Archy Renaldy Pratama Nugraha, A. Hariyanto, Suhardi, Sawung Ma
{"title":"Digital Business Transformation Framework: Mavens Studio Case Study","authors":"Archy Renaldy Pratama Nugraha, A. Hariyanto, Suhardi, Sawung Ma","doi":"10.1109/ICITSI56531.2022.9971039","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971039","url":null,"abstract":"Digital business transformation is the use of technology that creates new business models, processes, software, and systems to generate increased revenue, competitive advantage, and efficiency of an Organisation. The emergence of digital business transformation is triggered by dynamic market changes and changes in consumer behavior in the use of technology and is triggered by the Coronavirus Disease 19 (Covid-19) pandemic. The impact of factors mentioned above affects medium-sized enterprises, in this case, the creative agency that is the research object. To assist creative agencies in maintaining their business, a guideline in the form of a digital business transformation framework is needed because there has not been a framework that can provide measurable guidance for digital business transformation in the sector. Researchers developed this framework using Design Science Research Methodology (DSRM). Evaluation of the proposed framework using a questionnaire with internal company respondents resulted that the aspect of people stating that 92% helped the digital business transformation in the scope of people's involvement in it. However, there was a percentage of 8% stated that they had not measurably minimized the impact of the change. While the results of the technology aspect stated that 100% had been able to help form a technology change team. Finally, the results of the process aspect stated that 100% had been able to explain and achieve the company's KPIs. The conclusion is that all of these aspects have digital business transformations, and the proposed framework can be used as a guide to influence in a structured and measurable way.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116996734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMMONKADS for Knowledge Based System Development: A Literature Study","authors":"Elin Cahyaningsih, Natascha Lestari Eunike Silalahi, Siti Rohajawati, Yuliza Maulina Avianti","doi":"10.1109/ICITSI56531.2022.9970920","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970920","url":null,"abstract":"COMMONKADS is a method for developing knowledge-based system. This method describes foundation, technique, modeling language and document structure for develop the knowledge-based system. COMMONKADS is people-oriented system development methodology, and this methodology is often used for developing organizational knowledge management system. COMMONKADS approach is divided based on context (organizational model, task model, agent model), concept (knowledge model) and artifact (design model). COMMONKADS have been used widely for knowledge-based system in several fields, such as COMMONKADS that integrated in tourism knowledge-based system, COMMONKADS for irrigation expert system, expertise model using COMMONKADS in manufactured company, COMMONKADS in energy management system and many more. Generally, there are eight strengths of COMMONKADS methodology for develop knowledge-based system. Its strength is flexible to use in any scope, represent knowledge (organizational, domain, task and inference knowledge), complete (representation, model, and form), powerful, accurate, comprehensive, represent KM process, systematic and effective. While the weakness of COMMONKADS methodology only three, there are don't have validation process and difficult to acquisition knowledge and use semi formal language, large data storage. Nevertheless, COMMONKADS is recommended methodology for develop knowledge-based system.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131942552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agus Setyanto, Farrel Ahmad, Jonathan Bagus Wicaksono, K. Mutijarsa
{"title":"Smart Trolley with Position Localization Method Based on QR Code Mapping using Computer Vision and Internet of Things","authors":"Agus Setyanto, Farrel Ahmad, Jonathan Bagus Wicaksono, K. Mutijarsa","doi":"10.1109/ICITSI56531.2022.9970792","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970792","url":null,"abstract":"COVID-19 pandemic has made an enormous change in various aspects of society. One of it, is limitation to number of people in public place and physical contact called social distancing. Supermarket is one of the places affected by social distancing to minimize the spread of the virus. Trolley is one of the tools that mainly available to ease shopping process in supermarket but also the one that mainly get direct physical contact during shopping process. Therefore, as the world adapts with this condition, it is needed to develop a smart trolley that can help minimizing the spread of COVID-19 by reducing direct physical contact without abandoning customer satisfaction while shopping in supermarket. This smart trolley will automatically follow a specific customer using position localization method based on QR code mapping. The localization was implemented using computer vision while customer-following movement command distribution was implemented using IoT. By using unique and specific QR code, it will prevent wrong customer detection and wrong position mapping thus making this a reliable tracking mechanism and a reliable autonomous customer following system.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Low-Cost Labeling Service for Satellite Imagery Data","authors":"Fitri Andri Astuti, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9970926","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970926","url":null,"abstract":"Satellite imagery data can be used to detect areas of built-up land. Various satellite image data processing platforms have emerged in line with the sophistication of technological developments. However, from these many platforms, there are code, access, and storage limitations. So, to make a good dataset, correction, and collaboration between users are needed. A good dataset will produce a good model. Therefore, in this study, we present the software architecture of data labeling services. The proposed research method consists of data management using MongoDB, data labeling service backend using FastAPI, and frontend using Flask and LeafletJS. Furthermore, we present some empirical results of this study regarding usability, performance, cost, and comparative analysis of our proposed low-cost satellite imagery data labeling service.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126429706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RKUPH Approval Service System Design Using SCSE Framework","authors":"Dicky Rinaldy, Suhardi, Wardani Muhamad","doi":"10.1109/ICITSI56531.2022.9971029","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971029","url":null,"abstract":"The existence of IT services in supporting business processes is a must in today's modern organizations. The main goal to be achieved is to maintain the existence of the organization in accordance with the times. In practice, the development of IT services is highly dependent on the availability of human resources who have competence in software development. However, this limitation can be overcome by involving external parties (external outsourcing) as software developers. However, this approach has a weakness if the organization's service needs are not well defined, so it will be difficult for external parties who do not understand the organization's business processes; it has the potential to cause differences in specifications and development results. The PUPH Directorate has the same problem in realizing the transformation of forest management i.e., changing the RKUPH approval service from conventional to IT-based. To fulfill this, the PUPH Directorate must provide IT service design documents to develop IT services. Therefore, this study aims to design an IT service system that can then be used as a guide for application development by external parties. The SCSE framework was chosen as a guide in designing IT service systems. The resulting design evaluated against four SOA principles: coupling, cohesion, usability, and complexity. Based on the evaluation results, the values of the four principles are 0.009, 0.924, 0.010, and 3,000. It indicates that the resulting design are loosely coupling and high cohesion. Furthermore, adding web mockup activities and optimizing service blueprint activities in the SCSE framework makes it easier for organizations to develop business and IT service designs that align with organizational goals and strategies. In addition, the resulting design is easily understood by external parties so that the service system design that has been made becomes a control card for the development of IT services by external parties.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134202392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahraa Aqeel Salih, Rasha Thabit, Khamis A. Zidan, B. Khoo
{"title":"Challenges of Face Image Authentication and Suggested Solutions","authors":"Zahraa Aqeel Salih, Rasha Thabit, Khamis A. Zidan, B. Khoo","doi":"10.1109/ICITSI56531.2022.9970797","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970797","url":null,"abstract":"The rapid development of face image manipulation algorithms and the distribution of their easy-to-use applications bring an urgent need to manipulation detection techniques that can reveal the modification in face image and prove its authenticity. Recently, the term “DeepFakes” and their detection techniques have attracted the attention of the research community. To current date, there is no universal detection technique and each one has its own limitations. In this paper, a brief review of face image manipulation techniques and their detection is presented followed by a summary of the limitations and challenges that can face the manipulation detection techniques. Then, the paper presents some suggestions which can be considered for future researches in this attracted and interesting research topic. The review in this paper can be considered as a starting point for the researchers who are concerned about this research field.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115726066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Coffee Beans Defect Using Mask Region-based Convolutional Neural Network","authors":"Taufiq Alif Heryanto, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9970890","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970890","url":null,"abstract":"The recognition and calculation of coffee bean defects has become one of the references in determining the quality of coffee beans. Indonesia already has a standard set forth in Indonesian National Standard (SNI) to determine the quality of coffee beans based on the special quality requirements of beans by calculating the value of defects. In the standard there are several types of seed defects defined such as black seeds, hollow seeds, cracked seeds and others. The system for recognizing and calculating the value of coffee bean defects is still done conventionally so that it requires a very high ability and skill from the examiner. The purpose of this study is to design a model that is able to recognize coffee bean defects using one of the models in the Deep Learning approach, namely Convolutional Neural Network (CNN). This study will use an improvised workflow from CNN, namely Mask R-CNN (Region-based Convolutional Neural Network) which utilizes the workflow of Faster R-CNN with the addition of a masking feature on the detected object. This study uses a dataset of 480 images with black, broken and hole classes with 360 images for training and 120 images for validation. The test is carried out with 2 forms of images, namely images with individual objects with 30 images and images with plural objects with 20 images. The accuracy obtained is 93.3% for testing individual objects and 75% for testing plural objects.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129789574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thread Programming for Blockchain Creation","authors":"Sabam Parjuangan, Suhardi, I. B. Nugraha","doi":"10.1109/ICITSI56531.2022.9971125","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9971125","url":null,"abstract":"The process of finding a block hash is a complex problem. One of the problems is making the hash from a generator algorithm that uses the existing string and the transaction data in the block. So far, the idea that has been used is to make it one step at a time using high-powered machines (supercomputing). Developing blockchain applications is hard because supercomputing is expensive. To solve this problem, developers need to use a different method, called parallel programming. This article talks about a parallel way to make block hashes, which are used to make new blocks. We use the SHA256 algorithm to process the hash. When creating a unique character string to be used as a block hash from a set of characters, thread division is done as part of the algorithmic skeleton process. Our experiments show that using threads to split work in parallel has speeded up the build process by 1.56 seconds compared to when blocks are hashed sequentially. In addition, it was also found that the threads that contributed the most to increasing speedup were 3 threads with an average processing time of 111,638 seconds. On average, the parallel hash generation process takes 707,853 seconds, while the sequential one takes 1756,56 seconds. We conclude the solution to building blockchain using the thread programming method with the number of threads is 3 for the computer specifications used to be the same or smaller than the computer specifications we use.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121104326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Heading Estimation Based on Magnetometer Measurement using LSTM","authors":"Teguh Satrio Wibowo, P. Rusmin","doi":"10.1109/ICITSI56531.2022.9970976","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970976","url":null,"abstract":"Autonomous vehicles require the development of sensing technologies and intelligent control of localization capabilities to guide the vehicle in unknown areas. A reliable localization system of accurate positioning and heading information is one of the critical requirements of highly challenging autonomous vehicle technology. This paper proposes an accurate estimation scheme using a Recurrent Neural Network (RNN) architecture for mobile robots in indoor environments via an Inertial Measurement Unit (IMU). The main objective is to assess the potential performance of LSTM or GRU network architecture to obtain estimation values using only low-cost IMU sensor data to create accurate heading angles. The preprocessing stage is carried out to be able to reduce or even eliminate the bad impact of noise generated on each data. The test shows that the model generated from the LSTM network architecture with 32-16 cells of neurons layer can provide heading estimates with MSE value of 0.02 and an accuracy 94.65%.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126624131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Train Wagon Number Recognition Based on Video Analytics at The Edge","authors":"Muhamad Hudan Widzamil, F. Hidayat","doi":"10.1109/ICITSI56531.2022.9970900","DOIUrl":"https://doi.org/10.1109/ICITSI56531.2022.9970900","url":null,"abstract":"Railway planning and operational activities are based on train numbers. The train numbers are based on a series of train wagons. Recording the arrival and departure time of trains in operational activities manually is not effective and efficient, and there is the potential for human error that may occur. Therefore, automation in the activities of recording the number of train wagons will assist train operations, especially in the process of recording train numbers. From various alternative concepts, it was chosen to develop a video analytics-based solution for train wagon number recognition. After the evaluation, the implementation of the train wagon number recognition system with video input of train wagons succeeded in recognizing train wagon numbers with text output. On the Nvidia Jetson TX2, the prototype managed to correctly recognize 95.45% of test data after post-processing at a speed of about 4 FPS.","PeriodicalId":439918,"journal":{"name":"2022 International Conference on Information Technology Systems and Innovation (ICITSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128395060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}