{"title":"Implementation of an Expert System in Diagnosing Obstetrical Health in Pregnant Women using Fuzzy Algorithms and Certainty Factor","authors":"Munawaroh, Niki Ratama, Diki Rasapta, Septa, Syndhe Qumaruw Syty, Octaviana Anugrah Ade Purnama","doi":"10.1109/ICCED56140.2022.10010502","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010502","url":null,"abstract":"The maternal mortality rate (MMR) in Indonesia is still very high and the highest among ASEAN countries. In 1990, the MMR was at a rate of 390 per 100,000 live births, and a survey in 2002-2003 yielded an estimate of 307 per 100,000 live births. However, the analysis concludes that the situation is very concerning for Indonesian women. An expert system is needed to help pregnant women find out quickly the health condition of the womb in pregnant women based on the symptoms that appear. Not only types of disease, this system also informs how to handle pregnant women whose health conditions are problematic. The method used is the fuzzy logic method and the certainly factor method is used to predict the health condition of pregnant women based on age and temperature, then the certainly factor method is used to predict the health of pregnant women based on the symptoms suffered. The results of this study are to make it easier for pregnant women to obtain information about the health of the womb in pregnant women who are suffering, as well as get solutions for handling it and make it easier for pregnant women to diagnose the health of pregnant women. The analysis of the maternal health diagnosis system has provided convenience and can be used as an alternative to diagnose other diseases, because it is able to diagnose accurately according to the symptoms felt, so that it can help make it easier to get accurate diagnostic results.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133304125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fajar Julius Sorgang Lobuan Manurung, Muhammad Aufar Alfarisi, Cahya Resqia Dewi, Yudi Fernando, R. Ikhsan
{"title":"Impact of Absorption, Attention, Perceived Enthusiasm of Customer Satisfaction On Electronic Video on Demand","authors":"Fajar Julius Sorgang Lobuan Manurung, Muhammad Aufar Alfarisi, Cahya Resqia Dewi, Yudi Fernando, R. Ikhsan","doi":"10.1109/icced56140.2022.10010462","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010462","url":null,"abstract":"Business always starts with customers. It is because business revenue, development, and survival depend on customers. Therefore, it is necessary to design the electronic video on demand based on the customer's preference. However, designing information systems is always challenging without understanding the customers' needs. Many electronic services providers and digital platforms fail because they do not fully understand customer requirements. Therefore, business owners should understand, prioritise, and meet their customers' expectations in the competitive business environment and satisfy them. This study examines the impact of the absorption, attention, and perceived enthusiasm on customer satisfaction that utilise Video on Demand (Vod) streaming services. This study employed a quantitative approach with survey data from VoD service users in Indonesia. PLS-SEM is used to test five hypotheses statistically. The findings revealed a significant link between absorption, attention, and perceived enthusiasm and customer satisfaction. This study also investigated the interrelationship of the key variables absorption and attention with perceived enthusiasm. Finally, it was suggested that the relationship could lead to more research.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Putu Sukma Dharmalaksana, T. Mantoro, Lutfi G A Khakim, Muchlis Nurseno
{"title":"Improved Malware Detection Results using Visualization-Based Detection Techniques ant Convolutional Neural Network","authors":"Putu Sukma Dharmalaksana, T. Mantoro, Lutfi G A Khakim, Muchlis Nurseno","doi":"10.1109/ICCED56140.2022.10010439","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010439","url":null,"abstract":"The rapid advancement of internet technology has carried major changes in the use of software, st the industry growing up and competing with each other to present innovations for making life easier. However, software spread on various platforms contains a lot of malware, which can compromise the security of users’ personal information. Until now, researchers continue to try various methods of malware detection to minimize the weaknesses of dynamic and static methods. This study will compare the malware detection method using Visualization-Based Detection Techniques and one type of deep learning, which is Convolutional Neural Network (CNN). The evaluation experiment used two methods of image augmentation, which are the B2IMG dan Gabor Filter methods. The CNN architectures that we used, such as VGG3 dan other architectures combined with several convolutional layers and pooling layers. The evaluation run result indicates that the B2IMG visualization method got a maximum accuracy value of 99,86% and an F-score of 97,00% when using colored RGB image format.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114786498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of Misuse of Information Technology in the Health Industry","authors":"Hastanto Januar Ahmad, T. Mantoro, Ivan Yulivan","doi":"10.1109/ICCED56140.2022.10010457","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010457","url":null,"abstract":"Technological advances in the field of digitalization and networks of information have made the world enter the industrial revolution 4.0 including in the health and medical sector. This revolution is marked by the easy exchange of information in a short amount of time without being limited by geographical constraints and the shift from paper-based documents to digital. The health sector has also begun to adopt the 4.0 revolution by making health services more accessible to the public such as online medical applications, the use of electronic medical records, and the use of big data to personalize medical therapy for sick people. Even though the use of this information technology has a lot of benefits, there is also potential to be misused such as the purchase of dangerous medicines and leakage of patient's medical data also inadequate support from telemedical services due to a lack of guidance for personnel which has the potential to harm both physically and materially. Indonesia currently does not have a defense mechanism and regulations to protect its citizen from the misuse of information technology in the health industry. Systematic efforts are needed so that the use of information technology can run properly and safely. There need to be some measures to prevent the unlawful use of health information technology such as strict regulation and monitoring, defense against cyber hacking and leakage, also adequate training for the operators of health services in using the technology","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124165928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the Cyber Attacks in Indonesia’s Health Sector in Industry 4.0 Era","authors":"A. Hidayat, Teddy Mantoro, A. Susandi","doi":"10.1109/icced56140.2022.10010340","DOIUrl":"https://doi.org/10.1109/icced56140.2022.10010340","url":null,"abstract":"At this time the world has undergone considerable changes, where the world has entered the era of the industrial revolution 4.0. With these changes, there are many positive impacts or opportunities that can support human activities in the economic, political, socio-cultural, health, and other fields. And alsothe author tries to analyze about industry 4.0 era for Indonesia’s health sector with SWOT Analysis to know about Strenght, Weaknesses, Opportunities, and Threats. However, the challenges of technological advances can pose a threat to countries that are not ready to facethem, one of which is cyber attacks that can threaten data security. Therefore, it is necessary to be prepared in terms of data security by cooperating with various parties involved in it.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Erfina, Lakoa Fitina, Prasetyo Hartanto, Sudin Saepudin, Diah Rahmalenia, Dini Maulinda, Fauziah Nur Octafiani
{"title":"Indonesia’s Economic Recovery Post Covid-19 Pandemic Sentiment Analysis","authors":"A. Erfina, Lakoa Fitina, Prasetyo Hartanto, Sudin Saepudin, Diah Rahmalenia, Dini Maulinda, Fauziah Nur Octafiani","doi":"10.1109/ICCED56140.2022.10010695","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010695","url":null,"abstract":"Since the Covid-19 pandemic was first confirmed on March 2, 2020, Indonesia has faced many crises, one of which is the economic crisis. Many companies lose profits and impose layoffs for their workers. The Indonesian government in its efforts to restore the economy in Indonesia carried out several maneuvers such as eliminating the PCR/SWAB requirement for public transportation users and increasing tourism enthusiasm in Indonesia by organizing the Mandalika MotoGP. However, this is considered insufficient by some groups of people because the prices of primary needs continue to increase. This study aims to find out public sentiment towards the government for efforts to restore the economy in Indonesia. The results of this study indicate that the Indonesian government is considered successful and has taken the right steps in efforts to recover the economy in Indonesia. This is evidenced by the high percentage margin between positive and negative sentiments of 37%.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133551059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hendra Marcos, R. Gernowo, I. Rosyida, O. Nurhayati
{"title":"Intelligent Traffic Management System using Internet of Things: A Systematic Literature Review","authors":"Hendra Marcos, R. Gernowo, I. Rosyida, O. Nurhayati","doi":"10.1109/ICCED56140.2022.10010602","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010602","url":null,"abstract":"The number of vehicles on the road will continue to expand as cities worldwide grow in population. This increases transportation congestion, especially in major cities and especially during rush hour. This phenomenon continuously pushes academics, city authorities, and urban planners to enhance traffic control systems for safety and efficiency. The application of Internet of Things (IoT) in the field of intelligent transportation systems is getting the attention of many parties. A well-controlled transportation management system can reduce congestion, especially at intersections and roads. This study was conducted to observe and study the development of research in transportation management, especially the use of IoT technology. There are 743 documents according to the keywords given related to IMS and ITS, the period 2012 until September 2021. Mapping of these articles, both in terms of publishers, the relationship between authors, and the methods used from keywords, abstracts, and titles, is expected to help the author determine research gaps and future research directions.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cost-Effective IoT Device for Protecting People from the Dangers of Environmental Risk in Bangladesh","authors":"Mahmuda Mahfuz Rimi, Md Rasel Ahmed, Sakhawat Hossan, Masudur Rahaman, Md Anowar Hossen Faysal, Md. Ferdouse Ahmed Foysal","doi":"10.1109/ICCED56140.2022.10010393","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010393","url":null,"abstract":"The factors of population growth, unplanned urbanization, vehicles, factories, and brick kilns are constantly making air quality concerns. In addition, due to lack of public awareness, people are continually facing various kinds of unintended accidents, for example, gas cylinder poisoning. The main objective of our paper is to create a low-cost Internet of Things (IoT) based system that can measure atmospheric air quality and gas leakage. Sensitive data will be stored on the server via the Internet of Things (IoT) device, which will visualize the data from the server via the website and the Android app. Moreover, by understanding the state of the environment, the user will be informed about the environment through Android apps and websites to protect himself from the grip of air pollution and protect himself before an accident like a gas cylinder.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122302662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integration of Government Regulations to Anticipate the Threat of Terrorism with Radioactive and Nuclear Technology","authors":"Mega Agustina, Rika Wijiyanti, T. Mantoro","doi":"10.1109/ICCED56140.2022.10010339","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010339","url":null,"abstract":"The development of science and technology is currently experiencing rapid progress, starting in the fields of energy, oil, non-destructive testing, health, agriculture, and other fields. The use of radioactive substances in the health sector is used for radiotherapy, nuclear medicine, and radiodiagnostics. The use of excess nuclear and radioactive substances can endanger living things and the environment. Monitoring and supervision of the use of these elements are very needed in order to avoid their utilization for non-peaceful purposes, such as terrorism. Nowadays, terrorist attacks in Indonesia began to evolve from the use of conventional explosives to the use of chemical, biological, radioactive, and nuclear materials. The data shows that during the period 2011-2019, there have been six attempted terror attacks using chemical, biological, radioactive, and nuclear elements. This paper examines the role of ministries/agencies in anticipating the use of nuclear and radioactive substances for terrorism. Based on the results of the library study, there are several ministries/agencies that have protocols for handling terrorism attacks that use chemical, biological, radioactive, and nuclear elements, but they are still sectoral. Therefore, it can be concluded that the integration of the regulations/protocols in handling terrorist attacks by using nuclear and radioactive elements are needed in order to increase the monitoring and supervision of the handling of radioactive waste. In addition, it is necessary to add the RPM tools to prevent the misuse of radioactive substances and nuclear materials by irresponsible parties.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120945650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aripin Triyanto, A. Sunardi, Woro Agus Nurtiyanto, Moch Koiru Ihksanudin, Mardiansyah
{"title":"Security System In The Safe With The Personal Identification Method Of Number Identification With Modulo Arthmatic Patterns","authors":"Aripin Triyanto, A. Sunardi, Woro Agus Nurtiyanto, Moch Koiru Ihksanudin, Mardiansyah","doi":"10.1109/ICCED56140.2022.10010402","DOIUrl":"https://doi.org/10.1109/ICCED56140.2022.10010402","url":null,"abstract":"The burglary of a safe in the city of Jombang, East Java, lost valuables belonging to the Cemerlang Multipurpose Trading Cooperative. Therefore, a security system tool was created in the safe that serves as a place to store valuables and important assets. Change the security system using the security system with a private unique method with modulo arithmetic pattern. The security system of the safe is designed in layers which are attached with the RFID tag by registering and then verifying it on the card. Entering the password on the card cannot be read or is not performed, then the system will refuse to open it. arduino mega type 256 components, RFID tag is attached to the RFID reader, only one validated passive tag can open access to the security system, namely number B9 20 E3 0F. Meanwhile, of the ten passwords entered, only three match the modulo arithmetic format and can open the security system, namely password numbers 22540, 51324 and 91032. The circuit system on the transistor in the solenoid driver circuit works after the safety system opens. The servo motor can rotate according to the input of the open 900 servo angle rotation program.","PeriodicalId":200030,"journal":{"name":"2022 IEEE 8th International Conference on Computing, Engineering and Design (ICCED)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121367840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}