SCHEDULE ICITSI 2024


Thursday, December 12 2024
No Name Participant Paper Title Room Session Presentation Time
Room 1
1 Aditya Pradana Enhancing IoT Security: A Comprehensive Review of Lightweight Security Mechanisms for IoT 1 1 13.00-13.40
2 Ati Suci Dian Martha Examining Usability and Student Experience of ChatGPT as a Learning Tool on Moodle in Higher Education 1 1 13.00-13.40
3 sonny hendra sudaryana Strategic Policy for Enhancing the Success Rate of Digital Startups in Indonesia 1 1 13.00-13.40
4 Octavia, Win Ce Smart Wearable and Application for Health Monitoring Purposes Utilizing Arduino Sensors 1 2 13.40-14.20
5 Imam Syafganti Examining the orientation of sustainability communication on official tourism websites by using an automated checklist 1 2 13.40-14.20
6 M.Fajri Davyza Chaniago What Non-User-Generated Content Drives Instagram Influencer Fame?: A Data-Driven Perspective 1 2 13.40-14.20
7 Muhammad Dzifii Hasibuan Analyzing the Impact of Cybersecurity Policies on Individual's Behavior Through the Lens of Regulatory Focus Theory 1 3 14.20-15.00
8 Generosa Lukhayu Pritalia An Empirical Study on Internet Gaming Disorder (IGD) Among Indonesian Esports Players 1 3 14.20-15.00
9 Glory Cornelia Patining Kurik Sign Language System For The Deaf Using Mediapipe Based On The Long-Short Term Memory Method 1 3 14.20-15.00
10 Jennifer Patricia and Ghinaa Zain Nabiilah Mental Disorder Indication Detection With Transformer Model Architecture 1 4 15.00-15.40
Room 2
1 Abdullah Billman The Influence of Social Adaptability Skills and Social Environment on Students Towards AIEd and the Learning Environment Both Directly and Indirectly 2 1 13.00-13.40
2 Ahmad Julian Rifqi Comparison of Convolutional Neural Network and MobileNetV2 for Potato Leaf Disease Detection 2 1 13.00-13.40
3 Alfonsius Berly Data Quality Metrics for State Civil Apparatus: A Disparity Perspective 2 1 13.00-13.40
4 Aliya Fakhira Zahra Factors Influencing Student Compliance With University Information Security Policies in Indonesia Using the Unified Model Information Security Policy Compliance (UM-ISPC) 2 2 13.40-14.20
5 Andri Wijaya A Novel Cyber Threat Intelligence (CTI) Framework for Detecting Android Malware: Work on Progress 2 2 13.40-14.20
6 Andria Arisal HPC in Containers - A Containerized Parallel Environment for Parallel Programming Learning Using Docker 2 2 13.40-14.20
7 Arif Rahman Hakim A Comparative Analysis of Cross-Classifiers with Resampled Datasets for Exfiltration Attacks 2 3 14.20-15.00
8 Asep Deffy Ciftady Cross-Domain Ontology Keyword Detection for Paper Recommendation 2 3 14.20-15.00
9 Audi Shafa Rani Online Security Behavior Among Students : Factors Influencing Intention to Adopt Two-Factor Authentication (2FA) With Protection Motivation Theory 2 3 14.20-15.00
10 Bilal Hidayaturrohman Exploring CNN-BiLSTM in Forecasting Tourist Arrivals 2 4 15.00-15.40
11 Btari Salwa Larasati Train Arrival Delay Prediction by Capturing Spatial and Temporal Features of Train Data Sensor 2 4 15.00-15.40
12 Calista Esperanza, Dede Nursofa Amatuloh, Iston Dwija Utama, Kevin Nathaniel and Ivan Diryana Sudirman How Affiliate Marketing Impacts Buying Behavior in E-Commerce 2 4 15.00-15.40
13 Devi Pratami An Evaluation of Lean Six Sigma Readiness in IT Department of Higher Education Institution 2 5 15.40-16.20
14 Drajat Cahya Diningrat Systematic Literature Review of Multi-Cloud Aspects 2 5 15.40-16.20
15 Julnila Husna Lubis Classification of Spine X-ray Image using Neural Networks Models based on Haar Wavelet Features 2 5 15.40-16.20
Room 3
1 Elin Cahyaningsih Leveraging Value Proposition Canvas for Civil Service Analytics Dashboard 3 1 13.00-13.40
2 Fahnun Nisa Tax Digitalization and Transparency: The Role of Core Tax Administration System (CTAS) In Indonesia’s Tax Reform 3 1 13.00-13.40
3 Fairuz Athallah Bachri Development of a Fuzzy Logic and IoT-Based Automated Irrigation System for Water Spinach Cultivation 3 1 13.00-13.40
4 Faqih Hamami Enhancing Mangrove Mapping in Malang Regency Through K-Means Clustering 3 2 13.40-14.20
5 Farah Ahmed Exploring the Integration of Virtual Assistant Using Large Language Models in Learning Management System: Enhancing Educational Accessibility and Efficiency 3 2 13.40-14.20
6 Fathimah Azzahra Near Real-Time Train Location Prediction Using LSTM Neural Network With Attention Mechanism 3 2 13.40-14.20
7 Gagatsatya Adiatmaja Comparative Analysis of LSTM and GRU Models for Indonesian Stock Price Prediction with Integrated Technical and Fundamental Indicators 3 3 14.20-15.00
8 Ginus Pandhu Setyawan Designing a Habit Forming Mobile Application for Disaster Preparedness Using the Hooked Model 3 3 14.20-15.00
9 Hamidah Maulida Khasanah Machine Learning Classification of FNA-Derived Cell Nuclei Features for Breast Cancer Prediction 3 3 14.20-15.00
10 Hendra Kurniawan A Comparative Performance Analysis of SVM Kernels in Automated Breast Cancer Diagnosis 3 4 15.00-15.40
11 Hero Yudo Martono; Andhik Ampuh Yunanto; Dian Septiani Santoso Satu Sehat Interoperability Agent 3 4 15.00-15.40
12 Imsagi Hendi Setiawan Sentiment Analysis of Tokopedia Application Reviews on Google Play Store Using BERT 3 4 15.00-15.40
13 Jessica An Ensemble Approach Combining LSTM and Random Forest for Forecasting Product Stock Expenditure in Retail 3 5 15.40-16.20
14 Jos Timanta Tarigan Hybrid Approach for Procedural Level Generation for 2D Platformer Game' 3 5 15.40-16.20
15 Ismail Setiawaan Systematic Analysis of Student Academic Performance Prediction: Prediction Model, Optimization, Data Augmentation, and Educational Policy Implications 3 5 15.40-16.20
Room 4
1 Kamilatu Qurrotu'aini Hanifah The Importances of Teachers' Digital Competence in Digital Learning Process: A Systematic Review 4 1 13.00-13.40
2 Kartika Purwandari A Web-Based Application Development for Efficient Warehouse Management 4 1 13.00-13.40
3 Kurnia Prayogi The Role of Digital Marketing in Driving Growth and Competitiveness of SMEs in the Digital Transformation Era: Systematic Literature Review 4 1 13.00-13.40
4 Laura Tsanaullailla Enhancing Road Maintenance Efficiency through Comparative Evaluation of Pothole Detection Models 4 2 13.40-14.20
5 Luthfia Cucu Aminah Geometric Features for Vowel Recognition in Lipreading 4 2 13.40-14.20
6 M.Alif Gibran A Bossa TCP Westwood Simulation and Analysis on Wireless Sensor Network for Building Structure Condition Monitoring Topology 4 2 13.40-14.20
7 Minwir Al-Shammari A Proposed Knowledge-enabled Production Value Chain Model (1571077636) 4 3 14.20-15.00
8 Mochammad Farrell Designing a Cloud Architecture for SLA Requirements in Bulk Payment Case Queries Comparative analysis 4 3 14.20-15.00
9 Muhamad Alfarisy Designing a Service-Oriented Platform on Digital Campus Using SCSE Framework 4 3 14.20-15.00
10 Muhammad Banin Basit Comparative Feature Extraction in KNN-Based Pneumonia Detection: PCA, HOG, SIFT, and LBP Analysis 4 4 15.00-15.40
11 Muhammad Farhan Cattle Anomaly Behavior Detection System Based on IoT and Computer Vision in Precision Livestock Farming 4 4 15.00-15.40
12 Muhammad Giat Convolutional Neural Network In Human Eye Disease Classification 4 4 15.00-15.40
13 Muhammad Tohir Rafly Multi User Centered Design (MUCD) in UI/UX Mobile Development for Kampung Batik Laweyan 4 5 15.40-16.20
14 Nurul Fitri Aliyah Analysis Track Condition Trends Through Sensor Data and Clustering Techniques 4 5 15.40-16.20
15 Raditya Aditama One-Shot Verification for Paper Certificates in Public Service System 4 5 15.40-16.20
Room 5
1 RAHMA SAHWAHITA Factors Influencing Gen Z Awareness of Computer Security Using Protection Motivation Theory (PMT) 5 1 13.00-13.40
2 Rana Zaini Fathiyana BLOCKCHAIN INTEROPERABILITY IN SECURE E-GOVERNANCE: A Systematic Literature Review 5 1 13.00-13.40
3 Raymond Sutjiadi Generating High-Quality Synthetic Mammogram Images Using Denoising Diffusion Probabilistic Models: A Novel Approach for Augmenting Deep Learning Datasets 5 1 13.00-13.40
4 Renny Sari Dewi Machine Learning Implementation in Use Case Points Method: A 30-Year Perspective 5 2 13.40-14.20
5 Restu Alsyafiq Selian Comparative Analysis of Architectures for Classifying Malicious and Benign TLS Traffic 5 2 13.40-14.20
6 Ricky Alamsyah Integrated Framework for IT Asset Physical Security: A Risk Management Approach Using NIST and ISO Standards 5 2 13.40-14.20
7 Ridha Radhitya Usability Analysis of Digital Signature Application Based on ISO 9241-11 Using Retrospective Think Aloud and User Experience Questionnaire 5 3 14.20-15.00
8 Ririn Ikana Desanti Efficiency Comparison of Employee Management Automation Using Selenium and Playwright: a Case Study of Technology Consulting Company 5 3 14.20-15.00
9 Rizaldi Pratama The Evaluations of Cross-Cultural User Experience for Indonesian E-Marketplace: Facilitating MSME (Micro, Small, and Medium Enterprises) Export to MERCOSUR 5 3 14.20-15.00
10 Rizky Dwiputra Restavie Bujung IT Governance & Management for Smart City: Aligning COBIT 2019 with SPBE Policies for Traditional Market Digitalization Initiatives 5 4 15.00-15.40
11 Ryan Pratama Salazar Analysis of the Influence of AI Generated Art on Job Opportunities, Copyright Ownership and Creative Process of Illustrators 5 4 15.00-15.40
12 Saadeh Z. Sweidan Accessibility to Public Buildings for Wheelchair Users: An Innovative Android Application 5 4 15.00-15.40
13 Saadeh Z. Sweidan Children with Aphasia (Inability to Speak Well) An Android Application for Voice Augmentation and Alternative Communication 5 5 15.40-16.20
14 Riyanthi Angrainy Sianturi Reengineering of Markopi Mobile Application 5 5 15.40-16.20
Room 6
1 Sevito Fernanda Pambudi Lip Movement Recognition Based on Keypoint Vector using Deep Learning 6 1 13.00-13.40
2 Shofa Wardatul Jannah Visual Aspect-Based Sentiment Analysis for Tourist Reviews using Deep Learning Method 6 1 13.00-13.40
3 Steven Andrew Halim Understanding Fun in Cooking: Preliminary Study of Serious Games on Cooking Domain 6 1 13.00-13.40
4 Sumirah Internet Service Assessment in Lombok Barat Regency 6 2 13.40-14.20
5 Surya Michrandi Nasution DeteClass: A Car Classification for Parking System Management 6 2 13.40-14.20
6 Taufan Zandy Andrian Invisible Watermark Embedding and Retrieval for Facial Image Copyright Protection and Forensics 6 2 13.40-14.20
7 Tiara Shyifa Rachmayanti Understanding What Motivates Students to Use Digital Platforms for Cybersecurity Learning and Awareness: A Conceptual Model 6 3 14.20-15.00
8 Timothy John Pattiasina Pioneering a New Era in Mental Health Treatment: A Framework for Virtual Reality Serious Game Design 6 3 14.20-15.00
9 Yovita Tunardi Web-Based Application for GUI Programming Learning Through Reverse Engineering Method 6 3 14.20-15.00
10 Yunus Dwi Santoso Modification of YOLOv9 With Bi-Level Routing Attention for Student Behavior Monitoring in Crowded Classrooms 6 4 15.00-15.40
11 Yvesta Haliandra Analysis of Online Shoppers' Perceptions of Electronic Transaction Security Through Two-Factor Authentication (2FA) With the Security Belief Model Approach 6 4 15.00-15.40
12 Zhivora Amelia Haq The Role of Electronic Word-of-Mouth in Heritage Tourism: A Systematic Review 6 4 15.00-15.40
13 Ahmad Syamil Reimagining E-Learning Systems: Aligning Factors Influencing Student Expectations 6 5 15.40-16.20
14 Siwi Piranti Rahayu A Systematic Review of Gamification and Their Impact on E-Commerce Applications 6 5 15.40-16.20

Oral Presentation Rules
Presentation Rules for Offline Session
  1. Participants are required to fill out the attendance form provided.
  2. Author participants are expected to attend the presentation session from start to finish and present their papers in the arranged order.
  3. Each paper must be represented by at least one of its authors.
  4. Authors are required to present their papers live in person during the session.
  5. Participants can ask questions to the presenter directly during the Q&A session, after being invited by the moderator.
  6. This parallel session will be documented through photographs taken by the co-moderator.
Presentation Rules for Online Session
  1. Participants are required to fill out the attendance form provided at the beginning of the session.
  2. Author participants are expected to attend the presentation session from start to finish and present their papers according to the arranged order.
  3. Each paper must be presented by at least one of its authors.
  4. Authors are expected to present their papers live during the session. However, in case of network issues or other technical difficulties, the ICITSI committee will assist by playing the pre-recorded video submitted by the authors.
  5. Participants can ask questions during the Q&A session, either by using the "Raise Hand" feature in Zoom or by typing their questions in the Zoom chat box.
  6. For documentation purposes, this session will be recorded, and we will take a group photo at the end of the session.

Date : Thursday, December 12 2024

Time Agenda
08.00-08.30 Registration
08.30-08.40 Opening by MC
08.40-08.50 Singing of the Indonesian National Anthem "Indonesia Raya"
08.50-09.00 Report by Committee Chair
09.00-09.15 Welcome speech by the Dean of STEI ITB
09.15-09.30 Welcome speech by the Dean of FMIPA Unpad
09.30-09.45 Break
09.45-10.05 Speaker 1: Prof. Suhardi
10.05-10.25 Speaker 2: Prof. Sinta
10.25-10.45 Speaker 3: Prof. Choy
10.45-11.05 Speaker 4: Prof. Kangbin Yim
11.05-12.00 Q&A Session
12.00-13.00 Lunch & Prayer Break (Ishoma)
13.00-15.40 Parallel Sessions 1-4
15.40-16.00 Break
16.00-17.20 Parallel Sessions 4-6 and Closing