Information technology (IT) is essential in supporting an organization's business sustainability and growth, making it critically dependent on IT. Therefore, a focus on IT governance, consisting of leadership, organizational structure, and process ensuring that IT organization supports and expands the organizational strategies and goals is required. When the business supports the strategic significance of IT investment, the implementation of an IT strategy will lead to the adoption of an IT governance model. It will support and help the description of the benefit roles and responsibilities from IT systems and infrastructure. This paper aims to develop a business process monitoring system to support IT governance in improving user service and measuring organizational performance. The research method was the system development method with the Waterfall model. To measure the performance of the business process, the self-assessment method with performance matrix tools was applied. The study resulted in a business process monitoring system that can enhance the organization’s primary business process in services, supporting the said organization’s performance.
IT solutions that supports the whole Strategic planning workflow, from defining Mission, Vision, SWOT analyses, Strategic objectives, action plans, KPI's, strategic monitoring through Strategic maps, Dashboards, with great Analyses possibilities through OLAP and excel, can be used for Balanced scorecard, TQM, 20 keys and other performance methodologies. More on www.tomasdse.com.Please EMAIL me on igor.matjasic@tomasdse.com , if you would like some more information about this solution.
The Three Essential Process Layers - New York Business Process Professionals ...Samuel Chin, PMP, CSM
You already know the basic structure of process work. But do you fully understand the three layers you'll uncover in every process project, and how they're all related?
This deck is about the three essential layers of process work: technological, business process, and value chain. We will define these three levels and discuss the relationship between them, diving deeper than ever to equip you with the tools you need to deliver great results every time.
IT solutions that supports the whole Strategic planning workflow, from defining Mission, Vision, SWOT analyses, Strategic objectives, action plans, KPI's, strategic monitoring through Strategic maps, Dashboards, with great Analyses possibilities through OLAP and excel, can be used for Balanced scorecard, TQM, 20 keys and other performance methodologies. More on www.tomasdse.com.Please EMAIL me on igor.matjasic@tomasdse.com , if you would like some more information about this solution.
The Three Essential Process Layers - New York Business Process Professionals ...Samuel Chin, PMP, CSM
You already know the basic structure of process work. But do you fully understand the three layers you'll uncover in every process project, and how they're all related?
This deck is about the three essential layers of process work: technological, business process, and value chain. We will define these three levels and discuss the relationship between them, diving deeper than ever to equip you with the tools you need to deliver great results every time.
Topics :
System and process of controlling
Budgetary and non-budgetary control techniques
Use of computers and IT in Management control
Productivity problems and management
Control and performance
Direct and preventive control
Reporting
The Workshop on Quality Management in Public Services will make the participants aware of key elements in quality management and will enable the participants to apply these approaches in their daily functions. The workshop will also encourage team work and peer learning across the public organisations in Croatia.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
Core model of information technology governance system design in local govern...TELKOMNIKA JOURNAL
Information technology governance (ITG) in local government is aimed at a good governance service framework. Reports produced as a result of the framework’s implementation help to improve governance’s openness, potency, and efficiency. A strong governance structure for adopting information technology (IT) is essential to ensuring its best utilization. The governance system should be properly managed to support the organization’s business. Therefore, this research aims to design an ITG system suitable for best practices using the control objectives for information technologies (COBIT) 2019 framework. The recommendations from the core model were processed based on the priority or competence level that local government entities use. It also produced a core model with capability levels of 1 and 2 that do not exist. The recommendation designated for the priority level of 3 was 17. The core model to be assigned a capability level of 4 urgently needed to be implemented was 23 core models.
Topics :
System and process of controlling
Budgetary and non-budgetary control techniques
Use of computers and IT in Management control
Productivity problems and management
Control and performance
Direct and preventive control
Reporting
The Workshop on Quality Management in Public Services will make the participants aware of key elements in quality management and will enable the participants to apply these approaches in their daily functions. The workshop will also encourage team work and peer learning across the public organisations in Croatia.
The measurement of maturity level of information technology service based on ...TELKOMNIKA JOURNAL
Institutions are currently progressing on IT development and maximization in order to advance for good IT governance. Lack of comprehensive requirements analysis of IT utilization may lead to hindrances within IT development from achieving effective outcomes. This quantitative study employs control objective for information & related technology (COBIT 5) business framework to assess and identify the maturity level of IT service, primarily within the domain of delivery, service, and support (DSS). Data were obtained through questionnaire, observation, and documentation. The result reveals that the average maturity level of IT service is in level 3 (established); by which the study recommends for enhancements and upgrades in IT performance and service within the scope of compliance and IT service application and support.
Core model of information technology governance system design in local govern...TELKOMNIKA JOURNAL
Information technology governance (ITG) in local government is aimed at a good governance service framework. Reports produced as a result of the framework’s implementation help to improve governance’s openness, potency, and efficiency. A strong governance structure for adopting information technology (IT) is essential to ensuring its best utilization. The governance system should be properly managed to support the organization’s business. Therefore, this research aims to design an ITG system suitable for best practices using the control objectives for information technologies (COBIT) 2019 framework. The recommendations from the core model were processed based on the priority or competence level that local government entities use. It also produced a core model with capability levels of 1 and 2 that do not exist. The recommendation designated for the priority level of 3 was 17. The core model to be assigned a capability level of 4 urgently needed to be implemented was 23 core models.
CRITICAL SUCCESS FACTORS FOR INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY IM...ijait
In recent years, market competitions and internal efficiency requirements derived many Information
Technology (IT) functions to shift their paradigms from IT asset management to IT service management
(ITSM). Consequently, a growing number of public and private organizations are implementing the ITIL
(IT Infrastructure Library) “best practice” as a framework for improving IT service management
processes. This paper presents an exploratory in-depth case study of two public service organizations in
the kingdom of Saudi Arabia deemed successfully implemented ITIL V3 processes. The case studies identify
several critical success factors (CSF) associated with ITIL implementation success. These CSF are then
compared with factors identified in the literature to shed light on success factors and challenges to offer a
learning experience for organizations currently undergoing or planning ITIL implementation.
IT Service Management System Measurement using ISO20000-1 and ISO15504-8: De...IJECEIAES
Information technology is about not only hardware, software, communication infrastructure and communication infrastructure but also how to manage services. Information technology plays an increasingly important role in developing the structure and functions of public and private sectors. Service measurement plays an important role in IT service management (ITSM) that is one of the subfields of Services Computing science. ITSM is a big part of service science, a science field that combines computer science, operation research engineering, business strategy, management science, and organizational theory. Performance measurement from each of IT services is absolutely needed and is important in the continuous development of ITSM. These research provide good technical knowledge about the measuring ITSM with some requirements. In this paper we suggest the metrics in each service processes enables organizations to predict a direction for active process enhancement and to identify if the goal of process can achieve. This objective process metrics based on ISO/IEC 15504-8 and PRM ISO/IEC 20000-4 refinement. The output of this research, in the form of metrics and tools for any type organizational use.
Proposal of a Framework of Lean Governance and Management of Enterprise ITMehran Misaghi
Technology and Information are vital to the success of companies.
To leverage the successes in IT projects, companies have at their
disposal, references globally accepted as good practices (COBIT,
ITIL, PMBOK, ISO, TOGAF, etc.). In spite of this, it is still great
the magnitude of spending on IT projects poorly designed or
improperly implemented. This paper presents a brief description
of standards and good practices related to governance and
management of enterprise IT, defines the Lean Thinking, Lean IT, the Processes Management, the Portfolio, Program and Project
Management, and the Work System Theory, and highlights the
purpose of them, showing their characteristics and suggests a
Framework of Lean Governance and Management of Enterprise
IT, by demonstrating how the standards and good practices
presented can work together, because it advocates that the Lean
Thinking, the Process, Portfolio, Program, and Project
Management, and the Work System Theory complement the
standards and good practices of Governance and Management of
Enterprise IT with an approach not referenced in these standards
and good practic
Suggest an intelligent framework for building business process management [ p...ijseajournal
As companies enter into the digital world, information technology is playing a major role in bringing
process improvements to the forefront of business management. In the recent decades, many organizations
have struggled to redesign and improve their business processes to reduce their total cost. The main
contribution of this research study is to propose an intelligent framework that possesses the ability to
employ a database of best practices, business standards, and business activity history in order to permit the
manager to analyze and improve the design of the business processes.
In addition, the other objective of this research is to build a business process or workflow directly from its
process design logic in order to enable rapid process development and deployment. This procedure
requires some technical improvements of the business design, as it is mainly based on building the business
process using Microsoft Office Visio, which communicates the defined business process to the business
process management engine.
Critical Success Factors for Implementing an ERP System within University Con...IJMIT JOURNAL
Nowadays, Information Technology (IT) plays an important role in efficiency and effectiveness of the organizational performance. As an IT application, Enterprise Resource Planning (ERP) systems is considered one of the most important IT applications because it enables the organizations to connect and interact with its administrative units in order to manage data and organize internal procedures. Many institutions use ERP systems, most notably Higher Education Institutions (HEIs). However, many projects fail or exceed scheduling and budget constraints; the rate of failure in HEIs sector is higher than in other sectors. With HEIs’ recent movement to implement ERP systems and the lack of research studies examining successful implementation in HEIs, this paper provides a critical literature review with a special focus on Saudi Arabia. Further, it defines Critical Success Factors (CSFs) contributing to the success of ERP implementation in HEIs. This paper is part of a larger research effort aiming to provide guidelines and useful findings that help HEIs to manage the challenges for ERP systems and define CSFs that will help practitioners to implement them in the Saudi context.
CRITICAL SUCCESS FACTORS FOR IMPLEMENTING AN ERP SYSTEM WITHIN UNIVERSITY CON...IJMIT JOURNAL
Nowadays, Information Technology (IT) plays an important role in efficiency and effectiveness of the
organizational performance. As an IT application, Enterprise Resource Planning (ERP) systems is
considered one of the most important IT applications because it enables the organizations to connect and
interact with its administrative units in order to manage data and organize internal procedures. Many
institutions use ERP systems, most notably Higher Education Institutions (HEIs). However, many projects
fail or exceed scheduling and budget constraints; the rate of failure in HEIs sector is higher than in other
sectors. With HEIs’ recent movement to implement ERP systems and the lack of research studies examining
successful implementation in HEIs, this paper provides a critical literature review with a special focus on
Saudi Arabia. Further, it defines Critical Success Factors (CSFs) contributing to the success of ERP
implementation in HEIs. This paper is part of a larger research effort aiming to provide guidelines and
useful findings that help HEIs to manage the challenges for ERP systems and define CSFs that will help
practitioners to implement them in the Saudi context.
Thriving information system through business intelligence knowledge managemen...IJECEIAES
In the current digitalization dilemma of an organization, there is a need for the business intelligence and knowledge management element for enhancing a perspective of learning and strategic management. These elements will comprise a significant evolution of learning, insight gained, experiences and knowledge through compelling theoretical impact for practitioners, academicians, and scholars in the pertinent field of interest. This phenomenon occurs due to digitalization transformation towards industry revolution 5.0 and organizational excellence in the information system area. This research focuses on the characteristic of a comprehensive performance measure perspective in an organization that conceives information assessment and key challenges of Business Intelligence and Knowledge Management in perceiving a relevant organizational excellence framework. The dynamic research focusing on the decision-making process and leveraging better knowledge creation. The future of organization excellence seemed to be convergent in determining the holistic performance measure perspective and its factors towards industry revolution 5.0. The research ends up with a typical basic excellence framework that will mash up some characteristics in designing an organizational strategic performance framework. The output is a conceptual performance measure framework for a typical decision-making application for organizational strategic performance management dashboarding.
This paper had as approach a study about the use of IT resources in three different small, medium and large transport companies of the city of Pau dos Ferros - RN. The collected data allowed the knowledge of the main technological resources used in the internal structure of each company and their influence on the internal decision-making processes. When analyzing the resources used by the organizations, a certain similarity was identified in the types and a difference in the Information Systems used. The enterprises,named here as A, B and C, use thesoftwares SYSPDV, SoftCom and CissPoder, respectively. It was also identified that the small enterprise A does not use all the functionalities of the Information System employed, while the large enterprises B and C explore all the capacities of the IS in the company internal structure.
Presenting VALIT Frameworks and Comparing between Them and Other Enterprise A...Eswar Publications
It is necessary for each organization to move towards process-focused that it is supported and presided by information technology (IT). IT is considered as a part of processes field. In the information technology era, especially with the advent of network-based economy, organizations plans must be performed based on an architectural design deserving Information Society. Enterprise Architecture provides a framework to design organization based on Information Technology. Val IT framework is not related to enterprise architecture frameworks, but rather to IT governance. IT governance is indeed a paradigm in which it is attempted to make all activities and enterprise mechanisms for the planning, organizing, implementation and control of IT aligned and
consistent. This study first discusses the introduction of this framework; then, a comparison between this framework and COBIT as well as between enterprise architecture and Val IT will be done.
Measuring Enterprise Resource Planning (ERP) Systems Effectiveness in IndonesiaTELKOMNIKA JOURNAL
Refining DeLone and McLean’s (D&M) information system model and technology-organisationenvironment
(TOE) framework, this research identifies the prominent factors that determine ERP system
success. Hypotheses are also drawn based on supporting theories to evaluate the causal relationship
between the success determinants. The level of achievement is measured by system quality, information
quality, service quality, external quality and top management support, which intermediated by perceived
usefulness and user satisfaction towards business benefits. To provide empirical evidence, 86 valid
samples out of 156 were collected using a web survey that targeted ERP users in Indonesia. Furthermore,
Partial Least Squares–Structural Equation Modelling (PLS-SEM) algorithm were applied to check the
proposed hypotheses. The results suggest system quality, information quality and service quality
significantly affect user satisfaction, whereas they moderately impact on perceived usefulness.
Interestingly, external pressures were reported as being the biggest influence on user satisfaction and
positively impacted on perceived usefulness. Despite being fairly predictive to perceived usefulness, top
management support along with general perceptual factors ultimately promote system success by
elevating business benefits.
Employee Performance Measurement in Teleworking Using Balanced Scorecard IJECEIAES
Key Performance Indicator (KPI) must be aligned with the development of the organization. PT. Mitra Intregrasi Informatika (MII) in its development decided to change the traditional way of work to modern telework. This encourages companies to adjust employee’s KPI from the traditional way of work turns in to telework. In order to perform KPI measurement of its employees based on teleworking, this research uses balanced scorecard method approach that is by taking into account financial, customer, and internal business process and learning and growth perspective. The results of this study are the design proposal KPI employees to accommodate telework at the company. Then KPI employee test results showed an increase in the average value of the employee KPI of 0.295 points (9.47%) of the old KPI. Thus, it is recommended to the company to implement the employee KPI.
Square transposition: an approach to the transposition process in block cipherjournalBEEI
The transposition process is needed in cryptography to create a diffusion effect on data encryption standard (DES) and advanced encryption standard (AES) algorithms as standard information security algorithms by the National Institute of Standards and Technology. The problem with DES and AES algorithms is that their transposition index values form patterns and do not form random values. This condition will certainly make it easier for a cryptanalyst to look for a relationship between ciphertexts because some processes are predictable. This research designs a transposition algorithm called square transposition. Each process uses square 8 × 8 as a place to insert and retrieve 64-bits. The determination of the pairing of the input scheme and the retrieval scheme that have unequal flow is an important factor in producing a good transposition. The square transposition can generate random and non-pattern indices so that transposition can be done better than DES and AES.
Hyper-parameter optimization of convolutional neural network based on particl...journalBEEI
Deep neural networks have accomplished enormous progress in tackling many problems. More specifically, convolutional neural network (CNN) is a category of deep networks that have been a dominant technique in computer vision tasks. Despite that these deep neural networks are highly effective; the ideal structure is still an issue that needs a lot of investigation. Deep Convolutional Neural Network model is usually designed manually by trials and repeated tests which enormously constrain its application. Many hyper-parameters of the CNN can affect the model performance. These parameters are depth of the network, numbers of convolutional layers, and numbers of kernels with their sizes. Therefore, it may be a huge challenge to design an appropriate CNN model that uses optimized hyper-parameters and reduces the reliance on manual involvement and domain expertise. In this paper, a design architecture method for CNNs is proposed by utilization of particle swarm optimization (PSO) algorithm to learn the optimal CNN hyper-parameters values. In the experiment, we used Modified National Institute of Standards and Technology (MNIST) database of handwritten digit recognition. The experiments showed that our proposed approach can find an architecture that is competitive to the state-of-the-art models with a testing error of 0.87%.
Supervised machine learning based liver disease prediction approach with LASS...journalBEEI
In this contemporary era, the uses of machine learning techniques are increasing rapidly in the field of medical science for detecting various diseases such as liver disease (LD). Around the globe, a large number of people die because of this deadly disease. By diagnosing the disease in a primary stage, early treatment can be helpful to cure the patient. In this research paper, a method is proposed to diagnose the LD using supervised machine learning classification algorithms, namely logistic regression, decision tree, random forest, AdaBoost, KNN, linear discriminant analysis, gradient boosting and support vector machine (SVM). We also deployed a least absolute shrinkage and selection operator (LASSO) feature selection technique on our taken dataset to suggest the most highly correlated attributes of LD. The predictions with 10 fold cross-validation (CV) made by the algorithms are tested in terms of accuracy, sensitivity, precision and f1-score values to forecast the disease. It is observed that the decision tree algorithm has the best performance score where accuracy, precision, sensitivity and f1-score values are 94.295%, 92%, 99% and 96% respectively with the inclusion of LASSO. Furthermore, a comparison with recent studies is shown to prove the significance of the proposed system.
A secure and energy saving protocol for wireless sensor networksjournalBEEI
The research domain for wireless sensor networks (WSN) has been extensively conducted due to innovative technologies and research directions that have come up addressing the usability of WSN under various schemes. This domain permits dependable tracking of a diversity of environments for both military and civil applications. The key management mechanism is a primary protocol for keeping the privacy and confidentiality of the data transmitted among different sensor nodes in WSNs. Since node's size is small; they are intrinsically limited by inadequate resources such as battery life-time and memory capacity. The proposed secure and energy saving protocol (SESP) for wireless sensor networks) has a significant impact on the overall network life-time and energy dissipation. To encrypt sent messsages, the SESP uses the public-key cryptography’s concept. It depends on sensor nodes' identities (IDs) to prevent the messages repeated; making security goals- authentication, confidentiality, integrity, availability, and freshness to be achieved. Finally, simulation results show that the proposed approach produced better energy consumption and network life-time compared to LEACH protocol; sensors are dead after 900 rounds in the proposed SESP protocol. While, in the low-energy adaptive clustering hierarchy (LEACH) scheme, the sensors are dead after 750 rounds.
Plant leaf identification system using convolutional neural networkjournalBEEI
This paper proposes a leaf identification system using convolutional neural network (CNN). This proposed system can identify five types of local Malaysia leaf which were acacia, papaya, cherry, mango and rambutan. By using CNN from deep learning, the network is trained from the database that acquired from leaf images captured by mobile phone for image classification. ResNet-50 was the architecture has been used for neural networks image classification and training the network for leaf identification. The recognition of photographs leaves requested several numbers of steps, starting with image pre-processing, feature extraction, plant identification, matching and testing, and finally extracting the results achieved in MATLAB. Testing sets of the system consists of 3 types of images which were white background, and noise added and random background images. Finally, interfaces for the leaf identification system have developed as the end software product using MATLAB app designer. As a result, the accuracy achieved for each training sets on five leaf classes are recorded above 98%, thus recognition process was successfully implemented.
Customized moodle-based learning management system for socially disadvantaged...journalBEEI
This study aims to develop Moodle-based LMS with customized learning content and modified user interface to facilitate pedagogical processes during covid-19 pandemic and investigate how teachers of socially disadvantaged schools perceived usability and technology acceptance. Co-design process was conducted with two activities: 1) need assessment phase using an online survey and interview session with the teachers and 2) the development phase of the LMS. The system was evaluated by 30 teachers from socially disadvantaged schools for relevance to their distance learning activities. We employed computer software usability questionnaire (CSUQ) to measure perceived usability and the technology acceptance model (TAM) with insertion of 3 original variables (i.e., perceived usefulness, perceived ease of use, and intention to use) and 5 external variables (i.e., attitude toward the system, perceived interaction, self-efficacy, user interface design, and course design). The average CSUQ rating exceeded 5.0 of 7 point-scale, indicated that teachers agreed that the information quality, interaction quality, and user interface quality were clear and easy to understand. TAM results concluded that the LMS design was judged to be usable, interactive, and well-developed. Teachers reported an effective user interface that allows effective teaching operations and lead to the system adoption in immediate time.
Understanding the role of individual learner in adaptive and personalized e-l...journalBEEI
Dynamic learning environment has emerged as a powerful platform in a modern e-learning system. The learning situation that constantly changing has forced the learning platform to adapt and personalize its learning resources for students. Evidence suggested that adaptation and personalization of e-learning systems (APLS) can be achieved by utilizing learner modeling, domain modeling, and instructional modeling. In the literature of APLS, questions have been raised about the role of individual characteristics that are relevant for adaptation. With several options, a new problem has been raised where the attributes of students in APLS often overlap and are not related between studies. Therefore, this study proposed a list of learner model attributes in dynamic learning to support adaptation and personalization. The study was conducted by exploring concepts from the literature selected based on the best criteria. Then, we described the results of important concepts in student modeling and provided definitions and examples of data values that researchers have used. Besides, we also discussed the implementation of the selected learner model in providing adaptation in dynamic learning.
Prototype mobile contactless transaction system in traditional markets to sup...journalBEEI
One way to prevent and reduce the spread of the covid-19 pandemic is through physical distancing program. This research aims to develop a prototype contactless transaction system using digital payment mechanisms and QR code technology that will be applied in traditional markets. The method used in the development of electronic market systems is a prototype approach. The application of QR code and digital payments are used as a solution to minimize money exchange contacts that are common in traditional markets. The results showed that the system built was able to accelerate and facilitate the buying and selling transaction process in traditional market environment. Alpha testing shows that all functional systems are running well. Meanwhile, beta testing shows that the user can very well accept the system that was built. The results of the study also show acceptance of the usefulness of the system being built, as well as the optimism of its users to be able to take advantage of this system both technologically and functionally, so its can be a part of the digital transformation of the traditional market to the electronic market and has become one of the solutions in reducing the spread of the current covid-19 pandemic.
Wireless HART stack using multiprocessor technique with laxity algorithmjournalBEEI
The use of a real-time operating system is required for the demarcation of industrial wireless sensor network (IWSN) stacks (RTOS). In the industrial world, a vast number of sensors are utilised to gather various types of data. The data gathered by the sensors cannot be prioritised ahead of time. Because all of the information is equally essential. As a result, a protocol stack is employed to guarantee that data is acquired and processed fairly. In IWSN, the protocol stack is implemented using RTOS. The data collected from IWSN sensor nodes is processed using non-preemptive scheduling and the protocol stack, and then sent in parallel to the IWSN's central controller. The real-time operating system (RTOS) is a process that occurs between hardware and software. Packets must be sent at a certain time. It's possible that some packets may collide during transmission. We're going to undertake this project to get around this collision. As a prototype, this project is divided into two parts. The first uses RTOS and the LPC2148 as a master node, while the second serves as a standard data collection node to which sensors are attached. Any controller may be used in the second part, depending on the situation. Wireless HART allows two nodes to communicate with each other.
Implementation of double-layer loaded on octagon microstrip yagi antennajournalBEEI
A double-layer loaded on the octagon microstrip yagi antenna (OMYA) at 5.8 GHz industrial, scientific and medical (ISM) Band is investigated in this paper. The double-layer consist of two double positive (DPS) substrates. The OMYA is overlaid with a double-layer configuration were simulated, fabricated and measured. A good agreement was observed between the computed and measured results of the gain for this antenna. According to comparison results, it shows that 2.5 dB improvement of the OMYA gain can be obtained by applying the double-layer on the top of the OMYA. Meanwhile, the bandwidth of the measured OMYA with the double-layer is 14.6%. It indicates that the double-layer can be used to increase the OMYA performance in term of gain and bandwidth.
The calculation of the field of an antenna located near the human headjournalBEEI
In this work, a numerical calculation was carried out in one of the universal programs for automatic electro-dynamic design. The calculation is aimed at obtaining numerical values for specific absorbed power (SAR). It is the SAR value that can be used to determine the effect of the antenna of a wireless device on biological objects; the dipole parameters will be selected for GSM1800. Investigation of the influence of distance to a cell phone on radiation shows that absorbed in the head of a person the effect of electromagnetic radiation on the brain decreases by three times this is a very important result the SAR value has decreased by almost three times it is acceptable results.
Exact secure outage probability performance of uplinkdownlink multiple access...journalBEEI
In this paper, we study uplink-downlink non-orthogonal multiple access (NOMA) systems by considering the secure performance at the physical layer. In the considered system model, the base station acts a relay to allow two users at the left side communicate with two users at the right side. By considering imperfect channel state information (CSI), the secure performance need be studied since an eavesdropper wants to overhear signals processed at the downlink. To provide secure performance metric, we derive exact expressions of secrecy outage probability (SOP) and and evaluating the impacts of main parameters on SOP metric. The important finding is that we can achieve the higher secrecy performance at high signal to noise ratio (SNR). Moreover, the numerical results demonstrate that the SOP tends to a constant at high SNR. Finally, our results show that the power allocation factors, target rates are main factors affecting to the secrecy performance of considered uplink-downlink NOMA systems.
Design of a dual-band antenna for energy harvesting applicationjournalBEEI
This report presents an investigation on how to improve the current dual-band antenna to enhance the better result of the antenna parameters for energy harvesting application. Besides that, to develop a new design and validate the antenna frequencies that will operate at 2.4 GHz and 5.4 GHz. At 5.4 GHz, more data can be transmitted compare to 2.4 GHz. However, 2.4 GHz has long distance of radiation, so it can be used when far away from the antenna module compare to 5 GHz that has short distance in radiation. The development of this project includes the scope of designing and testing of antenna using computer simulation technology (CST) 2018 software and vector network analyzer (VNA) equipment. In the process of designing, fundamental parameters of antenna are being measured and validated, in purpose to identify the better antenna performance.
Transforming data-centric eXtensible markup language into relational database...journalBEEI
eXtensible markup language (XML) appeared internationally as the format for data representation over the web. Yet, most organizations are still utilising relational databases as their database solutions. As such, it is crucial to provide seamless integration via effective transformation between these database infrastructures. In this paper, we propose XML-REG to bridge these two technologies based on node-based and path-based approaches. The node-based approach is good to annotate each positional node uniquely, while the path-based approach provides summarised path information to join the nodes. On top of that, a new range labelling is also proposed to annotate nodes uniquely by ensuring the structural relationships are maintained between nodes. If a new node is to be added to the document, re-labelling is not required as the new label will be assigned to the node via the new proposed labelling scheme. Experimental evaluations indicated that the performance of XML-REG exceeded XMap, XRecursive, XAncestor and Mini-XML concerning storing time, query retrieval time and scalability. This research produces a core framework for XML to relational databases (RDB) mapping, which could be adopted in various industries.
Key performance requirement of future next wireless networks (6G)journalBEEI
Given the massive potentials of 5G communication networks and their foreseeable evolution, what should there be in 6G that is not in 5G or its long-term evolution? 6G communication networks are estimated to integrate the terrestrial, aerial, and maritime communications into a forceful network which would be faster, more reliable, and can support a massive number of devices with ultra-low latency requirements. This article presents a complete overview of potential 6G communication networks. The major contribution of this study is to present a broad overview of key performance indicators (KPIs) of 6G networks that cover the latest manufacturing progress in the environment of the principal areas of research application, and challenges.
Noise resistance territorial intensity-based optical flow using inverse confi...journalBEEI
This paper presents the use of the inverse confidential technique on bilateral function with the territorial intensity-based optical flow to prove the effectiveness in noise resistance environment. In general, the image’s motion vector is coded by the technique called optical flow where the sequences of the image are used to determine the motion vector. But, the accuracy rate of the motion vector is reduced when the source of image sequences is interfered by noises. This work proved that the inverse confidential technique on bilateral function can increase the percentage of accuracy in the motion vector determination by the territorial intensity-based optical flow under the noisy environment. We performed the testing with several kinds of non-Gaussian noises at several patterns of standard image sequences by analyzing the result of the motion vector in a form of the error vector magnitude (EVM) and compared it with several noise resistance techniques in territorial intensity-based optical flow method.
Modeling climate phenomenon with software grids analysis and display system i...journalBEEI
This study aims to model climate change based on rainfall, air temperature, pressure, humidity and wind with grADS software and create a global warming module. This research uses 3D model, define, design, and develop. The results of the modeling of the five climate elements consist of the annual average temperature in Indonesia in 2009-2015 which is between 29oC to 30.1oC, the horizontal distribution of the annual average pressure in Indonesia in 2009-2018 is between 800 mBar to 1000 mBar, the horizontal distribution the average annual humidity in Indonesia in 2009 and 2011 ranged between 27-57, in 2012-2015, 2017 and 2018 it ranged between 30-60, during the East Monsoon, the wind circulation moved from northern Indonesia to the southern region Indonesia. During the west monsoon, the wind circulation moves from the southern part of Indonesia to the northern part of Indonesia. The global warming module for SMA/MA produced is feasible to use, this is in accordance with the value given by the validate of 69 which is in the appropriate category and the response of teachers and students through a 91% questionnaire.
An approach of re-organizing input dataset to enhance the quality of emotion ...journalBEEI
The purpose of this paper is to propose an approach of re-organizing input data to recognize emotion based on short signal segments and increase the quality of emotional recognition using physiological signals. MIT's long physiological signal set was divided into two new datasets, with shorter and overlapped segments. Three different classification methods (support vector machine, random forest, and multilayer perceptron) were implemented to identify eight emotional states based on statistical features of each segment in these two datasets. By re-organizing the input dataset, the quality of recognition results was enhanced. The random forest shows the best classification result among three implemented classification methods, with an accuracy of 97.72% for eight emotional states, on the overlapped dataset. This approach shows that, by re-organizing the input dataset, the high accuracy of recognition results can be achieved without the use of EEG and ECG signals.
Parking detection system using background subtraction and HSV color segmentationjournalBEEI
Manual system vehicle parking makes finding vacant parking lots difficult, so it has to check directly to the vacant space. If many people do parking, then the time needed for it is very much or requires many people to handle it. This research develops a real-time parking system to detect parking. The system is designed using the HSV color segmentation method in determining the background image. In addition, the detection process uses the background subtraction method. Applying these two methods requires image preprocessing using several methods such as grayscaling, blurring (low-pass filter). In addition, it is followed by a thresholding and filtering process to get the best image in the detection process. In the process, there is a determination of the ROI to determine the focus area of the object identified as empty parking. The parking detection process produces the best average accuracy of 95.76%. The minimum threshold value of 255 pixels is 0.4. This value is the best value from 33 test data in several criteria, such as the time of capture, composition and color of the vehicle, the shape of the shadow of the object’s environment, and the intensity of light. This parking detection system can be implemented in real-time to determine the position of an empty place.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
Business process monitoring system in supporting information technology governance
1. Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 5, October 2021, pp. 2884~2891
ISSN: 2302-9285, DOI: 10.11591/eei.v10i5.3147 2884
Journal homepage: http://beei.org
Business process monitoring system in supporting information
technology governance
Lanto Ningrayati Amali, Muhammad Rifai Katili, Sitti Suhada, Tri Alfandra Labuga
Department of Informatics Engineering, Universitas Negeri Gorontalo, Gorontalo, Indonesia
Article Info ABSTRACT
Article history:
Received Apr 11, 2021
Revised Jun 27, 2021
Accepted Jul 14, 2021
Information technology (IT) is essential in supporting an organization's
business sustainability and growth, making it critically dependent on IT.
Therefore, a focus on IT governance, consisting of leadership, organizational
structure, and process ensuring that IT organization supports and expands the
organizational strategies and goals is required. When the business supports the
strategic significance of IT investment, the implementation of an IT strategy
will lead to the adoption of an IT governance model. It will support and help
the description of the benefit roles and responsibilities from IT systems and
infrastructure. This paper aims to develop a business process monitoring
system to support IT governance in improving user service and measuring
organizational performance. The research method was the system
development method with the Waterfall model. To measure the performance
of the business process, the self-assessment method with performance matrix
tools was applied. The study resulted in a business process monitoring system
that can enhance the organization’s primary business process in services,
supporting the said organization’s performance.
Keywords:
Business process
IT governance
Monitoring system
Organizational performance
User service
This is an open access article under the CC BY-SA license.
Corresponding Author:
Muhammad Rifai Katili
Department of Informatics Engineering
Faculty of Engineering, Universitas Negeri Gorontalo
Prof. Dr. Ing. B. J. Habibie Street, Gorontalo, Indonesia
Email: mrifaikatili@ung.ac.id
1. INTRODUCTION
IT governance is a commitment to awareness in the process of organizational management control
of IT/IS resources, including software, hardware, brainware, databases, and communication networks. IT
Governance is defined as a pattern of authority/policy on IT activities (IT process) [1]. In that, the pattern is
to develop policies and management of IT Infrastructure, the use of IT by end-users efficiently, effectively,
and safely, as well as an effective IT project management process [2]. Several governments or private
organizations have started to implement IT governance to achieve a combination of business and IT [3], [4].
The use of IT is very comprehensive in every aspect of the organization's efforts to support the organization
[5], [6]. Therefore, the use of technology causes a critical reliance on IT, requiring a particular focus on IT
governance [7], [8].
In references [9]-[11] it is stated that IT governance affects the IT business's alignment, and both
affect the business value or organizational performance. The increase in demand for services and cost savings
for the community, business, and organization causes the need for IT governance. On the other hand, it
cannot be denied that IT increases the organization's business value, both in its main and supporting activities
[12]. IT is used as a strategic tool for organizations to increase competitive advantages in times of increasing
uncertainty, leading to higher dependence on the IT environment [13], [14]. Hence, the effective management
2. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Business process monitoring system in supporting information … (Lanto Ningrayati Amali)
2885
of IT and its alignment with business goals is crucial for organizational success. According to [15], [16] that
the success of implementing IT in an organization depends on the business processes used to manage the
technology.
The business process monitoring system is built based on the organization's need for the significance
of IT in supporting its business processes. There are many constraints on organizational performance, i.e.,
service to data users, measurement of employee performance, and planning of various improvements using
business process improvement tools. In references [17]-[19] business processes are defined as the art and
science of monitoring how work is done in an organization to ensure consistent results and take advantage of
improvement opportunities. According to [20], business processes can be understood as a set of integrated
organizational capabilities related to strategic alignment, governance, methods, technology, people, and
culture. The use of business processes has been instrumental to represent an organization's business and
activities [21]. The increasing service for users, the increasing importance of information technology for
process design, and the overall recognition that the process forms a critical organizational asset, have made
this business process system indispensable. The compelling business processes facilitate the monitoring
activity. This is possible because the processes or activities in an organization have clearly defined the owner
of the process, the process completion time, the required inputs, the outputs produced, and the procedural
references used in completing the process [17].
The use of the business process monitoring system in an organization is crucial to maintain and
widen the organization’s strategy and purpose. It is even more important considering the lack of system built
without being based on the organization’s need for the importance of analysis and design starting from the
main, supporting, and developing business processes. It has been stated by Rahimi et al. [22] that the
importance of the business process and the improvement of TI centrality concerning the organization's
performance requires a particular focus on the business process governance and IT governance in the
organization. This is also accompanied by the expansion of business processes that support IT in
organizations and considering the impact of business processes and IT on organizational success [23]-[25],
[15]. This paper proposes the development of a business process monitoring system to support IT governance
in improving user service and measuring organizational performance. It also presents that alignment between
business process systems and ITG is needed. The study considers the need for alignment by building a
business process monitoring system and IT governance to identify the organization's need for IT's importance
in supporting its business processes.
2. RESEARCH METHOD
This research employed the Waterfall system development method [26] with research stages, as
shown in Figure 1. The study was conducted at the office of statistics Indonesia (BPS) of Boalemo Regency.
The next stage involved a business process analysis, which was performed in some stages [17], [27],
[28]. Firstly, measure the performance of running business processes using modern performance
measurement. The modern performance measurements included quality, speed, reliability, flexibility, and
cost. Secondly, evaluate the performance through the self-assessment method using performance matrix
tools. These tools divided business processes into four quadrants of performance measurement from
unnecessary to necessary improvement. At this stage, the data were collected from a performance
measurement questionnaire that produced the index value of performance and interest. Thirdly, develop
plans, which served to provide a decision on whether or not to develop a business process.
Based on performance matrix tools, coordinates were set in each variable to determine the position
of the business process performance variable in the performance matrix tools. Performance index values
(NIK) of performance were the dots in the Y-axis, while performance index values (NIK) of importance were
the dots in the X-axis. After both NIK were obtained, the values were mapped in an importance-performance
matrix, as shown in Figure 2. The image shows the running business process that is divided into four
quadrants. In quadrant I, an unimportant process unnecessary to be developed is found; the performance is
also flawed. Quadrant II is a region that requires performance improvement because it is known that its
processes are essential, which are the monitoring process and staff performance. Quadrant III is a region that
has good performance, although unnecessary to be periodically developed. Finally, quadrant IV is a region
with good performance and high importance; thus, it must be maintained. Based on the data mapping results
and the analysis using performance matrix tools, the business process that is deemed as necessary to be
improved exists in quadrant II.
3. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2884 – 2891
2886
Figure 1. Research procedure
Figure 2. Performance matrix tools
The information system design relied on the Waterfall method that comprised communication,
planning, modeling, construction, and deployment.
a. Communication (project initiation and requirements gathering) by gathering all user needs in the design
of the system to be built;
b. Planning (estimating, scheduling, tracking) by establishing software work plan that included technical
tasks to be performed, the results to be made, and the work schedule for the construction of a monitoring
information system of business process;
c. Modeling (analysis and design). The process of translating the requirements specification into a design
that focused on the analysis and design of data structure, software architecture, interface design, and
database;
4. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Business process monitoring system in supporting information … (Lanto Ningrayati Amali)
2887
d. Construction (codes and tests). This stage included coding to translate modeling (analysis and design).
This stage was done by making coding using the PHP programming language and testing the
implementation system (TIS) using black box and white box;
e. Deployment (delivery, support, feedback). This stage functioned to maintain the developed system and
was carried out periodically. This stage also introduced the use of the system to the user.
3. RESULTS AND DISCUSSION
The development of technology helps computers to produce large amounts of data, so it needs to be
treated with great care to get its benefits [29]. The key to a business strategy to create a competitive
advantage is to understand the data and information that an organization generates in its business. Therefore,
information processing gradually becomes the basis for achieving a competitive advantage [30]. A business
process monitoring system is built to obtain information regarding budget requests, achievements, and
employee performance targets. This system is created to improve business processes in serving data users and
measuring performance based on the data obtained. İn this developed system, the IT's value must be in line
with the business focus value and measured in a transparent way that shows the impact and contribution of IT
investment in the value formation process of the organization.
In general, this system's development includes processes that indirectly generate value for the
organization but are required to support the main processes (dissemination of accurate data, data integrity,
and reliability for users). Figure 3 shows a level 0 diagram of all the input, process, and output flows of a
business process monitoring system.
Figure 3. Diagram of input, process, and output
Figure 4 and Figure 5 illustrate the implemented design of the business process monitoring system.
The system has a feature to create a budget request form, performance form, and employee performance targets
5. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2884 – 2891
2888
form. This system can also monitor the process of submitting the future and the used budget request forms and
indicators of achievement of employee performance assessments and targets. Furthermore, through this system,
the decision making officer (in Indonesian known as PPK) can verify the budget request form based on the
budget request before submitting it to the treasurer (the one who will make a receipt from the budget for the
disbursement process). In the process of evaluating employee achievement and performance targets, the system
can monitor the presentation of targets and the realization of employee achievements and performance.
Figure 4. Login page
Figure 5. Admin home page
In the system testing process, white box testing was carried out by testing one of the source codes in
making the request form. The selected file was the implementation of the transaction part of the supporting
business process monitoring information system. Figure 6 shows the Flow graph on the white box test of the
request data process file. Figure 6, is followed by a measurement of cyclomatic complexity which measures a
quantitative measure of the logic complexity of a program, as in Table 1. The results of this measurement can
determine whether a program is a simple or complex program based on the logic applied to the program.
Figure 6. Flow graph
Table 1. Cyclomatic complexity
V(G)=E-N+2
=6-5+2
=3
E=the number of arcs in the flow graph is 6
N=Number of vertices in flow graph 5
Table 2. Independent path flow graph notation
Basic Flow Independent Path
Path 1 1-2-5
Path 2 1-2-4-5
Path 3 1-3-4-5
6. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Business process monitoring system in supporting information … (Lanto Ningrayati Amali)
2889
Number 3 the results of the calculation of cyclomatic complexity, shows the number of independent
paths from the basis of path testing, which means that it shows the number of tests that must be run to ensure
that all statements in the program are executed at least once (all statements have been tested) as in Table 2.
According to the performance measurement results that used the self-assessment method to measure
the performance NIK and importance of NIK found on quadrant II, the lack of monitoring of the business
process and the inflexible template will decrease the performance of the business process. In this
measurement, questionnaires were distributed to 19 respondents who are the staff of Statistics Indonesia
(BPS) of Boalemo. Based on the questionnaires, the value of the performance measurement obtained in the
NIK performance is 3.3, and the value of NIK importance is 3.4. After this system was implemented and self-
assessment was carried out using performance matrix tools, the variables in the system were considered
important by respondents and were following what they had perceived. As a result, the level of satisfaction
was relatively higher. The variables included in this system must be maintained since all these variables
make the system superior in the organization.
To ascertain the quality of the software made on whether the system is as hoped system usability
scale (SUS) measurement was used. The software is deemed to have a good quality if it is above the score
>=70. The samples in this method are not many [31]. The questionnaire shows that out of the average score
of 19 respondents (the staff of BPS Boalemo), who underwent a recording process and filled the
questionnaire, 84 for the SUS were acquired. It is considered A-grade (80-90). The SUS score graphic of
score 84 is shown in Figure 7. The results show that the quality of the system is very good.
Figure 7. Graph of SUS score results
The system makes the monitoring of the organizational business process easier and more effective.
Moreover, this system can monitor and control the IT capability decisions to confirm the delivery of value to
key stakeholders in an organization. It is expected that the system can improve the performance of the
organizational business process.
4. CONCLUSION
Central to the advancement of and support towards the organizational business process are the roles
of IT. Close attention of organizational leaders to the roles of IT is proven by system development and
monitoring process to the IT field that belongs to the organization. This is because IT stores all data related to
the business process and the continuity of organizational activities.
ACKNOWLEDGEMENTS
The research for this paper was financially supported by research grants of Penelitian Dasar
Unggulan Perguruan Tinggi (PDUPT) given by the Directorate General of Higher Education, the Indonesian
Ministry of Education, Culture, Research, and Technology. We would like to thank LPPM, Universitas
Negeri Gorontalo.
7. ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 5, October 2021 : 2884 – 2891
2890
REFERENCES
[1] V. Sambamurthy and R. W. Zmud, “Arrangements for Information Technology Governance: A Theory of Multiple
Contingencies,” MIS Quarterly, vol. 23, no. 2, pp. 261-290, 1999, doi: 10.2307/249754.
[2] L. Mueller, M. Magee, P. Marounek, and A. Phillipson, “IBM IT Governance Approach Business Performance
through IT Execution, “IBM Corp, Redbooks. ibm. com/redbooks, 2008.
[3] S. De Haes and W. Van Grembergen, “IT Governance and Its Mechanisms,” Information Systems Control Journal,
vol. 1, pp. 1-7, 2004.
[4] N. A. Qassimi and L. Rusu, “IT Governance in a Public Organization in a Developing Country: A Case Study of a
Governmental Organization, “Procedia Computer Science, vol. 64, pp. 450-456, 2015, doi:
10.1016/j.procs.2015.08.541.
[5] P. H. Bermejo, A. O. Tonelli, and A. L. Zambalde, “Developing IT Governance in Brazilian Public Organizations”,
International Business Research, vol. 7, no. 3, pp. 101-114, 2014, doi: 10.5539/ibr.v7n3p101.
[6] C. Juiz., C. Guerrero, and I. Lera, “Implementing Good Governance Principles for the Public Sector in Information
Technology Governance Frameworks,” Open Journal of Accounting, vol. 3, no. 1, pp. 9-27, 2014, doi:
10.4236/ojacct.2014.31003.
[7] E. N. Nfuka, L. Rusu, P. Johannesson and B. Mutagahywa, "The State of IT Governance in Organizations from the
Public Sector in a Developing Country," 2009 42nd Hawaii International Conference on System Sciences, 2009,
pp. 1-12, doi: 10.1109/HICSS.2009.456.
[8] S. M. B. Barrera, K. Kim, H. Yoon, and J. Hwang, “IT Governance Effectiveness and Its Influence on Innovation
Product and Process, “Conference: Portland International Conference for Management of Engineering and
Technology at Hawaai, 2018, pp. 1-10, doi: 10.23919/PICMET.2018.8481752.
[9] A. Ghildyal and E. Chang, “IT Governance, IT/Business Alignment and Organization Performance for Public
Sectors,” Journal of Economics, Business and Management, vol. 5, no. 6, pp. 255-260, 2017, doi:
10.18178/JOEBM.2017.5.6.522.
[10] M. A. J. Sabegh and S. M. Motlagh, “The Role and Relevance of IT Governance and IT Capability in Business - IT
Alignment in Medium and Large Companies, “Business and Management Review, vol. 2, no. 6, pp. 16-23, 2012.
[11] A. Ullah and R. Lai, “A Systematic Review of Business and Information Technology Alignment, “ACM
Transactions on Management Information Systems, vol. 4, no. 1, pp. 1-30, 2018, doi: 10.1145/2445560.2445564.
[12] L. N. Amali, M. R. Katili, S. Suhada, and L. Hadjaratie, “The Measurement of Maturity Level of Information
Technology Service Based on COBIT 5 Framework,” Telkomnika, Telecommunication, Computing, Electronics
and Control, vol. 18, no. 1, pp. 133-139, 2020, doi: 10.12928/telkomnika.v18i1.10582.
[13] M. Sibanda and D. Ramrathan, “Influence of Information Technology n Organization Strategy, “Foundations of
Management, vol. 9, no. 1, pp. 191-202, 2017, doi: 10.1515/fman-2017-0015.
[14] A. Gunasekaran, N. Subramanian, and T. Papadopoulos, “Information Technology for Competitive Advantage
within Logistics and Supply Chains: A Review, “Transportation Research Part, vol 99, pp. 14-33, 2017, doi:
10.1016/j.tre.2016.12.008.
[15] J. Montilva, J. Barrios, I. Besembel, and W. Montilva, “A Business Process Model for IT Management Based on
Enterprise Architecture,” CLEI Electronic Journal, vol. 17, no 2, 2014, doi: 10.19153/cleiej.17.2.3.
[16] D. Lipaj and V. Davidavičienė, “Influence of Information Systems on Business Performance, “Mokslas–Lietuvos
Ateitis Science–Future of Lithuania, vol. 5, no. 1, pp. 38-45, 2013, doi: 10.3846/mla.2013.06.
[17] M. Dumas, M. La Rosa, J. Mendling, and H. A. Reijers, “Introduction to Business Process Management,
“Fundamentals of Business Process Management, Springer-Verlag Berlin Heidelberg, pp. 1-31, 2013, doi:
10.1007/978-3-642-33143-5_1.
[18] W. Luo and Y. A. Tung, “A Framework for Selecting Business Process Modeling Methods, “Industrial
Management & Data Systems, vol. 99, no. 7, 312-319, 1999, doi: 10.1108/02635579910262535.
[19] M. Fischer, F. IMgrund, C. Janiesch, and A. Winkelmann, “Strategy Archetypes for Digital Transformation:
Defining Meta Objectives Using Business Process Management, “Information & Management, vol. 57, pp. 1-13,
2020, doi: 10.1016/j.im.2019.103262.
[20] J. Vom Brocke and M. Rosemann, “Business Process Management, in Wiley Encyclopedia of Management,”
Management Information Systems, vol. 7, pp. 1-16, 2014, doi: 10.1002/9781118785317.weom070213.
[21] T. C. Redman, “The impact of Poor Data Quality on the Typical Enterprise,” Communications of the ACM, vol. 41,
no.2, pp. 79-82, 1998, doi: 10.1145/269012.269025.
[22] F. Rahimi, C. Moller, and L. Hvam, “Alignment Between Business Process Governance and IT Governance,” In
20th Americas Conference on Information Systems, AMCIS 2014 Association for Information Systems, pp. 1-12,
2014.
[23] A. Tiwana and B. Konsynski, “Complementarities Between Organizational IT Architecture and Governance
Structure,” Information Systems Research, vol. 21, no. 2, pp. 288-304, 2010, doi: 10.1287/isre.1080.0206.
[24] H. M. Alzoubi and N. A. Khafajy, “The Impact of Business Process Management on Business Performance
Superiority,” 4International Journal of Business and Management Review, vol. 3, no. 2, pp. 17-34, 2015.
[25] T. Ahmad and A. V. Looy, “Business Process Management and Digital Innovations: A Systematic Literature
Review,” Sustainability, vol. 12, no. 6827, pp. 2-29, 2020, doi: 10.3390/su12176827.
[26] R. S. Pressman and B. R. Maxim, “Software Engineering: A Practitioner's Approach,” Boston: McGraw Hill
Education, 2015.
8. Bulletin of Electr Eng & Inf ISSN: 2302-9285
Business process monitoring system in supporting information … (Lanto Ningrayati Amali)
2891
[27] D. P. O. Godeiro, M. L. R. Dantas, M. D. S. Celestino, and D. C. Silva, “Application of Importance and
Performance Matrix to Assess The Quality of Services Provided by Business Incubators,” Iberoamerican Journal
of Entrepreneurship and Small Business, vol. 7, no. 3, pp. 1-34, 2018, doi: 10.14211/regepe.v7i3.704.
[28] I. Sever, “Importance-Performance Analysis: A Valid Management Tool?,“ Tourism Management, vol. 48, pp. 43-
53, 2015, doi: 10.1016/j.tourman.2014.10.022Get.
[29] A. Srinivasulu and A. Pushpa, “Disease Prediction in Big Data Healthcare Using Extended Convolutional Neural
Network Techniques, “International Journal of Advances in Applied Sciences (IJAAS), vol. 9, no. 2, pp. 85-92,
2020, doi: 10.11591/ijaas.v9.i2.pp85-92.
[30] C. A. R. Assad, “Using Business Intelligence Solutions for Forecasting in Marketing Researches,” International
Journal of Informatics and Communication Technology (IJ-ICT), vol. 8, no. 2, pp. 102-110, 2019, doi:
10.11591/ijict.v8i2.pp102-110.
[31] J. R. Lewis, B. S. Utesch, and D. E. Maher, “Measuring Perceived Usability: The SUS, UMUX-LITE, and Alt
Usability,” International Journal of Human-Computer Interaction, vol. 31, no. 8, pp. 496-505, 2015, doi:
10.1080/10447318.2015.1064654.
BIOGRAPHIES OF AUTHORS
Lanto Ningrayati Amali received her Doctoral Degree in Information Technology from the
Universiti Utara Malaysia in 2015. Her research interest includes IT Governance, System
Planning, and Management Information System. She has published and presented her research
both nationally and internationally in the field of IT Governance. She is currently a lecturer in
the Faculty of Engineering at the Department of Informatics Engineering, Universitas Negeri
Gorontalo in Indonesia
Muhammad Rifai Katili received his Doctoral Degree in Information Technology from the
Universiti Utara Malaysia in 2018. He is a faculty member at the Informatics Engineering
Department, Faculty of Engineering, Universitas Negeri Gorontalo in Indonesia. His research
interest includes Knowledge Management, Information System, and IT Governance.
Sitti Suhada, holds a Master in Informatics Engineering from Universitas Hasanuddin,
Indonesia. Her research interests are in the areas of Management Information Systems,
Databases, and Data Mining. She is a faculty member at the Department of Informatics
Engineering, Faculty of Engineering, Universitas Negeri Gorontalo, Indonesia.
Tri Alfandra Labuga is a student in the Faculty of Engineering at the Department of
Informatics Engineering, Study Program of Information System, Universitas Negeri Gorontalo
in Indonesia. Currently, he has completed his study program.