{"title":"Interactive learning media based on RPP ICT","authors":"Wahyu Pujiyono, Yana Hendriana, I. Susanti","doi":"10.1109/ICITSI.2016.7858218","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858218","url":null,"abstract":"The students meet constrains in process of teaching and learning activities in the classroom in handicraft materials with the videos of handicraft making process taken from YouTube as these videos are incompatible with the subject and have low quality. The research subjects were the application of interactive learning media for handicraft made-of-soft materials and multimedia-based entrepreneurship. The data collection in this research employed literature study; observation methods done by directly observing the learning methods in class; and interviewing the teacher of handicraft and entrepreneurship subject of the eleventh grade. At the needs analysis, the stages system conducted were user need analysis and data analysis. Subsequently, it was followed by system design, including the design concept (learning scenario in classroom, ICT learning scenarios, evaluation scenario), content design, script design and graphic design. The system testing used two test stages, namely Black box test and Alpha test. The Black box testing tried by the teacher is aimed to determine learning materials validity and the feasibility of multimedia application. Based on these data RPP ICT, it can be concluded that the application of interactive learning media based on RPP ICT field entrepreneurship is feasible to be used in the learning process.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134230517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Business process improvement of district government innovation service: Case study Cimahi Tengah District of Cimahi","authors":"Silvia, Suhardi, Purnomo Yustianto","doi":"10.1109/ICITSI.2016.7858193","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858193","url":null,"abstract":"This research describes the existing business process and its improvement in district public services. The method used in business process improvement was Business Process Reengineering (BPR) based on the results of the analysis of Key Performance Indicator (KPI) which is derived from the Critical Success Factor (CSF) and Business Process Modeling Notation (BPMN) for designing. These combination of methods was used to improve the performance of district public services through innovative ideas that will be developed in business process improvement services in order to provide solutions. One of the solution is to increase the speed of services which can be proved in increasing the speed of ID card service at 60.25 %, family card service at 58.1 % and the other residence documents service at 64.7 %. The results obtained from the simulation of business process improvement design using the service time analysis with Bizagi Modeler software.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115630766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The influence of knowledge management tools utilization towards knowledge management readiness","authors":"M. R. Shihab, Yuni Wulandari","doi":"10.1109/ICITSI.2016.7858220","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858220","url":null,"abstract":"This research realizes the needs for organizations to increase its readiness towards the implementation of knowledge management. This study specifically analyzes factors related to knowledge management tools utilization within the organization as antecedents towards knowledge management implementation readiness. Data were gathered from 57 respondents whom were employees of a leading software development organization in Indonesia. The analysis was conducted by using Partial Least Square Structural Equation Modelling (PLS-SEM) technique. This study concludes that incident management tools positively influences the use of portals, as well as internal KM repository tools. The two concertedly, influenced KM readiness.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124732901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for 3D virtual game using MOODLE, SLOODLE and Open Simulator: Case Study: Training of house building data collecting by National Statistical Office (NSO), Government Agency, BPS — Statistics Indonesia","authors":"Mohamad Achiruzaman, Y. Rosmansyah","doi":"10.1109/ICITSI.2016.7858231","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858231","url":null,"abstract":"Before conduct data collecting, enumerators take a course and conduct simulation in the classroom. However, learning in the classroom often doesn't make the enumerators understand perfectly. To solve this problem, we can use 3D virtual game based training as a solution. During the training, enumerators will use 3D virtual learning environment to get more experience, engagement, and expertise. For this purpose, we proposed a framework which integrates ADDIE, 3D VLE framework, and Activity Theory Model for Serious Game (ATMSG). The proposed framework will guide us to create game flowchart, sequence game diagram, and game blueprint in “Training of House Building Data Collecting in Population Census” as a case study.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127145550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public demand to whitelisting: Another alternative for more secure internet access","authors":"E. Sirait","doi":"10.1109/ICITSI.2016.7858198","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858198","url":null,"abstract":"Regulation which requiring all Internet Service Providers to apply negative content filtering based on domain name system in their services, known as blacklisting/blocking method such as Trust positive or Nawala, apparently is still considered less effective to support safe and productive use of the Internet in the community. A more accurate system is needed, and whitelist offered by the government can be an alternative to create more secure internet access. This study has surveyed total 810 internet users in the schools (junior/senior high level) and the boarding schools, targeting students and principals/teachers, and also parents in the household with non-probability sampling techniques. The findings are then discussed in Focus Group Discussion with stakeholders and experts. The results show that the whitelist system receives good response from the respondents. However, the implementation should be based on demand and reserved to segmented users, and not to be applied nationally since it potentially create a lot of noise from the society (procontra). And when it comes to the implementation stage, several challenges need to be considered in order to maximize its purpose. First is related to user information rights in order to remain protected, but not feel restricted. Furthermore, whitelist is also expected to be the answer to overcome largest channel of negative contents distribution based on internet usage profiles, which mostly access internet via mobile phone, and the activity is accessing social media/instant messaging through applications. Some other internet content managements can also be conducted and massively disseminated to complement the content filtering system.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125871807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jordi Rahaditya, A. A. Gde, Arya Sasmita, Gusti Made, Eka Pratama, I. P. Agus
{"title":"Prototyping SMS forensic tool application based on digital forensic research workshop 2001 (DFRWS) investigation model: Case study: SMS togel in Indonesia","authors":"Jordi Rahaditya, A. A. Gde, Arya Sasmita, Gusti Made, Eka Pratama, I. P. Agus","doi":"10.1109/ICITSI.2016.7858226","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858226","url":null,"abstract":"SMS service is a basic feature that has been built into the cell phone, since a function of exchanging messages are practical and easily understood by all mobile phone users, when SMS is used for negative purposes then it can be used as evidence of the law. This applications was designed to help search a text messages as evidence in a crime that use SMS as a medium of communication, This Application implement DFRWS (Digital Forensic Research Workshop 2001) procedures for handling digital forensic investigations, that perform copy and filtering SMS evidence, converting the value message using SHA256 Hash algorithm and produce the output file SMS reporting evidence in the form of files such as PDF Document, Word Document, or Excel Document.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121770277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of RAID storage server with software-based accelerator PernixData FVP","authors":"Erico Hermanoy, Marcel, Edy Kristianto","doi":"10.1109/ICITSI.2016.7858190","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858190","url":null,"abstract":"IOPS performance as one of the important variables in the selection of storage would be devastasting if the server used for virtualization. If within one server has more than one virtual machine, the performance is given on those servers will be reduced and not optimal. Therefore, to increase the need for the use of server storage performance accelerator. Currently, PernixData FVP already implemented in UKRIDA virtualization environment, in particular the computer lab. There is a performance increase in real terms that can be perceived by the user, but until now there has been no special tests to assess the extent of increase in performance. This research was conducted with the hope to provide the data (results of measurements) on the increase in IOPS performance obtained for each type of RAID using PernixData FVP as a software-based accelerator, as well as consideration of the use of RAID levels mthat correspond to the needs of each. This study focuses on improving storage performance with the use of software-based accelerator as well as with different RAID levels. These results indicate that the use accelerator with two different policy provides improved performance compared to the server without the accelerator.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131806387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mutammimul Ula, Mursyidah, Yana Hendriana, Richki Hardi
{"title":"An expert system for early diagnose of vitamins and minerals deficiency on the body","authors":"Mutammimul Ula, Mursyidah, Yana Hendriana, Richki Hardi","doi":"10.1109/ICITSI.2016.7858225","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858225","url":null,"abstract":"Mineral and vitamin plays an important role for the human body. Vitamins are useful for the growth process, the setting, and the improvement of body functions while mineral plays a role in several stages of reactions energy metabolism, growth, and maintenance of the body. The importance of vitamins and minerals resulted in the need to be maintained levels of vitamins and minerals in the body. Many do not know that the symptoms are felt in the body is the result of a deficiency of a particular vitamin or mineral that is often too late for the unknown and the resulting need for a doctor's visit. Deficiency of the vitamin and mineral can be determined earlier using science field of artificial intelligence through expert systems. An expert system vitamin and mineral deficiencies is composed of 11 vitamins and 6 minerals. From the acquisition of knowledge by an expert, found 46 symptoms and generates 35 rules represented using decision tables. Search method uses a forward chaining while deficiencies to deal with the uncertainties arising used method of application Mycin certainty factor. To facilitate the users, the system is made by using mobile technology. Based on testing performed to the expert can be proved that the expert system built able to diagnose the deficiency of vitamins and minerals with a value of 100% accuracy the truth. By knowing deficiency that occurs then the handling and prevention can be done in a timely fashion.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sahar, H. A. Nugroho, Tianur, I. Ardiyanto, L. Choridah
{"title":"Automated detection of breast cancer lesions using adaptive thresholding and morphological operation","authors":"M. Sahar, H. A. Nugroho, Tianur, I. Ardiyanto, L. Choridah","doi":"10.1109/ICITSI.2016.7858237","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858237","url":null,"abstract":"One of the imaging modalities for early detection of breast cancer is ultrasonography (USG). The detection is based on lesions identification. Radiologists still manually conduct early detection of the lesions. Hence, the detection results tend to be subjective and may cause different interpretations due to the different level of knowledge and experience of the radiologists. In this research, the proposed method for the detection of automatic lesions uses 30 images consisting of 20 images benign lesions and 10 images of malignant lesions. At the pre-processing stage, adaptive median filter is applied and is followed by adaptive thresholding method at the segmentation process. The final stage uses morphological operations. The result shows that the proposed method successfully achieved the accuracy of 95.19%, sensitivity of 84.13% and specificity of 96.2%. These results indicate that the system can be used to assist the experts or operators from radiology team more objectively in breast cancer lession detection.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131716524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Suakanto, V. J. L. Engel, Maclaurin Hutagalung, Dina Angela
{"title":"Sensor networks data acquisition and task management for decision support of smart farming","authors":"S. Suakanto, V. J. L. Engel, Maclaurin Hutagalung, Dina Angela","doi":"10.1109/ICITSI.2016.7858233","DOIUrl":"https://doi.org/10.1109/ICITSI.2016.7858233","url":null,"abstract":"Agricultural sector has been facing great challenges in order to feed the increasing number of population living in the world. In the future, it will be very difficult to rely on traditional farming to produce food. Some researchers and industry experts have begun developing smart farming by utilizing information technology. This paper presents the conceptual model and system design for decision support of smart farming with network sensor applications in order to perform necessary tasks required for farmers. We propose a comprehensive model using Internet of Things (IoT) approach which will be applied to agriculture. Data acquisition via sensors, control and tasks management, and data analysis are considered in the development of model and system design. In this system, we propose a solution to help farmers facing problems of tasks management and planning, environment factors measurements, and information distribution.","PeriodicalId":172314,"journal":{"name":"2016 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130354202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}