{"title":"Factors Affecting Intention to Use a New Human Resource Information System at One of the Small and Medium Enterprises in Indonesia","authors":"D. A. Irawan, E. Oey, Baptista Hutomo Pamungkas","doi":"10.1109/iSemantic55962.2022.9920457","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920457","url":null,"abstract":"This study aims to analyze factors affecting the intention to use a new human resource information system at PT. XYZ. PT. XYZ is a small-medium enterprise located in Jakarta, Indonesia. Due to the Covid-19 pandemic, the company switched from a manual to an electronic human resource information system. The sample of this study is all employees of PT. XYZ. The questionnaires were distributed directly to 36 employees of PT. XYZ. The data were analyzed using multiple linear regression analysis. The results showed that owner and technology vendor support significantly influence the intention to use a new human resource information system. The novelty of this research is combining the technology acceptance model theory, the technology-organization-environment framework, and the yale communication model.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114510807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implement Android Application for Determination and Monitoring Blood Chemistry","authors":"I. Kurniastuti, T. D. Wulan, Difran Nobel Bistara","doi":"10.1109/iSemantic55962.2022.9920481","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920481","url":null,"abstract":"Examination of blood chemistry, especially blood glucose, uric acid and cholesterol in the body is a test carried out in routine health checks or in the process of diagnosing a disease. The research aims to produce an android-based application that can determine and monitor the results of blood chemistry examinations that are user-friendly for the community. The research method is literature study, design flowchart, design user interface (UI), implement application, and testing application. The first stage is a literature study to collect data and information about blood chemistry followed by design application regarding the flowchart design and interface of the application. The next stage was implement application regarding the application implementation process based on the design application using android studio and testing application using black box testing, white box testing and user acceptance testing (UAT). Overall the application has been successfully designed and built according to the research method. The results of testing application show that the application runs well and there are no errors. This indicates that the application has been successful and can be used by the public as a supporting application in routine blood chemistry examinations.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123934541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Sunarti, I. Wahyono, H. Putranto, Djoko Saryono, Herri Akhmad Bukhori, Tiksno Widyatmoko, M. Rosli, Nurbiha A. Shukor, Noor Dayana Abdul Halim
{"title":"Lexicon-Based Features on Naive Bayes Modification for Classification of Chinese Film","authors":"S. Sunarti, I. Wahyono, H. Putranto, Djoko Saryono, Herri Akhmad Bukhori, Tiksno Widyatmoko, M. Rosli, Nurbiha A. Shukor, Noor Dayana Abdul Halim","doi":"10.1109/iSemantic55962.2022.9920399","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920399","url":null,"abstract":"There are many Chinese movies on the internet for learning Chinese, one of which is on YouTube. This educational film provides negative and positive comments. To get a good movie to learn Chinese, we need to classify positive and negative comments ratings for Chinese learning that teachers can use in this video. In addition, a review of comments is an evolution of Chinese film ratings. The evaluation of comments included includes storytelling, content, model, visual effects, and more. The review has criticisms and comments that include feelings about the movie on Chinese language learning. Commentator helps movie students compare a movie's mood with positive or negative emotion groups. This research uses the naive Bayes taxonomy with the Lexicon Based function in sentiment analysis of comments. The classification process considers the appearance of words of emotional content in the score and the possible score values for positive or negative emotional classes. Based on test results, feature selection accuracy, precision, and recall in the form of stop word exclusion receive scores of 0.91, 0.87, and 0.98, respectively.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129688437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swardiantara Silalahi, Umi Laili Yuhana, T. Ahmad, H. Studiawan
{"title":"A Survey on Process Mining for Security","authors":"Swardiantara Silalahi, Umi Laili Yuhana, T. Ahmad, H. Studiawan","doi":"10.1109/iSemantic55962.2022.9920473","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920473","url":null,"abstract":"Security is one of the main issues in the era of technology that every organization should take into account. Among the existing approach, process mining takes an important role in security investigations. The ability to discover the process and check the conformance of the running process are key features of process mining which helpful to perform security investigation. The deviation between the process model compared to event log data is considered a security issue. Thus, it is important to keep the log data stored safely and well-documented. However, many information systems are not process-aware due to the variability of the event data sources. Therefore, this paper briefly identifies and summarizes previously published studies and recent works in terms of the state-of-the-art process mining techniques used in the security domain. This survey identifies the existing effort on methods, datasets, tools and frameworks. Finally, we summarize possible future works in utilizing process mining for security-related problems.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128568946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Andono, Filmada Ocky Saputra, G. F. Shidik, Zainal Arifin Hasibuan
{"title":"End-to-End Circular Economy in Onion Farming with the Application of Artificial Intelligence and Internet of Things","authors":"P. Andono, Filmada Ocky Saputra, G. F. Shidik, Zainal Arifin Hasibuan","doi":"10.1109/iSemantic55962.2022.9920447","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920447","url":null,"abstract":"The agricultural sector in Indonesia plays an essential role in economic development and food security in Indonesia, with an average contribution of 13.5% to Gross Domestic Product (GDP). One of the strategic agricultural commodities in daily needs is onions. Agriculture in Indonesia has not been able to produce onions that allow the fulfillment of fluctuations in people's consumption needs. Onion production is sometimes abundant, so it is wasted and makes prices fall. On the other hand, there are times when the availability of onions in the community is deficient, so the price becomes very high. It is possible to solve this by building a system that can integrate all the nodes involved in supply chain management (SCM) and customer relationship management (CRM). Furthermore, this will create a balance between supply and demand, and revive the various micro, small and medium enterprises (MSME) involved in the value chain. The demand is quite significant, forcing Indonesia to still require imports of several agricultural commodities the community needs in their daily lives. However, this is one of the factors related to competitiveness with local farmers' yields and unstable onion prices. This is an early study about on how to model the optimization end-to-end value chain of onions. Optimizing the agricultural cycle in Indonesia, such as optimizing agricultural land, harvest cycles, supply and demand for crops, storage and delivery of crops, and determining commodity prices can improve food security in Indonesia.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"636 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. P. Linuwih, G. B. Satrya, S. Mugitama, M. S. Maulana
{"title":"Space-Efficient Probabilistic Data Structure Ribbon Filter: Analysis, Design, and Optimized Implementation","authors":"B. P. Linuwih, G. B. Satrya, S. Mugitama, M. S. Maulana","doi":"10.1109/iSemantic55962.2022.9920402","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920402","url":null,"abstract":"Filtering a data structure that is too close to a set of hashable keys may return false positives. Existing practical filters, such as the Bloom filter, require a space overhead of at least 20% because Bloom only performs a probabilistic check of assigned memberships, internal hashes, and can easily populate the entire filter causing potential minor DOS. This paper, as a further study, proves the Ribbon filter as a novel filter for static sets with various configurable space overheads and false positive rates at competitive speeds over that range. In many cases, the Ribbon is faster than existing filters for the same space overhead or can achieve under 10% space overhead with some additional CPU time. Ribbon filters resemble Xor filters modified to maximize locality and are constructed by solving linear band-like systems over Boolean variables.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126726986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. H. Rachmawanto, L. Budi Handoko, Chaerul Umam, Cahaya Jatmoko, R. R. Ali
{"title":"Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication","authors":"E. H. Rachmawanto, L. Budi Handoko, Chaerul Umam, Cahaya Jatmoko, R. R. Ali","doi":"10.1109/iSemantic55962.2022.9920438","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920438","url":null,"abstract":"Digital certificates are digital files that are conventionally used as proof of participation or a sign of appreciation owned by someone. Cryptographic authentication method using digital signatures that are used as confidential evidence and validation of digital certificate ownership. Digital signatures use cryptographic algorithms such as one-way hashes, non-symmetric key cryptography, and symmetric key cryptography. So this study uses the proposed algorithm used, namely SHA-256, DSA & 3DES. The SHA-256 algorithm is used because of its high security, while the DSA algorithm is a special standard for digital signatures with 2 (two) functions, namely signing & verifying, and the last is the 3DES algorithm as double security which guarantees 3 (three) times the encryption process and description. By implementing a digital signature using the SHA256 hash method, the DSA signing & verifying method, and the 3DES cryptographic algorithm, digital certificates can avoid editing threats, and ensure authentication security and validation of the validity of the file, so that it can detect the original digital certificate. In 10 experiments, it is known that the digital signature method with the SHA-256, DSA and 3DES algorithms has an average run time speed of 0.0518186331 seconds for the signing method and 0.1321175146 seconds for the verify method.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126465774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Clustering Methods for Health Clinic Stock Goods","authors":"Oki Derajat Sudarmojo, Purwanto, M. Soeleman","doi":"10.1109/iSemantic55962.2022.9920416","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920416","url":null,"abstract":"Clinics are health service facilities for the community that provides medical services, but sometimes some clinics do not have the stock of goods needed by the community. This is because the inventory management system does not always update the stock of goods that are empty or piled up. The problem is certainly detrimental to the clinic and the community. Because this is done optimization on the stock of goods. One way to group goods is to use the clustering method. In this study, the author will compare the X-Means Algorithm, K-Means Algorithm, and K-Medoids Algorithm, to compare which algorithm is more optimal in grouping stock items at Health Clinic. The results obtained using 3 clusters show that the X-Means Algorithm has the smallest DBI value of 0.075. So that we can conclude that the X-Means algorithm is more optimal than the K-Means algorithm and the K-Medoids algorithm.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"1440 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132670602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. N. Alfa Farah, Wiwiek Hayyin Suristiyanti, Sholihul Ibad, R. A. Pramunendar, Guruh Fajar Shidik
{"title":"GLCM Feature Extraction and PCA for Tuberculosis Detection with Neural Network","authors":"M. N. Alfa Farah, Wiwiek Hayyin Suristiyanti, Sholihul Ibad, R. A. Pramunendar, Guruh Fajar Shidik","doi":"10.1109/iSemantic55962.2022.9920478","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920478","url":null,"abstract":"Automatic recognition system for medical images is quite a challenging job in the medical image processing field. X-rays, CT, and MRI all provide medical pictures and other modalities which are utilized for diagnostic purposes. As in medical sector, detecting tuberculosis (TB) is a very important stage before further treatment is carried out. Human interpretation of a vast array of X-ray pictures can result in detection mistakes, so an automatic recognition system is needed that can detect TB disease. In this study, we use a dataset with two classes and extract GLCM-based texture features from each class, and apply them to a two-layer feed-forward neural network, which gives a classification rate of 99%.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WhatsApp Profile Photo Investigation in Relation with Personality Traits Prediction","authors":"Mukhlish Fuadi, A. Wibawa","doi":"10.1109/iSemantic55962.2022.9920375","DOIUrl":"https://doi.org/10.1109/iSemantic55962.2022.9920375","url":null,"abstract":"Personality is closely related to performance, but the implementation of personality tests is not easy to carry out, with a short time and minimal bias. As the most popular private messaging application, WhatsApp is not only used in social but also in professional communication. Its intimate nature makes the profile photo more personal than other social media. This study aims to predict a person's personality based on a WhatsApp profile photo by extracting content features. In this study, 132 respondents have filled out the Big Five Personality Test online and have allowed us to access their WhatsApp profile photos. The results of this study indicate, except for openness, that there is a significant relationship between personality traits and pictures used as profile photos. The content features of WhatsApp profile photos can also be used to predict personality traits. These findings prove that someone's personality affects the selection of their WhatsApp profile photos and vice versa.","PeriodicalId":360042,"journal":{"name":"2022 International Seminar on Application for Technology of Information and Communication (iSemantic)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128090613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}