cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
sji@mail.unnes.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Scientific Journal of Informatics
ISSN : 24077658     EISSN : 24600040     DOI : -
Core Subject : Science,
Scientific Journal of Informatics published by the Department of Computer Science, Semarang State University, a scientific journal of Information Systems and Information Technology which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences.
Arjuna Subject : -
Articles 44 Documents
Search results for , issue "Vol 8, No 1 (2021): May 2021" : 44 Documents clear
Implementing Geo Positioning System for Children Tracking Location Monitoring based on Android Sari, Marti Widya; Santoso, Banu; Azman, Mohamed Nor Azhari
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27436

Abstract

Parents' concerns in terms of monitoring the presence and monitoring of children's activities become one of the problems that are often faced. Training children to prepare themselves to face this sometimes dangerous world, first develop a sense of security in themselves. The objectives of this research are to generate a system or application to track the whereabouts of children through smartphones that can be used by both parents of the child and to design devices that can be used practically and children can be traced to the presence of wireless media by their parents. Improved supervision of children is needed without reducing the freedom of children to learn and explore their environment. One alternative that allows tracking the presence, location, and accuracy is quite good is to use a Geo Positioning System (GPS). This GPS is packaged in a flexible form so that it can help make it easier for parents to supervise their children in the range of areas that are still accessible to them and find the child's position when separated from their parents. The system can send the location information of children who are lost or lost on smartphone applications used by parents. 
Analysis of Quality of Service on Internet Networks Using the Burst Method Fariz, Muhammad; Arifudin, Riza
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29781

Abstract

The purpose of this research is to make comparisons on the internet network using the application of the Burst method and processed with Quality of Service analysis in which there are parameters of throughput, delay, and jitter. This analysis was carried out because there was a problem with a slow internet network. This happens because there is no configured bandwidth management on the Microtic router and also the unequal distribution of bandwidth when more and more bandwidth users. Burst is one of the bandwidth management methods available on the Microtic router. This study focuses on the implementation of Burst which is applied to one client2 and will be compared with client1 without the application of Burst. Quality of Service analysis is performed to test the parameters of throughput, delay, and jitter on each of the internet networks. After this test is complete, it shows that the results of using the Burst method as a bandwidth regulator, internet network access can be controlled and each client gets the bandwidth evenly as needed. The work result using Burst is more optimal than performance without using Burst. By using Burst the number of packets lost and failed transactions is reduced by more than 70%.
Usability Evaluation of Lecturer Information Systems Using Sirius Framework and Moscow Technique Ramayasa, I Putu; Candrawibawa, I Gede Angga
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27126

Abstract

Purpose: This study aims to evaluation of the SID ITB STIKOM Bali usability was carried out using used framework and the Moscow technique, where until now there has never been an evaluation of the usability of SID, causing the relevant stakeholders not to know the usefulness of the system and not knowing the improvements that need to be made to the SID system. Methods: The method chosen in this study is literature study and observation, SID system analysis, distribution and processing questionnaire data, data analysis, and concluding. Result: The result of this study is the global usability value for SID based on ten aspects of the Sirius framework usability and recommendations for improving the SID STIKOM Bali system based on the Moscow Technique ranking. Novelty: This research's novelty can be a reference material for stakeholders in determining policies related to improving the SID system at ITB STIKOM Bali.
Interactive M-Learning Design Innovation using Android-Based Adobe Flash at WFH (Work From Home) Voutama, Apriade; Maulana, Iqbal; ade, Nofri
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27880

Abstract

Work From Home (WFH) is an activity that is carried out at home with the flexibility to work both place and time with the help of telecommunications technology. The birth of WFH was caused by the impact of the Covid-19 pandemic, which forced all activities in various fields, including government, business, trade, education, and so on, to be carried out online through the use of technology. One thing that is affected is in the field of education, the teaching and learning process must be carried out online. The problem that occurs is the unpreparedness of the infrastructure and resources in the smooth running of the distance learning process. One of the steps to provide convenience in the distance learning process is to innovate in the field of technology by creating an Android-based M-Learning application with an interactive concept so that it not only provides simple learning but is also designed attractively and interactively so that student participants can interact directly with this M-Learning application. Interactive M-Learning applications are designed with UML (Unified Modeling Language) modeling and translated into applications using Adobe Flash and then implemented on Android mobile devices.­
Object Detection in Last Decade - A Survey Arshad, Usama
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.28956

Abstract

In the last decade, object detection is one of the interesting topics that played an important role in revolutionizing the presentera. Especially when it comes to computervision, object detection is a challenging and most fundamental problem. Researchersin the last decade enhanced object detection and made many advance discoveries using thetechnological advancements. When wetalk about object detection, we also must talk about deep learning and its advancements over the time. This research work describes theadvancements in object detection over last10 years (2010-2020). Different papers published in last 10 years related to objectdetection and its types are discussed with respect to their role in advancement of object detection. This research work also describesdifferent types of object detection, which include text detection, face detection etc. It clearly describes the changes inobject detection techniques over the period of the last 10 years. The Objectdetection is divided into two groups. General detectionand Task based detection. General detection is discussed chronologically and with its different variants while task based detectionincludes many state of the art algorithms and techniques according to tasks. Wealso described the basic comparison of how somealgorithms and techniques have been updated and played a major role in advancements of different fields related to object detection.We conclude that the most important advancements happened in the last decade and the future is promising much more advancement inobject detection on the basis of work done in this decade.In the last decade, object detection is one of the interesting topics that played an important role in revolutionizing the presentera. Especially when it comes to computervision, object detection is the challenging and most fundamental problem. Researchersinlast decade enhanced object detection and made many advance discoveries using thetechnological advancements. When wetalk about object detection, we also must talk about deep learning and its advancements over the time. This research work describes theadvancements in object detection over last10 years (2010-2020). Different papers published in last 10 years related to objectdetection and its types are discussed with respect to their role in advancement of object detection. This research work also describesdifferent types of object detection, which include text detection, face detection etc. It clearly describes the changes inobject detection techniques over the period of last 10 years. The Objectdetection is divided into two groups. General detectionand Task based detection. General detection is discussed chronologically and with its different variants while task based detectionincludes many state of the art algorithms and techniques according to tasks. Wealso described the basic comparison of how somealgorithms and techniques have been updated and played a major role in advancements of different fields related to object detection.We conclude that the most important advancements happened in last decade and future is promising much more advancement inobject detection on the basis of work done in this decade.
Prediction of COVID-19 Using Recurrent Neural Network Model Alamsyah, Alamsyah; Prasetiyo, Budi; Hakim, M. Faris Al; Pradana, Fadli Dony
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.30070

Abstract

The COVID-19 case that infected humans was first discovered in China at the end of 2019. Since then, COVID-19 has spread to almost all countries in the world. To overcome this problem, it takes a quick effort to identify humans infected with COVID-19 more quickly. One of the alternative diagnoses for potential COVID-19 disease is Recurrent Neural Network (RNN). In this paper, RNN is implemented using the Elman network and applied to the COVID-19 dataset from Kaggle. The dataset consists of 70% training data and 30% test data. The learning parameters used were the maximum epoch, learning late, and hidden nodes. The research results show the percentage of accuracy is 88.
Decision Support for New Employee Admissions With Profile Matching And Electre Methods Sri Rahajeng, Dini Estu; Al Amin, Iman Husni
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27786

Abstract

Purpose: Employee turnover at large companies is something that often occurs which can result in losses to the company. Difficulties experienced by the company in selecting prospective new employees have resulted in employees being hired not following company expectations. Because of this, we need a decision support system that can help to recommend prospective new employees who match the company's criteria. Methods: The profile matching method is used to determine the alternative values and criteria from the aspects of personality, job aspects, attitudes, and social aspects of prospective new employees, while the Electre method is used to improve the ranking of the best prospective employees. Result: By eliminating the alternative value <= 1 on the line, each line is a candidate who is declared accepted with the best alternative value. Novelty: Research on decision support systems for new employee recommendations has been done a lot, but no one has combined methods Profile Matching and Electre in one system.
Immutability of Distributed Hash Model on Blockchain Node Storage Rahardja, Untung; Hidayanto, Achmad Nizar; Lutfiani, Ninda; Febiani, Dyah Ayu; Aini, Qurotul
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29444

Abstract

The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more complete and detailed.
Identifying The Common Type of Spelling Error by Leveraging Levenshtein Distance and N-gram Hardiyanti, Margareta
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29273

Abstract

A spelling error commonly occurs during document writing. It probably happens due to the authors’ vocabulary incompetence or they may strike the improper key in the keyboard. The types of errors that mostly appear such as insertion of an extra letter, deletion of one letter, substitution of one letter, or transposition of two adjacent letters. This study aims to identify the common type of spelling error and it uses the list of common misspelling words submitted by Wikipedia contributors.A brief overview of Levenshtein and N-gram distance techniques is provided to describe the technical approaches that support the author to achieve the purpose of this study.Those two techniques are utilised to predict the correct word of misspellings from the English dictionary.This study shows that Levenshtein works well to correct substitution single letter and transposition two sequenced letters, while N-gram operates effectively to fix the word with letter omission.The overall result is then evaluated by recall measurement to see which technique that works well on correcting the misspellings. Since the recall of Levenshtein is higher than N-gram, it is concluded that the frequency of misspelling words which are correctly fixed by Levenshteinoccurs more often.
A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In digital image processing, there is an algorithm that is most often used because it has advantages in imperceptibility and robustness. The DCT and HWT algorithms are usually used together to get better results. However in this study we wanted to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. Using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. On the other hand, robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.