Pub Date : 2020-07-02DOI: 10.31937/IJNMT.V7I2.1696
Jason Kuanca
Cultural diffusion occurs. This is evidenced by the existence of cultural heritage artifacts. There are many types of artifacts, tangible or intangible. Folksongs are one of the intangible cultural artifacts. Songs have tone, tone patterns are a unique feature of a song. Regional province songs are the identity of each region, because songs are images of the culture of an area. This study uses folk songs from each province in Indonesia which are extracted features by applying Gabor filters and then differences in output and geographical distance are put into linear regression. The results show that the tone pattern feature have a correlation relationship with the distance between regions throughout Indonesia. When observing the scope per large island, there is also correlation between the number of tone patterns with the distance of province. However, this has less confidence result for Sumatra island.
{"title":"You Are What You Sing: Folksong Tone Pattern Feature Correlation to Geographical Distance with Gabor Filter and OLS Linear Regression","authors":"Jason Kuanca","doi":"10.31937/IJNMT.V7I2.1696","DOIUrl":"https://doi.org/10.31937/IJNMT.V7I2.1696","url":null,"abstract":"\u0000 \u0000 \u0000Cultural diffusion occurs. This is evidenced by the existence of cultural heritage artifacts. There are many types of artifacts, tangible or intangible. Folksongs are one of the intangible cultural artifacts. Songs have tone, tone patterns are a unique feature of a song. Regional province songs are the identity of each region, because songs are images of the culture of an area. This study uses folk songs from each province in Indonesia which are extracted features by applying Gabor filters and then differences in output and geographical distance are put into linear regression. The results show that the tone pattern feature have a correlation relationship with the distance between regions throughout Indonesia. When observing the scope per large island, there is also correlation between the number of tone patterns with the distance of province. However, this has less confidence result for Sumatra island. \u0000 \u0000 \u0000","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-16DOI: 10.31937/IJNMT.V6I2.1248
Wella Wella, Laurentia Chia
In 2015 ISO 9001 significantly reviewed and new requirements for certification were introduced. One of the new requirements is risk-based thinking. The risk-based thinking has to be addressed and managed in all aspects of quality management system processes and functions. In ISO 9001:2015 an organization required to take into those risk linked to quality and customer satisfaction. Risk management can be a guideline for the implementation of ISO 9001:2015. This research is only focused on information technology department at PT Softex Indonesia. The methodology of this implementation applies the seventh clause of ISO 9001:2015. Measurements performed by using maturity model and seventh audit stage. After the implementation, the organization needs to maintain the requirements of ISO 9001:2015 and try to continuously improve its quality performance.
{"title":"The Implementing ISO 9001 In Manufacture Industry","authors":"Wella Wella, Laurentia Chia","doi":"10.31937/IJNMT.V6I2.1248","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I2.1248","url":null,"abstract":"In 2015 ISO 9001 significantly reviewed and new requirements for certification were introduced. One of the new requirements is risk-based thinking. The risk-based thinking has to be addressed and managed in all aspects of quality management system processes and functions. In ISO 9001:2015 an organization required to take into those risk linked to quality and customer satisfaction. Risk management can be a guideline for the implementation of ISO 9001:2015. This research is only focused on information technology department at PT Softex Indonesia. The methodology of this implementation applies the seventh clause of ISO 9001:2015. Measurements performed by using maturity model and seventh audit stage. After the implementation, the organization needs to maintain the requirements of ISO 9001:2015 and try to continuously improve its quality performance.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124034245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1039
E. B. Setiawan, Muhammad Tahir
Abstract— Based on Indonesia Health Research Data globally the number one cause of death is caused by cardiovascular diseases, namely heart and blood vessel function disorders such as Coronary Heart Disease, Heart Failure or Heart Disease, Hypertension and Stroke. In 2008 it was estimated that 17.3 million deaths were caused by cardiovascular disease, and more than 3 million of these deaths occurred before the age of 60 years where this age could have been prevented. With the advancement in technology, it is now needed tools/applications that can monitor heart conditions at any time and any time to prevent deaths caused by sudden heart attacks. The research method used is the QRS approach and use AD8232 to get ECG data. Where to prove the results of the research conducted are appropriate or not by comparing the real ECG data in the hospital with ECG data obtained from the results of the study. The results of testing the data collected in this study can be said that the data in the application built is almost matched with the data obtained from the test results using hospital tools, with a data matching percentage of 96% for QRS interval and 90% for RR interval. Index Terms— ECG, AD8232, QRS Interval, RR Interval.
{"title":"Electrocardiogram (ECG) Application for Checking Heart Conditions Based on Android","authors":"E. B. Setiawan, Muhammad Tahir","doi":"10.31937/IJNMT.V6I1.1039","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1039","url":null,"abstract":"Abstract— Based on Indonesia Health Research Data globally the number one cause of death is caused by cardiovascular diseases, namely heart and blood vessel function disorders such as Coronary Heart Disease, Heart Failure or Heart Disease, Hypertension and Stroke. In 2008 it was estimated that 17.3 million deaths were caused by cardiovascular disease, and more than 3 million of these deaths occurred before the age of 60 years where this age could have been prevented. With the advancement in technology, it is now needed tools/applications that can monitor heart conditions at any time and any time to prevent deaths caused by sudden heart attacks. The research method used is the QRS approach and use AD8232 to get ECG data. Where to prove the results of the research conducted are appropriate or not by comparing the real ECG data in the hospital with ECG data obtained from the results of the study. The results of testing the data collected in this study can be said that the data in the application built is almost matched with the data obtained from the test results using hospital tools, with a data matching percentage of 96% for QRS interval and 90% for RR interval. \u0000Index Terms— ECG, AD8232, QRS Interval, RR Interval.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133234856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1040
Rossevine Artha Nathasya, Oscar Karnalim
According to several works, Program Visualization (PV) enhances student understanding further about how a particular program works. However, to our knowledge, no PVs utilize color gradation as a part of their features, even though color plays an important role in visualization. Therefore, two uses of color gradation on PV are proposed on this paper. On the one hand, color gradation can be used to display execution frequency of each instruction; instruction with higher execution frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program complexity. On the other hand, color gradation can also be used to display access frequency of each variable; variable with higher access frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program-to-variable dependency. Both uses are proved to be effective for learning programming according to our evaluation. Index Terms—program visualization, color gradation, program complexity, program-to-variable dependency, computer science education
{"title":"The Use of Color Gradation on Program Visualization for Learning Programming","authors":"Rossevine Artha Nathasya, Oscar Karnalim","doi":"10.31937/IJNMT.V6I1.1040","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1040","url":null,"abstract":"According to several works, Program Visualization (PV) enhances student understanding further about how a particular program works. However, to our knowledge, no PVs utilize color gradation as a part of their features, even though color plays an important role in visualization. Therefore, two uses of color gradation on PV are proposed on this paper. On the one hand, color gradation can be used to display execution frequency of each instruction; instruction with higher execution frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program complexity. On the other hand, color gradation can also be used to display access frequency of each variable; variable with higher access frequency will be assigned with more-prominent color. Such piece of information is expected to help student for understanding program-to-variable dependency. Both uses are proved to be effective for learning programming according to our evaluation. \u0000Index Terms—program visualization, color gradation, program complexity, program-to-variable dependency, computer science education","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128254383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1070
Erick Fernando, Surjandy Surjandy, M. Irsan, Hetty Rohayani A H, F. Fachruddin
In this article, it aims to present the AES encryption on the Raspberry Pi mini pc. this application also aims to illustrate that this AES algorithm can be applied with small resources. This research was conducted with an experimental approach, which carried out the implementation process in mini pc hardware and xampp software (php, apache). This AES algorithm is tested by PHP programming with Apache web server with text data. The results of the study, that the AES algorithm can run well with a hard minimum, like raspberry mini pc with a very fast time in the process, speed in the process and a lot of text data. So, AES algorithm can be widely adopted for various applications from raspberry PI mini pc computers with strong practicality in information security and reliability.
{"title":"Review on Realization of AES 256bit Encryption with Raspberry Pi","authors":"Erick Fernando, Surjandy Surjandy, M. Irsan, Hetty Rohayani A H, F. Fachruddin","doi":"10.31937/IJNMT.V6I1.1070","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1070","url":null,"abstract":"In this article, it aims to present the AES encryption on the Raspberry Pi mini pc. this application also aims to illustrate that this AES algorithm can be applied with small resources. This research was conducted with an experimental approach, which carried out the implementation process in mini pc hardware and xampp software (php, apache). This AES algorithm is tested by PHP programming with Apache web server with text data. The results of the study, that the AES algorithm can run well with a hard minimum, like raspberry mini pc with a very fast time in the process, speed in the process and a lot of text data. So, AES algorithm can be widely adopted for various applications from raspberry PI mini pc computers with strong practicality in information security and reliability.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134208539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The existence of counterfeit money is often troubling the public. The solution given by the government to be careful of counterfeit money is by means of 3D (seen, touched and looked at). However, this step has not been perfectly able to distinguish real money and fake money. So there is a need for a system to help detect the authenticity of money. Therefore, in this study a system was designed that can detect the authenticity of rupiah and its nominal value. For data acquisition, this system uses detection boxes, ultraviolet lights and smartphone cameras. As for feature extraction, this system uses segmentation methods. The segmentation method based on the threshold value is used to obtain an invisible ink pattern which is a characteristic of real money along with the nominal value of the money. The feature is then used in the stage of detection of money authenticity using FKNN (Fuzzy K-Nearest Neighbor) method. From 24 test data, obtained an average accuracy of 96%. This shows that the system built can detect the authenticity and nominal value of the rupiah well.
{"title":"Identification of Authenticity and Nominal Value of Indonesia Banknotes Using Fuzzy KNearest Neighbor Method","authors":"Ricky Ramadhan, J. Y. Sari, Ika Purwanti Ningrum","doi":"10.31937/IJNMT.V6I1.989","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.989","url":null,"abstract":"The existence of counterfeit money is often troubling the public. The solution given by the government to be careful of counterfeit money is by means of 3D (seen, touched and looked at). However, this step has not been perfectly able to distinguish real money and fake money. So there is a need for a system to help detect the authenticity of money. Therefore, in this study a system was designed that can detect the authenticity of rupiah and its nominal value. For data acquisition, this system uses detection boxes, ultraviolet lights and smartphone cameras. As for feature extraction, this system uses segmentation methods. The segmentation method based on the threshold value is used to obtain an invisible ink pattern which is a characteristic of real money along with the nominal value of the money. The feature is then used in the stage of detection of money authenticity using FKNN (Fuzzy K-Nearest Neighbor) method. From 24 test data, obtained an average accuracy of 96%. This shows that the system built can detect the authenticity and nominal value of the rupiah well.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1059
R. Wahdiniwaty, E. B. Setiawan, Fajri Auliardi, D. A. Wahab
Abstract—Traveling is a fun activity. Everyone has a different preference for the type of tour they like. Some like nature tourism, culinary tours, religious tourism, and other tourism. Problems encountered by tourists when planning tourism activities, usually do not know complete information related to tourist destinations that will be visited, and can not make weather forecasts from the destination tourist destination. This research aims to provide a model travel recommendation that is implemented into the Android mobile application so that tourists can be given recommendations on which tourism destinations are most suitable based on the criteria that are the assessment criteria, namely the price of tourist accommodation, weather and rating of tourist attractions. Mobile technology used is using GPS sensors, Google Maps API, Open WeatherMap API, and Facebook API. Based on the results of testing, the application in this research can help in recommending tourist attractions that meet the criteria desired by tourists.
{"title":"Application Model for Travel Recommendations Based on Android","authors":"R. Wahdiniwaty, E. B. Setiawan, Fajri Auliardi, D. A. Wahab","doi":"10.31937/IJNMT.V6I1.1059","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1059","url":null,"abstract":"Abstract—Traveling is a fun activity. Everyone has a different preference for the type of tour they like. Some like nature tourism, culinary tours, religious tourism, and other tourism. Problems encountered by tourists when planning tourism activities, usually do not know complete information related to tourist destinations that will be visited, and can not make weather forecasts from the destination tourist destination. This research aims to provide a model travel recommendation that is implemented into the Android mobile application so that tourists can be given recommendations on which tourism destinations are most suitable based on the criteria that are the assessment criteria, namely the price of tourist accommodation, weather and rating of tourist attractions. Mobile technology used is using GPS sensors, Google Maps API, Open WeatherMap API, and Facebook API. Based on the results of testing, the application in this research can help in recommending tourist attractions that meet the criteria desired by tourists.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many system development consultants nowadays using the XP framework (eXtreme Programming) in software development, This is based on the needs of the era where software can be completed quickly and when user software development is involved. The XP framework does not need too many team members, so it emphasizes effectiveness of work. In software development must begin with good planning to avoid patchwork (software crisis) in software development. The stage in research on the development of rental heavy equipment applications with an XP framework start from planning, designing, coding, testing and releasing software. Studies that do in this research include: literature studies, interviews, observations, document examinations. Next is do the analysis on the application made, and make documentation for system development. That was done as a system analysis and system design in the research. The selection of the right framework at the time of application development is very important, so that the application can be completed on time. The XP framework focuses more on making programs, the system design is enough with the CRC (Class Responsibility Collaborator). In the framework of XP, it always involves users during application development. Each module made by programmers that always tested by the system test section, so the applications that are made can be completed on time, suitable with user needs, and have high quality.
{"title":"- Development of Heavy Equipment Rental System Using eXtreme Programming Method","authors":"J. Andry","doi":"10.31937/ijnmt.v6i1.966","DOIUrl":"https://doi.org/10.31937/ijnmt.v6i1.966","url":null,"abstract":"Many system development consultants nowadays using the XP framework (eXtreme Programming) in software development, This is based on the needs of the era where software can be completed quickly and when user software development is involved. The XP framework does not need too many team members, so it emphasizes effectiveness of work. In software development must begin with good planning to avoid patchwork (software crisis) in software development. The stage in research on the development of rental heavy equipment applications with an XP framework start from planning, designing, coding, testing and releasing software. Studies that do in this research include: literature studies, interviews, observations, document examinations. Next is do the analysis on the application made, and make documentation for system development. That was done as a system analysis and system design in the research. The selection of the right framework at the time of application development is very important, so that the application can be completed on time. The XP framework focuses more on making programs, the system design is enough with the CRC (Class Responsibility Collaborator). In the framework of XP, it always involves users during application development. Each module made by programmers that always tested by the system test section, so the applications that are made can be completed on time, suitable with user needs, and have high quality.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116776025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1058
R. Novia, Wella
Service quality is a measurement from users’ hope to the company in fulfilling their needs and desires also service delivery accuracy. Technology and information services can help the company in supporting the company’s business operations. Therefore, the company needs to apply ITSM (Information Technology Service Management) as an operational approach of technology and information services to keep the service quality in the company. The framework that is focusing on providing technology and information services which can be used as a guide is the ITIL framework (Information Technology Infrastructure Library). This research is conducted at PT Pertamina (Persero). The research is conducted using the 2011 ITIL framework on Domain Service Operation with 5 processes in it which are Incident Management, Request Fulfillment, Event Management, Access Management, and Problem Management. The methods that are used in this research are interview and questionnaires. This research is conducted based on research steps by Gallegos 2008, which consist of 5 steps such as the planning, the field checking, the report, and the follow-up. Based on the research conducted there are three processes that are stopped at level 1 which is Incident Management with score 62.54%, Problem Management with score 79.08% and Request Fulfillment with score 81.09%. Meanwhile, on the Access Management process achieve 86.00% and Access Management is stopped at level 2 with score 77,23%.
{"title":"ITIL 2011: Maturity Level of Service Operation","authors":"R. Novia, Wella","doi":"10.31937/IJNMT.V6I1.1058","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1058","url":null,"abstract":"Service quality is a measurement from users’ hope to the company in fulfilling their needs and desires also service delivery accuracy. Technology and information services can help the company in supporting the company’s business operations. Therefore, the company needs to apply ITSM (Information Technology Service Management) as an operational approach of technology and information services to keep the service quality in the company. The framework that is focusing on providing technology and information services which can be used as a guide is the ITIL framework (Information Technology Infrastructure Library). This research is conducted at PT Pertamina (Persero). The research is conducted using the 2011 ITIL framework on Domain Service Operation with 5 processes in it which are Incident Management, Request Fulfillment, Event Management, Access Management, and Problem Management. The methods that are used in this research are interview and questionnaires. This research is conducted based on research steps by Gallegos 2008, which consist of 5 steps such as the planning, the field checking, the report, and the follow-up. Based on the research conducted there are three processes that are stopped at level 1 which is Incident Management with score 62.54%, Problem Management with score 79.08% and Request Fulfillment with score 81.09%. Meanwhile, on the Access Management process achieve 86.00% and Access Management is stopped at level 2 with score 77,23%.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1041
Ryan Adiputra, N. Iswari, Wella Wella
Lipstick is a lip color which available in many colors. A research said instant valuation of woman personality can be figured by their lipstick color choice. Therefore there is a necessity to use the right lipstick color to obtain a harmony between personality and appearance. This experiment was conducted to give lipstick color recommendation by using K-Nearest Neighbors algorithm, and Myers-Briggs Type Indicator (MBTI) personality test instrument. The system was built on Android application. Euclidean distance value is affected by 5 factors which are age, introvert, sensing, thinking, and judging. Lipstick color recommendation is obtained by fetching 7 training data with nearest Euclidean distance when compared to personality test result. The colors used in this experiment are nude, pink, red, orange, and purple. After evaluation, it is obtained the application’s accuracy of 87.38% which considered as good classification, both precision and recall with 75.68% which considered as fair classification. The score for software quality is 79.13% which considered as good quality. Keywords—K-Nearest Neighbors, Data Mining, Myers-Briggs Type Indicator,Recommender System, Lipstick.
{"title":"Personality Based Lipstick Color Recommender System using K-Nearest Neighbors Algorithm","authors":"Ryan Adiputra, N. Iswari, Wella Wella","doi":"10.31937/IJNMT.V6I1.1041","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1041","url":null,"abstract":"Lipstick is a lip color which available in many colors. A research said instant valuation of woman personality can be figured by their lipstick color choice. Therefore there is a necessity to use the right lipstick color to obtain a harmony between personality and appearance. This experiment was conducted to give lipstick color recommendation by using K-Nearest Neighbors algorithm, and Myers-Briggs Type Indicator (MBTI) personality test instrument. The system was built on Android application. Euclidean distance value is affected by 5 factors which are age, introvert, sensing, thinking, and judging. Lipstick color recommendation is obtained by fetching 7 training data with nearest Euclidean distance when compared to personality test result. The colors used in this experiment are nude, pink, red, orange, and purple. After evaluation, it is obtained the application’s accuracy of 87.38% which considered as good classification, both precision and recall with 75.68% which considered as fair classification. The score for software quality is 79.13% which considered as good quality. \u0000Keywords—K-Nearest Neighbors, Data Mining, Myers-Briggs Type Indicator,Recommender System, Lipstick. \u0000 ","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}