Stid Ind. Last Edit

22
STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI 1.0 Introduction of Information Technology. We use the term information technology or IT to refer to an entire industry. In actuality, information technology is the use of computers and software to manage information. In some companies, this is referred to as Management Information Services (or MIS) or simply as Information Services (or IS). The information technology department of a large company would be responsible for storing information, protecting information, processing the information, transmitting the information as necessary, and later retrieving information as necessary. IT is the area of managing technology and spans a wide variety of areas that include computer software, information systems,computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything that renders data, information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses with four sets of core services to help execute the business strategy: business process automation, providing information, connecting with customers, and productivity tools. [Type text] 1

Transcript of Stid Ind. Last Edit

Page 1: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

1.0 Introduction of Information Technology.

We use the term information technology or IT to refer to an entire industry. In actuality,

information technology is the use of computers and software to manage information. In some

companies, this is referred to as Management Information Services (or MIS) or simply as

Information Services (or IS). The information technology department of a large company would

be responsible for storing information, protecting information, processing the information,

transmitting the information as necessary, and later retrieving information as necessary.

IT is the area of managing technology and spans a wide variety of areas that

include computer software, information systems,computer hardware, programming

languages but are not limited to things such as processes, and data constructs. In short, anything

that renders data, information or perceived knowledge in any visual format whatsoever, via any

multimedia distribution mechanism, is considered part of the IT domain. IT provides businesses

with four sets of core services to help execute the business strategy: business process automation,

providing information, connecting with customers, and productivity tools.

IT professionals perform a variety of functions that range from installing applications to

designing complex computer networksand information databases. A few of the duties that IT

professionals perform may include data management, networking, engineering computer

hardware, database and software design, as well as management and administration of entire

systems. Information technology is starting to spread further than the conventional personal

computer and network technologies, and more into integrations of other technologies such as the

use of cell phones, televisions, automobiles, and more, which is increasing the demand for such

jobs.

[Type text] 1

Page 2: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

2.0 Radio Frequency Identification (RFID).

2.1 Introduction.

RFID technology has been available for more than fifty years. It has only been recently

that the ability to manufacture the RFID devices has fallen to the point where they can be used as

a "throwaway" inventory or control device. Alien Technologies recently sold 500 million RFID

tags to Gillette at a cost of about ten cents per tag.

2.2 Definition.

RFID stands for Radio-Frequency Identification. The acronym refers to small electronic

devices that consist of a small chip and an antenna. The chip typically is capable of carrying

2,000 bytes of data or less. The RFID device serves the same purpose as a bar code or a magnetic

strip on the back of a credit card or ATM card; it provides a unique identifier for that object.

And, just as a bar code or magnetic strip must be scanned to get the information, the RFID

device must be scanned to retrieve the identifying information.

2.3 Critical Issues regarding RFID.

2.3.1 RFID tags can be used to prevent surgeons from leaving sponges inside bodies of patients

This article was taken from Natural News Thursday July 20, 2006.

The radio frequency identification (RFID) tags that cause store alarms to go off when

tagged items pass through may help surgeons keep track of sponges during operations, according

to a Stanford University School of Medicine study released Monday. An earlier study revealed

that one in every 10,000 patients who undergo surgery has a foreign object, usually a sponge, left

[Type text] 2

Page 3: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

inside them by medical personnel. These objects can cause post-surgical complications and even

death.

"We need a system that is really fail-safe; where, regardless of how people use this

technology, the patient doesn't leave the operating room with a retained foreign body," said Alex

Marcario, a physician and professor of anesthesia who led the study, which was funded by the

National Institutes of Health and a grant from the Small Business Innovation Research

Program. Researchers tested the technology by deliberately leaving RFID tagged sponges inside

eight study participants' temporarily closed surgical wounds, and then waving detector wands

over them. Although the RFID tags help locate the sponges, the 20-millimeter chips used were

too big to be practical for everyday use and would need to be smaller in the future, according to

the study authors.

Marcario said that the RFID tags would be most effective if used with other simpler

techniques, like counting surgical tools and sponges before and after operations. Two of the co-

authors of the study own patents related to the RFID sponges, and work for Clear Count Medical

Solutions, the company that developed them.

2.3.2 Scientists push to implement edible RFID tracking chips in food.

This article is taken from Natural News by Ethan A. Huff on Friday, June 03, 2011.

It will monitor your calorie intake, show from where your food was sourced, and even let

you know when the food in your fridge is about to go bad -- these are some of the enticing claims

made by the developers of a new system that embeds edible radio frequency identification

(RFID) chips directly into food. Its creators insist the technology will revolutionize the way

humans eat for the better, but critical-thinking onlookers will recognize the ploy as just another

way to track and control human behavior. Developed by Hannes Harms from the Royal College

of Art in London, the "Nutri Smart" system is based on the idea that RFID wafers injected

directly into food can help better track the food supplychain, further automate the supermarket

shopping experience, and simplify threat experience by programming data into food so that

humans essentially do not have to think about what they are doing.

[Type text] 3

Page 4: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

The technology makes both eating and dealing with food in general mindless, as a

person simply needs to plop an RFID-embedded food item onto a special RFID-laced plate,

which then tells the person all about the item and how much of it to eat. RFID ovens and

microwaves also eliminate having to think about how long to cook an RFID food item -- simply

put it in the RFID microwave, oven, or toaster, and the machine will know exactly how long to

cook the item.

As interesting and novel as this might sound, such technology is actually quite

frightening when taken to its logical ends. Natural News previously warned that mad scientists

have already developed edible RFID tags for use in pharmaceutical drugs . These tags, of course,

can and will likely be used to monitor patients' compliance with doctors orders, and alert

authorities if a patient refuses to take certain pills as prescribed. And if such technology also

ends up in food, it is safe to assume that evil powers will seek to control the food supplywith it,

as well as monitor the types of food people eat. In other words, if authorities one day decide that

vitamin and mineral supplements are off limits, which is what is currently happening in Europe,

it is plausible that RFID technology can assess illegal intake of such nutrients, and immediately

send this data to the appropriate. This 1984-esque scenario appears to be more than just science

fiction -- it is unfolding before our eyes just a little bit more every single day. And the Nutri

Smart system is just another piece of evidence that those in power wish to micromanage every

single aspect of our lives, from the drugs we take to the foods we eat.

2.4 Conclusion.

In a conclusion, a reason why it has taken so long for RFID to come into common use

although it has a lot advantages is the lack of standards in the industry. Most companies invested

in RFID technology only use the tags to track items within their control, many of the benefits of

RFID come when items are tracked from company to company or from country to country.

[Type text] 4

Page 5: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

3.0 Electronic Commerce.

3.1 Introduction.

Founded in the heart of Silicon Valley in 1993, ECI has consulted for a variety of EDI/e

Commerce implementations from Fortune 100 companies to small private enterprises.

Frequently, these projects are global in scope, require coordination with global teams, and

encompass the implementation of variety of business processes and EDI/XML standards across

multiple platforms.

3.2 Definition.

Electronic Commerce is a leading consulting and service provider specializing in the

strategic and tactical implementation of business transactions into our clients' financial systems.

We have the business and technical experience to help you achieve a successful implementation.

3.3 Critical Issues in Electronic Commerce.

3.3.1 Enabling the Customers

Electronic Commerce is enabling the customer to have an increasing say in what products

are made, how products are made and how services are delivered (movement from a slow order

fulfillment process with little understanding of what is taking place inside the firm, to a faster

and open process with customers having greater control.

[Type text] 5

Page 6: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

3.3.2   Increasing of Revenue

Firm use technology to either lower operating costs or increase revenue. Electronic

Commerce has the Potential to increase revenue by creating new markets for old products,

creating new information-based products, and establishing new service delivery channels to

better serve and interact with customers. The transaction management aspect of electronic

commerce can also enable firms to reduce operating costs by enabling better coordination in the

sales, production and distribution processes and to consolidate operations arid reduce overhead.

3.3 Conclusion.

As we step into the 21st Century, the Internet has played an important role in human life.

The Internet does not just perform its role as a channel for communication. It has now emerged

as a machine to generate economic revenue. The Internet has become an excellent venue for

advertising and conducting trade with consumers. The style of doing business using the

electronic media especially the Internet is popularly known as e-commerce or e-business, the

most used terms in the media today. This research aims to look at the Malaysian Internet users

opinion and perception about Electronic Commerce application by employing quantitative and

qualitative research methods. It identifies behaviors of Malaysia Internet users, behaviors of

Malaysia online shoppers and Internet banking users, the factors that motivate the usage of

electronic commerce application, the factors that hinder the adoption of electronic commerce

application and future usage of electronic commerce application in Malaysia. The findings of this

survey suggest that the usage of electronic commerce application in Malaysia is still in its

infancy. Although there is a significant concern regarding security and privacy, lack of

familiarity, and uncertainty about its benefit, there is a future in the growth of electronic

commerce in Malaysia. With consumer education, government enforcement actions, and industry

consumer protection initiatives, can make electronic commerce a safe and convenient way for

conducting business

[Type text] 6

Page 7: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

4.0 Fuzzy Logic (FL).

All information about Fuzzy Logic is taken from ‘Encoder: The Newsletter of the Seattle

Robotic Society’. Written by Steven D. Kaehler.

4.1 Introduction.

The concept of Fuzzy Logic (FL) was conceived by Lotfi Zadeh, a professor at the

University of California at Berkley, and presented not as a control methodology, but as a way of

processing data by allowing partial set membership rather than crisp set membership or non-

membership. This approach to set theory was not applied to control systems until the 70's due to

insufficient small-computer capability prior to that time. Professor Zadeh reasoned that people

do not require precise, numerical information input, and yet they are capable of highly adaptive

control. If feedback controllers could be programmed to accept noisy, imprecise input, they

would be much more effective and perhaps easier to implement. Unfortunately, U.S.

manufacturers have not been so quick to embrace this technology while the Europeans and

Japanese have been aggressively building real products around it.

4.2 Definition.

FL is a problem-solving control system methodology that lends itself to implementation

in systems ranging from simple, small, embedded micro-controllers to large, networked, multi-

channel PC or workstation-based data acquisition and control systems. It can be implemented in

hardware, software, or a combination of both. FL provides a simple way to arrive at a definite

[Type text] 7

Page 8: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. FL's

approach to control problems mimics how a person would make decisions, only much faster.

4.3 Critical Issue regarding Fuzzy Logic.

4.3.1 A simple temperature control system could use a single temperature feedback sensor

whose data is subtracted from the command signal to compute "error" and then time-

differentiated to yield the error slope or rate-of-change-of-error, hereafter called "error-dot".

Error might have units of degrees F and a small error considered to be 2F while a large error is

5F. The "error-dot" might then have units of degrees/min with a small error-dot being 5F/min

and a large one being 15F/min. These values don't have to be symmetrical and can be "tweaked"

once the system is operating in order to optimize performance. Generally, FL is so forgiving that

the system will probably work the first time without any tweaking.

4.3.2 Fuzzy logic is used to control the operation of traffic light.

In a conventional traffic light controller, the lights change at constant cycle time, which is

clearly not the optimal solution. It would be more feasible to pass more cars at the green interval

if there are fewer cars waiting behind the red lights. Obviously, a mathematical model for this

decision is enormously difficult to find. However, with fuzzy logic, it is relatively much easier.

First, eight incremental sensors are put in specific positions as seen in the diagram below. 

[Type text] 8

Page 9: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

The first sensor behind each traffic light counts the number cars coming to the

intersection and the second counts the cars passing the traffic lights. The amount of cars between

the traffic lights is determined by the difference of the reading of the two sensors.

For example, the number of cars behind traffic light North is s7-s8. 

The distance D, chosen to be 200ft., is used to determine the maximum density of cars allowed to

wait in a very crowded situation. This is done by adding the number of cars between to paths and

dividing it by the total distance.

For instance, the number of cars between the East and West street is (s1-s2)+(s5-s6)/400. 

Next comes the fuzzy decision process which uses the three step mentioned above.

Step 1 :

As before, firstly the inputs and outputs of the design has to be determined.

Assuming red light is shown to both North and South streets and distance D is constant,

the inputs of the model consist of cycle time, cars behind red light and cars behind green

light.

The cars behind the light are the maximum number of cars in the two directions. The

corresponding output parameter is the probability of change of the current cycle time.

Once this is done, the input and output parameters are divided into overlapping member

functions, each function corresponding to different levels.

For inputs one and two the levels and their corresponding ranges are zero(0,1), low(0,7),

medium(4,11), high(7,18), and chaos(14,20).

For input 3 , the levels are were short(0,14), short(0,34), medium(14,60), long(33,88),

very long(65,100), limit(85,100). The levels of output are no (0), probably no(0.25),

maybe(0.5), probably yes (o.75), and yes(1.0).

Step 2 :

The rules, as before are formulated using a series of if-then statements, combined with

AND/OR operators.

[Type text] 9

Page 10: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

Ex: if cycle time is medium AND cars behind red are low AND cars behind green is

medium, then change is Probably Not.

With three inputs, each having 5,5 and 6 membership functions, there are a combination

of 150 rules.

However using the minimum or maximum criterion some rules are combined to a total of

86.

Step 3 :

This process, also mentioned above converts the fuzzy set output to real crisp value.

The method used for this system is center of gravity:

Crisp Output={Sum(Membership Degree*Singleton Position)}/(Membership degree)

For example, if the output membership degree, after rule evaluation are:

~ Change Probability Yes = 0

~ Change Probability Probably Yes = 0.6

~ Change Probability Maybe = 0.9

~ Change Probability Probably No = 0.3

~ Change Probability No = 0.1 

Then the crisp value will be:

Crisp Output=

(0.1X 0.00) + (0.3X 0.25) + (0.9X 0.50) + (0.6X 0.75) + (0X 1.00) /0.1+0.3+0.9+0.6+0

= 0.51

4.4. Conclusion.

FL was conceived as a better method for sorting and handling data but has proven to be a

excellent choice for many control system applications since it mimics human control logic. It can

be built into anything from small, hand-held products to large computerized process control

systems. It uses an imprecise but very descriptive language to deal with input data more like a

human operator. It is very robust and forgiving of operator and data input and often works when

first implemented with little or no tuning.

[Type text] 10

Page 11: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

5.0 Wireless Radiation.

5.1 Introduction.

The first wireless transmitters went on the air in the early 20 th century using

radiotelegraphy (Morse code). Later, as modulation made it possible to transmit voices and

[Type text] 11

Page 12: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

music via wireless, the medium came to be called "radio." With the advent of television, fax,

data communication, and the effective use of a larger portion of the spectrum, the term "wireless"

has been resurrected.

5.2 Definition.

Wireless is a term used to describe telecommunications in which electromagnetic waves

(rather than some form of wire) carry the signal over part or all of the communication path.

Some monitoring devices, such as intrusion alarms, employ acoustic waves at frequencies above

the range of human hearing; these are also sometimes classified as wireless.

5.3 Critical Issue regarding Wireless Radiation.

5.3.1 Universal Mobile Telecommunications System (UMTS).

A broadband, packet-based system offering a consistent set of services to mobile

computer and phone users no matter where they are located in the world.

5.3.2 i-Mode.

The world's first "smart phone" for Web browsing, first introduced in Japan; provides

color and video over telephone sets.

5.4 Conclusion.

Wireless technology is rapidly evolving, and is playing an increasing role in the lives of

people throughout the world. In addition, ever-larger numbers of people are relying on the

technology directly or indirectly. It has been suggested that wireless is overused in some

situations, creating a social nuisance.

[Type text] 12

Page 13: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

6.0 Fiber Optic.

6.1 Introduction.

Optical communication systems date back to the 1790s, to the optical semaphore

telegraph invented by French inventor Claude Chappe. In 1880, Alexander Graham Bell patented

an optical telephone system, which he called the Photo phone. However, his earlier invention, the

[Type text] 13

Page 14: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

telephone, was more practical and took tangible shape. The Photo phone remained an

experimental invention and never materialized. During the 1920s, John Logic Baird in England

and Clarence W. Hansel in the United States patented the idea of using arrays of hollow pipes or

transparent rods to transmit images for television or facsimile systems. The use and demand for

optical fiber has grown tremendously and optical-fiber applications are numerous.

Telecommunication applications are widespread, ranging from global networks to desktop

computers. These involve the transmission of voice, data, or video over distances of less than a

meter to hundreds of kilometers, using one of a few standard fiber designs in one of several cable

designs.

6.2 Definition.

A technology that uses glass (or plastic) threads (fibers) to transmit data. A fiber optic

cable consists of a bundle of glass threads, each of which is capable of transmitting

messages modulated onto light waves. Data can be transmitted digitally (the natural form

for computer data) rather than analogically.

6.3 Critical issue regarding Fiber Optic.

6.3.1 Optical fiber is also used extensively for transmission of data.

Multinational firms need secure, reliable systems to transfer data and financial

information between buildings to the desktop terminals or computers and to transfer data around

the world. Cable television companies also use fiber for delivery of digital video and data

services. The high bandwidth provided by fiber makes it the perfect choice for transmitting

broadband signals, such as high-definition television (HDTV) telecasts.

6.3.2 Optical fiber is also used for the biomedical industry.

Fiber optic systems are used in most modern telemedicine devices for transmission of

digital diagnostic images. Other applications for optical fiber include space, military, automotive,

and the industrial sector.

[Type text] 14

Page 15: Stid Ind. Last Edit

STID 1013 - SISTEM MAKLUMAT DALAM ORGANISASI

6.4 Conclusion.

Fiber optics is a particularly popular technology for local-area networks. In addition,

telephone companies are steadily replacing traditional telephone lines with fiber optic cables. In

the future, almost all communications will employ fiber optics.

[Type text] 15