首页 > 最新文献

2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)最新文献

英文 中文
Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic 新冠肺炎疫情下数字支付解决方案的人脸识别登录认证
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274654
Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah
On March 11, 2020 the World Health Organization has announced the status of a global pandemic of corona virus disease 2019 or also called corona virus disease 2019 (COVID-19). The World Health Organization defines this disease as a pandemic because all citizens of the world are potentially exposed to COVID-19 infection. With the establishment of the global pandemic status, WHO also confirmed that COVID-19 was an international emergency. The trend of digitalization is becoming a new business trend to develop and survive in the midst of a crisis due to this pandemic. The online buying and selling market, digital payments and electronic health services, from online training classes to consulting with doctors via the internet, continue to increase. Some companies in the offline market also continue to operate by implementing health protocols. The form of digital payments continues increasing, this is because according to WHO the surface of objects can be a medium in the spread of the covid-19 virus. However, some digital payment media still require a card and enter a Personal Identification Number (PIN) in the Electronic Data Capture machine. For a solution so that the buyer does not need to bring a card and touch the Electronic Data Capture machine, face recognition authentication can be developed instead of PIN.
2020年3月11日,世界卫生组织宣布了2019年冠状病毒病全球大流行的状况,也称为2019年冠状病毒病(COVID-19)。世界卫生组织将这种疾病定义为大流行,因为世界上所有公民都有可能感染COVID-19。随着全球大流行地位的确立,世卫组织也确认新冠肺炎为国际紧急事件。数字化趋势正在成为在疫情危机中发展和生存的新商业趋势。在线买卖市场、数字支付和电子医疗服务(从在线培训课程到通过互联网向医生咨询)继续增加。线下市场的一些公司也继续通过执行卫生协议来运营。数字支付的形式不断增加,这是因为根据世卫组织的说法,物体的表面可能成为covid-19病毒传播的媒介。然而,一些数字支付媒体仍然需要一张卡,并在电子数据采集机上输入个人识别号码(PIN)。为了解决买方不需要带卡和触摸电子数据采集机的问题,可以开发人脸识别认证来代替PIN。
{"title":"Face Recognition Login Authentication for Digital Payment Solution at COVID-19 Pandemic","authors":"Muhammad Irwan Padli Nasution, N. Nurbaiti, N. Nurlaila, Tri Inda Fadhila Rahma, Kamilah Kamilah","doi":"10.1109/IC2IE50715.2020.9274654","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274654","url":null,"abstract":"On March 11, 2020 the World Health Organization has announced the status of a global pandemic of corona virus disease 2019 or also called corona virus disease 2019 (COVID-19). The World Health Organization defines this disease as a pandemic because all citizens of the world are potentially exposed to COVID-19 infection. With the establishment of the global pandemic status, WHO also confirmed that COVID-19 was an international emergency. The trend of digitalization is becoming a new business trend to develop and survive in the midst of a crisis due to this pandemic. The online buying and selling market, digital payments and electronic health services, from online training classes to consulting with doctors via the internet, continue to increase. Some companies in the offline market also continue to operate by implementing health protocols. The form of digital payments continues increasing, this is because according to WHO the surface of objects can be a medium in the spread of the covid-19 virus. However, some digital payment media still require a card and enter a Personal Identification Number (PIN) in the Electronic Data Capture machine. For a solution so that the buyer does not need to bring a card and touch the Electronic Data Capture machine, face recognition authentication can be developed instead of PIN.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"199 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116689257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
IT Infrastructure Security Risk Assessment using the Center for Internet Security Critical Security Control Framework: A Case Study at Insurance Company 使用互联网安全中心关键安全控制框架的IT基础设施安全风险评估:一个保险公司的案例研究
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274594
H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti
PT. XYZ is an insurance company that currently provides a variety of services using electronic systems in 80 service offices throughout Indonesia. At the end of 2019, the company experienced an IT security incident. The core application was hit by a malware attack that caused slow system performance and disruption of insurance operational services. These events have a negative impact on the company both operationally and to customers, so that it becomes a serious concern of management. Therefore, this research aims to see how companies develop infrastructure to ensure the reliability and improvement of IT security. The research methodology used is a qualitative approach by collecting data through documentation and interview studies. Based on the results of the assessment, there were 16 out of 20 controls that exceeded the threshold value. These results illustrate that the security of the IT infrastructure of PT. XYZ is very weak. Therefore, the company must carry out 13 recommendations for improvement that will be carried out in stages. This research is expected to be a lesson for other organizations especially insurance companies to improve the reliability and security of IT infrastructure.
PT. XYZ是一家保险公司,目前在印度尼西亚的80个服务办事处使用电子系统提供各种服务。2019年底,该公司经历了一次IT安全事件。核心应用程序受到恶意软件攻击,导致系统性能下降,保险业务服务中断。这些事件对公司的运营和客户都有负面影响,因此成为管理层严重关注的问题。因此,本研究旨在了解公司如何开发基础设施以确保IT安全的可靠性和改进。使用的研究方法是通过文献和访谈研究收集数据的定性方法。根据评估结果,20个控制组中有16个超过了阈值。这些结果表明,PT. XYZ的IT基础设施的安全性非常薄弱。因此,公司必须实施13项改进建议,并分阶段实施。这项研究有望为其他组织,特别是保险公司,提高IT基础设施的可靠性和安全性提供借鉴。
{"title":"IT Infrastructure Security Risk Assessment using the Center for Internet Security Critical Security Control Framework: A Case Study at Insurance Company","authors":"H. Winarno, Fatah Yasin, Muhamad Aries Prasetyo, Fathur Rohman, M. R. Shihab, B. Ranti","doi":"10.1109/IC2IE50715.2020.9274594","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274594","url":null,"abstract":"PT. XYZ is an insurance company that currently provides a variety of services using electronic systems in 80 service offices throughout Indonesia. At the end of 2019, the company experienced an IT security incident. The core application was hit by a malware attack that caused slow system performance and disruption of insurance operational services. These events have a negative impact on the company both operationally and to customers, so that it becomes a serious concern of management. Therefore, this research aims to see how companies develop infrastructure to ensure the reliability and improvement of IT security. The research methodology used is a qualitative approach by collecting data through documentation and interview studies. Based on the results of the assessment, there were 16 out of 20 controls that exceeded the threshold value. These results illustrate that the security of the IT infrastructure of PT. XYZ is very weak. Therefore, the company must carry out 13 recommendations for improvement that will be carried out in stages. This research is expected to be a lesson for other organizations especially insurance companies to improve the reliability and security of IT infrastructure.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127072565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Attention-based Approach to Detect Emotion from Tweets 一种基于注意力的推文情感检测方法
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274600
Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi
In today’s world, social networks are the place where user share their views, emotions in their way. Social media, such as Twitter, Instagram, Facebook, etc. where millions of people express their views in their daily day-to-day life, which can be their sentiments and opinions or expressing emotions about a particular thing or their own. This gave researchers an outstanding opportunity to analyze the emotions of users’ activities on social networks. These massive digital data contain people’s day to day life sentiments, opinions, and showing emotions. Over the years there have been different research on emotion analysis of the social platform. As people tend to have different thoughts, analyzing the right emotion from social data is becoming a challenge. This clearly states that there is a need for an attempt to work towards these problems and it has opened up several opportunities for future research for hidden emotion identification, users’ emotions about a particular topic, etc. Detecting emotion from text is one of the toughest challenges in natural language processing. Developing a system that can detect emotion from social media is a crying need as people are sharing more of their thoughts here. In this research work, to learn the representation of the tweets, we propose an attention-based model. The proposed model has been divided into different components and subcomponents consisting of ID Convolution, Bidirectional LSTM, and Attention mechanism. We create a new dataset from SemEval Affect in Tweets dataset and then conduct experiments for the best outcomes. Our model achieves up to 79% accuracy in this task.
在当今世界,社交网络是用户以自己的方式分享观点和情感的地方。社交媒体,如Twitter, Instagram, Facebook等,数百万人在日常生活中表达自己的观点,可以是他们的情绪和观点,也可以是对特定事物或自己的情感表达。这给研究人员提供了一个绝佳的机会来分析用户在社交网络上活动的情绪。这些海量的数字数据包含了人们的日常生活情绪、观点和情感表现。多年来,对社交平台的情感分析有不同的研究。由于人们的想法往往不同,从社交数据中分析正确的情绪成为一项挑战。这清楚地表明,有必要尝试解决这些问题,并为未来的隐藏情感识别、用户对特定主题的情感等研究开辟了几个机会。从文本中检测情感是自然语言处理中最棘手的挑战之一。随着人们越来越多地在社交媒体上分享自己的想法,开发一种可以从社交媒体上检测情绪的系统是迫切需要的。在本研究中,为了学习推文的表征,我们提出了一个基于注意力的模型。该模型分为ID卷积、双向LSTM和注意机制组成的不同组件和子组件。我们从SemEval影响Tweets数据集中创建一个新的数据集,然后进行实验以获得最佳结果。我们的模型在这项任务中达到了79%的准确率。
{"title":"An Attention-based Approach to Detect Emotion from Tweets","authors":"Sifat Ahmed, Abdus Sayef Reyadh, Fatima Tabsun Sithil, F. Shah, Asif Imtiaz Shaafi","doi":"10.1109/IC2IE50715.2020.9274600","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274600","url":null,"abstract":"In today’s world, social networks are the place where user share their views, emotions in their way. Social media, such as Twitter, Instagram, Facebook, etc. where millions of people express their views in their daily day-to-day life, which can be their sentiments and opinions or expressing emotions about a particular thing or their own. This gave researchers an outstanding opportunity to analyze the emotions of users’ activities on social networks. These massive digital data contain people’s day to day life sentiments, opinions, and showing emotions. Over the years there have been different research on emotion analysis of the social platform. As people tend to have different thoughts, analyzing the right emotion from social data is becoming a challenge. This clearly states that there is a need for an attempt to work towards these problems and it has opened up several opportunities for future research for hidden emotion identification, users’ emotions about a particular topic, etc. Detecting emotion from text is one of the toughest challenges in natural language processing. Developing a system that can detect emotion from social media is a crying need as people are sharing more of their thoughts here. In this research work, to learn the representation of the tweets, we propose an attention-based model. The proposed model has been divided into different components and subcomponents consisting of ID Convolution, Bidirectional LSTM, and Attention mechanism. We create a new dataset from SemEval Affect in Tweets dataset and then conduct experiments for the best outcomes. Our model achieves up to 79% accuracy in this task.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Job Satisfaction and Worker Performance on Digital Business Company 数字化商务公司工作满意度与员工绩效的调查研究
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274648
Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth
Nowadays, digital marketing strategy has made major improvement in business and industry within more than two decades. In the era of rapid information technology development, business competition is also getting stricter through the transformation of digital business. This is also happening in one of Indonesia’s digital business company known as PT XYZ Indonesia. For its sustainability, knowledge management has been adopted. But, there are some issues in its implementation because of high turnover rate and incorrect implementation process. In addition, there is a complaint rating of approximately 20% of 1049 projects. This paper aims to investigate KM implementation process on job satisfaction and worker performance for XYZ and give recommendation based on the measurement result to KM process implementation. The result of this paper is organizational culture has significant relationship with job satisfaction and knowledge sharing has significant relationship with worker performance. Based on the result, we recommend to create reward, KM policy, allocate budget, and organize special division of KM to optimal the KM implementation.
如今,在二十多年的时间里,数字营销策略在商业和工业领域取得了重大进展。在信息技术快速发展的时代,通过数字化业务的转型,商业竞争也越来越激烈。这也发生在印尼的一家名为PT XYZ Indonesia的数字商业公司。为了其可持续性,采用了知识管理。但由于员工流动率高,实施过程不正确,在实施过程中存在一些问题。此外,在1049个项目中,投诉率约为20%。本文旨在调查XYZ公司实施知识管理过程对工作满意度和员工绩效的影响,并根据测量结果对实施知识管理过程提出建议。研究结果表明,组织文化对工作满意度有显著影响,知识共享对员工绩效有显著影响。在此基础上,提出了建立奖励机制、制定知识管理政策、分配预算、组织知识管理专项分工等措施来优化知识管理的实施。
{"title":"Investigation of Job Satisfaction and Worker Performance on Digital Business Company","authors":"Atika Uyun, Dwinanda Kinanti Suci Sekarhati, Mohamad Yusup Dias Ibrahim, Sofian Lusa, D. I. Sensuse, Nadya Safitri, Damayanti Elisabeth","doi":"10.1109/IC2IE50715.2020.9274648","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274648","url":null,"abstract":"Nowadays, digital marketing strategy has made major improvement in business and industry within more than two decades. In the era of rapid information technology development, business competition is also getting stricter through the transformation of digital business. This is also happening in one of Indonesia’s digital business company known as PT XYZ Indonesia. For its sustainability, knowledge management has been adopted. But, there are some issues in its implementation because of high turnover rate and incorrect implementation process. In addition, there is a complaint rating of approximately 20% of 1049 projects. This paper aims to investigate KM implementation process on job satisfaction and worker performance for XYZ and give recommendation based on the measurement result to KM process implementation. The result of this paper is organizational culture has significant relationship with job satisfaction and knowledge sharing has significant relationship with worker performance. Based on the result, we recommend to create reward, KM policy, allocate budget, and organize special division of KM to optimal the KM implementation.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114264082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors Affecting Student’s Perceived Readiness on Abrupt Distance Learning Adoption: Indonesian Higher-Education Perspectives 影响学生对突然接受远程教育的感知准备的因素:印尼高等教育的视角
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274640
L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono
Widespread lockdowns across the globe during Covid-19 outbreak forced the universities to abruptly adopt full-online distance learning. Such unprecedented abrupt adoption requires a degree of student readiness to ensure the success of distance learning delivery. However, prior research about student readiness of e-Learning adoption is still limited to discussing proactive adoption in normal conditions. To address this issue, this study investigated the factors that affect the student’s perceived readiness for abrupt distance learning adoption. By applying Structural Equation Modelling (SEM) using the Partial Least Square algorithm, this study found that self-competence, comfort with e-Learning, uncertainty avoidance, financial ability, and technological facilitating conditions are factors that significantly affect student’s perceived readiness. Based on this finding, faculties are recommended to be an early adopter of e-Learning, to provide an e-Learning platform with excellent usability and effective instructional design for the students, to provide clear instructions for both students and instructors, and to provide needed resources (e.g. internet connection) to the students. Moreover, future studies could be focused on lecturers’ or faculties’ readiness for abrupt distance learning adoption.
在2019冠状病毒病爆发期间,全球范围内的广泛封锁迫使大学突然采用全在线远程学习。这种前所未有的突然采用要求学生有一定程度的准备,以确保远程教育交付的成功。然而,以往关于学生采用e-Learning准备度的研究仍然局限于讨论正常情况下的主动采用。为了解决这一问题,本研究调查了影响学生对突然采用远程学习的感知准备程度的因素。本研究运用偏最小二乘法的结构方程模型(SEM),发现自我能力、网络学习舒适度、不确定性规避、经济能力和技术便利条件是影响学生感知准备程度的显著因素。基于此,我们建议各学院尽早采用电子学习,为学生提供一个可用性良好、教学设计有效的电子学习平台,为学生和教师提供明确的指导,并为学生提供所需的资源(如互联网连接)。此外,未来的研究可以集中在讲师或院系对突然采用远程学习的准备情况上。
{"title":"Factors Affecting Student’s Perceived Readiness on Abrupt Distance Learning Adoption: Indonesian Higher-Education Perspectives","authors":"L. M. Hasani, Hafizh Rafizal Adnan, D. I. Sensuse, Kautsarina, Ryan Randy Suryono","doi":"10.1109/IC2IE50715.2020.9274640","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274640","url":null,"abstract":"Widespread lockdowns across the globe during Covid-19 outbreak forced the universities to abruptly adopt full-online distance learning. Such unprecedented abrupt adoption requires a degree of student readiness to ensure the success of distance learning delivery. However, prior research about student readiness of e-Learning adoption is still limited to discussing proactive adoption in normal conditions. To address this issue, this study investigated the factors that affect the student’s perceived readiness for abrupt distance learning adoption. By applying Structural Equation Modelling (SEM) using the Partial Least Square algorithm, this study found that self-competence, comfort with e-Learning, uncertainty avoidance, financial ability, and technological facilitating conditions are factors that significantly affect student’s perceived readiness. Based on this finding, faculties are recommended to be an early adopter of e-Learning, to provide an e-Learning platform with excellent usability and effective instructional design for the students, to provide clear instructions for both students and instructors, and to provide needed resources (e.g. internet connection) to the students. Moreover, future studies could be focused on lecturers’ or faculties’ readiness for abrupt distance learning adoption.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130328271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server 以Telegram Bot作为攻击通知的Web服务器上反向代理和Web应用防火墙的性能分析
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274592
Defiana Arnaldy, Tio Setia Hati
Sophisticated technology in the world has been developing very rapidly, especially in terms of accessing all the information that is on the web. Website is one of technological sophistication that presents various kinds of information needed, from children to adults easily accessing websites on the internet. Unwittingly the number of accesses made by users around the world causes a web server or a place that provides a website will be weak and can occur down. When a web server becomes weak, hackers will use it to attack the web server, retrieve data, important information, and even more fatal is when user data is stolen and misused by hackers. The web developers only focus on a website appearance but do not focus on access and security of the website. Therefore, we need an optimal web server that can accommodate the many accesses caused by users and the security of the web server to safeguard data and information stored. This research applies a package namely Reverse Proxy which is used to optimize a web server and Web Application Firewall which is used to maintain the security of a web server.
世界上的尖端技术发展非常迅速,特别是在访问网络上的所有信息方面。网站是一种复杂的技术,它提供了各种各样的信息,从儿童到成人都可以轻松地访问互联网上的网站。不知不觉中,世界各地用户的访问数量会导致网络服务器或提供网站的地方变弱并可能发生故障。当web服务器变得脆弱时,黑客就会利用它来攻击web服务器,检索数据、重要信息,更致命的是用户数据被黑客窃取和滥用。web开发人员只关注网站的外观,而不关注网站的访问和安全性。因此,我们需要一个最优的web服务器,既能容纳用户的大量访问,又能保证web服务器的安全性,以保护存储的数据和信息。本研究应用了一个软件包,即反向代理,用于优化web服务器和web应用防火墙,用于维护web服务器的安全。
{"title":"Performance Analysis of Reverse Proxy and Web Application Firewall with Telegram Bot as Attack Notification On Web Server","authors":"Defiana Arnaldy, Tio Setia Hati","doi":"10.1109/IC2IE50715.2020.9274592","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274592","url":null,"abstract":"Sophisticated technology in the world has been developing very rapidly, especially in terms of accessing all the information that is on the web. Website is one of technological sophistication that presents various kinds of information needed, from children to adults easily accessing websites on the internet. Unwittingly the number of accesses made by users around the world causes a web server or a place that provides a website will be weak and can occur down. When a web server becomes weak, hackers will use it to attack the web server, retrieve data, important information, and even more fatal is when user data is stolen and misused by hackers. The web developers only focus on a website appearance but do not focus on access and security of the website. Therefore, we need an optimal web server that can accommodate the many accesses caused by users and the security of the web server to safeguard data and information stored. This research applies a package namely Reverse Proxy which is used to optimize a web server and Web Application Firewall which is used to maintain the security of a web server.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131944328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Disaster Impact Analysis Uses Land Cover Classification, Case study: Petobo Liquefaction 灾害影响分析使用土地覆盖分类,案例研究:石油液化
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274573
R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara
Analysis of changes in the conditions of an area can be done through satellite image analysis. This study utilizes the classification of satellite imagery to determine the impact of disasters and liquefaction disaster recovery efforts in the Petobo region, Palu, Central Sulawesi. The deep learning approach, namely Convolutional Neural Network (CNN) and CNN combined with ResNet as the Transfer Learning model, were selected as classification methods that would be compared in determining the approach with the best performance. The classification of satellite imagery is mapped into two main classes, namely natural land cover and artificial land cover. This research subsequently succeeded in mapping land cover changes that occurred as a result of liquefaction disasters and recovery efforts that have been carried out with promising performance
分析一个地区的条件变化可以通过卫星图像分析来完成。本研究利用卫星图像分类来确定灾害的影响和液化灾害恢复工作在佩托博地区,帕卢,苏拉威西岛中部。选择深度学习方法,即卷积神经网络(CNN)和CNN结合ResNet作为迁移学习模型,作为分类方法进行比较,以确定性能最佳的方法。卫星图像的分类主要分为两类,即自然土地覆盖和人工土地覆盖。这项研究后来成功地绘制了由于液化灾害和恢复工作而发生的土地覆盖变化的地图,这些工作已经取得了良好的成绩
{"title":"Disaster Impact Analysis Uses Land Cover Classification, Case study: Petobo Liquefaction","authors":"R. Hidayat, A. M. Arymurthy, Dimas Sony Dewantara","doi":"10.1109/IC2IE50715.2020.9274573","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274573","url":null,"abstract":"Analysis of changes in the conditions of an area can be done through satellite image analysis. This study utilizes the classification of satellite imagery to determine the impact of disasters and liquefaction disaster recovery efforts in the Petobo region, Palu, Central Sulawesi. The deep learning approach, namely Convolutional Neural Network (CNN) and CNN combined with ResNet as the Transfer Learning model, were selected as classification methods that would be compared in determining the approach with the best performance. The classification of satellite imagery is mapped into two main classes, namely natural land cover and artificial land cover. This research subsequently succeeded in mapping land cover changes that occurred as a result of liquefaction disasters and recovery efforts that have been carried out with promising performance","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134097565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Scrum Practice Maturity in Software Development of Mobile Communication Application 移动通信应用软件开发中Scrum实践成熟度评价
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274625
Pramitya Lisnawaty Ayunda, E. K. Budiardjo
Focusing on the big topic of information technology related to software engineering, Scrum is one of the frameworks on the agile methodology to develop innovative products and services. Implementing the Scrum framework can be challenging. Changes in teamwork culture, both vertically and horizontally in a software development organization, cannot be avoided. In software development process improvement, evaluation of the scrum implementation using the Scrum Maturity Model. Scrum Maturity Model also assesses the extent of the implementation of the scrum such as the implementation of roles, events, and artifacts following the Scrum Guide. This research occurred to the representative of the product owner, scrum master, and development team. There are seven sub-categories which do not implement the best scrum practices. These practices have an impact on the avoided risk. By understanding the impact of these risks, the team can make plans to avoid those risks. The sub-categories are the product owner, development team, sprint, sprint planning, daily Scrum, product backlog, and sprint backlog.
Scrum专注于与软件工程相关的信息技术的大主题,是开发创新产品和服务的敏捷方法的框架之一。实现Scrum框架是具有挑战性的。在软件开发组织中,团队文化的变化,无论是纵向的还是横向的,都是不可避免的。在软件开发过程改进中,使用scrum成熟度模型对scrum实施进行评估。Scrum成熟度模型还评估Scrum实现的程度,比如Scrum指南中角色、事件和工件的实现。这项研究发生在产品所有者、scrum管理员和开发团队的代表身上。有7个子类别没有实现最佳scrum实践。这些实践对避免的风险有影响。通过了解这些风险的影响,团队可以制定计划来避免这些风险。子类别是产品所有者、开发团队、冲刺、冲刺计划、每日Scrum、产品待办事项安排和冲刺待办事项安排。
{"title":"Evaluation of Scrum Practice Maturity in Software Development of Mobile Communication Application","authors":"Pramitya Lisnawaty Ayunda, E. K. Budiardjo","doi":"10.1109/IC2IE50715.2020.9274625","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274625","url":null,"abstract":"Focusing on the big topic of information technology related to software engineering, Scrum is one of the frameworks on the agile methodology to develop innovative products and services. Implementing the Scrum framework can be challenging. Changes in teamwork culture, both vertically and horizontally in a software development organization, cannot be avoided. In software development process improvement, evaluation of the scrum implementation using the Scrum Maturity Model. Scrum Maturity Model also assesses the extent of the implementation of the scrum such as the implementation of roles, events, and artifacts following the Scrum Guide. This research occurred to the representative of the product owner, scrum master, and development team. There are seven sub-categories which do not implement the best scrum practices. These practices have an impact on the avoided risk. By understanding the impact of these risks, the team can make plans to avoid those risks. The sub-categories are the product owner, development team, sprint, sprint planning, daily Scrum, product backlog, and sprint backlog.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130477845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Template Pattern for Simple Question Transformation 简单问题转换模板模式
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274666
Rakhmayudhi, W. Suwarningsih
The classification of question types in the Indonesian medical domain is the important component of the medical question answering system. The strategy proposed in this paper is to build the template pattern and rule-based parser for extracting some important words using the generated feature to automatically query the classification of question. Classification aims to prove that the system is capable of classifying queries only by using the available language resources. The proposed method has been evaluated using datasets collected from various Indonesian health consultation websites. Test results from the proposed method indicated that the classification process is very effective with an accuracy of 84.33%.
印尼语医学领域问题类型分类是医学问答系统的重要组成部分。本文提出的策略是构建模板模式和基于规则的解析器,利用生成的特征提取重要词,实现问题分类的自动查询。分类旨在证明系统能够仅通过使用可用的语言资源对查询进行分类。使用从印度尼西亚各健康咨询网站收集的数据集对拟议的方法进行了评估。实验结果表明,该方法具有良好的分类效果,准确率达到84.33%。
{"title":"Template Pattern for Simple Question Transformation","authors":"Rakhmayudhi, W. Suwarningsih","doi":"10.1109/IC2IE50715.2020.9274666","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274666","url":null,"abstract":"The classification of question types in the Indonesian medical domain is the important component of the medical question answering system. The strategy proposed in this paper is to build the template pattern and rule-based parser for extracting some important words using the generated feature to automatically query the classification of question. Classification aims to prove that the system is capable of classifying queries only by using the available language resources. The proposed method has been evaluated using datasets collected from various Indonesian health consultation websites. Test results from the proposed method indicated that the classification process is very effective with an accuracy of 84.33%.","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124738871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Product Cognition, Platform Emotion, Behavior Intention, and Actual Behavior Stage in Cross Border E-commerce (Case Study: Shopee as The Biggest Cross Border E-Commerce in Indonesia) 跨境电商中的产品认知、平台情感、行为意向与实际行为阶段(以印尼最大的跨境电商Shopee为例)
Pub Date : 2020-09-15 DOI: 10.1109/IC2IE50715.2020.9274563
Diyang Risma Gabriella, A. Agus
Cross-border e-commerce (CBEC) is growing rapidly, it provides a new shopping experience for customers where they can involve in a global transaction. Each year, CBEC receives a significant total number of transactions, recorded in 2018, CBEC transactions have increased by 27.5% globally. Shopee as the biggest of Indonesia CBEC has dominated the market with a monthly average of 200.2 million visits. Competition between CBEC in Indonesia continues, they are competing to provide the best quality of products and platform experience to gain trust and purchase from the customers. Building a trust and customer intention to purchase in CBEC platform is a challenge, while customers’ awareness of products is the first step in creating optimal product cognition. Perceived trust can be improved by the involvement of customers in the CBEC platform, the provision of convincing product information, as well as the awareness of good product quality, thus it will influence purchase intention of customers. Therefore, this study was conducted to analyze the relationship between product cognition stage, platform emotion stage, behavior intention stage, and actual behavior stage at the biggest CBEC in Indonesia. The research is based on the Hierarchy of Effect (HOE) model which consists of customers stages of journey. The survey began in January to March, 2020 and 1.281 respondents were processed through a structured questionnaire, and data were analyzed using the Structural Equation Method (SEM).
跨境电子商务(CBEC)正在迅速发展,它为客户提供了一种新的购物体验,他们可以参与全球交易。每年,CBEC都会收到大量的交易,2018年,CBEC交易在全球范围内增长了27.5%。Shopee是印尼最大的CBEC,月平均访问量为2.002亿。CBEC在印尼的竞争仍在继续,他们正在竞争提供最优质的产品和平台体验,以获得客户的信任和购买。在CBEC平台上建立信任和客户购买意愿是一个挑战,而客户对产品的认知是创造最佳产品认知的第一步。感知信任可以通过客户参与CBEC平台,提供令人信服的产品信息,以及对良好产品质量的认识来提高,从而影响客户的购买意愿。因此,本研究以印尼最大的CBEC为研究对象,分析产品认知阶段、平台情感阶段、行为意向阶段和实际行为阶段之间的关系。本研究基于效应层次模型(Hierarchy of Effect, HOE),该模型包含了顾客旅程的各个阶段。调查于2020年1月至3月展开,通过结构化问卷对1281名受访者进行了处理,并使用结构方程法(SEM)对数据进行了分析。
{"title":"Product Cognition, Platform Emotion, Behavior Intention, and Actual Behavior Stage in Cross Border E-commerce (Case Study: Shopee as The Biggest Cross Border E-Commerce in Indonesia)","authors":"Diyang Risma Gabriella, A. Agus","doi":"10.1109/IC2IE50715.2020.9274563","DOIUrl":"https://doi.org/10.1109/IC2IE50715.2020.9274563","url":null,"abstract":"Cross-border e-commerce (CBEC) is growing rapidly, it provides a new shopping experience for customers where they can involve in a global transaction. Each year, CBEC receives a significant total number of transactions, recorded in 2018, CBEC transactions have increased by 27.5% globally. Shopee as the biggest of Indonesia CBEC has dominated the market with a monthly average of 200.2 million visits. Competition between CBEC in Indonesia continues, they are competing to provide the best quality of products and platform experience to gain trust and purchase from the customers. Building a trust and customer intention to purchase in CBEC platform is a challenge, while customers’ awareness of products is the first step in creating optimal product cognition. Perceived trust can be improved by the involvement of customers in the CBEC platform, the provision of convincing product information, as well as the awareness of good product quality, thus it will influence purchase intention of customers. Therefore, this study was conducted to analyze the relationship between product cognition stage, platform emotion stage, behavior intention stage, and actual behavior stage at the biggest CBEC in Indonesia. The research is based on the Hierarchy of Effect (HOE) model which consists of customers stages of journey. The survey began in January to March, 2020 and 1.281 respondents were processed through a structured questionnaire, and data were analyzed using the Structural Equation Method (SEM).","PeriodicalId":211983,"journal":{"name":"2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)","volume":"43 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129990677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2020 3rd International Conference on Computer and Informatics Engineering (IC2IE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1