Khaerunnisa Khaerunnisa, N. Selviandro, Rosa Reska Riskiana
{"title":"Comparative Study of Robot Framework and Cucumber as BDD Automated Testing Tools","authors":"Khaerunnisa Khaerunnisa, N. Selviandro, Rosa Reska Riskiana","doi":"10.31937/ti.v15i1.3228","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3228","url":null,"abstract":"Automation testing is much more efficient and accurate, the script is easy to document, and update compared to manual testing. Testing a website may necessitate time and effort to learn the tools to be used. Cucumber and Robot Framework are well-known open-source frameworks, according to Stack Overflow and GitHub. Cucumber and Robot Framework are known on an international scale, especially Robot Framework, which is often used by large companies. Each uses the Java and Python languages, which both support BDD. The comparative efforts of the two tools aim to help testers compare and determine automated testing tools in the BisOps Logee Port Web Admin case study based on the effectiveness and efficiency of the tools and create specific test cases as test documentation so that testers do not need to spend time analyzing both. Because this research involves evaluation and comparison, several criteria were chosen to support the evaluation process, namely functionality, reliability, usability, performance efficiency, and portability. The results of this study show that both tools can be recommended for novice QA's who want to learn the basics of automation by implementing BDD. Meanwhile, for QA's who have done automation before and want to do more in-depth configuration and reporting, it is recommended to use Robot Framework because the syntax is short, has lots of keywords that make it easier for testers, and can make the testing system shorter but more specific.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127146683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Mobile-Based Student Grade Processing Application Using the Waterfall Method","authors":"Muhamad Alda","doi":"10.31937/ti.v15i1.3134","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3134","url":null,"abstract":"One of the public elementary schools in Medan is SDN 064017. At SDN 064017, the procedure for processing student grade data is not yet computerized. Gradebooks are used to track and process student grade information. There are still certain problems that arise with this method. SDN 064017 requires a lot of time and effort to process and find information on student grades. The purpose of the author's research is to develop a mobile-based application that will simplify and speed up SDN 064017 in processing and searching for student grade data. The system development method used by the author is the waterfall method, consisting of requirements analysis, system design, implementation, testing, deployment, and maintenance stages, while the system testing method uses the black box testing method. In the process of developing a mobile-based application, the author uses the Kodular framework and the Airtable database. With the information system, it is hoped that it can help SDN 064017 in processing and searching student grade data at SDN 064017 to be more effective and efficient through an Android mobile.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha
{"title":"Comparative Analysis of Phishing Tools on Social Media Sites","authors":"Putu Ariani, I. Gede, Bagastia Widi Atmaja, Kadek Sukma Jayanti, G. Ayu, A. Dewi, Gede Arna, Jude Saskara, Made Edy Listartha","doi":"10.31937/ti.v15i1.2920","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2920","url":null,"abstract":"Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Johan, Samuel Ady Sanjaya, Andreas Yogi Brata, Andrew Brillyant
{"title":"Gamification to Study Machine Learning using Octalysis Framework","authors":"M. Johan, Samuel Ady Sanjaya, Andreas Yogi Brata, Andrew Brillyant","doi":"10.31937/ti.v15i1.3118","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3118","url":null,"abstract":"Machine learning is an area of study that enables computers to learn and improve their performance without explicit programming. Its primary application is assisting humans in processing vast amounts of data. Machine learning is a crucial area of study, and to assist students in learning about it, a gamification application has been developed using the Android platform. The aim of this research is to not only provide knowledge to students but also make the application interesting by using the octalysis framework. The application's level of acceptance will be tested on students at Multimedia Nusantara University who are taking machine learning courses. The Unified Theory of Acceptance and Use of Technology Model (UTAUT) method will be used to evaluate the application, which received an average score of 86.77%. This score indicates that students strongly agreed that the gamification approach using the octalysis framework and Android platform for machine learning was well-received.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114594093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Commerce System for Media Group Cooperative","authors":"Mikha Melvin Agustian, Ririn Ikana Desanti, Wella Wella","doi":"10.31937/ti.v15i1.3202","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3202","url":null,"abstract":"E-Commerce is a way to shop online where it is easier for us to process transactions between sellers and buyers without having to face to face, at this time we are required to reduce face-to-face to reduce the spread of covid which is high. Based on these problems created a website that can make sales online. The method used in the system is the SDLC waterfall method to find suitable and appropriate features. The tools used are visual studio code, and Heidi SQL. The result of this research is the website is made using PHP, JavaScript, Bootstrap and CSS for the frontend and the backend of the website. The website created can help make sales online and reduce sales data loss in cooperatives.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133018651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Estimated Value of Software Developer Productivity at the Software Implementation Stage Using Function Points","authors":"A. Maspupah, Lukman Hakim Firdaus, Wendi Wirasta","doi":"10.31937/ti.v15i1.2822","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2822","url":null,"abstract":"Most Software Development Processes (SDP) project failures occur due to errors in estimating cost, time, and effort during the planning phase. This happened because the planning carried out still relied on the intuition and experience of the programmer. One approach that can be taken to plan the right SDP is to know the value of SDP productivity. The focus of this research is to determine the value of productivity based on the differences in programmers’ skills. The case study is conducted to determine the productivity value of the web-based software that has been built, namely McDelivery. The productivity value is calculated based on the ratio of software size to the effort. Software size is obtained through the calculation of the Application Function Point Count (APFC). Meanwhile, the effort is obtained through expert judgment to determine the time needed by the development team at the junior, middle, and senior software developers to implement software functionality in person-day to the form of program code. The result shows that the productivity value of SDP is directly proportional to the level of ability of the programmers. These productivity values can be used as a solution option to calculate the estimated time, cost, and even the availability of programmers that are adjusted to the conditions faced in planning software development","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125879317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-Based Writing Learning Application of Basic Hanacaraka Using Convolutional Neural Network Method","authors":"Dewi Candani Sulaiman, T. M. S. Mulyana","doi":"10.31937/ti.v15i1.2993","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2993","url":null,"abstract":"The Javanese script, known as Hanacaraka, or Carakan, is one of the traditional Indonesian scripts developed and used on the island of Java. The government's efforts to preserve the use of Javanese language and script by making Javanese a compulsory subject of local content at the education level in Central Java and East Java. In the basic competence of writing, the Javanese script has a complicated shape so that students have difficulty writing and recognizing Javanese script writing. Through this research a web-based basic Javanese writing learning application was designed that can recognize handwriting digitally which aims to help learn basic hanacaraka writing for beginners, especially students at the basic education level in Central Java and East Java. Handwriting Recognition is a system that can recognize handwritten characters and convert them into text that can be read and understood by machines or computers. The handwriting recognition process in this study uses the Convolutional Neural Network (CNN) algorithm which has the capability and ability to recognize patterns in images. Based on the tests that have been carried out between the two architectural models that have been made, the performance of the CNN model that will be used from various experiments has an accuracy of 98.29% and a loss of 0.0746 on the training data. As well as producing an average accuracy value of 99.52%, an average error rate of 0.48%, an overall accuracy of 95.03% and an overall error rate of 4.97%.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121617858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of AHP and Topsis Algorithm on Web-based Application Design to Determine Prospective Winners of Betta Fish Contest","authors":"Muhammad Abdurraffi, F. Tobing","doi":"10.31937/ti.v15i1.2669","DOIUrl":"https://doi.org/10.31937/ti.v15i1.2669","url":null,"abstract":"The procurement of beauty competitions from ornamental betta fish has been held throughout Indonesia. The concept of judging and assessment carried out in the ornamental betta fish beauty competition still uses manual bookkeeping. The assessment with the national scale (SNI) is still a concern for the competition participants because of the lack of knowledge about the standard for judging ornamental betta fish contests. DSS (Decision Support System) can be an application development solution to determine the candidate for the winner of the ornamental betta fish contest. The criteria used include color value, neatness value, proportion value, mental value, and appearance value. The calculation method used in conducting this research is AHP and TOPSIS methods. The recommendations made will go through the AHP process for weighting based on the SNI assessment standard, while TOPSIS is used to receive alternatives from users. Then the ranking is based on the preference value generated by the TOPSIS method. This study has obtained the results of the application of the AHP and TOPSIS methods to make a recommendation system for contestants for winning ornamental betta fish correctly. Testing the level of user satisfaction obtains satisfaction results measured through the EUCS (End User Computing Satisfaction) dimension with the help of a Likert Scale calculation, so that it gets a satisfaction value of 87.89%","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133580926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ridwan Satrio Hadikusuma, Lukas Lukas, E. M. Rizaludin
{"title":"Methods of Stealing Personal Data on Android using a Remote Administration Tool with Social Engineering Techniques","authors":"Ridwan Satrio Hadikusuma, Lukas Lukas, E. M. Rizaludin","doi":"10.31937/ti.v15i1.3122","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3122","url":null,"abstract":"IT security is a significant concern of the internet because almost all communication occurs today. The purpose of testing personal data theft with the social engineering method is to ensure that the system and network on the user's Android have security holes to be hacked if the user is not aware of social engineering that allows data theft through the remote administration tool (RAT) which is accidentally downloaded on the Android User. Installing a RAT by applying social engineering is the possible and proper way to steal Android user privacy data. This study outlines some basic concepts of data theft, from recent call data and personal data to controlling Android users' cameras and microphones remotely.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128979703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ni Made, Satvika Iswari, I. Gede, Juliana Eka Putra
{"title":"Analysis of User-generated Content in Visitor Reviews of Tourist Attractions Using Semantic Similarity","authors":"Ni Made, Satvika Iswari, I. Gede, Juliana Eka Putra","doi":"10.31937/ti.v15i1.3139","DOIUrl":"https://doi.org/10.31937/ti.v15i1.3139","url":null,"abstract":"The tourism industry plays an important role in the world economic sector because it makes a significant contribution to the global economy, creates jobs, and strengthens economic growth. Therefore, visitor satisfaction is very important in this industry. Currently tourists use information in online media to find tourist attractions that suit their needs and expectations. Reviews of tourist attractions are growing on the internet. Customers can post reviews, recommendations, or ratings of a tourist spot. Online reviews in the form of User-generated Content (UGC) can provide benefits for business managers to obtain feedback from customers and improve certain product attributes or service characteristics in order to increase business value and support marketing activities. In this study, data collection will be carried out from one of the UGC tourism data sources, namely visitor reviews on Google Maps. Data analysis was performed using the natural language processing method. Analysis of these data will produce comprehensive information about tourist feedback.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125590554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}