{"title":"Community Satisfaction with Online Services in East Lombok Regency: (Case Study: BAKSO Application)","authors":"Yujitia Ahdarrijal, Ulung Pribadi","doi":"10.15294/sji.v11i1.48083","DOIUrl":"https://doi.org/10.15294/sji.v11i1.48083","url":null,"abstract":"Purpose: This study analyzes the use of the BAKSO (Create Online Population Administration) application for users, namely employees of the East Lombok Regency Population and Civil Registration Office and the Admin of each village. The measurement uses variables consisting of infrastructure, ICT, bureaucracy, leadership, and implementation of digital government.Methods: The method used is a quantitative type, primary data in the form of a survey of 115 respondents from East Lombok Regency Population and Civil Registration Office office employees and village admins who used the BAKSO application (Create Online Population Administration). Using the Likert Scale (1: strongly disagree, 2: disagree, 3: neutral, 4: agree, and 5: strongly agree). The analysis technique for this study uses SmartPLS 3.Results: The results of this study show that infrastructure and ICT variables have a positive and significant influence on the implementation of digital government in the implementation of the BAKSO application. Meanwhile, bureaucratic and leadership variables have little impact and are substantial in implementing the BAKSO application in East Lombok Regency.Novelty: This study is unique because it examines users who are also employees who use the BAKSO application (Make Online Population Administration) with a measuring indicator, namely the online service index (OSI); most of the previous research on this theory was only oriented to assessing public satisfaction with online services. This research provides a new perspective on using the Online Service Index (OSI) on the scope of application-based online services from an employee perspective. In addition, the empirical contribution lies in the professionalism of employees in using the BAKSO application. So that later, it can provide space for the government to pay attention to human resources in running Online Service Index (OSI)-based application services.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"34 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140414324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examination of the Factors Impacting the Interest of Residents in Semarang City in Mobile Health Applications: An UTAUT Analysis","authors":"Muhamad Putra Perdana, Zaenal Abidin","doi":"10.15294/sji.v11i1.48130","DOIUrl":"https://doi.org/10.15294/sji.v11i1.48130","url":null,"abstract":"Purpose: The study aims is to examine the determinants that impact the level of public interest in utilizing mobile health (m-health) applications in Semarang City, Indonesia. Our specific objective is to identify the critical factors that facilitate or impede the public's adoption of these applications.Methods: This study objective was pursued using a comprehensive approach. A study model was developed utilizing the Unified Theory of Acceptance and Use of Technology (UTAUT) as its foundation. This model encompasses essential variables including performance expectancy, effort expectancy, social influence, facilitating conditions, price value, and perceived trust. The process of data collecting was carried out by means of a survey that was disseminated across widely used social media channels. The study was conducted using a sample size of 257 participants who are residents of Semarang City. The data that was collected underwent a thorough analysis utilizing the Partial Least Squares - Structural Equation Model (PLS-SEM) approach.Results: The research conducted in our study resulted in several significant findings. The study revealed that several factors, namely performance expectancy, social influence, price value, and perceived trust, had a notable and beneficial impact on users' inclination towards using m-health applications. On the other hand, the variables of effort expectancy and facilitating conditions did not exhibit a statistically significant influence on the level of public interest in these applications. Furthermore, a substantial correlation was found between the behavioral intention and the actual usage behavior of inhabitants of Semarang City in their adoption of m-health applications.Novelty: The research presented in this study is distinguished by its comprehensive analysis of the various factors that impact the adoption of mobile health (m-health) applications in Semarang City. Through the incorporation and expansion of variables such as price value and perceived trust, our study provides a comprehensive and nuanced comprehension of this particular occurrence by adapting and extending the UTAUT model. Our work emphasizes the importance of performance expectancy and social influence, while also suggesting the need for additional investigation into the roles of effort expectancy and facilitating conditions. Additionally, our study offers valuable information regarding the influence of age and gender as moderators in these associations. The results of this study have significant practical implications for healthcare professionals and policymakers who are interested in promoting the use of mobile health (m-health) technologies among the public. Additionally, these findings can serve as a valuable guide for future research endeavors in this particular area of study. ","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"77 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140421407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. Hidayat, Kiara Izzatus Shabiya, Sri Anggraeni Kadiran, Irfan Mujahidin, M. C. A. Prabowo, Arif Nursyahid, Endro Wasito, Helmy Helmy
{"title":"Real-Time Web-Based Monitoring System for Temperature, Humidity, and Solar Panels in Ramie Drying Facilities","authors":"S. S. Hidayat, Kiara Izzatus Shabiya, Sri Anggraeni Kadiran, Irfan Mujahidin, M. C. A. Prabowo, Arif Nursyahid, Endro Wasito, Helmy Helmy","doi":"10.15294/sji.v11i1.47234","DOIUrl":"https://doi.org/10.15294/sji.v11i1.47234","url":null,"abstract":"Purpose: To address the manual monitoring challenges in processing ramie fibers, especially during drying. The purpose is to create a monitoring system that oversees room temperature, humidity, and the status of solar panels, crucial factors in ramie productivity.Methods: Real-time web-based system development that monitors room temperature, humidity, and the performance of solar panels in a ramie drying room using the Internet of Things architecture ESP32 with communication through GSM SIM 800L in rural areas.Results: The system can display real-time information such as temperature data, humidity, and electrical energy parameters derived from the solar panel's utilization in the ramie drying room. By doing so, users gain efficiency and effectiveness in obtaining information, significantly enhancing ramie fiber productivity.Novelty: Integration of sensor instruments, low-power ESP32 microcontrollers, GSM Telecommunication, Solar Cell Energy as a power source, and a real-time web-based Monitoring Information System implemented in a ramie drying dome. This simplifies the monitoring process and optimizes limited resources such as space, energy, telecommunications, and human resources, which are typically constrained infrastructure in the ramie fiber agricultural system.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"32 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140418465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rico Andrian, Hans Christian Herwanto, Rahman Taufik, Didik Kurniawan
{"title":"Performance Comparison Between LeNet And MobileNet In Convolutional Neural Network for Lampung Batik Image Identification","authors":"Rico Andrian, Hans Christian Herwanto, Rahman Taufik, Didik Kurniawan","doi":"10.15294/sji.v11i1.49451","DOIUrl":"https://doi.org/10.15294/sji.v11i1.49451","url":null,"abstract":"Purpose: The rich cultural heritage of Indonesia includes the intricate art of batik, which varies across regions with unique patterns and motifs. This study focuses on Lampung batik, a distinctive type of batik, representing Lampung Province, Indonesia. Leveraging Convolutional Neural Network (CNN) architectures, namely LeNet-5 and MobileNet, the research compares their effectiveness in recognizing and classifying Lampung batik motifs. Data augmentation techniques, including rotation, brightness, and zoom, were employed to enhance the dataset and improve model performance.Methods: The study collected 500 Lampung batik images categorized into 10 classes which were then augmented and divided into training, validation, and testing sets. The model was created using a Deep Learning approach, LeNet And MobileNet. Both models were trained using identical hyperparameters and evaluated based on their accuracy in classifying Lampung batik motifs.Results: The results demonstrate an accuracy of 99.33% for LeNet-5 and 98.00% for MobileNet, outperforming previous studies. LeNet-5, particularly with augmentation, exhibited superior precision and recall in classifying Lampung batik motifs. This research underscores the efficacy of CNN architectures, coupled with data augmentation techniques, in accurately identifying intricate cultural artifacts like Lampung batik.Novelty: The Dharmagita learning model using a mobile application is a new model that has not existed before.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"42 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140422125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Ridwan, Irwan Sembiring, Adi Setiawan, Iwan Setyawan
{"title":"Analysis of Attack Detection on Log Access Servers Using Machine Learning Classification: Integrating Expert Labeling and Optimal Model Selection","authors":"Mohammad Ridwan, Irwan Sembiring, Adi Setiawan, Iwan Setyawan","doi":"10.15294/sji.v11i1.49424","DOIUrl":"https://doi.org/10.15294/sji.v11i1.49424","url":null,"abstract":"Purpose: As the complexity and diversity of cyberattacks continue to grow, traditional security measures fall short in effectively countering these threats within web-based environments. Therefore, there is an urgent need to develop and implement innovative, advanced techniques tailored specifically to detect and address these evolving security risks within web applications.Methods: This research focuses on analyzing attack detection in log access servers using machine learning classification with two primary approaches: expert labeling integration and best model selection. Expert labeling determines whether log entries are safe or indicate an attack.Result: Validation in labeling was applied using different datasets to minimize errors and increase confidence in the resulting dataset. Experimental results show that the Decision Tree and Random Forest models have nearly identical accuracy rates, around 89.3%-89.4%, while the ANN model has an accuracy of 81%.Novelty: This study proposes a fusion of expert knowledge in labeling log entries with a rigorous process of selecting the best classification model. This integration has not been extensively explored in previous research, offering a novel approach to enhancing attack detection within web applications. The research contribution lies in the integration of expert security assessment and the selection of the best model for detecting attacks on server access logs, along with validating labels using various datasets from different log devices to enhance confidence in the analysis results.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"87 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140423890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oka Sudana, Kd. Vigyan Melati Sukma, Ayu Wirdiani, Gusti Agung Ayu Putri
{"title":"E-Dharmagita Learning Model Innovation with Mobile and Multimedia Technology","authors":"Oka Sudana, Kd. Vigyan Melati Sukma, Ayu Wirdiani, Gusti Agung Ayu Putri","doi":"10.15294/sji.v11i1.46653","DOIUrl":"https://doi.org/10.15294/sji.v11i1.46653","url":null,"abstract":"Purpose: Yadnya ceremony is a sacred sacrifice performed with sincere and wholehearted devotion by Hindus to God, spiritual leaders or teachers, fellow humans, the ancestors, and Bhuta_Kala. The implementation of the Yadnya ceremony is_usually accompanied by a spiritual chant of the Hindus known as Dharmagita. Nowadays, a lot of young generations do not know and are even more indifferent to the Dharmagita. Using books as a source of Dharmagita information is less attractive since there are no audio examples or recordings of correct songs that can be listened to. The Android-based e-Dharmagita application was built to overcome these problems to facilitate the younger generation in getting more interesting information about Dharmagita.Methods: e-Dharmagita was constructed with the support of mobile and multimedia technology. In addition, the information presented was related to the Yadnya Ceremony by implementing a complex Tree Algorithm.Results: This research produced an e-Dharmagita Application, of which user acceptance testing using the PSSUQ Method resulted in a score incudes in the excellent category. Therefore, the application could be accepted well in the implementation the Information Technology in Balinese Culture and Hinduism, especially the innovation of a more modern and attractive Dharmagita learning model.Novelty: The Dharmagita learning model using a mobile application is a new model that has not existed before.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"24 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140420221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Ridho Dewanto, M. Farid, Muhammad Abby Rafdi Syah, Aji Akbar Firdaus, Hamzah Arof
{"title":"YOLO vs. CNN Algorithms: A Comparative Study in Masked Face Recognition","authors":"Muhammad Ridho Dewanto, M. Farid, Muhammad Abby Rafdi Syah, Aji Akbar Firdaus, Hamzah Arof","doi":"10.15294/sji.v11i1.48723","DOIUrl":"https://doi.org/10.15294/sji.v11i1.48723","url":null,"abstract":"Purpose: This research investigates the effectiveness of YOLO (You Only Look Once) and Convolutional Neural Network (CNN) in real-time face mask recognition, addressing the challenges posed by mask-wearing in infectious disease prevention.Method: Utilizing a diverse dataset and employing YOLO's object detection and a combined Haar Cascade Algorithm with CNN, the study evaluated key performance indicators, including accuracy, framerate, and F1 Score.Results: Results indicated that CNN outperformed YOLO in accuracy (99.3% vs. 79.3%) but operated at a slightly lower framerate. YOLO excelled in recall and precision, presenting a compelling choice for specific application needs. The research underscores the importance of considering factors beyond accuracy for informed decision-making in the realm of face mask recognition.Novelty: This research evaluates the real-time performance of YOLO and CNN algorithms in masked face recognition, highlighting the crucial balance between framerate efficiency and detection accuracy.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"44 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140421612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"YOLOv8 Analysis for Vehicle Classification Under Various Image Conditions","authors":"Eben Panja, Hendry Hendry, Christine Dewi","doi":"10.15294/sji.v11i1.49038","DOIUrl":"https://doi.org/10.15294/sji.v11i1.49038","url":null,"abstract":"Purpose: The purpose of this research is to detect vehicle types in various image conditions using YOLOv8n, YOLOv8s, and YOLOv8m with augmentation.Methods: This research utilizes the YOLOv8 method on the DAWN dataset. The method involves using pre-trained Convolutional Neural Networks (CNN) to process the images and output the bounding boxes and classes of the detected objects. Additionally, data augmentation applied to improve the model's ability to recognize vehicles from different directions and viewpoints.Result: The mAP values for the test results are as follows: Without data augmentation, YOLOv8n achieved approximately 58%, YOLOv8s scored around 68.5%, and YOLOv8m achieved roughly 68.9%. However, after applying horizontal flip data augmentation, YOLOv8n's mAP increased to about 60.9%, YOLOv8s improved to about 62%, and YOLOv8m excelled with a mAP of about 71.2%. Using horizontal flip data augmentation improves the performance of all three YOLOv8 models. The YOLOv8m model achieves the highest mAP value of 71.2%, indicating its high effectiveness in detecting objects after applying horizontal flip augmentation. Novelty: This research introduces novelty by employing the latest version of YOLO, YOLOv8, and comparing its performance with YOLOv8n, YOLOv8s, and YOLOv8m. The use of data augmentation techniques, such as horizontal flip, to increase data variation is also novel in expanding the dataset and improving the model's ability to recognize objects.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140418573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Impact of Rapid Application Development Method on Development Cycle and User Satisfaction: A Case Study on Web-Based Registration Service","authors":"Imam Riadi, Anton Yudhana, Ade Elvina","doi":"10.15294/sji.v11i1.49590","DOIUrl":"https://doi.org/10.15294/sji.v11i1.49590","url":null,"abstract":"Purpose: This research was conducted to respond to obstacles and inefficiencies in the new student registration system at RA Plus Rabbani. Currently, the conventional method of using physical documents for registration is vulnerable to damage and data loss. Therefore, the proposed solution is implementing a website-based online registration system using the Rapid Application Development (RAD) method. This aims to simplify the process, increase accessibility for prospective students, and reduce the costs and time required.Methods: This research commenced by identifying constraints within the conventional student registration system at RA Plus Rabbani through observations and interviews. The development, following the RAD methodology, involved testing with PHPUnit and Blackbox Testing to ensure the functionality of the system aligned with specifications. In addition, usability evaluation was conducted based on the ISO 9126 standard.Result: The research results show that testing on MVC indicated a 100% success rate for each architectural feature. Referring to expectations with a “valid” conclusion on functionality using Blackbox testing, based on ISO 9126 percentage displayed, it is known that the criterion with the most significant value is the understandability characteristic with a value of 83%. Novelty: This research makes a significant contribution by improving student registration services at RA Plus Rabbani through the implementation of various testing techniques, following the research flow offered by RAD. The study also provides substantial references for further research in web-based system development.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"42 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140431507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nova Adi Saputra, Khurotul Aeni, Nurul Mega Saraswati
{"title":"Indonesian Hate Speech Text Classification Using Improved K-Nearest Neighbor with TF-IDF-ICSρF","authors":"Nova Adi Saputra, Khurotul Aeni, Nurul Mega Saraswati","doi":"10.15294/sji.v11i1.48085","DOIUrl":"https://doi.org/10.15294/sji.v11i1.48085","url":null,"abstract":"Purpose: Freedom in social media gives rise to the possibility of disturbing users through the sentences they send, which is limited by the Electronic Information and Transactions Law (UU ITE). This research aims to find an effective method for classifying hate speech text data, especially in Indonesian, with many categories expected to minimize this case.Methods: This study used 1.000 data from Twitter with five labels, including religion, race, physical, gender and other (invective or slander). The process started with several steps of preprocessing, data transformation using TF-IDF-ICSρF term weighting and data mining using an Improved KNN algorithm. Then, the results were compared with the TF-IDF and KNN methods to evaluate the differences.Result: Using TF-IDF-ICSρF and Improved KNN algorithms gets an average accuracy value of 88.11%, 17.81% higher compared with the same data and parameters to the K-Nearest Neighbor and TF-IDF algorithms, which get results of 70.30%.Novelty: Based on the comparison results, TF-IDF-ICSρF and Improved KNN methods can effectively classify hate speech sentences that have many labels with fairly good accuracy.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"8 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140432367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}