Ultimatics : Jurnal Teknik Informatika最新文献

筛选
英文 中文
A Design and Build a Website for Catering Sales and Orders Using Web Engineering 利用网络工程设计并建立一个餐饮销售与订单网站
Ultimatics : Jurnal Teknik Informatika Pub Date : 2023-01-06 DOI: 10.31937/ti.v14i2.2795
Rd. Erwin Gunadhi, M.T., M. R. Nasrulloh, M.Kom., E. M. Rizaludin
{"title":"A Design and Build a Website for Catering Sales and Orders Using Web Engineering","authors":"Rd. Erwin Gunadhi, M.T., M. R. Nasrulloh, M.Kom., E. M. Rizaludin","doi":"10.31937/ti.v14i2.2795","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2795","url":null,"abstract":"Ordering catering is an activity carried out by consumers to order products in the form of food packages. At this time catering orders in the Garut area are still done manually, consumers see a list of products through brochures, even though consumers do not necessarily know the shape of the product written on the brochure, it will make it difficult for consumers to determine which product to choose, and these difficulties will making consumers have to meet with the owner of the catering frequently which will hinder time and drain costs. The existence of technology encourages researchers to build a catering ordering website which is expected to facilitate consumers in the catering ordering process. Consumers can find out the list as well as pictures of the products provided, with that consumers can easily determine which product to choose. Consumers can also save time and costs, because there is no need to repeatedly meet with the catering owner to find out the details of the products provided. The method used in the development of this application is the Web Engineering method with the stages of communication, planning, modeling, and deployment, using the php, html programming languages, using the Codeigniter framework and bootstrap and with MySql database management, by testing the Black Box Testing application.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127362330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Portal Access Application Using Static Qr Code Reading 使用静态Qr码读取的自动门户访问应用程序
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2806
S. Suhartono, Nurhani Nurhani, Satria Gunawan Zain
{"title":"Automatic Portal Access Application Using Static Qr Code Reading","authors":"S. Suhartono, Nurhani Nurhani, Satria Gunawan Zain","doi":"10.31937/ti.v14i2.2806","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2806","url":null,"abstract":"This study is a study that aims to determine the results of the automatic portal access application using a static QR Code reading based on the results of the ISO 25010 testing standard and to find out the results of using an automatic portal access application using a QR Code reading. The development model used in this research is the Rapid Application Development (RAD) model and the application quality test is based on the ISO 25010 quality standard. Data were collected using documentation and observation techniques. The instrument and system were validated by two system experts. Data were analyzed using descriptive statistical analysis techniques. Based on the test results using the ISO 25010 quality standard, the automatic parking application using QR Code reading has met the standards where: a) testing the functionality suitability aspect Testing the application is carried out by involving 2 (two) expert validators who are experienced in the field of application programming, the percentage is obtained in the category Very Good and has met the functionality suitability aspect; b) testing the performance efficiency aspect of the application can run well without experiencing a memory leak which results in a force close and launch fail so that the application is said to be successful and has met the performance efficiency aspect; c) Testing the maintainability aspect From the test results on the maintainability aspect, it shows that the maintainability aspect test has met three aspects of the test, including instrumentation, consistency, and simplicity, so the results of the maintainability aspect test can be said to meet the maintainability standard.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123086944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 Fake News Detection With Pre-trained Transformer Models 使用预训练的变压器模型检测COVID-19假新闻
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2776
Bakti Amirul Jabar, Seline Seline, Bintang Bintang, Cameron Jane Victoria, Rio Nur Arifin
{"title":"COVID-19 Fake News Detection With Pre-trained Transformer Models","authors":"Bakti Amirul Jabar, Seline Seline, Bintang Bintang, Cameron Jane Victoria, Rio Nur Arifin","doi":"10.31937/ti.v14i2.2776","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2776","url":null,"abstract":"COVID-19 is a new virus that first appeared in the year 2020 and is still currently plaguing our world. With the emergence of this virus, much information, both fake and real, has circulated in the internet. Fake information can lead to misleading information and cause a riot in society. In this paper, we aim to build a hoax detection system using the pre-trained transformer models BERT, RoBERTa, DeBERTa and Electra. From these four models, we will find which model gives the most accurate results. BERT gives a validation accuracy of 97.15% and test accuracy of 97.01%. RoBERTa gives a validation accuracy of 97.34% and test accuracy of 97.15%. DeBERTa gives a test accuracy of 97.48% and a test accuracy of 97.25%. Lastly, Electra gives a validation accuracy of 97.95% and a test accuracy of 97.76%. Electra is one of the newer models and is proven to be the most accurate model in our experiment and the one we will choose to implement fake news detection.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115156343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crude Oil Price Forecasting Using Long Short-Term Memory and Support Vector Regression 基于长短期记忆和支持向量回归的原油价格预测
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2855
Rifdah Amelia, Ahmad Zuhdi, Abdul Rochman
{"title":"Crude Oil Price Forecasting Using Long Short-Term Memory and Support Vector Regression","authors":"Rifdah Amelia, Ahmad Zuhdi, Abdul Rochman","doi":"10.31937/ti.v14i2.2855","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2855","url":null,"abstract":"Crude oil or petroleum is a non-renewable energy source derived from organic materials whose formation process is lengthy. Crude oil is a commodity whose prices often fluctuate. When there is a fluctuation, a nation's economy will be affected. The crude oil price datasets are categorized as non-linear. This research used two models to compare the performance of those two models to find the best model to predict Brent crude oil prices. The models used in this research are Long Short-Term Memory (LSTM) and Support Vector Regression (SVR). Those two methods are widely used for a similar case, such as forecasting the stock price. The dataset used in this study is the price of Brent crude oil from May 1987 to May 2022. The result of this study indicates that the deep learning algorithm, LSTM, performs better in forecasting the price of Brent crude oil with a root mean squared error value of 1.543. \u0000Index Terms—Crude Oil, Long Short-Term Memory (LSTM), Support Vector Regression (SVR), Deep Learning, Forecasting.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122611623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing Level of International Humanitarian Law Knowledge and its Compliance Through Military Simulation Game 通过军事模拟游戏分析国际人道法知识水平及其遵从性
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2882
William Hokianto, Melissa Indah Fianty
{"title":"Analyzing Level of International Humanitarian Law Knowledge and its Compliance Through Military Simulation Game","authors":"William Hokianto, Melissa Indah Fianty","doi":"10.31937/ti.v14i2.2882","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2882","url":null,"abstract":"International humanitarian law in armed conflicts, the majority of whose contents originate from the results of the Geneva Convention, is the law used to protect human rights during an armed conflict. Based on research conducted by the International Red Cross Committee, video games that are now popular among the public, especially in the military genre, often ignore or contradict aspects of international law. This research was conducted to determine the knowledge of international law in armed conflict and its relationship to the level of compliance through military simulation video game scenarios. The scenario-based framework is a method used to develop game scenarios. The scenario was developed using an ARMA 3 video game editor and created to describe a situation of armed conflict where the respondent will take action whose results reflect the respondent's level of compliance with international law. Each respondent obtained two types of scores, the first is knowledge scores obtained from filling out questionnaires, and the second is compliance scores obtained from the results of running scenarios in the game. The score is divided into 12 parameters relating to aspects of international law in armed conflict. After the two types of scores are obtained, an analysis is carried out to determine whether the respondent's knowledge level influences the compliance level. The study's results showed that the respondent's knowledge and compliance levels were very high. The results of the comparative analysis show that only ten parameters have a level of knowledge that influences the level of compliance.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121273233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Use of eGovernment in Public Services Area (Case Study: Bojonegoro Regency) 电子政务在公共服务领域的应用(案例研究:Bojonegoro县)
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2836
Hastie Audytra, Rahmat Irsyada
{"title":"Use of eGovernment in Public Services Area (Case Study: Bojonegoro Regency)","authors":"Hastie Audytra, Rahmat Irsyada","doi":"10.31937/ti.v14i2.2836","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2836","url":null,"abstract":"The objective of e-Government is the availability of access to information by the citizen rather than financial benefits. e-Government system is built based on web technology to provide better public services to the citizen. Public services are services provided by the government to the citizen. Bojonegoro itself has several times received awards in the field of Smart City or e-Government. In this study, we want to know how to apply digital government or e-Government in Bojonegoro Regency in the implementation of public services. From the results of the literature study and data collection from 250 public service users, it appears that the applications that are widely used or that attract public interest are national applications that have been around for a long time, such as the Lapor! And online tax service application. Local applications that are being actively socialized actually get the smallest percentage. This study provides recommendations for solutions that can be applied for the implementation of better public services.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126129191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key 利用非对称密钥实现混沌置换多环密码技术
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2837
Aria Lesmana, R. Harwahyu, Y. Suryanto
{"title":"Implementing the Chaotic Permutation Multicircular Cryptography Technique using Asymmetric Key","authors":"Aria Lesmana, R. Harwahyu, Y. Suryanto","doi":"10.31937/ti.v14i2.2837","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2837","url":null,"abstract":"In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a reverser key for reverting the permutation result of CPMC encryption back to its original arrangement using the same function as encryption. The reverser key alongside the CPMC key act as encryption and decryption key pair. The pair key generation and cryptographic function utilizes the encryption function of CPMC technique dubbed CPMC Shrinking algorithm. Asymmetric implementation can simplify CPMC technique by also using CPMC Shrinking algorithm for decryption, therefore enabling it as a single function for encryption and decryption. The asymmetric single function cryptography test show improvement in speed from faster cryptographic speed in decryption compared to initial implementation by average of 75.87%","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Air Temperature Sensor Estimation on Automatic Weather Station Using ARIMA and MLP 基于ARIMA和MLP的自动气象站气温传感器估计
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2865
Harya Wicaksana, Naufal Ananda, Irvan Budiawan, Bayu Santoso, Roy Handoko, A. Maulana, Suciarti Suciarti, A. Utoro
{"title":"Air Temperature Sensor Estimation on Automatic Weather Station Using ARIMA and MLP","authors":"Harya Wicaksana, Naufal Ananda, Irvan Budiawan, Bayu Santoso, Roy Handoko, A. Maulana, Suciarti Suciarti, A. Utoro","doi":"10.31937/ti.v14i2.2865","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2865","url":null,"abstract":"Surface meteorological quantities are now measured by Automatic Weather Station (AWS). AWS Serang records weather parameters minutely in Banten Province of Indonesia. Air temperature sensor is one instrument of this system. This study aims to design an air temperature sensor estimator model using ARIMA and Artificial Neural Network (ANN) as solution for avoiding loss data. Air temperature sensor on AWS Serang data in August of 2022 period is segmented into training, validating and testing sections. Based on criterion calculation, ARIMA (1,1,5) is simulated. It obtains not more than 0.12 of RMSE,  0.0520C of MAE, 0.193% of MAPE and 0.194% of SMAPE. Meanwhile, three different models of MLP ANN for air temperature estimator is also simulated. Input variables include air temperature, relative humidity and solar radiation intensity. Roy model has highest accuracy level for MLP ANN algorithm with 0.048 of RMSE, 0.0260C for MAE, 5% of MAPE and 4.83% of SMAPE.  Overall, ARIMA (1,1,5) is better than Roy MLP ANN model in estimating air temperature sensor data on AWS Serang. Nonetheless, both models are properly fulfilling WMO (World Meteorological Organization) accuracy requirements for air temperature measurement.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":" 46","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132094749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topic Modelling Using VSM-LDA For Document Summarization 基于svm - lda的文档摘要主题建模
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2854
Luthfi Atikah, Novrindah Alvi Hasanah, Agus Zainal Arivin
{"title":"Topic Modelling Using VSM-LDA For Document Summarization","authors":"Luthfi Atikah, Novrindah Alvi Hasanah, Agus Zainal Arivin","doi":"10.31937/ti.v14i2.2854","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2854","url":null,"abstract":"Summarization is a process to simplify the contents of a document by eliminating elements that are considered unimportant but do not reduce the core meaning the document wants to convey. However, as is known, a document will contain more than one topic. So it is necessary to identify the topic so that the summarization process is more effective. Latent Dirichlet Allocation (LDA) is a commonly used method of identifying topics. However, when running a program on a different dataset, LDA experiences \"order effects\", that is, the resulting topic will be different if the train data sequence is changed. In the same document input, LDA will provide inconsistent topics resulting in low coherence values. Therefore, this paper proposes a topic modelling method using a combination of LDA and VSM (Vector Space Model) for automatic summarization. The proposed method can overcome order effects and identify document topics that are calculated based on the TF-IDF weight on VSM generated by LDA. The results of the proposed topic modeling method on the 1300 Twitter data resulted in the highest coherence value reaching 0.72. The summary results obtained Rouge 1 is 0.78, Rouge 2 is 0.67 dan Rouge L is 0.80.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132409608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Social Impact of VR Technology on Society: A Systematic Literature Review 虚拟现实技术对社会的影响:系统的文献综述
Ultimatics : Jurnal Teknik Informatika Pub Date : 2022-12-30 DOI: 10.31937/ti.v14i2.2778
Bakti Amirul Jabar, Millia Azmi, Graciel Hernando, J. Moniaga, Angelique Aurielle Alpaullivarez
{"title":"The Social Impact of VR Technology on Society: A Systematic Literature Review","authors":"Bakti Amirul Jabar, Millia Azmi, Graciel Hernando, J. Moniaga, Angelique Aurielle Alpaullivarez","doi":"10.31937/ti.v14i2.2778","DOIUrl":"https://doi.org/10.31937/ti.v14i2.2778","url":null,"abstract":"Humans are social creatures who usually interact directly. But as technology develops, interactions also use the technology. One of the many popular technologies in the 4.0 era is VR technology. An example of this technology is the metaverse, a combination of the real and virtual worlds. This paper presents a research review to analyze the social impact of Virtual Reality: technology with metaverse. This paper uses a systematic literature review (SLR) as the method. The research was conducted based on the RQ that had been made. There are 18 related articles generated from the search, then reviewed. This study concludes that Social VR has three impacts: Social Presence Illusion, Virtual Embodiment, and the Proteus Effect. In addition, we also explain the ways to create a safe social VR environment, such as by playing with family and friends, educating the public about VR technology, and suggesting that the platform provides an age limit for playing in a VR environment.","PeriodicalId":347196,"journal":{"name":"Ultimatics : Jurnal Teknik Informatika","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131801806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信