Delfirman, Rudy G. Erwinsyah, B. As'adhanayadi, Nuzul Solekah, Ririn Purba
{"title":"Identifying Narrations on the Social Media Discourse of Moving the Indonesia's Capital City using Textual Network Analysis","authors":"Delfirman, Rudy G. Erwinsyah, B. As'adhanayadi, Nuzul Solekah, Ririn Purba","doi":"10.1109/ICISS55894.2022.9915085","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915085","url":null,"abstract":"The ratification of a law on the new State Capital of Indonesia (UU IKN/IKN Law) has sparked different narratives across the country, especially on social media. Some favor and some oppose the discourse on moving the state capital. We conducted research using the Textual Network Analysis (TNA) method with the social science approach to grasp this phenomenon. TNA is used to map the connection between words or narratives on social media and capture the discourse. Data was collected using web scraping on Twitter from January to February 2022. The analysis results show clear network polarization on the narratives in favor and opposed, marked by the dominance of publicly known actors' nodes. The involvement of actors in this narrative is identified as the use of identity politics to influence narratives in society. It caused the narratives of being in favor and opposed to being not yet substantial, implying there is no criticism or support regarding the vision of developing the nation's capital that carries the ideas of sustainable city, the principles of sustainable development, and smart city.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Research Study on User Satisfaction of PeduliLindungi Application","authors":"Anindito Pradeva Purwko, Firel Athalla Firsyada, Ravanka Bayhaqi, Natalia Limantara, S. Kom., Mmsi","doi":"10.1109/ICISS55894.2022.9915111","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915111","url":null,"abstract":"In the context of dealing with Covid-19, the PeduliLindungi application is a type of government policy that the people is obligated to use, has a feature such as vaccines, affected locations, and doctor consultations. Finding information on user satisfaction in the PeduliLindungi application is the focus of this paper due to the lack of understanding regarding the factors influencing satisfaction, As a result, the purpose of this research is to see if Usefulness, Ease of Use, and Ease of Learning have an impact on User Satisfaction in the PeduliLindungi application. An online questionnaire was used to collect 171 responses in order to evaluate the hypothesis. The significance value is calculated using SPSS after the data has been collected. When comparing Ease Of Use, Usefulness and Ease Of Learning, this study discovered that Ease Of Use is more influential, but when the three variables are combined, the result are even more influential. The findings of this study can be used by app developers to generate new apps that similar as PeduliLindungi.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125021119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Trespassing Detection using CCTV and Video Analytics for Safety and Security in Railway Stations","authors":"Hollyana Puteri Haryono, F. Hidayat","doi":"10.1109/ICISS55894.2022.9915245","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915245","url":null,"abstract":"Smart station has its concern to passengers safety and security as it is the fundamental needs of the passengers satisfaction. CCTV (circuit closed television) has been commonly used as surveillance system in public places including railway stations. CCTVs could be optimized using video analytics to automized surveillance using machine learning. Trespassing is one of threatening activities that is happening in railway stations. The objective of this paper is to add trespassing recognition feature to VIANA existing platform using YOLOv5 as the detection model and DeepSort as the tracking model.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121570404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ilhamsyah, Syahru Rahmayudha, Izhan Fakhruzi, Ferdy Febrianto, Ahmad Cahyono Adi, Veri Gunawan
{"title":"Recommendation System for the Improvement of E-Government Services in the Tourism Sector of Pontianak City","authors":"Ilhamsyah, Syahru Rahmayudha, Izhan Fakhruzi, Ferdy Febrianto, Ahmad Cahyono Adi, Veri Gunawan","doi":"10.1109/ICISS55894.2022.9915103","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915103","url":null,"abstract":"Complete e-government tourism information and services in one portal will make users get abundant information, so that users are confused in determining the right information particularly accommodation information for themselves when travelling. Therefore, a recommendation system is needed to assist users in filtering the abundant accommodation information and deciding what accommodation is needed. The recommendation system with the content-based filtering method provides good accommodation recommendations because it does not depend on other users, but by providing relevant recommendations by extracting content features so that new users can get the right recommendations. The test results showed that the recommendation system using the content-based filtering method has successfully provided accommodation recommendations for users appropriately with an average accuracy of 76.67%.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134133343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Penetration Testing on Web Application Using Insecure Direct Object References (IDOR) Method","authors":"I. Pratama, Alvin Maulana Rhusuli","doi":"10.1109/ICISS55894.2022.9915074","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915074","url":null,"abstract":"Security on a network is a crucial aspect along with the increase in the amount of data exchanged on the internet network. Every company or organization is required to be able to always maintain the confidentiality, integrity, and authentication of data on a web application according to international security standards. This is partly due to the increasing dependence of the community on a web application so that the overall security of the system must always be measured and improved. This paper examines the weaknesses and vulnerabilities of the web application by penetration testing using a method in the form of Insecure Direct Object References (IDOR), with a case study using one URL contained in the application. The test results obtained are the tested URLs then show vulnerabilities to Insecure Direct Object References (IDOR).","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134565648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Boltuino Platform Based Cognitive Irrigation System with Weather Adaptability for Efficient Water Use","authors":"Ashim Mondal, P. Dutta","doi":"10.1109/ICISS55894.2022.9915196","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915196","url":null,"abstract":"Crop production is perhaps one of the most challenging activities that one may undertake in today's world. Among the disadvantages of traditional farming methods main are the excessive water use during irrigation, the waste of time and capital, the reliance on nonrenewable energy sources and the requirement for human labor. To ensure the progress of the country, it is crucial that the agricultural sector is developed in a strategic manner. The purpose of this work is to design an Internet of Things-based cognitive system that has a substantial impact on water conservation. It is possible for farmers to access information on soil moisture, temperature, and humidity via the internet or their mobile devices, and the irrigation motor will automatically switched on and off in response to this data. Being able to control their irrigation systems from the comfort of their homes will be extremely beneficial to farmers in many ways. Farmer's time and labor will be saved, and the farmer will be sheltered from the heat and cold in both the summer and winter seasons. In addition, the proposed system has the capability to response towards the rain. On the basis of the rain data, the pump relay will be ON and OFF to ensure energy saving. The BOLT module has been used to collect real-time data on a variety of parameters as well as alert systems. Using the Arduino Uno and BOLT, the moniker “Boltuino” was coined for the project. Here, the proposed strategy is realised by means of an indoor farming setup. The collected data indicates significant water savings.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127661951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ramelan, Firmansyah Abada, M. Nizam, F. Adriyanto, M. E. Sulistyo, Chico Hermanu Brillianto Apribowo, Ayu Latifah
{"title":"Design and Simulation of The Multistage Constant-Current Charging System with Passive Balancing BMS for Lithium-Ion Batteries","authors":"A. Ramelan, Firmansyah Abada, M. Nizam, F. Adriyanto, M. E. Sulistyo, Chico Hermanu Brillianto Apribowo, Ayu Latifah","doi":"10.1109/ICISS55894.2022.9915193","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915193","url":null,"abstract":"Energy storage systems have been widely used in the electric vehicle and renewable energy systems. Lithium-Ion batteries are one type of widely used energy storage system. Lithium-Ion batteries are sensitive to over current, temperature, and voltage. An appropriate method in charging Lithium-Ion batteries is needed to ensure optimal battery performance and long battery life. The Multistage Constant-Current Charging System with Passive Balance BMS for Lithium-Ion batteries is expected to be a solution for charging Lithium-Ion batteries fast but still under the characteristics of Lithium-Ion batteries. Multi Stage Constant Current Charging with Passive Balance BMS for Lithium-Ion batteries utilizes a boost converter circuit in the charging process and maintains current values as needed. Besides, it also uses the Switching Shunt Resistor method in the BMS passive balance process.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121151807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nusrat Jahan Sinthiya, T. Chowdhury, Akm Bahalul Haque
{"title":"Incorporating Machine Learning Algorithms to Detect Phishing Websites","authors":"Nusrat Jahan Sinthiya, T. Chowdhury, Akm Bahalul Haque","doi":"10.1109/ICISS55894.2022.9915211","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915211","url":null,"abstract":"The emergence of smart cities and widespread acceptance of smart applications have altered our lives. The surge in internet usage has accelerated our transition into a cyberworld. While the Internet has become an indispensable part of our lives, security breaches like phishing websites have grown as a significant concern. It is an illegal action that involves tricking individuals & luring them to disclose their sensitive information, resulting in substantial financial loss or identity theft. Therefore, a dependable and consistent detection method for phishing websites is required. Due to the dynamic nature of machine learning, it has been widely utilized for distinguishing between phishing and legitimate sites. Hence, several Machine Learning techniques were examined as part of this research, including Gradient Boosting, K nearest neighbors (KNN), Random Forest (RF), Support Vector Machine (SVM), Logistic Regression, and Decision Tree (DT). We evaluated the outcomes through model classification performance indicators. Each model was analyzed based on Accuracy Score, Precision, Recall & F-measure. Random Forest outperformed all other classifiers in terms of accuracy, achieving a score of 96.52% overall.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"399 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Smart Helmet Integrated with Motorcycles to Support Rider Awareness and Safety Based Internet of Things","authors":"Somantri, Indra Yustiana","doi":"10.1109/ICISS55894.2022.9915262","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915262","url":null,"abstract":"The rise of cases of theft and robbery of motorcycles requires vehicle owners to increase vigilance. Various ways have been done to prevent the theft and robbery of motorbikes, for example, by using a lot of locks and alarms. Unfortunately, some of these methods cannot overcome the rampant motorcycle theft today. In addition, the awareness of motorcyclists on the use of helmets is currently very minimal, so if a motorcyclist gets into a serious accindent without wearing a helmet, it can be fatal. This paper aims to design and manufacture a helmet prototype for safety riders and anticipate current conditions. This smart helmet is integrated with the motorcycle engine. The motorcycle engine will not turn off if it is far from the smart helmet, and this smart helmet will report the incident and detect the location of the incident to none of the registered cellphones. In addition, this helmet can also ensure that the rider cannot operate his motorbike without using it. This Smart Helmet is designed based on IoT using a wireless module to connect to the motorcycle engine, a GSM module for an alarm and notification system, and a GPS module to unify events with latitude and longitude coordinates. Smart helmets have been successfully integrated with motorcycle electricity","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125855509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moh Aqsa Almubaraks, Risma Nur Dayamanti, Luthfi Ramadani
{"title":"Applying Action Design Research to Digital Social Innovation: A Case of Automated Flood Detection System in Rural Region","authors":"Moh Aqsa Almubaraks, Risma Nur Dayamanti, Luthfi Ramadani","doi":"10.1109/ICISS55894.2022.9915204","DOIUrl":"https://doi.org/10.1109/ICISS55894.2022.9915204","url":null,"abstract":"Digital Social Innovation (DSI) is an action-oriented initiative aiming to tackle social challenges by introducing digital technologies. However, the extant literature tends to focus on the technological output of innovation and less on the methodological domain, particularly regarding the in-depth engagement with the social context, which hinders the construction of emergent social knowledge. This study presents a showcase of how Action Design Research (ADR) can be a promising methodological endeavor to a digital social innovation project. Based on a DSI project on the development of an automated flood detection system in a rural village in Indonesia, we show how innovation can be enacted as a collaborative and reflective process between the innovators and the community, which further enables us to formalize an understanding of the social context in innovation. This study elaborates the methodological guidelines to DSI while also reveals the contextual differences inherent to bottom-level development of a nation, in which formal and informal social actors at the village level both take the same role in assisting national endeavor toward development.","PeriodicalId":125054,"journal":{"name":"2022 International Conference on ICT for Smart Society (ICISS)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126927244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}