Rd. Erwin Gunadhi, M.T., M. R. Nasrulloh, M.Kom., E. M. Rizaludin
{"title":"A Design and Build a Website for Catering Sales and Orders Using Web Engineering","authors":"Rd. Erwin Gunadhi, M.T., M. R. Nasrulloh, M.Kom., E. M. Rizaludin","doi":"10.31937/ti.v14i2.2795","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2795","url":null,"abstract":"Ordering catering is an activity carried out by consumers to order products in the form of food packages. At this time catering orders in the Garut area are still done manually, consumers see a list of products through brochures, even though consumers do not necessarily know the shape of the product written on the brochure, it will make it difficult for consumers to determine which product to choose, and these difficulties will making consumers have to meet with the owner of the catering frequently which will hinder time and drain costs. The existence of technology encourages researchers to build a catering ordering website which is expected to facilitate consumers in the catering ordering process. Consumers can find out the list as well as pictures of the products provided, with that consumers can easily determine which product to choose. Consumers can also save time and costs, because there is no need to repeatedly meet with the catering owner to find out the details of the products provided. The method used in the development of this application is the Web Engineering method with the stages of communication, planning, modeling, and deployment, using the php, html programming languages, using the Codeigniter framework and bootstrap and with MySql database management, by testing the Black Box Testing application.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127362330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Suhartono, Nurhani Nurhani, Satria Gunawan Zain
{"title":"Automatic Portal Access Application Using Static Qr Code Reading","authors":"S. Suhartono, Nurhani Nurhani, Satria Gunawan Zain","doi":"10.31937/ti.v14i2.2806","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2806","url":null,"abstract":"This study is a study that aims to determine the results of the automatic portal access application using a static QR Code reading based on the results of the ISO 25010 testing standard and to find out the results of using an automatic portal access application using a QR Code reading. The development model used in this research is the Rapid Application Development (RAD) model and the application quality test is based on the ISO 25010 quality standard. Data were collected using documentation and observation techniques. The instrument and system were validated by two system experts. Data were analyzed using descriptive statistical analysis techniques. Based on the test results using the ISO 25010 quality standard, the automatic parking application using QR Code reading has met the standards where: a) testing the functionality suitability aspect Testing the application is carried out by involving 2 (two) expert validators who are experienced in the field of application programming, the percentage is obtained in the category Very Good and has met the functionality suitability aspect; b) testing the performance efficiency aspect of the application can run well without experiencing a memory leak which results in a force close and launch fail so that the application is said to be successful and has met the performance efficiency aspect; c) Testing the maintainability aspect From the test results on the maintainability aspect, it shows that the maintainability aspect test has met three aspects of the test, including instrumentation, consistency, and simplicity, so the results of the maintainability aspect test can be said to meet the maintainability standard.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bakti Amirul Jabar, Seline Seline, Bintang Bintang, Cameron Jane Victoria, Rio Nur Arifin
{"title":"COVID-19 Fake News Detection With Pre-trained Transformer Models","authors":"Bakti Amirul Jabar, Seline Seline, Bintang Bintang, Cameron Jane Victoria, Rio Nur Arifin","doi":"10.31937/ti.v14i2.2776","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2776","url":null,"abstract":"COVID-19 is a new virus that first appeared in the year 2020 and is still currently plaguing our world. With the emergence of this virus, much information, both fake and real, has circulated in the internet. Fake information can lead to misleading information and cause a riot in society. In this paper, we aim to build a hoax detection system using the pre-trained transformer models BERT, RoBERTa, DeBERTa and Electra. From these four models, we will find which model gives the most accurate results. BERT gives a validation accuracy of 97.15% and test accuracy of 97.01%. RoBERTa gives a validation accuracy of 97.34% and test accuracy of 97.15%. DeBERTa gives a test accuracy of 97.48% and a test accuracy of 97.25%. Lastly, Electra gives a validation accuracy of 97.95% and a test accuracy of 97.76%. Electra is one of the newer models and is proven to be the most accurate model in our experiment and the one we will choose to implement fake news detection.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Crude Oil Price Forecasting Using Long Short-Term Memory and Support Vector Regression","authors":"Rifdah Amelia, Ahmad Zuhdi, Abdul Rochman","doi":"10.31937/ti.v14i2.2855","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2855","url":null,"abstract":"Crude oil or petroleum is a non-renewable energy source derived from organic materials whose formation process is lengthy. Crude oil is a commodity whose prices often fluctuate. When there is a fluctuation, a nation's economy will be affected. The crude oil price datasets are categorized as non-linear. This research used two models to compare the performance of those two models to find the best model to predict Brent crude oil prices. The models used in this research are Long Short-Term Memory (LSTM) and Support Vector Regression (SVR). Those two methods are widely used for a similar case, such as forecasting the stock price. The dataset used in this study is the price of Brent crude oil from May 1987 to May 2022. The result of this study indicates that the deep learning algorithm, LSTM, performs better in forecasting the price of Brent crude oil with a root mean squared error value of 1.543. \u0000Index Terms—Crude Oil, Long Short-Term Memory (LSTM), Support Vector Regression (SVR), Deep Learning, Forecasting.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analyzing Level of International Humanitarian Law Knowledge and its Compliance Through Military Simulation Game","authors":"William Hokianto, Melissa Indah Fianty","doi":"10.31937/ti.v14i2.2882","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2882","url":null,"abstract":"International humanitarian law in armed conflicts, the majority of whose contents originate from the results of the Geneva Convention, is the law used to protect human rights during an armed conflict. Based on research conducted by the International Red Cross Committee, video games that are now popular among the public, especially in the military genre, often ignore or contradict aspects of international law. This research was conducted to determine the knowledge of international law in armed conflict and its relationship to the level of compliance through military simulation video game scenarios. The scenario-based framework is a method used to develop game scenarios. The scenario was developed using an ARMA 3 video game editor and created to describe a situation of armed conflict where the respondent will take action whose results reflect the respondent's level of compliance with international law. Each respondent obtained two types of scores, the first is knowledge scores obtained from filling out questionnaires, and the second is compliance scores obtained from the results of running scenarios in the game. The score is divided into 12 parameters relating to aspects of international law in armed conflict. After the two types of scores are obtained, an analysis is carried out to determine whether the respondent's knowledge level influences the compliance level. The study's results showed that the respondent's knowledge and compliance levels were very high. The results of the comparative analysis show that only ten parameters have a level of knowledge that influences the level of compliance.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121273233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Use of eGovernment in Public Services Area (Case Study: Bojonegoro Regency)","authors":"Hastie Audytra, Rahmat Irsyada","doi":"10.31937/ti.v14i2.2836","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2836","url":null,"abstract":"The objective of e-Government is the availability of access to information by the citizen rather than financial benefits. e-Government system is built based on web technology to provide better public services to the citizen. Public services are services provided by the government to the citizen. Bojonegoro itself has several times received awards in the field of Smart City or e-Government. In this study, we want to know how to apply digital government or e-Government in Bojonegoro Regency in the implementation of public services. From the results of the literature study and data collection from 250 public service users, it appears that the applications that are widely used or that attract public interest are national applications that have been around for a long time, such as the Lapor! And online tax service application. Local applications that are being actively socialized actually get the smallest percentage. This study provides recommendations for solutions that can be applied for the implementation of better public services.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126129191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key","authors":"Aria Lesmana, R. Harwahyu, Y. Suryanto","doi":"10.31937/ti.v14i2.2837","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2837","url":null,"abstract":"In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Harya Wicaksana, Naufal Ananda, Irvan Budiawan, Bayu Santoso, Roy Handoko, A. Maulana, Suciarti Suciarti, A. Utoro
{"title":"Air Temperature Sensor Estimation on Automatic Weather Station Using ARIMA and MLP","authors":"Harya Wicaksana, Naufal Ananda, Irvan Budiawan, Bayu Santoso, Roy Handoko, A. Maulana, Suciarti Suciarti, A. Utoro","doi":"10.31937/ti.v14i2.2865","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2865","url":null,"abstract":"Surface meteorological quantities are now measured by Automatic Weather Station (AWS). AWS Serang records weather parameters minutely in Banten Province of Indonesia. Air temperature sensor is one instrument of this system. This study aims to design an air temperature sensor estimator model using ARIMA and Artificial Neural Network (ANN) as solution for avoiding loss data. Air temperature sensor on AWS Serang data in August of 2022 period is segmented into training, validating and testing sections. Based on criterion calculation, ARIMA (1,1,5) is simulated. It obtains not more than 0.12 of RMSE, 0.0520C of MAE, 0.193% of MAPE and 0.194% of SMAPE. Meanwhile, three different models of MLP ANN for air temperature estimator is also simulated. Input variables include air temperature, relative humidity and solar radiation intensity. Roy model has highest accuracy level for MLP ANN algorithm with 0.048 of RMSE, 0.0260C for MAE, 5% of MAPE and 4.83% of SMAPE. Overall, ARIMA (1,1,5) is better than Roy MLP ANN model in estimating air temperature sensor data on AWS Serang. Nonetheless, both models are properly fulfilling WMO (World Meteorological Organization) accuracy requirements for air temperature measurement.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":" 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132094749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Luthfi Atikah, Novrindah Alvi Hasanah, Agus Zainal Arivin
{"title":"Topic Modelling Using VSM-LDA For Document Summarization","authors":"Luthfi Atikah, Novrindah Alvi Hasanah, Agus Zainal Arivin","doi":"10.31937/ti.v14i2.2854","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2854","url":null,"abstract":"Summarization is a process to simplify the contents of a document by eliminating elements that are considered unimportant but do not reduce the core meaning the document wants to convey. However, as is known, a document will contain more than one topic. So it is necessary to identify the topic so that the summarization process is more effective. Latent Dirichlet Allocation (LDA) is a commonly used method of identifying topics. However, when running a program on a different dataset, LDA experiences \"order effects\", that is, the resulting topic will be different if the train data sequence is changed. In the same document input, LDA will provide inconsistent topics resulting in low coherence values. Therefore, this paper proposes a topic modelling method using a combination of LDA and VSM (Vector Space Model) for automatic summarization. The proposed method can overcome order effects and identify document topics that are calculated based on the TF-IDF weight on VSM generated by LDA. The results of the proposed topic modeling method on the 1300 Twitter data resulted in the highest coherence value reaching 0.72. The summary results obtained Rouge 1 is 0.78, Rouge 2 is 0.67 dan Rouge L is 0.80.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Social Impact of VR Technology on Society: A Systematic Literature Review","authors":"Bakti Amirul Jabar, Millia Azmi, Graciel Hernando, J. Moniaga, Angelique Aurielle Alpaullivarez","doi":"10.31937/ti.v14i2.2778","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2778","url":null,"abstract":"Humans are social creatures who usually interact directly. But as technology develops, interactions also use the technology. One of the many popular technologies in the 4.0 era is VR technology. An example of this technology is the metaverse, a combination of the real and virtual worlds. This paper presents a research review to analyze the social impact of Virtual Reality: technology with metaverse. This paper uses a systematic literature review (SLR) as the method. The research was conducted based on the RQ that had been made. There are 18 related articles generated from the search, then reviewed. This study concludes that Social VR has three impacts: Social Presence Illusion, Virtual Embodiment, and the Proteus Effect. In addition, we also explain the ways to create a safe social VR environment, such as by playing with family and friends, educating the public about VR technology, and suggesting that the platform provides an age limit for playing in a VR environment.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}