Claim Missing Document
Check
Articles

Found 8 Documents
Search

Identifikasi Atribut Tingkat Lebih Tinggi untuk Prediksi Umur Bug: Identify Higher Level Attributes for Bug Age Prediction Suluh Sri Wahyuningsih; Nursalim
Jurnal Kolaboratif Sains Vol. 6 No. 3: MARET 2023
Publisher : Universitas Muhammadiyah Palu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56338/jks.v6i3.3378

Abstract

Sebuah perangkat lunak yang berkualitas dapat diartikan sebagai suatu produk yang memiliki jumlah kesalahan atau bug yang sedikit. Berbagai cara dilakukan untuk menggurangi jumlah bug, seperti sistem pelacak bugzilla informasi yang disimpan dapat digunakan untuk menyelidiki fenomena yang berbeda. Manajemen proyek perlu memperkirakan waktu yang dibutuhkan untuk menangani suatu bug agar dapat membuat perencanaan proyek yang baik. Penelitian sebelumnya menggunakan atribut primitif (Low Level Attribute) untuk prediksi umur bug, merekomendasikan penggunaan atribut bug tingkat yang lebih tinggi. Oleh karena itu, atribut tingkat lebih tinggi diprediksi keberhasilan dengan akurasi umur bug. Dalam penelitian ini, identifikasi atribut tingkat lebih tinggi digunakan untuk meningkatkan akurasi prediksi umur sebuah bug. Untuk mengidentifikasi atribut mana yang signifikan pengaruhnya terhadap prediksi umur bug digunakan pencarian nilai informasi (infogain). Langkah kedua, yaitu mengukur akurasi klasifikasi berdasarkan atribut-atribut yang ditemukan, oleh karena itu menggunakan sejumlah metode, yaitu Zerro_R, One_R , Decision Tree, dan Naive Bayes. Metode-metode ini baik digunakan untuk dataset yang memiliki korelasi, melibatkan 24 buah atribut, 7 kelas bug_lifetime dan data set sebesar 1000 bug. Hasil penelitian mengidentifikasi 6 atribut tingkat tinggi, dimana 2 diantaranya (summary, dan last change time) dianggap memiliki pengaruh yang signifikan dalam memprediksi umur bug. Kombinasi atribut tingkat tinggi (2 atribut), tingkat rendah (3 atribut) dan seleksi (1 atribut) menghasilkan indeks kappa tingkat substantial (0,81). Hal tersebut menunjukkan dengan penambahan atribut tingkat lebih tinggi untuk prediksi umur bug dapat bekerja lebih baik dari penelitian sebelumnya yang menghasilkan indek kappa moderate (0,60).
The Influence of Electronic Service Quality and Electronic Recovery on Online Re-Purchase Intention: Role of E-Loyalty as Intervening Variable Erwin Dhaniswara; Suluh Sri Wahyuningsih; Handry Eldo; Asri Ady Bakri; Agus Junaidi
Jurnal Sistim Informasi dan Teknologi 2023, Vol. 5, No. 3
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jsisfotek.v5i3.271

Abstract

This study intends to examine how online service quality and online recovery affect online loyalty and how they affect consumers' willingness to repurchase online. In this study, a non-probability sampling strategy with a purposeful sampling procedure was applied. A sample of 100 respondents who had purchased products from the marketplace were given questionnaires in order to obtain the data. The data in this study are analyzed using the Partial Least Square (PLS) method. The findings of this study demonstrate that online repurchase intention and electronic service quality have an impact on online loyalty. This study also discovered that electronic service quality has an impact on online repurchase intention via electronic loyalty. Through electronic loyalty, electronic recovery also has an impact on online repurchase intention.
Application of The Speed-Up Robust Features Method To Identify Signature Image Patterns On Single Board Computer Nursalim; Cut Susan Octiva; Suluh Sri Wahyuningsih; Muhammad Lukman Hakim; Novrini Hasti
Jurnal Sistim Informasi dan Teknologi 2023, Vol. 5, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jsisfotek.v5i4.312

Abstract

Through the development of a signature pattern recognition program on SBC Beagle-bone Black, this research seeks to determine how to differentiate between real and false signatures. Three techniques of gathering data were employed in this study: interviews, observations, and a review of the literature. The quick application development method is the approach that is applied. The rapid, efficient, and brief development cycle (RAD) is emphasized. This study uses a use-case diagram to illustrate the application's logic and data flow. In this study, OpenCV is used as a digital image processing library along with the C++ programming language and QT creator as an integrated development environment (IDE). This application was subjected to both accuracy and functional testing. The following conclusions are drawn from the findings of the investigation and testing that was done: Using the fast library approach for approximate nearest neighbors (FLANN) and the speeded-up robust features (SURF) feature extraction method, the signature pattern recognition program on the Beagle-bone black SBC can differentiate between real and fraudulent signatures. Through the processes of generating image scale space, feature localization, and feature description, the SURF approach extracts feature from signature images. This signature pattern recognition application is one of the digital image processing apps that can be run on the Beagle-bone Black single board computer. This indicates that the specifications of the SBC Beagle-bone Black for digital image processing are good.
The Application of Information Technology Architectural Design Using TOGAF Architecture Framework in Restaurant Service Systems Suluh Sri Wahyuningsih; Muhammad Ziaul Haq; Helson Hamid; Sultan Hady; Nalis Hendrawan
Jurnal Informasi dan Teknologi 2023, Vol. 5, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v5i4.429

Abstract

This research aims to see how TOGAF ADM is applied to modeling information technology architecture in restaurants. In this research, the author used the TOGAF Architecture Development Method (ADM). In TOGAF ADM, there is a definition of architecture and its understanding, which is in the preliminary phase (the preparatory phase). In this modeling, it starts from zero, so a detailed architectural process is needed. This is needed to simplify the subsequent architectural development process. Detailed architectural processes can be obtained using the framework. In TOGAF ADM, there are stages that have been arranged in such a way that the details of the architecture can be seen in them. The modeling that the author will compile also requires support for architectural evolution. This is needed because, initially, the restaurant did not have technological architecture. In Phase F Migration Planning, the framework provides support for technology architecture evolution. Based on the research steps, there are 8 structured stages plus a preliminary stage. However, in this research, the author will only discuss up to stage F, namely migration planning. From the research conducted by the author, a model of information technology architecture for restaurants was obtained, which was implemented using TOGAF ADM. The information technology architecture model includes service processes, payment processes, and monitoring processes.
Comparison Analysis of Service Performance Using Kruskal Wallis-Friedman Test to Minimize Waiting Time in Toll Gate System Suluh Sri Wahyuningsih; Chevy Herli Sumerli A; T. Irfan Fajri; Cut Susan Octiva; Iwan Adhicandra
Jurnal Informasi dan Teknologi 2023, Vol. 5, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v5i4.437

Abstract

The purpose of this study is to compare how well conventional, automatic, and OBU toll gates perform in terms of service. The author of this study employed two data collection techniques: primary data was gathered through interviews and field observations, and secondary data was obtained through a review of the literature. You choose which features and parameters are subject to change while the simulation is running. The system will be used to simulate how each algorithm performs in accordance with ideas and scenarios that have already been decided. Following the recording of the simulation findings, the verification step will be completed. On the basis of the outcomes of earlier data processing and analysis, the following conclusions are possible: In creating a toll gate model, two automatic toll booths spaced 60 meters apart from the toll gate were used as simulations to approximate the real thing. utilizing the Kruskal-Wallis-Friedman test computations to compare the performance of the toll gate service with six scenarios. The OBU-OBU scenario has the system's shortest waiting time, according to the computation findings. Conversely, the server utilities that are in use are traditional and traditional.
Application of the K-Nearest Neighbor Algorithm Method to Analyze Netizen Responses and Reactions Toward the Relocation of Capital City at social media Muhammad Ziaul Haq; Suluh Sri Wahyuningsih; Nursalim; Uli Wildan Nuryanto; Andy Rachman
Jurnal Informasi dan Teknologi 2023, Vol. 5, No. 4
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v5i4.458

Abstract

Sentiment analysis is a form of natural language processing that uses word analysis to ascertain people's thoughts, feelings, and views on a certain topic. In this study, word processing refers to the procedure used to categorize written texts into positive and negative emotion categories. Using data crawling techniques, information on public comments on the relocation of Indonesia's capital was gathered from Twitter social media. Keywords related to the move included "new capital," "moving capital," and "moving capital with 10,000 comments." The author of this work classified test data and training data using a lexical approach using the K-Nearest Neighbor (K-NN) method. The purpose of this study is to evaluate the K-NN algorithm's accuracy, error rate, precision, f-measure, and recall. In order to identify the ideal parameters, tests were also conducted on calculating the k value in the K-Nearest Neighbor (K-NN) method. Testing the K-Nearest Neighbor (K-NN) method yielded the greatest accuracy level of 60% with a k value of 9, concluding with the initial data collection. The K-Nearest Neighbor (K-NN) technique was evaluated in the second data collection, and with a k value of 5, it had the best accuracy level of 70%. Future scholars might create texts in languages other than Indonesian and categorize those that include visuals in them. Next, add more dictionaries to the collection and extract features from bigrams, trigrams, quadgrams, and other combinations. You may then employ several algorithmic techniques in the accuracy calculation feature.
Application of Technology Acceptance Model and Delone and McLean IS Success Model to Measure Information System Design for Academic Activities in Higher Education Institution Suluh Sri Wahyuningsih; Chevy Herli Sumerli A; Novi Rahayu; Uli Wildan Nuryanto; Budi Ramadhani
Jurnal Informasi dan Teknologi 2024, Vol. 6, No. 1
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v6i1.470

Abstract

The purpose of this study is to investigate the variables that may affect how well the academic information system performs. Quantitative approaches are employed in this study. The basic random sampling technique was used in this study to get samples from the community of academic information system users. There were 100 samples used in this investigation. The Technology Acceptance Model (TAM) and the Delone & Mclean model are used in this study. In this study, questionnaires were distributed as part of the data collection process. The SmartPLS was used in this study's inferential statistical analysis. According to the analysis results, introducing elements that have the biggest impact namely, perceived ease of use and service quality should be prioritized in order to improve helpdesk services in academic information systems. This involves establishing a report ticket function to resolve user complaints and offer updates on problem resolution, as well as optimizing academic information system for mobile displays to promote simple access to various academic information system -related demands. Perceived ease of use on perceived usefulness (path coefficient value: 0.79); service quality on perceived ease of use (path coefficient value: 0.79); user satisfaction on net benefits (path coefficient value: 0.74); and system quality on net benefits (path coefficient value: 0.03), are the variables that have the biggest influence in this research.
The Application of COBIT Framework to Evaluate Information System Governance in National Business Technology Transformation Companies Kraugusteeliana Kraugusteeliana; Suluh Sri Wahyuningsih; Intan Hesti Indriana; Dikky Suryadi; Musran Munizu
Jurnal Informasi dan Teknologi 2024, Vol. 6, No. 1
Publisher : SEULANGA SYSTEM PUBLISHER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60083/jidt.v6i1.479

Abstract

The purpose of this study is to determine how to assess information technology governance by utilizing the COBIT 5 framework and the domains of APO01 (Manage the IT Management Framework), EDM04 (Ensure Resource Optimization), and APO04 (Manage Innovation). The COBIT 5 architecture is employed in this study. Both qualitative and quantitative research methodologies were used in this study. Through surveys, interviews, and observations, we gathered primary data. The secondary data came from various existing sources, including websites, literature reviews, and the findings of other investigations. This study's information technology governance data analysis approach complies with COBIT 5's Assessment Process Activities. According to the analysis, the current state's capability value in the EDM04 domain is 1.8. In the meantime, the capability value is 2.9 for the anticipated circumstance. The APO01 domain's recent state results in a capability value of 1.7. In the meantime, the capability value is 3.1 for the expected circumstance. In the APO04 domain, the current state has a capability value 1.6. Under ideal circumstances, the business receives a capacity value of 3. This implies that the business needs to fulfill the prerequisites for level 2 process capacity indicators, which are now unfulfilled. For instance, producing papers outlining the management of the innovation process and documents evaluating rejected innovative ideas.