Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618148
Alifiannisa Lawami Diar, P. Sandhyaduhita, N. Budi
As an effort to shorten supply chain and improve the efficiency, effectiveness, and transparency of the procurement process, Indonesian government created a public procurement plan information system (SIRUP) as a part of e-Procurement used by government institutions in Indonesia. This research was conducted to analyze the determinant factors of SIRUP implementation in Indonesia and its impact to procurement personnel performance by using modified research model from DeLone & McLean theory, Task Technology Fit (TTF) and Technology Acceptance Model (TAM). The research model was tested using Partial Least Square Structural Equation Modeling (PLS-SEM) approach with SmartPLS 3.0 software. The result of this research with 239 respondents shows that system quality, information quality, service quality, usage, user satisfaction, subjective norm, task characteristic and task technology fit become factors influencing SIRUP implementation toward procurement personnel performance. However, only task technology fit and user satisfaction dominantly affect the performance of procurement personnel. In the end, this research could be a feedback to Policy Institute for Procurement of Goods/Services (LKPP) as a main stakeholder of SIRUP in order to improve their system and service quality.
{"title":"The Determinant Factors of Individual Performance from Task Technology Fit and IS Success Model perspectives: a case of Public Procurement Plan Information System (SIRUP)","authors":"Alifiannisa Lawami Diar, P. Sandhyaduhita, N. Budi","doi":"10.1109/ICACSIS.2018.8618148","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618148","url":null,"abstract":"As an effort to shorten supply chain and improve the efficiency, effectiveness, and transparency of the procurement process, Indonesian government created a public procurement plan information system (SIRUP) as a part of e-Procurement used by government institutions in Indonesia. This research was conducted to analyze the determinant factors of SIRUP implementation in Indonesia and its impact to procurement personnel performance by using modified research model from DeLone & McLean theory, Task Technology Fit (TTF) and Technology Acceptance Model (TAM). The research model was tested using Partial Least Square Structural Equation Modeling (PLS-SEM) approach with SmartPLS 3.0 software. The result of this research with 239 respondents shows that system quality, information quality, service quality, usage, user satisfaction, subjective norm, task characteristic and task technology fit become factors influencing SIRUP implementation toward procurement personnel performance. However, only task technology fit and user satisfaction dominantly affect the performance of procurement personnel. In the end, this research could be a feedback to Policy Institute for Procurement of Goods/Services (LKPP) as a main stakeholder of SIRUP in order to improve their system and service quality.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128279254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618208
I. L. Laily, O. Komarudin, S. Fadhilah, A. Azurat
The effectiveness and efficiency of a charity organization can be achieved by applying information systems. In Indonesia, there are many small, informal, and even unregistered charity organization to serve many unfortunate people who are not covered by the government or well-established charity organization. Those small charity organization does not have enough capacity for human resource to develop and use the information system to provide good administration and good financial report. Development of information systems for charity organizations can be done uniformly to save development costs, but each organization can have different characters and needs. A high effort is needed to adapt and adjust an information system that has been used in other organizations. The development of a charity organization information system using the concept of software product line (SPL) can be done to form a charity organization information system that has a collection of features that can be selected according to the needs of each charity organization. The system that has been developed needs to be supported by learning strategies for users so that they can be used optimally. This research aims to create learning design through a progressive learning approach for the information systems. The feature collection on the developed information system was mapped onto an organizational development model, known as Impact Maturity Model (IMM) so that the features needed at each level of IMM were obtained. Intermediary learning is done through a case study of an information system in the form of a web application called Adaptive Information System for Charity organization (AISCO).
{"title":"Progressive Learning Design Strategy to Improve Impact Maturity of Charity organizations","authors":"I. L. Laily, O. Komarudin, S. Fadhilah, A. Azurat","doi":"10.1109/ICACSIS.2018.8618208","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618208","url":null,"abstract":"The effectiveness and efficiency of a charity organization can be achieved by applying information systems. In Indonesia, there are many small, informal, and even unregistered charity organization to serve many unfortunate people who are not covered by the government or well-established charity organization. Those small charity organization does not have enough capacity for human resource to develop and use the information system to provide good administration and good financial report. Development of information systems for charity organizations can be done uniformly to save development costs, but each organization can have different characters and needs. A high effort is needed to adapt and adjust an information system that has been used in other organizations. The development of a charity organization information system using the concept of software product line (SPL) can be done to form a charity organization information system that has a collection of features that can be selected according to the needs of each charity organization. The system that has been developed needs to be supported by learning strategies for users so that they can be used optimally. This research aims to create learning design through a progressive learning approach for the information systems. The feature collection on the developed information system was mapped onto an organizational development model, known as Impact Maturity Model (IMM) so that the features needed at each level of IMM were obtained. Intermediary learning is done through a case study of an information system in the form of a web application called Adaptive Information System for Charity organization (AISCO).","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128173560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618173
Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati
We conduct formal verification of the divide and conquer key distribution scheme (DC DHKE)–a contributory group key agreement that uses a quasilinear amount of exponentiations with respect to the number of communicating parties. The verification is conducted using both ProVerif and TLA+ as tools. ProVerif is used to verify the protocol correctness as well as its security against passive attacker; while TLA+ is utilized to verify whether all participants in the protocol retrieve the mutual key simultaneously. We also verify the ING and GDH.3 protocol for comparative purposes. The verification results show that the ING, GDH.3, and DC DHKE protocols satisfy the pre-meditated correctness, security, and liveness properties. However, the GDH.3 protocol does not satisfy the liveness property stating that all participants obtain the mutual key at the same time.
{"title":"Formal Verification of Divide and Conquer Key Distribution Protocol Using ProVerif and TLA+","authors":"Ridhwan Dewoprabowo, Muhammad Arzaki, Yanti Rusmawati","doi":"10.1109/ICACSIS.2018.8618173","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618173","url":null,"abstract":"We conduct formal verification of the divide and conquer key distribution scheme (DC DHKE)–a contributory group key agreement that uses a quasilinear amount of exponentiations with respect to the number of communicating parties. The verification is conducted using both ProVerif and TLA+ as tools. ProVerif is used to verify the protocol correctness as well as its security against passive attacker; while TLA+ is utilized to verify whether all participants in the protocol retrieve the mutual key simultaneously. We also verify the ING and GDH.3 protocol for comparative purposes. The verification results show that the ING, GDH.3, and DC DHKE protocols satisfy the pre-meditated correctness, security, and liveness properties. However, the GDH.3 protocol does not satisfy the liveness property stating that all participants obtain the mutual key at the same time.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131932973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618266
M. Alhamidi, D. M. S. Arsa, M. F. Rachmadi, W. Jatmiko
Big data can be seen from the number of its samples and features. The selection of the most representative feature is an important task in Uig data analysis to reduce the dimension. The feature selection method is used to handle this problem. In this research, a homogeneous distributed ensemble feature selection method with 2-dimensional partition is used as new approach of feature selection. The results showed that the proposed method can improve the accuracy from the other feature selection method with an increase of 2% for several datasets. In addition, it also speeds up the computation to almost two times faster.
{"title":"2-Dimensional Homogeneous Distributed Ensemble Feature Selection","authors":"M. Alhamidi, D. M. S. Arsa, M. F. Rachmadi, W. Jatmiko","doi":"10.1109/ICACSIS.2018.8618266","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618266","url":null,"abstract":"Big data can be seen from the number of its samples and features. The selection of the most representative feature is an important task in Uig data analysis to reduce the dimension. The feature selection method is used to handle this problem. In this research, a homogeneous distributed ensemble feature selection method with 2-dimensional partition is used as new approach of feature selection. The results showed that the proposed method can improve the accuracy from the other feature selection method with an increase of 2% for several datasets. In addition, it also speeds up the computation to almost two times faster.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618210
Aditio Pangestu, D. H. Widyantoro
Penal law online news articles develop a story about penal procedure activities over a longer period of time. The length and depth of the story can be such that it is difficult to track for readers. We present Law Vis, a visualization technique for exploring and communicating story developed by penal law online news articles. Law Vis shows a sequence of events in a story and first time that an event is reported. The sequence of event is showed together with complementary information or event entities such as time, location and actor. Law Vis further provides specific information for a specific event. Law Vis is used for tracking a story from a popular case. Law Vis can help track a story easily, but it still has trouble in search and filter events.
{"title":"The Story Development of Penal Law Online News Articles Visualization","authors":"Aditio Pangestu, D. H. Widyantoro","doi":"10.1109/ICACSIS.2018.8618210","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618210","url":null,"abstract":"Penal law online news articles develop a story about penal procedure activities over a longer period of time. The length and depth of the story can be such that it is difficult to track for readers. We present Law Vis, a visualization technique for exploring and communicating story developed by penal law online news articles. Law Vis shows a sequence of events in a story and first time that an event is reported. The sequence of event is showed together with complementary information or event entities such as time, location and actor. Law Vis further provides specific information for a specific event. Law Vis is used for tracking a story from a popular case. Law Vis can help track a story easily, but it still has trouble in search and filter events.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1063 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122252566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618191
Baskoro Pramudito Nugroho, M. R. Shihab, I. Budi
Nowadays, eTourism has a very promising development in Indonesia. This triggers the growth of various sites that provide a marketplace to buy and sell open-trip. Hence, this study aims to identify factors that influence tourists' intention in ordering open-trip package through open-trip marketplace sites using the approach of Task-Technology Fit theory. This study uses quantitative methods and uses questionnaires for data collection. The questionnaires obtained 57 respondents who booked through an open-trip marketplace sites. The collected data is then analyzed using Partial Least Square Structural Equational Modeling (PLS-SEM). This study found that Task-Technology Fit significantly affects tourists' intention to buy open-trip from open-trip marketplace sites. Then, this study showed that technology characteristics affects Task-Technology Fit, and website quality is a factor that influences technology characteristics. Moreover, this study also found that task significance is a factor that significantly affects task characteristics.
{"title":"Task-Technology Fit Approach to Evaluate Tourists' Purchase Intention in Open-Trip Marketplace Sites","authors":"Baskoro Pramudito Nugroho, M. R. Shihab, I. Budi","doi":"10.1109/ICACSIS.2018.8618191","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618191","url":null,"abstract":"Nowadays, eTourism has a very promising development in Indonesia. This triggers the growth of various sites that provide a marketplace to buy and sell open-trip. Hence, this study aims to identify factors that influence tourists' intention in ordering open-trip package through open-trip marketplace sites using the approach of Task-Technology Fit theory. This study uses quantitative methods and uses questionnaires for data collection. The questionnaires obtained 57 respondents who booked through an open-trip marketplace sites. The collected data is then analyzed using Partial Least Square Structural Equational Modeling (PLS-SEM). This study found that Task-Technology Fit significantly affects tourists' intention to buy open-trip from open-trip marketplace sites. Then, this study showed that technology characteristics affects Task-Technology Fit, and website quality is a factor that influences technology characteristics. Moreover, this study also found that task significance is a factor that significantly affects task characteristics.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115768128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618187
Firdaus Solihin, I. Budi
Recording of law enforcement needs to measure the extent to what the enforcement law has been carried out in accordance with applicable legal rules. This law enforcement record can be obtained by collecting, analyzing and concluding various legal cases from court decision documents. The number of court decision documents is vast and continues to grow at any time; it requires an extraction process of information that can be run automatically. The conditions of court decision documents that have different use of sentences and the use of word variations are challenges in the process of information extraction. This research proposed rule-based information extraction for court decision documents to exploring and developing the recording of law enforcement in Indonesia. The process uses three steps, identifying structure extraction, tokenization and extracting entities. This research use 150 court decision documents dataset and the experiment has produced 0.82, 0.96, 0.89, beside of average recall, precision, and f-score. This shows that rule-based information extraction can be implemented in the legal domain and supports the development of law enforcement records in Indonesia.
{"title":"Recording of Law Enforcement Based on Court Decision Document Using Rule-based Information Extraction","authors":"Firdaus Solihin, I. Budi","doi":"10.1109/ICACSIS.2018.8618187","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618187","url":null,"abstract":"Recording of law enforcement needs to measure the extent to what the enforcement law has been carried out in accordance with applicable legal rules. This law enforcement record can be obtained by collecting, analyzing and concluding various legal cases from court decision documents. The number of court decision documents is vast and continues to grow at any time; it requires an extraction process of information that can be run automatically. The conditions of court decision documents that have different use of sentences and the use of word variations are challenges in the process of information extraction. This research proposed rule-based information extraction for court decision documents to exploring and developing the recording of law enforcement in Indonesia. The process uses three steps, identifying structure extraction, tokenization and extracting entities. This research use 150 court decision documents dataset and the experiment has produced 0.82, 0.96, 0.89, beside of average recall, precision, and f-score. This shows that rule-based information extraction can be implemented in the legal domain and supports the development of law enforcement records in Indonesia.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130128238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618133
Argianto Rahartomo, Ame Bochem, O. Alfandi
For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of RAM, program memory, and flash memory with their necessary tools, and steps. Finally, information about the compromise can be gathered from the node’s RAM, program, and flash memory especially if for example a vulnerability in the software running on the node was exploited, the (commonly small) RAM, program, and flash memory can be examined for anomalies.
{"title":"Digital Investigation of Wireless Sensor Networks - IRIS Mote","authors":"Argianto Rahartomo, Ame Bochem, O. Alfandi","doi":"10.1109/ICACSIS.2018.8618133","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618133","url":null,"abstract":"For forensically analyzing incidents, it is important to gather as much data about the incident as possible. In the case of WSNs, this means that data has to be extracted from the sensor nodes, when a compromise or other security incident occurs. Among the data to be extracted are the program running on the node, so it can be analyzed for tampering, as well as the log and configuration flash memory usually stored on a separate chip on the sensor node. In this paper we will present how to perform an extraction of RAM, program memory, and flash memory with their necessary tools, and steps. Finally, information about the compromise can be gathered from the node’s RAM, program, and flash memory especially if for example a vulnerability in the software running on the node was exploited, the (commonly small) RAM, program, and flash memory can be examined for anomalies.","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132218349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/ICACSIS.2018.8618255
Dimas Agung Saputra, Dika Handika, Y. Ruldeviyani
PT Telekomunikasi Indonesia (Telkom) has transformed the organization from a conventional telecommunication company to a digital telecommunication in 2016. The strategy in realizing this transformation is to become a hub or enabler in a digital ecosystem and this implementation requires governance to utilize data and information in around the Telkom Group. The purpose of this study is to analyze the Maturity Level of Data Governance implementation in the transformation of digital telecommunication organization, then from the result will develop policies recommendation for the future. The study use Data Governance Maturity Model (DGMM) from Stanford University. The results show that the implementation of Data Governance in Telkom has a Maturity Level with an average value of 3.5 for Foundation-Component, 4.13 for Project-Component, or the average value is 3,815. The highest maturity level of this assestment is on formalization-component, which is about determine the Data Governance structure. The study produce 17 points of recommendations for improving Telkom Group Data Governance Maturity Level
2016年,PT Telekomunikasi Indonesia (Telkom)将该组织从传统电信公司转变为数字电信公司。实现这一转变的战略是成为数字生态系统中的中心或推动者,而这一实现需要治理来利用电信集团周围的数据和信息。本研究的目的是分析数字电信组织转型中数据治理实施的成熟度水平,并根据研究结果提出未来的政策建议。本研究使用了斯坦福大学的数据治理成熟度模型(DGMM)。结果表明,电信企业实施数据治理的成熟度水平,基础组件的平均值为3.5,项目组件的平均值为4.13,平均为3815。该评估的最高成熟度级别是关于形式化组件的,它是关于确定数据治理结构的。该研究为提高电信集团数据治理成熟度水平提出了17点建议
{"title":"Data Governance Maturity Model (DGM2) Assessment in Organization Transformation of Digital Telecommunication Company: Case Study of PT Telekomunikasi Indonesia","authors":"Dimas Agung Saputra, Dika Handika, Y. Ruldeviyani","doi":"10.1109/ICACSIS.2018.8618255","DOIUrl":"https://doi.org/10.1109/ICACSIS.2018.8618255","url":null,"abstract":"PT Telekomunikasi Indonesia (Telkom) has transformed the organization from a conventional telecommunication company to a digital telecommunication in 2016. The strategy in realizing this transformation is to become a hub or enabler in a digital ecosystem and this implementation requires governance to utilize data and information in around the Telkom Group. The purpose of this study is to analyze the Maturity Level of Data Governance implementation in the transformation of digital telecommunication organization, then from the result will develop policies recommendation for the future. The study use Data Governance Maturity Model (DGMM) from Stanford University. The results show that the implementation of Data Governance in Telkom has a Maturity Level with an average value of 3.5 for Foundation-Component, 4.13 for Project-Component, or the average value is 3,815. The highest maturity level of this assestment is on formalization-component, which is about determine the Data Governance structure. The study produce 17 points of recommendations for improving Telkom Group Data Governance Maturity Level","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133513419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.1109/icacsis.2018.8618212
{"title":"ICACSIS 2018 Welcome Message from the General Chairs","authors":"","doi":"10.1109/icacsis.2018.8618212","DOIUrl":"https://doi.org/10.1109/icacsis.2018.8618212","url":null,"abstract":"","PeriodicalId":207227,"journal":{"name":"2018 International Conference on Advanced Computer Science and Information Systems (ICACSIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131378033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}