Anggy Pradiftha Junfithrana, M. A. Desima, Dicki Priyanto, Ujang Indra Lesmana, Deden, Adjie
{"title":"Improving Security Accesibility Using Speech Recognition System Based on Pitch, Cepstrum and Resonance Frequency","authors":"Anggy Pradiftha Junfithrana, M. A. Desima, Dicki Priyanto, Ujang Indra Lesmana, Deden, Adjie","doi":"10.1109/ICCED.2018.00014","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00014","url":null,"abstract":"Access to the system becomes very important to note. Voice character becomes a significant differentiator to detect one person with another. The introduction discusses ways to use a userfriendly GUI, where each sample can be used and matched based on pitch, cepstrum and formant comparisons. The results of experiments using Internal and External software show stable results on the system being designed. The system can identify every user recorded in the data by bringing up photos that the user detected. Delay in decision-making by the system can be compared with the application of appropriate algorithm. The results show that the system can work optimally and accurately.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"4 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamdi Hidayatullah, A. Hidayanto, F. Azzahro, W. S. Nugroho, Oddi Muhammad Ikbar
{"title":"An Empirical Examination of Factors Affecting Behavioral Intention to Use CCIS Using TOE Framework","authors":"Hamdi Hidayatullah, A. Hidayanto, F. Azzahro, W. S. Nugroho, Oddi Muhammad Ikbar","doi":"10.1109/ICCED.2018.00022","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00022","url":null,"abstract":"In order to achieve public sector reform and more transparent public information disclosure, the Supreme Court of Republic Indonesia developed the Court Case Information System (CCIS). The CCIS are used by the four judicial systems under Supreme Court: General Court, Military Court, State Administration Court, and Religious Court. Although CCIS has developed in 2011, the internal audit conducted in 2015 shows that CCIS only have 40% active users. Moreover, no assessment has been conducted to investigate what factors may play roles in improving users’ intention to use CCIS. This study uses quantitative methods using technology-organizationenvironment (TOE) theory and adds individual contexts to investigate factors affecting individual intentions to use CCIS. There are ten variables tested involving 296 respondents and analyzed by using PLS-SEM approach. The results of this study show that top management support, organization regulation, ease of use, usefulness, self-efficacy and social influence are the factors that may help improving users’ intention to use CCIS.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116786237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatimah Shera Puteri, P. W. Handayani, F. Azzahro, A. Pinem
{"title":"Analysis of Investor Intention to Invest Capital in Small and Medium Enterprises Through Peer-to-Peer Lending in Indonesia","authors":"Fatimah Shera Puteri, P. W. Handayani, F. Azzahro, A. Pinem","doi":"10.1109/ICCED.2018.00026","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00026","url":null,"abstract":"The focus of this study is to identify factors that affecting the desires of investors or lenders to invest in Indonesian Small Medium Enterprises (SMEs) through the service provider peer-to-peer lending (P2P lending). This is because there are P2P lending that could not raise funds amounts required by the borrower (SMEs) in full and within the given deadline. This research uses quantitative method using survey to 214 respondents and data is analyzed using Partial Least Square-Structural Equation Modeling (PLS-SEM) approach. Result of analysis from this research identified the factors that influence investors’ desire to invest in Indonesian SMEs namely perceived risk and investor trust to P2P lending platform (platform trust). Perceived risk factors inversely proportional to the level of investors’ desire to invest capital. While the platform factor is directly proportional to the desire of investors to invest capital. Thus, it can be concluded that the less risk potentially arise and the higher investors’ confidence in the P2P lending platform, the higher the investors’ desire to invest.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116222484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"[Publisher's information]","authors":"","doi":"10.1109/icced.2018.00058","DOIUrl":"https://doi.org/10.1109/icced.2018.00058","url":null,"abstract":"","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125007384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SDD-MIMO: Ubiquitous Embedded MIMO for Community Broadband","authors":"G. Borg, Zia-Ud-Din Javaid, A. Khandaker","doi":"10.1109/ICCED.2018.00047","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00047","url":null,"abstract":"Multi-user and massive or large-scale MIMO have proven very effective customer access technologies for serving multiple users on the same frequency resource. However the technological cost and complexity of large scale cellular deployments to sparsely populated areas makes them unsuitable for deployment by individuals or the communities themselves. In this paper we investigate an alternative approach to large scale MIMO deployment in which a huge network of private, singleantenna radios forms a customer access network by coordination over existing back-haul. Such a network increases its range and aggregate capacity in proportion to the number of units deployed on a private basis. In this paper we consider the physical issues of base station size, spectrum availability, terrestrial propagation, capacity, range and power scaling that must be solved to make such a network a reality.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meyliana, H. A. Widjaja, Audika Putri Larasati, Resi Respati, Violetta Ranaputri
{"title":"The Evaluation of Enterprise Resource Planning (ERP) Financial Accounting and Control Using Technology Acceptance Model","authors":"Meyliana, H. A. Widjaja, Audika Putri Larasati, Resi Respati, Violetta Ranaputri","doi":"10.1109/ICCED.2018.00023","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00023","url":null,"abstract":"The implementation of an enterprise resource planning (ERP) system is an important part in integrating the business process of an organization in order to support its daily operations effectiveness. This research evaluates the implementation of the Financial Accounting and Control (FICO) ERP system in one of Indonesian state-owned enterprises by identifying the factors such as individual characteristics, organizational characteristics, and technological characteristics that affect the perceived usefulness and the perceived ease of use of the ERP system, as well as how they in turn affect the intention to use, the usage, and its individual impacts. This research utilizes the Technology Acceptance Model (TAM) to measure the users’ acceptance of an ERP system, which is then analyzed using the Structured Equation Model-Partial Least Squares (SEM-PLS) data analysis model. The results of the research show that partially there are exogenous variables that significantly affect the endogenous variables such as perceived ease of use of ERP against perceived usefulness of ERP, the intention to use and the perceived usefulness of ERP, complexity and compatibility against perceived ease of use of ERP, intention to use against usage, usage against individual performance, and usage against individual performance and panoptic empowerment. Simultaneously, the research also shows a significant influence. Therefore, in order to measure the users’ acceptance rate of an ERP system, then all the exogenous variables, as well as perceived usefulness of ERP, perceived ease of use of ERP, intention to use, usage of ERP, and individual impact which consists of panoptic empowerment and individual performance has to be performed.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131346191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Jamil, M. Ahsan, T. Farooq, Amir Hussain, Rehan Ashraf
{"title":"Student Performance Prediction Using Algorithms of Data Mining","authors":"A. Jamil, M. Ahsan, T. Farooq, Amir Hussain, Rehan Ashraf","doi":"10.1109/ICCED.2018.00055","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00055","url":null,"abstract":"Data mining is mainly used to get information from a large amount of data. Process it to convert this information into understanding form predictions. Data minings algorithms have immense importance and chore in predictions. The data mining methods can uncover the unseen patterns (unsupervised), associations, and oddity from collected data. This information can enhance the decision-making processes for predictions. Data mining can be considered as a most suitable technology for predictions especially in predictions of students performance. The primary aim of this paper is to give a precise review on Applications of algorithms of data mining for prediction of students performance. In this paper, we presented a methodology in which we applied pre-processing on data to select best attributes in order to increase its accuracy then we applied different Algorithms to measure its accuracy and found out that Random Forest algorithm gives best results.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of the Use of Artificial Intelligence in Strategic Planning in the Logistics Services Industry in Indonesia","authors":"Kurniawan, E. Kuncoro, B. Wijanarko, R. Ikhsan","doi":"10.1109/ICCED.2018.00030","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00030","url":null,"abstract":"The purpose of this study is to examine the impact of IoT on the logistics industry sector globally especially to provide positive contributions to Indonesia's development. Through a study of Logistics Performance Index data and information technology trends, a proposed logistics business model based on Artificial Intelligent is obtained. In order to maintain corporate sustainability many factors that influence it to include internal and external factors, so that the use of the Internet of Things is needed that increasingly penetrates various business lines can be used in tracking with the use of electronic devices based on Artificial Intelligent and Robotics as operational support for the logistics industry","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131084815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. R. K. Rao, C. A. H. Puwakpitiyage, Dalia Abdulkareem Shafiq, Farhana Islam, D. Handayani, Hamwira Yacoob, T. Mantoro
{"title":"Design and Development of Facial Recognitionbased Library Management System (FRLMS)","authors":"V. R. K. Rao, C. A. H. Puwakpitiyage, Dalia Abdulkareem Shafiq, Farhana Islam, D. Handayani, Hamwira Yacoob, T. Mantoro","doi":"10.1109/ICCED.2018.00032","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00032","url":null,"abstract":"In this paper we propose a facial recognitionbased library management system namely Facial Recognition based Library Management System (FRLMS). This system aims to improve the user experience on library authentication process through facial recognition algorithm. This process would be simple and efficient as the authentication process is performed seamlessly. For the purpose of this study, feature extraction and image classification are obtained using OpenCV and TensorFlow, where the average recognition accuracy reaches up to 92.15%.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133355507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tarmizi, Ika Chandra Hapsari, A. Hidayanto, Adhi Yuniarto L.Y., Herkules
{"title":"Information Security Awareness National Nuclear Energy Agency of Indonesia (BATAN)","authors":"A. Tarmizi, Ika Chandra Hapsari, A. Hidayanto, Adhi Yuniarto L.Y., Herkules","doi":"10.1109/ICCED.2018.00017","DOIUrl":"https://doi.org/10.1109/ICCED.2018.00017","url":null,"abstract":"Along with the increasing use of information and communication technology, information security becomes something fundamental. BATAN as one of the government agencies currently wants to increase the security awareness of its employees. As a national nuclear agency, information security awareness is crucial, as it relates to the safety of the society. This study aims to know how the relationship between the three variables of knowledge, attitude and behavior in BATAN. A nuclear agency has a special characteristics of information security because it has a higher standard related to information security than other institutions. By knowing how the interaction of these three variables, is expected to know how to improve employee behavior toward information security. The arrangement of research variables and instruments is done through Focus Group Discussion (FGD). FGD results were then compiled into questionnaires, distributed to 420 Batan employees. From 420 questionnaire, 381 was returned and processed using regression analysis. As a result, it is known that employee knowledge of information security affects employee attitudes to information security, employee attitudes to information security affect employee behavior in reducing security risks, and employee knowledge of information security affects employee behavior in reducing security risks.","PeriodicalId":166437,"journal":{"name":"2018 International Conference on Computing, Engineering, and Design (ICCED)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132249138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}