R. Widiastuti, J. Zaini, W. Caesarendra, Dina Shona Laila, Jundika Candra Kurnia
{"title":"Prediction on the Indoor Thermal Comfort of Occupied Room Based on IoT Climate Measurement Open Datasets","authors":"R. Widiastuti, J. Zaini, W. Caesarendra, Dina Shona Laila, Jundika Candra Kurnia","doi":"10.1109/ICIMCIS51567.2020.9354277","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354277","url":null,"abstract":"Efficient control of energy consumption in a building becomes one of the main focuses in reducing exponentially increase global energy consumption and world emission. One promising strategy to achieve efficiently control of energy consumption is by implementing Internet of Things (IoT). Despite its potential, studies on integrating IoT for predicting indoor thermal comfort of buildings are very scarce. Therefore, this manuscript is focused on a prediction study on the indoor thermal comfort of an occupied room with respect to relative humidity and room temperature as the main parameters. The room climate measurement datasets were obtained from open source. Various daily tasks were conducted during data measurement i.e. read, stand, walk, and work (typing). An analysis was made based on the adaptive thermal comfort theory by calculating PMV and PPD from Fanger thermal comfort theory. Results from data analysis proved there was an increasing trend of PMV and PPD values and directly influenced by room climates. Most of PMV and PPD values was considered as acceptable indoor thermal comfort according to ASHRAE standard 55. It was between -1.99 (cool) and +0.34 (neutral). Only reading on day seventeen that has -2 (cold) as thermal sensation scale with 76.6% PPD value. Certain tasks with low metabolic rate used lower temperature and created colder thermal sensation. In order to obtain neutral scale of temperature sensation and create energy efficiency, increasing on the indoor temperature and indoor relative humidity were needed.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bibi Zarine Cadersaib, Yashvinee Ahku, N. G. Sahib-Kaudeer, Maleika Heenaye-Mamode Khan, B. Gobin
{"title":"A Review of Skills Relevant to Enterprise Resource Planning Implementation Projects","authors":"Bibi Zarine Cadersaib, Yashvinee Ahku, N. G. Sahib-Kaudeer, Maleika Heenaye-Mamode Khan, B. Gobin","doi":"10.1109/ICIMCIS51567.2020.9354270","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354270","url":null,"abstract":"Enterprise Resource Planning (ERP) systems are among the most popular IT systems and skills related to ERP implementations are key for industry. However, studies focusing on specific ERP-related skills are scarce. The main purpose of this work is to analyze skills required for ERP implementation projects. Having better insights on the types of skills required in industry can aid in identifying relevant training needs and ultimately help in capacity building for ERP related projects. A systematic review was adopted as methodology for literature analysis. A list of papers focusing on ERP skills were retrieved and were analyzed before deriving a comprehensive list of skills categorized under different themes. The findings of this paper provide a detailed list of ERP skills which can be used by industry to define training needs and by educational practitioners when designing ERP-related curriculum.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Effectiveness of Utilizing IoT-Based Smart Trash","authors":"Yuni Widiastiwi, Chani Abdi Satria","doi":"10.1109/ICIMCIS51567.2020.9354279","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354279","url":null,"abstract":"Trash is a big problem in the world. The Trash that has accumulated becomes a breeding ground for disease and reduces the beauty of a place. The development of the internet of things helps humans in doing their job. By IoT, we can be used to create smart trash bins. Today Smart trash bins have been widely used but still need testing to see how effective the use of this tool is. This research aims to test the effectiveness of the smart trash bins, monitoring system model. The method used is to use a NodeMCU ESP8266 microcontroller based on Arduino Uno to create a solid waste density monitoring model and the HCSR-04 ultrasonic sensor as a medium for measuring the density of waste to be tested. The test results of the system built can display waste height data, provide information on the state of the Trash, and determine the status of empty Trash to full by providing accurate notifications. The results obtained show that the solid waste density test can be recognized properly using the model created. Therefore, this shows that smart Trash can reduce the negative impact of accumulated garbage conditions.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125130391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Setiawan, Budyono Saputra, Ahmad Rosyiq, Jihan Prama Nurahman, Rizky Ichsan, Muhammad Rifki Shihab, B. Ranti
{"title":"The Role of IT in Transforming a Platform Business Model: a Case Study in PT XYZ","authors":"A. Setiawan, Budyono Saputra, Ahmad Rosyiq, Jihan Prama Nurahman, Rizky Ichsan, Muhammad Rifki Shihab, B. Ranti","doi":"10.1109/ICIMCIS51567.2020.9354306","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354306","url":null,"abstract":"Financial digitalization in the world of education enables transparency, accountability, and good financial management for educational institutions to develop better education services. PT XYZ is one of Financial Technology (FinTech) company in Indonesia which provide bill management platform for education institution. The platform integrates multiple payment channels such as banks, mobile wallets, retails, and other bill aggregators to provides a noncash tuition payment for parents of students. This study analyzed the business model strategy and the role of IT in transforming a platform business model of PT XYZ from a host to host digital payment implementer to a company that provide a bill management and payment platform for educational institutions by implementing Software as a Service (SaaS). This study used qualitative methods by conducting literature studies, observation, and semi-structured interviews. The result showed that PT XYZ has created a new market positioning, product positioning and business network positioning by enhancing existing strategy and capability to expand their business.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125895880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nur Arifin Akbar, A. Sunyoto, M. Rudyanto Arief, W. Caesarendra
{"title":"Improvement of decision tree classifier accuracy for healthcare insurance fraud prediction by using Extreme Gradient Boosting algorithm","authors":"Nur Arifin Akbar, A. Sunyoto, M. Rudyanto Arief, W. Caesarendra","doi":"10.1109/ICIMCIS51567.2020.9354286","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354286","url":null,"abstract":"Fraud in the healthcare sector is prevalent and very cumbersome. Fraud generally involves intentional disappointment, and frustration or misrepresentation usually leads to an unfair benefit. Such exciting demand for insurance services has led to manipulative and inappropriate behaviour. Based on the report published by the United States Government Accountability Office, healthcare insurance fraud contributes to a 10% unexpected rise of annual health expenditure, which amounts to US$ 100 billion per year. In order to identify and avoid fraud, the scientific state of the art is applied. This paper seeks to analyze statistical modelling approaches for the assessment of fake health benefits using state-of-the-art techniques. Once the data is collected and the study of exploratory data is completed, it can use random forest regression and the classification of trees algorithm with extreme gradient boost (XGB) to determine the most efficient models. Compared to the Random Forest Method that reaches 81% accuracy with for class 1 recall, XGB Tree method of random sub-sampling was successfully achieved by 86% overall accuracy and 87% with illegitimate providers. Refer to the result, XGB method produce more accuracy for clean data that has been tuned with several adjustment.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127110026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Girinoto, Hermawan Setiawan, Prasetyo Adi Wibowo Putro, Yogha Restu Pramadi
{"title":"Comparison of LSTM Architecture for Malware Classification","authors":"Girinoto, Hermawan Setiawan, Prasetyo Adi Wibowo Putro, Yogha Restu Pramadi","doi":"10.1109/ICIMCIS51567.2020.9354301","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354301","url":null,"abstract":"An experimental study of malware and benign classification from Windows API call sequences dataset using a deep learning framework is presented. We conduct a series of Long Short-Term Memory (LSTM) modifications, Bidirectional Long Short-Term Memory (BiLSTM). The proposed one architecture, such a half per half input sequence processed on the Siamese BiLSTM network looks. All three base models are treated fairly with scenario series of modification such a callback, batch normalization, dropout, and attention mechanism. As the results of this experiment, adding dropout and attention mechanisms show improvement from baseline models. In addition, we find that our proposed architecture with dropout and attention mechanism slightly outperform from other models.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126334755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post Implementation Review of Electronic Customer Relationship Management (E-CRM) Implementation in Port Services Company, Indonesia","authors":"Endang Fiansyah","doi":"10.1109/ICIMCIS51567.2020.9354300","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354300","url":null,"abstract":"PT XYZ, a company engaged in port services, has implemented E-CRM since 2016. The goal of E-CRM is to upgrade, update, and standardize customer relationship systems and some legacy systems. To achieve this goal, PT XYZ developed and used many E-CRM features. There are no tools for an organization to help gain use of the details and impact of an E-CRM implementation after several years of implementation. Companies find it difficult to detail the use and impact of E-CRM documentation. The company needs to complete this task because companies need to make post-implementation documentation of E-CRM to comply with Good Corporate Governance (GCG), namely transparency and accountability to stakeholders and the public. If transparency and accountability are not implemented, this will impact management rights in the port area, especially in the sub-directorate that implements E-CRM. Companies need to know the detailed impact and list of E-CRM usage. This impact and usage list will help the company create post-implementation documentation to help the company fulfill this project with GCG. The research question is what E-CRM is used for and the impact of E-CRM for the company. Researchers used mixed methods to analyze using quantitative and qualitative methods using questionnaires, document analysis, observation, and interviews. For the implementation of E-CRM, the features that have been developed, used, and support business processes are customer data management features, customer profiles, customer service, customer visit management, customer surveys, and marketing features. E-CRM impacts companies in several areas that are strategic, managerial, and operational. The most significant impact on the organization is product quality (operational), decision making (managerial), productivity (operational), partner synergy (strategic), business innovation (strategic), performance control (managerial), competitive advantage (strategic), resource management (managerial). With a post-implementation review, companies can get details of E-CRM's use and impact and help make detailed documentation of E-CRM's post-implementation use and impact to comply with GCG. If an audit is carried out for this project, the company is ready.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115276756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. T. Tosida, F. D. Wihartiko, Indra Permana Solihin, A. Kustiyo, Akbar Sugih Miftahul Huda
{"title":"Preliminary Study of Palm Smart Transportation: Case of Sei Tandun - Sei Rokan District PT Perkebunan Nusantara V Indonesia","authors":"E. T. Tosida, F. D. Wihartiko, Indra Permana Solihin, A. Kustiyo, Akbar Sugih Miftahul Huda","doi":"10.1109/ICIMCIS51567.2020.9354302","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354302","url":null,"abstract":"The problem of chain losses in transportation process of Fresh Fruit Bunches (FFB)'s PT Perkebunan Nusantara V Indonesia, predicted increase. The main objective of this preliminary study is to build the smart transportation concept of FFB. This concept is built based on problems that are assumed under certain conditions, by integrating automatic measurement of FFB yields, because it is measured using a weight sensor installed at the FFB collection point and proceed to the palm oil processing mill. The measurement results will be communicated by IoT to the trucking station so that the capacity and number of trucks can be calculated precisely. The number of transport trucks will determine the optimal route with the genetic algorithm. This optimal route will serve as a guideline for unmanned trucks to move in harmony according to data input that is automatically read from the palm oil plantation environment, through data communication with IoT.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126980570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Dandy Pramana, Anne Lestyea, A. Amiruddin
{"title":"Development of a Secure Access Control System Based on Two-Factor Authentication Using Face Recognition and OTP SMS-Token","authors":"Muhammad Dandy Pramana, Anne Lestyea, A. Amiruddin","doi":"10.1109/ICIMCIS51567.2020.9354328","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354328","url":null,"abstract":"The access control system is an important security feature to protect assets from being accessed illegally. One of the security techniques for access control is the use of biometrics, such as facial recognition, which is currently widely applied. The ease and uniqueness of everyone's face are the distinct advantages of this technique. However, like biometric factors in general, facial recognition also has a weakness against spoofing attacks where someone can cheat the system using an undercover method. In order to overcome these spoofing attacks, two factors are required to ensure the authenticity of the user. In this research, we designed and implemented a secure access control system based on two-factor authentication using facial recognition and SMS-token OTP to avoid spoofing attacks and to meet our own needs and avoid reliance on proprietary products. Based on the results of our research, the design scheme was successfully implemented so that it is secured to apply.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"66 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Continuance Use Intention and Satisfaction on Implementation of ALKI (Internal Activity Report Application) in Ministry of Industry","authors":"Izzati Mubarokah, A. Hidayanto","doi":"10.1109/ICIMCIS51567.2020.9354278","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354278","url":null,"abstract":"The value of a system is when it is able to provide benefits to the organization. ALKI (Internal Activity Report Application) is used in the Ministry of Industry to facilitate reporting and monitoring of the activities. Satisfaction and continuance use intention of users of the ALKI application determine the success of ALKI in providing value to the organization. The objective of this research is to see what factors affecting satisfaction and continuance use intention of ALKI users. The theoretical framework used in this study is built by combining the UTAUT and EECM-IT models and adding one variable condition of support that is a unique contribution of this research. Data collection was carried out by a questionnaire filled in by 122 respondents of ALKI users in the Ministry of Industry. Next, the questionnaire results were processed using the Smart PLS application. In this research, Perceived ease of use has no significant effect on satisfaction and continuance use intention of the ALKI application. Several variables that have a significant effect on satisfaction are perceived usefulness, confirmation, and condition of support. Meanwhile, variables that significantly influence continuance use intention of the ALKI application are social influence, facilitating conditions, and satisfaction.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}