{"title":"Modeling Cloud Forensics Readiness using MetaAnalysis Approach","authors":"Samuel Andi Kristyan, Suhardi, T. Juhana","doi":"10.1109/ICITSI50517.2020.9264943","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264943","url":null,"abstract":"Cloud computing technologies are one of the most developed knowledge fields today. This has changed the industry in managing and providing business services. Increased use of cloud computing also increases security risks due to its open environment. Therefore, we need a security enhancement model that can be implemented in a cloud environment. Forensics readiness is a method that can be used to maximize an organization’s potential in responding to violations. However, there is no standard forensics readiness model that can be applied properly to cloud environments. This study proposes a cloud forensics readiness model using meta-analysis. The study was conducted on 22 publications that produce classification matrix components that have extensions.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115175634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Mel Frequency Cepstrum Coefficients and Dynamic Time Warping Algorithms on Door Physical Security System using Voice Recognition Pattern","authors":"Desta Yolanda, M. H. Hersyah, R. Pratama","doi":"10.1109/ICITSI50517.2020.9264907","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264907","url":null,"abstract":"The door physical security system with voice recognition pattern is intended to amplify the security system and make it easier for users to access the house entrance. The experiment was carried out on a proportional small-scale prototype consisting of input media in the form of a reed switch sensor and a microphone on the user's smartphone, an actuator in the type of a solenoid door lock controlled by a relay, and the output media as a display on the Android application. By using a sensor reed switch to read the condition of a closed or open door, a servo motor to move the automatic entry and a solenoid door lock to perform automatic door locking. We can match the voice of the user entered with voice data that has been recorded on the embedded system. The application of the Mel Frequency Cepstrum Coefficients method in determining the extraction of sound features and Dynamic Time Warping to determine the sound match score. If the sound matching process is successful (valid), the system will give an output in the form of the action of opening, closing, and locking the house door automatically. The success rate of the system in doing pattern voice recognition is 80-90%. The optimal distance for accessing house doors in this system is less than 10 meters. The total response time required by the system to open and close and lock the user's door based on the allowed user input is ± 6 seconds.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130954965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ida Nurhaida, Vina Ayumi, Handrie Noprisson, Anita Ratnasari, Marissa Utami, Erwin Dwika Putra
{"title":"Web Development Using WISDM and RAD","authors":"Ida Nurhaida, Vina Ayumi, Handrie Noprisson, Anita Ratnasari, Marissa Utami, Erwin Dwika Putra","doi":"10.1109/ICITSI50517.2020.9264939","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264939","url":null,"abstract":"The web development project for the business organization must be covered not only stakeholder needs but also completed in limited time. This research attempted to present how to use WISDM and RAD methodology as well as supporting by SUS method and rich picture for completing the time-intensive project and meeting stakeholder needs. A case study was undertaken by accomplishing web development project named SysIO and Sysbatik. As a result, the methodology phase that is consisted of requirement planning (rick picture, organizational analysis, information analysis), user design (HCI), construction (technical design, SUS method), cut over (work design) can be a guide to complete both of projects.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126987854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of Smart Greenhouse System for Hydroponic Agriculture","authors":"Heri Andrianto, Suhardi, A. Faizal","doi":"10.1109/ICITSI50517.2020.9264917","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264917","url":null,"abstract":"Food availability is a very important problem to be resolved due to the growing world population. The problem faced is how to increase agricultural production. In addition, how to reduce the use of pesticides so that they are not harmful to humans. One solution to overcome this problem is to create a smart greenhouse system. Farming in this smart greenhouse system does not use pesticides. This study aims to develop smart greenhouses for hydroponic farming based on the Internet of Thing (IoT). In this study, we also measured the chlorophyll content of mustard leaves grown hydroponically in a greenhouse system to determine the nitrogen status of the mustard plant. The controller unit of this system is the Arduino Mega2560. Data on temperature, humidity, TDS, PH, light, and actuator conditions (pumps, lights, fans, sprayers, and valves) are stored on the real-time database firebase. Data communication between the Arduino Mega2560 and the Firebase platform uses an internet connection via the ESP-01 module. The results showed that all components such as sensors and actuators were functioning properly. Environmental conditions in the greenhouse can be monitored via an application on a smartphone and all actuators can be controlled via an application on a smartphone.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132405604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICITSI 2020 TOC","authors":"","doi":"10.1109/icitsi50517.2020.9264920","DOIUrl":"https://doi.org/10.1109/icitsi50517.2020.9264920","url":null,"abstract":"","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131637277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiple Laboratory Authentication System Design Using Fingerprints Sensor and Keypad Based on Microcontroller","authors":"M. H. Hersyah, Desta Yolanda, Harmon Sitohang","doi":"10.1109/ICITSI50517.2020.9264969","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264969","url":null,"abstract":"An authentication system is a process of verifying personal data from users who attempt to access a particular system. One example of authentication that is commonly used is biometric authentication. Biometric authentication possess a high complexity, so if biometric data is used as input, then there is little possibility of errors or forgery. In this study, we implemented a dual authentication system, namely biometric authentication in the form of fingerprints and passwords. The dual authentication system in the laboratory room is intended to improve the security system and facilitate the user in accessing the laboratory room. The experiment was carried out on a proportional small scale prototype consisting of input media in the form of a fingerprint sensor and keypad, an actuator in the form of a door lock solenoid controlled by a relay, and the output media in the form of an LCD and buzzer. By using the fingerprint sensor to scan each user’s unique fingerprint, we can commence the matching fingerprint data entered with the fingerprint data that has been recorded on the embedded system. After the fingerprint authentication process is completed, the password verification process will be continued with the input via the keypad. If the fingerprint and password authentication process is successful (valid), the system is able to open and close the room door automatically. The system takes approximately ± 0.62 seconds to alter the condition of the closed door to be opened, and ± 3.74 seconds to change the condition of an open door to be closed","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132065163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muchammad Arfan Lusiandro, S. M. Nasution, C. Setianingsih
{"title":"Implementation of the Advanced Traffic Management System using k-Nearest Neighbor Algorithm","authors":"Muchammad Arfan Lusiandro, S. M. Nasution, C. Setianingsih","doi":"10.1109/ICITSI50517.2020.9264952","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264952","url":null,"abstract":"With the rapid population growth in Indonesia, the development of traffic becomes congested; various ways have been done to overcome traffic jams, one of which is by using the Advanced Traffic Management System (ATMS), which is a development branch of the Intelligent Transportation System (ITS) and uses the k-Nearest Neighbor (k-NN) algorithm which is an algorithm that uses the object classification method based on learning data that is the closest distance to the object. Overcoming traffic jams is a problem that must be faced, especially at certain hours. Therefore, to overcome this, it is necessary to have traffic lights to drive in an orderly manner. To simulate, it can use one simulation software, namely SUMO (Simulation of Urban Mobility). Using simulation software to simulate traffic density at the intersection, it is hoped that it can visualize the traffic intersection state, breaking down the thickness. Using the Simulation of urban mobility software, it is expected to simulate traffic density to break down congestion at traffic intersections with data obtained from the k-NN algorithm data training. Measurements used using error rate measurements include Mean Absolute Percentage Error (MAPE) and Root Mean Square Error (RMSE) as well as Time Series Prediction.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The role of Mobile Skillfulness and User Innovation toward Electronic Wallet Acceptance in the Digital Transformation Era","authors":"B. T. Khoa","doi":"10.1109/ICITSI50517.2020.9264967","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264967","url":null,"abstract":"The age of digital transformation has profound effects on the businesses’ operations and consumer behavior. Payment through electronic wallet, which is one of the solutions to digitize consumer payables and corporate receivables, is increasingly popular globally. This study had enriched the Technology Acceptance Model (TAM) to explore the role of mobile skillfulness and user innovation in the electronic wallet acceptance of consumers in the digital transformation era. Both qualitative and quantitative research methods were used to achieve the research goal. Research results affirmed the TAM model applied toward e-wallet service, besides, showed the positive effect of mobile skillfulness and user innovation on consumers’ intention to accept the e-wallet in daily transactions. Some managerial implications were also suggested for regulators at e-wallet service providers.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127712692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of Object Tracking System Based Mean-Shift with Locust Search Optimization on Raspberry Pi","authors":"Inkreswari Retno Hardini, Y. Bandung","doi":"10.1109/ICITSI50517.2020.9264941","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264941","url":null,"abstract":"Having an optimal object tracking system is an advantage especially in everyday use. One of the example is use in victim localization. The optimal object tracking system as mentioned earlier means a system that capable of reaching the convergence point of region of interest (ROI) with small number of iterations. The smaller the number of iterations needed for reaching the convergence point, the faster the system follows the object’s movement. A system that is able to follow the movement of objects quickly, especially in accordance with case studies of victim localization, is certainly needed. In this paper, the object tracking system is built on Mean-Shift algorithm. Mean-Shift has a convergent search technique that requires a large number of iteration processes. In order to achieve an optimal object tracking system as the purpose of this paper, an optimized algorithm is carried out. Instead of shift the ROI point sequentially until reach the optimum point as done in Mean-Shift, the optimization algorithm will search the ROI optimum point randomly with a movement that pays attention to the previous optimum point. Optimization algorithm used in this paper is Locust Search algorithm. Object interest being tracked in this paper is human face. Object tracking system will be deployed in Raspberry Pi 3 Model B+ because of its characteristics that are suitable to be implemented in this paper’s case, in form of prototype.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124406921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technical Training for Self-Efficacy Improvement of SIARIP Users at the National Archives of the Republic of Indonesia","authors":"Lufi Herawan, Alfiana Indah Muslimah","doi":"10.1109/ICITSI50517.2020.9264944","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264944","url":null,"abstract":"SIARIP is an e-government application that organizes and stores records of the National Archives of the Republic of Indonesia. The implementation of SIARIP as e-government is needed to support the National Movement for the Awareness of Orderly Archiving implementation which was initiated by the National Archives of the Republic of Indonesia. The user acceptance of information systems implementation is strongly influenced by several factors including self-efficacy. For a successful SIARIP implementation, it is necessary to increase the self-efficacy of SIARIP’s users. The improvement of self-efficacy is done using technical training as one of the sources that influences the self-efficacy, namely verbal persuasion. The study was conducted using quantitative methods using a quasi-experimental approach to the design of experimental group pre-test and post-test. There were 22 respondents involved in this study. They are SIARIP’s users in the form of records officers at the National Archives of the Republic of Indonesia. Questionnaire results obtained were processed using SPSS using sign test analysis, with the results of the calculated value of sign test (1-tailed) is worth 0.067. Because the value is more than 0.05, it can be concluded that technical training can not increase the value of self-efficacy.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126457296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}