Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)最新文献

筛选
英文 中文
Information System Strategy and Application Governance in The Government of Bandung Regency 万隆县政府信息系统战略与应用治理
S. F. Gumilang, Heru Nugroho
{"title":"Information System Strategy and Application Governance in The Government of Bandung Regency","authors":"S. F. Gumilang, Heru Nugroho","doi":"10.2991/ICOIESE-18.2019.14","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.14","url":null,"abstract":"The Use of information system in supporting government process will improve the efficiency, effectiveness, transparency and accountability of governance. This is in line with what has been stated in the Presidential Instruction no. 3 of 2003 which confirms that the use of technology in the government will improve the quality of public services to be more effective and efficient. The lack of guidance or policies regarding Development Strategy and Governance Application in The Government of Bandung Regency leads to a priority in application development in an effort to improve the government services. Gap analysis method is used to see the usability of the current applications and compare them with the future conditions. Some of documents and policies related to the application used in the Government of Bandung Regency are taken into account in preparing the strategies. Keywords—information system, strategy, governance, application","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model Development of Perishable Product to Minimize Total Supply Chain Cost on Fresh Food and Frozen Product Sales on The Trains 以列车上新鲜食品和冷冻产品销售为目标的易腐产品供应链成本最小化模型的开发
Nia Novitasari, D. D. Damayanti, A. Kamil
{"title":"A Model Development of Perishable Product to Minimize Total Supply Chain Cost on Fresh Food and Frozen Product Sales on The Trains","authors":"Nia Novitasari, D. D. Damayanti, A. Kamil","doi":"10.2991/ICOIESE-18.2019.63","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.63","url":null,"abstract":"The inventory system has a function as an act of planning, implementing, controlling the flow and storage of a product and information effectively and efficiently in order to fulfill customer demand. However, there are differences between inventory system policies on non-perishable products and perishable products. In the perishable product, special handling is needed in storage by considering the shelf life and storage time to prevent damage or decay. Accuracy in designing inventories is a suitable solution to reduce the occurrence of expired products and unfulfilled customer demand due to a lost sale. The case study used was in food sales activities on the train. Products sold consist of two categories: fresh food (8 hours) and frozen food (30 days). Travel time for each train is between 8 hours and 14 hours. On each trip, refilling is done at the location specified for each product category and each train. The refilling process aims to reduce the occurrence of food damage and decay during the trip. Thus, this paper will discuss the development of an inventory system model in a perishable product that aims to minimize the total supply chain costs by considering multiproduct, fixed lifetime, and probabilistic lead time. Keywords—perishable product, inventory, shelf life, lead time, multiproduct","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Imperceptible Copyright Protection: Adaptive Wavelet for Security 高隐蔽性版权保护:安全自适应小波
Irma Safitri, R. R. Ginanjar, A. S. Laksono
{"title":"High Imperceptible Copyright Protection: Adaptive Wavelet for Security","authors":"Irma Safitri, R. R. Ginanjar, A. S. Laksono","doi":"10.2991/ICOIESE-18.2019.29","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.29","url":null,"abstract":"This study is an extension of a recently conducted study in audio watermarking system. This study shows the imperceptibility of audio watermarking system based on BoseChaudhuri-Hocquenghem (BCH) code, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) methods. Watermarked image is embedded in the audio host signal accompanied by several attacks. The audio watermarking performances show that perceptual quality of audio with attacks is varies. At quantization spacing of 0.1 perceptual quality, objective difference degree (ODG) can reach -1.55 for level 1 in the audio watermarking system with echo attack. While signal to noise ratio (SNR) can reach 10.5 dB in the audio watermarking sistem with echo attack and bit error rate (BER) performance can reach 0.03 in our audio watermarking system also with echo attack. However, the audio watermarking system with equalizer attack shows that the higher the DWT level, the better imperceptible and BER performance is. Different from that of the system with equalizer attack, the watermarking system with resampling attack shows that the higher the DWT level, the better imperceptible and SNR performance is. Keywords—Audio Watermarking; BCH Code; DWT; SVD","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117023545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Extending the UTAUT Model to Understand the Citizens’ Acceptance and Use of Electronic Government in Developing Country: A Structural Equation Modeling Approach 扩展UTAUT模型以理解发展中国家公民对电子政务的接受和使用:一个结构方程建模方法
D. W. Jacob, I. Darmawan
{"title":"Extending the UTAUT Model to Understand the Citizens’ Acceptance and Use of Electronic Government in Developing Country: A Structural Equation Modeling Approach","authors":"D. W. Jacob, I. Darmawan","doi":"10.2991/ICOIESE-18.2019.17","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.17","url":null,"abstract":"The rapid development of information and communication technologies had a positive impact on the government to provide better and efficient services to the community. Despite some criticisms of electronic government services (e-gov), its utilization has continued to improve. The citizens need to be placed as customers at the center of the development and provision of public services. User satisfaction may indeed have the decisive influence in adopting and using egov services. This research modifies unified theory of acceptance and use of technology (UTAUT) model to improve user satisfaction and provide a solution for governments and to rethink the strategy for presenting a better model. A quantitative study has been conducted to describe the model and formulate sufficient indicators to measure user satisfaction. Furthermore, the measurement model was tested using the data from the questionnaire. Structural equation modeling (SEM) was applied to discover the goodness of fit underlying models and indicators. Based on the results, we find that privacy and performance expectancy showed positive performance effects on the intention to use e-gov services. Finally, the results of this study are also expected to be an input for stakeholders for the development of egov in the future. Keywords; e-government; UTAUT; SEM; PLS; Public Services; Adoption","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128544009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Business Process Mapping in Software Development Company 软件开发公司的业务流程映射
M. Andriani, A. Aisha, Melianna Pranita, J. Siswanto, K. Suryadi
{"title":"Business Process Mapping in Software Development Company","authors":"M. Andriani, A. Aisha, Melianna Pranita, J. Siswanto, K. Suryadi","doi":"10.2991/ICOIESE-18.2019.66","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.66","url":null,"abstract":"The concept of business process is a tool in managing corporate value chain. Business process mapping becomes essential in increasing the organization growth. Previous studies already identified the value chain in the software industry, but only develop in the level macro-process and have not mapped the business processes in detail. Macroprocess needs to disaggregate into a more detailed process to implement in the organization. Therefore, this study aims to map the business processes run in a software development company. A qualitative case study conduct in an IT company engaged in software development. Data collected through interview with five representatives in the company. Findings in this study, there are 11 categories of processes; consist of six operating processes and five managerial and supporting processes. These business process map can be used as input to make the responsibility assignment matrix (RAM), activity relationship chart (ARC), and organizational structure for IT company. Keywords—value chain, business process, business process mapping, software industry, software development","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"16 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114031162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying An Overlapped Design Schedule Based Dependency Structure Matrix to Minimize Project Makespan 应用基于依赖结构矩阵的重叠设计进度最小化项目最大完工时间
C. Ou-Yang, Indy Cesara
{"title":"Applying An Overlapped Design Schedule Based Dependency Structure Matrix to Minimize Project Makespan","authors":"C. Ou-Yang, Indy Cesara","doi":"10.2991/ICOIESE-18.2019.33","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.33","url":null,"abstract":"Design process scheduling is conducted by optimizing human resources or workers allocation to several tasks in project with several real constraints to achieve the objective, minimizing the project makespan. In real business case, despite the tasks are already allocated to the optimal workers, rework still can happen because of the uncertainty. The rework can lead to unexpected extra time consumption. To anticipate this unexpected problem, tasks overlapping method is proposed in this research to reduce the project makespan after worker allocation. However the task overlapping method has a drawback, it requires more coordination and interaction between workers who conduct each of overlapping tasks. This research emphasize overlapped design schedule in a design process based on worker cluster from Dependency Structure Matrix (DSM). Worker DSM is used to encounter the task overlapping’s drawback. Workers who come from same cluster have more coordination and interaction to each other. It is expected workers who assigned on tasks overlapped are from same cluster. This research’s intention is to provide the workers allocation to obtain optimal project makespan result and create worker clustering from worker-DSM to identify the tasks that can be overlapped in design process. It is also expected to show the possible rework time from tasks overlapping’s reduction time. Keywords— human resources allocation; project makespan; dependency structure matrix; worker cluster; overlapped design process; rework time","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"7 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126011223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PROPOSAL OF MAINTENANCE POLICY ON BARMAG FK6800 MACHINE IN FT3 PT XYZ USING RELIABILITY-CENTERED MAINTENANCE AND RISK-BASED MAINTENANCE METHOD 采用以可靠性为中心的维护和基于风险的维护方法,对ft3 pt xyz中的barmag fk6800机器提出维护策略
Irsalina Maharani, F. T. D. Atmaji, Nopendri Nopendri
{"title":"PROPOSAL OF MAINTENANCE POLICY ON BARMAG FK6800 MACHINE IN FT3 PT XYZ USING RELIABILITY-CENTERED MAINTENANCE AND RISK-BASED MAINTENANCE METHOD","authors":"Irsalina Maharani, F. T. D. Atmaji, Nopendri Nopendri","doi":"10.2991/ICOIESE-18.2019.24","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.24","url":null,"abstract":"XYZ is a company that is engaged in the textile industry since 1974. XYZ has some different kinds of yarns which through several production processes in 24 hours a day to fulfill the market demands. Therefore, all machines have to be in the best condition as it can be. These machine should be maintained optimally so all production goals could be achieved with the minimum cost of maintenance. This study will use Reliability-Centered Maintenance (RCM) method to get the right preventive task and time interval for maintenance and Risk-Based Maintenance (RBM) method to find the risk value related to the economic aspect of the company. The output of the RCM method would be 18 Scheduled Discard Task and 6 Scheduled Condition Task for the subsystem machine and the time interval of the repair will be different depending on the type of tasks and components. The repair cost for preventive maintenance task in a year is IDR 2.029.266.063. By implementing the RBM method, the risk value will be IDR 269.768.775 if the company is not doing the preventive task proposed in this study. Keywords— Preventive Maintenance, Reliability-Centered Maintenance, Risk-Based Maintenance","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"1973 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Explicit and Implicit Aspect Extraction using Whale Optimization Algorithm and Hybrid Approach 基于鲸鱼优化算法和混合方法的显式和隐式方面提取
Mohammad Tubishat, N. Idris
{"title":"Explicit and Implicit Aspect Extraction using Whale Optimization Algorithm and Hybrid Approach","authors":"Mohammad Tubishat, N. Idris","doi":"10.2991/ICOIESE-18.2019.37","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.37","url":null,"abstract":"Huge volume of reviews by customers published on different products websites has become an important source of information for both customers and companies. Customers require the information to help them in decision making for buying products, while companies analyze these reviews to improve their products. However, reading and analyzing huge amount of reviews manually are impossible and cumbersome. Thus, an automatic technique known as sentiment analysis or opinion mining has been used to analyze these reviews and extract the relevant information according to different users’ needs. The growth of sentiment analysis has resulted in the emergence of various techniques for explicit aspect extraction and implicit aspect extraction. In this paper, we proposed new approaches for both explicit and implicit aspect extraction. For explicit aspect extraction, we proposed to use Whale Optimization Algorithm (WOA) for selecting the best dependency relation patterns from the list of hand-craft patterns with the help of web based similarity. As for the implicit aspect extraction, we proposed a hybrid approach based on the use of corpus co-occurrence, dictionary-based, and web based similarity. To measure the performance of the proposed approaches, the approaches will tested and evaluated using standard datasets and will be compared to other baseline","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of Risk IT Based on ISO 31000 Standards Process Capability Assessment Model (Case Study: Andalas University) 基于ISO 31000标准过程能力评估模型的风险IT应用(以Andalas大学为例)
M. H. Hersyah, K. Surendro
{"title":"Application of Risk IT Based on ISO 31000 Standards Process Capability Assessment Model (Case Study: Andalas University)","authors":"M. H. Hersyah, K. Surendro","doi":"10.2991/ICOIESE-18.2019.13","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.13","url":null,"abstract":"The fact given that capability function is to aim executed things works properly and effectively in organization business process could not running well without considering risk management aspects. Risk management overlay every event possibilities that able to either to hinder or accelerate organization business process in fullfilling organization’s business objectives. In this thesis research, is presented with a proposed two dimensional conceptual mapping between capability dimension from ISO 15504 and risk management model from ISO 31000, where ISO 31000 model is adapted into application of risk IT process using COBIT 4.1 as a reference. Keywords— ISO 15504 ; ISO 31000; Manajemen Risiko, Dimensi Kapabilitas, COBIT 4.1","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127650778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Analysis of Core Competencies and Business Performances in Software SMEs : A Conceptual Framework 软件中小企业核心竞争力与经营绩效分析:一个概念框架
A. Aisha, I. Sudirman, J. Siswanto, Y. Yassierli
{"title":"An Analysis of Core Competencies and Business Performances in Software SMEs : A Conceptual Framework","authors":"A. Aisha, I. Sudirman, J. Siswanto, Y. Yassierli","doi":"10.2991/ICOIESE-18.2019.34","DOIUrl":"https://doi.org/10.2991/ICOIESE-18.2019.34","url":null,"abstract":"The SME needs to determine and develop its superior internal capability to survive the high competition. This study aims to develop a conceptual model that could be used to understand the relationship between the core competencies and the business performances in relation with the external conditions of software SMEs' environment. This study used relevant literature from previous studies to develop the conceptual model. The typical characteristic of the software business affected the different dimensions of core competencies and business performance from the previous studies. The result of this study proposed a conceptual model that describes the relationship among core competencies, organizational environments, and business performances. Keywords—core competencies, business performance, organizational environment, software business","PeriodicalId":172108,"journal":{"name":"Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114925985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信