首页 > 最新文献

Scientific Journal of Informatics最新文献

英文 中文
Geographical Information System of Bus and Travel Counter in Padang City Using BFS Method Based on Mobile Web 基于移动Web的巴东市公交公交柜台地理信息系统的BFS方法
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.33117
Sularno Sularno, R. Astri, P. Anggraini, Dio Prima Mulya, D. Mulya
Purpose: One of the main objectives of the research is the BFS (Breadth-First Search) algorithm method in the search for nearby bus and travel counters using GPS found on each device used in the search process. Each smartphone produces a different coordinate point with an average distance difference of 30.2 meters to the hardware coordinate point. Each GPS embedded in the smartphone will process the data according to the location conditions of the user's point of existence. The methodology for system development is a standard process for a team of developers to connect all the steps needed in analyzing, designing, implementing, and maintaining information systems. Methods: The methodology becomes a guideline in system development activities in SDLC. The SDLC model used in this study is the WaterFall Model. Result: The results of this study are expected to facilitate the public in booking tickets and to find the nearest location from the bus and travel counters. Novelty: The novelty of this research is the development of GIS as a search for the location of bus and travel counters using the breadth-first search algorithm. This research can help the community find the location of the nearest bus and tourist counter in the city of Padang.
目的:研究的主要目标之一是采用BFS(广度优先搜索)算法,使用搜索过程中使用的每个设备上的GPS搜索附近的公交车和旅行柜台。每部智能手机都会产生一个不同的坐标点,与硬件坐标点的平均距离差为30.2米。智能手机中嵌入的每个GPS都会根据用户存在点的位置条件来处理数据。系统开发的方法论是开发团队连接分析、设计、实现和维护信息系统所需的所有步骤的标准过程。方法:该方法论成为SDLC中系统开发活动的指导方针。本研究中使用的SDLC模型是WaterFall模型。结果:这项研究的结果有望方便公众订票,并找到离公共汽车和旅行柜台最近的位置。新颖性:这项研究的新颖性是开发了GIS,使用广度优先搜索算法搜索公交车和旅行柜台的位置。这项研究可以帮助社区找到巴东市最近的公共汽车和旅游柜台的位置。
{"title":"Geographical Information System of Bus and Travel Counter in Padang City Using BFS Method Based on Mobile Web","authors":"Sularno Sularno, R. Astri, P. Anggraini, Dio Prima Mulya, D. Mulya","doi":"10.15294/sji.v8i2.33117","DOIUrl":"https://doi.org/10.15294/sji.v8i2.33117","url":null,"abstract":"Purpose: One of the main objectives of the research is the BFS (Breadth-First Search) algorithm method in the search for nearby bus and travel counters using GPS found on each device used in the search process. Each smartphone produces a different coordinate point with an average distance difference of 30.2 meters to the hardware coordinate point. Each GPS embedded in the smartphone will process the data according to the location conditions of the user's point of existence. The methodology for system development is a standard process for a team of developers to connect all the steps needed in analyzing, designing, implementing, and maintaining information systems. Methods: The methodology becomes a guideline in system development activities in SDLC. The SDLC model used in this study is the WaterFall Model. Result: The results of this study are expected to facilitate the public in booking tickets and to find the nearest location from the bus and travel counters. Novelty: The novelty of this research is the development of GIS as a search for the location of bus and travel counters using the breadth-first search algorithm. This research can help the community find the location of the nearest bus and tourist counter in the city of Padang.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42704186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Identification and Prediction of Leaf Patterns: Preliminary Study for Improvement 叶型鉴定与预测模型:改进的初步研究
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.30024
A. Muzakir, U. Ependi
Purpose: Many studies have conducted studies related to automation for image-based plant species identification recently. Types of plants, in general, can be identified by looking at the shape of the leaves, colors, stems, flowers, and others. Not everyone can immediately recognize the types of plants scattered around the environment. In Indonesia, herbal plants thrive and are abundantly found and used as a concoction of traditional medicine known for its medicinal properties from generation to generation. In the current Z-generation era, children lack an understanding of the types of plants that benefit life. This study identifies and predicts the pattern of the leaf shape of herbal plants. Methods: The dataset used in this study used 15 types of herbal plants with 30 leaf data for each plant to obtain 450 data used. The extraction process uses the GLCM algorithm, and classification uses the K-NN algorithm. Result: The results carried out through the testing process in this study showed that the accuracy rate of the leaf pattern prediction process was 74% of the total 15 types of plants used. Value: Process of identifying and predicting leaf patterns of herbal plants can be applied using the K-NN classification algorithm combined with GLCM with the level of accuracy obtained.
目的:近年来,许多研究对基于图像的植物物种识别自动化进行了研究。一般来说,植物的类型可以通过观察叶子、颜色、茎、花等的形状来识别。并不是每个人都能立即识别出散布在环境中的植物类型。在印度尼西亚,草药植物茁壮成长,被大量发现并用作传统药物的混合物,以其代代相传的药用特性而闻名。在当前的Z世代时代,孩子们对有益于生命的植物类型缺乏了解。这项研究确定并预测了草药植物的叶片形状模式。方法:本研究中使用的数据集使用了15种草药植物,每种植物有30个叶片数据,以获得450个数据。提取过程使用GLCM算法,分类使用K-NN算法。结果:通过本研究中的测试过程进行的结果表明,叶型预测过程的准确率在所使用的15种植物中为74%。价值:使用K-NN分类算法结合GLCM可以应用识别和预测草本植物叶片模式的过程,并获得一定的准确度。
{"title":"Model for Identification and Prediction of Leaf Patterns: Preliminary Study for Improvement","authors":"A. Muzakir, U. Ependi","doi":"10.15294/sji.v8i2.30024","DOIUrl":"https://doi.org/10.15294/sji.v8i2.30024","url":null,"abstract":"Purpose: Many studies have conducted studies related to automation for image-based plant species identification recently. Types of plants, in general, can be identified by looking at the shape of the leaves, colors, stems, flowers, and others. Not everyone can immediately recognize the types of plants scattered around the environment. In Indonesia, herbal plants thrive and are abundantly found and used as a concoction of traditional medicine known for its medicinal properties from generation to generation. In the current Z-generation era, children lack an understanding of the types of plants that benefit life. This study identifies and predicts the pattern of the leaf shape of herbal plants. Methods: The dataset used in this study used 15 types of herbal plants with 30 leaf data for each plant to obtain 450 data used. The extraction process uses the GLCM algorithm, and classification uses the K-NN algorithm. Result: The results carried out through the testing process in this study showed that the accuracy rate of the leaf pattern prediction process was 74% of the total 15 types of plants used. Value: Process of identifying and predicting leaf patterns of herbal plants can be applied using the K-NN classification algorithm combined with GLCM with the level of accuracy obtained.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44259308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accuracy Measurements and Decision Making by Naïve Bayes and Forward Chaining Method to Identify the Malnutrition Causes and Symptoms 准确性测量和决策的Naïve贝叶斯和前向链法确定营养不良的原因和症状
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.29317
Muhammad Ibtasam
Malnutrition is characterized as muscle weakening and cognitive disparity caused by social, dietary, political, food security issues. It appears as many underlying symptoms like fatigue, weakness, micronutrient deficiencies, weight loss to apparent symptoms of muscle mass reduction. Every 1 in 5 children is malnourished in developing countries. Purpose: Policies and program formulation require prevalence facts to classify the most prevalent cause. Diagnostic tools and computer modeling have revolutionized the world of health sciences. Much algorithmic formulation can help to predict the prognosis of diseases based on the previous fact sheets. Methods/Study design/approach: Naïve Bayes provides the posterior probability value that gives an analysis of the member with the whole sample set. Forward chaining gives the logistic conclusion with IF and THEN approach. Result/Findings: Naïve Bayes provided high accuracy of 88% as compared to 85% forward chaining. Novelty/Originality/Value: In this study, the Naïve Bayes algorithm approach is coupled with the forward chaining system to provide a highly accurate measurement of the cause of malnutrition.
营养不良的特征是由社会、饮食、政治、粮食安全问题引起的肌肉衰弱和认知差异。它表现为许多潜在的症状,如疲劳,虚弱,微量营养素缺乏,体重减轻,肌肉量减少的明显症状。在发展中国家,每五个儿童中就有一个营养不良。目的:政策和规划的制定需要流行的事实来分类最普遍的原因。诊断工具和计算机建模已经彻底改变了健康科学的世界。许多算法公式可以根据以前的情况表来帮助预测疾病的预后。方法/研究设计/方法:Naïve贝叶斯提供后验概率值,给出了对整个样本集的成员的分析。正向链用IF和THEN方法给出逻辑结论。结果/发现:Naïve贝叶斯提供了88%的准确率,而正向链的准确率为85%。新颖性/原创性/价值:在本研究中,Naïve贝叶斯算法方法与正向链系统相结合,提供了对营养不良原因的高度精确测量。
{"title":"Accuracy Measurements and Decision Making by Naïve Bayes and Forward Chaining Method to Identify the Malnutrition Causes and Symptoms","authors":"Muhammad Ibtasam","doi":"10.15294/sji.v8i2.29317","DOIUrl":"https://doi.org/10.15294/sji.v8i2.29317","url":null,"abstract":"Malnutrition is characterized as muscle weakening and cognitive disparity caused by social, dietary, political, food security issues. It appears as many underlying symptoms like fatigue, weakness, micronutrient deficiencies, weight loss to apparent symptoms of muscle mass reduction. Every 1 in 5 children is malnourished in developing countries. Purpose: Policies and program formulation require prevalence facts to classify the most prevalent cause. Diagnostic tools and computer modeling have revolutionized the world of health sciences. Much algorithmic formulation can help to predict the prognosis of diseases based on the previous fact sheets. Methods/Study design/approach: Naïve Bayes provides the posterior probability value that gives an analysis of the member with the whole sample set. Forward chaining gives the logistic conclusion with IF and THEN approach. Result/Findings: Naïve Bayes provided high accuracy of 88% as compared to 85% forward chaining. Novelty/Originality/Value: In this study, the Naïve Bayes algorithm approach is coupled with the forward chaining system to provide a highly accurate measurement of the cause of malnutrition.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41530411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tide Prediction in Prigi Beach using Support Vector Regression (SVR) Method 用支持向量回归(SVR)方法预测普里吉海滩的潮汐
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.28906
Tri Mar'ati Nur Utami, D. C. R. Novitasari, F. Setiawan, Nurissaidah Ulinnuha, Yuniar Farida
Purpose: Prigi Beach has the largest fishing port in East Java, but the topography of this beach is quite gentle, so it is prone to disasters such as tidal flooding. The tides of seawater strongly influence the occurrence of this natural event. Therefore, information on tidal level data is essential. This study aims to provide information about tidal predictions.Methods: In this case using the SVE method. Input data and time were examined using PACF autocorrelation plots to form input data patterns. The working principle of SVR is to find the best hyperplane in the form of a function that produces the slightest error.Result: The best SVR model built from the linear kernel, the MAPE value is 0.5510%, the epsilon is 0.0614, and the bias is 0.6015. The results of the tidal prediction on Prigi Beach in September 2020 showed that the highest tide occurred on September 19, 2020, at 10.00 PM, and the lowest tide occurred on September 3, 2020, at 04.00 AM. Value: After conducting experiments on three types of kernels on SVR, it is said that linear kernels can predict improvements better than polynomial and gaussian kernels.
目的:普里吉海滩是东爪哇岛最大的渔港,但该海滩地形平缓,容易发生潮汐洪水等灾害。海水的潮汐强烈影响着这一自然事件的发生。因此,有关潮汐水位数据的信息至关重要。这项研究旨在提供有关潮汐预测的信息。方法:本例采用SVE方法。使用PACF自相关图检查输入数据和时间以形成输入数据模式。SVR的工作原理是以产生最小误差的函数的形式找到最佳超平面。结果:由线性核建立的最佳SVR模型,MAPE值为0.5510%,ε为0.0614,偏差为0.6015。2020年9月普里吉海滩的潮汐预测结果显示,最高潮汐发生在2020年9月份19日晚上10点,最低潮汐发生在9月份3日凌晨4点。数值:在SVR上对三种类型的核进行了实验后,据说线性核比多项式核和高斯核更能预测改善。
{"title":"Tide Prediction in Prigi Beach using Support Vector Regression (SVR) Method","authors":"Tri Mar'ati Nur Utami, D. C. R. Novitasari, F. Setiawan, Nurissaidah Ulinnuha, Yuniar Farida","doi":"10.15294/sji.v8i2.28906","DOIUrl":"https://doi.org/10.15294/sji.v8i2.28906","url":null,"abstract":"Purpose: Prigi Beach has the largest fishing port in East Java, but the topography of this beach is quite gentle, so it is prone to disasters such as tidal flooding. The tides of seawater strongly influence the occurrence of this natural event. Therefore, information on tidal level data is essential. This study aims to provide information about tidal predictions.Methods: In this case using the SVE method. Input data and time were examined using PACF autocorrelation plots to form input data patterns. The working principle of SVR is to find the best hyperplane in the form of a function that produces the slightest error.Result: The best SVR model built from the linear kernel, the MAPE value is 0.5510%, the epsilon is 0.0614, and the bias is 0.6015. The results of the tidal prediction on Prigi Beach in September 2020 showed that the highest tide occurred on September 19, 2020, at 10.00 PM, and the lowest tide occurred on September 3, 2020, at 04.00 AM. Value: After conducting experiments on three types of kernels on SVR, it is said that linear kernels can predict improvements better than polynomial and gaussian kernels.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49200275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Utilizing Reverse Engineering Technique for A Malware Analysis Model 利用逆向工程技术建立恶意软件分析模型
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.24755
A. Amiruddin, P. Suryani, Shandika Dianaji Santoso, Muhammad Yusuf Bambang Setiadji
Purpose: Malicious software or malware is a real threat to the security of computer systems or networks. Researchers made various attempts to find information and knowledge about malware, including preventing or even eliminating it. One effort to detect it is using a malware dynamic analysis model based on reverse engineering techniques. However, there are many reverse engineering techniques proposed with various stages and requirements in the literature. Methods: This research uses an experimental method. The object of research is a malware analysis model using reverse engineering techniques. The experimental method used is qualitative, collecting data related to the advantages and disadvantages of the reverse engineering-based malware analysis models used as a reference in this study. The data is used as consideration to propose a new model of malware analysis utilizing reverse engineering techniques. Result: In this study an analysis model of malware was proposed by synthesizing several reverse engineering-based malware analysis models. Novelty: The proposed model was then tested in a virtual environment where it is proven to be more effective than previous models for analyzing malware.
目的:恶意软件或恶意软件是对计算机系统或网络安全的真正威胁。研究人员进行了各种尝试来寻找有关恶意软件的信息和知识,包括预防甚至消除它。检测它的一项努力是使用基于逆向工程技术的恶意软件动态分析模型。然而,文献中提出了许多具有不同阶段和要求的逆向工程技术。方法:本研究采用实验方法。研究对象是使用逆向工程技术的恶意软件分析模型。所采用的实验方法是定性的,收集了相关数据,并将基于逆向工程的恶意软件分析模型的优缺点作为本研究的参考。该数据被用作考虑因素,以提出利用逆向工程技术的恶意软件分析的新模型。结果:在本研究中,通过综合几种基于逆向工程的恶意软件分析模型,提出了一种恶意软件的分析模型。新颖性:然后在虚拟环境中测试了所提出的模型,证明它比以前的模型更有效地分析恶意软件。
{"title":"Utilizing Reverse Engineering Technique for A Malware Analysis Model","authors":"A. Amiruddin, P. Suryani, Shandika Dianaji Santoso, Muhammad Yusuf Bambang Setiadji","doi":"10.15294/sji.v8i2.24755","DOIUrl":"https://doi.org/10.15294/sji.v8i2.24755","url":null,"abstract":"Purpose: Malicious software or malware is a real threat to the security of computer systems or networks. Researchers made various attempts to find information and knowledge about malware, including preventing or even eliminating it. One effort to detect it is using a malware dynamic analysis model based on reverse engineering techniques. However, there are many reverse engineering techniques proposed with various stages and requirements in the literature. Methods: This research uses an experimental method. The object of research is a malware analysis model using reverse engineering techniques. The experimental method used is qualitative, collecting data related to the advantages and disadvantages of the reverse engineering-based malware analysis models used as a reference in this study. The data is used as consideration to propose a new model of malware analysis utilizing reverse engineering techniques. Result: In this study an analysis model of malware was proposed by synthesizing several reverse engineering-based malware analysis models. Novelty: The proposed model was then tested in a virtual environment where it is proven to be more effective than previous models for analyzing malware.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42606011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Analysis and Optimization of Business Processes for Students in Higher Education Based on Togaf 9.2 基于Togaf 9.2的高校学生业务流程分析与优化
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.29952
M. Anam, Torkis Nasution, Susi Erlinda, Lusiana Efrizoni, S. Susanti
Purpose: The IT Blueprint is used as a guideline in achieving organizational goals, such as the built and development of information technology (IT) infrastructure. STMIK Amik Riau is one of the universities vision to become an excellent university in Sumatra by 2030. To achieve this vision, it is necessary to develop various units, one of which is the built and development of IT in student services. To build IT for student services, an enterprise architecture is needed so that the development is more focused. Study design: In this study, TOGAF became the framework used to design, plan, implement, and manage the company's organizational architecture. TOGAF has 8 phases, but this research takes 6 phases: Architecture Vision, Business Architecture, Information System Architectures, Technology Architecture, Opportunities and Solutions, and Migration Planning. Result: The results obtained in this study are the creation of IT blueprints for student business processes. There are several updates in each process, especially in the information system architecture, then in business processes and technology. There are also updates that need to be done. This study also provides several reasons for updating the Opportunity and Solutions. Other than that, this research guides to apply the updates based on priorities that must be applied to migration planning. Novelty: In the information system architecture, 18 applications become service systems for students. After analyzing it into 31 applications, they will later be used to support good services for students.
目的:IT蓝图被用作实现组织目标的指导方针,例如信息技术(IT)基础设施的构建和开发。圣阿米克廖大学是一所致力于到2030年成为苏门答腊优秀大学的大学。为了实现这一愿景,有必要开发各种单元,其中之一是建立和发展学生服务中的信息技术。要为学生服务构建IT,需要一个企业体系结构,以便更集中地进行开发。研究设计:在本研究中,TOGAF成为用于设计、规划、实施和管理公司组织架构的框架。TOGAF有8个阶段,但本研究分为6个阶段:体系结构愿景、业务体系结构、信息系统体系结构、技术体系结构、机会和解决方案以及迁移规划。结果:本研究的结果是为学生业务流程创建了IT蓝图。每个流程都有几个更新,尤其是在信息系统架构中,然后是在业务流程和技术中。还有一些更新需要完成。本研究还提供了更新Opportunity和Solutions的几个原因。除此之外,这项研究还指导根据移民规划中必须应用的优先事项应用更新。新颖性:在信息系统架构中,18个应用程序成为学生的服务系统。在将其分析为31个应用程序后,它们将用于为学生提供良好的服务。
{"title":"The Analysis and Optimization of Business Processes for Students in Higher Education Based on Togaf 9.2","authors":"M. Anam, Torkis Nasution, Susi Erlinda, Lusiana Efrizoni, S. Susanti","doi":"10.15294/sji.v8i2.29952","DOIUrl":"https://doi.org/10.15294/sji.v8i2.29952","url":null,"abstract":"Purpose: The IT Blueprint is used as a guideline in achieving organizational goals, such as the built and development of information technology (IT) infrastructure. STMIK Amik Riau is one of the universities vision to become an excellent university in Sumatra by 2030. To achieve this vision, it is necessary to develop various units, one of which is the built and development of IT in student services. To build IT for student services, an enterprise architecture is needed so that the development is more focused. Study design: In this study, TOGAF became the framework used to design, plan, implement, and manage the company's organizational architecture. TOGAF has 8 phases, but this research takes 6 phases: Architecture Vision, Business Architecture, Information System Architectures, Technology Architecture, Opportunities and Solutions, and Migration Planning. Result: The results obtained in this study are the creation of IT blueprints for student business processes. There are several updates in each process, especially in the information system architecture, then in business processes and technology. There are also updates that need to be done. This study also provides several reasons for updating the Opportunity and Solutions. Other than that, this research guides to apply the updates based on priorities that must be applied to migration planning. Novelty: In the information system architecture, 18 applications become service systems for students. After analyzing it into 31 applications, they will later be used to support good services for students.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48027660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Collaboration Blockchain Technology and Gamification in iLearning systems 网络学习系统中的协作技术和游戏化
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.31889
Reza Filander Nevizond, U. Rahardja, Nuke Puji Lestari Santoso, Suryari Purnama, Wahyu Yustika Prihastiwi
Purpose: Currently, many fake certificates or diplomas are used to apply for jobs to get a better paying job. With that said, currently certificates cannot prove a person's expertise or skills. However, some students have implemented a Blockchain system in securing their certificates so that data manipulation is minimized, but only partially. Therefore, this research aims to motivate anyone, especially students in this Blockchain system and students will get incentives from all activities that are followed by racing in Blockchain gamification concept 4.0. Study design: This study uses the Pieces method to classify a problem (problem), opportunities (opportunities), and existing directions. Data collection techniques used primary data obtained by distributing questionnaires in the form of google form to respondents by involving students (n = 1129). Conclusions were analyzed with the SUS trial using a Likert scale with the cut and SUS method. Result: The results of this study are expected to Gamification in the system Blockchain can run optimally in implementation. The use of Gamification on the Alphabet Blockchain is included in the acceptable category. Value: The platform can check certificates that are not genuine.
目的:目前,许多假证书或文凭被用来申请工作,以获得一份收入更高的工作。话虽如此,目前的证书并不能证明一个人的专业知识或技能。然而,一些学生已经实现了区块链系统来保护他们的证书,这样数据操作就最小化了,但只是部分减少了。因此,本研究旨在激励任何人,特别是在这个区块链系统中的学生,学生将从区块链游戏化概念4.0中赛车之后的所有活动中获得激励。研究设计:本研究使用碎片方法对问题(problem)、机会(opportunities)和现有方向进行分类。数据收集技术使用的原始数据是通过学生参与,以谷歌表格的形式向受访者发放问卷(n = 1129)。结论分析与SUS试验使用李克特量表与切割和SUS方法。结果:期望本研究的结果能使游戏化在区块链系统中得以最佳运行。在Alphabet区块链上使用游戏化是可以接受的。取值范围:平台可以对不真实的证书进行检查。
{"title":"Collaboration Blockchain Technology and Gamification in iLearning systems","authors":"Reza Filander Nevizond, U. Rahardja, Nuke Puji Lestari Santoso, Suryari Purnama, Wahyu Yustika Prihastiwi","doi":"10.15294/sji.v8i2.31889","DOIUrl":"https://doi.org/10.15294/sji.v8i2.31889","url":null,"abstract":"Purpose: Currently, many fake certificates or diplomas are used to apply for jobs to get a better paying job. With that said, currently certificates cannot prove a person's expertise or skills. However, some students have implemented a Blockchain system in securing their certificates so that data manipulation is minimized, but only partially. Therefore, this research aims to motivate anyone, especially students in this Blockchain system and students will get incentives from all activities that are followed by racing in Blockchain gamification concept 4.0. Study design: This study uses the Pieces method to classify a problem (problem), opportunities (opportunities), and existing directions. Data collection techniques used primary data obtained by distributing questionnaires in the form of google form to respondents by involving students (n = 1129). Conclusions were analyzed with the SUS trial using a Likert scale with the cut and SUS method. Result: The results of this study are expected to Gamification in the system Blockchain can run optimally in implementation. The use of Gamification on the Alphabet Blockchain is included in the acceptable category. Value: The platform can check certificates that are not genuine.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47908302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Goal Directed Design Method Application on UI/UX of Dua Mata Mobile Apps 目标导向设计方法在Dua Mata手机应用程序UI/UX中的应用
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.30216
Made Sukarsa, I. N. Piarsa, Erlangga Bayu Linggar Sukarta, N. Wisswani
Purpose: Dua Mata is a mobile and website-based community service application intended for residents of South Kuta. Evaluation of existing designs is needed to assess whether the user interface design can provide user satisfaction. The aim this paper to evaluate the UI/UX of Dua Mata using QUIM method. Methods: Research, Modeling, requirement definition, Framework Definition, and Refinements are the step of the GDD method. The QUIM method aims to prioritize indicators that need to be fixed in the old design: Resource Utilization, Minimal Memory Load, and Security. Modeling determined respondents who will do the second test and in requirement definition stage scenarios are chosen. The selected scenario is registering, forgetting passwords, searching directories, ordering, and adding services. The framework definition and refinement is the stage of making a wireframe then prototype and tested. Result: The test results showed a big decrease in the scenario completion time by 39.41 seconds in the register scenario. The score on the Resource Utilization indicator has increased by 8 points, the Minimum Memory Load indicator is 9 points and the Security indicator is 6 points. Novelty: The novelty is that the increasing of the Resource Utilization indicator indicates the new design has a higher level of user satisfaction than the old design
目的:Dua Mata是一款基于移动和网站的社区服务应用程序,面向南库塔的居民。需要对现有设计进行评估,以评估用户界面设计是否能够提供用户满意度。本文的目的是使用QUIM方法对Dua Mata的用户界面/用户体验进行评估。方法:研究、建模、需求定义、框架定义和精化是GDD方法的步骤。QUIM方法旨在优先考虑旧设计中需要修复的指标:资源利用率、最小内存负载和安全性。选择将进行第二次测试和处于需求定义阶段的场景的建模确定的受访者。所选择的场景是注册、忘记密码、搜索目录、排序和添加服务。框架的定义和细化是制作线框,然后进行原型和测试的阶段。结果:测试结果显示,在注册场景中,场景完成时间大大缩短了39.41秒。资源利用率指标的得分增加了8分,最小内存负载指标为9分,安全性指标为6分。新颖性:新颖性是资源利用率指标的增加表明新设计比旧设计具有更高的用户满意度
{"title":"Goal Directed Design Method Application on UI/UX of Dua Mata Mobile Apps","authors":"Made Sukarsa, I. N. Piarsa, Erlangga Bayu Linggar Sukarta, N. Wisswani","doi":"10.15294/sji.v8i2.30216","DOIUrl":"https://doi.org/10.15294/sji.v8i2.30216","url":null,"abstract":"Purpose: Dua Mata is a mobile and website-based community service application intended for residents of South Kuta. Evaluation of existing designs is needed to assess whether the user interface design can provide user satisfaction. The aim this paper to evaluate the UI/UX of Dua Mata using QUIM method. Methods: Research, Modeling, requirement definition, Framework Definition, and Refinements are the step of the GDD method. The QUIM method aims to prioritize indicators that need to be fixed in the old design: Resource Utilization, Minimal Memory Load, and Security. Modeling determined respondents who will do the second test and in requirement definition stage scenarios are chosen. The selected scenario is registering, forgetting passwords, searching directories, ordering, and adding services. The framework definition and refinement is the stage of making a wireframe then prototype and tested. Result: The test results showed a big decrease in the scenario completion time by 39.41 seconds in the register scenario. The score on the Resource Utilization indicator has increased by 8 points, the Minimum Memory Load indicator is 9 points and the Security indicator is 6 points. Novelty: The novelty is that the increasing of the Resource Utilization indicator indicates the new design has a higher level of user satisfaction than the old design","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49342379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Implementation of Genetic Algorithm and Adaptive Neuro Fuzzy Inference System in Predicting Survival of Patients with Heart Failure 遗传算法和自适应神经模糊推理系统在心力衰竭患者生存预测中的应用
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.32803
Dian Alya Korzhakin, E. Sugiharti
Purpose: Heart failure is a disease that is still a global threat and plays a major role as the number one cause of death worldwide. Therefore, accurate predictions are needed to determine the survival of heart failure patients. One technique that can be used to predict a decision is classification. Adaptive Neuro-Fuzzy Inference System (ANFIS) is an algorithm that can be used in the classification process in making predictions. Genetic Algorithms can help improve the performance of classification algorithms through the feature selection process. Methods/Study design/approach: In this study, predictions or diagnoses were made on the survival of heart failure patients based on the heart failure clinical record dataset obtained from the UCI Machine Learning Repository. The data used is 299 data with 12 attributes and 1 class. The result of this research is the comparison of the accuracy of the ANFIS algorithm before and after using the Genetic Algorithm. Result/Findings: The ANFIS algorithm produces the highest accuracy of 94.444%. While the ANFIS algorithm after attribute selection using the Genetic Algorithm produces the highest accuracy of 96.667%. This shows that the Genetic Algorithm is able to improve the performance of the ANFIS classification algorithm through the attribute selection process.
目的:心力衰竭是一种仍然是全球威胁的疾病,并在世界范围内作为头号死亡原因发挥重要作用。因此,需要准确的预测来确定心力衰竭患者的生存率。一种可以用来预测决策的技术是分类。自适应神经模糊推理系统(ANFIS)是一种用于分类过程中进行预测的算法。遗传算法可以通过特征选择过程提高分类算法的性能。方法/研究设计/方法:在本研究中,基于从UCI机器学习库获得的心力衰竭临床记录数据集,对心力衰竭患者的生存进行预测或诊断。使用的数据是299个数据,包含12个属性和1个类。本研究的结果是比较了采用遗传算法前后ANFIS算法的精度。结果/发现:ANFIS算法的准确率最高,为94.444%。而采用遗传算法进行属性选择后的ANFIS算法准确率最高,达到96.667%。这表明遗传算法能够通过属性选择过程提高ANFIS分类算法的性能。
{"title":"Implementation of Genetic Algorithm and Adaptive Neuro Fuzzy Inference System in Predicting Survival of Patients with Heart Failure","authors":"Dian Alya Korzhakin, E. Sugiharti","doi":"10.15294/sji.v8i2.32803","DOIUrl":"https://doi.org/10.15294/sji.v8i2.32803","url":null,"abstract":"Purpose: Heart failure is a disease that is still a global threat and plays a major role as the number one cause of death worldwide. Therefore, accurate predictions are needed to determine the survival of heart failure patients. One technique that can be used to predict a decision is classification. Adaptive Neuro-Fuzzy Inference System (ANFIS) is an algorithm that can be used in the classification process in making predictions. Genetic Algorithms can help improve the performance of classification algorithms through the feature selection process. Methods/Study design/approach: In this study, predictions or diagnoses were made on the survival of heart failure patients based on the heart failure clinical record dataset obtained from the UCI Machine Learning Repository. The data used is 299 data with 12 attributes and 1 class. The result of this research is the comparison of the accuracy of the ANFIS algorithm before and after using the Genetic Algorithm. Result/Findings: The ANFIS algorithm produces the highest accuracy of 94.444%. While the ANFIS algorithm after attribute selection using the Genetic Algorithm produces the highest accuracy of 96.667%. This shows that the Genetic Algorithm is able to improve the performance of the ANFIS classification algorithm through the attribute selection process.","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47244334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Support Vector Machine Algorithm with Correlation-Based Feature Selection and Term Frequency Inverse Document Frequency for Sentiment Analysis Review Hotel 基于相关性特征选择和词频逆文档频率的支持向量机算法在情感分析中的实现
Pub Date : 2021-11-30 DOI: 10.15294/sji.v8i2.29992
Novia Puji Ririanti, A. Purwinarko
Purpose: The study aims to reduce the number of irrelevant features in sentiment analysis with large features. Methods/Study design/approach: The Support Vector Machine (SVM) algorithm is used to classify hotel review sentiment analysis because it has advantages in processing large datasets. Term Frequency-Inverse Document Frequency (TF-IDF) is used to give weight values to features in the dataset. Result/Findings: This study's results indicate that the accuracy of the SVM method with TF-IDF produces an accuracy of 93.14%, and the SVM method in the classification of hotel reviews by implementing TFIDF and CFS has increased by 1.18% from 93.14% to 94.32%. Novelty/Originality/Value: Use of Correlation-Based Feature Section (CFS) for the feature selection process, which reduces the number of irrelevant features by ranking the feature subset based on the strong correlation value in each feature
目的:本研究旨在减少具有大特征的情感分析中不相关特征的数量。方法/研究设计/方法:支持向量机(SVM)算法用于酒店评论情绪分析的分类,因为它在处理大型数据集方面具有优势。术语频率逆文档频率(TF-IDF)用于为数据集中的特征赋予权重值。结果/发现:本研究的结果表明,SVM方法与TF-IDF的准确率为93.14%,SVM方法在酒店评论分类中的准确率从93.14%提高到94.32%,提高了1.18%。新颖性/原创性/价值:使用基于相关性的特征节(CFS)进行特征选择过程,它通过基于每个特征中的强相关性值对特征子集进行排序来减少不相关特征的数量
{"title":"Implementation of Support Vector Machine Algorithm with Correlation-Based Feature Selection and Term Frequency Inverse Document Frequency for Sentiment Analysis Review Hotel","authors":"Novia Puji Ririanti, A. Purwinarko","doi":"10.15294/sji.v8i2.29992","DOIUrl":"https://doi.org/10.15294/sji.v8i2.29992","url":null,"abstract":"Purpose: The study aims to reduce the number of irrelevant features in sentiment analysis with large features. Methods/Study design/approach: The Support Vector Machine (SVM) algorithm is used to classify hotel review sentiment analysis because it has advantages in processing large datasets. Term Frequency-Inverse Document Frequency (TF-IDF) is used to give weight values to features in the dataset. Result/Findings: This study's results indicate that the accuracy of the SVM method with TF-IDF produces an accuracy of 93.14%, and the SVM method in the classification of hotel reviews by implementing TFIDF and CFS has increased by 1.18% from 93.14% to 94.32%. Novelty/Originality/Value: Use of Correlation-Based Feature Section (CFS) for the feature selection process, which reduces the number of irrelevant features by ranking the feature subset based on the strong correlation value in each feature","PeriodicalId":30781,"journal":{"name":"Scientific Journal of Informatics","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41424379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Scientific Journal of Informatics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1