Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9633002
Wanda Vernandhes, N. S. Salahuddin, R.R Sri Poernomo Sari, Trini Saptariani
This research was aims to design a prototype and application for early detection of Happy Hypoxia symptoms in COVID-19 patients based on the Internet of Things (IoT). The experimental board consists of a microcontroller integrated with a pulse oximetry sensor, a heart rate sensor and a body temperature sensor. To determine the feasibility of the tool, an accuracy test is carried out. Accuracy shows the value of the proximity of the measurement results to the reference value or standard value. Accuracy is obtained by calculating the error value. The accuracy of the sensors used in this study refers to standard medical equipment that has been calibrated. In this study, the accuracy value was obtained by referring to the mean of error rate of each sensor. The sensor reading value is sent from the microcontroller to firebase as a cloud database and then displayed on the application dashboard as a user interface. From this data, it is hoped that it can help COVID-19 sufferers to detect the symptoms of Happy Hypoxia and help medical experts for prognostic or therapeutic purposes.
{"title":"Happy Hypoxia Early Detection Tool in IoT Based for COVID-19 Patients Using SpO2 Sensor, Body Temperature and Electrocardiogram (ECG)","authors":"Wanda Vernandhes, N. S. Salahuddin, R.R Sri Poernomo Sari, Trini Saptariani","doi":"10.1109/ICIC54025.2021.9633002","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9633002","url":null,"abstract":"This research was aims to design a prototype and application for early detection of Happy Hypoxia symptoms in COVID-19 patients based on the Internet of Things (IoT). The experimental board consists of a microcontroller integrated with a pulse oximetry sensor, a heart rate sensor and a body temperature sensor. To determine the feasibility of the tool, an accuracy test is carried out. Accuracy shows the value of the proximity of the measurement results to the reference value or standard value. Accuracy is obtained by calculating the error value. The accuracy of the sensors used in this study refers to standard medical equipment that has been calibrated. In this study, the accuracy value was obtained by referring to the mean of error rate of each sensor. The sensor reading value is sent from the microcontroller to firebase as a cloud database and then displayed on the application dashboard as a user interface. From this data, it is hoped that it can help COVID-19 sufferers to detect the symptoms of Happy Hypoxia and help medical experts for prognostic or therapeutic purposes.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"259 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124245909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632994
Ryan Gusti Nugraha, Mochamad Yoga Wibowo, Prasetyo Ajie, H. H. Handayani, Ahmad Fauzi, Anis Fitri Nur Masruriyah
The number of COVID-19 patients that continues to increase, has made several countries continue to seek treatment so that they can help COVID-19 patients recover. The increasing number of patients is indicated, because many residents still do not comply with health protocols. WHO explains that one of the important protocols is to use masks correctly. Some residents are reluctant to use masks because it makes communication less clear and breathless. Due to these omissions, this study aims to identify the use of masks. This study is able to identify the proper use of masks, the use of inappropriate masks and the face without a mask. The process of this research begins with creating a training model from several images. The model that has been made is used as a reference for identification using CNN. The results of the accuracy of this study reached "99.35%".
{"title":"Implementation of Deep Learning in Order to Detect Inapposite Mask User","authors":"Ryan Gusti Nugraha, Mochamad Yoga Wibowo, Prasetyo Ajie, H. H. Handayani, Ahmad Fauzi, Anis Fitri Nur Masruriyah","doi":"10.1109/ICIC54025.2021.9632994","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632994","url":null,"abstract":"The number of COVID-19 patients that continues to increase, has made several countries continue to seek treatment so that they can help COVID-19 patients recover. The increasing number of patients is indicated, because many residents still do not comply with health protocols. WHO explains that one of the important protocols is to use masks correctly. Some residents are reluctant to use masks because it makes communication less clear and breathless. Due to these omissions, this study aims to identify the use of masks. This study is able to identify the proper use of masks, the use of inappropriate masks and the face without a mask. The process of this research begins with creating a training model from several images. The model that has been made is used as a reference for identification using CNN. The results of the accuracy of this study reached \"99.35%\".","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124863078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632886
Suko Tyas Pernanda, Moh Edi Wibowo, N. Rokhman
Twitter is a massive source of information that can potentially be used to obtain valuable insights about public opinions, public ideas, and public circumstances. Extracting accurate information from tweets, however, is often challenging due to the use of informal, non-standard, and figurative languages including sarcasm. Sarcasm itself conveys messages using words with opposite literal meaning. Sarcasm detection, therefore, becomes an important task during information extraction from public tweets. This research proposes the use of LSTMs to detect sarcastic tweets in Indonesian language through the extraction of sentence-embedding features. LSTMs have been known to be able to learn sequential patterns in input data so that features extracted by LSTMs are more representative than those manually hand-crafted by human. The proposed LSTMs are combined with the Word2Vec model that serves as a word encoder that preserves semantic meaning. The proposed method is evaluated on tweets that are scrapped from the Web using some keywords related to popular topics. The experimental results demonstrate that the proposed method is able to achieve an accuracy of 82.13% and an f1-score of 61.31% outperforming the conventional TF-IDF + naïve Bayes sarcasm detector. These results thus prove that sentence-embedding is able to extract features that are more accurate and more discriminative for sarcasm detection.
{"title":"Sarcasm Detection of Tweets in Indonesian Language Using Long Short-Term Memory","authors":"Suko Tyas Pernanda, Moh Edi Wibowo, N. Rokhman","doi":"10.1109/ICIC54025.2021.9632886","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632886","url":null,"abstract":"Twitter is a massive source of information that can potentially be used to obtain valuable insights about public opinions, public ideas, and public circumstances. Extracting accurate information from tweets, however, is often challenging due to the use of informal, non-standard, and figurative languages including sarcasm. Sarcasm itself conveys messages using words with opposite literal meaning. Sarcasm detection, therefore, becomes an important task during information extraction from public tweets. This research proposes the use of LSTMs to detect sarcastic tweets in Indonesian language through the extraction of sentence-embedding features. LSTMs have been known to be able to learn sequential patterns in input data so that features extracted by LSTMs are more representative than those manually hand-crafted by human. The proposed LSTMs are combined with the Word2Vec model that serves as a word encoder that preserves semantic meaning. The proposed method is evaluated on tweets that are scrapped from the Web using some keywords related to popular topics. The experimental results demonstrate that the proposed method is able to achieve an accuracy of 82.13% and an f1-score of 61.31% outperforming the conventional TF-IDF + naïve Bayes sarcasm detector. These results thus prove that sentence-embedding is able to extract features that are more accurate and more discriminative for sarcasm detection.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124965916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632915
Nashrul Hakiem, H. Nanang, A. T. Muharram, Velia Handayani, Iik Muhamad Malik Matin, S. Masruroh
Many technologies are built to facilitate activities in conveying information and communication. E-Letter is a web-based application developed to simplify the process of managing the mailing system within the Faculty of Science and Technology (FST) Syarif Hidayatullah State Islamic University, Jakarta. With a proposed model modified from the Technologiy Acceptance Model (TAM), this research intends to assess the adoption of the e-Letter system in the Faculty of Science and Technology using quantitative methods. The use of the TAM model is an important area of study, although many models have been proposed to explain and predict system use. The TAM model is the one that captures the most attention in Information Systems (IS). This study wants to find out what factors influence users' intentions to use the e-letter system.
{"title":"The Technology Acceptance Model on Electronic Letter (E-Letter) Application","authors":"Nashrul Hakiem, H. Nanang, A. T. Muharram, Velia Handayani, Iik Muhamad Malik Matin, S. Masruroh","doi":"10.1109/ICIC54025.2021.9632915","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632915","url":null,"abstract":"Many technologies are built to facilitate activities in conveying information and communication. E-Letter is a web-based application developed to simplify the process of managing the mailing system within the Faculty of Science and Technology (FST) Syarif Hidayatullah State Islamic University, Jakarta. With a proposed model modified from the Technologiy Acceptance Model (TAM), this research intends to assess the adoption of the e-Letter system in the Faculty of Science and Technology using quantitative methods. The use of the TAM model is an important area of study, although many models have been proposed to explain and predict system use. The TAM model is the one that captures the most attention in Information Systems (IS). This study wants to find out what factors influence users' intentions to use the e-letter system.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632993
M. Mustakim, Retantyo Wardoyo, K. Mustofa, G. Rahayu, Ida Rosyidah
The fast growth of Electronic Medical Records (EMR) has improved its functionalities and increase its use in secondary functions. EMRs can be used to improve the quality and capacity of physicians and medical students. It is done by using EMRs as a data source for researches and learning. A lot of studies have been done in this area. Various methods are also proposed. One of the methods used in medical records retrieval is Latent Dirichlet Allocation (LDA). Thus, research on LDA for medical records has also been carried out quite a lot. Unfortunately, those researches are still scattered and make it difficult to know the state of the arts of utilizing LDA in the medical records field. Our research intends to explore the studies of the LDA method progress in the medical field. To better present responsible literature study, our research used Systematic Literature Review as a research methodology. The literature review was conducted on studies from 2015 to 2021. The result of the literature review showed that the LDA method had been used in several research topics. And most of the literature used private datasets in their experiments. Some researchers also added a modification in the LDA method. Even though the LDA method proved a great method in medical fields, it has several limitations that need to be overcome.
{"title":"Latent Dirichlet Allocation for Medical Records Topic Modeling: Systematic Literature Review","authors":"M. Mustakim, Retantyo Wardoyo, K. Mustofa, G. Rahayu, Ida Rosyidah","doi":"10.1109/ICIC54025.2021.9632993","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632993","url":null,"abstract":"The fast growth of Electronic Medical Records (EMR) has improved its functionalities and increase its use in secondary functions. EMRs can be used to improve the quality and capacity of physicians and medical students. It is done by using EMRs as a data source for researches and learning. A lot of studies have been done in this area. Various methods are also proposed. One of the methods used in medical records retrieval is Latent Dirichlet Allocation (LDA). Thus, research on LDA for medical records has also been carried out quite a lot. Unfortunately, those researches are still scattered and make it difficult to know the state of the arts of utilizing LDA in the medical records field. Our research intends to explore the studies of the LDA method progress in the medical field. To better present responsible literature study, our research used Systematic Literature Review as a research methodology. The literature review was conducted on studies from 2015 to 2021. The result of the literature review showed that the LDA method had been used in several research topics. And most of the literature used private datasets in their experiments. Some researchers also added a modification in the LDA method. Even though the LDA method proved a great method in medical fields, it has several limitations that need to be overcome.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"299 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116412688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9633011
Apriandy Angdresey, Ivana Valentine Masala, V. D. Kumenap, Michael George Sumampouw, Kristian Alex Dame, Ivan Daniel Reynaldo Riady
A deaf person is someone who has limitations or abnormalities in the organ of hearing that result in the inability to hear with varying degrees of hearing. The impact faced by the deaf people is the inhibition of verbal communication both expressively or speaking, unable to control the power of the voice when speaking, and receptively or understanding the conversation conveyed by the interlocutor. This creates barriers and difficulties for deaf people in communicating. In this paper, we propose an Internet of Things-based communication assistant application for the deaf, by utilizing a microcontroller, pulse sensor, and interfacing electret microphone amplifier. Our web-based application can provide information about the strength of the sound produced and the text of the conversation of the interlocutor. We demonstrated by experiment that our sensor devices and the wireless communication assistant application working properly.
{"title":"A Communication Assistant Application for the Deaf","authors":"Apriandy Angdresey, Ivana Valentine Masala, V. D. Kumenap, Michael George Sumampouw, Kristian Alex Dame, Ivan Daniel Reynaldo Riady","doi":"10.1109/ICIC54025.2021.9633011","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9633011","url":null,"abstract":"A deaf person is someone who has limitations or abnormalities in the organ of hearing that result in the inability to hear with varying degrees of hearing. The impact faced by the deaf people is the inhibition of verbal communication both expressively or speaking, unable to control the power of the voice when speaking, and receptively or understanding the conversation conveyed by the interlocutor. This creates barriers and difficulties for deaf people in communicating. In this paper, we propose an Internet of Things-based communication assistant application for the deaf, by utilizing a microcontroller, pulse sensor, and interfacing electret microphone amplifier. Our web-based application can provide information about the strength of the sound produced and the text of the conversation of the interlocutor. We demonstrated by experiment that our sensor devices and the wireless communication assistant application working properly.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125955616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9632909
Albertus Dwiyoga Widiantoro, A. Wibowo, Bernardinus Harnadi
User reviews are important in the new approach to fintech services. To learn this information, a simple sentiment analysis can make the right observations to support the OVO fintech system in analyzing the success of the fintech system. The analysis has several stages, starting from how to extract comment data from the play store, extracting meaningful information from the play store platform, and extracting the data into valuable information. Moreover, accurate topic modeling and document representation is another challenging task in sentiment analysis. We propose a lexicon-based topic modeling in observing user sentiment simply by looking at the number of words that appear. The proposed system retrieves OVO fintech comment data from the Play Store, removes irrelevant content to extract meaningful information, and generates topics and features from the extracted data using NLTK. Data processing using google collab in Python language where data is used freely. Data analysis using the word cloud method, Exploratory Data Analysis (EDA), correlation analysis between words, ordering the number of words in sentences revealed that OVO comments in that period tended to be negative
{"title":"User Sentiment Analysis in the Fintech OVO Review Based on the Lexicon Method","authors":"Albertus Dwiyoga Widiantoro, A. Wibowo, Bernardinus Harnadi","doi":"10.1109/ICIC54025.2021.9632909","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632909","url":null,"abstract":"User reviews are important in the new approach to fintech services. To learn this information, a simple sentiment analysis can make the right observations to support the OVO fintech system in analyzing the success of the fintech system. The analysis has several stages, starting from how to extract comment data from the play store, extracting meaningful information from the play store platform, and extracting the data into valuable information. Moreover, accurate topic modeling and document representation is another challenging task in sentiment analysis. We propose a lexicon-based topic modeling in observing user sentiment simply by looking at the number of words that appear. The proposed system retrieves OVO fintech comment data from the Play Store, removes irrelevant content to extract meaningful information, and generates topics and features from the extracted data using NLTK. Data processing using google collab in Python language where data is used freely. Data analysis using the word cloud method, Exploratory Data Analysis (EDA), correlation analysis between words, ordering the number of words in sentences revealed that OVO comments in that period tended to be negative","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research uses Blockchain-based techniques to overcome the problem of easy diploma counterfeiting in Indonesia. Required authentication by the company using staff can save time. Because the Blockchain technique, which has six characteristics, can solve at least four problems, including reducing the number due to peer-to-peer decentralization, and reducing the time spent validating authenticity. To protect the protection system that uses this Blockchain, it is necessary to do library research as one of the previous applications of the methods used in previous researchers and continue the goals of previous researchers. In the future, further research on Blockchain techniques is needed in case of forgery of other documents so that this technology can be adopted and developed further. Based on the literature study conducted in this research, it is concluded that Blockchain technology has a positive impact as a transformation towards new energy and economic acceleration based on green technology, so that digitalization and harmonization of the academic atmosphere can be created, especially through the validity of certificates. The results of this study provides a detailed Experimental Assessment and examines the proposed model for verifying completion certificates using Blockchain Technology.
{"title":"Legality On Digital Document Using Blockchain Technology: An Exhaustive Study","authors":"A. pambudi, Suryari Purnama, Tsara Ayuninggati, Nuke Puji Lestari Santoso, Anggun Oktariyani","doi":"10.1109/ICIC54025.2021.9632860","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9632860","url":null,"abstract":"This research uses Blockchain-based techniques to overcome the problem of easy diploma counterfeiting in Indonesia. Required authentication by the company using staff can save time. Because the Blockchain technique, which has six characteristics, can solve at least four problems, including reducing the number due to peer-to-peer decentralization, and reducing the time spent validating authenticity. To protect the protection system that uses this Blockchain, it is necessary to do library research as one of the previous applications of the methods used in previous researchers and continue the goals of previous researchers. In the future, further research on Blockchain techniques is needed in case of forgery of other documents so that this technology can be adopted and developed further. Based on the literature study conducted in this research, it is concluded that Blockchain technology has a positive impact as a transformation towards new energy and economic acceleration based on green technology, so that digitalization and harmonization of the academic atmosphere can be created, especially through the validity of certificates. The results of this study provides a detailed Experimental Assessment and examines the proposed model for verifying completion certificates using Blockchain Technology.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133822131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-03DOI: 10.1109/ICIC54025.2021.9633001
I. Afrianto, Christover Ramanda Moa, S. Atin, Iding Rosyidin, Suryani
Freelancing marketplace is a site or platform that connects two parties in processing service transactions at an hourly rate or per project. A conventional freelancing marketplace is a place for freelancers to find work and transact digitally. This study aims to propose a prototype of a freelancing marketplace system that is distributed and decentralized, secure, and transparent using smart contract-based blockchain technology. The method used in this study is a prototype which is a fast method of developing a software system. The developed prototype is a system that is based on the Ethereum public blockchain network, utilizes a smart contract mechanism in its transaction activities, and use IPFS in the storage and sharing of documents on it. According to the findings of the research, transaction data input in the freelancing marketplace system prototype environment can be executed by smart contracts and saved on the blockchain network, indicating that the transaction data will be stored more securely, tamper proof, and transparent.
{"title":"Prototype Blockchain Based Smart Contract For Freelance Marketplace System","authors":"I. Afrianto, Christover Ramanda Moa, S. Atin, Iding Rosyidin, Suryani","doi":"10.1109/ICIC54025.2021.9633001","DOIUrl":"https://doi.org/10.1109/ICIC54025.2021.9633001","url":null,"abstract":"Freelancing marketplace is a site or platform that connects two parties in processing service transactions at an hourly rate or per project. A conventional freelancing marketplace is a place for freelancers to find work and transact digitally. This study aims to propose a prototype of a freelancing marketplace system that is distributed and decentralized, secure, and transparent using smart contract-based blockchain technology. The method used in this study is a prototype which is a fast method of developing a software system. The developed prototype is a system that is based on the Ethereum public blockchain network, utilizes a smart contract mechanism in its transaction activities, and use IPFS in the storage and sharing of documents on it. According to the findings of the research, transaction data input in the freelancing marketplace system prototype environment can be executed by smart contracts and saved on the blockchain network, indicating that the transaction data will be stored more securely, tamper proof, and transparent.","PeriodicalId":189541,"journal":{"name":"2021 Sixth International Conference on Informatics and Computing (ICIC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132672442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}