Proceedings of the 2018 International Conference on Industrial Enterprise and System Engineering (IcoIESE 2018)

+ Advanced search
67 articles

DESIGN OF DECISION SUPPORT SYSTEM APPLICATION FOR DETERMINING SCHOLARSHIP GRANTEE USING ANALYTICAL HIERARCHY PROCESS AND FACTOR RATING

Afrin Fauzya Rizana, Rayinda Pramuditya Soesanto
Scholarship refers to a program provided by organization that is given to students to relieve the tuition fee. There are several criteria and requirements that have to be fulfilled to get the scholarship. In practice, all the requirements will be checked manually for each applicant to determine who deserves...

DESIGN OF GEOGRAPHIC-BASED DECISION SUPPORT SYSTEM FOR ROAD REPAIRMENT WITH GDSS METHOD: CASE STUDY IN BANDUNG DISTRICT

Dicky Faisal Dramar, Farid Wira Darmawan, Audira Zuraida, Rayinda Pramuditya Soesanto, Ika Arum Puspita
In an effort to make road improvements effective and efficient in Bandung Regency, the Public Works Service performed road repairs based on the most damaged areas. In the implementation there is a problem of limited information possessed by the Office of Public Works Bandung Regency so that road improvements...

THE PROPOSED OF VENDOR SELECTION IN GOODS PROCUREMENT USING FUZZY ANALYTICAL HIERARCHY PROCESS (FAHP) METHOD AT PT. PERTAMINA HULU ENERGI OFFSHORE NORTH WEST JAVA (PHE ONWJ)

Kristoforus Maximinus Krisnabayu Tandra Widyatama, Ika Arum Puspita, Mumu Natapriatna
Along with the change of strategic system in the government that changed the scheme of contracts for oil and gas product from Cost Recovery to Gross Split in the oil and gas company like Pertamina Hulu Energi Offshore North West Java (PHE ONWJ), the company is required to be more effective and efficient...

Information System Planning for Emerging Start-Up Company: A Case from Software House

Rayinda Pramuditya Soesanto, Wawan Tripiawan, Afrin Fauzya Rizana, Amelia Kurniawati, Fadillah Ramadhan
The use of IS believed to bring positive impact on the productivity and competitiveness of the organization. Most organizations in all sectors of industries, commerce, and government become fundamentally dependent on the use of information system especially startup companies. Start-up companies are considered...

Flash-aware Clustered Index for Mobile Databases

Wojciech Macyna, Michal Kukowski
Flash memory become the very popular storage technology. Recently, it may be treated as a main storage memory in mobile devices, PDA and personal computers. However, the architecture based on flash memory has some limitations. They suffer from poor write performance, as the flash blocks must be erased...

Latent Dirichlet Allocation Modeling for CPS Patent Topic Discovery

Usharani Hareesh Govindarajan, Amy J.C. Trappey, Gopal Kumar
Industry 4.0 is an organized framework to infuse the latest technology in the manufacturing sector. The inclusion of next-generation technologies such as Cyber-Physical Systems (CPS), cloud computing, big data and artificial intelligence approaches increases productivity and manufacturing output in today’s...

Self-Adaptive Cybersecurity System

Aradea Aradea, Iping Supriana, Kridanto Surendro, Husni Mubarok, Irfan Darmawan
Complexity of cyberspace environment nowadays, arouse security vulnerabilities for all owned assets. Appropriate way out or solution for every obstacle in a case like this is a must for ICT role. However, user trust for ICT usage raises concerns. Cyberspace environment is caused by rapid increase in...

Self-Adaptive Load Balancing System for Grid Computing

Irfan Darmawan, Aradea Aradea
Load balancing is a necessary way of a computer network infrastructure services, with the aim of balancing of computing resources to achieve optimal load processing time. When this has been many methods that can be used for load balancing techniques, namely by adjusting the load on the computing resources...

A Comparison of Naïve Bayes and Bayesian Network on The Classification of Hijaiyah Pronunciation with Punctuation Letters

Adiwijaya Adiwijaya, Annisa Riyani, Mohamad Syahrul Mubarok
Arabic is a unique language because it really concerns in makhraj (the way of sound is made) that differentiate letters and words. The difference in pronouncing letters and words make the meaning of those words different, because pronunciation in Qur’an letters really concern in harakat (the length of...

Model Tree with Modified L1 Loss Function for Predicting Missing Attendance Data of Faculties

Mohammad Arif Rasyidi, Rachmadita Andreswari
The problem of missing attendance data in our university often arises due to the negligence of faculties. In this study, we address the problem by directly predicting the work duration of faculties. The nature of the problem require us to not only make accurate predictions, but also minimize the rate...

Web Application Design Using Single Page Application To Increase Website Performance on Rumantara

Ilham Farobi, Soni Fajar Surya Gumilang, Muhammad Azani Hasibuan
One of the travelers needs when going to some places is a place to stay for a while and put their things. More importantly, a place that fits their needs and budget. This matter makes most of the travelers difficult to find a place to stay because of most of them is hotels with unneeded amenities that...

Web-Based Food Delivery Management System

Soni Fajar Surya Gumilang, Nia Ambarsari, Mei Dina Isti Nurmala
The process of ordering a meal in an organization still using a conventional system or in other words, the civitas organization must come to the cafeteria to order the desired menu. The conventional system uses paper for order recording process. So the problem happens repetitively, such as redundancy...

Application of Risk IT Based on ISO 31000 Standards Process Capability Assessment Model (Case Study: Andalas University)

Mohammad Hafiz Hersyah, Kridanto Surendro
The fact given that capability function is to aim executed things works properly and effectively in organization business process could not executed well without considering risk management aspects. Risk management overlay every event possibilities that able to either to hinder or accelerate organization...

Information System Strategy and Application Governance in The Government of Bandung Regency

Soni Fajar Surya Gumilang, Heru Nugroho
Utilization of information system for support of the government process will improve the efficiency, effectiveness, transparency and accountability of governance. This statement is in line with Presidential Decree No. 3 of 2003 which confirms that the use of technology in government will improve the...

High Security Adaptive BCH Code Discrete Wavelet Transform Copyright Protection

Irma Safitri, Rizki R. Ginanjar, Yosa Yunawan
In this research, we analyzed the audio watermarking system with combining adaptive wavelet with SVD in various BCH Codes. The host audio signal is embedded with a watermark signal in the form of an image signal accompanied by several attacks on the watermarking system. The results showed that ODG and...

Copyright Protection High Robustness Arnold Transform Wavelet Method

Bruguiera A. F. Agradriya, Irma Safitri, Ledya Novamizanti, Muhammad Ainul Yaqin
Audio watermarking is a technique of information insertion into an audio signal without altering the significant origin of the audio host. Audio watermarking is usually used to protect the copyright of a work in the form of songs, recording of state and other secrets to avoid irresponsible persons. Audio...

Extending the UTAUT Model to Understand the Citizens’ Acceptance and Use of Electronic Government in Developing Country: A Structural Equation Modeling Approach

Deden Witarsyah Jacob, Irfan Darmawan
The rapid development of information and communication technologies had a positive impact on the government to provide better and efficient services to the community. Despite some criticisms of electronic government services (e-gov) but so far, its utilization has continued to improve. The citizens need...

Cost-Based Storage of the R-tree Aggregated Values over Flash Memory

Wojciech Macyna, Krzysztof Majcher
The flash memory due to its shock - resistance, power economy and non-volatile nature is considered as a very popular storage device. It is widely used in mobile phones, sensor networks and hand-held devices. What attracts the attention is the data storage in the flash memory. Database vendors try to...

Face Recognition Using Local Binary Pattern (LBP) and Local Enhancement (LE) Methods At Night Period

Abdurrahman Fi Zhilali'l, Muhammad Nasrun, Casi Setianingsih
Face recognition is a technique that is widely used in the field of identification of a person or in the field of security. This technique basically determine the similarity on each face of a person who will be identified with the face already stored in a storage (database). In this paper the facial...

Development of Project Document Management System Based on Data Governance With DAMA International Framework

Hanung Nindito Prasetyo, Regina Nathania Djepapu, Ferra Arik Tridalestari, Irman Hariman
Information will continue to grow in an organization, Various forms of information formed such as file documents, archives, policies, procedures, and so forth. In the current era of information technology, document management becomes an absolute thing for the organization. All business processes, activities...

On the Relationship of Travel Time and Energy Efficiency of Industrial Robots

Kai Eggers, Zygimantas Ziaukas, Jens Kotlarski, Tobias Ortmaier
This paper presents an approach to quantify the energy saving potential with regard to travel time of industrial robot motions. In order to minimize the influence of the exemplary considered trajectories and, thus, provide general results, the evaluation is done on a large set of automatically generated...

Localized Island Model Genetic Algorithm in Population Diversity Preservation

Alfian Akbar Gozali, Shigeru Fujimura
Premature convergence in island model is a consequence of the selection in migration mechanism. It is a process of migrating several individuals (usually the best one) from a source into destination island to keep its diversity. The main reason is the similar characteristic of relocated individual because...

Privacy Protection and Role of Technology: Citizen Perception on Electronic Voting Initiative

Muharman Lubis, Tien Fabrianti Kusumasari
This study seek to identify factors that might increase the likelihood of acceptance of electronic voting in which bring satisfaction from citizen to meet their expectation in having better voting experience than before in relation to privacy protection. For the purpose of this study, the researcher...

PROPOSAL OF MAINTENANCE POLICY ON BARMAG FK6800 MACHINE IN FT3 PT XYZ USING RELIABILITY-CENTERED MAINTENANCE AND RISK-BASED MAINTENANCE METHOD

Irsalina Maharani, Fransiskus Tatas Dwi Atmaji, Nopendri Nopendri
XYZ is a company that is engaged in the textile industry since 1974. XYZ has some different kinds of yarns which through several production processes in 24 hours a day to fulfill the market demands. Therefore, all machines have to be in the best condition as it can be. These machine should be maintained...

Factors That Influence An Academic Institution's Intention To Accept CloudIOT: A Proposed Framework

Ali Mehimed Ahmed Ireda, Mohommed Awadh Ben-Mubarak, Adubhahir Buhari
The combination of Cloud Computing (CC) and Internet of things (IOT) which is known as CloudIOT are two different kinds of technologies that are already part of our lives. The growing usage of CloudIOT in the education sector is changing the Teaching and Learning processes. There is very limited study...

MAINTENANCE POLICY of JET DYEING MACHINE USING LIFE CYCLE COST (LCC) AND OVERALL EQUIPMENT EFFECTIVENESS (OEE) IN PT.XYZ

Akbar Perwira Wibowo, Fransiskus Tatas Dwi Atmaji, Endang Budiasih
PT. XYZ is one of the textile companies located in Majalaya, Bandung Region, West Java Province established since 1976. In the production process, one of the important roles is the process of dyeing. The dyeing machine K has the highest frequency of damage compared to other jet dyeing machine in the...

OLAP Cube Processing of Production Planning Real-life Event Log: A Case Study

Rachmadita Andreswari, Mohammad Arif Rasyidi
Business process modeling in an application log can be done by using process mining technique. To analyze the process flow in more detail in several dimensions needs cube process. Multidimensional depiction in star schema to perform Online Analytical Processing (OLAP) can be done by drill-down, roll-up,...

DESIGN OF AUTOMATION SYSTEM FOR CERAMIC SURFACE QUALITY CONTROL USING ARTIFICIAL NEURAL NETWORK AT BALAI BESAR KERAMIK

Puspita Ayu Lestari, Haris Rachmat, Mohd. Rasidi Ibrahim, Denny Sukma Eka Atmaja
Indonesia's ceramic tiles production is currently ranked between fifth and sixth of the world, that showed ceramic tiles is one of the largest commodities in Indonesia. So, ceramic quality becomes very important to be considered in it used as one of the basic building materials. The existing ceramic...

High Imperceptible Copyright Protection: Adaptive Wavelet for Security

Irma Safitri, Rizki R. Ginanjar, Aliffian S. Laksono
This work extends our previous research in [14]. This work showed the imperceptibility of audio watermarking system with Bose-Chaudhuri-Hocquenghem (BCH) code, Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) methods. Watermarked image is embedded in the audio host signal accompanied...

Inventory Control Policy for Farm-Out Parts at Cold Section Module CT 7 Engine with Periodic Review (R, s, S) and (R, S) to Minimize Total Inventory Cost

Pratya Poeri Suryadhini, Ayulia Fitriane Setiawan, Widia Juliani
This paper proposes a policy for parts at maintenance service industry, which is the number of parts not as many as manufacture industry but it may involve in late deliveries. The importance of inventory also occurs in maintenance service industry of aircraft engines and industrial machines such PT....

Low Cost Electronic Seal for Tanker Truck in Indonesia

Ahmad Musnansyah, Bernando Arianto
The amount of loss of petroleum product in transit has always been an ubiquitous problem in Indonesia. This system using RFID, microcontroller, Raspberry PI and specially designed mechanical sensors aims to answer the safe delivery of petroleum product from depot to the gas stations. The electronic seal...

Behavior Proportion According to Merapi Volcano Eruption Evacuations in 2010

Dwi Handayani, Bertha Maya Sopha, Budi Hartono, M. Kusumawan Herliansyah
This paper presents the need of contingency plan for evacuation of Merapi Volcanic eruption by considering the behaviour proportion of people in the slopes of Mount Merapi when facing emergency response phase. The research had used exploratory retrospective view survey with face-to face interview. The...

Applying An Overlapped Design Schedule Based Dependency Structure Matrix to Minimize Project Makespan

Chao Ou-Yang, Indy Cesara
Design process scheduling is conducted by optimizing human resources or workers allocation to several tasks in project with several real constraints to achieve the objective, minimizing the project makespan. In real business case, despite the tasks are already allocated to the optimal workers, rework...

An Analysis of Core Competencies and Business Performances in Software SMEs : A Conceptual Framework

Atya Nur Aisha, Iman Sudirman, Joko Siswanto, Yassierli Yassierli
To survive in the high competition, the SME need to determine and develop their superior internal capability. The aim of this study is to develop a conceptual model that could use to understand the relationship between core competencies and business performance in accordance with the external environment...

Performance Appraisal Design Using 360 Degree Feedback at University X

Deniar Yudithama, Fida Nirmala Nugraha, Devi Pratami
Directorate of Information Systems is a unit that provides information technology services, at University X, that needs to perform at its best most of time. Its employees’ performance directly affects the unit performance. One problem in employee assessment due to its high subjectivity. Currently the...

Clustering of User Query in Search Engine on Indonesian E-Commerce by used AD-OPTICS Algorithms

Ranita Windriani, Ibnu Asror, Dana Sulistyo Kusumo
The development of e-commerce in Indonesia is increasing, now make e-commerce as the land of very large data. The data is also used not only as a content in e-commerce, but with the existence of Web Mining, the data is processed in such a way that will generate new information to be utilized in system...

Explicit and Implicit Aspect Extraction using Whale Optimization Algorithm and Hybrid Approach

Mohammad Tubishat, Norisma Idris
Huge volume of reviews by customers published on different products websites has become an important source of information for both customers and companies. Customers require the information to help them in decision making for buying products, while companies analyze these reviews to improve their products....

Analysis on Opinion Mining Using Combining Lexicon-Based Method and Multinomial Naïve Bayes

Geriska Isabelle, Warih Maharani, Ibnu Asror
Opinion mining is the analysis of the opinion by looking at the sentiment, behavior, or emotions contained in a product. Some of the opinion mining methods are using the lexicon-based and supervised learning. Lexicon-based method has a low recall, while supervised learning has good accuracy but requires...

Group-Centered Framework Towards a Positive Design of Digital Collaboration in Global Settings

Irawan Nurhas, Jan Pawlowski, Stefan Geisler, Maria Kovtunenko, Bayu Rima Aditya
globally distributed groups require collaborative systems to support their work. Besides being able to support the teamwork, these systems also should promote well-being and maximize the human potential that leads to an engaging system and joyful experience. Designing such system is a significant challenge...

Optimizing Woven Fabric Defect Detection using Image Processing and Fuzzy Logic Method at PT. Buana Intan Gemilang

Ratna Safitri, Tatang Mulyana
The development of textile industry which 3rd position in the largest export values in Indonesia prove that the quality of textile must be one of factors that should be considered for all of textile companies. Buana Intan Gemilang is one of the companies that produce woven fabric. This company’s produce...

Tool Design for Tea Cutting Machine to Reduce MSDs Using Ergonomic Function Deployment : A Research at PTPN 8 Ciater

Mira Rahayu, Muhamad Adhi Guna Dwyantoro
The process of picking the tea leaves is done in three different ways, the first one is using the farmer hands, the second is using a scissors, and the third is using a cutting machine. When the farmer using the tea leaf cutting machine, the fatigue level is increasing compared with using the other tools...

Measuring project performance using Earned Value Management (EVM) in XYZ software development project

Olivia Permata Ariputri, Ika Arum Puspita, Wawan Tripiawan
The project of the research is a project-based service that develops customized reporting platform for the X multi finance company. It observed at the project execution stage and focusing on the monitor and control established in the project. The percentage of the problem occur based on the interviewees...

DETERMINING THE SUITABLE MATERIAL HANDLING EQUIPMENT IN PT. XYZ.

Zhafran Ega, Judi Alhilman, Fransiskus Tatas Dwi Atmaji
Selection of appropriate material handling equipment for specific conditions is found to be a multi-criteria decision-making problem. The selection procedure is found to be unstructured, characterized by subject knowledge and requiring the application of an effective and efficient multi-criteria decision-making...

Investigation on Simulation of Wind and Solar Power Hybrid Systems through Human Machine Interface by InTouch Wonderware Software

Tatang Mulyana, Hari Setiawan, Rasidi Ibrahim
Human Machine Interface (HMI) serves as a bridge for operators to understand the processes that occur in a production system. Without the HMI, operators have difficulty in monitoring and controlling the production system. It serves to facilitate the operator in monitoring the plant, plant control, plant...

Fishery Supply Chains in Indonesia: Improvement Opportunities on The Downstream Side

Niniet Indah Arvitrida, Dian Rahmawati, Dwi Lastomo, Rindawati, Kusnadi
This paper investigates improvement opportunities for fishery supply chains in Indonesia. A downstream perspective is taken, and Surabaya is employed as a case study. This research applies desk study and exploratory work to obtain existing landscape of the fisheries supply chains. This landscape is used...

Design and Marketing Performance Analysis on Unit Business Government and Enterprise Service Unit at Telkom XYZ Area by Using Balanced Scorecard for Marketing

Fauziyyah Fauziyyah, Endang Chumaidiyah, Sari Wulandari
Measuring the performance of marketing division still rarely to be encountered, due to the limited measurement tool. Evaluation of marketing performance is usually associated only with the number of 'sales' both in volume and revenue, for instance the BGES unit at Telkom XYZ area. Thus, it cannot be...

Development of Inventory Control Application for Pharmaceutical Product Using ABC-VED Cycle Counting Method to Increase Inventory Record Accuracy

Fadhilah Amin Fathoni, Ari Yanuar Ridwan, Budi Santosa
A good inventory control system is needed in the organization to reduce costs and stay competitive. One of the inventory control strategy is stock-taking. This research aims to develop a new stock-taking policy for a pharmaceutical company using ABC-VED Cycle Counting. Proposed stock-taking policy using...

Deduplication for Data Profiling using Open Source Platform

Margo Gunatama, Tien Fabrianti, Muhammad Azani Hasibuan
Many companies still yet to know the importance of data quality for the company’s improvement. Many companies in Indonesia, especially BUMN and Government companies have only single application with single database, which cause a problem related to duplication of data between columns, tables and applications...

Web Services to Overcome Interoperability in Fingerprint-based Attendance System

Alam Rahmatulloh, Rohmat Gunawan, Irfan Darmawan
The fingerprint-based attendance management process generally consists of recording, management, and reporting. The method of recording attendance data is done with the help of fingerprint attendance machine. Even though the computer connection is running online, the administrator still needs to process...

Comparison of Web Scraping Techniques : Regular Expression, HTML DOM and Xpath

Rohmat Gunawan, Alam Rahmatulloh, Irfan Darmawan, Firman Firdaus
Data collection is the initial stage of research. There are various data sources on the internet that can be used in the research process. The process of taking data or information from sites on the internet is called web scraping. Some methods of web scraping include Regular Expression (Regex), HTML...