Claim Missing Document
Check
Articles

Evaluasi User Experience Dalam Aspek Usability Pada Aplikasi Android Edukasi Literasi Matematika Rizal Padhilah; Muhammad Raihan Satrio Putra Pamungkas; Syarifah Husniyah; Nisrina Ramadhani Listarto; Annisa Nur Aeni; Rini Marwati
Jurnal KomtekInfo Vol. 9 No. 4 (2022): Komtekinfo
Publisher : Universitas Putra Indonesia YPTK Padang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35134/komtekinfo.v9i4.316

Abstract

Currently, user experience has becomes an important thing in software development. Few users reportedly has left the application as a result of bad experience that occurs to them. Usability as one of the sub aspect of user experience that play role as a indicator level of how easy user using application is being evaluated in this study. Perceptual difference due to gender and character of children became the choosen topic, so this study aims to determine the significant effect of gender from elementary school students on the results of the usability evaluation that conducted. The application tested in this study is an android-based application called PrismaKu which is present as a smart solution to improve the mathematical literacy skills of elementary school students in Indonesia. This research method refers to previous method named research learning spiral method which is carried out in one cycle. Tests were conducted to measure the duration of each task and application ease of use assessment using the System Usability Scale (SUS). Based on the research results, there are no significant effect of gender from elementary school students on the results of usability neither duration of each task nor system usability scale score. Nevertheless, score and duration show difference as viewed from numerical and descriptive perspective.
Rumah Belajar “Saung Himelnah” sebagai Tempat Edukasi Gaya Hidup Tanpa Sampah (Zero Waste) di Kampung Papakserang Rini Marwati; Entit Puspita; Fitriani Agustina
E-Dimas: Jurnal Pengabdian kepada Masyarakat Vol 14, No 1 (2023): E-DIMAS
Publisher : Universitas PGRI Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26877/e-dimas.v14i1.7022

Abstract

Banyaknya kasus putus sekolah pada anak usia Sekolah Dasar di Kampung Papak Serang menjadi motivasi dibentuknya rumah belajar “Saung Himelnah”. Kegiatan berlangsung setiap hari Minggu berupa bermain sambil belajar beragam ilmu seperti matematika, sejarah, bahasa Indonesia, Inggris dan Jepang. Penanaman disiplin, empati, tanggung-jawab, dan karaktar positif lain diaplikasi melalui pembiasaan. Penutupan tempat pembuangan sampah di Kampung Papakserang, menyebabkan warga membuang sampah ke sungai atau membakarnya yang dapat menyebabkan polusi lingkungan. Melalui rumah belajar “Saung Himelnah” ini anak-anak diedukasi untuk memahami dampak tercemarnya lingkungan dan mencari solusi untuk masalah sampah melalui gaya hidup tanpa sampah (zerowaste lifestyle), yaitu dengan pemanfaatan sampah plastik untuk ecobrick dan sampah organik untuk pupuk kompos. Melalui edukasi dan pembiasaan pada anak-anak diharapkan akan berdampak positif pada keluarga dan lingkungan.
Digital Module Innovation in Multimedia Lectures with a Project-Based Learning Model Rini Marwati; Kartika Yulianti
Daya Matematis: Jurnal Inovasi Pendidikan Matematika Vol 11, No 1 (2023): March
Publisher : Universitas Negeri Makassar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26858/jdm.v11i1.39011

Abstract

The use of multimedia as a medium of information has been utilized in various fields, including in lectures at universities. This paper discusses the development of a digital module for Multimedia lectures with a Project-Based Learning model. The research method used is research and development. The research results show that the developed digital module effectively facilitates students in completing their projects. Students succeeded in creating mathematics learning content for high school students packaged in a Learning Management System (LMS). Furthermore, 90% of students gave a positive response to Project-Based Learning lectures using the developed digital module.
PERAMALAN PANGSA PASAR KARTU GSM DENGAN PENDEKATAN RANTAI MARKOV Surya Amami Pramuditya; Rini Marwati; Entit Puspita
Euclid Vol 1, No 2 (2014): EDISI JULI
Publisher : Universitas Swadaya Gunung Jati.

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (138.241 KB) | DOI: 10.33603/e.v1i2.350

Abstract

Handphone atau telepon genggam dalam kehidupan masyarakat Indonesia sudah menjadi barang penting yang harus dimiliki, sekitar separuh dari seluruh populasi negeri ini merupakan pengguna handphone. Handphone berkaitan dengan provider kartu penyelengara komunikasi. Dengan semakin meningkatnya pengguna handphone, maka para provider berlomba-lomba untuk mendapatkan pelanggan agar dapat menguasai pangsa pasar kartu GSM dan hal tersebut dapat ditentukan dengan probabilitas penggunaan (pangsa pasar) terbesar. Untuk memaksimalkan pengambilan keputusan periode mendatang, provider dapat melakukan prediksi pangsa pasar periode mendatang dan dapat dilakukan dengan menggunakan analisis rantai Markov (Markov Chain analysis). Rantai Markov adalah suatu proses random (stokastik) dengan Markov Property di mana dengan keadaan saat ini, keadaan yang akan datang bersifat independen terhadap keadaan yang lampau dan hanya tergantung pada keadaan yang terdekat sebelumnya. Dari konsep inilah dapat diprediksi pangsa pasar beberapa periode mendatang disertai periode equilibrium. Dalam penelitian ini dibahas penerapan analisis rantai Markov dalam memprediksi pangsa pasar kartu GSM berdasarkan pola perpindahan. Berdasarkan hasil penelitian diperoleh produk kartu GSM AS menguasai pangsa pasar kartu GSM pada periode kedua yaitu tahun 2010 dan tahun 2011 dengan persentase sebesar 27% dan 28%. Periode equilibrium terletak antara periode ketiga dan periode keempat.Kata kunci : Markov Chain analysis, pangsa pasar GSM, equilibrium.
Peramalan Jumlah Penderita DBD di Provinsi Jawa Barat dengan Metode Hybrid Sarimax-Ann Indriany Rahayu; Rini Marwati; Dewi Rachmatin
JMT : Jurnal Matematika dan Terapan Vol 4 No 2 (2022): JMT (Jurnal Matematika dan Terapan)
Publisher : Program Studi Matematika Universitas Negeri Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/jmt.4.2.2

Abstract

Indonesia is one of the tropical countries in the world, therefore Indonesia has two seasons, namely the dry season and the rainy season. Because it has two seasons, it can cause tropical diseases that is growing very fast is Dengue Hemorrhagic Fever (DHF). DHF is time series data tha can be collected annually and has a seasonal cycle. Because it is time series data, it can be forecasted using SARIMAX method, but SARIMAX is only able to solve linear problems and to overcone non-linear prolblems it can be solved using the ANN Backpropagation method. Therefore, in this study using the Hybrid SARIMAX-ANN method. The data in this study contained the dependent variable and the independent variable. The dependent variable is DHF data, while the independent variable is air humidity, air temperature, and rainfall data. The result obtained in this study, namely the factor that greatly affects DHF is air humidity. Forecasting result form Januari 2021 to June 2021 are 1.081, 960, 1.132, 1.103, 2.467, and 1.605. the it produces a MAPE value of 16,33% which means a good level of accuracy.
Implementasi Kriptografi Secret Sharing Scheme dan Steganografi Audio Least Significant Bit (LSB) Alvira Firjan Humaira; Rini Marwati; Kartika Yulianti
JMT : Jurnal Matematika dan Terapan Vol 5 No 1 (2023): JMT (Jurnal Matematika dan Terapan)
Publisher : Program Studi Matematika Universitas Negeri Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/jmt.5.1.1

Abstract

As long as communication technology continues to develop, information security becomes very important because crime in cyberspace is increasingly common. To improve information security, in this study a combination of secret sharing scheme (t, w) cryptography with the least significant bit (LSB) audio steganography was constructed. Secret sharing scheme cryptography is a modern cryptography that is able to prevent centralized information situations from occurring because it does not require a key for encryption. In addition, this method also makes it difficult for hackers to reconstruct messages because it is difficult to collect minimum shares. The implementation of this merger resulted in a prototype program using the Python 3.10 programming language with schema (3,4). The cover steganography media used is audio, and messages that can be processed by the program are a six-digit PIN number with a non-zero first digit. The results obtained from the encryption and embedding program are 4 pieces of audio-share which sound the same as the original audio, so that the existence of information in the audio is difficult to know. The result of the decryption and extracting program is a PIN that can be reconstructed.
Aplikasi Web Prediksi Dampak Gempa di Indonesia Menggunakan Metode Decision Tree dengan Algoritma C4.5 Diory Pribadi Sinaga Sinaga; Rini Marwati; Bambang Avip Priatna Martadiputra
JMT : Jurnal Matematika dan Terapan Vol 5 No 2 (2023): JMT (Jurnal Matematika dan Terapan)
Publisher : Program Studi Matematika Universitas Negeri Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21009/jmt.5.2.5

Abstract

An event or problem sometimes needs to be predicted to determine the impact caused. One of the events that need to be predicted is the impact of the earthquake. The Meteorology, Climatology and Geophysics Agency (BMKG) classifies earthquake impacts based on the BMKG Earthquake Intensity Scale (SIG-BMKG) which consists of 5 scales. In making predictions on a problem, you can use data mining that extracts data into useful information. Grouping the impact of an earthquake is one of the tasks of data mining, namely classification. Prediction can be viewed as a classification that groups data into predefined classes. One classification method is the Decision Tree. This method can handle both categorical and numerical data on large data. Some of the algorithm of the Decision Tree method are ID3, CART, and C4.5. The C4.5 algorithm is an improved ID3 algorithm so that it can handle missing values and continuous data. This study aims to construct a model and analyze the performance of the model obtained using the Decision Tree method with the C4.5 algorithm. In determining the best model, you can utilize Split Validation and k-fold Cross Validation. The best model was obtained in the first iteration of 10-fold Cross Validation. The best model is then used in a web application that can be used by the community to predict the impact of earthquakes that occur in Indonesia.
Peramalan dan dekomposisi untuk mata uang kripto dengan model facebook prophet Rahman, Dany; Rachmatin, Dewi; Marwati, Rini
Majalah Ilmiah Matematika dan Statistika Vol. 24 No. 1 (2024): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v24i1.39159

Abstract

Cryptocurrencies are becoming one of the hottest topics in Indonesia's society. One of those issues concerns investors who incur financial losses as a result of investing in crypto. The facebook Prophet model, one of the forecast models, can offer a solution to this problem. The Prophet model is built using four function. These variables are trend, seasonality, holidays, and additional regressions. The Prophet model benefits from a number of advantages, one of which is its ability to generate decomposition graphs. The decomposition may give analysts more insight into the data they are analyzing. The Prophet model is used to forecast and decompose the price of a cryptocurrenciy called Solana in this study. A multiplicative model with linear function as trend function, weekly seasonality, and daily seasonality as seasonality function is the best model for Solana price forecasting and decomposition. Additionally, hyperparameters in the model are tuned so the model won’t suffer underfitting or overfitting indications. The fitted Prophet model is good at forecasting as a result of the evaluation process. As a result of the forecast and decomposition, the forecasted value and the decomposition graph of the Solana exchange rate for one hour later show that the price of Solana will remain constant. Keywords: Cryptocurrency, time series, forecasting, decomposition, facebook prophetMSC2020: 62M10
Penggabungan Affine Cipher dan Least Significant Bit-2 untuk Penyisipan Pesan Rahasia pada Gambar Kurniasih, Firda; Marwati, Rini; Sispiyati, Ririn
Jurnal EurekaMatika Vol 11, No 2 (2023): Jurnal Eurekamatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/jem.v11i2.62115

Abstract

As technology develops, improving message security is very important. One approach that can be taken to improve message security is to combine cryptography and steganography. In this study, the authors combined Affine Cipher cryptographic and Least Significant Bit-2 (LSB-2) steganography. In this merge method, the Affine Cipher cryptography is applied first, then, the encrypted message is inserted into an image using LSB-2. Specifically, LSB-2 is a modification of the Least Significant Bit (LSB) method which works by exchanging the sixth bits of each pixel color element in the image with the bits of the secret message. The LSB-2 used is a random LSB-2. In this case, the random numbers are generated by the Pseudo Random Number Generator (PRNG). The results of this research are a computer application with the Python language version 3.11 which can disguise messages and insert them in an image. Based on the implementation, the combination Affine Cipher and LSB-2 can complicate cryptanalysis because it has to hack two algorithms and the message is hidden randomly in an image.Keywords: Affine Cipher, Cryptography, LSB-2, Message Security, Steganography.  AbstrakSeiring berkembangnya teknologi, peningkatan keamanan pesan menjadi sangat penting. Salah satu pendekatan yang dapat dilakukan untuk meningkatkan keamanan pesan adalah dengan menggabungkan kriptografi dan steganografi. Pada penelitian ini, penulis melakukan penggabungan antara teknik kriptografi Affine Cipher dan steganografi Least Significant Bit-2 (LSB-2). Dalam metode penggabungan ini, keamanan pesan dilakukan dengan menerapkan kriptografi Affine Cipher terlebih dahulu. Kemudian, pesan yang telah dienkripsi disisipkan ke dalam citra menggunakan LSB-2. Lebih spesifiknya, LSB-2 merupakan modifikasi dari metode Least Significant Bit (LSB) dengan menukarkan bit ke enam dari setiap elemen warna pixel pada gambar dengan bit-bit dari pesan rahasia yang ingin disembunyikan. LSB-2 yang digunakan merupakan LSB-2 secara acak. Bilangan acak yang diperlukan dalam proses ini dihasilkan melalui Pseudo Random Number Generator (PRNG). Hasil penelitian ini berupa aplikasi komputer dengan bahasa pemrograman Python versi 3.11 yang dapat menyamarkan pesan dan menyisipkannya dalam gambar. Berdasarkan implementasi, diperoleh hasil bahwa penggabungan Affine Cipher dan LSB-2 dapat mempersulit kriptanalisis karena harus meretas dua algoritma dan pesan disembunyikan secara acak keberadaannya di dalam gambar. 
Implementasi QR Code dengan Algoritma SHA-256 dan RSA yang Ditingkatkan untuk Autentikasi Dokumen Digital Az-Zahra, Fatimah; Marwati, Rini; Sispiyati, Ririn
Jurnal EurekaMatika Vol 12, No 1 (2024): Jurnal EurekaMatika
Publisher : Universitas Pendidikan Indonesia (UPI)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.17509/jem.v12i1.67161

Abstract

Digital technology is developing very rapidly, including document digitization. With the shift in the form of documents, wet signatures have also shifted to electronic signatures. During the distribution process of digital documents, there is no guarantee that the contents of the document are not modified by other parties, so a tool is needed to authenticate the authenticity of the document. Cryptography can be a solution, especially asymmetric key cryptography. The Rivest-Shamir-Adleman (RSA) algorithm is a type of asymmetric cryptography with security that lies in the integer factoring problem. To speed up the encryption and decryption process, an improved RSA is used by adding one prime number to the key generation process. In addition to asymmetric key cryptography, there is one function that is useful in creating electronic signatures, which is the hash function. The combinations of the RSA algorithm and the SHA-256 hash function can be one solution for digital document authentication. In addition, the addition of a QR Code can also make it easier to sign and check the authenticity of documents.Keywords: Document Authentication, Electronic Signature, Enhanced RSA, QR Code, SHA-256. AbstrakTeknologi menjadi salah satu bidang yang berkembang dengan sangat pesat saat ini dan membuat banyak hal didigitalisasi, salah satunya adalah dokumen. Dengan adanya peralihan bentuk dokumen, tanda tangan basah juga beralih menjadi tanda tangan elektronik. Selama proses distribusi dokumen digital, tidak ada jaminan bahwa isi dokumen tidak dimodifikasi oleh pihak lain sehingga diperlukan alat untuk melakukan autentikasi keaslian dokumen. Ilmu kriptografi dapat menjadi solusi, khususnya kriptografi kunci asimetri. Algoritma Rivest-Shamir-Adleman (RSA) adalah jenis kriptografi asimetri dengan keamanan yang terletak pada masalah pemfaktoran bilangan bulat. Untuk mempercepat proses enkripsi dan dekripsi, digunakan RSA yang ditingkatkan dengan cara menambahkan satu bilangan prima pada proses pembangkitan kunci. Selain kriptografi kunci asimetri, terdapat satu fungsi yang berguna dalam pembuatan tanda tangan elektronik, yaitu fungsi hash. Penggabungan algoritma RSA dan fungsi hash jenis SHA-256 dapat menjadi salah satu solusi untuk autentikasi dokumen digital. Selain itu, adanya penambahan QR Code juga dapat lebih mempermudah dalam proses penandatanganan dan pemeriksaan keaslian dokumen.
Co-Authors Achmad, Puteri Ressiana Dewi Adiwibawa, Muhammad Hilman Agus Yodi Gunawan Alpian, Ilham Alpian, Ilham Alvira Firjan Humaira Anggita Septiani Annisa Nur Aeni Aryanti Aryanti Asyifa Nurbaiti Saepudin Az-Zahra, Fatimah Bambang Avip Priatna Martadiputra cakrawala Bambang Supriatno Bonita, Srita Tania Cece Kustiawan Della Annisa Zahra Desti Pertiwi Setiawati Dewi Achmad, Puteri Ressiana Dewi Rachmatin Dian Usdiyana Diory Pribadi Sinaga Sinaga Dwi Haryanto Ely zabeth, Ely Elyzabeth, Elyzabeth Entit puspita Eyus Sudihartinih Febriany, Nadra Febriany, Nadya Firdaus, Ivan Luckiyana Firdaus, Jafarudin Fitri, Ghaisani Fildjah Fitriani agustina Fophin, Theodore Dwivaland Hakim, Rakhmat Nurul Hana Nur Azizah Husty Serviana Husain Ima Nursaadah, Ima Indriany Rahayu Iskandar Fahmi Isnie Yusnitha, Isnie Kartika Yulianti Khusnul Novianingsih Koosbandiah Surtikanti, Hertien Kurniasih, Firda Lia Amelia Lia Malihah, Lia Lis Endah Pratiwi, Lis Endah Maman Suherman Muftiyah, Salma Muhammad Fakhri Naufal Muhammad Raihan Satrio Putra Pamungkas Muhtar, Sumanang Nina Fitriyati Nisrina Ramadhani Listarto Novianti, Neera Puri Pangestu, Herny Wulandari Pangestu, Herny Wulandari Pebriani, Dwi Putri Raden Raden Danika Aghniya Rahman, Dany Ririn Sispiyati Rizal Padhilah Rizky Rosjanuardi S. Sutawanir Sahl Fawzy Sutopo Salsabila Ayu Pratiwi Sari, Asyifa Anggun Sitohang, Tamado Ramot Suci Permata Hati Sumanang Muhtar Gozali Surya Amami Pramuditya Surya Amami Pramuditya Syarifah Husniyah Tia Purniati Topik Hidayat Wahyu Surakusumah Wulan Dian Pramiesti