Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.152
Fal Sadikin, Nuruddin Wiranda
This article outlines various techniques for detecting types of attacks that may arise in ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection. Rule-based attack detection techniques are used to provide an accurate detection method for known attacks. However, determining accurate detection rules requires significant human effort that is susceptible to error. If it is done incorrectly, it can result in false alarms. Therefore, to alleviate this potential problem, the system is being upgraded by combining it (hybrid) with machine learning-based anomaly detection. This article expounds the researchers’ IDS implementation covering a wide variety of detection techniques to detect both known attacks and potential new types of attacks in ZigBee-based IoT system. Furthermore, a safe and efficient meth-od for large-scale IDS data collection is introduced to provide a trusted reporting mechanism that can operate on the stringent IoT resource requirements appropriate to today's IoT systems.
{"title":"ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION","authors":"Fal Sadikin, Nuruddin Wiranda","doi":"10.20527/jtiulm.v8i1.152","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.152","url":null,"abstract":"This article outlines various techniques for detecting types of attacks that may arise in ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection. Rule-based attack detection techniques are used to provide an accurate detection method for known attacks. However, determining accurate detection rules requires significant human effort that is susceptible to error. If it is done incorrectly, it can result in false alarms. Therefore, to alleviate this potential problem, the system is being upgraded by combining it (hybrid) with machine learning-based anomaly detection. This article expounds the researchers’ IDS implementation covering a wide variety of detection techniques to detect both known attacks and potential new types of attacks in ZigBee-based IoT system. Furthermore, a safe and efficient meth-od for large-scale IDS data collection is introduced to provide a trusted reporting mechanism that can operate on the stringent IoT resource requirements appropriate to today's IoT systems.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.156
Yan Puspitarani, Fitrah Rumaisa, Sriyani Violina, Feri Sulianta, Ai Rosita
To be able to have mastery of various sciences that are useful for experience in the world of work, students are encouraged through the MBKM program. Most students of the Informatics Study Program will choose an internship scheme and independent study in applying for the MBKM. However, the increasing number of students' interest in this program requires the Informatics Study Program to be more selective in analyzing the eligibility of students to take part in the MBKM program it has chosen. For this reason, a decision support system is needed that can assist the study program in determining and assessing the eligibility of these students. This study created a DSS modeling using the Analytical Hierarchy Process (AHP) method and the Technique For Order Preference by Similarity to Ideal Solution (TOPSIS) using 8 criteria.
为了能够掌握对工作经验有用的各种科学,MBKM计划鼓励学生。信息学研究项目的大部分学生在申请MBKM时会选择实习计划和自主学习。然而,越来越多的学生对这个项目感兴趣,要求信息学研究项目在分析学生是否有资格参加它所选择的MBKM项目时更加有选择性。出于这个原因,需要一个决策支持系统来帮助研究项目确定和评估这些学生的资格。本研究采用层次分析法(AHP)和TOPSIS (Order Preference Technique of Similarity to Ideal Solution)建立决策支持系统模型,并采用8个标准。
{"title":"DECISION SUPPORT SYSTEM FOR DETERMINING STUDENT ELIGIBILITY TO PARTICIPATE OF MBKM IN THE INFORMATICS STUDY PROGRAM USING AHP AND TOPSIS","authors":"Yan Puspitarani, Fitrah Rumaisa, Sriyani Violina, Feri Sulianta, Ai Rosita","doi":"10.20527/jtiulm.v8i1.156","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.156","url":null,"abstract":"To be able to have mastery of various sciences that are useful for experience in the world of work, students are encouraged through the MBKM program. Most students of the Informatics Study Program will choose an internship scheme and independent study in applying for the MBKM. However, the increasing number of students' interest in this program requires the Informatics Study Program to be more selective in analyzing the eligibility of students to take part in the MBKM program it has chosen. For this reason, a decision support system is needed that can assist the study program in determining and assessing the eligibility of these students. This study created a DSS modeling using the Analytical Hierarchy Process (AHP) method and the Technique For Order Preference by Similarity to Ideal Solution (TOPSIS) using 8 criteria.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124069523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.154
Fal Sadikin, Nuruddin Wiranda
The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens up new types of attacks for systems and networks. This article outlines various techniques to carry out attacks on ZigBee-based IoT systems. We conducted penetration experiments on various possible attacks on Zigbee-based IoT. The purpose of this experiment’s results is for reference in developing an Intrusion Detection System (IDS) specifically for ZigBee-based IoT.
{"title":"INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS","authors":"Fal Sadikin, Nuruddin Wiranda","doi":"10.20527/jtiulm.v8i1.154","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.154","url":null,"abstract":"The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens up new types of attacks for systems and networks. This article outlines various techniques to carry out attacks on ZigBee-based IoT systems. We conducted penetration experiments on various possible attacks on Zigbee-based IoT. The purpose of this experiment’s results is for reference in developing an Intrusion Detection System (IDS) specifically for ZigBee-based IoT.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122690800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.159
Noor Razikin, Yuslena Sari, Erika Maulidiya
Data is inaccurate because it does not have a relevant data repository, data can be lost or damaged, inefficient data search and technicians cannot know for sure the amount of stock available. Based on some of the research above, the inventory information system for Laboratory goods in the Information Technology Study Program will be designed and built based on a website using the Laravel framework. The system development method used is the Incremental model. Incremental models are the result of a combination of elements from the waterfall model that are applied repeatedly, or it can be called a combination of the waterfall model and the Prototype Model. During testing, many errors were found in the system. Testing was carried out 4 times with a total of 164 test cases. In the first test, 98 bugs were found which were then reported to the programmer to be fixed. In the second test, 40 errors were found, in the third test, 19 errors were found, and in the last test conducted by the examiner, 0 bugs were found. The design of the Laboratory Goods Inventory Information System (SIMBA) begins with analyzing the weaknesses of the old system using the PIECES method. Then proceed with conducting a system requirements analysis and system feasibility analysis. After the analysis phase, it is continued with the design stage which begins with the UML design method.
{"title":"DESIGN OF AN INVENTORY INFORMATION SYSTEM FOR LABORATORY SUPPLIES","authors":"Noor Razikin, Yuslena Sari, Erika Maulidiya","doi":"10.20527/jtiulm.v8i1.159","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.159","url":null,"abstract":"Data is inaccurate because it does not have a relevant data repository, data can be lost or damaged, inefficient data search and technicians cannot know for sure the amount of stock available. Based on some of the research above, the inventory information system for Laboratory goods in the Information Technology Study Program will be designed and built based on a website using the Laravel framework. The system development method used is the Incremental model. Incremental models are the result of a combination of elements from the waterfall model that are applied repeatedly, or it can be called a combination of the waterfall model and the Prototype Model. During testing, many errors were found in the system. Testing was carried out 4 times with a total of 164 test cases. In the first test, 98 bugs were found which were then reported to the programmer to be fixed. In the second test, 40 errors were found, in the third test, 19 errors were found, and in the last test conducted by the examiner, 0 bugs were found. The design of the Laboratory Goods Inventory Information System (SIMBA) begins with analyzing the weaknesses of the old system using the PIECES method. Then proceed with conducting a system requirements analysis and system feasibility analysis. After the analysis phase, it is continued with the design stage which begins with the UML design method.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115713393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.157
Frans Juansyah, Dwi Rosa, Indah, Fakultas, Ilmu Komputer
Students at Sriwijaya University are having difficulty accessing academic information through SIMAK using their mobile devices due to a user interface that is not optimized for smartphones. In this study, the author used the Design Thinking method because it has stages that are very helpful in creating prototypes, such as the Empathize stage where the author can directly interact with users' personal opinions, up to the testing stage, which helps the author analyze the results of prototype creation so that further development can be more responsive and better. The prototype was tested through Maze, a platform that helps users test product or service prototypes quickly and efficiently. This platform is integrated with various prototype-making applications and allows users to collect qualitative and quantitative data in one place and the User Experience Questionnaire (UEQ) to analyze data from prototype testing. Based on the results of usability testing, the UEQ scores from 26 SIMAK users were above 1.6, with almost all assessment categories such as "Appeal", "Efficiency", "Accuracy", "Stimulation", "Novelty", and 1.3 in " Perspicuity". Therefore, it can be concluded that the SIMAK prototype design has a good user experience, and the design can be used as a reference for SIMAK mobile-based displays in the future.
{"title":"APPLICATION OF DESIGN THINKING METHOD IN REDESIGNING THE UI/UX OF SIMAK (ACADEMIC INFORMATION SYSTEM) OF SRIWIJAYA UNIVERSITY BASED ON A MOBILE PLATFORM","authors":"Frans Juansyah, Dwi Rosa, Indah, Fakultas, Ilmu Komputer","doi":"10.20527/jtiulm.v8i1.157","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.157","url":null,"abstract":"Students at Sriwijaya University are having difficulty accessing academic information through SIMAK using their mobile devices due to a user interface that is not optimized for smartphones. In this study, the author used the Design Thinking method because it has stages that are very helpful in creating prototypes, such as the Empathize stage where the author can directly interact with users' personal opinions, up to the testing stage, which helps the author analyze the results of prototype creation so that further development can be more responsive and better. The prototype was tested through Maze, a platform that helps users test product or service prototypes quickly and efficiently. This platform is integrated with various prototype-making applications and allows users to collect qualitative and quantitative data in one place and the User Experience Questionnaire (UEQ) to analyze data from prototype testing. Based on the results of usability testing, the UEQ scores from 26 SIMAK users were above 1.6, with almost all assessment categories such as \"Appeal\", \"Efficiency\", \"Accuracy\", \"Stimulation\", \"Novelty\", and 1.3 in \" Perspicuity\". Therefore, it can be concluded that the SIMAK prototype design has a good user experience, and the design can be used as a reference for SIMAK mobile-based displays in the future.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126016659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.155
Prajna Dyah Kinanti, A. Andriana
The purpose of this study was to examine the effect of perceived ease of use, perceived security, and trust on customer satisfaction using BRI mobile banking in Samarinda. This study uses a quantitative approach to the type of associative research. The number of samples used was 96 respondents using the purposive sampling method. The criteria for respondents in this study were BRI customers who are domiciled in the city of Samarinda and are over 18 years old and have been using BRI mobile banking for the last 6 months. The analysis technique used is data quality test, classic assumption test, multiple linear regression test, and hypothesis testing which is processed using the SPSS version 22 application. From the test results it is known that perceived security and perceived satisfaction have a positive and significant effect on the initial trust of BRI mobile banking users both partially and simultaneously, while perceived ease of us does not have a partial significant effect on the initial trust of BRI mobile banking users. So it can be concluded that perceived security and perceived satisfaction affect the initial trust level of BRI mobile banking customers.
{"title":"THE THE EFFECTS OF PERCEIVED EASE OF USE, PERCEIVED SECURITY, AND PERCEIVED SATISFACTION ON INITIAL TRUST OF BRI MOBILE BANKING USERS (CUSTOMER STUDY IN SAMARINDA CITY)","authors":"Prajna Dyah Kinanti, A. Andriana","doi":"10.20527/jtiulm.v8i1.155","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.155","url":null,"abstract":"The purpose of this study was to examine the effect of perceived ease of use, perceived security, and trust on customer satisfaction using BRI mobile banking in Samarinda. This study uses a quantitative approach to the type of associative research. The number of samples used was 96 respondents using the purposive sampling method. The criteria for respondents in this study were BRI customers who are domiciled in the city of Samarinda and are over 18 years old and have been using BRI mobile banking for the last 6 months. The analysis technique used is data quality test, classic assumption test, multiple linear regression test, and hypothesis testing which is processed using the SPSS version 22 application. From the test results it is known that perceived security and perceived satisfaction have a positive and significant effect on the initial trust of BRI mobile banking users both partially and simultaneously, while perceived ease of us does not have a partial significant effect on the initial trust of BRI mobile banking users. So it can be concluded that perceived security and perceived satisfaction affect the initial trust level of BRI mobile banking customers.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115516021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.148
Retno Wardhani, Nur Nafi’iyah
COVID-19 has caused a global health crisis, with increasing numbers of people being infected and dying every day. Various countries have tried to control its spread by applying the basic principles of social aggregation and testing. Experts agree that physical and mental health are interrelated and must be managed and balanced. The government must pay attention to balancing physical and mental health during a pandemic. The Ministry of Health has issued a guidebook for Mental Health and Psychosocial Support (DKJPS) during the COVID-19 pandemic. Based on the mental health conditions of the community or medical personnel, we are trying to create a system for mental health analysis for medical professionals based on the results of questionnaires using the machine learning method (Naive Bayes, Decision Tree, k-NN, SVM, Backpropagation, and Logistic Regression). A total of 24 question questionnaires were submitted to respondents. This study aimed to create a machine learning model (Naive Bayes, Decision Tree, k-NN, SVM, Backpropagation, and Logistic Regression) to identify the mental health of medical personnel during the COVID-19 pandemic. The results of this study are machine learning models that have the highest accuracy in identifying health workers' mental health and are 100% SVM.
{"title":"IDENTIFICATION OF MENTAL HEALTH WORKERS IN LAMONGAN WITH MACHINE LEARNING","authors":"Retno Wardhani, Nur Nafi’iyah","doi":"10.20527/jtiulm.v8i1.148","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.148","url":null,"abstract":"COVID-19 has caused a global health crisis, with increasing numbers of people being infected and dying every day. Various countries have tried to control its spread by applying the basic principles of social aggregation and testing. Experts agree that physical and mental health are interrelated and must be managed and balanced. The government must pay attention to balancing physical and mental health during a pandemic. The Ministry of Health has issued a guidebook for Mental Health and Psychosocial Support (DKJPS) during the COVID-19 pandemic. Based on the mental health conditions of the community or medical personnel, we are trying to create a system for mental health analysis for medical professionals based on the results of questionnaires using the machine learning method (Naive Bayes, Decision Tree, k-NN, SVM, Backpropagation, and Logistic Regression). A total of 24 question questionnaires were submitted to respondents. This study aimed to create a machine learning model (Naive Bayes, Decision Tree, k-NN, SVM, Backpropagation, and Logistic Regression) to identify the mental health of medical personnel during the COVID-19 pandemic. The results of this study are machine learning models that have the highest accuracy in identifying health workers' mental health and are 100% SVM.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"34 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.153
Fal Sadikin, Nuruddin Wiranda
The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.
{"title":"INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES","authors":"Fal Sadikin, Nuruddin Wiranda","doi":"10.20527/jtiulm.v8i1.153","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.153","url":null,"abstract":"The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132626132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-30DOI: 10.20527/jtiulm.v8i1.149
Tira Siya, Fajar Rahayu, M. F. Aransyah
Digital wallets are the most preferred payment method by Indonesian digital society compared to other payment methods, namely cash payments and bank transfers. Over time, several digital wallet platforms began to create QR codes according to their respective platforms. With each platform having its own QR Code, this can make it difficult for users to make payments. Therefore, Bank Indonesia, which is tasked with regulating and maintaining the smooth running of the payment system, regulates the QR Code to be standardized in accordance with the International Europe Mastercard Visa standard. A product is said to be successful if the product is able to meet user needs to increase user satisfaction. In order for the product to meet the standards, it is necessary to evaluate the quality of the product. One of the evaluations that must be carried out is an evaluation of the User Experience. The sampling technique used is purposive sampling with the criteria that domiciled in Samarinda and has used QRIS as a payment system. Data analysis was carried out using the UEQ Data Analysis Tool. The results of this study are that user experience (attractiveness, perspicuity, efficiency, dependability, stimulation, novelty) has a positive impression on QRIS user satisfaction in Samarinda City.
{"title":"ANALYSIS OF QRIS USER EXPERIENCE USING THE USER EXPERIENCE QUESTIONNAIRE (UEQ) METHOD","authors":"Tira Siya, Fajar Rahayu, M. F. Aransyah","doi":"10.20527/jtiulm.v8i1.149","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.149","url":null,"abstract":"Digital wallets are the most preferred payment method by Indonesian digital society compared to other payment methods, namely cash payments and bank transfers. Over time, several digital wallet platforms began to create QR codes according to their respective platforms. With each platform having its own QR Code, this can make it difficult for users to make payments. Therefore, Bank Indonesia, which is tasked with regulating and maintaining the smooth running of the payment system, regulates the QR Code to be standardized in accordance with the International Europe Mastercard Visa standard. A product is said to be successful if the product is able to meet user needs to increase user satisfaction. In order for the product to meet the standards, it is necessary to evaluate the quality of the product. One of the evaluations that must be carried out is an evaluation of the User Experience. The sampling technique used is purposive sampling with the criteria that domiciled in Samarinda and has used QRIS as a payment system. Data analysis was carried out using the UEQ Data Analysis Tool. The results of this study are that user experience (attractiveness, perspicuity, efficiency, dependability, stimulation, novelty) has a positive impression on QRIS user satisfaction in Samarinda City.","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124826340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-05DOI: 10.20527/jtiulm.v8i1.151
Nurul Fathanah Mustamin, M. A. Ma’ruf, Rafif Taufiqurrahman
All citizens, including those with physical limitations, should be able to use public facilities and services without issue. The principles of accessibility—convenience, safety, usability, and independence—must be followed if we are to achieve social welfare in every area of life. For those with mobility or sight impairments, a guiding block (also known as a guiding tile or warning tile) can serve as an important indication. Regrettably, not all visually impaired people make use of this function in its current setup. Use a Support Vector Machine (SVM) and a His-togram of Oriented Gradient (HOG) to extract features for use in Guidance block image categorization. At a threshold of 75, the guiding blocks' classification accuracy is 99.51 percent within 30 cm, 74.811 percent within 50 cm, and 82.221 percent within 80 cm.
{"title":"CLASSIFICATION OF GUIDING BLOCKS FOR THE VISUALLY IMPAIRED USING HOG AND SVM","authors":"Nurul Fathanah Mustamin, M. A. Ma’ruf, Rafif Taufiqurrahman","doi":"10.20527/jtiulm.v8i1.151","DOIUrl":"https://doi.org/10.20527/jtiulm.v8i1.151","url":null,"abstract":"All citizens, including those with physical limitations, should be able to use public facilities and services without issue. The principles of accessibility—convenience, safety, usability, and independence—must be followed if we are to achieve social welfare in every area of life. For those with mobility or sight impairments, a guiding block (also known as a guiding tile or warning tile) can serve as an important indication. Regrettably, not all visually impaired people make use of this function in its current setup. Use a Support Vector Machine (SVM) and a His-togram of Oriented Gradient (HOG) to extract features for use in Guidance block image categorization. At a threshold of 75, the guiding blocks' classification accuracy is 99.51 percent within 30 cm, 74.811 percent within 50 cm, and 82.221 percent within 80 cm. \u0000 \u0000 ","PeriodicalId":330464,"journal":{"name":"Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127604324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}