2016 International Conference on Information Technology Systems and Innovation (ICITSI)最新文献

筛选
英文 中文
Expert system for early diagnosis of meningitis disease using certainty factor method 确定因子法用于脑膜炎疾病早期诊断的专家系统
F. Rumaisa, D. Junaedi
{"title":"Expert system for early diagnosis of meningitis disease using certainty factor method","authors":"F. Rumaisa, D. Junaedi","doi":"10.1109/ICITSI.2016.7858202","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858202","url":null,"abstract":"General expert system is a system that tried to adopt human knowledge to computer, so that the computer can solve the problem as was done by experts. Or in other words the expert system is a system designed and implemented with assisted of a particular programming language to be able to solve problems like that done by experts. Hopefully this system, common people can solve a particular problem either ‘a little’ tricky or complicated even ‘without the’ assistance of experts in that field. As for the experts, this system can be used as an experienced assistant. Applications developed is aimed to determine the type of disorder in children from age 0 years with the only symptom noticed symptoms. By using Certanty Factor (CF), to obtain the likely disruption experienced by the patient.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121868311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
NUSANTARA: A new design of knowledge management system in Indonesia 印尼知识管理系统的新设计
Elin Cahyaningsih, D. I. Sensuse, W. Wibowo, Retnany Latifah, Wina Permana Sari
{"title":"NUSANTARA: A new design of knowledge management system in Indonesia","authors":"Elin Cahyaningsih, D. I. Sensuse, W. Wibowo, Retnany Latifah, Wina Permana Sari","doi":"10.1109/ICITSI.2016.7858216","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858216","url":null,"abstract":"Government Human Capital Knowledge Management of Republic Indonesia (NUSANTARA) is a technology for support the government knowledge management. This technology also well known as knowledge management system which is manage the process of knowledge creation among organization. NUSANTARA was developed by identifying some features of activity in managing knowledge on the government knowledge management. Those features were identified from survey using a questionnaire in three government ministries that manage government human capital. Then the author does the analysis and design for the NUSANTARA. Quantitative method is used to analyze the survey result. Data analysis is used Pearson Correlation Analysis and the design are use the use case diagram, activity diagram and class diagram. Expert judgment is used to verified and validated the research result that is the KMS features. In this study some priority of KMS features was determined there are electronic discussion group, best practice database, email, work performance system and video conference. Those features are represented in NUSANTARA prototype as the current important requirement for the government human capital management stakeholder.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121897724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modeling operational model of data governance in government: Case study: Government agency X in Jakarta 政府数据治理的操作模型建模:案例研究:雅加达的X政府机构
Alivia Yulfitri
{"title":"Modeling operational model of data governance in government: Case study: Government agency X in Jakarta","authors":"Alivia Yulfitri","doi":"10.1109/ICITSI.2016.7858207","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858207","url":null,"abstract":"Data became a major need in current society as the data must be accurate and valid. However, the organization usually faces data problem, such as data duplication, inaccuracy, incomplete, invalid, unavailability, etc. These problems have occurred at a government agency X in Jakarta, which one of its main tasks is serving society through providing public information. The organizations need to perform data governance activities. They need to establish appropriate operational model which determined what the roles and responsibilities for activities of data governance. It will be established who person act the role. The modeling approach used in sequential stages which described as follows, the study of best practices regarding operational model of data governance, analyze organizational structure, analyze business processes, human resources, and mapping out data governance activity. The results of this research are proposed operational model of data governance, roles and responsibility in accordance with the organization.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123930437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Linking spatial information of cultural heritage metadata with geo linked open data 将文化遗产元数据空间信息与地理链接开放数据链接
Nurul Fajrin Ariyani, M. B. Hanafi, Hari Ginardi, Madis Saralita
{"title":"Linking spatial information of cultural heritage metadata with geo linked open data","authors":"Nurul Fajrin Ariyani, M. B. Hanafi, Hari Ginardi, Madis Saralita","doi":"10.1109/ICITSI.2016.7858215","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858215","url":null,"abstract":"This paper propose a method for automatically linking spatial information that embedded in cultural heritage metadata to geo linked open data. The spatial information that embedded in a cultural heritage object could be used to enrich information of the other objects. For example, by knowing the spatial relation between two or more CH objects, we could conclude the condition of civilization in the past. Since most of the spatial information might had been documented incompletely, it needs to utilize open geo datasets as a dictionary to identify any place names and its other related information that would be beneficial to enrich CH metadata. However, linking spatial information to geo linked open data could be very troublesome if it done manually. For the experimental purposes, we built a prototype to test the feasibility of our method. As the result, our method are considered could give contribution in generating CH metadata along with their enriched spatial information.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124035874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Designing an enterprise architecture government organization based on TOGAF ADM and SONA 基于TOGAF、ADM和SONA的企业架构政府组织设计
Cipta Muhamad Firmansyah, Y. Bandung
{"title":"Designing an enterprise architecture government organization based on TOGAF ADM and SONA","authors":"Cipta Muhamad Firmansyah, Y. Bandung","doi":"10.1109/ICITSI.2016.7858191","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858191","url":null,"abstract":"In practice, many government organizations have representative offices or specialized units which are spread all over Indonesia. With the increasing development of information technology and the expansion in Indonesia areas, also the increasing need for information and communication technology, it would require a flexible, easily expandable, and sustainable IT Infrastructure. To create a sustainable and flexible IT infrastructures, it is necessary to align between IT needs and organization business, so that there will be mutual support between both entities. Enterprise Architecture (EA) can help to build that alignment, and service-orientation architectural approach will help to design the infrastructure. This EA will be developed by using collaboration and tailoring TOGAF ADM as EA framework and SONA (Service Architecture Network Architecture) as information system and technology design framework which are connecting network infrastructure, network services, and application. SONA will be used as reference for the phases of the cycle TOGAF ADM. This paper presents Volcanoes Monitoring System in Indonesia with a case study design for the proposed methodology. The result of this research is “Clear” status definition of EA work based on EA score card assessment, and this means EA work is well defined and documented.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
System security requirement identification of electronic payment system for angkot using NIST SP 800-160 使用NIST SP 800-160的安高德电子支付系统的系统安全需求识别
Khairani Ummah, K. Mutijarsa, W. Adijarto
{"title":"System security requirement identification of electronic payment system for angkot using NIST SP 800-160","authors":"Khairani Ummah, K. Mutijarsa, W. Adijarto","doi":"10.1109/ICITSI.2016.7858205","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858205","url":null,"abstract":"Electronic payments system for angkot is an example of information technology system. In developing information technology system, one important aspect to be considered is information security aspect. NIST publication recommends ways to incorporate security design principles and concept into system engineering, that is NIST SP 800-160 System Security Engineering: Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems. This paper is part of the development framework of electronic payment system for angkot. Result from early stage research has built the prototype of microcontroller-based system. In this paper, conducted reengineering process with reference to the stage in NIST SP 800-160 document. Among 30 stages of the system engineering process described in the document, this paper emphasizes the early stages that is business/mission analysis process. The results are system security requirements to establish an electronic payment system of angkot.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133044949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of cause and effect relationship risk using fishbone diagram in SDLC SPASI v. 4.0 business process SDLC SPASI v. 4.0业务流程中鱼骨图的因果关系风险分析
Azzahra Ratu Kamila, S. Sutikno
{"title":"Analysis of cause and effect relationship risk using fishbone diagram in SDLC SPASI v. 4.0 business process","authors":"Azzahra Ratu Kamila, S. Sutikno","doi":"10.1109/ICITSI.2016.7858186","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858186","url":null,"abstract":"One of the requirements contained in IT general control is the availability of an SDLC. But until now, PT. Telkom has yet to implement risk management in the SDLC process. In order to manage the risks properly, risk assessment is needed to determine approriate internal controls for SDLC. This study tries to present a methodology to assess this value using semi-quantitative risk assessment. The methodology addresses risk by using fishbone diagram to determine casuality relationship among SDLC risks. SPASI 4.0, PT. Telkom's standard for software development lifecycle, is used to determine the current IT general control, which is desired. The results of the research in this case is the gap analysis of control.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133575920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling IT public value for IT performance measurement in government organization: A case study: BPS-statistics Indonesia 为政府组织中的IT绩效度量建模IT公共价值:一个案例研究:BPS-statistics Indonesia
Ivadia Elmina Patola, Suhardi, N. Kurniawan
{"title":"Modeling IT public value for IT performance measurement in government organization: A case study: BPS-statistics Indonesia","authors":"Ivadia Elmina Patola, Suhardi, N. Kurniawan","doi":"10.1109/ICITSI.2016.7858194","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858194","url":null,"abstract":"Nowadays, Information Technology (IT) has been widely used by government organization in many aspects, especially in providing public services. Various researches proved that the use of IT in government sector can improve the public value. The purpose of this study is to develop IT public value model for measuring IT performance in government organization. The model will be tested using confirmatory factor analysis. The result shows that the model can be realized through the delivery of quality public service, the effectiveness of public organization and the achievement of socially desirable outcomes. This empirically tested model can be used as the basis for measuring the performance of IT in government organization derived from public value perspective.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133683317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Power analysis attack on implementation of DES 对DES实现的功率分析攻击
S. D. Putra, A. S. Ahmad, S. Sutikno
{"title":"Power analysis attack on implementation of DES","authors":"S. D. Putra, A. S. Ahmad, S. Sutikno","doi":"10.1109/ICITSI.2016.7858246","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858246","url":null,"abstract":"This paper discusses the needs and security threats on an embedded system on the current information era. This paper provides security view information on the hardware by looking at aspects of threats, vulnerabilities, encryption and decryption, and information attack side. This paper also describes the KGS (knowledge growing system) as techniques for the prevention of dpa attacks and other power analysis in algorithm cryptography to be used in future research plans.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128401953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A case study on integration of conventional learning system and ICT-based learning for job training system 传统学习系统与基于ict的职业培训系统集成案例研究
Oih Solihadin, Y. Bandung
{"title":"A case study on integration of conventional learning system and ICT-based learning for job training system","authors":"Oih Solihadin, Y. Bandung","doi":"10.1109/ICITSI.2016.7858188","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858188","url":null,"abstract":"Human Resources (HR) have a very important role in an organization which can be done through education and training fields. Competency improvement through education field requires complex bureaucracy and time consuming so that automatically will increase cost. Therefore, the organization prefers to choose training field in increasing the competence of their employees because it is less cost and shorter time consuming. Increasing the need of training triggers some developments of the training system to be more effective and efficient, as this research study focused on the training field. The instructional reform of vocational skills training in higher education is a difficult problem, which is still not resolved, although it has been explored continually in recent years. This research aims to construct a model of job training system that integrates Conventional Learning System and Information Communication Technology (ICT)-based Learning. This model is constructed by integrating Classroom Learning Systems as conventional learning systems with Learning Management System (LMS) and Social Network Sites (SNS) as ICT-based learning. Learning strategy is considered as one of the important components in learning concept. We draw the model as a chart consisting of three parts: 1) Input section that consists of Training Need Analysis (TNA), promotion, and recruitment, 2) Process section that consists of training access using training system which integrating classroom/virtual, LMS, and SNS and also supported by pedagogy concepts such as learning approaches, strategies, methods, techniques and tactics, 3) Output section that consists of certification, placement and work.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信