{"title":"Web-Based Mapping of Electric Customer Distribution of Pln Sub-District Sawahlunto","authors":"F. Akbar, Septian Tirozi, Haris Suryamen","doi":"10.1109/ICITSI50517.2020.9264975","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264975","url":null,"abstract":"Indonesian state-owned electricity company (PLN) in the sub-district of Sawahlunto is responsible for distributing electricity to all customers in Sawahlunto. Customers' scattered location in the Sawahlunto area has been a long-standing problem for the PLN, especially power loss problem. Therefore, it was necessary to build a web-based Geographic Information System (GIS) that includes all network distribution and customer information. The software development was accomplished using needs analysis, design, implementation, and application testing. Based on the functional needs analysis, we defined the desired functions, such as finding customer information, the nearest routes to customer locations, and showing each customer's power distribution network. The software was built using PostGIS and Google Maps with PHP and Javascript. Testing was conducted using the BlackBox testing method. Tests were performed on each function, and software output with input from the database was compared. Functional testing by three testers proved conclusively that this application fulfilled the design needs.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. I. Arsyad, Albertus Anugerah Pekerti, Bayu Agung Nugraha
{"title":"Time-Slotted LoRaWAN Implementation of GPS Tracker System for Post-Disaster Utilization","authors":"M. I. Arsyad, Albertus Anugerah Pekerti, Bayu Agung Nugraha","doi":"10.1109/ICITSI50517.2020.9264932","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264932","url":null,"abstract":"Post-disaster evacuees who will leave the shelter need to be equipped with a Wearable GPS Tracker device for tracking them. This leads to the communication system requirements between the Wearable GPS Tracker devices used by evacuees and the Server at the shelter. Two-way communication with wide area networks is needed. In this paper, a GPS Tracker system is designed. The designed GPS Tracker system implement the Time-Slotted LoRaWAN method to be able to carry out two-way communication between the Wearable GPS Tracker device and the Server at the shelter. The system able to carry out two-way communication. The server receives the GPS location data from node, and the node receive acknowledgement from server. The server display actual and historical location data of node. The node display the actual location of node. The maximum power consumed by the node is 1.05 Watt. With the 3400 mAh battery can supply the node for 21 hours 27 minutes. The proposed system can become the basis of communication tools, specifically tracking people in postdisaster situations.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127337695","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic Malware Identification Using Naive Bayes Method","authors":"B. Ramadhan, Yudha Purwanto, M. F. Ruriawan","doi":"10.1109/ICITSI50517.2020.9264959","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264959","url":null,"abstract":"Malware is a kind of software that, if installed on a malware victim’s device, might carry malicious actions. The malicious actions might be data theft, system failure, or denial of service. Malware analysis is a process to identify whether a piece of software is a malware or not. However, with the advancement of malware technologies, there are several evasion techniques that could be implemented by malware developers to prevent analysis, such as polymorphic and oligomorphic. Therefore, this research proposes an automatic malware detection system. In the system, the malware characteristics data were obtained through both static and dynamic analysis processes. Data from the analysis process were classified using Naive Bayes algorithm to identify whether the software is a malware or not. The process of identifying malware and benign files using the Naive Bayes machine learning method has an accuracy value of 93 percent for the detection process using static characteristics and 85 percent for detection through dynamic characteristics.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128461448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Celestino Barros, Vítor Rocio, A. Sousa, Hugo Paredes
{"title":"Job Scheduling in Fog Paradigm - A Proposal of Context-aware Task Scheduling Algorithms","authors":"Celestino Barros, Vítor Rocio, A. Sousa, Hugo Paredes","doi":"10.1109/ICITSI50517.2020.9264945","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264945","url":null,"abstract":"According to the author’s knowledge task scheduling in fog paradigm is highly complex and in the literature there are still few studies on it. In the cloud architecture, it is widely studied and in many researches, it is approached from the perspective of service providers. Trying to bring innovative contributions in these areas, in this paper, we propose a solution to the context-aware task-scheduling problem for fog paradigm. In our proposal, different context parameters are normalized through Min Max normalization, requisition priorities are defined through the application of the Multiple Linear Regression (MLR) technique and scheduling is performed using Multi-Objective Non-Linear Programming optimization (MONLIP) technique.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116789499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Availability Storage Server with Kubernetes","authors":"A. Khatami, Yudha Purwanto, M. F. Ruriawan","doi":"10.1109/ICITSI50517.2020.9264928","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264928","url":null,"abstract":"High availability server (HAS) is a concept in which the server resources continuously available through any interference of the virtual and physical server. HAS is widely used for various purposes such as online trading services, business and Big Data needs. To optimize storage, it needs a special way to minimize costs incurred and be able to optimize the existing server. This research has implemented a system of high availability server using Kubernetes and distributed storage. The system was capable of meeting the resource requests even though one instance was interrupted. And if an instance was down, the services stored in the cluster could still be accessed through other instances. Based on the reliability and availability testing, the system was capable of meeting the high availability criteria, by reaching an uptime rate of 100%.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122015983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. D. Putra, A. D. Sumari, I. Asrowardi, E. Subyantoro, Luqman Muhammad Zagi
{"title":"First-Round and Last-Round Power Analysis Attack Against AES Devices","authors":"S. D. Putra, A. D. Sumari, I. Asrowardi, E. Subyantoro, Luqman Muhammad Zagi","doi":"10.1109/ICITSI50517.2020.9264976","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264976","url":null,"abstract":"Power analysis attacks are a known method of breaking cryptographic algorithms such as AES. The scenario is a first-round and last-round attack based on CPA and hamming distance, each of which provides candidates for 16 secret state key. This paper demonstrates a series of attacks on a secure AES microcontroller device, where the f rmware f les have been encrypted with AES128 EBC. A correlation power analysis (CPA) attack is performed on AES128 to recover the complete master key. The use of CPA attacks is carried out on the first-byte state at First- Round and Last-Round. The correlation coefficient for the entire state in AES in the first-round is 0.712 <<0.8455. Meanwhile, the coefficient value in the second test is 0.1724 <<0.2635. We can conclude the main vulnerability of the AES128 is in the power estimate value that is easy to guess after the SubBytes and INVSubbytes function in each round.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a service computing system platform for monitoring plant nutrient deficiencies based on the SCSE framework","authors":"Heri Andrianto, Suhardi, A. Faizal","doi":"10.1109/ICITSI50517.2020.9264921","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264921","url":null,"abstract":"In the industrial era 4.0, conventional agriculture is shifting towards smart agriculture that utilizes the internet of things technology to help the development of business services to meet the challenges of competitiveness and demand. The gap between the world of agricultural business and information technology needs to be bridged with the discipline of service computing using a service-oriented architecture (SOA) approach therefore the business processes contained in agriculture can be automated using information technology services to support agricultural management. In this paper, the service computing system engineering (SCSE) framework is used to design a service computing system platform for monitoring plant nutrient deficiencies. We also evaluate the results of service computing system platform designs on four SOA principles, namely the coupling factor, cohesion factor, reusability, and complexity factor. The design of the service computing system platform has met the four SOA principles.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130627696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Plan of Service Composition in Pervasive Computing: A Systematic Literature Review","authors":"Ryche Pranita, Suhardi, Wardani Muhamad","doi":"10.1109/ICITSI50517.2020.9264923","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264923","url":null,"abstract":"Service composition made by arranging set of services to achieve specific goals from user task. The steps taken in building service composition are obtained from the service life cycle, consisting of definition, selection, deployment, and execution phase. Service composition is more complicated in pervasive computing since service is created by a simple task deployed in distributed devices. The devices in the pervasive environment can be a service itself. Several challenges are faced in making service composition in pervasive computing, such as limited system knowledge and resource, unpredictable service availability, and heterogeneity. Hence, it requires service plan that can mapping user requests containing the planning goal and the composition corresponds to the plan. This planning process is carried out by the transformation of user requirements and business processes. In this paper, we adopt systematic literature review (SLR) and define some research question (RQ) to research in various database journal. Twenty-two articles were selected based on the search result and then reviewed. We extracted and summarized service composition using planning approach and find the implementation area in pervasive computing.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricky Akbar, Meza Silvana, M. H. Hersyah, M. Jannah
{"title":"Implementation of Business Intelligence for Sales Data Management Using Interactive Dashboard Visualization in XYZ Stores","authors":"Ricky Akbar, Meza Silvana, M. H. Hersyah, M. Jannah","doi":"10.1109/ICITSI50517.2020.9264984","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264984","url":null,"abstract":"Data Management is one of the crucial processes carried out at XYZ Store to get information about the sale of products. In carrying out its operational activities, XYZ Store uses the Smile Invent application to manage data on products sales transactions. Still, this application has not been able to assist managers in producing the required reports. Therefore, one way to overcome this problem is by implementing the Business Intelligence (BI) application at the XYZ Store by using Interactive Dashboard Visualization. In implementing the BI application, the BI Roadmap is used as a basis for conducting research starting from the identification of problems to be selected. After that, the planning phase is carried out by evaluating the infrastructure and planning projects. Then the analysis phase focuses on carrying out a detailed analysis of business problems and opportunities from BI implementation. Next is the design phase by carrying out the data warehouse design process and ETL using the Pentaho Data Integration (PDI). Then the implementation phase is carried out, namely the selection and use of BI application tools to perform Data Visualization. It is hoped that this research can produce reports in the form of Interactive Dashboard Visualization that can be used by store managers to make better decisions.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128053455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Yana, Danarto Tri Sasongko, A. Wardhana, Kwee Felicia Ilona, M. R. Shihab, B. Ranti
{"title":"The Function of PMO for Successful Program-Project Management in The Bank Company – A Case Study","authors":"R. Yana, Danarto Tri Sasongko, A. Wardhana, Kwee Felicia Ilona, M. R. Shihab, B. Ranti","doi":"10.1109/ICITSI50517.2020.9264933","DOIUrl":"https://doi.org/10.1109/ICITSI50517.2020.9264933","url":null,"abstract":"The purpose of this paper is to investigate the specific function of Program Management Office (PMO) to manage multiple Kaizen or improvement projects and how we can implement PMO with more effective and more efficient to deliver value, benefits and achieve business goal in bank company. Research indicate that project management become increasingly difficult to manage when multiple projects are many overlapping projects in a project-oriented company, the goal in a need for enhanced bank company controls to increase success rates. It caused with implementation of a system that help project management, the system named Project Management Office (PMO) that is essential for bank company that are project-oriented and faced many overlapping projects. The PMO with an essential model that will explain to us to have management system of multiple project effectively in a banking company. Using a case study in one of banking industry in Indonesia, to test the method of research found that PMO deliver excellent value for bank company. The survey result of PMO function saw that most of project stakeholders in banking company agreed to 5 (five) categories and 20 (twenty) specified of PMO function implementation to manage several banking projects excellent. based on the results of the questionnaire, stakeholders answered more agreeably with the function of PMO for success project management at bank company and it could answer to the question that the method has deliver benefit and create goals for project management office performance in bank company.","PeriodicalId":286828,"journal":{"name":"2020 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128092385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}