cover
Contact Name
Ni Made Satvika Iswari
Contact Email
satvika@umn.ac.id
Phone
-
Journal Mail Official
ultimatics@umn.ac.id
Editorial Address
-
Location
Kota tangerang,
Banten
INDONESIA
Jurnal ULTIMATICS
ISSN : 20854552     EISSN : 2581186X     DOI : -
Jurnal ULTIMATICS merupakan Jurnal Program Studi Teknik Informatika Universitas Multimedia Nusantara yang menyajikan artikel-artikel penelitian ilmiah dalam bidang analisis dan desain sistem, programming, algoritma, rekayasa perangkat lunak, serta isu-isu teoritis dan praktis yang terkini, mencakup komputasi, kecerdasan buatan, pemrograman sistem mobile, serta topik lainnya di bidang Teknik Informatika. Jurnal ULTIMATICS terbit secara berkala dua kali dalam setahun (Juni dan Desember) dan dikelola oleh Program Studi Teknik Informatika Universitas Multimedia Nusantara bekerjasama dengan UMN Press.
Arjuna Subject : -
Articles 10 Documents
Search results for , issue "Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika" : 10 Documents clear
Implementation of AHP and Topsis Algorithm on Web-based Application Design to Determine Prospective Winners of Betta Fish Contest Muhammad Abdurraffi; Fenina Adline Twince Tobing
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.2669

Abstract

The procurement of beauty competitions from ornamental betta fish has been held throughout Indonesia. The concept of judging and assessment carried out in the ornamental betta fish beauty competition still uses manual bookkeeping. The assessment with the national scale (SNI) is still a concern for the competition participants because of the lack of knowledge about the standard for judging ornamental betta fish contests. DSS (Decision Support System) can be an application development solution to determine the candidate for the winner of the ornamental betta fish contest. The criteria used include color value, neatness value, proportion value, mental value, and appearance value. The calculation method used in conducting this research is AHP and TOPSIS methods. The recommendations made will go through the AHP process for weighting based on the SNI assessment standard, while TOPSIS is used to receive alternatives from users. Then the ranking is based on the preference value generated by the TOPSIS method. This study has obtained the results of the application of the AHP and TOPSIS methods to make a recommendation system for contestants for winning ornamental betta fish correctly. Testing the level of user satisfaction obtains satisfaction results measured through the EUCS (End User Computing Satisfaction) dimension with the help of a Likert Scale calculation, so that it gets a satisfaction value of 87.89%
Estimated Value of Software Developer Productivity at the Software Implementation Stage Using Function Points Asri Maspupah; Lukmannul Hakim Firdaus; Wendi Wirasta
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.2822

Abstract

Most Software Development Processes (SDP) project failures occur due to errors in estimating cost, time, and effort during the planning phase. This happened because the planning carried out still relied on the intuition and experience of the programmer. One approach that can be taken to plan the right SDP is to know the value of SDP productivity. The focus of this research is to determine the value of productivity based on the differences in programmers’ skills. The case study is conducted to determine the productivity value of the web-based software that has been built, namely McDelivery. The productivity value is calculated based on the ratio of software size to the effort. Software size is obtained through the calculation of the Application Function Point Count (APFC). Meanwhile, the effort is obtained through expert judgment to determine the time needed by the development team at the junior, middle, and senior software developers to implement software functionality in person-day to the form of program code. The result shows that the productivity value of SDP is directly proportional to the level of ability of the programmers. These productivity values ​​can be used as a solution option to calculate the estimated time, cost, and even the availability of programmers that are adjusted to the conditions faced in planning software development
Comparative Analysis of Phishing Tools on Social Media Sites Putu Candra Ariani; Kadek Sukma Jayanti; I Gede Bagastia Widi Atmaja; I Gusti Agung Ayu Ananda Dewi; Gede Arna Jude Saskara; I Made Edy Listartha
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.2920

Abstract

Social networks, often referred to as social media are a form of information technology development. Social networks are used by society in obtaining information, being a means of long-distance communication, as well as distributing information. However, behind the development of social media which has experienced significant developments, there are problems related to information security. Vulnerable to leakage of credential data and fraud becomes a negative impact due to the development of social media, one of the scams that often occurs on social media is phishing. Such scams are attempts to obtain, steal, or dig into someone's data through emails, text messages, and social media posts. A kun social media is targeted by perpetrators of phishing crimes because the account consists of sensitive data of social media users, one of the social media accounts that can be exposed the phishing attack is Facebook. Therefore, the problem studied in this study is how criminals use three different types of phishing tools to commit crimes. Social media users now understand how phishing works, where criminals use phishing tools to access social media accounts. The data obtained from this study is a comparison of the performance of phishing tools used in committing information crimes on the Facebook social media site, with the existence of these tools that are easy to use for phishing can be a supporting factor for perpetrators of phishing to user accounts freely.
Web-Based Writing Learning Application of Basic Hanacaraka Using Convolutional Neural Network Method Dewi Candani Sulaiman; Teady Matius Surya Mulyana
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.2993

Abstract

The Javanese script, known as Hanacaraka, or Carakan, is one of the traditional Indonesian scripts developed and used on the island of Java. The government's efforts to preserve the use of Javanese language and script by making Javanese a compulsory subject of local content at the education level in Central Java and East Java. In the basic competence of writing, the Javanese script has a complicated shape so that students have difficulty writing and recognizing Javanese script writing. Through this research a web-based basic Javanese writing learning application was designed that can recognize handwriting digitally which aims to help learn basic hanacaraka writing for beginners, especially students at the basic education level in Central Java and East Java. Handwriting Recognition is a system that can recognize handwritten characters and convert them into text that can be read and understood by machines or computers. The handwriting recognition process in this study uses the Convolutional Neural Network (CNN) algorithm which has the capability and ability to recognize patterns in images. Based on the tests that have been carried out between the two architectural models that have been made, the performance of the CNN model that will be used from various experiments has an accuracy of 98.29% and a loss of 0.0746 on the training data. As well as producing an average accuracy value of 99.52%, an average error rate of 0.48%, an overall accuracy of 95.03% and an overall error rate of 4.97%.
Gamification to Study Machine Learning using Octalysis Framework Monika Evelin Johan; Samuel Ady Sanjaya; Andreas Yogi Brata; Andrew Brillyant
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3118

Abstract

Machine learning is an area of study that enables computers to learn and improve their performance without explicit programming. Its primary application is assisting humans in processing vast amounts of data. Machine learning is a crucial area of study, and to assist students in learning about it, a gamification application has been developed using the Android platform. The aim of this research is to not only provide knowledge to students but also make the application interesting by using the octalysis framework. The application's level of acceptance will be tested on students at Multimedia Nusantara University who are taking machine learning courses. The Unified Theory of Acceptance and Use of Technology Model (UTAUT) method will be used to evaluate the application, which received an average score of 86.77%. This score indicates that students strongly agreed that the gamification approach using the octalysis framework and Android platform for machine learning was well-received.
Methods of Stealing Personal Data on Android using a Remote Administration Tool with Social Engineering Techniques Ridwan Satrio Hadikusuma; Lukas Lukas; Epril M Rizaludin
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3122

Abstract

IT security is a significant concern of the internet because almost all communication occurs today. The purpose of testing personal data theft with the social engineering method is to ensure that the system and network on the user's Android have security holes to be hacked if the user is not aware of social engineering that allows data theft through the remote administration tool (RAT) which is accidentally downloaded on the Android User. Installing a RAT by applying social engineering is the possible and proper way to steal Android user privacy data. This study outlines some basic concepts of data theft, from recent call data and personal data to controlling Android users' cameras and microphones remotely.
Development of a Mobile-Based Student Grade Processing Application Using the Waterfall Method Muhamad Alda
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3134

Abstract

One of the public elementary schools in Medan is SDN 064017. At SDN 064017, the procedure for processing student grade data is not yet computerized. Gradebooks are used to track and process student grade information. There are still certain problems that arise with this method. SDN 064017 requires a lot of time and effort to process and find information on student grades. The purpose of the author's research is to develop a mobile-based application that will simplify and speed up SDN 064017 in processing and searching for student grade data. The system development method used by the author is the waterfall method, consisting of requirements analysis, system design, implementation, testing, deployment, and maintenance stages, while the system testing method uses the black box testing method. In the process of developing a mobile-based application, the author uses the Kodular framework and the Airtable database. With the information system, it is hoped that it can help SDN 064017 in processing and searching student grade data at SDN 064017 to be more effective and efficient through an Android mobile.
Analysis of User-generated Content in Visitor Reviews of Tourist Attractions Using Semantic Similarity Ni Made Satvika Iswari; I Gede Juliana Eka Putra
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3139

Abstract

The tourism industry plays an important role in the world economic sector because it makes a significant contribution to the global economy, creates jobs, and strengthens economic growth. Therefore, visitor satisfaction is very important in this industry. Currently tourists use information in online media to find tourist attractions that suit their needs and expectations. Reviews of tourist attractions are growing on the internet. Customers can post reviews, recommendations, or ratings of a tourist spot. Online reviews in the form of User-generated Content (UGC) can provide benefits for business managers to obtain feedback from customers and improve certain product attributes or service characteristics in order to increase business value and support marketing activities. In this study, data collection will be carried out from one of the UGC tourism data sources, namely visitor reviews on Google Maps. Data analysis was performed using the natural language processing method. Analysis of these data will produce comprehensive information about tourist feedback.
E-Commerce System for Media Group Cooperative Mikha Melvin Agustian; Ririn Ikana Desanti; Wella Wella
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3202

Abstract

E-Commerce is a way to shop online where it is easier for us to process transactions between sellers and buyers without having to face to face, at this time we are required to reduce face-to-face to reduce the spread of covid which is high. Based on these problems created a website that can make sales online. The method used in the system is the SDLC waterfall method to find suitable and appropriate features. The tools used are visual studio code, and Heidi SQL. The result of this research is the website is made using PHP, JavaScript, Bootstrap and CSS for the frontend and the backend of the website. The website created can help make sales online and reduce sales data loss in cooperatives.
Comparative Study of Robot Framework and Cucumber as BDD Automated Testing Tools Khaerunnisa Khaerunnisa; Nungki Selviandro; Rosa Reska Riskiana
ULTIMATICS Vol 15 No 1 (2023): Ultimatics : Jurnal Teknik Informatika
Publisher : Faculty of Engineering and Informatics, Universitas Multimedia Nusantara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31937/ti.v15i1.3228

Abstract

Automation testing is much more efficient and accurate, the script is easy to document, and update compared to manual testing. Testing a website may necessitate time and effort to learn the tools to be used. Cucumber and Robot Framework are well-known open-source frameworks, according to Stack Overflow and GitHub. Cucumber and Robot Framework are known on an international scale, especially Robot Framework, which is often used by large companies. Each uses the Java and Python languages, which both support BDD. The comparative efforts of the two tools aim to help testers compare and determine automated testing tools in the BisOps Logee Port Web Admin case study based on the effectiveness and efficiency of the tools and create specific test cases as test documentation so that testers do not need to spend time analyzing both. Because this research involves evaluation and comparison, several criteria were chosen to support the evaluation process, namely functionality, reliability, usability, performance efficiency, and portability. The results of this study show that both tools can be recommended for novice QA's who want to learn the basics of automation by implementing BDD. Meanwhile, for QA's who have done automation before and want to do more in-depth configuration and reporting, it is recommended to use Robot Framework because the syntax is short, has lots of keywords that make it easier for testers, and can make the testing system shorter but more specific.

Page 1 of 1 | Total Record : 10


Filter by Year

2023 2023