2022 10th International Conference on Cyber and IT Service Management (CITSM)最新文献

筛选
英文 中文
Modified Local Updates of the Ant Colony Optimization Algorithm for Image Edge Detection 一种改进的局部更新蚁群算法用于图像边缘检测
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935991
David, Edy Victor Haryanto S, Febriana
{"title":"Modified Local Updates of the Ant Colony Optimization Algorithm for Image Edge Detection","authors":"David, Edy Victor Haryanto S, Febriana","doi":"10.1109/CITSM56380.2022.9935991","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935991","url":null,"abstract":"Edge detection refers to the process of extracting edge information of an image. It is considered as a basic step used in the majority of image processing applications. The aim of this study was to modify local updates of pheromones. Therefore, the convergence of the Ant Colony Optimization (ACO) algorithm applied to image edge detection could be accelerated effectively. Such the algorithm is a metaheuristic method applying the ants as agents with their pheromone updates for an effective and efficient solution of search processes. Five ACO algorithms for edge detection, i.e., ACO, modified ACO, ACO with the Sobel operator, ACO with the Prewitt operator, and ACO with the Isotropic operator were in comparison. Nearly optimal solutions of several image datasets were discovered through examination of the number of ants and iterations. Additionally, calculation results of each image dataset and algorithm were compared. The evidence shows that solutions produced by all algorithms are equally good. For an image dataset with more ants, however, it is found that the modified ACO algorithm has the best solution in terms of time convergence. The study contribution is further next to adding the concept of improving edge detection in the image with the ant colony optimization algorithm. The implementation of the study carried out is to modify local updates which are functionally used for improving the edge detection dealt with by ants taking part in ACO.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121216140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Development Integrated Sensor System for Measuring Body Temperature and Heart Rate 体温和心率测量集成传感器系统的设计与开发
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935865
A. Hartono, Rino Gabriel Alfarizi, Salsabila Tahta Hirani Putri, E. Sanjaya
{"title":"Design and Development Integrated Sensor System for Measuring Body Temperature and Heart Rate","authors":"A. Hartono, Rino Gabriel Alfarizi, Salsabila Tahta Hirani Putri, E. Sanjaya","doi":"10.1109/CITSM56380.2022.9935865","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935865","url":null,"abstract":"Heart rate and body temperature are some of the important components of a person's main vital signs that need to be monitored regularly and periodically. The detection system technology continues to develop which allows a person to detect his own condition, to avoid exposure to COVID-19. However, the tools that are developing in the market are quite expensive and sometimes complex in operation because they are external products, so that it becomes a difficulty in itself. For this reason, it is important to design a detection device with sensor components that exist in the country and with a simple design so that it is easy to operate and inexpensive. In this paper, utilizing pulse sensors and AD8232 sensors to detect heart rate and MLX90614 sensors to measure body temperature, then NodeMCU ESP8266 to process sensor signals received and will be forwarded to the Display (LCD) to display the results carry out the design and development of an integrated sensor system. From the research results, the accuracy of the MLX90614 temperature sensor is very good with the achievement of 99.24% and the pulse sensor with the achievement of 98.86%. For the test results on each sample obtained accuracy values of 98.4% and 99% for the temperature sensor, and 92.3% and 92.2% for the pulse sensor, respectively. From these results, it is very clear that the sensor design deserves to be promoted as a quality product.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128038858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Text Association Rules about Terrorism on Twitter in Indonesia 印尼Twitter上恐怖主义文本关联规则的实施
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935864
Rizal Broer Bahaweres, Diah Ayu Nugrahanti
{"title":"Implementation of Text Association Rules about Terrorism on Twitter in Indonesia","authors":"Rizal Broer Bahaweres, Diah Ayu Nugrahanti","doi":"10.1109/CITSM56380.2022.9935864","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935864","url":null,"abstract":"Along with globalization's positive effects, there are many negative consequences. Cybercrime, cyber-war, and cyberterrorism have entered social media platforms like Twitter. Therefore, identifying opinion patterns in social media is an important research task to understand what types of conversations about terrorism case patterns occur. This study will add to the knowledge of terrorism concerns in Indonesian social media. Then we might be willing to seek guidance way earlier and avoid any conflict. We attempt to analyze Twitter data with the keyword “terrorism” based on the existing problems. We want to prove that using the FP-Growth algorithm can generate rules from terrorism-related tweets. The FP-Growth algorithm generates 75 association rules from Tweet data which was collected on November 20, 2021, with minimum support of 0.05 and minimum confidence of 0.9.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Webqual Method on Online Course in Suburban Area: Post-Pandemic Study 大流行后郊区网络课程的Webqual方法研究
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935925
A'ang. Subiyakto, D. Yuniarto, Aedah Abd Rahman, Muhammad Agreindra Helmiawan, M. Suryadi, D. Junaedi
{"title":"Webqual Method on Online Course in Suburban Area: Post-Pandemic Study","authors":"A'ang. Subiyakto, D. Yuniarto, Aedah Abd Rahman, Muhammad Agreindra Helmiawan, M. Suryadi, D. Junaedi","doi":"10.1109/CITSM56380.2022.9935925","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935925","url":null,"abstract":"Suburban areas become an object of research that attracts researchers in terms of assessing the quality of the Online Course Website. The findings at the beginning of the research regarding the poor quality of information on the Online Course make users feel confused. The purpose of this study is to establish the quality of the Online Course Website using the Webqual Method and to determine what factors affect the quality of the Online Course Website in the Suburban Area during the Post-Pandemic. The researcher reports on the results of the research, that the quality of the Online Course website in the Suburban Area using the Webqual Method is categorized as good, as shown from the results of the analysis on the Usability Quality and Service Interaction Quality variables. While the factors that affect the Quality of the Online Course Website are obtained from proving 3 hypotheses which state that everything is acceptable. The contribution of this research is that it can be used as a reference by further researchers regarding alternative problem solving in making an Online Course website with the Webqual Method. Some of the things that the researcher reports can also be used as material for the Online Course Website Developer. Of course with a different object of research will be very interesting to do.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124613876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Goal-Oriented Requirements Analysis of Online Public Complaints System Using SAR, R2G, and KAOS Methods 基于SAR、R2G和KAOS方法的面向目标的网上公众投诉系统需求分析
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935902
I. Shofi, Nashrul Hakiem, Nurul Faizah Rozy, Shofan Amirudin, Nenny Anggraini, Luh Kesuma Wardhani
{"title":"Goal-Oriented Requirements Analysis of Online Public Complaints System Using SAR, R2G, and KAOS Methods","authors":"I. Shofi, Nashrul Hakiem, Nurul Faizah Rozy, Shofan Amirudin, Nenny Anggraini, Luh Kesuma Wardhani","doi":"10.1109/CITSM56380.2022.9935902","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935902","url":null,"abstract":"There are some methods to perform goal-oriented requirements analysis, i.e.: KAOS, GBRAM, i*, etc. The House of Representatives of Republic of Indonesia, as we call DPR RI, is an institution with obligations to accommodate people's aspirations and complaints. DPR RI Online Public Complaints System (PCS) is one of the media that can be used by the public to provide complaints to the DPR RI. Through interviews with experts, the current DPR RI Online PCS (system-as-is) still needs to be developed, so it needs to be performed in-depth requirements analysis of the system. The analysis was performed using the GORE (Goal-Oriented Requirements Engineering), by combining SAR (Select Appropriate Regulations), R2G (Regulations to Goal Model), and KAOS (Keep All Objectives Satisfied) methods. The results of the requirements analysis that have been carried out show that the SAR, R2G, and KAOS methods are proven to bend suitable to analyze the requirements of the DPR RI Online PCS. Furthermore, the analysis shows that system-as-is can only realize 13 system requirements or equal to 81.25% of the total 16 actual system requirements (system-to-be), so there is a gap between system-as-is and system-to-be of 3 system requirements or 18.75%.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124983941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Critical Success Factor in E-Learning: A conceptual framework for determining the success factors 电子学习中的关键成功因素:确定成功因素的概念框架
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935978
H. Nanang, A. F. Misman, Z. Zulkifli, Yusuf Durachman, H. Sukmana, Victor Amrizal
{"title":"Critical Success Factor in E-Learning: A conceptual framework for determining the success factors","authors":"H. Nanang, A. F. Misman, Z. Zulkifli, Yusuf Durachman, H. Sukmana, Victor Amrizal","doi":"10.1109/CITSM56380.2022.9935978","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935978","url":null,"abstract":"This successful implementation of the e-learning system is one of the most important things, including user acceptance of the system. The critical factors that lead to the successful implementation of the e-learning system are the objectives of this research. By using the success and benefits approach to get consensus from expert respondents about the most critical factors that will contribute to the success of e-learning in Higher Education (HEs) in Indonesia. We then use these results to create a framework that adopts and adapts the previous theories highlighting 5 important factors including website quality, technology options, top management support, and awareness of e-learning by academics. The results of this research will help developers, and decision-makers to better understand the importance of successful e-learning system development.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Deep Learning Based NLP Techniques for Chatbot Development: An Exhaustive Survey 最近基于深度学习的聊天机器人开发NLP技术:详尽的调查
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935858
Bhupesh Rawat, A. Bist, U. Rahardja, Q. Aini, Yulia Putri Ayu Sanjaya
{"title":"Recent Deep Learning Based NLP Techniques for Chatbot Development: An Exhaustive Survey","authors":"Bhupesh Rawat, A. Bist, U. Rahardja, Q. Aini, Yulia Putri Ayu Sanjaya","doi":"10.1109/CITSM56380.2022.9935858","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935858","url":null,"abstract":"Chatbots are becoming popular as many applications need it. E-commerce, aviation, supply chain management companies etc. are using AI based chatbots to attract customers. Deep learning is another vertical impacting chatbots' behavior by bringing it close to human physiology. Ways of interaction directly enhance the business productivity that is the main reason for the rise of chatbots. Chatbots are evolving with the use of emerging techniques. In this paper we are making a detailed study of recent deep learning techniques for chatbots. It will bring understanding of developers closer towards good chatbot design. We will cover current gaps and solutions to catalyze current research.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Creating Prototype using Design Sprint for Da'wa Mobile Application 使用Design Sprint为Da'wa移动应用程序创建原型
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935910
Fenty Eka Muzayyana Agustin, Khair Fadhillah, Marshya Amirah Kamal, Muhamad Zulfan Taqiyudin Baehaki, Muhamad Fadlie Putra Pratama, Zahra Nabila Falenanda
{"title":"Creating Prototype using Design Sprint for Da'wa Mobile Application","authors":"Fenty Eka Muzayyana Agustin, Khair Fadhillah, Marshya Amirah Kamal, Muhamad Zulfan Taqiyudin Baehaki, Muhamad Fadlie Putra Pratama, Zahra Nabila Falenanda","doi":"10.1109/CITSM56380.2022.9935910","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935910","url":null,"abstract":"Mobile apps support many daily activities among young users, especially for activities that support their lifestyle, education, and entertainment. This study aims to contribute to the use of mobile apps to present Islamic religious content to young adult users. The Design Sprint method was chosen because it supports fast and adaptive design development. The interaction design testing used ten principles of usability Heuristic Evaluation by Jakob Nielsen. Usability testing is conducted by distributing questionnaires and in-depth interviews with users. The usability testing index was in the range of 80-100%. Therefore, it can be explained that the use of Design Sprints had a high usability value.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain, Information and Speculation Calculations in Indonesia: Recent Work 印度尼西亚的区块链、信息和投机计算:最近的工作
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935848
Po Abas Suraya, Tarisya Ramadhan, Ninda Lutfiani, Alifah Khoirunisa, U. Rahardja
{"title":"Blockchain, Information and Speculation Calculations in Indonesia: Recent Work","authors":"Po Abas Suraya, Tarisya Ramadhan, Ninda Lutfiani, Alifah Khoirunisa, U. Rahardja","doi":"10.1109/CITSM56380.2022.9935848","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935848","url":null,"abstract":"Connecting cities further into nearby supply chains worldwide is the basis of Indonesia's provincial finance progress. We analyze Indonesia's budget considerations, allocations, and Blockchain investigations. We argue that we must address the four issues of topographic access, high costs, lack of managing account items, and no education related to money to address budget embezzlement. We propose investigating selection initiation, appropriation design, and outcomes to develop this understanding. The usage of blockchain in the financial sector truly extends beyond simple cryptocurrency exchanges. The usage of blockchain in the financial sector is very broad, the Chief Executive Director of the Payment System Policy Department of Bank Indonesia (BI), who was quoted by daily social. The answers to these devotional questions will offer help to help us keep our distance better, much better, and higher Novelty of this research by improving the performance of how Blockchain-based progress is accepted in the provinces of Indonesia. This hypothetical commitment is evidence of differentiating information that must be maintained so the Indonesian people can realize monetary considerations. With these criteria, the SWOT analysis is the correct method. SWOT analysis is a research method that identifies various factors systematically to formulate corporate strategy.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Systematic Literature Review: Detecting Cataract With Deep Learning 系统文献综述:深度学习检测白内障
2022 10th International Conference on Cyber and IT Service Management (CITSM) Pub Date : 2022-09-20 DOI: 10.1109/CITSM56380.2022.9935932
S. Masruroh, Daffa Aditya Rahman, Rizka Amalia Putri
{"title":"Systematic Literature Review: Detecting Cataract With Deep Learning","authors":"S. Masruroh, Daffa Aditya Rahman, Rizka Amalia Putri","doi":"10.1109/CITSM56380.2022.9935932","DOIUrl":"https://doi.org/10.1109/CITSM56380.2022.9935932","url":null,"abstract":"A cataract is an eye disease that can lead to blindness if left untreated. Many studies have proposed a system for detecting cataracts to reduce the risk of early blindness. To find out what method is used to create a cataract detection system, it is necessary to make a Systematic Literature Review (SLR) on studies that discuss deep learning-based cataract detection. Of each method proposed, the approach to modeling from scratch using the CNN algorithm is the majority of the methods used. In addition, other methods used include Transfer Learning, Fine Tuning Transfer Learning, Final Classifier, and pre-trained models are also the methods used. Each method has its advantages and disadvantages. From the results obtained, the use of a method and its combination must pay attention to many factors such as whether the method used and its combination is by the objectives and problems to be solved, understanding the limitations that can affect the performance of the model must be the concern of researchers to produce an accurate model.","PeriodicalId":342813,"journal":{"name":"2022 10th International Conference on Cyber and IT Service Management (CITSM)","volume":"27 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132530780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信