T. Prabowo, Wing Wahyu Winarno, Sudarmawan Sudarmawan
{"title":"Analysis of Technology Acceptance Model Method To Predict A Person's Interest In The Acceptance of A Technology : A Literature Review","authors":"T. Prabowo, Wing Wahyu Winarno, Sudarmawan Sudarmawan","doi":"10.31289/jite.v4i1.3986","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3986","url":null,"abstract":"The Technology Acceptance Model (TAM) is a model used by researchers to predict and analyse factors that influence a person's interest in a technology. The purpose of this literature review is to find out how the interests of users of an information system are investigated. This literature review is based on a thorough review of the research and a descriptive discussion based on previous studies that investigate the acceptance of an information system. Previous researchers have used good research methods and research steps, so the results of the study can also give an idea of how user interests strongly influence the usefulness and actual actions when using an information system. The results of a systematic review show that the TAM method for predicting an individual's interest in accepting an information technology relationship between constructs used is a determinant that can measure interest in user behavior and also a determinant that can predict and explain interest in user behavior. Keywords: Technology Acceptance Model, Behavior Interests, User Behavior.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80822025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Taufik Rahman, M. U. Nuha, H. Kuswanto, Felix Wuryo Handono
{"title":"Android-based GO-COURSE Application with Location Based Services Method","authors":"Taufik Rahman, M. U. Nuha, H. Kuswanto, Felix Wuryo Handono","doi":"10.31289/jite.v4i1.3765","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3765","url":null,"abstract":"Advances in technology in the field of Android-based applications are expected to bring changes in the world of education intended for English language education. At present the method of searching institute courses that are present in a variety of applications offered, but the existing applications are not yet complete on this matter related to the applications offered do not meet the specific needs of the course institution search applications that are provided in the English village pare. LBS and algotima dijkstra can be used in the analysis and design of android-based applications, it is required an application to search for locations such as applications needed by user in addition to places of study can also find a place to spend the night while studying, where traveling provides the facilities that have been provided. The results of the Go-Course application can conclude that it must meet the needs of users to carry out the process of finding a chair, boarding house, boarding house and travel package from a smartphone by providing a fairly accurate position. By applying the Djikstra algorithm to the Go-Course Application, you can set the shortest route to the boarding house and boarding house with the user's position and current distance in the form of a map. All functions in the Go-Cource application for finding seats, boarding, boarding and tour packages can run correctly through Blackbox Testing and in accordance with manufacturing recommendations. Keywords: LBS, Dijkstra, Android, GPS, Go-Course.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79861538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute Selection in Naive Bayes Algorithm Using Genetic Algorithms and Bagging for Prediction of Liver Disease","authors":"Dwi Yuni Utami, Elah Nurlelah, Noer Hikmah","doi":"10.31289/jite.v4i1.3793","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3793","url":null,"abstract":"Liver disease is an inflammatory disease of the liver and can cause the liver to be unable to function as usual and even cause death. According to WHO (World Health Organization) data, almost 1.2 million people per year, especially in Southeast Asia and Africa, have died from liver disease. The problem that usually occurs is the difficulty of recognizing liver disease early on, even when the disease has spread. This study aims to compare and evaluate Naive Bayes algorithm as a selected algorithm and Naive Bayes algorithm based on Genetic Algorithm (GA) and Bagging to find out which algorithm has a higher accuracy in predicting liver disease by processing a dataset taken from the UCI Machine Learning Repository database (GA). University of California Invene). From the results of testing by evaluating both the confusion matrix and the ROC curve, it was proven that the testing carried out by the Naive Bayes Optimization algorithm using Algortima Genetics and Bagging has a higher accuracy value than only using the Naive Bayes algorithm. The accuracy value for the Naive Bayes algorithm model is 66.66% and the accuracy value for the Naive Bayes model with attribute selection using Genetic Algorithms and Bagging is 72.02%. Based on this value, the difference in accuracy is 5.36%. Keywords: Liver Disease, Naive Bayes, Genetic Agorithms, Bagging.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79611738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Simulation Definite Integral Application learning Using Trapezoid Method based on VB.Net","authors":"N. Dharshinni, A. Saleh, F. Azmi, I. Fawwaz","doi":"10.31289/jite.v4i1.3880","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3880","url":null,"abstract":"The definite integral is one of the subjects that is difficult for students to understand because the process of calculating definite integral of functions is quite complicated and long because it requires mastery of some integrating rules so an interactive learning simulation application is needed to make it easier for students to calculate definite integral of functions and the depiction of the area the curve. One method for calculating definite integrals is the trapezoid method. The trapezoid method works by dividing the boundary into 2 intervals namely x = x0 to x = x1. Simulation media application learning will be designed with the VB.Net programming language. This simulation media learning starts with reading and checking data input. The process is continued by displaying the depiction of the input curve and ending with calculating the area of the curve. Simulation media learning provides a facility to store the input data, the results of the calculation of the area and the image of the curve function in the image format of * .bmp. In this media, the media and material expert’s the results of the average are produced by 88.68% included into media category is very valid media and the results of pre-test and post-test trials showed an increase with an average value of 48.3 for pre-test and 87 for the post-test of the passing grade requirement of 70. Keywords: Definite Integral, Trapezoid Method,VB.Net, Media Validation.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81464502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack","authors":"H. .","doi":"10.31289/jite.v4i1.3832","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3832","url":null,"abstract":"The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security. Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90926717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Role of Digital Marketing and Self Image Improving Student Self Presentation in Batam Using Instagram","authors":"M. Ardiansyah","doi":"10.31289/jite.v4i1.3849","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3849","url":null,"abstract":"Nowadays Students often use social media as a tool to communicate and search for a lot of information, social media can also influence changes in the self-image of students shared on social media. This study aims to determine the large social media users of Instagram among students, to analyze Instagram social media as a tool used by students in self-development and self-image, to know the importance of digital marketing in shaping student self-image, analyzing the development of students' Self Presentations, knowing how large students in showing self-image using Instagram social media, knowing the importance of Self Presentation within the university. This study uses variables namely digital marketing, and Self Image as independent variables, Self Presentation as the dependent variable. The target respondents of this study were all university students in the city of Batam by using a sample of 392 students. This research concluded that self image plays a role in shaping student self-appearance because students try to look neat and attractive when uploading videos on Instagram Stories about themselves, wanting to look good in photos or videos, so users can display a good image and other Instagram users who see can give good comments as well. Keywords: Social Media, Instagram, Digital Marketing, Self Image, Self Presentation.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89344288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis on Corona Virus Pandemic Using Machine Learning Algorithm","authors":"Ricky Risnantoyo, A. Nugroho, Kresna Mandara","doi":"10.31289/jite.v4i1.3798","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3798","url":null,"abstract":"Corona virus outbreaks that occur in almost all countries in the world have an impact not only in the health sector, but also in other sectors such as tourism, finance, transportation, etc. This raises a variety of sentiments from the public with the emergence of corona virus as a trending topic on Twitter social media. Twitter was chosen by the public because it can disseminate information in real time and can see market reactions quickly. This research uses \"tweet\" data or public tweet related to \"Corona Virus\" to see how the sentiment polarity arises. Text mining techniques and three machine learning classification algorithms are used, including Naive Bayes, Support Vector Machine (SVM), K-Nearest Neighbor (K-NN) to build a tweet classification model of sentiments whether they have positive, negative, or neutral polarity. The highest test results are generated by the Support Vector Machine (SVM) algorithm with an accuracy value of 76.21%, a precision value of 78.04%, and a recall value of 71.42%. Keywords: Machine Learning, Corona Virus, Twitter, Sentiment Analysis.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81852051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mufid Junaedi, Ahmad Fachrurozi, Mochammad Rizky Kusumayudha, W. Gata
{"title":"Analysis of the classification of terrorist attacks in Indonesia","authors":"Mufid Junaedi, Ahmad Fachrurozi, Mochammad Rizky Kusumayudha, W. Gata","doi":"10.31289/jite.v4i1.3788","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3788","url":null,"abstract":"Terrorist attacks are now being global issue both in developing and developed countries. There are more than 180,000 terrorist attacks in 1970-2017. Indonesia is one of the countries attacked by terorist. Bombings and firearms cause fatalities. Classification of terorist attacks can be performed based on either the attack succed or not. Succed attack is defined as an unavoided action that caused fatalities. There are seven attributes studied in this paper: year, month, attack type, terorist name, target attack, city, and weapon type uses to attack. Evaluations shows that k-NN classiefier exerts the highest accuracy of 90.79%, followed by naive bayes 80.45%, and C4.5 of 88.825%. Keywords: Indonesia Terrorist, Classification Algorithm, Terorist Algorithm Classification.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73872477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Calculation Application for Subnetting IPv4 Address on Android","authors":"S. Hidayatulloh, Prawira Maulana Ilham, M. Lase","doi":"10.31289/jite.v4i1.3827","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3827","url":null,"abstract":"Calculation of subnetting IP Address manually is quite time consuming and difficult for people who are just learning. With current smartphone technology, especially those using the Android operating system. There are many things that can be done with smartphones nowadays, including studying subnetting IP address calculations. The purpose of this study is to design and build a mobile application to facilitate the study of subnetting IP Address calculations with the Android operating system. The research method used is a waterfall with stages of requirements, design, implementation, and testing. This research resulted in a mobile application for calculating IP Address subnetting that will facilitate studying and accelerating the calculation of IP Address subnetting. This application is able to search for subnet masks, number of subnets, number of hosts per subnet, IP broadcast, IP range, network ID, and there is a theoretical explanation of the IP Address, prefix, and range of each class of IP Address. The results of the study are indicated by the level of eligibility of this application based on a questionnaire from users with results, 41% strongly agree, 44% agree, 13% neutral, and 2% disagree. Keywords: IP Address, Subneting, Application, Android.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80312391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis Naïve Bayes In Classifying Fruit by Utilizing Hog Feature Extraction","authors":"Muhathir Muhathir, M. H. Santoso","doi":"10.31289/jite.v4i1.3860","DOIUrl":"https://doi.org/10.31289/jite.v4i1.3860","url":null,"abstract":"Indonesia has abundant natural resources, especially the results of its plantations. Lots of local fruit that can be used starting from the root to the skin of the fruit. Local fruit can be consumed as fresh fruit and can also be processed into drinks and food. This is reflected in the diversity of tropical fruits found in Indonesia. Fruits that are rich in benefits and can be used as medicines such as Apples, Avocados, Apricots, and Bananas. These fruits are often found around us. In Indonesia these fruits are produced and also exported abroad. However, the limited methods and technology used to classify this fruit are interesting things to discuss and become the main focus in this research. This study analyzed using the Naive Bayes algorithm and feature extraction of HOG (Oriented Gradient Histogram) to obtain more effective classification results. The results showed that the collection of fruit using the Naive Bayes method and HOG feature extraction had not yet obtained maximum classification results, only with an accuracy of 56.52%. Keywords – Apple, Avocado, Apricot, Banana, Naive Bayes, HOG.","PeriodicalId":43632,"journal":{"name":"Journal of Information Technology Education-Innovations in Practice","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2020-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81500609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}