cover
Contact Name
Andry Fajar Zulkarnain
Contact Email
andry.zulkarnain@ulm.ac.id
Phone
+6281223932020
Journal Mail Official
andry.zulkarnain@ulm.ac.id
Editorial Address
Jl. Brigjen H. Hasan Basry Komp. Kampus ULM Kayu Tangi Banjarmasin, Kalimantan Selatan Phone / Fax: 0511-3304405
Location
Kota banjarmasin,
Kalimantan selatan
INDONESIA
JTIULM (Jurnal Teknologi Informasi Universitas Lambung Mangkurat)
ISSN : 25275399     EISSN : 25282514     DOI : http://dx.doi.org/10.20527
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) is intended as a media for scientific studies on the results of research, thinking and analytical-critical studies regarding research in Systems Engineering, Informatics / Information Technology, Information Management and Information Systems. As part of the spirit of disseminating knowledge from the results of research and thought for service to the wider community and as a reference source for academics in the field of Technology and Information.
Articles 142 Documents
MIXTURE FEATURE EXTRACTION BASED ON LOCAL BINARY PATTERN AND GREY-LEVEL CO-OCCURRENCE MATRIX TECHNIQUES FOR MOUTH EXPRESSION RECOGNITION Ricardus Anggi Pramunendar; Dwi Puji Prabowo; Yuslena Sari
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 7 No. 2 (2022)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v7i2.145

Abstract

Some academics struggle to recognize facial emotions based on pattern recognition. In general, this recognition utilizes all facial features. However, this study was limited to identifying facial emotions in a single facial region. In this study, lips, one of the facial features that can reveal a person's expression, are utilized. Using a combination of local binary pattern feature extraction (LBP) and grey level co-occurrence matrix (GLCM) methods and a multiclass support vector machine classification approach for feature extraction in facial images. The concept begins with image segmentation to create an image of a mouth. Experiments were also conducted for various tests, and the outcomes of these experiments revealed a recognition performance of up to 95%. This result was obtained through experiments in which 10% to 40% of the data were evaluated. These findings are beneficial and can be applied to expression recognition in online learning media to monitor the audience's condition directly.
DIABETES MELLITUS ATTRIBUTE CLASSIFICATION USING THE NAIVE BAYES ALGORITHM BASED ON FORWARD SELECTION Dwi Puji Prabowo; Rama Aria Megantara; Ricardus Anggi Pramunendar; Yuslena Sari
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 7 No. 2 (2022)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v7i2.146

Abstract

Diabetes Mellitus is a chronic condition that frequently results in death. Almost every nation has experienced and contributed to this rise in mortality. Consequently, several researchers are motivated to determine this disease's source and prevent the increase in mortality rates. The research was conducted in the field of informatics in partnership with health professionals to determine the causes of this condition. Many informatics researchers employ machine learning techniques to aid in analyzing existing data. This study suggests feature selection based on forward selection and the naive Bayes classification approach to determine this disease's primary aetiology. The results demonstrate that our proposed strategy can increase the classification accuracy of patients. The performance outcomes improved by 169%. According to this theory, it is also known that the primary cause of this disease is its dependence on body mass index and age. Therefore, additional research must explore these two variables' impact on various other disorders.
ANALYSIS OF QRIS USER EXPERIENCE USING THE USER EXPERIENCE QUESTIONNAIRE (UEQ) METHOD Tira Siya Fajar Rahayu; Muhammad Fikry Aransyah
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.149

Abstract

Digital wallets are the most preferred payment method by Indonesian digital society compared to other payment methods, namely cash payments and bank transfers. Over time, several digital wallet platforms began to create QR codes according to their respective platforms. With each platform having its own QR Code, this can make it difficult for users to make payments. Therefore, Bank Indonesia, which is tasked with regulating and maintaining the smooth running of the payment system, regulates the QR Code to be standardized in accordance with the International Europe Mastercard Visa standard. A product is said to be successful if the product is able to meet user needs to increase user satisfaction. In order for the product to meet the standards, it is necessary to evaluate the quality of the product. One of the evaluations that must be carried out is an evaluation of the User Experience. The sampling technique used is purposive sampling with the criteria that domiciled in Samarinda and has used QRIS as a payment system. Data analysis was carried out using the UEQ Data Analysis Tool. The results of this study are that user experience (attractiveness, perspicuity, efficiency, dependability, stimulation, novelty) has a positive impression on QRIS user satisfaction in Samarinda City.
CLASSIFICATION OF GUIDING BLOCKS FOR THE VISUALLY IMPAIRED USING HOG AND SVM Nurul Fathanah Mustamin; Muhammad Afief Ma’Ruf; Rafif Taufiqurrahman
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.151

Abstract

All citizens, including those with physical limitations, should be able to use public facilities and services without issue. The principles of accessibility—convenience, safety, usability, and independence—must be followed if we are to achieve social welfare in every area of life. For those with mobility or sight impairments, a guiding block (also known as a guiding tile or warning tile) can serve as an important indication. Regrettably, not all visually impaired people make use of this function in its current setup. Use a Support Vector Machine (SVM) and a His-togram of Oriented Gradient (HOG) to extract features for use in Guidance block image categorization. At a threshold of 75, the guiding blocks' classification accuracy is 99.51 percent within 30 cm, 74.811 percent within 50 cm, and 82.221 percent within 80 cm.
ANOMALY DETECTION IN ZIGBEE-BASED IOT USING SECURE AND EFFICIENT DATA COLLECTION Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.152

Abstract

This article outlines various techniques for detecting types of attacks that may arise in ZigBee-based IoT system. The researchers introduced a hybrid Intrusion Detection System (IDS), combining rule-based intrusion detection and machine learning-based anomaly detection. Rule-based attack detection techniques are used to provide an accurate detection method for known attacks. However, determining accurate detection rules requires significant human effort that is susceptible to error. If it is done incorrectly, it can result in false alarms. Therefore, to alleviate this potential problem, the system is being upgraded by combining it (hybrid) with machine learning-based anomaly detection. This article expounds the researchers’ IDS implementation covering a wide variety of detection techniques to detect both known attacks and potential new types of attacks in ZigBee-based IoT system. Furthermore, a safe and efficient meth-od for large-scale IDS data collection is introduced to provide a trusted reporting mechanism that can operate on the stringent IoT resource requirements appropriate to today's IoT systems.
INTRUSION DETECTION SYSTEM FOR ZIGBEE-BASED IOT USING DATA ANALYSIS RULES Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.153

Abstract

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens new types of attacks for systems and networks. This article outlines various techniques for detecting known attacks in ZigBee-based IoT systems. We introduced an Detection System (IDS) specific for ZigBee using data analytics method, that are used to provide an accurate detection method for known attacks. This article looks at our IDS implementation covering a wide variety of detection techniques to detect known attacks ZigBee IoT systems.
INVESTIGATION AND PENETRATION OF DIGITAL ATTACKS ON ZIGBEE-BASED IOT SYSTEMS Fal Sadikin; Nuruddin Wiranda
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.154

Abstract

The market for Internet of Things (IoT) products and services has grown rapidly. It has been predicted that the deployment of these IoT applications will grow exponentially in the near future. However, the rapid growth of IoT brings new security risks and potentially opens up new types of attacks for systems and networks. This article outlines various techniques to carry out attacks on ZigBee-based IoT systems. We conducted penetration experiments on various possible attacks on Zigbee-based IoT. The purpose of this experiment’s results is for reference in developing an Intrusion Detection System (IDS) specifically for ZigBee-based IoT.
THE THE EFFECTS OF PERCEIVED EASE OF USE, PERCEIVED SECURITY, AND PERCEIVED SATISFACTION ON INITIAL TRUST OF BRI MOBILE BANKING USERS (CUSTOMER STUDY IN SAMARINDA CITY) Prajna Dyah Kinanti; Ana Noor Andriana
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.155

Abstract

The purpose of this study was to examine the effect of perceived ease of use, perceived security, and trust on customer satisfaction using BRI mobile banking in Samarinda. This study uses a quantitative approach to the type of associative research. The number of samples used was 96 respondents using the purposive sampling method. The criteria for respondents in this study were BRI customers who are domiciled in the city of Samarinda and are over 18 years old and have been using BRI mobile banking for the last 6 months. The analysis technique used is data quality test, classic assumption test, multiple linear regression test, and hypothesis testing which is processed using the SPSS version 22 application. From the test results it is known that perceived security and perceived satisfaction have a positive and significant effect on the initial trust of BRI mobile banking users both partially and simultaneously, while perceived ease of us does not have a partial significant effect on the initial trust of BRI mobile banking users. So it can be concluded that perceived security and perceived satisfaction affect the initial trust level of BRI mobile banking customers.
DECISION SUPPORT SYSTEM FOR DETERMINING STUDENT ELIGIBILITY TO PARTICIPATE OF MBKM IN THE INFORMATICS STUDY PROGRAM USING AHP AND TOPSIS Yan Puspitarani; Fitrah Rumaisa; Sriyani Violina; Feri Sulianta; Ai Rosita
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.156

Abstract

To be able to have mastery of various sciences that are useful for experience in the world of work, students are encouraged through the MBKM program. Most students of the Informatics Study Program will choose an internship scheme and independent study in applying for the MBKM. However, the increasing number of students' interest in this program requires the Informatics Study Program to be more selective in analyzing the eligibility of students to take part in the MBKM program it has chosen. For this reason, a decision support system is needed that can assist the study program in determining and assessing the eligibility of these students. This study created a DSS modeling using the Analytical Hierarchy Process (AHP) method and the Technique For Order Preference by Similarity to Ideal Solution (TOPSIS) using 8 criteria.
APPLICATION OF DESIGN THINKING METHOD IN REDESIGNING THE UI/UX OF SIMAK (ACADEMIC INFORMATION SYSTEM) OF SRIWIJAYA UNIVERSITY BASED ON A MOBILE PLATFORM Frans Juansyah; Dwi Rosa Indah
Jurnal Teknologi Informasi Universitas Lambung Mangkurat (JTIULM) Vol. 8 No. 1 (2023)
Publisher : Fakultas Teknik Universitas Lambung Mangkurat

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/jtiulm.v8i1.157

Abstract

Students at Sriwijaya University are having difficulty accessing academic information through SIMAK using their mobile devices due to a user interface that is not optimized for smartphones. In this study, the author used the Design Thinking method because it has stages that are very helpful in creating prototypes, such as the Empathize stage where the author can directly interact with users' personal opinions, up to the testing stage, which helps the author analyze the results of prototype creation so that further development can be more responsive and better. The prototype was tested through Maze, a platform that helps users test product or service prototypes quickly and efficiently. This platform is integrated with various prototype-making applications and allows users to collect qualitative and quantitative data in one place and the User Experience Questionnaire (UEQ) to analyze data from prototype testing. Based on the results of usability testing, the UEQ scores from 26 SIMAK users were above 1.6, with almost all assessment categories such as "Appeal", "Efficiency", "Accuracy", "Stimulation", "Novelty", and 1.3 in " Perspicuity". Therefore, it can be concluded that the SIMAK prototype design has a good user experience, and the design can be used as a reference for SIMAK mobile-based displays in the future.

Page 9 of 15 | Total Record : 142