cover
Contact Name
Yusfia Hafid Aristyagama
Contact Email
yusfia.hafid@staff.uns.ac.id
Phone
-
Journal Mail Official
yusfia.hafid@staff.uns.ac.id
Editorial Address
-
Location
Kota surakarta,
Jawa tengah
INDONESIA
IJIE (Indonesian Journal of Informatics Education)
ISSN : -     EISSN : 25490389     DOI : -
IJIE (Indonesian Journal of Informatics Education) is is a scientific journal promoting the study of, and interest in, informatics education. The journal publishes empirical papers on information systems, informatics, the use of technology learning, and distance learning. It is an international journal published by the Informatics Education Department, Faculty of Teacher Training and Education, Universitas Sebelas Maret, Indonesia bi-annually on June and December (ISSN: 2549-0389 (Online))
Arjuna Subject : -
Articles 6 Documents
Search results for , issue "Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)" : 6 Documents clear
Research Trends in the Use of Augmented Reality in Engineering Education: A Bibliometric Analysis Nisaudzakiah Utami; Agus Setiawan; Ida Hamidah
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijie.v6i2.68326

Abstract

This study aims to report on the overall research trend of research progress in the Augmented Reality (AR) field in engineering education. The research method used is bibliometric analysis (BA) using VoSviewer. The data is taken from the Scopus database. The findings show an increasing trend in citations and publications showing interest in using AR over the last decade. AR research in engineering education started in 2006 until now. Screening of selected articles from 2012 to 2022. The screening process based on inclusion and exclusion included the chosen language in English and based on the publication of final articles, resulting in a total of 858 articles. The results reveal that augmented reality, engineering education, and mobile learning are the most used keywords in the article. In contrast, the focus of the new article tends to be on augmented reality. In addition, the results show that the latest articles mostly focus on virtual and mobile learning. The most frequently used words in the abstract are engineering education, student, e-learning, education, and teaching. Recent articles have largely focused on students' and teachers' knowledge of technology-based learning. Billinghurst, Dede, and Martin are the most cited authors in this field, as they are the principal authors of AR. The journals cited are Computers & Education, Coeur Workshop Proceedings, Computers in Human Behavior, and the Journal of Science Education and Technology. The journal is the most prominent on the use of technology in education.
The Effectiveness of Guided Inquiry Learning Model on Students' Critical Thinking Ability in Simulation and Digital Communication Subjects Rahma Septiana; Agus Efendi; Yusfia Hafid Aristyagama
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijie.v6i2.47914

Abstract

This study aims to find out the difference in students' critical thinking ability between the use of the Guided Inquiry learning model and with expository learning model and to know the effectiveness of the Guided Inquiry learning model on students' critical thinking ability in digital Simulation and Communication subjects. The subject used in this study was a Grade X student of Software Engineering SMK 2 Surakarta. The method used is a quantitative approach with a quasi-experiment that uses a nonequivalent control group design, pretest-posttest. This study used two groups: the control group with the expository learning model and the experimental group with the Guided Inquiry learning model. Sampling techniques in this study with simple random sampling. Data collection using observations and test instruments. Data analysis on hypothesis test using Independent sample T-test with an error level of 0.05. Hypothetical testing showed significant differences in post-tests between the two groups with sig values. (2-tailed) by 0.012 <0.05. 
Evaluation of Computer Network Simulation Applications to Support Online Learning Ismoyo Putro; Puspanda Hatta; Agus Efendi
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijie.v6i2.65742

Abstract

Computer network learning is learning that prioritizes practice compared to theory to be able to understand the material more clearly. Therefore, computer network learning requires real learning media to support learning effectiveness. However, because the cost of procuring computer network learning media is quite large, it is one of the main obstacles. By using a computer network simulator application is one way to overcome these obstacles. At this time there are several computer network simulator applications that can be used to support computer network learning activities to run efficiently. In this study, researchers evaluate and analyze several network simulation applications, to find out which applications are more efficient to use in learning computer networks, seen from the application capabilities in IP Address configuration, Subnetting, Routing. This study uses the observation method of computer network simulator applications that have been determined, namely the application of (1) Cisco Packet Tracer, (2) GNS3, (3) EVE-NG, (4) Boson Netsim, using the LORI research instrument version 1.5. This research has several stages, namely data collection, data reduction, scoring, data presentation, drawing conclusions and measured using a Likert scale. The results of this study indicate that the application (1) Cisco Packet Tracer ranks first with a value of 89.1%, (2) Boson Netsim is in second place with a score of 86.6%, (3) GNS3 ranks third with a value of 85.4%, (4) EVE-NG ranks fourth or lowest with a score of 83.3%.
Modelling of Laboratory Information Systems in Higher Education Based on Enterprise Architecture Planning for Optimizing Monitoring and Equipment Maintenance Yahya Nur Ifriza; Trisni Wulandari Veronika; Trisni Suryarini; Antonius Supriyadi
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Retracted on author's request 
Implementation of K-Means Clustering for Optimization of Student Grouping Based on Index of Learning Styles in Programming Classes Dwi Maryono; Cucuk Wawan Budiyanto; Allan Auri Pamungkas
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijie.v6i2.68151

Abstract

This study aims to group students into study groups (classes) based on learning styles utilising K-Means Clustering technique  and Sum of Squared Error for cluster assessment. This study used type of learning style developed by Felder and Silverman, which includes four dimensions: (1) the learning process; (2) perception of learning; (3) information input; and (4) understanding of information. This study subjects were Universitas Sebelas Maret's students majoring in informatics Education consisting of 58 respondents. The results showed that the K-Means clustering approach with cluster evaluation using Sum of Squared Error produced the best clustering when the number of clusters was k=2. The cluster analysis showed that each class has different learning styles and characteristics. The first cluster (group) consists of 26 respondents and has the features of an active learning style in the learning process dimension, sensing in the learning perception dimension, visual in the information input dimension, and a balance between global and sequential in the information understanding dimension. Meanwhile, the second cluster (group)  consists of 32 respondents and has a reflective tendency in the learning process dimension, sensing in the learning perception dimension, visual in the information input dimension, and global in the information understanding dimension.
Text Encryption Analysis of Modified Symmetric Keys using Genetic Algorithm on Caesar Cipher and One Time Pad Julia Kurniasih; Dian Tiara Rezalti
IJIE (Indonesian Journal of Informatics Education) Vol 6, No 2 (2022): IJIE (Indonesian Journal of Informatics Education)
Publisher : Universitas Sebelas Maret

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20961/ijie.v6i2.71434

Abstract

The problem of data security is essential because data must be maintained securely and in its integrity, starting with the sending procedure and ending with the intended recipient. One way to maintain data security is to use cryptographic techniques, which use data encryption characteristics to transmit messages in secret (information encoding). Information can be encrypted using the Caesar Cipher and One Time Pad, symmetric key cryptographic algorithms. The key must be changed as a critical component of the cryptographic procedure to enhance the data or text's security. This study aims to analyse text encryption on the Caesar Cipher and One Time Pad (OTP) algorithms using a modified symmetric key by implementing a Genetic Algorithm, an optimisation algorithm. The research phase begins by adjusting the key using two types of Genetic Algorithm crossover operators, one-point crossover and two-point crossover, applied to the Caesar Cipher and OTP algorithms. Then testing and analysis of the ciphertext strength are carried out by comparing the frequency of character repetition with the results of implementing the two modification keys to determine which encoding model provides a better data security strength.

Page 1 of 1 | Total Record : 6