Netania Indi Kusumaningtyas
Unknown Affiliation

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

Rancang Bangun Prototipe Alat Ukur Kecepatan dan Arah Angin Berbasis Arduino Pro Mini Studi Kasus Penerapan pada Olahraga Paralayang di Parangtritis Tony Yulianto; Arief Ikhwan Wicaksono; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 13 No 1 (2020): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v13i1.1093

Abstract

Wind is a phenomenon observable a mass movement of air the effect and experienced in everyday life due to differences in the air pressure in two separate places so there the airflow from a having the air pressure is higher to a lower have pressure air. Fast slowness wind speed depends on how big a pressure difference of the two it. Essentially any need sports facilities must meet the standard sports itself. Sports paralayang, on the need facilities able to meet a need the related sports development. This study aims to to build a helmet safety to users paralayang on sports paralayang in parangritis. A helmet these were designed based microcontroller to help users paralayang, so users of paralayang would quickly get information that can be used as an effort to safety. The helmet worn by paralayang, which in upon the helmet these there were instrument that serves to measuring wind speed. When the wind is fast , this instrument will sound and paralayang must be down. So risk can minimize accident. The result of this study graphic display the output of a system for conducting the process of wind measurements is expected to measuring changes wind is more precision by means of sensors optocoupler which are cheap and have good qualities.
Membangun Aplikasi Augmented Reality Berbasis Android di Museum Sudirman Magelang Yuda Nurhusna; Chanief Budi Setiawan; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 13 No 2 (2020): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v13i2.1094

Abstract

A museum is an institution intended for the general public. One of them is the Sudirman Museum, which is located at Magelang City, Central Java. This museum contains relics of General Sudirman that were used during his war. Each museum has different rules in terms of the interaction between visitors and objects on display in the museum. Sudirman Museum is one of the museums that do not allow not to touch objects directly and display information incomplete on each item in the collection. This study aims to overcome the limitations of interaction between museum visitors and objects on display in the museum. This study develops a mobile application based on an operating system based on Augmented Reality that can add to the attraction of the Sudirman museum for visitors so that it is expected to attract visitors to the museum. The results of this research are in the form of an Android application that simulates the contents of the museum and its information through a 2D display on a cellphone screen. In this way, visitors are expected to experience the experience of being in the museum through Augmented Reality. This Augmented Reality-based Android application is designed using the waterfall method and is made using the Unity3D, Vuforia SDK, and Blender applications
Portal Pencari Kerja Event Organizer (EOZone) Menggunakan Pendekatan User-Centered Design Catur Istiqomah; Ahmad Hanafi; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 14 No 1 (2021): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v14i1.1095

Abstract

The need for personnel in an event is one of the keys to the success of an event held. Event Organizer (EO) is one of the containers that can accommodate workers not fixed in accordance with their field that can increase the success of an event because it is filled with experienced people. EOZone is one of the containers that handle various art events, sports, and other events. The author designed and built an EOZone that aims to accommodate job seekers in finding and obtaining information that requires personnel in an event. The system was developed using a User-Centered Design (UCD) approach that is able to provide information and facilitate the application process from job seekers, especially related to event organizers. This research was created with the intention to find out the initial response of job seekers to the system to be built. In the next development, a feature will be built for the job provider to publish the vacancy if the initial response is good. The system is built using the Python programming language with the Flask Framework with MySQL database. The results of this study state that the process contained in the system has run smoothly as evidenced by the results of black box testing. User tests are conducted by providing questionnaires to prospective users and the results show that users agree EOZone can be used as a medium to help job seekers get information about an event.
Rekomendasi Posting Promosi pada Sosial Media Berdasarkan Pengelompokan Hasil Penjualan Produk (Studi Kasus: Maula Hijab) Taufaldisatya Wijatama Diwangkara; Ulfi Saidata Aesyi; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 14 No 2 (2021): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v14i2.1096

Abstract

Maula Hijab is an MSME (Small and Micro Medium Enterprises) located in Sidomoyo, Godean District, Sleman Regency, Yogyakarta Special Region Province that sells Muslim clothing products. Maula Hijab sells its products directly and through marketplace platforms such as Shopee, Lazada, and Tokopedia. In addition, Maula Hijab promotes its products through social media, one of which is Instagram. Social media is used to promote Maula Hijab products, but there is a decrease in the number of viewers reached by the Maula Hijab Instagram account. In addition, a decline in sales of Maula Hijab was found. Therefore, it is necessary to analyze the level of product promotion performance on Instagram on product sales. To analyze the two data, the Data Mining technique used in this study is K-Means Clustering. The K-Means Clustering algorithm is used to group, classify, or group a set of objects based on their attributes or features into a number of similar groups called clusters. This study aims to provide recommendations for promotion of Maula Hijab products using the K-Means Clustering algorithm. This study uses the K-Means Clustering method. The final result of this research is that 3 product clusters are produced, namely product clusters that are recommended to be promoted more often, product clusters that can be re-promoted, and product clusters that have good promotions. The recommendation system built can run to retrieve Instagram data and process the data to produce output in the form of product promotion recommendations.
Analisis Keamanan Data Pribadi pada Shopee Paylater Menggunakan Metode Hybrid Nanang Widayanto; Alfirna Rizqi Lahitani; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 15 No 1 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i1.1097

Abstract

The low level of awareness and understanding of Shopee online shopping application users regarding the security of user data causes the level of digital crime to increase, as evidenced by the many crime cases that occur, namely the misuse of users' personal data by utilizing OTP codes as a verification process. This can be a loophole for digital crimes that are certainly very detrimental to users. Perform personal data security analysis on Shopee PayLater using the Hybrid method. The method used is the hybrid method, which is a method of combining basic digital forensic techniques with re-engineering techniques. This method can be used to analyze applications that involve user personal data, tools used such as MobSF, Virustotal to view application activity, and apk-deguard for apk reengineering. Personal data security research on Shopee PayLater was carried out using the help of Virustotal and MobSF tools found vulnerabilities caused by users. The results of the personal data security analysis carried out on the Android-based Shopee application show that there are several vulnerabilities in the user's personal data vulnerability, namely in the application licensing section.
Analisis Sentimen Berdasarkan Topik Terkait Wabah Covid-19 di Twitter Menggunakan Latent Dirichlet Allocation (LDA) dan Naive Bayes Classifier (NBC) Pangky Putra Aziztiya; Muhammad Habibi; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 15 No 2 (2022): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v15i2.1098

Abstract

In 2020 WHO determined that the Corona Virus (COVID-19) was a pandemic. The global spread of the COVID-19 outbreak has made Twitter one of the most widely used tools to publish and find information. This study aims to form a modeling of topics related to the COVID-19 outbreak on the Twitter social media platform and analyze positive and negative sentiments in each topic that has been obtained by combining the two Latent Dirichlet Allocation (LDA) and Naïve Bayes Classification (NBC) methods. Beginning with modeling the topic using the Latent Dirichlet Allocation so that the topics that have been obtained will be searched for the sentiment value of each topic using the Naïve Bayes Classifier method. This study succeeded in combining the two methods with a fairly good accuracy of 89%. In topic modeling, 5 ideal topics were obtained and it can be seen that the most discussed topic is booster vaccination. The results of the classification using NBC show that the topic of booster vaccination has more negative sentiments than positive sentiments.
Sistem Prediksi Kasus Covid-19 di Indonesia Menggunakan Algoritma Linear Regression Yusriyah Isnaini Mufidah; Andika Bayu Saputra; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 16 No 1 (2023): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v16i1.1099

Abstract

The Coronavirus disease outbreak caused by severe acute respiratory syndrome by coronavirus 2 was first reported in Wuhan, Hubei province, China in December 2019, until March 2, 2020, President Joko Widodo announced the first case of an Indonesian citizen who was confirmed positive for COVID-19. The development of new cases of COVID-19 patients in Indonesia is still being reported even though the pandemic has lasted for almost two years. Then need a way to determine predictions or predict the number of increases in Indonesia’s COVID-19 cases in the future using machine learning technology with the Linear Regression algorithm. Estimating the number of active cases adding positive COVID-19 cases in Indonesia over the next 3 months using the machine learning method using the Linear Regression algorithm. This study predicts COVID-19 cases using machine learning with the Linear Regression algorithm. The model results have a linear coefficient, so the model predicts very well for linear data on days 0 – 300, and on the day after that, the number of positive cases of the national COVID-19 virus does not continue to show a linear relationship, the model becomes inaccurate again. The results of the parameter evaluation show that the level of accuracy is low, but this model can be used as a reference for case predictions for the next month with the results of comparison of predicted data and actual data not much different.
Analisis Tingkat Security Awareness-Personal Threat Terhadap Ancaman Phishing Dengan Metode Technology Threat Avoidance Theory (TTAT) Indah Daila Sari; Dedy Hariyadi; Rama Sahtyawan; Netania Indi Kusumaningtyas
Jurnal Teknomatika Vol 16 No 2 (2023): TEKNOMATIKA
Publisher : Fakultas Teknik dan Teknologi Informasi, Universitas Jenderal Achmad Yani Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30989/teknomatika.v16i2.1250

Abstract

Phishing is a sort of cybercrime that involves obtaining sensitive information through the use of email, SMS, or compromised websites. The effects of phishing are caused by factors in the Technology Threat Avoidance Theory. The single best way to stop phishing attacks is to increase awareness of the risk of them happening among users or end users (human firewall). To determine the next steps in raising user knowledge, it is necessary to measure cybersecurity awareness, particularly against phishing assaults. Identify a few significant cybersecurity awareness of FTTI University of Jenderal Achmad Yani students in Yogyakarta. The investigation in this case included a phishing test and also employed online observation using observers who were asked questions based on the Technology Threat Avoidance Theory (TTAT). Using the MANOVA analysis method, factors influencing cybersecurity awareness analysis is conducted. Based on the analysis and testing of phishing tests as well as online questionnaires from the sample population, it shows that the sample is at a poor level of awareness. While the analysis of cybersecurity influence factors using the MANOVA analysis method shows that the results of the sig.> 0.05 value so that h0 is rejected. Based on the results of the study, it was concluded that FTTI students were still vulnerable to phishing attacks. Factor analysis using the MANOVA method shows that the dependent factor affects the level of cybersecurity awareness of the respondents but there is no significant difference between the dependent factors.