A. Anton, Novia Farhan Nissa, Angelia Janiati, Nilam Cahya, P. Astuti
Facial skin is skin that protects the inside of the face such as the eyes, nose, mouth, and others. Facial skin consists of several types, including normal skin, oily skin, dry skin, and combination skin. This is a problem for women because it is difficult to recognize and distinguish their skin types this is what causes some women to find it difficult to determine the right make-up and care products for their skin types. In this study, the Convolutional Neural Network (CNN) method is the right method for classifying women's skin types from the age of 20-30 years by following several stages using Python 3.5 programming with a depth of three layers and the results of this research using the CNN method get the results of the accuracy value good at 67%
{"title":"Application of Deep Learning Using Convolutional Neural Network (CNN) Method For Women’s Skin Classification","authors":"A. Anton, Novia Farhan Nissa, Angelia Janiati, Nilam Cahya, P. Astuti","doi":"10.15294/SJI.V8I1.26888","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.26888","url":null,"abstract":"Facial skin is skin that protects the inside of the face such as the eyes, nose, mouth, and others. Facial skin consists of several types, including normal skin, oily skin, dry skin, and combination skin. This is a problem for women because it is difficult to recognize and distinguish their skin types this is what causes some women to find it difficult to determine the right make-up and care products for their skin types. In this study, the Convolutional Neural Network (CNN) method is the right method for classifying women's skin types from the age of 20-30 years by following several stages using Python 3.5 programming with a depth of three layers and the results of this research using the CNN method get the results of the accuracy value good at 67%","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45442257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Alamsyah, B. Prasetiyo, M. Hakim, F. D. Pradana
The COVID-19 case that infected humans was first discovered in China at the end of 2019. Since then, COVID-19 has spread to almost all countries in the world. To overcome this problem, it takes a quick effort to identify humans infected with COVID-19 more quickly. One of the alternative diagnoses for potential COVID-19 disease is Recurrent Neural Network (RNN). In this paper, RNN is implemented using the Elman network and applied to the COVID-19 dataset from Kaggle. The dataset consists of 70% training data and 30% test data. The learning parameters used were the maximum epoch, learning late, and hidden nodes. The research results show the percentage of accuracy is 88.
{"title":"Prediction of COVID-19 Using Recurrent Neural Network Model","authors":"A. Alamsyah, B. Prasetiyo, M. Hakim, F. D. Pradana","doi":"10.15294/sji.v8i1.30070","DOIUrl":"https://doi.org/10.15294/sji.v8i1.30070","url":null,"abstract":"The COVID-19 case that infected humans was first discovered in China at the end of 2019. Since then, COVID-19 has spread to almost all countries in the world. To overcome this problem, it takes a quick effort to identify humans infected with COVID-19 more quickly. One of the alternative diagnoses for potential COVID-19 disease is Recurrent Neural Network (RNN). In this paper, RNN is implemented using the Elman network and applied to the COVID-19 dataset from Kaggle. The dataset consists of 70% training data and 30% test data. The learning parameters used were the maximum epoch, learning late, and hidden nodes. The research results show the percentage of accuracy is 88.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46157562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Apriade Voutama, I. Maulana, Nofri ade, Adhi Rizal
Work From Home (WFH) is an activity that is carried out at home with the flexibility to work both place and time with the help of telecommunications technology. The birth of WFH was caused by the impact of the Covid-19 pandemic, which forced all activities in various fields, including government, business, trade, education, and so on, to be carried out online through the use of technology. One thing that is affected is in the field of education, the teaching and learning process must be carried out online. The problem that occurs is the unpreparedness of the infrastructure and resources in the smooth running of the distance learning process. One of the steps to provide convenience in the distance learning process is to innovate in the field of technology by creating an Android-based M-Learning application with an interactive concept so that it not only provides simple learning but is also designed attractively and interactively so that student participants can interact directly with this M-Learning application. Interactive M-Learning applications are designed with UML (Unified Modeling Language) modeling and translated into applications using Adobe Flash and then implemented on Android mobile devices.
{"title":"Interactive M-Learning Design Innovation using Android-Based Adobe Flash at WFH (Work From Home)","authors":"Apriade Voutama, I. Maulana, Nofri ade, Adhi Rizal","doi":"10.15294/sji.v8i1.27880","DOIUrl":"https://doi.org/10.15294/sji.v8i1.27880","url":null,"abstract":"Work From Home (WFH) is an activity that is carried out at home with the flexibility to work both place and time with the help of telecommunications technology. The birth of WFH was caused by the impact of the Covid-19 pandemic, which forced all activities in various fields, including government, business, trade, education, and so on, to be carried out online through the use of technology. One thing that is affected is in the field of education, the teaching and learning process must be carried out online. The problem that occurs is the unpreparedness of the infrastructure and resources in the smooth running of the distance learning process. One of the steps to provide convenience in the distance learning process is to innovate in the field of technology by creating an Android-based M-Learning application with an interactive concept so that it not only provides simple learning but is also designed attractively and interactively so that student participants can interact directly with this M-Learning application. Interactive M-Learning applications are designed with UML (Unified Modeling Language) modeling and translated into applications using Adobe Flash and then implemented on Android mobile devices.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47962197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
U. Rahardja, A. Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, Q. Aini
The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more complete and detailed.
{"title":"Immutability of Distributed Hash Model on Blockchain Node Storage","authors":"U. Rahardja, A. Hidayanto, Ninda Lutfiani, Dyah Ayu Febiani, Q. Aini","doi":"10.15294/SJI.V8I1.29444","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.29444","url":null,"abstract":"The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more complete and detailed.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"8 1","pages":"137-143"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41902614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The purpose of this research is to make comparisons on the internet network using the application of the Burst method and processed with Quality of Service analysis in which there are parameters of throughput, delay, and jitter. This analysis was carried out because there was a problem with a slow internet network. This happens because there is no configured bandwidth management on the Microtic router and also the unequal distribution of bandwidth when more and more bandwidth users. Burst is one of the bandwidth management methods available on the Microtic router. This study focuses on the implementation of Burst which is applied to one client2 and will be compared with client1 without the application of Burst. Quality of Service analysis is performed to test the parameters of throughput, delay, and jitter on each of the internet networks. After this test is complete, it shows that the results of using the Burst method as a bandwidth regulator, internet network access can be controlled and each client gets the bandwidth evenly as needed. The work result using Burst is more optimal than performance without using Burst. By using Burst the number of packets lost and failed transactions is reduced by more than 70%.
{"title":"Analysis of Quality of Service on Internet Networks Using the Burst Method","authors":"Muhammad Fariz, R. Arifudin","doi":"10.15294/SJI.V8I1.29781","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.29781","url":null,"abstract":"The purpose of this research is to make comparisons on the internet network using the application of the Burst method and processed with Quality of Service analysis in which there are parameters of throughput, delay, and jitter. This analysis was carried out because there was a problem with a slow internet network. This happens because there is no configured bandwidth management on the Microtic router and also the unequal distribution of bandwidth when more and more bandwidth users. Burst is one of the bandwidth management methods available on the Microtic router. This study focuses on the implementation of Burst which is applied to one client2 and will be compared with client1 without the application of Burst. Quality of Service analysis is performed to test the parameters of throughput, delay, and jitter on each of the internet networks. After this test is complete, it shows that the results of using the Burst method as a bandwidth regulator, internet network access can be controlled and each client gets the bandwidth evenly as needed. The work result using Burst is more optimal than performance without using Burst. By using Burst the number of packets lost and failed transactions is reduced by more than 70%.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47766561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dhomas Hatta Fudholi, Septia Rani, Dimas Arifin, Mochamad Rezky Satyatama
A tourism recommendation system is a crucial solution to help tourists discover more diverse tourism destinations. A content-based approach in a recommender system can be an effective way of recommending items because it looks at the user's preference histories. For a cold-start problem in the tourism domain, where rating data or past access may not be found, we can treat the user's past-travel-photos as the histories data. Besides, the use of photos as an input makes the user experience seamless and more effortless. The current development in Artificial Intelligence-based services enable the possibilities to implement such experience. This research developed a Deep Learning-based mobile tourism recommender system that gives recommendations on local tourism destinations based on the user's favorite traveling photos. To provide a recommendation, we use cosine similarity to measure the similarity score between one's pictures and tourism destination's galleries through their label tag vectors. The label tag is inferred using an image classifier model that runs from a mobile user device through Tensorflow Lite. There are 40 label tags, which refer to local tourism destination categories, activities, and objects. The model is trained using state-of-the-art mobile deep learning architecture EfficientNet-Lite. We did several experiments and got an accuracy result of more than 85% on average, using EfficientNet-Lite as the base architecture. The implementation of the system as an Android application has been proved to give an excellent recommendation with Mean Absolute Percentage Error (MAPE) equals to 5%.
{"title":"Deep Learning-based Mobile Tourism Recommender System","authors":"Dhomas Hatta Fudholi, Septia Rani, Dimas Arifin, Mochamad Rezky Satyatama","doi":"10.15294/SJI.V8I1.29262","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.29262","url":null,"abstract":"A tourism recommendation system is a crucial solution to help tourists discover more diverse tourism destinations. A content-based approach in a recommender system can be an effective way of recommending items because it looks at the user's preference histories. For a cold-start problem in the tourism domain, where rating data or past access may not be found, we can treat the user's past-travel-photos as the histories data. Besides, the use of photos as an input makes the user experience seamless and more effortless. The current development in Artificial Intelligence-based services enable the possibilities to implement such experience. This research developed a Deep Learning-based mobile tourism recommender system that gives recommendations on local tourism destinations based on the user's favorite traveling photos. To provide a recommendation, we use cosine similarity to measure the similarity score between one's pictures and tourism destination's galleries through their label tag vectors. The label tag is inferred using an image classifier model that runs from a mobile user device through Tensorflow Lite. There are 40 label tags, which refer to local tourism destination categories, activities, and objects. The model is trained using state-of-the-art mobile deep learning architecture EfficientNet-Lite. We did several experiments and got an accuracy result of more than 85% on average, using EfficientNet-Lite as the base architecture. The implementation of the system as an Android application has been proved to give an excellent recommendation with Mean Absolute Percentage Error (MAPE) equals to 5%.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48794927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Parents' concerns in terms of monitoring the presence and monitoring of children's activities become one of the problems that are often faced. Training children to prepare themselves to face this sometimes dangerous world, first develop a sense of security in themselves. The objectives of this research are to generate a system or application to track the whereabouts of children through smartphones that can be used by both parents of the child and to design devices that can be used practically and children can be traced to the presence of wireless media by their parents. Improved supervision of children is needed without reducing the freedom of children to learn and explore their environment. One alternative that allows tracking the presence, location, and accuracy is quite good is to use a Geo Positioning System (GPS). This GPS is packaged in a flexible form so that it can help make it easier for parents to supervise their children in the range of areas that are still accessible to them and find the child's position when separated from their parents. The system can send the location information of children who are lost or lost on smartphone applications used by parents.
{"title":"Implementing Geo Positioning System for Children Tracking Location Monitoring based on Android","authors":"Marti Widya Sari, Banu Santoso, Mohamed Azman","doi":"10.15294/SJI.V8I1.27436","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.27436","url":null,"abstract":"Parents' concerns in terms of monitoring the presence and monitoring of children's activities become one of the problems that are often faced. Training children to prepare themselves to face this sometimes dangerous world, first develop a sense of security in themselves. The objectives of this research are to generate a system or application to track the whereabouts of children through smartphones that can be used by both parents of the child and to design devices that can be used practically and children can be traced to the presence of wireless media by their parents. Improved supervision of children is needed without reducing the freedom of children to learn and explore their environment. One alternative that allows tracking the presence, location, and accuracy is quite good is to use a Geo Positioning System (GPS). This GPS is packaged in a flexible form so that it can help make it easier for parents to supervise their children in the range of areas that are still accessible to them and find the child's position when separated from their parents. The system can send the location information of children who are lost or lost on smartphone applications used by parents. ","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42907362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.
{"title":"Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method","authors":"Rauhulloh Noor Bintang, R. Umar, A. Yudhana","doi":"10.15294/SJI.V8I1.26744","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.26744","url":null,"abstract":"The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43089598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Oladosu Oyebisi Oladimeji, Dasola Oyeyiola, O. Oladimeji, P. Oyeyiola
Cloud Computing is one of the upcoming technologies which has gotten the attention of many researchers and investor. But cloud computing still faces challenges because it is not economical and impractical for research institutions and industries to set up a physical cloud for research and experiments on it (cloud computing). Due to this, the researchers have chosen to test their contributions with simulators. Therefore, the purpose of this study is to perform a survey on existing cloud simulators. These cloud simulators aid in modeling cloud application through the creation of virtual machine, data Centre, and other thing which can be easily added and configured to it in order to provide stress free analysis. Till this present time, many cloud simulators with various features have been proposed and available for use. In this paper a comprehensive study has been performed on major cloud simulators by highlighting their features, strength and weakness through analysis. After which comparative analysis was done on the simulation, from the study, none of the simulators have the feature to simulate mobile cloud computing issues. This study has not been published anywhere else.
{"title":"A Comprehensive Survey On Cloud Computing Simulators","authors":"Oladosu Oyebisi Oladimeji, Dasola Oyeyiola, O. Oladimeji, P. Oyeyiola","doi":"10.15294/SJI.V8I1.28878","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.28878","url":null,"abstract":"Cloud Computing is one of the upcoming technologies which has gotten the attention of many researchers and investor. But cloud computing still faces challenges because it is not economical and impractical for research institutions and industries to set up a physical cloud for research and experiments on it (cloud computing). Due to this, the researchers have chosen to test their contributions with simulators. Therefore, the purpose of this study is to perform a survey on existing cloud simulators. These cloud simulators aid in modeling cloud application through the creation of virtual machine, data Centre, and other thing which can be easily added and configured to it in order to provide stress free analysis. Till this present time, many cloud simulators with various features have been proposed and available for use. In this paper a comprehensive study has been performed on major cloud simulators by highlighting their features, strength and weakness through analysis. After which comparative analysis was done on the simulation, from the study, none of the simulators have the feature to simulate mobile cloud computing issues. This study has not been published anywhere else.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"8 1","pages":"51-59"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46279246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An example of application technology in university is developing an information system so that it can support performance and facilitate the information flow. Institute of Technology and Business (ITB) STIKOM Bali is a technology-based university that has an information system, one of which is the Lecturer Information System (SID) considering the role of Lecturers as the main actors in the world of university. SID was developed to facilitate and streamline the work of lecturers. The implementation of SID should be usefull to institutions so that the resources spent on building this system are not wasted. However, until now there has never been an evaluation of the usability of SID, causing the relevant stakeholders not to know the usefulness of the system and not knowing the improvements that need to be made to the SID system. Based on these problems, an evaluation of the SID ITB STIKOM Bali usability was carried out using the Sirius framework and the Moscow technique. The results of the research are the global usability value for SID based on ten aspects of the Sirius framework usability and recommendations for improving the SID STIKOM Bali system based on the Moscow Technique ranking. This research is expected to be a reference material for stakeholders in determining policies related to improving the SID system at ITB STIKOM Bali. The research method used in this research is literature study and observation, SID system analysis, distribustion and processing questionnaire data, data analysis and drawing conclusions
{"title":"Usability Evaluation of Lecturer Information Systems Using Sirius Framework and Moscow Technique","authors":"I. P. Ramayasa, I. G. A. Candrawibawa","doi":"10.15294/SJI.V8I1.27126","DOIUrl":"https://doi.org/10.15294/SJI.V8I1.27126","url":null,"abstract":"An example of application technology in university is developing an information system so that it can support performance and facilitate the information flow. Institute of Technology and Business (ITB) STIKOM Bali is a technology-based university that has an information system, one of which is the Lecturer Information System (SID) considering the role of Lecturers as the main actors in the world of university. SID was developed to facilitate and streamline the work of lecturers. The implementation of SID should be usefull to institutions so that the resources spent on building this system are not wasted. However, until now there has never been an evaluation of the usability of SID, causing the relevant stakeholders not to know the usefulness of the system and not knowing the improvements that need to be made to the SID system. Based on these problems, an evaluation of the SID ITB STIKOM Bali usability was carried out using the Sirius framework and the Moscow technique. The results of the research are the global usability value for SID based on ten aspects of the Sirius framework usability and recommendations for improving the SID STIKOM Bali system based on the Moscow Technique ranking. This research is expected to be a reference material for stakeholders in determining policies related to improving the SID system at ITB STIKOM Bali. The research method used in this research is literature study and observation, SID system analysis, distribustion and processing questionnaire data, data analysis and drawing conclusions","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49522846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}