The existence of counterfeit money is often troubling the public. The solution given by the government to be careful of counterfeit money is by means of 3D (seen, touched and looked at). However, this step has not been perfectly able to distinguish real money and fake money. So there is a need for a system to help detect the authenticity of money. Therefore, in this study a system was designed that can detect the authenticity of rupiah and its nominal value. For data acquisition, this system uses detection boxes, ultraviolet lights and smartphone cameras. As for feature extraction, this system uses segmentation methods. The segmentation method based on the threshold value is used to obtain an invisible ink pattern which is a characteristic of real money along with the nominal value of the money. The feature is then used in the stage of detection of money authenticity using FKNN (Fuzzy K-Nearest Neighbor) method. From 24 test data, obtained an average accuracy of 96%. This shows that the system built can detect the authenticity and nominal value of the rupiah well.
{"title":"Identification of Authenticity and Nominal Value of Indonesia Banknotes Using Fuzzy KNearest Neighbor Method","authors":"Ricky Ramadhan, J. Y. Sari, Ika Purwanti Ningrum","doi":"10.31937/IJNMT.V6I1.989","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.989","url":null,"abstract":"The existence of counterfeit money is often troubling the public. The solution given by the government to be careful of counterfeit money is by means of 3D (seen, touched and looked at). However, this step has not been perfectly able to distinguish real money and fake money. So there is a need for a system to help detect the authenticity of money. Therefore, in this study a system was designed that can detect the authenticity of rupiah and its nominal value. For data acquisition, this system uses detection boxes, ultraviolet lights and smartphone cameras. As for feature extraction, this system uses segmentation methods. The segmentation method based on the threshold value is used to obtain an invisible ink pattern which is a characteristic of real money along with the nominal value of the money. The feature is then used in the stage of detection of money authenticity using FKNN (Fuzzy K-Nearest Neighbor) method. From 24 test data, obtained an average accuracy of 96%. This shows that the system built can detect the authenticity and nominal value of the rupiah well.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1059
R. Wahdiniwaty, E. B. Setiawan, Fajri Auliardi, D. A. Wahab
Abstract—Traveling is a fun activity. Everyone has a different preference for the type of tour they like. Some like nature tourism, culinary tours, religious tourism, and other tourism. Problems encountered by tourists when planning tourism activities, usually do not know complete information related to tourist destinations that will be visited, and can not make weather forecasts from the destination tourist destination. This research aims to provide a model travel recommendation that is implemented into the Android mobile application so that tourists can be given recommendations on which tourism destinations are most suitable based on the criteria that are the assessment criteria, namely the price of tourist accommodation, weather and rating of tourist attractions. Mobile technology used is using GPS sensors, Google Maps API, Open WeatherMap API, and Facebook API. Based on the results of testing, the application in this research can help in recommending tourist attractions that meet the criteria desired by tourists.
{"title":"Application Model for Travel Recommendations Based on Android","authors":"R. Wahdiniwaty, E. B. Setiawan, Fajri Auliardi, D. A. Wahab","doi":"10.31937/IJNMT.V6I1.1059","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1059","url":null,"abstract":"Abstract—Traveling is a fun activity. Everyone has a different preference for the type of tour they like. Some like nature tourism, culinary tours, religious tourism, and other tourism. Problems encountered by tourists when planning tourism activities, usually do not know complete information related to tourist destinations that will be visited, and can not make weather forecasts from the destination tourist destination. This research aims to provide a model travel recommendation that is implemented into the Android mobile application so that tourists can be given recommendations on which tourism destinations are most suitable based on the criteria that are the assessment criteria, namely the price of tourist accommodation, weather and rating of tourist attractions. Mobile technology used is using GPS sensors, Google Maps API, Open WeatherMap API, and Facebook API. Based on the results of testing, the application in this research can help in recommending tourist attractions that meet the criteria desired by tourists.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1041
Ryan Adiputra, N. Iswari, Wella Wella
Lipstick is a lip color which available in many colors. A research said instant valuation of woman personality can be figured by their lipstick color choice. Therefore there is a necessity to use the right lipstick color to obtain a harmony between personality and appearance. This experiment was conducted to give lipstick color recommendation by using K-Nearest Neighbors algorithm, and Myers-Briggs Type Indicator (MBTI) personality test instrument. The system was built on Android application. Euclidean distance value is affected by 5 factors which are age, introvert, sensing, thinking, and judging. Lipstick color recommendation is obtained by fetching 7 training data with nearest Euclidean distance when compared to personality test result. The colors used in this experiment are nude, pink, red, orange, and purple. After evaluation, it is obtained the application’s accuracy of 87.38% which considered as good classification, both precision and recall with 75.68% which considered as fair classification. The score for software quality is 79.13% which considered as good quality. Keywords—K-Nearest Neighbors, Data Mining, Myers-Briggs Type Indicator,Recommender System, Lipstick.
{"title":"Personality Based Lipstick Color Recommender System using K-Nearest Neighbors Algorithm","authors":"Ryan Adiputra, N. Iswari, Wella Wella","doi":"10.31937/IJNMT.V6I1.1041","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1041","url":null,"abstract":"Lipstick is a lip color which available in many colors. A research said instant valuation of woman personality can be figured by their lipstick color choice. Therefore there is a necessity to use the right lipstick color to obtain a harmony between personality and appearance. This experiment was conducted to give lipstick color recommendation by using K-Nearest Neighbors algorithm, and Myers-Briggs Type Indicator (MBTI) personality test instrument. The system was built on Android application. Euclidean distance value is affected by 5 factors which are age, introvert, sensing, thinking, and judging. Lipstick color recommendation is obtained by fetching 7 training data with nearest Euclidean distance when compared to personality test result. The colors used in this experiment are nude, pink, red, orange, and purple. After evaluation, it is obtained the application’s accuracy of 87.38% which considered as good classification, both precision and recall with 75.68% which considered as fair classification. The score for software quality is 79.13% which considered as good quality. \u0000Keywords—K-Nearest Neighbors, Data Mining, Myers-Briggs Type Indicator,Recommender System, Lipstick. \u0000 ","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130020845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-30DOI: 10.31937/IJNMT.V6I1.1058
R. Novia, Wella
Service quality is a measurement from users’ hope to the company in fulfilling their needs and desires also service delivery accuracy. Technology and information services can help the company in supporting the company’s business operations. Therefore, the company needs to apply ITSM (Information Technology Service Management) as an operational approach of technology and information services to keep the service quality in the company. The framework that is focusing on providing technology and information services which can be used as a guide is the ITIL framework (Information Technology Infrastructure Library). This research is conducted at PT Pertamina (Persero). The research is conducted using the 2011 ITIL framework on Domain Service Operation with 5 processes in it which are Incident Management, Request Fulfillment, Event Management, Access Management, and Problem Management. The methods that are used in this research are interview and questionnaires. This research is conducted based on research steps by Gallegos 2008, which consist of 5 steps such as the planning, the field checking, the report, and the follow-up. Based on the research conducted there are three processes that are stopped at level 1 which is Incident Management with score 62.54%, Problem Management with score 79.08% and Request Fulfillment with score 81.09%. Meanwhile, on the Access Management process achieve 86.00% and Access Management is stopped at level 2 with score 77,23%.
{"title":"ITIL 2011: Maturity Level of Service Operation","authors":"R. Novia, Wella","doi":"10.31937/IJNMT.V6I1.1058","DOIUrl":"https://doi.org/10.31937/IJNMT.V6I1.1058","url":null,"abstract":"Service quality is a measurement from users’ hope to the company in fulfilling their needs and desires also service delivery accuracy. Technology and information services can help the company in supporting the company’s business operations. Therefore, the company needs to apply ITSM (Information Technology Service Management) as an operational approach of technology and information services to keep the service quality in the company. The framework that is focusing on providing technology and information services which can be used as a guide is the ITIL framework (Information Technology Infrastructure Library). This research is conducted at PT Pertamina (Persero). The research is conducted using the 2011 ITIL framework on Domain Service Operation with 5 processes in it which are Incident Management, Request Fulfillment, Event Management, Access Management, and Problem Management. The methods that are used in this research are interview and questionnaires. This research is conducted based on research steps by Gallegos 2008, which consist of 5 steps such as the planning, the field checking, the report, and the follow-up. Based on the research conducted there are three processes that are stopped at level 1 which is Incident Management with score 62.54%, Problem Management with score 79.08% and Request Fulfillment with score 81.09%. Meanwhile, on the Access Management process achieve 86.00% and Access Management is stopped at level 2 with score 77,23%.","PeriodicalId":110831,"journal":{"name":"IJNMT (International Journal of New Media Technology)","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122794900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}