This paper presents our research on the development of navigation systems of autonomous drone for delivering items that uses a GNSS (Global Navigation Satellite System) and a compass as the main ...tools in drone. The grand purpose of our research is to deliver important medical aids for patients in emergency situations and implementation in agriculture in Indonesia, as part of the big mission of Society 5.0 and related with big data. In sending process, drone must be able to detect object and reach goal position and go back safely using GPS. We proposed a navigation algorithm for drone including the usage of course-over-ground information to help drone in doing autonomous navigation. In the experiment that we did, the average of positional deviation of landing position between the actual landing position and the desired landing position in the flight tests of flying from start to goal is 1.1125 m and for the tests that use the algorithm which uses course-over-ground, the positional deviation has average of 2.39 m. Navigation using course-over-Ground algorithm is not more reliable than the navigation algorithm with GNSS and Compass at a navigation distance of less than 1 m.
Background
The main obstacle for local and daily or weekly time-series mapping using very high-resolution satellite imagery is the high price and availability of data. These constraints are currently ...obtaining solutions in line with the development of improved UAV drone technology with a wider range and imaging sensors that can be used.
Findings
Research conducted using Inspire 2 quadcopter drones with RGB cameras, developing 3D models using photogrammetric and situation mapping uses geographic information systems. The drone used has advantages in a wider range of areas with adequate power support. The drone is also supported by a high-quality camera with dreadlocks for image stability, so it is suitable for use in mapping activities.
Conclusions
Using Google earth data at two separate locations as a benchmark for the accuracy of measurement of the area at three variations of flying height in taking pictures, the results obtained were 98.53% (98.68%), 95.2% (96.1%), and 94.4% (94.7%) for each altitude of 40, 80, and 100 m. The next research is to assess the results of the area for more objects from the land cover as well as for the more varied polygon area so that the reliability of the method can be used in general
Communication science and information technology (ICT) has been progressing and contain complex implication for individual, groups and inter-country relationship. Along with ICT evolution, threats ...(including theft of information) increase and electronic systems are adopted. As a government agency in higher education with the country's strategic data, XYZ cannot escape hackers trying to access the assets. Strategic assets include system and company's data as well as systems and data which might be taken for granted by irresponsible parties. Therefore, it is necessary to secure information and data systems in XYZ. Moreover to test whether the implemented cyber security system can optimally standardize the company's information and data systems. The application of Security Information Event Management (SIEM) to cyber security systems to detect incoming threat alerts and block access to suspicious threats. While the honeypot is used to deceive the hacker into a fake system intentionally attacked and learning the tricks that intruders use when performing the action. The results of the test of the application of SIEM and Honeypot at XYZ can monitor the monitoring of information system and data-related threats in real-time, and deter and transmit cyber-attacks to adequately protect information security so that the use of cyber security systems with SIEM & Honeypot can secure the information and data systems owned by XYZ optimal.
The goal of this paper is to get the best potential configuration which can be applied to a physical server without compromising service performance for the clients. Data were compiled by direct ...observation in the data center observed. Data was then analyzed using the hermeneutics approach to understand the condition by textual data gathered understanding. The results would be the best configuration for a physical server which contains several virtual machines logically separated by its functions. It can be concluded that indeed one physical server machine can be optimized using virtualization so that it may deliver the peak performance of the machine itself and the impact are throughout the organization.
Risk Management can reduce the risk of such as business processes that are not optimal, financial losses, declining reputation of the company, or the destruction of the company’s business. To reduce ...damage to the information systems of the company’s business process, there should be a risk management assessmentThe use of information systems required to support the company’s business processes, especially in education institution, as well as the MH. Thamrin University. In the use of information systems, will appear risks that will give negative impact on the institution. To reduce the negative impact, need to do a risk assessment. The method used in this thesis is the OCTAVE Allegro. Data were analyzed using the 8 steps in the OCTAVE Allegro, and distributing questionnaires to users of information systems. The result, there are 34 areas of concern is mitigated, and the overall user feedback states agreed on mitigation steps. It was concluded that a risk assessment is useful for reducing the risks of information system
Teknologi yang berkembang pesat pada bidang IT menjadi komponen penting dan saling melengkapi dalam pengolahan data dan informasi dalam sebuah organisasi. Oleh sebab itu, perlu dilakukan pengelolaan ...risiko terhadap ancaman – ancaman terhadap keamanan sistem informasi dan penilaian risiko. Terdapat banyak metode yang dapat digunakan dalam melakukan pengelolaan dan penilaian risiko. Salah satunya adalah metode FMEA (Failure Mode and Effect Analysis). Pada penelitian ini menggambil studi kasus di RSIA Eria Bunda. Sebagai industri yang bergerak dibidang kesehatan, RSIA Eria Bunda perlu menjaga kerahasian informasi mengenai data pasien, dokter, obat-obatan, dan staf lainya dari ancaman yang mungkin menimbulkan risiko yang dapat merugikan industri. Dimana tujuan penelitian untuk mengetahui bagaimana tingkatan risiko yang terjadi pada sistem informasi dan memberikan solusi mitigasi kepada RSIA Eria Bunda. Terdapat sepuluh tahapan dalam identifikasi dan penilaian risiko menggukan metode FMEA. Sehingga dari hasil penelitian ini adalah terdapat satu aktivitas dengan kategori tinggi, 6 aktivitas kategori sedang dan Sembilan belas aktivitas dengan kategori rendah. Kata kunci: Analisis Risiko, FMEA, RSIA Eria Bunda.
A good and fast information system is supported by good information technology. To achieve its business goals, optimal and integrated information technology will support good quality services. The ...XYZ University Information System (UIS) provides a variety of information needed by students, lecturers, and all staff. But the system that is running is still experiencing problems in its use that can pose various risks. To prevent that, a risk assessment is carried out on the UIS to identify various possible risks and prevent them by forming a risk management. This research will be conducted using NIST 800-30. This standard is used with the aim of anticipating risks so that the organization does not experience losses. The preparation of UIS information security risk management carried out in this study has succeeded in identifying 32 risk scenarios, prioritizing risks, providing direction in managing risks and accepting processes whether risks are acceptable or should be mitigated.
Contact Center is a form of Customer Relationship Management, where customers can interact with a company through its single point of contact and serves mainly as a tool for the company to maintain ...its service to the customers. Contact center is generally operated by many Agents and can accepts thousands of phone calls every day, depending on the company’s scale and customer base. In order to correctly serve the customers, Agents need to understand many knowledge which the company has, and this is the main reason why Agents need to master the company’s Knowledge Management System (KMS). Inability of Agents to interact with the KMS will be a serious problem for the company. In this paper, we studied the acceptance of Halo Info, a form of KMS in one of the biggest banking contact center in Indonesia, called Halo BCA. We used modified TAM version 2, with a total of 11 variables, 31 indicators, and 12 hypotheses. The research instrument was a 31 items questionnaire. We gathered 283 respondent data, and analyzed it using PLS-SEM. The research findings are: Usage Behaviour (UB) is significantly affected by Intention to Use (IU); IU is proven to be greatly affected by Perceived Ease of Use (PEU), Perceived Usefulness (PU), and Subjective Norm (SN); PEU is significantly affected by System Self-Efficacy (SSE) and Interface Usability (IUSB); PU is significantly affected by Job Relevance (JR) and PEU, but is not significantly affected by Output Quality (OQ), Image (I), Result Demonstrability (RD), and SN.
Development of innovation, diffusion canbe used to increasethe productivity or competitiveness of the institution or nation. So, strengthening the innovation system becomes a very important thing to ...do in many countries, including Indonesia. In the era of globalization, where the development of science and technology is so dynamic, the development of innovation system in a country is no longer possible. To succeed in the innovation system development, development system stakeholders must hold and promote the improvement of five factors: linkages, partnership, network, positive interaction and synergy as a key success factor. In the innovation network shows the success of innovation depends on the effective interaction. The interaction showed linkages for strengthening regional innovation system needs to be cultivated in supporting innovation and business activity and then become an innovation network. Interactions and relationships can be made by advances in information and communicationstechnology, where it is also one important factor to establish science and technology. Advances in information and communications technology contribute to promoting and realizing the potential of the region in facing and overcoming obstacles and challenges of region. Based on the observations of the importance of an innovation network in the region will need to be an analysis of inter-actor network conditions that support the strengthening of the Regional Innovation System. For the pilot area is the town of Cimahi (West Java).
The purpose of the current study is to enhance students’ literacy and numeracy using mobile game-based learning with augmented reality (ARGBL) in chemistry and biology. In this quasiexperimental ...design, 714 10th and 11th grade students from five high schools in Indonesia were recruited as participants. To gather the data, the Chemical Literacy and Numeracy Test (C-LNT) and the Biological Literacy and Numeracy Test (B-LNT) were administered to the treatment and control group (CG) students. Quantitative data were then analyzed using descriptive statistics and t-tests. The results highlighted that the treatment group students who were instructed using ARGBL had higher literacy and numeracy scores than the comparison group students who were taught using PowerPoint (PPT) slides. This indicates that ARGBL is effective in promoting literacy and numeracy among high school students in chemistry and biology. Thus, we suggest teachers apply ARGBL to elevate students’ literacy and numeracy to a satisfactory level.