A Novel Algorithm for Monitoring Field Data Collection Officers of Indonesia's Central Statistics Agency (BPS) Using Web-Based Digital Technology

Halifia Hendri, - Masriadi, - Mardison

Abstract


This study focuses on the creation of a novel algorithm for monitoring field data collection activities by field data collection officers from Indonesia's Central Statistics Agency (BPS) using web-based digital technology. This study aims to check the accuracy and veracity of data collected by the BPS data collection officer. In this research, 200 respondents were collected by 10 data collection officers of Indonesia's Central Statistics Agency (BPS) and monitored by 5 supervisors’ officers from BPS. Then the Head of BPS supervises process monitoring at a certain regional BPS office. We propose a novel algorithm that can be used with web-based digital technologies. The algorithm is developed by comparing data from the BPS office in the form of three variables that are a list of names of respondents, a list of questioners for respondents, and the location (area) of respondents with data from the respondent's NIK (ID Number), answers to respondents' questions entered into the system, and the GPS location of field data collection officers detected by the web-based system. This research employed a novel algorithm on web-based digital technology, increasing the accuracy and veracity of collected data. The score value of the respondent's name variable is 92 percent, the respondent's answer to the questionnaire variable is 93 percent, and the respondent's location variable is 95 percent. The data was evaluated by all field data collection officers, supervisory officers, and the BPS head.

Keywords


Web-based; digital technology; monitoring; field data collection; central statistics agency (BPS)

Full Text:

PDF

References


D. Liu, J. Wang, Q. Shan, D. Smyl, J. Deng, and J. Du, “DeepEIT: Deep Image Prior Enabled Electrical Impedance Tomography,†IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1–12, 2023, doi: 10.1109/tpami.2023.3240565.

R. Sabir, D. Rosato, S. Hartmann, dan C. Gühmann, “Signal Generation using 1d Deep Convolutional Generative Adversarial Networks for Fault Diagnosis of Electrical Machines,†2020 25th Int. Conf. Pattern Recognit., 2021, doi: 10.1109/ICPR48806.2021.9413119.

C. Dimas, V. Alimisis, and P. P. Sotiriadis, “Electrical Impedance Tomography using a Weighted Bound-Optimization Block Sparse Bayesian Learning Approach,†2022 IEEE 22nd International Conference on Bioinformatics and Bioengineering (BIBE), Nov. 2022, doi: 10.1109/bibe55377.2022.00058.

K. Axiotis, A. Madry, and A. Vladu, “Faster Sparse Minimum Cost Flow by Electrical Flow Localization,†2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), Feb. 2022, doi: 10.1109/focs52979.2021.00059.

W. Wang, “Research on Design and Innovation based on network platform and Digital Technology,†2020 International Conference on Innovation Design and Digital Technology (ICIDDT), Dec. 2020, doi: 10.1109/iciddt52279.2020.00080.

Z. Yanhua and L. Jiaogang, “Research on the Expression of Photography Language under Digital Technology,†2020 5th International Conference on Electromechanical Control Technology and Transportation (ICECTT), May 2020, doi: 10.1109/icectt50890.2020.00058.

G. Wang, A. Dong, and J. Pan, “Research on Multi-Source Correlation Technology and Economic Analysis Technology Based on New Digital Technology,†2021 5th Annual International Conference on Data Science and Business Analytics (ICDSBA), Sep. 2021, doi: 10.1109/icdsba53075.2021.00027.

M. Lakic, B. Z. Nega, and W. Kim, “Web-QuateXelero: Web-based efficient network motif detection tool,†2020 IEEE International Conference on Bioinformatics and Biomedicine (BIBM), Dec. 2020, doi: 10.1109/bibm49941.2020.9313124.

H. Li, X. Zhao, and Q. Ren, “Development of WEB-based Automatic Detection Tool for Web Attack Traceability,†2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE), Sep. 2022, doi: 10.1109/iccsie56462.2022.00011.

J. A. Orioque, J. Cabardo, and H. D. Selpa, “Web-based Scoring System,†2021 Second International Conference on Innovative Technology Convergence (CITC), Dec. 2021, doi: 10.1109/citc54365.2021.00014.

W. A. Teniwut, C. L. Hasyim, and D. Arifin, “A Web-based DSS: Information System for Sustainable Fisheries Supply Chain in Coastal Communities of Small Islands Indonesia,†International Journal on Advanced Science, Engineering and Information Technology, vol. 11, no. 3, p. 1186, Jun. 2021, doi: 10.18517/ijaseit.11.3.12462.

Z. Abu Bakar and O. S. Seong, “The Development of Web-Based Emotion Detection System Using Keyboard Actions (EDS-KA),†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 1, p. 47, Feb. 2020, doi: 10.18517/ijaseit.10.1.10170.

M. N. Mahdi, A. R. Ahmad, and R. Ismail, “Improving Faceted Search Results for Web-based Information Exploration,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 3, p. 1143, Jun. 2020, doi: 10.18517/ijaseit.10.3.9959.

M. C. Nguyen and K. T. Tran, “Applying Simplex Algorithm for Ship’s Motion Simulation Optimization by Using Maneuvering Tests Data,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 2, p. 491, Mar. 2020, doi: 10.18517/ijaseit.10.2.11252.

G. B. Satrya and F. Kurniawan, “A Novel Android Memory Forensics for Discovering Remnant Data,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 3, p. 1008, Jun. 2020, doi: 10.18517/ijaseit.10.3.9363.

V. Kralev and R. Kraleva, “Methods for Software Visualization of Large Graph Data Structures,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 1, p. 1, Feb. 2020, doi: 10.18517/ijaseit.10.1.10739.

O. B. Shukur, S. H. Ali, and L. A. Saber, “Climatic Temperature Data Forecasting in Nineveh Governorate Using the Recurrent Neutral Network Method,†International Journal on Advanced Science, Engineering and Information Technology, vol. 11, no. 1, p. 113, Feb. 2021, doi: 10.18517/ijaseit.11.1.14083.

H. Du, J. Liu, X. Luo, and Y. Zhang, “Extraction Method of Secret Message Based on Optimal Hypothesis Test,†IEEE Transactions on Dependable and Secure Computing, pp. 1–13, 2023, doi: 10.1109/tdsc.2023.3243907.

D. Coquenet, C. Chatelain, and T. Paquet, “DAN: a Segmentation-free Document Attention Network for Handwritten Document Recognition,†IEEE Transactions on Pattern Analysis and Machine Intelligence, pp. 1–17, 2023, doi: 10.1109/tpami.2023.3235826.

B. Chen, W. Lu, J. Huang, J. Weng, and Y. Zhou, “Secret sharing based reversible data hiding in encrypted images with multiple data-hiders,†IEEE Transactions on Dependable and Secure Computing, pp. 1–1, 2020, doi: 10.1109/tdsc.2020.3011923.

B. Lefèvre et al., “Evaluation of a web-based self-reporting method for monitoring international passengers returning from an area of emerging infection,†Infectious Diseases Now, vol. 51, no. 2, pp. 140–145, Mar. 2021, doi: 10.1016/j.medmal.2020.06.002.

S. Dumke et al., “Next generation web based live data monitoring for W7-X,†Fusion Engineering and Design, vol. 129, pp. 16–23, Apr. 2018, doi: 10.1016/j.fusengdes.2018.02.022.

L. Davia, G. L. Callan, K. Speirs, dan L. M. Ridgley, “Finding the problem : How students approach problem identi fi cation,†Think. Ski. Creat., vol. 35, no. February, 2020, doi: 10.1016/j.tsc.2020.100635.

Adelia WS, Sinaga B, Nasution H. Analysis of Mathematical Problem Solving Ability of Students Viewed from Creative Thinking Stages in Problem-Based Learning Model. International Journal of Multicultural and Multireligious Understanding. 2020 Nov 11;7(10):496-502.

J. R. Sanders, A. Arce-Trigatti, and P. E. Arce, “Promoting student problem-identification skills via a Jeopardy-inspired game within the Renaissance Foundry,†Education for Chemical Engineers, vol. 30, pp. 49–59, Jan. 2020, doi: 10.1016/j.ece.2019.10.001.

L. D. Rubenstein, G. L. Callan, K. Speirs Neumeister, L. M. Ridgley, and M. Hernández Finch, “How problem identification strategies influence creativity outcomes,†Contemporary Educational Psychology, vol. 60, p. 101840, Jan. 2020, doi: 10.1016/j.cedpsych.2020.101840.

A. Tandon, A. Dhir, A. K. M. N. Islam, and M. Mäntymäki, “Blockchain in healthcare: A systematic literature review, synthesizing framework and future research agenda,†Computers in Industry, vol. 122, p. 103290, Nov. 2020, doi: 10.1016/j.compind.2020.103290.

J. Scheuner and P. Leitner, “Function-as-a-Service performance evaluation: A multivocal literature review,†Journal of Systems and Software, vol. 170, p. 110708, Dec. 2020, doi: 10.1016/j.jss.2020.110708.

H. Snyder, “Literature review as a research methodology: An overview and guidelines,†Journal of Business Research, vol. 104, pp. 333–339, Nov. 2019, doi: 10.1016/j.jbusres.2019.07.039.

R. Toorajipour, V. Sohrabpour, A. Nazarpour, P. Oghazi, and M. Fischl, “Artificial intelligence in supply chain management: A systematic literature review,†Journal of Business Research, vol. 122, pp. 502–517, Jan. 2021, doi: 10.1016/j.jbusres.2020.09.009.

F. Martinez, F. Martínez, and E. Jacinto, “Performance Evaluation of the NASNet Convolutional Network in the Automatic Identification of COVID-19,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 2, p. 662, Apr. 2020, doi: 10.18517/ijaseit.10.2.11446.

E. Stephen and E. Mit, “Evaluation of Software Requirement Specification Based on IEEE 830 Quality Properties,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 4, p. 1396, Aug. 2020, doi: 10.18517/ijaseit.10.4.10186.

M. Hanafiah, R. Abdullah, M. A. Azmi Murad, and J. Din, “The Development and Evaluation of Experience-Based Factory Model for Software Development Process,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 3, p. 1016, Jun. 2020, doi: 10.18517/ijaseit.10.3.10181.

N. Zainuddin, R. C. Mohd Yusuff, and G. N. Samy, “Risk Evaluation Using Nominal Group Technique for Cloud Computing Risk Assessment in Healthcare,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 1, p. 106, Feb. 2020, doi: 10.18517/ijaseit.10.1.10169.

K. Anam and A. Al-Jumaily, “Performance Evaluation of SRELM on Bio-signal Pattern Recognition Using Two Electromyography Channels,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 5, p. 1828, Oct. 2020, doi: 10.18517/ijaseit.10.5.7131.

Yulaikhah, S. Pramumijoyo, and N. Widjajanti, “Lineament Trend Analysis for Designing of Fault Deformation Monitoring Network in the Sermo Reservoir Area, Yogyakarta, Indonesia,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 4, p. 1584, Aug. 2020, doi: 10.18517/ijaseit.10.4.5806.

A. Budi Cahyono, A. C. Wibisono, D. Saptarini, R. I. Permadi, Y. Budisusanto, and H. Hidayat, “Underwater Photogrammetry Application for Coral Reef Mapping and Monitoring,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 1, p. 293, Feb. 2020, doi: 10.18517/ijaseit.10.1.6747.

M. Omar, H. Alaidaros, and R. Romli, “An Improved Software Project Monitoring Task Model of Agile Kanban Method: A Practitioners’ Perspective,†International Journal on Advanced Science, Engineering and Information Technology, vol. 10, no. 2, p. 548, Mar. 2020, doi: 10.18517/ijaseit.10.2.10184.

J. Cvetković and M. Cvetković, “Evaluation of UML diagrams for test cases generation:Case study on depression of internet addiction,†Physica A: Statistical Mechanics and its Applications, vol. 525, pp. 1351–1359, Jul. 2019, doi: 10.1016/j.physa.2019.03.101.

M. El-Attar, “Evaluating and empirically improving the visual syntax of use case diagrams,†Journal of Systems and Software, vol. 156, pp. 136–163, Oct. 2019, doi: 10.1016/j.jss.2019.06.096.

P. Danenas, T. Skersys, and R. Butleris, “Natural language processing-enhanced extraction of SBVR business vocabularies and business rules from UML use case diagrams,†Data & Knowledge Engineering, vol. 128, p. 101822, Jul. 2020, doi: 10.1016/j.datak.2020.101822.

H. Wu, “QMaxUSE: A new tool for verifying UML class diagrams and OCL invariants,†Science of Computer Programming, vol. 228, p. 102955, Jun. 2023, doi: 10.1016/j.scico.2023.102955.

F. Chen, L. Zhang, X. Lian, and N. Niu, “Automatically recognizing the semantic elements from UML class diagram images,†Journal of Systems and Software, vol. 193, p. 111431, Nov. 2022, doi: 10.1016/j.jss.2022.111431.

G. Bergström et al., “Evaluating the layout quality of UML class diagrams using machine learning,†Journal of Systems and Software, vol. 192, p. 111413, Oct. 2022, doi: 10.1016/j.jss.2022.111413.

M. Abbas, R. Rioboo, C.-B. Ben-Yelles, and C. F. Snook, “Formal modeling and verification of UML Activity Diagrams (UAD) with FoCaLiZe,†Journal of Systems Architecture, vol. 114, p. 101911, Mar. 2021, doi: 10.1016/j.sysarc.2020.101911.

L. Lima, A. Tavares, and S. C. Nogueira, “A framework for verifying deadlock and nondeterminism in UML activity diagrams based on CSP,†Science of Computer Programming, vol. 197, p. 102497, Oct. 2020, doi: 10.1016/j.scico.2020.102497.

V. Arora, M. Singh, and R. Bhatia, “Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram,†Information and Software Technology, vol. 123, p. 106292, Jul. 2020, doi: 10.1016/j.infsof.2020.106292.




DOI: http://dx.doi.org/10.18517/ijaseit.13.3.18302

Refbacks

  • There are currently no refbacks.



Published by INSIGHT - Indonesian Society for Knowledge and Human Development