Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872843
Hidayatul Zelfia, Tiarma Simanungkalit, T. Raharjo
Bank XYZ, a state-owned bank in Indonesia, has just begun its digital transformation and employed scrum methodology for only one year. Lack of resources in the internal IT division (Div-IT) led to the necessity to create a separate unit (Div-Ex) to expedite several digital transformation initiatives to be able to support Bank XYZ in competing with other banks. The purpose of this research is to measure and compare the maturity level of both Div-Ex and Div-IT. This research was conducted under a mix-method approach. Team observation was done for both Div-Ex and Div-IT. Subsequently, questionnaires with 69 questions were circulated online to both divisions. Maturity level was assessed by combining Scrum Maturity Method (SMM) to measure current state and Agile Maturity Method (AMM) to evaluate each key process area. Div-IT reached 72,5% largely achieved Maturity Level 2 - Managed, 72.05% largely achieved Maturity Level 3 - Defined, 50% partially achieved Maturity Level 4 - Quantitatively Managed, and 63.89% largely achieved Maturity Level 5 - optimized. Whereas Div-Ex reached 91,25% fully achieved Maturity Level 2, 91.25% fully achieved Maturity Level 3, 50% partially achieved Maturity Level 4, and 77.78% largely achieved Maturity Level 5. In summary, Div-Ex is overall more mature with maturity level 3 whereas Div-IT only maturity level 2. Recommendations for improvement based on Scrum Guide, SBOK Guide, and Praise for Essential Scrum are provided to Bank XYZ to improve the maturity level of the Div-IT.
Bank XYZ是印度尼西亚的一家国有银行,它刚刚开始数字化转型,采用scrum方法只有一年的时间。内部IT部门(Div-IT)缺乏资源,导致有必要创建一个独立的部门(Div-Ex),以加快若干数字转型计划,以便能够支持Bank XYZ与其他银行竞争。本研究的目的是衡量和比较Div-Ex和Div-IT的成熟度水平。本研究采用混合方法进行。对Div-Ex和Div-IT进行了小组观察。随后,69个问题的调查问卷在网上分发给两个部门。通过结合Scrum成熟度方法(SMM)测量当前状态和Agile成熟度方法(AMM)评估每个关键过程域,评估成熟度水平。Div-IT达到72.5%,基本上达到了2级成熟度——管理,72.05%基本上达到了3级成熟度——定义,50%部分达到4级成熟度——定量管理,63.89%基本上达到5级成熟度——优化。而Div-Ex达到91,25%完全达到2级成熟度,91.25%完全达到3级成熟度,50%部分达到4级成熟度,77.78%基本达到5级成熟度。总之,Div-Ex总体上更成熟,成熟度级别为3,而Div-IT只有成熟度级别2。根据Scrum指南、SBOK指南和对基本Scrum的赞扬,向Bank XYZ提供改进建议,以提高Div-IT的成熟度。
{"title":"Comparison of Scrum Maturity Between Internal and External Software Development: A Case Study at One of the State-Owned Banks in Indonesia","authors":"Hidayatul Zelfia, Tiarma Simanungkalit, T. Raharjo","doi":"10.1109/ICISIT54091.2022.9872843","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872843","url":null,"abstract":"Bank XYZ, a state-owned bank in Indonesia, has just begun its digital transformation and employed scrum methodology for only one year. Lack of resources in the internal IT division (Div-IT) led to the necessity to create a separate unit (Div-Ex) to expedite several digital transformation initiatives to be able to support Bank XYZ in competing with other banks. The purpose of this research is to measure and compare the maturity level of both Div-Ex and Div-IT. This research was conducted under a mix-method approach. Team observation was done for both Div-Ex and Div-IT. Subsequently, questionnaires with 69 questions were circulated online to both divisions. Maturity level was assessed by combining Scrum Maturity Method (SMM) to measure current state and Agile Maturity Method (AMM) to evaluate each key process area. Div-IT reached 72,5% largely achieved Maturity Level 2 - Managed, 72.05% largely achieved Maturity Level 3 - Defined, 50% partially achieved Maturity Level 4 - Quantitatively Managed, and 63.89% largely achieved Maturity Level 5 - optimized. Whereas Div-Ex reached 91,25% fully achieved Maturity Level 2, 91.25% fully achieved Maturity Level 3, 50% partially achieved Maturity Level 4, and 77.78% largely achieved Maturity Level 5. In summary, Div-Ex is overall more mature with maturity level 3 whereas Div-IT only maturity level 2. Recommendations for improvement based on Scrum Guide, SBOK Guide, and Praise for Essential Scrum are provided to Bank XYZ to improve the maturity level of the Div-IT.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126825510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872829
Rizky Pratama Hibatulah, D. Wijaya, Wawa Wikusna
Meat is one of several sources of protein needed by the human body. Until now, meat consumption has continued to increase yearly for various reasons, including its high nutritional value as a source of protein and its wide availability. The public must know the excellent quality of meat not consume rotten meat when choosing meat. Meanwhile, people still use the sense of smell to determine the quality of meat based on personal views. To overcome these obstacles, it is necessary to develop a method to predict the microbial population in meat to determine whether the meat is safe for consumption. Prediction requires the use of an acceptable approach. Using an electronic nose (e-nose) in conjunction with the Support Vector Machine Regression (SVR) technique allows a structured approach to predict the microbial population in meat concerning the Meat Quality Standard. The prediction results indicate that the system is accurate, as shown by R2 0.977 and an RMSE 0.026
{"title":"Prediction of Microbial Population in Meat Using Electronic Nose and Support Vector Regression Algorithm","authors":"Rizky Pratama Hibatulah, D. Wijaya, Wawa Wikusna","doi":"10.1109/ICISIT54091.2022.9872829","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872829","url":null,"abstract":"Meat is one of several sources of protein needed by the human body. Until now, meat consumption has continued to increase yearly for various reasons, including its high nutritional value as a source of protein and its wide availability. The public must know the excellent quality of meat not consume rotten meat when choosing meat. Meanwhile, people still use the sense of smell to determine the quality of meat based on personal views. To overcome these obstacles, it is necessary to develop a method to predict the microbial population in meat to determine whether the meat is safe for consumption. Prediction requires the use of an acceptable approach. Using an electronic nose (e-nose) in conjunction with the Support Vector Machine Regression (SVR) technique allows a structured approach to predict the microbial population in meat concerning the Meat Quality Standard. The prediction results indicate that the system is accurate, as shown by R2 0.977 and an RMSE 0.026","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127035912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872762
Okky Pramudita, H. Adhi Murti Citra Amalia, G. A. Savitri
Small and medium enterprises (SMEs) have been heavily affected by the COVID-19 pandemic, so many have switched from offline to online businesses to survive. Unfortunately, not all SMEs can use technology well, making it difficult to market their products online. The presence of consultants in social media marketing is expected to help the SME problems. This study aims to determine the level of acceptance of SMEs toward social media consulting, which is divided into technological, organizational, and environmental perspectives. This study also presented ananalysis of constraints and recommended solutions to improve the level of acceptance of social media consulting. The method used is descriptive quantitative by distributing surveys to 50 SMEs in Indonesia. The findings show that the acceptance of SMEs in Indonesia to social media is included in the highcategory, namely 80% of the total respondents, with the category of technology perspective at 88%, organization at 72%, and environment at 88%.
{"title":"SMEs’ Adoption of Social Media Consulting During COVID-19 Pandemic","authors":"Okky Pramudita, H. Adhi Murti Citra Amalia, G. A. Savitri","doi":"10.1109/ICISIT54091.2022.9872762","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872762","url":null,"abstract":"Small and medium enterprises (SMEs) have been heavily affected by the COVID-19 pandemic, so many have switched from offline to online businesses to survive. Unfortunately, not all SMEs can use technology well, making it difficult to market their products online. The presence of consultants in social media marketing is expected to help the SME problems. This study aims to determine the level of acceptance of SMEs toward social media consulting, which is divided into technological, organizational, and environmental perspectives. This study also presented ananalysis of constraints and recommended solutions to improve the level of acceptance of social media consulting. The method used is descriptive quantitative by distributing surveys to 50 SMEs in Indonesia. The findings show that the acceptance of SMEs in Indonesia to social media is included in the highcategory, namely 80% of the total respondents, with the category of technology perspective at 88%, organization at 72%, and environment at 88%.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873089
S. Prasetyaningtyas, Mudahan Rambe
The Digital Transformation process, especially in vocational high school, is highly complex and should be understood by scholars. We use seven stages of soft systems methodology to contribute to a deeper understanding of The Digital Transformation process, especially in vocational high school as a policy issue. The research was done in Vocational Highschool 2 Medan. The method used was an exploratory study. In-depth interviews were done to gather data. The main interviewees were all stakeholders (principal, teachers, students, alumni, and parents) related to the process. The outcomes showed the actors involved and the obstacles experienced by the actors in transforming the existing condition into the digital one. The paper proposed a digital transformation model in vocational high schools using the soft system approach. The research limitation was due to the limited research object used, so broader research using this approach is urgent to understand the model.
{"title":"Digital Transformation in Vocational High School: A Soft System Approach","authors":"S. Prasetyaningtyas, Mudahan Rambe","doi":"10.1109/ICISIT54091.2022.9873089","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873089","url":null,"abstract":"The Digital Transformation process, especially in vocational high school, is highly complex and should be understood by scholars. We use seven stages of soft systems methodology to contribute to a deeper understanding of The Digital Transformation process, especially in vocational high school as a policy issue. The research was done in Vocational Highschool 2 Medan. The method used was an exploratory study. In-depth interviews were done to gather data. The main interviewees were all stakeholders (principal, teachers, students, alumni, and parents) related to the process. The outcomes showed the actors involved and the obstacles experienced by the actors in transforming the existing condition into the digital one. The paper proposed a digital transformation model in vocational high schools using the soft system approach. The research limitation was due to the limited research object used, so broader research using this approach is urgent to understand the model.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"1058 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123157410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873096
Yekti Wirani, Maurice Yoga Ibrahim
As one of the nations with tremendous Muslim residents, Indonesia only has eight authorized Sharia FinTech Lending. In addition, based on a survey of the Sharia financial literacy and inclusion index conducted by the OJK, it is comprehended that the Sharia financial literacy index in Indonesia is still low compared to conventional finance. This study aims to identify the impact of Profit-sharing, Personal Innovativeness, Familiarity, Security, and Trust in Online Lending Platform on the Intention to Use of Sharia FinTech Lending in Indonesia. These five factors were evaluated for their influence because they were considered to contribute to the increase in the Sharia financial literacy. This study involved 104 respondents to fill out an online questionnaire and two respondents to validate the recommendations designed through interview techniques. The results of quantitative data processing were analyzed using SmartPLS. This study concludes that Personal Innovativeness and Trust in Online Lending Platforms affect Intention to Use in Sharia FinTech Lending. This study contributes several recommendations for Sharia FinTech Lending providers in Indonesia to improve their services to be accepted by the community and under sharia principles.
{"title":"The Effect of Personal Innovativeness and Trust in Online Lending Platforms to Adoption of Indonesian Sharia FinTech Lending","authors":"Yekti Wirani, Maurice Yoga Ibrahim","doi":"10.1109/ICISIT54091.2022.9873096","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873096","url":null,"abstract":"As one of the nations with tremendous Muslim residents, Indonesia only has eight authorized Sharia FinTech Lending. In addition, based on a survey of the Sharia financial literacy and inclusion index conducted by the OJK, it is comprehended that the Sharia financial literacy index in Indonesia is still low compared to conventional finance. This study aims to identify the impact of Profit-sharing, Personal Innovativeness, Familiarity, Security, and Trust in Online Lending Platform on the Intention to Use of Sharia FinTech Lending in Indonesia. These five factors were evaluated for their influence because they were considered to contribute to the increase in the Sharia financial literacy. This study involved 104 respondents to fill out an online questionnaire and two respondents to validate the recommendations designed through interview techniques. The results of quantitative data processing were analyzed using SmartPLS. This study concludes that Personal Innovativeness and Trust in Online Lending Platforms affect Intention to Use in Sharia FinTech Lending. This study contributes several recommendations for Sharia FinTech Lending providers in Indonesia to improve their services to be accepted by the community and under sharia principles.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873034
Putri Taqwa Prasetyaningrum, Purwanto Purwanto, A. F. Rochim
Gamification is a design strategy for applying game elements in a non-game context for the purpose of changing individual behavior. Gamification and its motivational potential are seen as a trend for enhance and promote user engagement in various contexts. Many application companies have adopted gamification, which aims to make consumers more attractive and loyal. Given the ambivalent evidence on the effectiveness of gamification Gamification's popularity has grown dramatically over the years, as seen by an increase in the number of gamification apps and more studies. Gamification might be personalized to people with various demographic and psychological characteristics, particularly in the banking industry. While the use of gamification in many underserved areas, such as banking, will provide amazing outcomes, most research investigating the role of gamification in banking have found that it has a significant influence on increasing consumer engagement and enhancing system performance. This research did a detailed review of the gamification literature and assessed the research methods and findings in gamification research in mobile banking in this study, which provides a more comprehensive overview of the topic. The goal of this research is to categorize and classify gamification in mobile banking, as well as to analyze the current state of the art to aid future research. For managerial and academic consequences, further research directions are also recommended.
{"title":"Gamification On Mobile Banking Application: A Literature Review","authors":"Putri Taqwa Prasetyaningrum, Purwanto Purwanto, A. F. Rochim","doi":"10.1109/ICISIT54091.2022.9873034","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873034","url":null,"abstract":"Gamification is a design strategy for applying game elements in a non-game context for the purpose of changing individual behavior. Gamification and its motivational potential are seen as a trend for enhance and promote user engagement in various contexts. Many application companies have adopted gamification, which aims to make consumers more attractive and loyal. Given the ambivalent evidence on the effectiveness of gamification Gamification's popularity has grown dramatically over the years, as seen by an increase in the number of gamification apps and more studies. Gamification might be personalized to people with various demographic and psychological characteristics, particularly in the banking industry. While the use of gamification in many underserved areas, such as banking, will provide amazing outcomes, most research investigating the role of gamification in banking have found that it has a significant influence on increasing consumer engagement and enhancing system performance. This research did a detailed review of the gamification literature and assessed the research methods and findings in gamification research in mobile banking in this study, which provides a more comprehensive overview of the topic. The goal of this research is to categorize and classify gamification in mobile banking, as well as to analyze the current state of the art to aid future research. For managerial and academic consequences, further research directions are also recommended.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872914
Novy Ariyanto, Nur Fajar Taufiq, A. Arief, D. I. Sensuse
E-government is a government administration that utilizes information and communication technology to provide services to its users. Civil Servants who are one of the E-government users are obliged to be an example in the implementation and use of its. One application of E-government for civil servants is a mobile presence application called Face Biometric Location Authentication (FABIOLA). It is used by employees of Agency for the Assessment and Application of Technology. The application had been downloaded more than 5000 times with a 4-star rating on Google Playstore. Although it has received a fairly good rating, this cannot be used as a reference because there are still many negative reviews. To identify the problem, a text mining methodology and association rules are used. From the results of text mining analysis, several aspects of problems related to applications are aplikasi, foto, gagal, android, and absen. From these 5 aspects, association rules were carried out to facilitate fishbone analysis. From the results of the fishbone analysis, several solutions to the problem are proposed: application reengineering, the use of a stable internet connection, following the appropriate usage steps, and fulfilling the application preinstallation requirements.
{"title":"Analysis of Employee Attendance Mobile Application Problems Based on User Reviews: A Case Study","authors":"Novy Ariyanto, Nur Fajar Taufiq, A. Arief, D. I. Sensuse","doi":"10.1109/ICISIT54091.2022.9872914","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872914","url":null,"abstract":"E-government is a government administration that utilizes information and communication technology to provide services to its users. Civil Servants who are one of the E-government users are obliged to be an example in the implementation and use of its. One application of E-government for civil servants is a mobile presence application called Face Biometric Location Authentication (FABIOLA). It is used by employees of Agency for the Assessment and Application of Technology. The application had been downloaded more than 5000 times with a 4-star rating on Google Playstore. Although it has received a fairly good rating, this cannot be used as a reference because there are still many negative reviews. To identify the problem, a text mining methodology and association rules are used. From the results of text mining analysis, several aspects of problems related to applications are aplikasi, foto, gagal, android, and absen. From these 5 aspects, association rules were carried out to facilitate fishbone analysis. From the results of the fishbone analysis, several solutions to the problem are proposed: application reengineering, the use of a stable internet connection, following the appropriate usage steps, and fulfilling the application preinstallation requirements.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114295952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872765
Salsabila Shita Putri Nugroho, Y. Natali, C. Apriono
As technology develops and data demands get higher, 5G technology increases capacity, improves connectivity, and is more flexible with user mobility. The Radio over Fiber (RoF) technique on millimeter-wave is an attractive solution to provide high data rates and network capacity. This study conducted a design and simulation of a millimeter wave-based RoF system with a radio frequency of 64 GHz. A phase modulator is an external modulation technique to generate millimeter-wave signals. The considered parameters are the Bit Error Rate (BER), Q Factor, and Eye Diagram parameters for system analysis by varying optical cable lengths of 1 km, 3 km, and 5 km. By varying the length of the optical fiber, the system performance does not meet the recommended parameters for an optical fiber length of5 km, where the resulting minimum value of BER is greater than $10^{-9}$. This result shows that long transmission should consider dispersion factors for a millimeter wave-based RoF for 5G applications.
{"title":"Design of Millimeter-Wave based Radio over Fiber for 5G Applications","authors":"Salsabila Shita Putri Nugroho, Y. Natali, C. Apriono","doi":"10.1109/ICISIT54091.2022.9872765","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872765","url":null,"abstract":"As technology develops and data demands get higher, 5G technology increases capacity, improves connectivity, and is more flexible with user mobility. The Radio over Fiber (RoF) technique on millimeter-wave is an attractive solution to provide high data rates and network capacity. This study conducted a design and simulation of a millimeter wave-based RoF system with a radio frequency of 64 GHz. A phase modulator is an external modulation technique to generate millimeter-wave signals. The considered parameters are the Bit Error Rate (BER), Q Factor, and Eye Diagram parameters for system analysis by varying optical cable lengths of 1 km, 3 km, and 5 km. By varying the length of the optical fiber, the system performance does not meet the recommended parameters for an optical fiber length of5 km, where the resulting minimum value of BER is greater than $10^{-9}$. This result shows that long transmission should consider dispersion factors for a millimeter wave-based RoF for 5G applications.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122276059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873006
Mohd Nabil Iqbal Bin Ahmad, Aznida Abu Bakar Sajak, Mohd Nazri Ismail, Noormadinah Allias
Real-world applications such as habitat monitoring, air quality, natural disaster prevention, smart agriculture, and smart building are possible due to the utilization of Wireless Sensor Networks (WSNs). However, in most cases, classic WSN nodes are fueled by non-rechargeable batteries with a limited capacity for energy storage. In this paper, a solar energy harvesting implementation is proposed in a wireless sensor network to increase the lifetime of each sensor node. The implementation may also ideally achieve an infinite lifetime. Nevertheless, there are many other obstacles to overcome and consider in solar energy harvestings, such as temperature fluctuations, solar panel conversion efficiency, solar energy forecasting difficulties, power interruptions, and other environmental or natural phenomenon issues. Therefore, the objective of this research is to review the recent literature on energy harvesting for wireless sensor networks focusing on solar ambient light energy. Using NETSIM simulations, the goal of this investigation would be to achieve reliability and energy efficiency in wireless sensor networks through solar energy harvesting.
{"title":"An Investigation on the Impact of Energy Harvesting in Green IoT with Netsims","authors":"Mohd Nabil Iqbal Bin Ahmad, Aznida Abu Bakar Sajak, Mohd Nazri Ismail, Noormadinah Allias","doi":"10.1109/ICISIT54091.2022.9873006","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873006","url":null,"abstract":"Real-world applications such as habitat monitoring, air quality, natural disaster prevention, smart agriculture, and smart building are possible due to the utilization of Wireless Sensor Networks (WSNs). However, in most cases, classic WSN nodes are fueled by non-rechargeable batteries with a limited capacity for energy storage. In this paper, a solar energy harvesting implementation is proposed in a wireless sensor network to increase the lifetime of each sensor node. The implementation may also ideally achieve an infinite lifetime. Nevertheless, there are many other obstacles to overcome and consider in solar energy harvestings, such as temperature fluctuations, solar panel conversion efficiency, solar energy forecasting difficulties, power interruptions, and other environmental or natural phenomenon issues. Therefore, the objective of this research is to review the recent literature on energy harvesting for wireless sensor networks focusing on solar ambient light energy. Using NETSIM simulations, the goal of this investigation would be to achieve reliability and energy efficiency in wireless sensor networks through solar energy harvesting.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126760327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872911
Rebecca La Volla Nyoto, Y. Ruldeviyani
The infiltration wells program in Jakarta,Indonesia, is one of the issues that has become a hot topic on Twitter after a political figure’s car fell into one of the infiltration wells in South Jakarta. As a result, a growing number of people have spoken out about the program’s benefits and drawbacks, which later cause pros and cons. This study aims to determine public sentiment on Twitter about the Jakarta infiltration wells program and to determine the accuracy and performance of the Naive Bayes, Support Vector Machine, and K-Nearest Neighbor as the classification algorithms used in this research. With SMOTE, balanced data of 591 positive and 591 negative tweets was obtained, with testing data of 138 tweets. The result shows the highest accuracy of 93.32 percent, as well as high performance was reached with SVM, followed by Naive Bayes in second place, and KNN in third place. The result of this study also finds that most of the tweets have negative sentiments, mostly about the program inability to handle floods, the formation of puddles and damages on roads, high allocation program budgets, and protests of residents who had not been compensated for their assistance in building the infiltration wells.
{"title":"Infiltration Wells Program in Jakarta: Twitter Sentiment Analysis","authors":"Rebecca La Volla Nyoto, Y. Ruldeviyani","doi":"10.1109/ICISIT54091.2022.9872911","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872911","url":null,"abstract":"The infiltration wells program in Jakarta,Indonesia, is one of the issues that has become a hot topic on Twitter after a political figure’s car fell into one of the infiltration wells in South Jakarta. As a result, a growing number of people have spoken out about the program’s benefits and drawbacks, which later cause pros and cons. This study aims to determine public sentiment on Twitter about the Jakarta infiltration wells program and to determine the accuracy and performance of the Naive Bayes, Support Vector Machine, and K-Nearest Neighbor as the classification algorithms used in this research. With SMOTE, balanced data of 591 positive and 591 negative tweets was obtained, with testing data of 138 tweets. The result shows the highest accuracy of 93.32 percent, as well as high performance was reached with SVM, followed by Naive Bayes in second place, and KNN in third place. The result of this study also finds that most of the tweets have negative sentiments, mostly about the program inability to handle floods, the formation of puddles and damages on roads, high allocation program budgets, and protests of residents who had not been compensated for their assistance in building the infiltration wells.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128030378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}