cover
Contact Name
Andry Fajar Zulkarnain
Contact Email
andry.zulkarnain@ulm.ac.id
Phone
+6281223932020
Journal Mail Official
andry.zulkarnain@ulm.ac.id
Editorial Address
Jl. Brigjen H. Hasan Basry Komp. Kampus ULM Kayu Tangi Banjarmasin, Kalimantan Selatan Phone / Fax: 0511-3304405
Location
Kota banjarmasin,
Kalimantan selatan
INDONESIA
JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat)
ISSN : 25275399     EISSN : 25282514     DOI : http://dx.doi.org/10.20527
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) is intended as a media for scientific studies on the results of research, thinking and analytical-critical studies regarding research in Systems Engineering, Informatics / Information Technology, Information Management and Information Systems. As part of the spirit of disseminating knowledge from the results of research and thought for service to the wider community and as a reference source for academics in the field of Technology and Information.
Articles 10 Documents
Search results for , issue "Vol. 8 No. 1 (2023)" : 10 Documents clear
ANALYSIS OF QRIS USER EXPERIENCE USING THE USER EXPERIENCE QUESTIONNAIRE (UEQ) METHOD Tira Siya Fajar Rahayu; Muhammad Fikry Aransyah
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.149

Abstract

Digital wallets are the most preferred payment method by Indonesian digital society compared to other payment methods, namely cash payments and bank transfers. Over time, several digital wallet platforms began to create QR codes according to their respective platforms. With each platform having its own QR Code, this can make it difficult for users to make payments. Therefore, Bank Indonesia, which is tasked with regulating and maintaining the smooth running of the payment system, regulates the QR Code to be standardized in accordance with the International Europe Mastercard Visa standard. A product is said to be successful if the product is able to meet user needs to increase user satisfaction. In order for the product to meet the standards, it is necessary to evaluate the quality of the product. One of the evaluations that must be carried out is an evaluation of the User Experience. The sampling technique used is purposive sampling with the criteria that domiciled in Samarinda and has used QRIS as a payment system. Data analysis was carried out using the UEQ Data Analysis Tool. The results of this study are that user experience (attractiveness, perspicuity, efficiency, dependability, stimulation, novelty) has a positive impression on QRIS user satisfaction in Samarinda City.
CLASSIFICATION OF GUIDING BLOCKS FOR THE VISUALLY IMPAIRED USING HOG AND SVM Nurul Fathanah Mustamin; Muhammad Afief Ma’Ruf; Rafif Taufiqurrahman
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.151

Abstract

All citizens, including those with physical limitations, should be able to use public facilities and services without issue. The principles of accessibility—convenience, safety, usability, and independence—must be followed if we are to achieve social welfare in every area of life. For those with mobility or sight impairments, a guiding block (also known as a guiding tile or warning tile) can serve as an important indication. Regrettably, not all visually impaired people make use of this function in its current setup. Use a Support Vector Machine (SVM) and a His-togram of Oriented Gradient (HOG) to extract features for use in Guidance block image categorization. At a threshold of 75, the guiding blocks' classification accuracy is 99.51 percent within 30 cm, 74.811 percent within 50 cm, and 82.221 percent within 80 cm.
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.152

Abstract

This article outlines various techniques for detecting types of attacks that may arise in ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection. Rule-based attack detection techniques are used to provide an accurate detection method for known attacks. However, determining accurate detection rules requires significant human effort that is susceptible to error. If it is done incorrectly, it can result in false alarms. Therefore, to alleviate this potential problem, the system is being upgraded by combining it (hybrid) with machine learning-based anomaly detection. This article expounds the researchers’ IDS implementation covering a wide variety of detection techniques to detect both known attacks and potential new types of attacks in ZigBee-based IoT system. Furthermore, a safe and efficient meth-od for large-scale IDS data collection is introduced to provide a trusted reporting mechanism that can operate on the stringent IoT resource requirements appropriate to today's IoT systems.
INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.153

Abstract

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.
INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.154

Abstract

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens up new types of attacks for systems and networks. This article outlines various techniques to carry out attacks on ZigBee-based IoT systems. We conducted penetration experiments on various possible attacks on Zigbee-based IoT. The purpose of this experiment’s results is for reference in developing an Intrusion Detection System (IDS) specifically for ZigBee-based IoT.
THE THE EFFECTS OF PERCEIVED EASE OF USE, PERCEIVED SECURITY, AND PERCEIVED SATISFACTION ON INITIAL TRUST OF BRI MOBILE BANKING USERS (CUSTOMER STUDY IN SAMARINDA CITY) Prajna Dyah Kinanti; Ana Noor Andriana
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.155

Abstract

The purpose of this study was to examine the effect of perceived ease of use, perceived security, and trust on customer satisfaction using BRI mobile banking in Samarinda. This study uses a quantitative approach to the type of associative research. The number of samples used was 96 respondents using the purposive sampling method. The criteria for respondents in this study were BRI customers who are domiciled in the city of Samarinda and are over 18 years old and have been using BRI mobile banking for the last 6 months. The analysis technique used is data quality test, classic assumption test, multiple linear regression test, and hypothesis testing which is processed using the SPSS version 22 application. From the test results it is known that perceived security and perceived satisfaction have a positive and significant effect on the initial trust of BRI mobile banking users both partially and simultaneously, while perceived ease of us does not have a partial significant effect on the initial trust of BRI mobile banking users. So it can be concluded that perceived security and perceived satisfaction affect the initial trust level of BRI mobile banking customers.
DECISION SUPPORT SYSTEM FOR DETERMINING STUDENT ELIGIBILITY TO PARTICIPATE OF MBKM IN THE INFORMATICS STUDY PROGRAM USING AHP AND TOPSIS Yan Puspitarani; Fitrah Rumaisa; Sriyani Violina; Feri Sulianta; Ai Rosita
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.156

Abstract

To be able to have mastery of various sciences that are useful for experience in the world of work, students are encouraged through the MBKM program. Most students of the Informatics Study Program will choose an internship scheme and independent study in applying for the MBKM. However, the increasing number of students' interest in this program requires the Informatics Study Program to be more selective in analyzing the eligibility of students to take part in the MBKM program it has chosen. For this reason, a decision support system is needed that can assist the study program in determining and assessing the eligibility of these students. This study created a DSS modeling using the Analytical Hierarchy Process (AHP) method and the Technique For Order Preference by Similarity to Ideal Solution (TOPSIS) using 8 criteria.
APPLICATION OF DESIGN THINKING METHOD IN REDESIGNING THE UI/UX OF SIMAK (ACADEMIC INFORMATION SYSTEM) OF SRIWIJAYA UNIVERSITY BASED ON A MOBILE PLATFORM Frans Juansyah; Dwi Rosa Indah
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.157

Abstract

Students at Sriwijaya University are having difficulty accessing academic information through SIMAK using their mobile devices due to a user interface that is not optimized for smartphones. In this study, the author used the Design Thinking method because it has stages that are very helpful in creating prototypes, such as the Empathize stage where the author can directly interact with users' personal opinions, up to the testing stage, which helps the author analyze the results of prototype creation so that further development can be more responsive and better. The prototype was tested through Maze, a platform that helps users test product or service prototypes quickly and efficiently. This platform is integrated with various prototype-making applications and allows users to collect qualitative and quantitative data in one place and the User Experience Questionnaire (UEQ) to analyze data from prototype testing. Based on the results of usability testing, the UEQ scores from 26 SIMAK users were above 1.6, with almost all assessment categories such as "Appeal", "Efficiency", "Accuracy", "Stimulation", "Novelty", and 1.3 in " Perspicuity". Therefore, it can be concluded that the SIMAK prototype design has a good user experience, and the design can be used as a reference for SIMAK mobile-based displays in the future.
MITIGATION VOLTAGE SAG USING DVR WITH HYSTERESIS-ANN CONTROL ON DISTRIBUTION SYSTEM PUJON FEEDER LINE Arief Trisno Eko Suryo
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.158

Abstract

This paper discusses the mitigation of voltage sag in distribution systems. Voltage sag often occurs due to a single line-to-ground short circuit fault. The fault has a major impact on load damage in the Pujon feeder line. Voltage sag can be mitigated by using Dynamic Voltage Restorer (DVR). DVR is one type of custom device that is effective in overcoming voltage sag. DVR requires control in regulating voltage recovery on the Pujon line. This research proposes DVR control using Hysteresis combined with ANN to mitigate voltage sag on Pujon line. Simulation results show that the Hysteresis-ANN control is able to recover the load voltage in phase R on average by 97% due to voltage sag that occurs on the Pujon feeder line.
DESIGN OF AN INVENTORY INFORMATION SYSTEM FOR LABORATORY SUPPLIES Noor Razikin; Yuslena Sari; Erika Maulidiya
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.159

Abstract

Data is inaccurate because it does not have a relevant data repository, data can be lost or damaged, inefficient data search and technicians cannot know for sure the amount of stock available. Based on some of the research above, the inventory information system for Laboratory goods in the Information Technology Study Program will be designed and built based on a website using the Laravel framework. The system development method used is the Incremental model. Incremental models are the result of a combination of elements from the waterfall model that are applied repeatedly, or it can be called a combination of the waterfall model and the Prototype Model. During testing, many errors were found in the system. Testing was carried out 4 times with a total of 164 test cases. In the first test, 98 bugs were found which were then reported to the programmer to be fixed. In the second test, 40 errors were found, in the third test, 19 errors were found, and in the last test conducted by the examiner, 0 bugs were found. The design of the Laboratory Goods Inventory Information System (SIMBA) begins with analyzing the weaknesses of the old system using the PIECES method. Then proceed with conducting a system requirements analysis and system feasibility analysis. After the analysis phase, it is continued with the design stage which begins with the UML design method.

Page 1 of 1 | Total Record : 10