2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)最新文献

筛选
英文 中文
Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys 保护病历数据加密密钥的Diffie-Hellman算法
Ermatita, Yugo Bayu Prastyo, I. W. W. Pradnyana, Muhammad Adrezo
{"title":"Diffie-Hellman Algorithm for Securing Medical Record Data Encryption keys","authors":"Ermatita, Yugo Bayu Prastyo, I. W. W. Pradnyana, Muhammad Adrezo","doi":"10.1109/ICIMCIS51567.2020.9354297","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354297","url":null,"abstract":"Data security is an issue that must be a concern in the current era of information technology. Medical data in the form of medical digital images is also important data to protect its security. This is to avoid being used by irresponsible parties. This data security can apply data encryption. The application of this encryption is by developing a medical digital image security that uses a combination of the advanced encryption standard (AES) algorithm in the data encryption process and the Diffie-Hellman algorithm in the key exchange process to maintain the security and confidentiality of medical images. The AES algorithm is used in the encryption and decryption process, while the Diffie-Hellman algorithm is used to secure the key of the AES algorithm. The results of this research showed that the combination of AES and Diffie-Hellman algorithms succeeded in securing medical images. Diffie-Hellman algorithm will generate different keys which are then used as AES keys. In this research, the Diffie-Hellman algorithm will produce a key which will be combined with the encryption key from the AES algorithm. In addition, the Diffie-Hellman algorithm is used for security in the exchange process and key generation.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Criteria That Have A Significant Effect on Forecasting the Number of Sales Using the Best-Worst Method 使用最佳-最差方法预测销售数量有显著影响的标准
R. Gustriansyah, Ermatita, Dian Palupi Rini, Reza Firsandaya Malik
{"title":"The Criteria That Have A Significant Effect on Forecasting the Number of Sales Using the Best-Worst Method","authors":"R. Gustriansyah, Ermatita, Dian Palupi Rini, Reza Firsandaya Malik","doi":"10.1109/ICIMCIS51567.2020.9354276","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354276","url":null,"abstract":"Forecasting the number of sales is an effort for forecasting the number of product sales for a certain period in the future. The company's failure to supply products will have negative effects on the quality of service to customers, thereby reducing the company's competitiveness. One of the critical success factors on forecasting the number of sales is determining the criteria required by the decision support system. The problem is what criteria are needed or influential in forecasting the number of sales. Furthermore, most of the problems in decision making are uncertainties associated with input criteria. Therefore, this study will investigate the criteria that a significant effect in forecasting the number of sales by using the recent decision support method, namely the Best-Worst Method by considering uncertainty so that the optimum forecasting of the number of sales can be achieved. The results achieved in this study indicate that the three most significant criteria for forecasting the number of sales are frequency, quantity, and monetary. Preliminary experimental results have shown that perturbations in the case study had no significant effect on the final ranking of the decision support system criteria.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"5 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131717483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rank Critical Success Factors (CSFs) of Data Warehouse and Business Intelligence (DW/BI) Implementation in Banking Sector Using Analytical Hierarchy Process (AHP) 利用层次分析法(AHP)对银行业数据仓库和商业智能(DW/BI)实施的关键成功因素(CSFs)进行排序
S. Halim, Izzati Mubarokah, A. Hidayanto
{"title":"Rank Critical Success Factors (CSFs) of Data Warehouse and Business Intelligence (DW/BI) Implementation in Banking Sector Using Analytical Hierarchy Process (AHP)","authors":"S. Halim, Izzati Mubarokah, A. Hidayanto","doi":"10.1109/ICIMCIS51567.2020.9354331","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354331","url":null,"abstract":"Data is a very important asset for a company in supporting decision making. The implementation of Data Warehouse and Business Intelligence (DW / BI) is a step of a company to manage data as an asset. This study aims to evaluate the Critical Success Factor (CSF) for DW/BI implementation in an Indonesian financial institution that provides conventional and sharia banking, PT XYZ. Data are obtained through a survey of key person who involved in full cycle in the 2 phases of DW/BI implementation at PT XYZ and had roles and responsibilities that could provide a holistic view of the people, process and technology dimensions during the project. Analytical Hierarchy Process (AHP) method is used to calculate the weight of CSF influence in the context of people, process, and technology. CSF ‘Project Leader / Champion’ has the most influence in the context of people, ‘well defined system requirements' rank first in the context of process, and ‘source system’ has the biggest influence on the context of technology. The criterion of people is considered the most influential compared to the criterion of process and technology. Source system sub-criterion in the technology context has the most influence compared to other CSFs globally.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Effects of Fear of Cybercrime and Information Systems Security Policy on National Vigilance 网络犯罪恐惧与信息系统安全政策对国家警惕性的影响
Nidjo Sandjojo, Muhammad Zuhriyanto, I. W. W. Pradnyana
{"title":"The Effects of Fear of Cybercrime and Information Systems Security Policy on National Vigilance","authors":"Nidjo Sandjojo, Muhammad Zuhriyanto, I. W. W. Pradnyana","doi":"10.1109/ICIMCIS51567.2020.9354283","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354283","url":null,"abstract":"The aim of this study was to examine the effect of information system security policy and fear of cybercrime on national vigilance in the Indonesian Ministry of Defense of the Republic of Indonesia. Cybercrime threat could happen in many forms and these are real threats to the Indonesian national security and sustainability as a nation. This is one of the reasons why this study was conducted. The study has been conducted since October 2015 in the Research and Development Body of the Ministry of Defense of the Republic of Indonesia, and Universitas Pembangunan Nasional “Veteran” Jakarta (University of National Development “Veteran” Jakarta). A quantitative method was employed in this study. Military officers, civilian employees working in the Research and Development Body of the Ministry of Defense, university lecturer as well as students of Universitas Pembangunan N asional “Veteran” Jakarta were selected as respondents. The result shows that information systems security policy has the biggest effect on national vigilance. As the result of this study, information security policy could play an important role in combating cybercrime. Conducting awareness program on the danger of cybercrime is another way to make public aware of the danger of cybercrime.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131952919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Prediction System for Crude Palm Oil (CPO) Production with Time Series Data Mining Approach 基于时间序列数据挖掘方法的粗棕榈油产量预测系统开发
Achmad Solichin, U. Hasanah, Jayanta
{"title":"Development of Prediction System for Crude Palm Oil (CPO) Production with Time Series Data Mining Approach","authors":"Achmad Solichin, U. Hasanah, Jayanta","doi":"10.1109/ICIMCIS51567.2020.9354321","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354321","url":null,"abstract":"Palm oil is a plantation commodity that snowballs when compared to other plantation crops such as coffee or cocoa. The Indonesian palm oil industry has a comparative advantage in the form of a large area of land and the lowest production cost of Crude Palm Oil (CPO) in the world. Indonesia's palm oil production in August 2019 recorded an increase of 14% over the same period in 2018. However, the amount of Indonesia's CPO production can still be optimized and increased. The amount of CPO production is very dependent on several factors, such as weather conditions, land area, and the number of Fresh Fruit Bunches (FFB). To help the Palm Oil Mill (POM), this study compares three data mining algorithms to predict the amount of CPO production based on the number of FFBs. The algorithms being compared are multilayer perceptron (MLP), support vector regression (SVR), and linear regression (LR). Based on test results using test data from a palm oil company in Indonesia, the SVR algorithm can provide higher accuracy than the other two algorithms. The SVR gets a PTA value of 0.694, MSE of 955.002, MAPE of 55.169, and MAD of 22.227. Then, we developed a prototype that applied the SVR algorithm to predict the amount of CPO production. The SQA test results on the prototype resulted in 80.225 software quality in the good category.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Problematic Mobile Phone Use and Risky Behaviors Among College Students in Peru 秘鲁大学生的问题手机使用和危险行为
J. Ramos-Diaz, Qiaolei Jiang, Rosmery Ramos-Sandoval, M. Griffiths
{"title":"Problematic Mobile Phone Use and Risky Behaviors Among College Students in Peru","authors":"J. Ramos-Diaz, Qiaolei Jiang, Rosmery Ramos-Sandoval, M. Griffiths","doi":"10.1109/ICIMCIS51567.2020.9354318","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354318","url":null,"abstract":"A recent report noted that 93.4% of Peruvian citizens own a smartphone and that this has impacted positively in society for different purposes. Despite its advantages, scholars and practitioners have been investigating human-technology interaction, psychological processes, and their possible negative effects. Previous studies have investigated Problematic Mobile Phone Use (PMPU) as a dysfunctional interaction concerning the excessive use of smartphone activities that results progressively in negative consequences such as lack of control, preoccupation, withdrawal, relapse, and conflict. Despite this emergent area of research, there is little research examining PMPU among young Peruvian adults. In addition to this, there are still inconsistencies in relationship between PMPU, and substance use, and other risky behaviors. This paper analyses the impact of smartphone usage patterns, sensation seeking, and substance use in relation to PMPU. A total of 921 college students from Peru were recruited and completed a survey examining demographics, usage patterns, sensation seeking, and substance use. Overall, results indicate that gender, time spent talking on mobile phones, sensation seeking, and psychoactive substance use were predictors of PMPU. Implications at a theoretical, practical, and methodological level are discussed in relation to further research of PMPU in Peru.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129267858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanics, Dynamics, and Aesthetics Framework on Gamification at University 大学游戏化的力学、动力学和美学框架
Natalia Limantara, Meyliana, F. Gaol, Harjanto Prabowo
{"title":"Mechanics, Dynamics, and Aesthetics Framework on Gamification at University","authors":"Natalia Limantara, Meyliana, F. Gaol, Harjanto Prabowo","doi":"10.1109/ICIMCIS51567.2020.9354271","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354271","url":null,"abstract":"Gamification is a concept in which game elements are applied in a non-game environment. In this paper, we analyze the use of the concept of gamification in learning using the mechanics, dynamics, and aesthetic (MDA) framework. Using the literature between 2017 and 2020, the gamification model used at the university is detailed according to three categories of the MDA Framework. From this study, it was found that leaderboard and points are still the dominant game mechanics. The results of this study can be used as a basis for researchers to know the application model of gamification that has been implemented and the impact of the implementation of the model.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116798696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pre Cervical Cancer Detection on Visual Inspection of Acetic Acid (VIA) Test Image Using K-Means Clustering Method 基于k均值聚类方法的醋酸检测图像的宫颈癌前检测
Ria Ariyani, Kurniawan Nur Ramadhani, Hilman Fauzi Tresna Sania Putra, Ali Budi Harsono
{"title":"Pre Cervical Cancer Detection on Visual Inspection of Acetic Acid (VIA) Test Image Using K-Means Clustering Method","authors":"Ria Ariyani, Kurniawan Nur Ramadhani, Hilman Fauzi Tresna Sania Putra, Ali Budi Harsono","doi":"10.1109/ICIMCIS51567.2020.9354317","DOIUrl":"https://doi.org/10.1109/ICIMCIS51567.2020.9354317","url":null,"abstract":"We built an approach in early detection of cervical cancer using image recognition of Visual Inspection with Acetic Acid (VIA) image. We used k-Means clustering to segment the expected region of cervical cell in the VIA test image. The positive suspect shown by white lesion which are called acetowhite. We used VIA test image captured from mobile phone as the dataset. From the acetowhite area, we extracted the color moment feature and the Gray Level Co-occurence Matrix (GLCM) feature. The color moment and GLCM feature were then classified as positive or negative using Support Vector Machine (SVM) classifier. The best performance were an accuracy of 72,14%, with sensitivity of 70% and specificity of 74% using k-Means clustering with k=2 and SVM with linear kernel.","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133258495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
[Copyright notice] (版权)
{"title":"[Copyright notice]","authors":"","doi":"10.1109/mps.2019.8759753","DOIUrl":"https://doi.org/10.1109/mps.2019.8759753","url":null,"abstract":"","PeriodicalId":441670,"journal":{"name":"2020 International Conference on Informatics, Multimedia, Cyber and Information System (ICIMCIS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信