cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
sji@mail.unnes.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Scientific Journal of Informatics
ISSN : 24077658     EISSN : 24600040     DOI : -
Core Subject : Science,
Scientific Journal of Informatics published by the Department of Computer Science, Semarang State University, a scientific journal of Information Systems and Information Technology which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences.
Arjuna Subject : -
Articles 564 Documents
The Evaluation of Final Assignment System Using the USE Questionnaire Approach Purwinarko, Aji; Subagja, Mona; Yanuarto, Alfath
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.26053

Abstract

Universitas Negeri Semarang has utilized information system technology to facilitate the assessment of final student assignments. So it is necessary to test this information system to determine user satisfaction and the success of the information system in providing services. One way to test the information system is to analyze the usability aspect, using the Usefulness, Satisfaction, and Ease of use (USE) Questionnaire. Data collection involved 75 respondents from users of the final assignment system. The reliability test results on 30 questions resulted in a Cronbach's alpha value of 0.97, which means that the questionnaire's reliability was excellent. Whereas for Usability measurement, the percentage value of Usefulness is 86.7%, Ease of Use is 84.4%, Ease of learning is 86.6%, and Satisfaction is 83.0%, which shows that the final assignment system is very worthy of being used.
Software as a Service: Design and Build Lower Usage Cost Email Marketing for Hospitality Industry Sukarsa, I Made; Buana, Putu Wira; Arynasta, I Putu Krisna
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.25498

Abstract

The hospitality industry is an industry that is very customer-focused because it relies on customer information. Therefore, Customer Relationship Management (CRM) is implemented worldwide in this sector. Many features of CRM applications that are often not suitable for use by small and medium companies also make features in CRM applications tend to be wasteful. This paper aims to develop a software as a service CRM with lower usage costs without imposing development costs on users and focuses on email marketing features and data exchange integration. The system development uses the SDLC (System Development Life Cycle) method. Testing in this paper was conducted with User Acceptance Testing (UAT) where managers or hotel owners and students in the field of information technology use the application system then provide an assessment through a questionnaire. The total score obtained from 30 respondents is 1233 and be on point between the Quartile III (1200) and the Maximum score point (1500) base on LSR interpretation scaling and showed the system is considered positive and successful. The conclusion of this study is the application system can be used by hoteliers in the hospitality industry at various levels of the company to carry out functions that support customer relationship management and email marketing.
Prediction of COVID-19 Using Recurrent Neural Network Model Alamsyah, Alamsyah; Prasetiyo, Budi; Hakim, M. Faris Al; Pradana, Fadli Dony
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.30070

Abstract

The COVID-19 case that infected humans was first discovered in China at the end of 2019. Since then, COVID-19 has spread to almost all countries in the world. To overcome this problem, it takes a quick effort to identify humans infected with COVID-19 more quickly. One of the alternative diagnoses for potential COVID-19 disease is Recurrent Neural Network (RNN). In this paper, RNN is implemented using the Elman network and applied to the COVID-19 dataset from Kaggle. The dataset consists of 70% training data and 30% test data. The learning parameters used were the maximum epoch, learning late, and hidden nodes. The research results show the percentage of accuracy is 88.
Decision Support for New Employee Admissions With Profile Matching And Electre Methods Sri Rahajeng, Dini Estu; Al Amin, Iman Husni
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27786

Abstract

Purpose: Employee turnover at large companies is something that often occurs which can result in losses to the company. Difficulties experienced by the company in selecting prospective new employees have resulted in employees being hired not following company expectations. Because of this, we need a decision support system that can help to recommend prospective new employees who match the company's criteria. Methods: The profile matching method is used to determine the alternative values and criteria from the aspects of personality, job aspects, attitudes, and social aspects of prospective new employees, while the Electre method is used to improve the ranking of the best prospective employees. Result: By eliminating the alternative value <= 1 on the line, each line is a candidate who is declared accepted with the best alternative value. Novelty: Research on decision support systems for new employee recommendations has been done a lot, but no one has combined methods Profile Matching and Electre in one system.
Distribution Route Making for Mushroom Harvest Using Artificial Bee Colony Method Ari Santosa, I Made
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.25942

Abstract

Mushrooms are food ingredient that is currently favored by the public. Seeing the large demand for mushrooms, many mushroom businesses have developed. The high level of demand for mushrooms by consumers in different locations results in the high time and costs spent in distributing mushrooms. In addition, determining distribution routes in mushroom marketing is still done manually based on the sender's knowledge, therefore reduces the effectiveness and efficiency of mushroom marketing because the distribution routes used are not optimal. To overcome these problems, it is necessary to determine an effective and efficient distribution route to reduce distribution costs and speed up distribution time. Based on these problems, this research uses the Artificial Bee Colony (ABC) method in determining the distribution route of mushroom harvest. The purpose of this study was to apply the ABC method in determining the distribution routes of mushroom harvest. The result of this research is a visualization of mushroom distribution routes using the ABC method, so it can help to distribute mushroom harvest effectively and efficiently. The research method consists of defining the problem, collecting data, analyzing systems and implementing methods, designing systems, building systems, and drawing conclusions.
Immutability of Distributed Hash Model on Blockchain Node Storage Rahardja, Untung; Hidayanto, Achmad Nizar; Lutfiani, Ninda; Febiani, Dyah Ayu; Aini, Qurotul
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29444

Abstract

The blockchain system uses hash functions. Hash is used in the blockchain to mark each block of data. Hash function algorithms map a string that is usually hexadecimal of any size to a sequence of fixed-size bits. This journal will discuss the distributed hash model for immutable blockchain node storageThe methodology used in the preparation of this research is mind mapping and literature review, namely the collection of scientific journals, articles and ebooks. Storage of nodes on the blockchain using a distributed hash model. The distributed hash model only stores a portion of the block data at each node, and the block data is taken as a resource. A hash connects each block with the previous on the blockchain, so the entire blockchain transaction cannot be changed or deleted. For further research will expand the research topic regarding storage immutability on the blockchain so that it becomes more complete and detailed.
Identifying The Common Type of Spelling Error by Leveraging Levenshtein Distance and N-gram Hardiyanti, Margareta
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29273

Abstract

A spelling error commonly occurs during document writing. It probably happens due to the authors’ vocabulary incompetence or they may strike the improper key in the keyboard. The types of errors that mostly appear such as insertion of an extra letter, deletion of one letter, substitution of one letter, or transposition of two adjacent letters. This study aims to identify the common type of spelling error and it uses the list of common misspelling words submitted by Wikipedia contributors.A brief overview of Levenshtein and N-gram distance techniques is provided to describe the technical approaches that support the author to achieve the purpose of this study.Those two techniques are utilised to predict the correct word of misspellings from the English dictionary.This study shows that Levenshtein works well to correct substitution single letter and transposition two sequenced letters, while N-gram operates effectively to fix the word with letter omission.The overall result is then evaluated by recall measurement to see which technique that works well on correcting the misspellings. Since the recall of Levenshtein is higher than N-gram, it is concluded that the frequency of misspelling words which are correctly fixed by Levenshteinoccurs more often.
FinTech E-Commerce Payment Application User Experience Analysis during COVID-19 Pandemic Abdillah, Leon A.
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.26056

Abstract

Application of information technology in the era of big data and cloud computing has led to the trend of electronic payments through financial technology, or FinTech. One of the most popular FinTech applications in Indonesia is Go-Pay in the Gojek start-up application. This research will analyze how the FinTech Go-Pay user experience both for transactions on Gojek and at merchants that collaborate with Gojek. User Experience (UX) is analyzed using the User Experience Questionnaire which consists of 6 (six) variables (Attractiveness, Perspicuity, Efficiency, Dependability, Stimulation, and Novelty). Total data collected amounted to 258. After analyzing the calculation results, the mean scores are obtained in the following order: Efficiency, Perspicuity, Stimulation, Attractiveness, Dependability, and Novelty. Then when compared with benchmark data the following sequence is obtained: Efficiency, Perspicuity, Stimulation, Attractiveness, Dependability, and Novelty. Overall the Go-Pay service is efficient and perspicuity, but the Go-Pay service needs to improve its novelty.
Sentiment Analysis Provider By.U on Google Play Store Reviews with TF-IDF and Support Vector Machine (SVM) Method Fransiska, Susanti; Rianto, Rianto; Gufroni, Acep Irham
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.25596

Abstract

Provider By.U is a relatively new and attractive telecommunications service with claims to be the first digital provider in Indonesia. All services are done digitally with the By.U application that offers convenience. Even so not all users are satisfied with the service, there are criticisms and suggestions, one of which is delivered through the By.U app review feature on the Google Play Store. Sentiment analysis is performed to extract information related to provider by.U. The steps taken are scrapping review data, positive and negative labeling, preprocessing data including data cleaning, data normalization, stopword removal and negation handling, sentiment classification using Support Vector Machine (SVM) and TF-IDF as feature extraction. TF-IDF+SVM with 5-Fold Validation produces pretty good accuracy with an average accuracy of 84.7%, precision of 84.9%, recall of 84.7%, and f-measure of 84.8%. The highest accuracy results in fold 2, 86.1%. The effect of TF-IDF on the measurement of model performance is not so great, but it is better.
A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In digital image processing, there is an algorithm that is most often used because it has advantages in imperceptibility and robustness. The DCT and HWT algorithms are usually used together to get better results. However in this study we wanted to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. Using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. On the other hand, robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.