Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234301
Rahmat Awaludin Rizal, R. Sarno, Kelly Rossa Sungkono
The information and communication technology development has increased to fulfil processes of an organization. It needs to be structured to create a clean, competent, evident and liable government and a quality and reliable civil service. With the existence of a system of electronic-based government system (SPBE), one of the regional governments that implemented SPBE is East Java Province by generating SPBE index value of 2.92. The SPBE value shows the SPBE implementation quality is still below the expected value, which is 3. By using COBIT 5 Framework, this research obtains levels of selected process capabilities, i.e. EDM05, APO01, APO04, APO06, are below 3rd level (Established). This research also gives recommendations for improving the level of the process capability.
{"title":"COBIT 5 for Analysing Information Technology Governance Maturity Level on Masterplan E-Government","authors":"Rahmat Awaludin Rizal, R. Sarno, Kelly Rossa Sungkono","doi":"10.1109/iSemantic50169.2020.9234301","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234301","url":null,"abstract":"The information and communication technology development has increased to fulfil processes of an organization. It needs to be structured to create a clean, competent, evident and liable government and a quality and reliable civil service. With the existence of a system of electronic-based government system (SPBE), one of the regional governments that implemented SPBE is East Java Province by generating SPBE index value of 2.92. The SPBE value shows the SPBE implementation quality is still below the expected value, which is 3. By using COBIT 5 Framework, this research obtains levels of selected process capabilities, i.e. EDM05, APO01, APO04, APO06, are below 3rd level (Established). This research also gives recommendations for improving the level of the process capability.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234264
Nadia Salsabila, R. A. Palembiya, K. R. Sungkono, R. Sarno
Event log records all events of performed business process on the system. Analysts used the event log to detect occurred anomalies, one of which is wrong pattern, in the process. However, there are conditions, i.e. skip condition, redo condition, and switch condition, which can be misinterpreted as wrong pattern. Uniquely, those conditions cannot be depicted in the reference model without utilizing additional tasks, namely invisible tasks. This research proposes rules which can check the wrong pattern in the process model containing those conditions. This research automatically formed declarative miner rules carrying invisible tasks based on a process model. The form of the used process model in this research is a graph model. Then, the rules are used to checking the wrong pattern. The experiment uses real data, i.e. port-container handling processes, and several simulation data. The analysis explains that declarative miners have 100% accuracy to check the wrong pattern in the process model that contains each invisible task including skip condition, redo condition, and switch condition.
{"title":"Checking Wrong Pattern in Process Model Containing Invisible Task by Using Declarative Miner","authors":"Nadia Salsabila, R. A. Palembiya, K. R. Sungkono, R. Sarno","doi":"10.1109/iSemantic50169.2020.9234264","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234264","url":null,"abstract":"Event log records all events of performed business process on the system. Analysts used the event log to detect occurred anomalies, one of which is wrong pattern, in the process. However, there are conditions, i.e. skip condition, redo condition, and switch condition, which can be misinterpreted as wrong pattern. Uniquely, those conditions cannot be depicted in the reference model without utilizing additional tasks, namely invisible tasks. This research proposes rules which can check the wrong pattern in the process model containing those conditions. This research automatically formed declarative miner rules carrying invisible tasks based on a process model. The form of the used process model in this research is a graph model. Then, the rules are used to checking the wrong pattern. The experiment uses real data, i.e. port-container handling processes, and several simulation data. The analysis explains that declarative miners have 100% accuracy to check the wrong pattern in the process model that contains each invisible task including skip condition, redo condition, and switch condition.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115217750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234255
Prima R. Maulidina, R. Sarno, K. R. Sungkono, Tantya A. Giranita
This study aims to discover the factors that influence users in using Shopee e-commerce. One of the ways to know the contributing factor that influences users is the Unified Theory of Acceptance and Usage of Technology 2 (UTAUT2). UTAUT2 is a known model that could determine the factors thoroughly. However, this study uses seven constructs from UTAUT2 with two additional constructs. For this, the study has targeted 160 Indonesian respondents who have done transactions on Shopee e-commerce in Indonesia. Furthermore, data analysis in this study used Partial Least Squares-Structural Equation Model (PLS-SEM) on SmartPLS software due to its ability to analyze data with a small sample size, even if the model used is complex. The results show that Habit and Trust in Interest are significantly influencing Behavioral Intention. In contrast, other factors such as Hedonic Motivation, Effort Expectancy, Facilitating Conditions, Performance Expectancy, Social Influence, Price Value, and Perceived Transaction Risk do not significantly influence Behavioral Intention in using Shopee. Moderating variables like age, gender, and experience do not significantly influence the relationship between independent variables and Behavioral Intention of users. The extension of the original constructs from UTAUT2 with two additional constructs from two previous studies is the novelty contribution in this study.
{"title":"Using Extended UTAUT2 Model to Determine Factors Influencing the Use of Shopee E-commerce","authors":"Prima R. Maulidina, R. Sarno, K. R. Sungkono, Tantya A. Giranita","doi":"10.1109/iSemantic50169.2020.9234255","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234255","url":null,"abstract":"This study aims to discover the factors that influence users in using Shopee e-commerce. One of the ways to know the contributing factor that influences users is the Unified Theory of Acceptance and Usage of Technology 2 (UTAUT2). UTAUT2 is a known model that could determine the factors thoroughly. However, this study uses seven constructs from UTAUT2 with two additional constructs. For this, the study has targeted 160 Indonesian respondents who have done transactions on Shopee e-commerce in Indonesia. Furthermore, data analysis in this study used Partial Least Squares-Structural Equation Model (PLS-SEM) on SmartPLS software due to its ability to analyze data with a small sample size, even if the model used is complex. The results show that Habit and Trust in Interest are significantly influencing Behavioral Intention. In contrast, other factors such as Hedonic Motivation, Effort Expectancy, Facilitating Conditions, Performance Expectancy, Social Influence, Price Value, and Perceived Transaction Risk do not significantly influence Behavioral Intention in using Shopee. Moderating variables like age, gender, and experience do not significantly influence the relationship between independent variables and Behavioral Intention of users. The extension of the original constructs from UTAUT2 with two additional constructs from two previous studies is the novelty contribution in this study.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121537384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234269
Ilham Cahya Suherman, R. Sarno, Sholiq
One of Project Manager early activity is to estimate time, and cost based on given scope, which can help project manager to plan schedule and used resources. Estimation is very important in project management because a bad result of estimation will result in bad management of project and may cause failure. There are methods that can be used to estimate software development effort; COCOMO II is one method that commonly used. Many researcher before have been used algorithm, such as Bat, Bee Colony, or MOPSO to increase COCOMO II estimation accuracy. However, as the technology advanced, there are a lot more options that can be used to predict software effort estimation based on COCOMO, such as machine learning. In this paper, we compare machine learning algorithm with tuning parameter method to know whether tuning parameter estimation is better than machine learning estimation or vice versa. In this paper, we use Random Forest Regression as machine learning algorithm to estimate the effort. We also compare it with another machine learning algorithm, Support Vector Regression, and Bee Colony Method as parameter tuning method. The results of experiment is evaluated by their error rate. The results show that Random Forest Regression is better than Support Vector Regression and Bee Colony Method.
{"title":"Implementation of Random Forest Regression for COCOMO II Effort Estimation","authors":"Ilham Cahya Suherman, R. Sarno, Sholiq","doi":"10.1109/iSemantic50169.2020.9234269","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234269","url":null,"abstract":"One of Project Manager early activity is to estimate time, and cost based on given scope, which can help project manager to plan schedule and used resources. Estimation is very important in project management because a bad result of estimation will result in bad management of project and may cause failure. There are methods that can be used to estimate software development effort; COCOMO II is one method that commonly used. Many researcher before have been used algorithm, such as Bat, Bee Colony, or MOPSO to increase COCOMO II estimation accuracy. However, as the technology advanced, there are a lot more options that can be used to predict software effort estimation based on COCOMO, such as machine learning. In this paper, we compare machine learning algorithm with tuning parameter method to know whether tuning parameter estimation is better than machine learning estimation or vice versa. In this paper, we use Random Forest Regression as machine learning algorithm to estimate the effort. We also compare it with another machine learning algorithm, Support Vector Regression, and Bee Colony Method as parameter tuning method. The results of experiment is evaluated by their error rate. The results show that Random Forest Regression is better than Support Vector Regression and Bee Colony Method.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115513682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234226
Hadapininglaksmi Astri Purwanithami, Christy Atika Sari, E. H. Rachmawanto, De Rosal Ignatius Moses Setiadi
Hemorrhage Diabetic Retinopathy is a type of diabetes that attacks the blood vessels of the retina. This disease can cause blindness, but early treatment can minimize this. This research proposes a method of detecting blood vessels in the retina caused by Hemorrhage Diabetic Retinopathy. Detection is based on the Fundus image based on several stages of preprocessing, segmentation, and detection. At the preprocessing stage, the fundus image with the RGB image format is taken the green channel to do a contrast enhancement operation with CLAHE and segmentation with FCM. Then the detection is done using the Neural Network method. At the experimental stage, 100 testing images are used which are divided into two classes, namely Hemorrhage and Non-Hemorrhage. Detection results showed from 100 images, only one image was detected incorrectly, so it can be concluded that the detection accuracy reached 99%.
{"title":"Hemorrhage Diabetic Retinopathy Detection based on Fundus Image using Neural Network and FCM Segmentation","authors":"Hadapininglaksmi Astri Purwanithami, Christy Atika Sari, E. H. Rachmawanto, De Rosal Ignatius Moses Setiadi","doi":"10.1109/iSemantic50169.2020.9234226","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234226","url":null,"abstract":"Hemorrhage Diabetic Retinopathy is a type of diabetes that attacks the blood vessels of the retina. This disease can cause blindness, but early treatment can minimize this. This research proposes a method of detecting blood vessels in the retina caused by Hemorrhage Diabetic Retinopathy. Detection is based on the Fundus image based on several stages of preprocessing, segmentation, and detection. At the preprocessing stage, the fundus image with the RGB image format is taken the green channel to do a contrast enhancement operation with CLAHE and segmentation with FCM. Then the detection is done using the Neural Network method. At the experimental stage, 100 testing images are used which are divided into two classes, namely Hemorrhage and Non-Hemorrhage. Detection results showed from 100 images, only one image was detected incorrectly, so it can be concluded that the detection accuracy reached 99%.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121557856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234195
Renny Rakhmawati, S. Suhariningsih, Silvia Husniatuzzahro’
Motorcycle is one of the many private transportation facilities that currently. Unfortunately motorcycles still use energy from fossil fuels which are increasingly rare and not environmentally friendly. So now many developed environmentally friendly electric vehicles from renewable sources. But the battery charging process is needed as energy storage. So this paper offers a flyback converter method that is controlled by fuzzy logic controller. In the battery charging process, the values of Vin, Iin, Vout, and Iout are monitored with an output voltage target of 14.4 V. The fuzzy logic controller can control the output voltage is 14.37 Vdc with error voltage 0.208%.
{"title":"Design Flyback Converter For Charging Battery using Fuzzy Logic Controller","authors":"Renny Rakhmawati, S. Suhariningsih, Silvia Husniatuzzahro’","doi":"10.1109/iSemantic50169.2020.9234195","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234195","url":null,"abstract":"Motorcycle is one of the many private transportation facilities that currently. Unfortunately motorcycles still use energy from fossil fuels which are increasingly rare and not environmentally friendly. So now many developed environmentally friendly electric vehicles from renewable sources. But the battery charging process is needed as energy storage. So this paper offers a flyback converter method that is controlled by fuzzy logic controller. In the battery charging process, the values of Vin, Iin, Vout, and Iout are monitored with an output voltage target of 14.4 V. The fuzzy logic controller can control the output voltage is 14.37 Vdc with error voltage 0.208%.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115363377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234224
L. Gumilar, Mokhammad Sholeh
Power plants using fossil fuel are always used to meet the needs of the load at any time. However fossil fuels can cause air pollution. An alternative that can be used to reduce fossil energy is renewable energy source type of wind power plant (WPP). Currently WPP is only limited to reducing the use of fossil fuels and it has not been able to replace fossil energy sources. Because the power generated by WPP is still small capacity. For this reason, it is necessary to carry out continuous research on WPP to increase output power. This paper aims to determine the impact of the horizontal wind turbine blade length to output power and torque. In the method, the length of the turbine blade is varied, so there is also a change in the sweep area value. The effect of swept area, wind speed, turbine rotation speed, and Cp on the output power and torque is presented in curve. The results of the simulation are the highest power and torque at the blade length of 5 m. The highest power obtained is 69.74 kW, and the highest turbine torque is 66.9 kN.m. The longer the turbine blade, the higher the wind turbine power and torque.
{"title":"Impact of Blade Length on the Horizontal Wind Turbine Output Power and Torque","authors":"L. Gumilar, Mokhammad Sholeh","doi":"10.1109/iSemantic50169.2020.9234224","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234224","url":null,"abstract":"Power plants using fossil fuel are always used to meet the needs of the load at any time. However fossil fuels can cause air pollution. An alternative that can be used to reduce fossil energy is renewable energy source type of wind power plant (WPP). Currently WPP is only limited to reducing the use of fossil fuels and it has not been able to replace fossil energy sources. Because the power generated by WPP is still small capacity. For this reason, it is necessary to carry out continuous research on WPP to increase output power. This paper aims to determine the impact of the horizontal wind turbine blade length to output power and torque. In the method, the length of the turbine blade is varied, so there is also a change in the sweep area value. The effect of swept area, wind speed, turbine rotation speed, and Cp on the output power and torque is presented in curve. The results of the simulation are the highest power and torque at the blade length of 5 m. The highest power obtained is 69.74 kW, and the highest turbine torque is 66.9 kN.m. The longer the turbine blade, the higher the wind turbine power and torque.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125690346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234278
Agustinus Rudatyo Himamunanto, Supriadi Rustad, M. Arief Soeleman, Guruh Fajar Sidhik
Hand gesture dataset is a collection of hand gesture images. Several hand gesture datasets are freely available and can be used for various purposes, such as comparison or method testing. Processing the distribution of hand gesture image quality in the dataset has the opportunity to find potential models of hand gesture image quality for further research. This study tries to provide answers by exploring the quality of hand gesture images based on various datasets of public hand gestures. Then perform feature extraction based on the image histogram profile to get an overview of the range of color intensity values from the hand gesture image. The Herarchical Clustering method is used to build clusters based on histogram characteristics. The feasibility of the relationship between clusters was tested based on the silhouette index clustering method. The total number of hand gesture test images is 16 thousand data taken from 6 dataset sources that have been used in hand gesture recognition research. Based on the results of the processing, it is shown that the three clusters have no relationship feasibility or in other words the image clusters are independent.
{"title":"Silhouette Analysis of Hand Gesture Dataset Using Histogram Profile Feature Extraction","authors":"Agustinus Rudatyo Himamunanto, Supriadi Rustad, M. Arief Soeleman, Guruh Fajar Sidhik","doi":"10.1109/iSemantic50169.2020.9234278","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234278","url":null,"abstract":"Hand gesture dataset is a collection of hand gesture images. Several hand gesture datasets are freely available and can be used for various purposes, such as comparison or method testing. Processing the distribution of hand gesture image quality in the dataset has the opportunity to find potential models of hand gesture image quality for further research. This study tries to provide answers by exploring the quality of hand gesture images based on various datasets of public hand gestures. Then perform feature extraction based on the image histogram profile to get an overview of the range of color intensity values from the hand gesture image. The Herarchical Clustering method is used to build clusters based on histogram characteristics. The feasibility of the relationship between clusters was tested based on the silhouette index clustering method. The total number of hand gesture test images is 16 thousand data taken from 6 dataset sources that have been used in hand gesture recognition research. Based on the results of the processing, it is shown that the three clusters have no relationship feasibility or in other words the image clusters are independent.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234270
Paminto Agung Christianto, E. Sediyono, I. Sembiring
The successful rate of In Vitro Fertilization (IVF) in Indonesia is around 29%, which is considered low. One of the factors causing the IVF failure is anxiety. About 77.7% of IVF patients have a high anxiety, and 83.3% of IVF patients experienced an IVF failure. The long duration of waiting the answer from the fertility doctors become one cause of the anxiety in IVF patients. On the other hand, the fertility doctors themselves have other responsibilities that cause IVF patients questions are not able to be given immediately. The study focused on the problems of the IVF patients and the fertility doctors.This research uses triangulation to obtain valid data and include challenges in developing health sector systems. To test the effect of IVF patients on the proposed intelligent system, Anova testing has been carried out resulting in a value of F = 9,902 and a Coefficient test that produces a value of t = 3,147, so the test results provide evidence that IVF patient feedback has an effect on improving the quality of the intelligent system handling IVF patients post embryo transfer. The final results of the research have provided a case-based reasoning (CBR) modification recommendation for an intelligent system for handling IVF patients after embryo transfer.
{"title":"Case-Based Reasoning Modifications for Intelligent Systems in Handling In Vitro Fertilization (IVF) Patients Post Embryo Transfer","authors":"Paminto Agung Christianto, E. Sediyono, I. Sembiring","doi":"10.1109/iSemantic50169.2020.9234270","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234270","url":null,"abstract":"The successful rate of In Vitro Fertilization (IVF) in Indonesia is around 29%, which is considered low. One of the factors causing the IVF failure is anxiety. About 77.7% of IVF patients have a high anxiety, and 83.3% of IVF patients experienced an IVF failure. The long duration of waiting the answer from the fertility doctors become one cause of the anxiety in IVF patients. On the other hand, the fertility doctors themselves have other responsibilities that cause IVF patients questions are not able to be given immediately. The study focused on the problems of the IVF patients and the fertility doctors.This research uses triangulation to obtain valid data and include challenges in developing health sector systems. To test the effect of IVF patients on the proposed intelligent system, Anova testing has been carried out resulting in a value of F = 9,902 and a Coefficient test that produces a value of t = 3,147, so the test results provide evidence that IVF patient feedback has an effect on improving the quality of the intelligent system handling IVF patients post embryo transfer. The final results of the research have provided a case-based reasoning (CBR) modification recommendation for an intelligent system for handling IVF patients after embryo transfer.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131407387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-09-19DOI: 10.1109/iSemantic50169.2020.9234253
A. S. Shahab, R. Sarno
The Attendance system, especially in companies is needed to help assess the attendance and discipline of employees. Some attendance systems that have been made based on the detection of biometrics, barcodes, and QR Codes have not been able to simplify the attendance process where employees still have to queue in front of the attendance machine. This paper aims to design an attendance system that flexible which can simplify and speed up the process by using a mobile application based on geofencing and face recognition so the company does not need to expend the extra cost to buy dedicated machine. The system is using a mobile application as a device to presence. Each of the employees has their own geofencing area which worked as a location virtual boundary. The employee face images are sent to the server from mobile application for the attendance process which includes a recognition process using k-Nearest Neighbours (k-NN) and Principal Component Analysis (PCA). The results obtained are using face recognition k-NN and PCA obtained a 90% accuracy rate with a processing time of 1.5 seconds. The fastest time to do a complete presence is 3.4s which include a geofencing authentication and face recognition process.
{"title":"Android Application for Presence Recognition based on Face and Geofencing","authors":"A. S. Shahab, R. Sarno","doi":"10.1109/iSemantic50169.2020.9234253","DOIUrl":"https://doi.org/10.1109/iSemantic50169.2020.9234253","url":null,"abstract":"The Attendance system, especially in companies is needed to help assess the attendance and discipline of employees. Some attendance systems that have been made based on the detection of biometrics, barcodes, and QR Codes have not been able to simplify the attendance process where employees still have to queue in front of the attendance machine. This paper aims to design an attendance system that flexible which can simplify and speed up the process by using a mobile application based on geofencing and face recognition so the company does not need to expend the extra cost to buy dedicated machine. The system is using a mobile application as a device to presence. Each of the employees has their own geofencing area which worked as a location virtual boundary. The employee face images are sent to the server from mobile application for the attendance process which includes a recognition process using k-Nearest Neighbours (k-NN) and Principal Component Analysis (PCA). The results obtained are using face recognition k-NN and PCA obtained a 90% accuracy rate with a processing time of 1.5 seconds. The fastest time to do a complete presence is 3.4s which include a geofencing authentication and face recognition process.","PeriodicalId":345558,"journal":{"name":"2020 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}