitored in order to assure that the processes are well executed and to give aid for improvements. Hence, in this paper, Supply Chain Measurement System is designed based on the Supply Chain Operations Reference model and Analytical Hierarchy Process. Thereafter, a monitoring system that is capable to monitor each of the metrics in the system is designed in a web-based application. This research leads to seventeen metrics in total which are distributed into four performance attributes on the designed Supply Chain Measurement System. The most important performance attribute in rice sourcing process was Reliability with 0.593 in AHP weighting. The designed monitoring system was able to provide a compact summary and a brief insight into the condition of the monitored process to the executives of the organization.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131578597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708768
L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara
Smart home technology covers many systems in a house, such as lighting systems, electronic appliance control, garden maintenance systems, security systems and so on. The use of SMS (Short Message Service) technology on cellular phones has been widely applied in various researches in the fields of smart homes, smart agriculture and industry. The research aimed to implement the electronic key using a keypad, GSM module, limit switch and the Arduino Nano. Arduino Nano serves as a processor for the control of the door lock that will be ordered through the keypad and SMS gateway, the keypad used as a close command and the SMS gateway used as a remote command for the owner of the house or building to open or lock the door. There are several components as the actuator, i.e. solenoid, buzzer and SMS gateway. The solenoid has the function to lock or open the door automatically, the buzzer functions as an alarm, and the SMS gateway has a function to send the activity/status of the door. The warning system uses a buzzer that will light up for 30 seconds if the door is open (according to the limit switch detection) whereas there is no input from the SMS or keypad.
{"title":"E-Key Prototype Implementation Based on Short Message Service (SMS) Technology","authors":"L. Kamelia, Eki Ahmad Zaki Hamidi, Akhmad Jazuli Baskara","doi":"10.1109/TSSA.2018.8708768","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708768","url":null,"abstract":"Smart home technology covers many systems in a house, such as lighting systems, electronic appliance control, garden maintenance systems, security systems and so on. The use of SMS (Short Message Service) technology on cellular phones has been widely applied in various researches in the fields of smart homes, smart agriculture and industry. The research aimed to implement the electronic key using a keypad, GSM module, limit switch and the Arduino Nano. Arduino Nano serves as a processor for the control of the door lock that will be ordered through the keypad and SMS gateway, the keypad used as a close command and the SMS gateway used as a remote command for the owner of the house or building to open or lock the door. There are several components as the actuator, i.e. solenoid, buzzer and SMS gateway. The solenoid has the function to lock or open the door automatically, the buzzer functions as an alarm, and the SMS gateway has a function to send the activity/status of the door. The warning system uses a buzzer that will light up for 30 seconds if the door is open (according to the limit switch detection) whereas there is no input from the SMS or keypad.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126795389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/TSSA.2018.8708824
Ryan Fikri, M. A. Wibisono, Iskandar
In order to expand the telecommunication network to the rural area, a suitable antenna is required to be applied on the High Altitude Platform Station (HAPS). In this paper, design and study of rectangular patch antenna array is proposed, in case determining antenna parameters based on 5.18GHz working frequency. High gain patch array antenna is required to use on point to point communication, so the array method is chosen to get high gain. The parameters observed from the antenna such as gain, radiation pattern, return loss, bandwidth and Voltage Standing Wave Ratio (VSWR) are simulated by Microwave Office Software to get best result of design antenna. The simulation result shows that designed antenna has high gain and suitable for HAPS due to its small size and thickness.
{"title":"Design and Study of Rectangular Patch Antenna Array for High Altitude Platform Station","authors":"Ryan Fikri, M. A. Wibisono, Iskandar","doi":"10.1109/TSSA.2018.8708824","DOIUrl":"https://doi.org/10.1109/TSSA.2018.8708824","url":null,"abstract":"In order to expand the telecommunication network to the rural area, a suitable antenna is required to be applied on the High Altitude Platform Station (HAPS). In this paper, design and study of rectangular patch antenna array is proposed, in case determining antenna parameters based on 5.18GHz working frequency. High gain patch array antenna is required to use on point to point communication, so the array method is chosen to get high gain. The parameters observed from the antenna such as gain, radiation pattern, return loss, bandwidth and Voltage Standing Wave Ratio (VSWR) are simulated by Microwave Office Software to get best result of design antenna. The simulation result shows that designed antenna has high gain and suitable for HAPS due to its small size and thickness.","PeriodicalId":159795,"journal":{"name":"2018 12th International Conference on Telecommunication Systems, Services, and Applications (TSSA)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132933313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}