Claim Missing Document
Check
Articles

Found 28 Documents
Search

Digital Image Segmentation Resulting from X-Rays of Covid Patients using K-Means and Extraction Features Method Dhian Satria Yudha Kartika; Anita Wulansari; Hendra Maulana; Eristya Maya Safitri; Faisal Muttaqin
IJCONSIST JOURNALS Vol 3 No 1 (2021): September
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (970.953 KB) | DOI: 10.33005/ijconsist.v3i1.55

Abstract

The COVID-19 pandemic has significant impact on people's lives such as economic, social, psychological and health conditions. The health sector, which is spearheading the handling of the outbreak, has conducted a lot of research and trials related to COVID-19. Coughing is a common symptoms among humans affected by COVID-19 in earlier stage. The first step when a patient shows symptoms of COVID-19 was to conduct a chest x-ray imaging. The chest x-rayss can be used as a digital image dataset for analysing the spread of the virus that enters the lungs or respiratory tract. In this study, 864 x-rays were used as datasets. The images were still raw, taken directly from Covid-19 patients, so there were still a lot of noise. The process to remove unnecessary images would be carried out in the pre-processing stage. The images used as datasets were not mixed with the background which can reduce the value at the next stage. All datasets were made to have a uniform size and pixels to obtain a standard quality and size in order to support the next stage, namely segmentation. The segmentation stage of the x-ray datasets of Covid-19 patients was carried out using the k-means method and feature extraction. The Confusion Matrix method used as testing process. The accuracy value was 78.5%. The results of this testing process were 78.5% of precision value, 78% of recall and 79% for f-measure
GIS Land Suitability to Increasing Agricultural Production for the Agriculture Supply Chain: A Systematic Literature Review Seftin Fitri Ana Wati; Fitri, Anindo Saka Fitri; Dhian Satria Yuda Kartika; Anita Wulansari; Eristya Maya Safitri; Agussalim
IJCONSIST JOURNALS Vol 3 No 2 (2022): March
Publisher : International Journal of Computer, Network Security and Information System

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33005/ijconsist.v3i2.67

Abstract

Agricultural development is essential for the community's survival because it is a major source of food. Food production is a critical component of food security. Food security must be improved to meet market demand, and one of the fundamental goals of agricultural growth is to provide sufficient quantities of food. Increasing demand for natural resources, as well as environmental issues, are putting pressure on the current agricultural supply chain, which includes agricultural land suitability. Land evaluation is a process of analyzing land resources for specific uses using an established technique or method, and it is required to incorporate land appropriateness. According to the criteria, the findings of land suitability will give information and/or land use guidance. The land's appropriateness might be evaluated in its existing state (actual land suitability) or after changes have been made (potential land suitability). To address these issues, the agricultural sector must transition from traditional agriculture to smart agriculture. One of the technologies and system modeling that drives the current technique to smart agriculture with an integrated approach to evaluate the sustainability of agricultural land suitability is the geographic information system (GIS). The Systematic Literature Review (SLR) from prior investigations is presented in this publication. The articles are divided into two groups based on their approaches: agricultural land appropriateness for rice plants and the application of geographic information systems (GIS), comprising agricultural land suitability, site selection, and effect evaluation. The goal of this research is to determine what criteria are significant in increasing the quality of GIS applications in agriculture. This outcome is expected to assist stakeholders in formulating policies based on the performance of GIS data management in enhancing agricultural productivity and promoting agriculture supply chain management.
Analisis Faktor-Faktor Penerimaan E-Museum Menggunakan Technology Acceptance Model (TAM) : Studi Kasus: www.museumindonesia.org Saktian Purborini; Tri Lathif Mardi Suryanto; Anita Wulansari
Jurnal ilmiah Sistem Informasi dan Ilmu Komputer Vol. 5 No. 2 (2025): Juli : Jurnal ilmiah Sistem Informasi dan Ilmu Komputer
Publisher : Lembaga Pengembangan Kinerja Dosen

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/juisik.v5i2.1172

Abstract

The low level of visits to museums compared to other tourist destinations is largely due to the lack of interactive activities and the need for direct guidance in accessing collection information. Although an e-museum platform based on virtual reality technology has been available through museumindonesia.org as a solution to physical limitations and an effort to attract the interest of the younger generation, the extent to which the public accepts this innovation is still unknown. The lack of understanding of the perception of ease and usefulness in using services is an important reason to conduct an evaluation using the TAM approach. This study aims to identify and analyze factors that influence the intention and behavior of using e-museum services, in order to provide a strategic foundation for the development of web-based museum service management. The total respondents used in this study were 120 people. The analysis method used was the Path Analysis method. The results showed that most of the constructs in the model had a significant relationship. Facilitating Conditions were proven to have an influence on Perceived Ease of Use and Perceived Usefulness. Furthermore, Perceived Ease of Use contributes to forming Perceived Usefulness and attitudes towards use (Attitude Toward Using). Among all variables, Perceived Usefulness has the strongest influence on Behavioral Intention, with the highest coefficient value of 0.72. In addition, attitudes toward use also play a role in forming behavioral intentions, which in turn affect actual usage behavior. The results of the analysis show that perceptions of ease of use are a key element in forming perceptions of system usefulness. Overall, the five main variables of Facilitating Condition, Perceived Ease of Use, Perceived Usefulness, Attitude Toward Using, and Behavioral Intention have a significant contribution to the acceptance of e-Museum technology.
Evaluation of IT Resource Management Capability Using COBIT 5 on Subdomain EDM04 and APO07 Renatasari, Carissa; Anita Wulansari; Eristya Maya Safitri
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2595

Abstract

The Population and Civil Registration Office of Sidoarjo Regency is a government agency that implements performance-based management, focusing its activities on service excellence and utilizing information technology in its services such as the Population Administration Information System (SIAK) and "Plavon". However, there are problems that hinder progress include low public awareness in updating population data, insufficient staff based on Permenpan standards, and the focus on technology-based service innovations. To address these, employees are key in community education and supporting priority programs. This research aims to evaluate the level of IT resource management capability at Disdukcapil Sidoarjo using the COBIT 5 framework, focusing on EDM04 (Ensure Resource Optimisation) and APO07 (Manage Human Resources). The methods used based on the COBIT 5 Assessment Process. Both EDM04 and APO07 processes achieved Level 1 Performed Process with "Largely Achieved" status. EDM04 scored 72% overall (69% Base Practices, 75% Work Products), while APO07 scored 64.4% overall (53.7% Base Practices, 75% Work Products). The final results of both scores fall into the "Largely Achieved" category. There is a capability gap between the current condition (as is) and target expectations (to be) of four levels in the EDM04 process and one level in the APO07 process, so improvement recommendations are provided to achieve the expected level. This research provides an overview of current conditions and improvement recommendations to enhance the effectiveness of IT resource management at Disdukcapil Sidoarjo.
Evaluation of Information Security Management Capability Level with COBIT 5 Dita Ayu; Asif Faroqi; Anita Wulansari
bit-Tech Vol. 8 No. 1 (2025): bit-Tech
Publisher : Komunitas Dosen Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32877/bt.v8i1.2682

Abstract

Information security is a crucial aspect of information technology management, especially in government institutions such as the Department of Communication and Informatics (DISKOMINFO), which often faces challenges such as cyberattacks, lack of formal documentation, and limited resources in managing risks and securing data. These challenges hinder the organization’s ability to protect sensitive information and maintain public trust. This study evaluates the maturity level of information security governance at DISKOMINFO of Sampang Regency using the COBIT 5 framework, focusing on three domains: APO12 (Manage Risk), APO13 (Manage Security), and DSS05 (Manage Security Services). The method used is a case study with a descriptive qualitative approach through interviews and documentation. The results show that all three processes are at Level 1 (Performed Process), with 40.34% in the Partially Achieved category for APO12, 84.60% in the Largely Achieved category for APO13, and 57.23% in the Largely Achieved category for DSS05, where processes are carried out but not formally documented or standardized. There is a lack of monitoring and continuous improvement, making the governance reactive rather than proactive. Improvements are needed through development of policies, formal procedures, and more organized, sustainable security controls. Increasing employee awareness and allocating resources for information security are also critical. This research provides novelty by evaluating three COBIT 5 domains (APO12, APO13, DSS05) in a local government context, which has rarely been done. The findings offer a comprehensive maturity mapping as a strategic reference for improving information security governance in local government institutions.
Perancangan SOP Pengembangan Sistem Informasi Manajemen Menggunakan Framework COBIT 5 dan ITIL V3: (Studi Kasus: Dinas Perpustakaan dan Kearsipan Kota Surabaya) Ajeng Laras Wangi; Siti Mukaromah; Anita Wulansari
Bridge : Jurnal Publikasi Sistem Informasi dan Telekomunikasi Vol. 2 No. 3 (2024): Agustus: Bridge: Jurnal Publikasi Sistem Informasi dan Telekomunikasi
Publisher : Asosiasi Profesi Telekomunikasi Dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62951/bridge.v2i3.143

Abstract

Dinas Perpustakaan dan Kearsipan Kota Surabaya (DISPUSIP) is one of the Surabaya city government institutions whose role is to provide and manage public service facilities in the library and archives sector in the City of Surabaya. DISPUSIP has an IT Team that manages information technology including the development of Management Information Systems (MIS). In working on MIS development, the DISPUSIP IT Team experienced problems related to the division of job desks between members and the MIS work flow was unclear and undocumented because there were no procedures and documentation for MIS development activities. Therefore, MIS development governance is needed in the form of a Standard Operating Procedure (SOP) to manage MIS development activities. The preparation of SOPs in this thesis uses the gap analysis method to determine the gap between current conditions and ideal conditions. Current conditions were obtained from interviews and observations, while ideal conditions were obtained from activities in the System Development Life Cycle (SDLC), the COBIT 5 domain BAI03 framework, and ITIL v3 change management. The output produced from this thesis is a MIS development SOP document which consists of 5 procedures, namely: New MIS Planning SOP, New MIS Analysis SOP, New MIS Design SOP, New MIS Implementation SOP, and MIS Module Addition SOP verified using the interview method and validated with SOP test simulations to find out whether the SOP is appropriate.
Analysis of Factors Influencing the Acceptance of the Indodax Application Using the UTAUT 2 Model Alisia, Raffi Abdillah Putra; Anita Wulansari; Rafika Rahmawati
JURNAL TEKNOLOGI DAN OPEN SOURCE Vol. 8 No. 1 (2025): Jurnal Teknologi dan Open Source, June 2025
Publisher : Universitas Islam Kuantan Singingi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36378/jtos.v8i1.4425

Abstract

This study investigates the key factors influencing user acceptance of the Indodax application, a leading cryptocurrency trading platform in Indonesia, by employing the UTAUT 2 (Unified Theory of Acceptance and Use of Technology 2) framework. The model focuses on four core variables—Performance Expectancy, Effort Expectancy, Social Influence, and Facilitating Conditions—to assess their impact on users’ Behavioral Intention to adopt the platform. Data were collected from 417 respondents using an online questionnaire, and the relationships among variables were analyzed using SmartPLS 4.0 with the bootstrapping technique. The hypothesis testing results confirmed that all proposed hypotheses were supported, indicating that each of the identified factors significantly contributes to users' intentions to use the application. Among the variables, Performance Expectancy and Facilitating Conditions were found to have the strongest impact on users' Behavioral Intention. Nevertheless, Effort Expectancy and Social Influence also demonstrated significant positive effects. These outcomes emphasize the importance of improving user experience by enhancing system usability, leveraging social influence, and strengthening supporting infrastructure. Overall, the study offers valuable insights for developers, platform providers, and policymakers in developing strategies to encourage broader adoption of cryptocurrency platforms like Indodax and to support the growth of the digital asset ecosystem in Indonesia.
Analysis Of Acceptance Factors Of Tiket Pendakian Application Using UTAUT Moch. Abdillah Emha Ramdhani; Anita Wulansari; Tri Puspa Rinjeni
JURNAL TEKNOLOGI DAN OPEN SOURCE Vol. 8 No. 2 (2025): Jurnal Teknologi dan Open Source, December 2025
Publisher : Universitas Islam Kuantan Singingi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36378/jtos.v8i2.4693

Abstract

The popularity of mountain climbing has created a need for an efficient and user-friendly reservation system. However, in December 2024, the Tiket Pencakian application only received a rating of 3.9 on digital platforms, reflecting user dissatisfaction with the application's functionality and user experience. Complaints included unstable connections and login failures. The purpose of this study was to analyze the factors influencing user acceptance of the Tiket Pencakian application using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. This study applied a quantitative approach through an online questionnaire distribution, which successfully collected 390 respondents from various regions in Indonesia. After the data cleaning process, 371 valid data were analyzed using the Partial Least Square technique through SmartPLS 3 software. The research model includes nine hypotheses that measure the influence between factors on the intention and actual behavior of using the application. The results of the study proved that six hypotheses were significantly accepted, including Performance Expectancy, Social Influence, Hedonic Motivation, and Habit having a significant positive effect on Behavioral Intention, and Behavioral Intention and Habit having a positive and significant effect on ICT Usage Behavior. Meanwhile, Effort Expectancy and Facilitating Conditions on Behavioral Intention, as well as Facilitating Conditions on ICT Usage Behavior, did not have a significant effect. It can be concluded that perceived usefulness, social influence, enjoyment of use, habits, and intention to use are the main factors that shape user behavior in using the Tiket Pendakian application.