Articles
6,850 Documents
Analisis Pengaruh Parallax Scrolling Pada Situs Web Terhadap User Experience
Maulani Camaliah Maramida;
Ismiarta Aknuranda;
Niken Hendrakusma Wardani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (841.721 KB)
User Experience (UX) is an important aspect in the development of digital business as it is one of the key in website content. Researchers have attributed a pleasurable user experience to the fulfillment of the following variables: usability, satisfaction, enjoyment, fun and visual appeal. Parallax scrolling as one of the web design techniques is considered to bring UX to a new interactive level and is even considered a new limitation in UX. Therefore, parallax scrolling has recently become quite popular among web developers. Parallax scrolling is a visual effect that duplicates the depth of an image or two-dimensional screen to make it look three dimensional. Unfortunately, speculation about parallax scrolling and UX relationships is still emerging because parallax scrolling is considered bad for search engine optimization (SEO), weakening internal linking and causing load duration due to the large number of images used in websites with parallax scrolling which may then potentially have an effect on UX. In this study used the above variables in order to see how the user experience when interacting with the website with and without parallax scrolling and find the reason why parallax scrolling is considered to have an effect or no effect on UX.The results showed that participants' experience did not differ greatly, so parallax scrolling concluded did not significantly affect UX. Another reason why parallax scrolling is considered to be unaffected is that in the study only two participants were aware of the effects of parallax scrolling on the website they were using, so it was not certain that the assessment by all participants was due to the use of parallax scrolling.
Analisis Kinerja IoT Middleware Berbasis Event-Driven pada Raspberry Pi Zero dan Raspberry Pi 2
Ula Auliya Ilham Irsahnda;
Eko Sakti Pramukantoro;
Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (818.735 KB)
IoT middleware telah dikembangkan untuk mengatasi masalah syntactical interoperability dengan menggunakan gateway multiprotokol yaitu MQTT, CoAP, dan Websocket. Dengan beragamnya perangkat yang dapat digunakan sebagai host untuk middleware timbul pertanyaan bagaimana spesifikasi minimal untuk perangkat yang dapat digunakan sebagai host untuk middleware sehingga pada penelitian ini host yang digunakan untuk middleware adalah raspberry pi zero dengan mempertimbangkan karakteristik raspberry pi zero yang lebih sederhana untuk mengetahui bagaimana kinerja dari IoT middleware jika dihadapkan pada perangkat yang lebih sederhana dan untuk mengetahui batasan bawah kebutuhan perangkat untuk IoT middleware ini. Hasil dari pengujian menunjukkan bahwa rata-rata penggunaan CPU oleh middleware sebesar 1,25% dan penggunaan memori sekitar 13%. Delay yang dibutuhkan dari publisher hingga sampai ke aplikasi sebesar 0,868 detik untuk protokol MQTT dan 0,962 detik untuk protokol CoAP. Dari segi skalabilitas, middleware mampu menangani hingga 81 pesan per detik untuk protokol MQTT, 41 pesan per detik untuk protokol CoAP dengan jumlah publisher sebanyak 100. Sedangkan pada protokol Websocket jumlah subscriber yang dapat ditangani meningkat seiring dengan bertambahnya jumlah klien hingga mencapai 54 pesan per detik. Secara keseluruhan dapat disimpulkan bahwa kinerja dari middleware pada raspberry pi 2 lebih baik daripada kinerja middleware pada raspberry pi zero.
Penentuan Menu Makanan Untuk Penderita Diabetes Menggunakan Metode Iterative Dichotomizer Tree (ID3)
Naufal Sakagraha Kuspinta;
Agus Wahyu Widodo;
Muhammad Tanzil Furqon
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 4 (2018): April 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (914.229 KB)
Diabates Mellitus (DM) is a metabolic disorder caused by several factors such as insulin deficiency or the inability of the body to utilize insulin. Most patients suffer from this disease due to heredity and unhealthy lifestyle. Diabetes Mellitus is also a chronic disease that became a public health problem in Indonesia. In the body of patients with DM, the inability to automatically adjust the sugar levels in the blood like a healthy person makes them suffering from diabetes. Significant increases in hyperglycemia or sugar levels are believed to increase along with digested consumption. Causes of food sources consumed. Iterative Dichotomizer Tree (ID3) is one of the methods. Subjects in this research is the application of data grouping by using Iterative Dichotomizer Tree (ID3) to classify diabetic food menu data. The dataset used in this study is sourced from Puskesmas Kendalsari Malang. The results of this study is a system capable of grouping food menu datasets for diabetics using the ID3 method. From the test conducted by the results of the testing of 80 data trainning dan 20 data testing is 75%.
Klasifikasi Penyakit Gigi Dan Mulut Menggunakan Metode Support Vector Machine
Ana Mariyam Puspitasari;
Dian Eka Ratnawati;
Agus Wahyu Widodo
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 2 (2018): Februari 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (897.318 KB)
Oral diseases is one of the most serious diseases that impact to human health in general, as the mouth is a place where the germ and bacteria oral diseases should be handled immediately but not all dental expert can quickly do the handling due to the lack of a dental expert that is available in the hospital for 24 hours. Knowing the types oral diseases since the beginning is very important. Therefore, a system that has the ability to classify types of oral diseases will be very helpful in order to help the community in conducting early diagnosis of oral diseases. This research used classification system using of SVM method because SVM method can resolve the problem of classification and regression with linear or non linear kernel with its capability as a learning algorithm on the classification or regression. This research used One-Againts-All strategies for non linear process and used RBF kernel. The results obtained using SVM method has a mean median values of accuracy - 94,442% using the dataset as much as 122 data and with the parameter λ value SVM training sequential (lamda) = 0.1, y (gamma) = 0.1, C (Complexity) = 1, ε (epsilon) = 1.10-10 with itermax = 50 and ratio data 80%: 20%. The results shows good accuracy, and the research can be applied to help perform classification of oral disease using support vector machine method.
Pengembangan Sistem Penentuan Prioritas Kebutuhan Perangkat Lunak Dengan Metode MVGB (Majority Voting Goal Based)
Fikri Arroisi;
Bayu Priyambadha;
Denny Sagita Rusdianto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (645.453 KB)
Requirement engineering is the initial stages of software engineering activities, where requirements elicited and analyzed. Requirement prioritization is an important process in requirement engineering that can determine the success of a software development project. Requirement prioritization activities can choose which requirements are important and less important, so the resource of the development team can focus on solving the key problem first so that resources are not wasted to solve a less urgent problem. MVGB (Majority Voting Goal Based) is a requirements prioritization method that takes into account the value given by each stakeholder as well as the dependency value of a requirement. This system of prioritizing software requirements using MVGB method is a system that provides a place to elicit and prioritize requirements by involving selected stakeholders using web technologies. The system has 46 functional requirements that are useful for elicitation, observation, and prioritization of requirements, the system has been tested with unit testing for 3 major system functions, integration testing for 3 pairs of system main classes, and validation testing for all requirements, the test yield a valid value for all test cases.
Analisis Penerimaan Teknologi Cloud Storage Menggunakan Technology Readiness Acceptance Model (TRAM) Pada Badan Eksekutif Mahasiswa Institut Teknologi Sepuluh Nopember
Hannah Rosmayanti;
Himawat Aryadita;
Admaja Dwi Herlambang
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (720.885 KB)
The objective of cloud storage technology are improve the operational of an organization to achieve the expected objective. Badan Eksekutif Mahasiswa Institut Teknologi Sepuluh Nopember (BEM ITS) is the executant of student activities of the level of institute. Cloud storage technology is the technology that allows the user to process data and saving data on cloud or online. TRAM is a model combined of personality dimension from Technology Readiness Index (TRI) and technology dimension from Technology Acceptance Model (TAM). The population of this research is all members of BEM ITS. And the sample of this research is same with the population. This research using non-probability sampling with the technique using total sampling. Data collected through the spreading of questionnare online to 260 members of BEM ITS. This analysis method using Structural Equation Modeling (SEM). The optimism of members has a positive and significant influence with the perceive usefulness and perceive ease of use. Innovativeness has a positive and significant influence with the perceive usefulness but not significant with perceive ease of use. Then, insecurity has a negatively and significantly influences with the perceive usefulness but not with perceive ease of use. Discomfort has no influence on perceive usefulness. Then, the perceive ease of use factor has a positive and significant influence with perceive usefulness.
Optimasi Penjadwalan Kuliah Pengganti Menggunakan Algoritme Genetika
Holiyanda Husada;
Imam Cholissodin;
Fitra Abdurrachman Bachtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (755.582 KB)
Rescheduling is an option that can be chosen when lecturers are unable to attend on a schedule that has been determined by the academic or when there is a day off. This makes the lecturer need a rescheduling system to find another schedule quickly and appropriately to fulfill his duties as a lecturer. In this study use genetic algorithm for rescheduling based on lecturer schedule, student schedule, available room, course, and available time. The solution quality is measured using the fitness function. Based on the testing results that have obtained the optimal fitness value is 0.667. Result of Solution without clashed schedules but soft-constraint violated. The parameters with the highest fitness value from 10 experiments obtained the number of generation 30, population size 50, crossover rate 0.7 and mutation rate 0.3. The result is the optimal schedule available where the lecturers and most students of the class are reliable.
Pengembangan Sistem E-Business untuk Cetak Dokumen Kapan Saja dan Dimana Saja Secara Online dengan Aplikasi Piranti Bergerak
Ziya El Arief;
Adam Hendra Brata;
Ratih Kartika Dewi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 5 (2018): Mei 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (911.014 KB)
The university student often receive assignments that need to be printed such as essay, reports, thesis, etc so that the document printing activity is neccessary for them. Outside printing activity feels very disturbing students' productivity because with that they must to walk to printing services, queue and be busy to find open printing services. In this research writer tries to solve the above issues with making a web-to-print e-business system. In this system customers just need to upload and choose the store where they want to take the document and after the document done he will receive notification and can take his document. The research done from requirement analysis stage, designing, implementation until testing stage. Program code implementation done by utilizing Ionic framework and PHP Codeigniter. The result of qualitative testing shows that the system is 100% validated which the testing is using basis path testing for white box testing and functional testing for black box testing. While quantitative testing result shows that the mobile application for customer can only run smoothly in Android KitKat devices or newer with internet connection HSPA+ or faster.
Analisa Kinerja Algoritma TCP Congestion Control Cubic, Reno, Vegas Dan Westwood+
Aria Tanzila Harfad;
Sabriansyah Rizqika Akbar;
Adhitya Bhawiyuga
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 3 (2018): Maret 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1402.785 KB)
Transmission control protocol (TCP) is a protocol at the transport layer that provides a reliable data transfer mechanism, so that the data stream reads TCP receiver is not corrupted, without duplication, and sequentially. To provide reliable data transfer, TCP provides error checking and flow control services. When the TCP sender sends data faster than the TCP receiver can handle, congestion will occur. TCP implements a congestion control mechanism for network traffic control so no congestion occurs. This study compares the performance of four variants of TCP congestion control, namely TCP Cubic, Reno, Vegas and Westwood +. The test is to analyze cwnd, ssthresh and throughput of four types of TCP Congestion Control algorithm. The author uses two devices as a sender and receiver. Both are connected with an ethernet cable that has a connection with 100Mbit/s bandwidth. TCP data is collected on the sender side using TCP Probe and the result is shown as a graph with Gnuplot. The results of this study indicate that TCP Westwood + is the best among the three other TCPs in all Service Center agreement (SLA) service provider environments with Bandwidth Estimation mechanisms they use.
BitTorrent dengan Reactive Routing pada Software-Defined Network
Landika Hari Suganda;
Widhi Yahya;
Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (641.643 KB)
BitTorrent is a file sharing application that uses a peer-to-peer mechanism to distribute pieces of files (chunk). The process of determining the seeder is still done randomly, so to get the optimal seeder needs to be optimistic unchoking. In this study BitTorrent is implemented with software a defined-network concept that separates the control plane and data plane to facilitate application development. The reactive routing controller creates a flow table that use to connect between the peers and determines the peer list as the nearest seeder based on the number of hop using the Dijkstra algorithm. The simulation results show that the system can select some of the nearest seeders by reactive routing based on the number of hops traversed. we use BitTornado for application BitTorrent client and use Pybtracker for application of tracker. Here we observe download rate and throughput generated on BitTorrent application with random seeder and BitTorrent application that has been modified with controller. The test results obtained an average value of download rate 4785.3 Kbps with 25 seconds distribution time on 3 random seeders, 6378.3 Kbps with a distribution time of 17 seconds on 5 random seeders, 6721.9 Kbps with 18 seconds distribution time on 7 random seeders and 5990.8 Kbps with time distribution of 18 seconds on 3 seeders, 6732.1 Kbps with 15 seconds distribution time on 5 seeders, 7656.53 Kbps with 15 seconds distribution time on 7 seeders.