{"title":"Development of a Web-based Microlecture Mobile Learning System","authors":"Y. Rosmansyah, Dede Hamdani, Akhmad Bakhrun","doi":"10.1109/ICISS48059.2019.8969792","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969792","url":null,"abstract":"The presence of multimedia and distance education is expected to have a great impact on the improvement of students’ knowledge. Microlecture mobile learning (mm-learning) is a multimedia learning technique that can be accessed via mobile devices such as laptops, smartphones, and tablet computers. Developing mm-learning system that can be accessed anywhere and anytime is aimed to increase the knowledge, add new insights, and provide a different learning experience to the students without being limited by time and place. Mm-learning development design is based on the concepts of microlecture and mobile learning. Dick & Carey instructional design model with ADDIE stages (Analysis, Design, Development, Implementation and Evaluation) is adopted in development a system prototype. The prototype is then evaluated in an computing polytechnic by way of questionnaires and exam scores. The overall students’ perception scores from using the prototype is 4.28, whereas that from the traditional learning is 3.29 (out of 5). Further, the overall results of students’ test scores significantly differ with a value of sig. equals 0,000.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125277660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dwiyan Rezkia Putra, Bayu Anggorojati, Ardhi Putra Pratama Hartono
{"title":"Blockchain and smart-contract for scalable access control in Internet of Things","authors":"Dwiyan Rezkia Putra, Bayu Anggorojati, Ardhi Putra Pratama Hartono","doi":"10.1109/ICISS48059.2019.8969807","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969807","url":null,"abstract":"Managing security access control has been becoming one of the open issues in Internet of Things (IoT) since the idea of IoT was introduced. The reasons being that the IoT system is built upon large numbers of constrained devices, with limited power, computing resources, and memory. Therefore, the access management needs to be highly distributed in order to ensure the scalability when many IoT nodes are connected in the system, and the cryptographic operation and other algorithms performed along with the access control mechanism have to be lightweight to fit the constrained device characteristics of IoT. The existing access controls proposed for IoT, such as Role-based Access Control (RBAC), Attribute-based Access Control (ABAC) and Capability-based Access Control (CapBAC) are not truly distributed. As for the resource limitation in the IoT devices, recent developments of more powerful microprocessors or System on Chip (SoC) allow advanced cryptographic implementation on the chip itself, e.g. public key cryptography, with the cost of performance degradation. Recently, blockchain technology which is based on distributed ledger system, gains a lot of attention from the industries and researchers. Coupled with the smart contract and various distributed consensus mechanisms, blockchain can be a good solution for providing distributed access control in IoT. This paper proposed an architecture and mechanism of blockchain and smart-contract based access control for IoT. A proof-of-concept is implemented to validate the proposed idea and its performance is evaluated to gain some preliminary sights for further developments.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125420441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"API Integration of National Complaint Handling System in Indonesia: A State of The Art Review","authors":"A. E. Abbas","doi":"10.1109/ICISS48059.2019.8969837","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969837","url":null,"abstract":"In the new global economy, public service has become a central matter for achieving sustainability. The way in which public service provider handling either feedbacks or complains become a major key success factor to consider the successfulness of its service. The Government of Indonesia has established SP4N-LAPOR! (National Complaint Handling System) since 2013 to become the first national centralized complaint-handling channel. One major issue in centralized national complaint handling system is Unintegrated System; Duplication with existing local institution application or system. The specific objective of this study was to identify the state of the art of API Integration of SP4N-LAPOR!The researcher has utilized historical analysis to extract the pattern from API Integration. The project used a convenience sample of three months API integration consist of the total complaints generated from parent vs client apps. The findings reported here shed new light on pattern identified as such: 1) Twitter API, 2) Parent domination, 3) Client domination, 4) Balanced proportion and 5) Embed HTML. One of the more significant findings to emerge from this study is that the definition of integration stage: a) partial integration 1, b) partial integration 2, and c) full integration.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122235731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Augmented Method of Selecting Fashion Talent by Adding Social Media Characteristic","authors":"Dwita Adilah, A. Alamsyah","doi":"10.1109/ICISS48059.2019.8969834","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969834","url":null,"abstract":"Fashion model plays an important role in presenting designer’s work by showing how the cut of fabric interplayed with the body. In selecting the fashion models, the agency considers physical characteristics that express the aesthetic. Another subjective advantage of fashion model is the appearance on professional network. However, the emerging of social media culture has revolutionized fashion industry in producing and consuming fashion. In term of fashion modelling, social media open the opportunities for talent to \"breaking in\" and \"getting discovered\". Prior research has dealt with predicting success based on social media presence. Thus, in this paper we construct additional social media activity to predict a fashion model success. We examine prediction using classification task by utilizing Random Forest and Support Vector Machine. Our research finds that social media activity improves the accuracy by 4.55% increasing up to 84.55% performed by Random Forest.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Gunawan, Nayaka Suranadi Tama, R. Nurjannah, Ulfah Fauziyah, A. Fajar, Nunung Nurul Qomariyah
{"title":"WELTY System Design Based on Service Oriented Architecture for Smart HealthCare","authors":"L. Gunawan, Nayaka Suranadi Tama, R. Nurjannah, Ulfah Fauziyah, A. Fajar, Nunung Nurul Qomariyah","doi":"10.1109/ICISS48059.2019.8969829","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969829","url":null,"abstract":"Health is a basic need for humans to live. Personal health is obtained by maintaining regular diet and exercise. However, because of the lack of public knowledge about balanced food intake and calorie requirements for daily activities, it is difficult for the community to determine the amount of calories consumed and burned. The author proposes the concept of a system that integrates Service Oriented Architecture (SOA)-based gym and logistics to solve this problem. This research methodology uses a systematic literature review. The results of this study are the big picture of service-based architecture which consists of nine layers, namely profile, order, catalog, payment, shipping, chat, diary, promotion and gym inventory.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124386507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing Blokchain Size Using Complementary Block","authors":"D. E. Saputra, S. Sutikno, S. Supangkat","doi":"10.1109/ICISS48059.2019.8969790","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969790","url":null,"abstract":"The size, especially the growth rate, of blockchain has been a major problem since its introduction in 2008. A common blockchain scheme will have exponential growth rate that affect the scalability of blockchain. To overcome this problem, complementary block is proposed. The blockchain is split into multiple chain where each block in a chain is a complementary of a block in another chain. The result shows that complementary block have smaller growth rate compared to original blockchain scheme. Despite its small data duplication, the complementary block still retains the same integrity level as the original blockchain.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122012117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. N. Utama, Rekha Ariyadi, Iqbal Hadi, Muhamad Rizaldi Seputra, Yanto Setiawan
{"title":"Fuzzy-DSM for Evaluating Waste’s Hazardousness","authors":"D. N. Utama, Rekha Ariyadi, Iqbal Hadi, Muhamad Rizaldi Seputra, Yanto Setiawan","doi":"10.1109/ICISS48059.2019.8969836","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969836","url":null,"abstract":"Waste, without good management for treating, is able to influence environment and human health negatively. This condition needs extraordinary effort to handle. The study was performed to construct a decision support model (DSM) for evaluating waste’s hazardous level. Via combined methods fuzzy-logic and analytic hierarchical process (AHP), a DSM finally was able to be developed. Two main criteria and six sub-criteria are considered to become fundamental part of the model. The model was experimented thru four types of waste; and conclusively, industrial waste water has been the most unsafe waste for both health and environment.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131396640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atika Rahmawati Yuliantoputri, Wardani Muhamad, S. Suhardi
{"title":"Smart Classroom Services System Design Based on Services Computing System","authors":"Atika Rahmawati Yuliantoputri, Wardani Muhamad, S. Suhardi","doi":"10.1109/ICISS48059.2019.8969809","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969809","url":null,"abstract":"Smart Classroom is defined as a concept that supposed to accommodate synchronous and asynchronous learning using technology that integrates traditional and distance learning to cover its learning services by using artificial intelligence-based technology. The smart classroom also utilizes the connection of smart devices as a support so that teachers and students can approach various learning styles, participate interactively and share content. While the current smart classroom system mostly provide classroom environment, the proposed design of the smart classroom in this research will be consisted of designing a smart classroom system that covers distance learning activities under Smart Learning System (SLS) and in-class learning activities in Smart Teaching Environment (STE).SLS facilitates distance learning by enabling interactive teaching, customized learning, learning analysis, and ease of document access. STE is a class environment that utilizes a variety of smart devices to support in-class learning activities. By using Service Computing System Engineering Framework, SLS and STE will be integrated to fulfill the need for learning activities alignment in our education system by creating service innovation of smart attendance. While in-class students’ attendance will be recorded by existing attendance recording methods, distance learning students’ attendance will be recorded by applying smart attendance in SLS utilizing artificial intelligence to trigger randomized pop-up quizzes for attendance evidence. The result of the randomized quiz submissions will be validated for attendance student report based on defined parameters of class attendance. This proposed design of the smart classroom will be evaluated by calculating the cohesion and coupling degrees as evaluation principles for service-oriented software design. In conclusion, the proposed smart classroom has a main vision to ease the implementation of learning activities within in-class and distance learning by integrating STE and SLS to provide a valid attendance record for student and education system regulation.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132098151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Building Corpora of Spoken Filipino Words Using Speech Segmentation with Automatic Labeling","authors":"Felizardo C. Reyes, Arnel C. Fajardo","doi":"10.1109/ICISS48059.2019.8969813","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969813","url":null,"abstract":"There are hardly any open access speech corpora in Filipino that are structured and can be used to train speech recognition systems that utilize deep learning models. The existing data sets of audios in Filipino language are in forms that require pre-processing and cleansing. This paper proposed a method that would allow building up of Filipino words corpora which can be used as data set for deep learning speech recognition systems. The method utilized speech segmentation technique to extract words from a sound file composed of sentences, words, and syllables. Three trials with variances on the length of silence were conducted to increase accuracy of segmentation and create a more robust Filipino words corpus. Using several Python tools combined with Google Cloud Speech Recognition Application Program Interface, automatic speech segmentation with automatic labeling for Filipino language was achieved with 95% accuracy.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132263175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Smart Mobile Application to Detect Fraud Theft of E-Banking Access Based on SOA In Indonesia","authors":"Lazuardi Ridho Maulana, A. Fajar, Meyliana","doi":"10.1109/ICISS48059.2019.8969848","DOIUrl":"https://doi.org/10.1109/ICISS48059.2019.8969848","url":null,"abstract":"Fraud detection applications become an important part for companies, banks are one of the companies that have confidential data assets that need to be protected because they contain financial information. In the digital era, the use of mobile banking is a utility function for the need to perform daily financial activities such as bill payment and fund transfer. Addressing potential fraud in mobile banking services is a challenge for banks to make IT security systems remain confident, integrity, and available. Potential attacks on IT security will occur from the internal side of the organization as well as from external parties. In maintaining the level of security and convenience of customers in using e-banking services, banks try to make a tool to be able to prevent the occurrence of a large risk of loss in future. The most potential that will become an attack is social engineering and data theft by internal employees, in this research the focus is to discuss the two potential attacks on accounts that have long been dormant and deal with them with an application with the SOA approach.","PeriodicalId":125643,"journal":{"name":"2019 International Conference on ICT for Smart Society (ICISS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114079801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}