Ultimatics : Jurnal Teknik Informatika最新文献

筛选
英文 中文
Comparative Study of Robot Framework and Cucumber as BDD Automated Testing Tools 机器人框架与黄瓜作为BDD自动化测试工具的比较研究
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-07-30 DOI: 10.31937/ti.v15i1.3228
Khaerunnisa Khaerunnisa, N. Selviandro, Rosa Reska Riskiana
{"title":"Comparative Study of Robot Framework and Cucumber as BDD Automated Testing Tools","authors":"Khaerunnisa Khaerunnisa, N. Selviandro, Rosa Reska Riskiana","doi":"10.31937/ti.v15i1.3228","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3228","url":null,"abstract":"Automation testing is much more efficient and accurate, the script is easy to document, and update compared to manual testing. Testing a website may necessitate time and effort to learn the tools to be used. Cucumber and Robot Framework are well-known open-source frameworks, according to Stack Overflow and GitHub. Cucumber and Robot Framework are known on an international scale, especially Robot Framework, which is often used by large companies. Each uses the Java and Python languages, which both support BDD. The comparative efforts of the two tools aim to help testers compare and determine automated testing tools in the BisOps Logee Port Web Admin case study based on the effectiveness and efficiency of the tools and create specific test cases as test documentation so that testers do not need to spend time analyzing both. Because this research involves evaluation and comparison, several criteria were chosen to support the evaluation process, namely functionality, reliability, usability, performance efficiency, and portability. The results of this study show that both tools can be recommended for novice QA's who want to learn the basics of automation by implementing BDD. Meanwhile, for QA's who have done automation before and want to do more in-depth configuration and reporting, it is recommended to use Robot Framework because the syntax is short, has lots of keywords that make it easier for testers, and can make the testing system shorter but more specific.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Mobile-Based Student Grade Processing Application Using the Waterfall Method 利用瀑布法开发一个基于移动设备的学生成绩处理应用程序
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-07-07 DOI: 10.31937/ti.v15i1.3134
Muhamad Alda
{"title":"Development of a Mobile-Based Student Grade Processing Application Using the Waterfall Method","authors":"Muhamad Alda","doi":"10.31937/ti.v15i1.3134","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3134","url":null,"abstract":"One of the public elementary schools in Medan is SDN 064017. At SDN 064017, the procedure for processing student grade data is not yet computerized. Gradebooks are used to track and process student grade information. There are still certain problems that arise with this method. SDN 064017 requires a lot of time and effort to process and find information on student grades. The purpose of the author's research is to develop a mobile-based application that will simplify and speed up SDN 064017 in processing and searching for student grade data. The system development method used by the author is the waterfall method, consisting of requirements analysis, system design, implementation, testing, deployment, and maintenance stages, while the system testing method uses the black box testing method. In the process of developing a mobile-based application, the author uses the Kodular framework and the Airtable database. With the information system, it is hoped that it can help SDN 064017 in processing and searching student grade data at SDN 064017 to be more effective and efficient through an Android mobile.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Phishing Tools on Social Media Sites 社交媒体网站上钓鱼工具的比较分析
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.2920
Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha
{"title":"Comparative Analysis of Phishing Tools on Social Media Sites","authors":"Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha","doi":"10.31937/ti.v15i1.2920","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2920","url":null,"abstract":"Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the  Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gamification to Study Machine Learning using Octalysis Framework 使用八度分析框架研究机器学习的游戏化
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.3118
M. Johan, Samuel Ady Sanjaya, Andreas Yogi Brata, Andrew Brillyant
{"title":"Gamification to Study Machine Learning using Octalysis Framework","authors":"M. Johan, Samuel Ady Sanjaya, Andreas Yogi Brata, Andrew Brillyant","doi":"10.31937/ti.v15i1.3118","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3118","url":null,"abstract":"Machine learning is an area of study that enables computers to learn and improve their performance without explicit programming. Its primary application is assisting humans in processing vast amounts of data. Machine learning is a crucial area of study, and to assist students in learning about it, a gamification application has been developed using the Android platform. The aim of this research is to not only provide knowledge to students but also make the application interesting by using the octalysis framework. The application's level of acceptance will be tested on students at Multimedia Nusantara University who are taking machine learning courses. The Unified Theory of Acceptance and Use of Technology Model (UTAUT) method will be used to evaluate the application, which received an average score of 86.77%. This score indicates that students strongly agreed that the gamification approach using the octalysis framework and Android platform for machine learning was well-received.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Commerce System for Media Group Cooperative 传媒集团合作社电子商务系统
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.3202
Mikha Melvin Agustian, Ririn Ikana Desanti, Wella Wella
{"title":"E-Commerce System for Media Group Cooperative","authors":"Mikha Melvin Agustian, Ririn Ikana Desanti, Wella Wella","doi":"10.31937/ti.v15i1.3202","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3202","url":null,"abstract":"E-Commerce is a way to shop online where it is easier for us to process transactions between sellers and buyers without having to face to face, at this time we are required to reduce face-to-face to reduce the spread of covid which is high. Based on these problems created a website that can make sales online. The method used in the system is the SDLC waterfall method to find suitable and appropriate features. The tools used are visual studio code, and Heidi SQL. The result of this research is the website is made using PHP, JavaScript, Bootstrap and CSS for the frontend and the backend of the website. The website created can help make sales online and reduce sales data loss in cooperatives.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133018651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimated Value of Software Developer Productivity at the Software Implementation Stage Using Function Points 使用功能点估算软件开发人员在软件实现阶段的生产力
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.2822
A. Maspupah, Lukman Hakim Firdaus, Wendi Wirasta
{"title":"Estimated Value of Software Developer Productivity at the Software Implementation Stage Using Function Points","authors":"A. Maspupah, Lukman Hakim Firdaus, Wendi Wirasta","doi":"10.31937/ti.v15i1.2822","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2822","url":null,"abstract":"Most Software Development Processes (SDP) project failures occur due to errors in estimating cost, time, and effort during the planning phase. This happened because the planning carried out still relied on the intuition and experience of the programmer. One approach that can be taken to plan the right SDP is to know the value of SDP productivity. The focus of this research is to determine the value of productivity based on the differences in programmers’ skills. The case study is conducted to determine the productivity value of the web-based software that has been built, namely McDelivery. The productivity value is calculated based on the ratio of software size to the effort. Software size is obtained through the calculation of the Application Function Point Count (APFC). Meanwhile, the effort is obtained through expert judgment to determine the time needed by the development team at the junior, middle, and senior software developers to implement software functionality in person-day to the form of program code. The result shows that the productivity value of SDP is directly proportional to the level of ability of the programmers. These productivity values ​​can be used as a solution option to calculate the estimated time, cost, and even the availability of programmers that are adjusted to the conditions faced in planning software development","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web-Based Writing Learning Application of Basic Hanacaraka Using Convolutional Neural Network Method 基于卷积神经网络的《基础汉语》网络写作学习应用
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.2993
Dewi Candani Sulaiman, T. M. S. Mulyana
{"title":"Web-Based Writing Learning Application of Basic Hanacaraka Using Convolutional Neural Network Method","authors":"Dewi Candani Sulaiman, T. M. S. Mulyana","doi":"10.31937/ti.v15i1.2993","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2993","url":null,"abstract":"The Javanese script, known as Hanacaraka, or Carakan, is one of the traditional Indonesian scripts developed and used on the island of Java. The government's efforts to preserve the use of Javanese language and script by making Javanese a compulsory subject of local content at the education level in Central Java and East Java. In the basic competence of writing, the Javanese script has a complicated shape so that students have difficulty writing and recognizing Javanese script writing. Through this research a web-based basic Javanese writing learning application was designed that can recognize handwriting digitally which aims to help learn basic hanacaraka writing for beginners, especially students at the basic education level in Central Java and East Java. Handwriting Recognition is a system that can recognize handwritten characters and convert them into text that can be read and understood by machines or computers. The handwriting recognition process in this study uses the Convolutional Neural Network (CNN) algorithm which has the capability and ability to recognize patterns in images. Based on the tests that have been carried out between the two architectural models that have been made, the performance of the CNN model that will be used from various experiments has an accuracy of 98.29% and a loss of 0.0746 on the training data. As well as producing an average accuracy value of 99.52%, an average error rate of 0.48%, an overall accuracy of 95.03% and an overall error rate of 4.97%.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121617858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of AHP and Topsis Algorithm on Web-based Application Design to Determine Prospective Winners of Betta Fish Contest AHP和Topsis算法在基于web的斗鱼比赛应用程序设计中的实现
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.2669
Muhammad Abdurraffi, F. Tobing
{"title":"Implementation of AHP and Topsis Algorithm on Web-based Application Design to Determine Prospective Winners of Betta Fish Contest","authors":"Muhammad Abdurraffi, F. Tobing","doi":"10.31937/ti.v15i1.2669","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2669","url":null,"abstract":"The procurement of beauty competitions from ornamental betta fish has been held throughout Indonesia. The concept of judging and assessment carried out in the ornamental betta fish beauty competition still uses manual bookkeeping. The assessment with the national scale (SNI) is still a concern for the competition participants because of the lack of knowledge about the standard for judging ornamental betta fish contests. DSS (Decision Support System) can be an application development solution to determine the candidate for the winner of the ornamental betta fish contest. The criteria used include color value, neatness value, proportion value, mental value, and appearance value. The calculation method used in conducting this research is AHP and TOPSIS methods. The recommendations made will go through the AHP process for weighting based on the SNI assessment standard, while TOPSIS is used to receive alternatives from users. Then the ranking is based on the preference value generated by the TOPSIS method. This study has obtained the results of the application of the AHP and TOPSIS methods to make a recommendation system for contestants for winning ornamental betta fish correctly. Testing the level of user satisfaction obtains satisfaction results measured through the EUCS (End User Computing Satisfaction) dimension with the help of a Likert Scale calculation, so that it gets a satisfaction value of 87.89%","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methods of Stealing Personal Data on Android using a Remote Administration Tool with Social Engineering Techniques 使用带有社会工程技术的远程管理工具在Android上窃取个人数据的方法
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.3122
Ridwan Satrio Hadikusuma, Lukas Lukas, E. M. Rizaludin
{"title":"Methods of Stealing Personal Data on Android using a Remote Administration Tool with Social Engineering Techniques","authors":"Ridwan Satrio Hadikusuma, Lukas Lukas, E. M. Rizaludin","doi":"10.31937/ti.v15i1.3122","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3122","url":null,"abstract":"IT security is a significant concern of the internet because almost all communication occurs today. The purpose of testing personal data theft with the social engineering method is to ensure that the system and network on the user's Android have security holes to be hacked if the user is not aware of social engineering that allows data theft through the remote administration tool (RAT) which is accidentally downloaded on the Android User. Installing a RAT by applying social engineering is the possible and proper way to steal Android user privacy data. This study outlines some basic concepts of data theft, from recent call data and personal data to controlling Android users' cameras and microphones remotely.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of User-generated Content in Visitor Reviews of Tourist Attractions Using Semantic Similarity 基于语义相似度的旅游景点游客评论用户生成内容分析
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-06-30 DOI: 10.31937/ti.v15i1.3139
Ni Made, Satvika Iswari, I. Gede, Juliana Eka Putra
{"title":"Analysis of User-generated Content in Visitor Reviews of Tourist Attractions Using Semantic Similarity","authors":"Ni Made, Satvika Iswari, I. Gede, Juliana Eka Putra","doi":"10.31937/ti.v15i1.3139","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3139","url":null,"abstract":"The tourism industry plays an important role in the world economic sector because it makes a significant contribution to the global economy, creates jobs, and strengthens economic growth. Therefore, visitor satisfaction is very important in this industry. Currently tourists use information in online media to find tourist attractions that suit their needs and expectations. Reviews of tourist attractions are growing on the internet. Customers can post reviews, recommendations, or ratings of a tourist spot. Online reviews in the form of User-generated Content (UGC) can provide benefits for business managers to obtain feedback from customers and improve certain product attributes or service characteristics in order to increase business value and support marketing activities. In this study, data collection will be carried out from one of the UGC tourism data sources, namely visitor reviews on Google Maps. Data analysis was performed using the natural language processing method. Analysis of these data will produce comprehensive information about tourist feedback.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信