Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010592
Che-Chuan Hsu, R. Tsaih
The advancement of information and communication technologies (ICT) has triggered many ICT-enabled services. The application of design science research (DSR) in ICT research is growing and producing rapidly [24]. In this study, we adapt DSR approach to develop an ICT-enables service, the iPalace video channel (iPalace) built on the cloud computing infrastructure. From the senior management and the literature review in museum fields and system engineering, the prerequisites for the iPalace are first confirmed. Based upon the prerequisites and the DSR concept, a design framework for the new ICT-enabled service is proposed. The proposed design framework includes (1) the service blueprint that delineates the entire ICT-enabled parts of service system in a diagram, (2) the UI design table that describes the portion of ICT-enabled service encounter that encourages active customer participation in the service process, and (3) the pseudo code design that results in a picture of corresponding ICT-enabled workflow of the service system amongst middle-office and back-office activities which may be intra-organizational or inter-organizational. Via the questionnaires for evaluating the customer acceptance regarding the performance of iPalace prototype, we have evaluated the proposed design framework for the ICT-enabled service system.
{"title":"Applying design science research to innovations at ICT-enabled service","authors":"Che-Chuan Hsu, R. Tsaih","doi":"10.1109/ICTS.2014.7010592","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010592","url":null,"abstract":"The advancement of information and communication technologies (ICT) has triggered many ICT-enabled services. The application of design science research (DSR) in ICT research is growing and producing rapidly [24]. In this study, we adapt DSR approach to develop an ICT-enables service, the iPalace video channel (iPalace) built on the cloud computing infrastructure. From the senior management and the literature review in museum fields and system engineering, the prerequisites for the iPalace are first confirmed. Based upon the prerequisites and the DSR concept, a design framework for the new ICT-enabled service is proposed. The proposed design framework includes (1) the service blueprint that delineates the entire ICT-enabled parts of service system in a diagram, (2) the UI design table that describes the portion of ICT-enabled service encounter that encourages active customer participation in the service process, and (3) the pseudo code design that results in a picture of corresponding ICT-enabled workflow of the service system amongst middle-office and back-office activities which may be intra-organizational or inter-organizational. Via the questionnaires for evaluating the customer acceptance regarding the performance of iPalace prototype, we have evaluated the proposed design framework for the ICT-enabled service system.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010600
Ammar Fuad, Alva Erwin, Heru Purnomo Ipung
MySQL Cluster is a famous clustered database that is used to store and manipulate data. The problem with MySQL Cluster is that as the data grows larger, the time required to process the data increases and additional resources may be needed. With Hadoop and Hive and Pig, processing time can be faster than MySQL Cluster. In this paper, three data testers with the same data model will run simple queries and to find out at how many rows Hive or Pig is faster than MySQL Cluster. The data model taken from GroupLens Research Project [12] showed a result that Hive is the most appropriate for this data model in a low-cost hardware environment.
MySQL集群是一个著名的集群数据库,用于存储和操作数据。MySQL集群的问题是,随着数据的增长,处理数据所需的时间增加,可能需要额外的资源。使用Hadoop、Hive和Pig,处理时间可以比MySQL集群快。在本文中,使用相同数据模型的三个数据测试人员将运行简单的查询,并找出Hive或Pig比MySQL集群快多少行。GroupLens Research Project[12]的数据模型表明,在低成本的硬件环境下,Hive是最适合该数据模型的。
{"title":"Processing performance on Apache Pig, Apache Hive and MySQL cluster","authors":"Ammar Fuad, Alva Erwin, Heru Purnomo Ipung","doi":"10.1109/ICTS.2014.7010600","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010600","url":null,"abstract":"MySQL Cluster is a famous clustered database that is used to store and manipulate data. The problem with MySQL Cluster is that as the data grows larger, the time required to process the data increases and additional resources may be needed. With Hadoop and Hive and Pig, processing time can be faster than MySQL Cluster. In this paper, three data testers with the same data model will run simple queries and to find out at how many rows Hive or Pig is faster than MySQL Cluster. The data model taken from GroupLens Research Project [12] showed a result that Hive is the most appropriate for this data model in a low-cost hardware environment.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133848044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010555
P. Busono
There are many techniques used for monitoring the respiratory signals, e.g., spirometer, nasal thermistor, strain gauge, and impedance plethysmography. Such techniques require special instruments. In this work, an ECG derived respiration (EDR) algorithm has been proposed for estimating the respiration signal from ordinary 12-lead ECG machine. The algorithm consists of signal processing, QRS detector and EDS values estimator. The estimator is based on the hypothesis that the respiration representative points are disposed around the preferred direction in 8-D space. When the respiratory direction is located, the method produces the EDR values. The respiratory waveform is obtained through the interpolation of such values. The performance of the algorithm had been tested with the real ECG data and compared with respiration data obtained using nasal thermistor under various breathing condition.
{"title":"Algorithm for respiration estimation from 12-lead ECG machine","authors":"P. Busono","doi":"10.1109/ICTS.2014.7010555","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010555","url":null,"abstract":"There are many techniques used for monitoring the respiratory signals, e.g., spirometer, nasal thermistor, strain gauge, and impedance plethysmography. Such techniques require special instruments. In this work, an ECG derived respiration (EDR) algorithm has been proposed for estimating the respiration signal from ordinary 12-lead ECG machine. The algorithm consists of signal processing, QRS detector and EDS values estimator. The estimator is based on the hypothesis that the respiration representative points are disposed around the preferred direction in 8-D space. When the respiratory direction is located, the method produces the EDR values. The respiratory waveform is obtained through the interpolation of such values. The performance of the algorithm had been tested with the real ECG data and compared with respiration data obtained using nasal thermistor under various breathing condition.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010469
Ika Nurlaili Isnainiyah, F. Samopa, Hatma Suryotrisongko, Edwin Riksakomara
Sleep deprivation condition might lead to falling asleep through inappropriate situations, such as driving. Driving in a state of fatigue or drowsy from lack of sleep will be far worse than driving after alcohol consumption. Hence, the authors develop a driving simulator using Java to modify the control and rules of “OpenDS” application in order to simulate and calculate the automatic “ReactionTest” for 25 respondents simulating in both normal conditions and sleepy conditions when driving. Through this study, the authors obtained that the difference of driving performance in terms of reaction rate when driving the car in sleep deprivation condition and the normal condition is equal to 1.08 seconds. The results also shown that the risk of loss of control that can occur to the driver of the car in units of meters (m), is equal to 0.3024 x the car's speed. This study aims to reduce the number of traffic accidents caused by sleep deprivation that occur in society by giving a recommendation to the driver that forced to drive in lack of sleep condition. In top of that, the authors propose to create an understanding for changing the social habits of driving toward a better way.
{"title":"Analysis of sleep deprivation effect to driving performance using reactiontest simulation","authors":"Ika Nurlaili Isnainiyah, F. Samopa, Hatma Suryotrisongko, Edwin Riksakomara","doi":"10.1109/ICTS.2014.7010469","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010469","url":null,"abstract":"Sleep deprivation condition might lead to falling asleep through inappropriate situations, such as driving. Driving in a state of fatigue or drowsy from lack of sleep will be far worse than driving after alcohol consumption. Hence, the authors develop a driving simulator using Java to modify the control and rules of “OpenDS” application in order to simulate and calculate the automatic “ReactionTest” for 25 respondents simulating in both normal conditions and sleepy conditions when driving. Through this study, the authors obtained that the difference of driving performance in terms of reaction rate when driving the car in sleep deprivation condition and the normal condition is equal to 1.08 seconds. The results also shown that the risk of loss of control that can occur to the driver of the car in units of meters (m), is equal to 0.3024 x the car's speed. This study aims to reduce the number of traffic accidents caused by sleep deprivation that occur in society by giving a recommendation to the driver that forced to drive in lack of sleep condition. In top of that, the authors propose to create an understanding for changing the social habits of driving toward a better way.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116794894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010557
R. Sarno, Putu Linda Indita Sari, Dwi Sunaryono, B. Amaliah, I. Mukhlash
Decision mining is a combination of process mining and machine learning algorithms to retrieve information on how data attributes in a business process affect routing of a case. It analyzes decision point by looking for XOR-splits in petri-net workflow model and examining rules for each choice based on available attributes using decision tree. The rules for each decision point are based on the attribute's influence to the case. Meanwhile, a non-free choice construct is a mixture of choice and synchronization, which will create limited choices in the workflow. The limitation of choice will then affect the rules found in non-free choice construct using decision mining technique. Limitation of rules makes it possible to examine the relation among rules in the workflow. The relation of these rules will emerge a certain property of a non-free choice construct. Rules for two decision points within a non-free choice construct will have similarities. Regarding to this, when the same rule is found during a decision mining process, we can determine that the decision points have a non-free choice relationship.
{"title":"Mining decision to discover the relation of rules among decision points in a non-free choice construct","authors":"R. Sarno, Putu Linda Indita Sari, Dwi Sunaryono, B. Amaliah, I. Mukhlash","doi":"10.1109/ICTS.2014.7010557","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010557","url":null,"abstract":"Decision mining is a combination of process mining and machine learning algorithms to retrieve information on how data attributes in a business process affect routing of a case. It analyzes decision point by looking for XOR-splits in petri-net workflow model and examining rules for each choice based on available attributes using decision tree. The rules for each decision point are based on the attribute's influence to the case. Meanwhile, a non-free choice construct is a mixture of choice and synchronization, which will create limited choices in the workflow. The limitation of choice will then affect the rules found in non-free choice construct using decision mining technique. Limitation of rules makes it possible to examine the relation among rules in the workflow. The relation of these rules will emerge a certain property of a non-free choice construct. Rules for two decision points within a non-free choice construct will have similarities. Regarding to this, when the same rule is found during a decision mining process, we can determine that the decision points have a non-free choice relationship.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126936584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010582
G. S. Budhi, Rudy Adipranata
In this research we developed an application for public facilities search with augmented reality technology so that search becomes easier and has an attractive interface. This application takes advantages of hardware that resides on the mobile device such as data connection, GPS, geomagnetic / digital compass and accelerometer. To perform a search, user directs the mobile device in the direction he wants and the application will display an icon of public facilities that are found and combined with real images coming from camera. Data residing on server and locally on mobile device so that applications can be run whether there is no internet connection. In order for local data on mobile devices are always up to date, application will synchronize with data contained on server.
{"title":"Public facilities location search with augmented reality technology in Android","authors":"G. S. Budhi, Rudy Adipranata","doi":"10.1109/ICTS.2014.7010582","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010582","url":null,"abstract":"In this research we developed an application for public facilities search with augmented reality technology so that search becomes easier and has an attractive interface. This application takes advantages of hardware that resides on the mobile device such as data connection, GPS, geomagnetic / digital compass and accelerometer. To perform a search, user directs the mobile device in the direction he wants and the application will display an icon of public facilities that are found and combined with real images coming from camera. Data residing on server and locally on mobile device so that applications can be run whether there is no internet connection. In order for local data on mobile devices are always up to date, application will synchronize with data contained on server.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010583
T. Usagawa, Yuhei Nakashima, Y. Chisaki, Takayuki Nagai, Toshihiro Kita
Students' attendance records of classes are primary and required data to manage a course and to take care of students, but a recording task causes extra burden and loss of lecturing time. An attendance management system using student identification card with IC chip has been proposed and implemented in several universities. Even those systems work well, there are obstacles to install them to other institutes such as an initial cost of systems and the modification costs for pre-installed systems such as an e-Learning system. This paper describes a new attendance management system on Moodle using Android devices as a reader of FeliCa(R) Common-use Format (FCF) type student identification card. The proposed system has been tested for a few courses of autumn semester in 2013 on test Moodle. Since spring semester in 2014, it is installed on campuswide Moodle system and works for one running course.
学生的出勤记录是管理课程和照顾学生的基本数据,但记录任务会造成额外的负担和讲课时间的损失。提出了一种基于IC芯片的学生证考勤管理系统,并在多所高校实施。即使这些系统运行良好,也存在将它们安装到其他学院的障碍,例如系统的初始成本和预先安装的系统(如电子学习系统)的修改成本。本文介绍了一种基于Moodle的新型考勤管理系统,该系统采用Android设备作为FeliCa(R) Common-use Format (FCF)型学生身份证的读卡器。该系统已在2013年秋季学期的几门课程中在Moodle上进行了测试。从2014年春季学期开始,安装在全校Moodle系统上,并为一门课程运行。
{"title":"An attendance management system for Moodle using student identification card and Android device","authors":"T. Usagawa, Yuhei Nakashima, Y. Chisaki, Takayuki Nagai, Toshihiro Kita","doi":"10.1109/ICTS.2014.7010583","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010583","url":null,"abstract":"Students' attendance records of classes are primary and required data to manage a course and to take care of students, but a recording task causes extra burden and loss of lecturing time. An attendance management system using student identification card with IC chip has been proposed and implemented in several universities. Even those systems work well, there are obstacles to install them to other institutes such as an initial cost of systems and the modification costs for pre-installed systems such as an e-Learning system. This paper describes a new attendance management system on Moodle using Android devices as a reader of FeliCa(R) Common-use Format (FCF) type student identification card. The proposed system has been tested for a few courses of autumn semester in 2013 on test Moodle. Since spring semester in 2014, it is installed on campuswide Moodle system and works for one running course.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010591
A. Alhogail, A. Mirza
The efficiency of various technical information security controls is based on the `people' who interact with the information every day. Information security culture aims at protecting information assets by guiding how things are done in organization in regard to information security through influencing employees' security behavior. This paper review key frameworks that were proposed in the literature in the period between the years 2003 and 2013, to establish and maintain information security culture inside organizations. The review draws the attention to the need for more investigation in the field to provide comprehensive frameworks for information security culture within organization. This paper attempts to propose one. The framework incorporates key change management principles and has five main dimensions that represent strategy, technology, organization, people and environment issues that affect the effective information security culture.
{"title":"A proposal of an organizational information security culture framework","authors":"A. Alhogail, A. Mirza","doi":"10.1109/ICTS.2014.7010591","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010591","url":null,"abstract":"The efficiency of various technical information security controls is based on the `people' who interact with the information every day. Information security culture aims at protecting information assets by guiding how things are done in organization in regard to information security through influencing employees' security behavior. This paper review key frameworks that were proposed in the literature in the period between the years 2003 and 2013, to establish and maintain information security culture inside organizations. The review draws the attention to the need for more investigation in the field to provide comprehensive frameworks for information security culture within organization. This paper attempts to propose one. The framework incorporates key change management principles and has five main dimensions that represent strategy, technology, organization, people and environment issues that affect the effective information security culture.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010573
R. E. Putra, H. Tjandrasa, N. Suciati
Diabetic Retinopathy is one of the complication diseases caused by diabetes mellitus. This disease attacks the retinal eye of human. There are three stages of this disease (mild, moderate and severe). Appearance of Hemorrhage is one of any symptoms included in Non Proliferative Diabetic Retinopathy. Hemorrhage appears on the second and third stages. This study is aimed to detect existences of hemorrhages. We employ morphological operations, filtering techniques, removing blood vessels and macula to detect them. This segmentation model achieves the best accuracy of 85.25% for the retinal images.
{"title":"Hemorrhage segmentation using mathematical morphology and digital image processing","authors":"R. E. Putra, H. Tjandrasa, N. Suciati","doi":"10.1109/ICTS.2014.7010573","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010573","url":null,"abstract":"Diabetic Retinopathy is one of the complication diseases caused by diabetes mellitus. This disease attacks the retinal eye of human. There are three stages of this disease (mild, moderate and severe). Appearance of Hemorrhage is one of any symptoms included in Non Proliferative Diabetic Retinopathy. Hemorrhage appears on the second and third stages. This study is aimed to detect existences of hemorrhages. We employ morphological operations, filtering techniques, removing blood vessels and macula to detect them. This segmentation model achieves the best accuracy of 85.25% for the retinal images.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-09-01DOI: 10.1109/ICTS.2014.7010581
Dyah Diwasasri Ratnaningtyas, K. Surendro
Hospital known as a public institution that provides health services and proper health facilities for the society. Because of the over-demand health services which not coupled with a proper health service system, the hospital feels overwhelmed to resolve it. Mainly, hospital already used Hospital Information System (HIS) as one of the biomedical engineering application for helping to manage the information flow. Biomedical engineering has a concern in the quality system that may impact in the safety and effectiveness over the health services in hospital. One of the key elements to determine the level of health service is information quality. By the improvement of information quality, the quality of health care would improve to support the patient's satisfaction. Six Sigma used as a for information quality to reduce information variance in health care. Prediction is also used to help develop a solution towards information quality problems.
{"title":"Information quality prediction model based on six sigma in biomedical engineering: A study of hospital information system in the immanuel hospital","authors":"Dyah Diwasasri Ratnaningtyas, K. Surendro","doi":"10.1109/ICTS.2014.7010581","DOIUrl":"https://doi.org/10.1109/ICTS.2014.7010581","url":null,"abstract":"Hospital known as a public institution that provides health services and proper health facilities for the society. Because of the over-demand health services which not coupled with a proper health service system, the hospital feels overwhelmed to resolve it. Mainly, hospital already used Hospital Information System (HIS) as one of the biomedical engineering application for helping to manage the information flow. Biomedical engineering has a concern in the quality system that may impact in the safety and effectiveness over the health services in hospital. One of the key elements to determine the level of health service is information quality. By the improvement of information quality, the quality of health care would improve to support the patient's satisfaction. Six Sigma used as a for information quality to reduce information variance in health care. Prediction is also used to help develop a solution towards information quality problems.","PeriodicalId":325095,"journal":{"name":"Proceedings of International Conference on Information, Communication Technology and System (ICTS) 2014","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122064475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}