Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873010
F. I. Maulana, Gusti Pangestu, M. A. Febriantono, Rahman Arifuddin, Vandha Widartha
The Internet of Things (IoT) has emerged as a critical issue and area of research for a variety of communities, academics, and industries worldwide. Due to the lack of research in IoT and understanding the direction of IoT development in the future. This research presents bibliometric analysis and analysis of science mapping on IoT. Data was taken from the Scopus database based on Indonesian state affiliation from 2012 - 2020. A total of 1415 documents (Conference proceedings, journals, book series, and books) were retrieved, which were then processed online via Scopus Web and by VOSviewer software to perform advanced bibliometric analysis and science mapping analysis. The method is divided into five stages: keyword selection, initial search results, search result refinement, initial compilation, and data analysis. Scopus's list of the most frequently published and indexed articles, the most published papers are in the subject area of Computer Science (29.0%) with 938 documents, Engineering (20.7%) with 668 documents, Physics and Astronomy (9.5%) with 308 documents. The data processed and visualized on this topic offer exploratory information about the current status and trends in the IoT scientific literature and provide insight for established and novice researchers in understanding this research topic.
{"title":"Visualization Analysis and Trends in Indonesian Internet of Things Research Using Bibliometrics","authors":"F. I. Maulana, Gusti Pangestu, M. A. Febriantono, Rahman Arifuddin, Vandha Widartha","doi":"10.1109/ICISIT54091.2022.9873010","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873010","url":null,"abstract":"The Internet of Things (IoT) has emerged as a critical issue and area of research for a variety of communities, academics, and industries worldwide. Due to the lack of research in IoT and understanding the direction of IoT development in the future. This research presents bibliometric analysis and analysis of science mapping on IoT. Data was taken from the Scopus database based on Indonesian state affiliation from 2012 - 2020. A total of 1415 documents (Conference proceedings, journals, book series, and books) were retrieved, which were then processed online via Scopus Web and by VOSviewer software to perform advanced bibliometric analysis and science mapping analysis. The method is divided into five stages: keyword selection, initial search results, search result refinement, initial compilation, and data analysis. Scopus's list of the most frequently published and indexed articles, the most published papers are in the subject area of Computer Science (29.0%) with 938 documents, Engineering (20.7%) with 668 documents, Physics and Astronomy (9.5%) with 308 documents. The data processed and visualized on this topic offer exploratory information about the current status and trends in the IoT scientific literature and provide insight for established and novice researchers in understanding this research topic.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132872670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9873095
Swardiantara Silalahi, R. Ijtihadie, T. Ahmad, H. Studiawan
Systems’ performance evaluation and improvement are endless as long as a system runs. This requires several records of data containing the chronological order of executed process. In this case, logging comes into action. Logging is a mechanism of recording the empirical running process in a system or software. Expected benefits from this practice include assisting the developer in debugging under the development phase. It is not only for debugging but also for compliance check and anomaly detection for a running system. The logging mechanism might vary from one system to another, especially if a stand-alone system is compared to a distributed system. Thus, this survey aims to identify the existing recent works on logging state-of-the-art along with the research objectives. The underlying architecture and considerations are summarized. A logging taxonomy becomes one of the main contributions of this study. Current research limitations and challenges are discussed, followed by several possible areas of future research directions.
{"title":"A Survey on Logging in Distributed System","authors":"Swardiantara Silalahi, R. Ijtihadie, T. Ahmad, H. Studiawan","doi":"10.1109/ICISIT54091.2022.9873095","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9873095","url":null,"abstract":"Systems’ performance evaluation and improvement are endless as long as a system runs. This requires several records of data containing the chronological order of executed process. In this case, logging comes into action. Logging is a mechanism of recording the empirical running process in a system or software. Expected benefits from this practice include assisting the developer in debugging under the development phase. It is not only for debugging but also for compliance check and anomaly detection for a running system. The logging mechanism might vary from one system to another, especially if a stand-alone system is compared to a distributed system. Thus, this survey aims to identify the existing recent works on logging state-of-the-art along with the research objectives. The underlying architecture and considerations are summarized. A logging taxonomy becomes one of the main contributions of this study. Current research limitations and challenges are discussed, followed by several possible areas of future research directions.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129545410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872863
I. M. D. Susila, Yohanes Priyo Atmojo, Ni Luh Putri Srinadi, Ida Bagus Suradarma, Lilis Yuningsih, Erma Sulistyo Rini
Data forecasting methods are essential in the business world to determine the company’s future steps. However, the COVID-19 pandemic has hit the tourism economy hard, resulting in a slump in income. In this study, trials were conducted to analyze the reliability of forecasting methods on data affected by the COVID-19 pandemic. The method used is the Triple Exponential Smoothing method involving two models, namely Additive and Multiplicative. In this paper, the test is carried out using actual data derived from data from a service company engaged in tourist crossing transportation. Each method’s alpha, beta, and gamma values are determined based on the parameters that produce the smallest error value. The experiment results show the predictability of the Triple Exponential Smoothing method by measuring the prediction error value based on the Mean Absolute Percentage Error (MAPE) value, which was 7.56% in the Additive model and 10.32% in the Multiplicative model before the pandemic happened. However, both methods’ prediction measurements during a pandemic produce poor forecasts with an error percentage above 40%. Meanwhile, during the decline in pandemic cases, the value of the Triple Exponential Smoothing Multiplicative method was closer to the actual data with a prediction error value of 33.02%. Therefore, the Triple Exponential Smoothing Multiplicative method is more resistant and suitable for implementing into a forecasting system with actual data that influences pandemic events.
{"title":"Performance Analysis of the Triple Exponential Smoothing Method During the Covid19 Pandemic on Tourist Visit Data","authors":"I. M. D. Susila, Yohanes Priyo Atmojo, Ni Luh Putri Srinadi, Ida Bagus Suradarma, Lilis Yuningsih, Erma Sulistyo Rini","doi":"10.1109/ICISIT54091.2022.9872863","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872863","url":null,"abstract":"Data forecasting methods are essential in the business world to determine the company’s future steps. However, the COVID-19 pandemic has hit the tourism economy hard, resulting in a slump in income. In this study, trials were conducted to analyze the reliability of forecasting methods on data affected by the COVID-19 pandemic. The method used is the Triple Exponential Smoothing method involving two models, namely Additive and Multiplicative. In this paper, the test is carried out using actual data derived from data from a service company engaged in tourist crossing transportation. Each method’s alpha, beta, and gamma values are determined based on the parameters that produce the smallest error value. The experiment results show the predictability of the Triple Exponential Smoothing method by measuring the prediction error value based on the Mean Absolute Percentage Error (MAPE) value, which was 7.56% in the Additive model and 10.32% in the Multiplicative model before the pandemic happened. However, both methods’ prediction measurements during a pandemic produce poor forecasts with an error percentage above 40%. Meanwhile, during the decline in pandemic cases, the value of the Triple Exponential Smoothing Multiplicative method was closer to the actual data with a prediction error value of 33.02%. Therefore, the Triple Exponential Smoothing Multiplicative method is more resistant and suitable for implementing into a forecasting system with actual data that influences pandemic events.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"210 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127038893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872796
Kadek Ari Sudama, M. Rivai, Dava Aulia, T. Mujiono
Hydrogen gas leaks in a closed room can pose a fire hazard and poor air quality. The concentration of hydrogen gas of 4-75% in the air is highly flammable and can cause explosions. An electronic nose system consisting of gas sensors array and a neural network has been built to detect hydrogen gas leaks in a room. Data from each sensor is used as input for the classification of gases on the neural network. Proportional-integral-derivative (PID) method is applied to control the exhaust fan to eliminate hydrogen gas leaks in the room. The electronic nose and PID control are implemented on the Arduino Nano microcontroller. The experiment results showed that this system could classify several gases such as hydrogen gas, vehicle smoke, and perfume with a success rate of 86.67%. The PID control becomes active when hydrogen gas with concentrations above 100 ppm has been classified. These results can minimize and prevent hydrogen gas leaks and maintain good indoor air quality.
{"title":"Electronic Nose Based on Gas Sensor Array and Neural Network for Indoor Hydrogen Gas Control System","authors":"Kadek Ari Sudama, M. Rivai, Dava Aulia, T. Mujiono","doi":"10.1109/ICISIT54091.2022.9872796","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872796","url":null,"abstract":"Hydrogen gas leaks in a closed room can pose a fire hazard and poor air quality. The concentration of hydrogen gas of 4-75% in the air is highly flammable and can cause explosions. An electronic nose system consisting of gas sensors array and a neural network has been built to detect hydrogen gas leaks in a room. Data from each sensor is used as input for the classification of gases on the neural network. Proportional-integral-derivative (PID) method is applied to control the exhaust fan to eliminate hydrogen gas leaks in the room. The electronic nose and PID control are implemented on the Arduino Nano microcontroller. The experiment results showed that this system could classify several gases such as hydrogen gas, vehicle smoke, and perfume with a success rate of 86.67%. The PID control becomes active when hydrogen gas with concentrations above 100 ppm has been classified. These results can minimize and prevent hydrogen gas leaks and maintain good indoor air quality.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872860
Mutmainnah Adnan Lanure, Furqan Maulana, M. Lubis
Based on the results of the assessment conducted at XYZ Company, XYZ Company has implemented information technology to help run its business processes. However, the use of this technology has not yet identified the maturity level. For this reason, it is necessary to conduct an assessment and then design recommendations and a roadmap for improvement based on ideal IT governance based on the COBIT Framework. The formulation of recommendations considers the results of the assessment at the assessment stage which consists of3 main steps, namely Analysis of organizational Context and IT Governance Needs, Assessment of Existing Conditions, and Preparation of Recommendations for Strengthening Existing Governance. The purpose of implementing IT Maturity Level assessment is to find out how optimally IT in various aspects such as aspects of people, processes, and tools has been managed by the Company, and this must be done because it is a mandate from regulatory regulations. Companies must carry out IT maturity level assessments to find out how far/well they have managed IT in various aspects, and they must identify gaps between what they have implemented and what is ideal according to best practice/framework to be used as a reference, then after that, develop a roadmap to find out what improvement initiatives/projects should take precedence and which are correlated, so that implementation of the initiatives/projects is neater and more focused. It should be underlined that this research is limited to identifying existing conditions, gaps, and compiling a recommendation roadmap.
{"title":"Assessment of IT Maturity Level and Roadmap Preparation for Improving Governance Based on COBIT 5 (Case Study: XYZ Company)","authors":"Mutmainnah Adnan Lanure, Furqan Maulana, M. Lubis","doi":"10.1109/ICISIT54091.2022.9872860","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872860","url":null,"abstract":"Based on the results of the assessment conducted at XYZ Company, XYZ Company has implemented information technology to help run its business processes. However, the use of this technology has not yet identified the maturity level. For this reason, it is necessary to conduct an assessment and then design recommendations and a roadmap for improvement based on ideal IT governance based on the COBIT Framework. The formulation of recommendations considers the results of the assessment at the assessment stage which consists of3 main steps, namely Analysis of organizational Context and IT Governance Needs, Assessment of Existing Conditions, and Preparation of Recommendations for Strengthening Existing Governance. The purpose of implementing IT Maturity Level assessment is to find out how optimally IT in various aspects such as aspects of people, processes, and tools has been managed by the Company, and this must be done because it is a mandate from regulatory regulations. Companies must carry out IT maturity level assessments to find out how far/well they have managed IT in various aspects, and they must identify gaps between what they have implemented and what is ideal according to best practice/framework to be used as a reference, then after that, develop a roadmap to find out what improvement initiatives/projects should take precedence and which are correlated, so that implementation of the initiatives/projects is neater and more focused. It should be underlined that this research is limited to identifying existing conditions, gaps, and compiling a recommendation roadmap.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124123672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872822
Tri Ayuningsih, Agung Suhendar, S. Suyanto
Currently, the concept of video surveillance at home can already be supported by a CCTV system or IP camera installed at home connected to an internet connection. However, the CCTV or IP Camera device is only equipped with minimal features, generally only a motion detection feature that will provide notifications or alerts if motion or motion objects are detected in the observed area. It causes inconvenience to the user because too many alerts appear if the area being observed is often accompanied by the movement of people or objects, which is a natural thing and does not need to be suspected. The application of artificial intelligence systems in the home area is expected to increase the capability of home video surveillance to be smarter in giving notifications/alerts. In this research, smart video surveillance is developed using two schemes of video stream processing: full local processing and semi-cloud processing. Two edge computing devices connected locally to the internet are installed in the home area. Both devices consist of Jetson Nano and PC GPU (Intel Core i7 7th Gen 7700HQ, 8GB RAM, Nvidia GeForce GTX 1060). The IP cameras used are 2 Ezviz brand IP cameras installed in two different locations and connected to one home internet network. Experiments show that the local processing scheme is much more recommended for a residential environment since it provides a much shorter response time than the semi-cloud one.
{"title":"Feasibility Study of Artificial Intelligence Technology for Home Video Surveillance System","authors":"Tri Ayuningsih, Agung Suhendar, S. Suyanto","doi":"10.1109/ICISIT54091.2022.9872822","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872822","url":null,"abstract":"Currently, the concept of video surveillance at home can already be supported by a CCTV system or IP camera installed at home connected to an internet connection. However, the CCTV or IP Camera device is only equipped with minimal features, generally only a motion detection feature that will provide notifications or alerts if motion or motion objects are detected in the observed area. It causes inconvenience to the user because too many alerts appear if the area being observed is often accompanied by the movement of people or objects, which is a natural thing and does not need to be suspected. The application of artificial intelligence systems in the home area is expected to increase the capability of home video surveillance to be smarter in giving notifications/alerts. In this research, smart video surveillance is developed using two schemes of video stream processing: full local processing and semi-cloud processing. Two edge computing devices connected locally to the internet are installed in the home area. Both devices consist of Jetson Nano and PC GPU (Intel Core i7 7th Gen 7700HQ, 8GB RAM, Nvidia GeForce GTX 1060). The IP cameras used are 2 Ezviz brand IP cameras installed in two different locations and connected to one home internet network. Experiments show that the local processing scheme is much more recommended for a residential environment since it provides a much shorter response time than the semi-cloud one.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872624
G. Baydogmus
Bringing together popular and loved games with artificial learning methods are the most effective way to increase both motivation to work and skills in understanding and solving problems. In this context, especially Japanese puzzles have been tried to be solved with metaheuristic algorithms by researchers in recent years. Among the Japanese puzzles, one of the most popular games all over the world is Sudoku. Since the traditional methods used to solve the problem in the Sudoku puzzle are quite complex, a different method was sought and this study focused on the solving Sudoku puzzle with Ant Colony optimization. In addition, since probability selection is very important in the ant colony algorithm, the effect of Roulette Wheel and Rank Based probability selection methods and the number of colonies on the solution of the Sudoku puzzle was also compared. For the results with the number of colonies, operations were carried out according to 9, 36 and 81 ants. For the study, 15 Sudoku puzzles, easy, medium and difficult, were solved with an ant colony and the time complexity of their solution was evaluated separately for each probability selection. In the results, it was seen that the Rank Based probability selection increased the time complexity of the algorithm by approximately, and it was observed that the increase in the number of ants decreased the working speed but did not affect the result.
{"title":"Probability Selection for Solving Sudoku with Ant Colony optimization Algorithm","authors":"G. Baydogmus","doi":"10.1109/ICISIT54091.2022.9872624","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872624","url":null,"abstract":"Bringing together popular and loved games with artificial learning methods are the most effective way to increase both motivation to work and skills in understanding and solving problems. In this context, especially Japanese puzzles have been tried to be solved with metaheuristic algorithms by researchers in recent years. Among the Japanese puzzles, one of the most popular games all over the world is Sudoku. Since the traditional methods used to solve the problem in the Sudoku puzzle are quite complex, a different method was sought and this study focused on the solving Sudoku puzzle with Ant Colony optimization. In addition, since probability selection is very important in the ant colony algorithm, the effect of Roulette Wheel and Rank Based probability selection methods and the number of colonies on the solution of the Sudoku puzzle was also compared. For the results with the number of colonies, operations were carried out according to 9, 36 and 81 ants. For the study, 15 Sudoku puzzles, easy, medium and difficult, were solved with an ant colony and the time complexity of their solution was evaluated separately for each probability selection. In the results, it was seen that the Rank Based probability selection increased the time complexity of the algorithm by approximately, and it was observed that the increase in the number of ants decreased the working speed but did not affect the result.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133659277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872872
C. Triwibisono, M. Lubis, R. Fauzi, Arif Ridho Lubis
This study aims to determine whether there is a dominant organizational culture in cellular telecommunications companies in the Indonesian capital city using survey methods and class actions. In brief, the results of the study show that the dominant organizational culture with Company A is a rule oriented, Company B is organizational ties or glue, Company C is an innovation oriented while Company D is a result-oriented. In the context of audit and control techniques in the information systems department, students who are prepared as the best graduates placed in the company tend to think creatively when the approaches like jigsaw seem to increase focus and capability accordingly. This study implore survey to respective employee in each company. On the other hand, the authors have the assumption that learning method in specific course might influences the characteristic of the student then creating education culture as well give some portion of organizational culture after they got accepted for work. Therefore, organizational culture might hinders this kind of improvement which most the graduates are trapped in the aspects procedural and clerical activities of audit and control of information systems, conflicted with the undergoing education on campus who preferably use certain type of approaches in learning techniques.
{"title":"The Establishment of organizational Culture in Multinational Cellular Telecommunication Companies","authors":"C. Triwibisono, M. Lubis, R. Fauzi, Arif Ridho Lubis","doi":"10.1109/ICISIT54091.2022.9872872","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872872","url":null,"abstract":"This study aims to determine whether there is a dominant organizational culture in cellular telecommunications companies in the Indonesian capital city using survey methods and class actions. In brief, the results of the study show that the dominant organizational culture with Company A is a rule oriented, Company B is organizational ties or glue, Company C is an innovation oriented while Company D is a result-oriented. In the context of audit and control techniques in the information systems department, students who are prepared as the best graduates placed in the company tend to think creatively when the approaches like jigsaw seem to increase focus and capability accordingly. This study implore survey to respective employee in each company. On the other hand, the authors have the assumption that learning method in specific course might influences the characteristic of the student then creating education culture as well give some portion of organizational culture after they got accepted for work. Therefore, organizational culture might hinders this kind of improvement which most the graduates are trapped in the aspects procedural and clerical activities of audit and control of information systems, conflicted with the undergoing education on campus who preferably use certain type of approaches in learning techniques.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132066946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872806
Rd Yovi Manova, Edi Sukmadirana, Nurma Siti Nurmanah
Software Defined – Wide Area Network (SDWAN) implementation is growing each year as one of the options for enterprise to have hybrid and redundant connection between traditional WAN and Internet. The cloud computing services, whether it is IaaS, PaaS, or SaaS has attracted most of enterprise to separate the corporate data connection from private WAN to public internet securely. This dual data traffic still can be managed by enterprise router, but it will require manual routing or at lease delay with complicated rule to mitigate any link problem. SD-WAN as the development of SDN in wide area network, have the solution to solve the manual routing data, by putting the control plane in a software environment to manage the data traffic virtually. In Indonesia, the SD-WAN technology has been introduced by several vendors and operators, some enterprise still reluctance considering the security of enterprise data through public internet service, and some of them still questioning the Quality of Services compare to legacy or traditional WAN services. Therefore, this research will perform the Quality of Service and Performance of SD-WAN, compare to traditional Multiprotocol Label Switching (MPLS) link and Ethernet over Internet Protocol (EoIP) as one of the contenders. The object of the research is an active WAN of one of Indonesian company, that having those three connections between Jakarta and Surabaya. The QoS and performance are measured using ITU- T G.1010 standard as the reference.
软件定义广域网(SDWAN)作为企业在传统广域网和Internet之间建立混合冗余连接的选择之一,其实现每年都在增长。云计算服务,无论是IaaS、PaaS还是SaaS,都吸引了大多数企业将企业数据从私有广域网安全地连接到公共互联网。这种双重数据流量仍然可以由企业路由器管理,但它将需要手动路由或至少延迟与复杂的规则,以减轻任何链路问题。SD-WAN作为广域网中SDN的发展,解决了人工路由数据的问题,通过将控制平面置于软件环境中对数据流量进行虚拟管理。在印度尼西亚,SD-WAN技术已经被一些供应商和运营商引入,一些企业仍然不愿意通过公共互联网服务考虑企业数据的安全性,其中一些企业仍然质疑与遗留或传统WAN服务相比的服务质量。因此,本研究将执行SD-WAN的服务质量和性能,与传统的多协议标签交换(MPLS)链路和以太网互联网协议(EoIP)作为竞争者之一。本研究的对象是印度尼西亚一家公司的活跃WAN,该公司在雅加达和泗水之间有这三个连接。以ITU- T G.1010标准为基准进行QoS和性能的测量。
{"title":"Comparative Analysis of Quality of Service and Performance of MPLS, EoIP and SD-WAN","authors":"Rd Yovi Manova, Edi Sukmadirana, Nurma Siti Nurmanah","doi":"10.1109/ICISIT54091.2022.9872806","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872806","url":null,"abstract":"Software Defined – Wide Area Network (SDWAN) implementation is growing each year as one of the options for enterprise to have hybrid and redundant connection between traditional WAN and Internet. The cloud computing services, whether it is IaaS, PaaS, or SaaS has attracted most of enterprise to separate the corporate data connection from private WAN to public internet securely. This dual data traffic still can be managed by enterprise router, but it will require manual routing or at lease delay with complicated rule to mitigate any link problem. SD-WAN as the development of SDN in wide area network, have the solution to solve the manual routing data, by putting the control plane in a software environment to manage the data traffic virtually. In Indonesia, the SD-WAN technology has been introduced by several vendors and operators, some enterprise still reluctance considering the security of enterprise data through public internet service, and some of them still questioning the Quality of Services compare to legacy or traditional WAN services. Therefore, this research will perform the Quality of Service and Performance of SD-WAN, compare to traditional Multiprotocol Label Switching (MPLS) link and Ethernet over Internet Protocol (EoIP) as one of the contenders. The object of the research is an active WAN of one of Indonesian company, that having those three connections between Jakarta and Surabaya. The QoS and performance are measured using ITU- T G.1010 standard as the reference.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134310296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-27DOI: 10.1109/ICISIT54091.2022.9872888
W. Febriyani, Muhammad Ilham Alhari, T. F. Kusumasari
Today, technology is used in the corporate and education sectors, especially in educational institutions. IT Governance is the process of managing IT investment decisions within a company to achieve its goals and meet its needs. Determining the appropriate scope for IT Governance is critical to know from the side of the initial implementation strategy. In addition, Governance facilitates the monitoring of all activities and controls in the company. Use COBIT 2019 Analytics in IT Governance to help organizations get the most out of risk management, Governance, and IT. The results of this study came in the form of designing corporate IT governance and identifying the main process recommendations for managing education. Five significant practical recommendations include APO12, DSS02, and DSS03.
{"title":"Design of IT Governance based on Cobit 2019: A Case Study of XYZ Education Foundation","authors":"W. Febriyani, Muhammad Ilham Alhari, T. F. Kusumasari","doi":"10.1109/ICISIT54091.2022.9872888","DOIUrl":"https://doi.org/10.1109/ICISIT54091.2022.9872888","url":null,"abstract":"Today, technology is used in the corporate and education sectors, especially in educational institutions. IT Governance is the process of managing IT investment decisions within a company to achieve its goals and meet its needs. Determining the appropriate scope for IT Governance is critical to know from the side of the initial implementation strategy. In addition, Governance facilitates the monitoring of all activities and controls in the company. Use COBIT 2019 Analytics in IT Governance to help organizations get the most out of risk management, Governance, and IT. The results of this study came in the form of designing corporate IT governance and identifying the main process recommendations for managing education. Five significant practical recommendations include APO12, DSS02, and DSS03.","PeriodicalId":214014,"journal":{"name":"2022 1st International Conference on Information System & Information Technology (ICISIT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133887408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}