cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surakarta,
Jawa tengah
INDONESIA
Khazanah Informatika: Jurnal Ilmu Komputer dan Informatika
ISSN : 2621038X     EISSN : 2477698X     DOI : -
Core Subject : Science,
Khazanah Informatika: Jurnal Ilmiah Komputer dan Informatika, an Indonesian national journal, publishes high quality research papers in the broad field of Informatics and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology.
Arjuna Subject : -
Articles 17 Documents
Search results for , issue "Vol. 6 No. 1 April 2020" : 17 Documents clear
Market Basket Analysis To Identify Stock Handling Patterns & Item Arrangement Patterns Using Apriori Algorithms Tresna Yudha Prawira; Sunardi Sunardi; Abdul Fadlil
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8628

Abstract

The process of managing the pattern of handling stock of goods and the pattern of arranging goods on store shelves requires an identification process by utilizing data from sales transaction results. Market basket analysis of sales transaction data using Apriori Algorithm stages produces an information in the form of association rules with a minimum support value of 50% and a minimum confidence of 60%. It can be a reference in the arrangement of items on store shelves by referring to a combination of items that are often bought by consumers simultaneously. In addition, the stock inventory pattern can take advantage of the results of determining the high frequency value in the combination pattern 1 - itemset C1 with a minimum support value of 50% which is compared with the initial inventory.
Mapping Land Suitability for Sugar Cane Production Using K-means Algorithm with Leaflets Library to Support Food Sovereignty in Central Java Pramudhita Tunjung Seta; Kristoko Dwi Hartomo
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.9027

Abstract

Indonesia is the largest sugar importer country in the world, this is contrary to the government's desire to realize sugar self-sufficiency. To overcome the dependence on sugar imports in order to support national food sovereignty, geographic information system technology (GIS) can be used to present information as material for consideration by the government in determining policies on the management of sugar cane land resources. The K-means algorithm is used to group regions according to production level, while the Matching method is for evaluating the suitability of sugarcane land. Presentation of data in the form of map visualization on the web using a new model in processing land data, where this model processes production grouping data, and land suitability class data in the form of GeoJSON then mapped with the help of Leaflets. This new model enables dynamic land data processing and visualization in the form of interactive maps. The results of the EUCS test for GIS mapping of Land Suitability and Cane Production are 3.23 (Satisfied) of the total score of 4, so this system can be accepted by the user.
Designing User Experience Mobility Assistant Application for the Physically-Disabled Using the Wheel Method Azman Fatahillah; Auzi Asfarian
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8634

Abstract

This research was conducted to design a mobility assistant application for persons with physical disability using The Wheel method. This application can assist mobile activities for people with disability. The application called Kuygo was made in four stages: analysis, design, prototype, and evaluation. Analysis of user needs is carried out at Loka Bina Karya (LBK) Bogor through observation and interviews. The interaction design requirements are generated in the form of requirements statements and inventory tasks with three main tasks, namely mobility preparation, mobility comfort, and providing a review of a location. Afterwards, discussions were held in the form of design thinking and ideation sessions, with people who care about people with disabilities and the Senyum Difabel community, which produced sketches, storyboards, and wireframes. Furthermore, the design implementation is carried out by making a prototype of medium-fidelity and the results are tested using cognitive walkthrough techniques. Of the four questions that must be answered with cognitive walkthrough techniques, the average success rate of all the tasks tested is 94.62%. Based on these results, no major usability errors were found in the prototype medium-fidelity and the Kuygo application can be further developed.
Drought Analysis and Forecast Using Landsat-8 Sattelite Imagery, Standardized Precipitation Index and Time Series Musa Marsel Maipauw; Eko Sediyono; Sri Yulianto Joko Prasetyo
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8863

Abstract

A drought is a phenomenon of shortages in water supply in an area for a long time. Drought usually occurs in areas that have little rain for a long time or in areas with low precipitation. Drought have negative impacts on many sectors such as agriculture, plantations, water resources and environment. This paper describes the results of a research that aims to analyze data to get the level of drought during four yearly periods, and predict the likelihood of drought to occur in the future. The level of drought was analyzed using the Inverse Distance Weighted (IDW) method and the Standardized Precipitation Index (SPI). Least square time series was utilized to forecast the level of drought in the near future. Data consists of drought data collected from electronic news, rainfall data from BMKG, and anual Landsat-8 satellite imagery. All data are for Western Southeast Mallucas in the range of 2015-2018. Analysis using IDW and SPI methods produce similar interpretation for year 2015, i.e. mild dryness, and fro year 2018, i.e. no drought. However, the two methods show discrepancy in analysis of data for 2016 and 2017. The use of least square time series to forecast drought in 2019 gives SPI value of 0.03 which intepretes as normal weather (no drought) that is consistent with the result of field observation.
Usability Testing on QR Code Scanner Application for Lecture Presence Eli Pujastuti; Arif Dwi Laksito
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.9026

Abstract

Universities are obliged to facilitate lectures. Many students require universities to provide a fair teaching and learning services with a minimum of student cheating. In order to improve the quality of teaching and learning, each university develops a lecture presence system electronically. The QR code scanner application became a solution offered for leak problems that previously existed on the magnetic card system. Before the application applied on a large scale, developers needed to conduct an assessment of the usability of the QR scanner application. The assessment aimed to make lectures go smoothly and to maintain the good reputation of the university. The method used is usability testing. The result of this study is a usability system at the level of 65%. This value consists of an effectiveness value of 70%, an efficiency value of 54.31%, and a satisfaction value of 70.85%. The improvements of user interface recommended in this study include adding of placeholders to inform the correct NIM format, changing the QR scanner icon into a titled icon and choosing a stimulating color, providing a zoom feature on the scanner camera, and applying a more familiar logout icon according to the mental model of the user.
Detection of Cyber Malware Attack Based on Network Traffic Features Using Neural Network Ventje Jeremias Lewi Engel; Evan Joshua; Mychael Maoeretz Engel
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.8869

Abstract

Various techniques have been developed to detect cyber malware attacks, such as behavior based method which utilizes the analysis of permissions and system calls made by a process. However, this technique cannot handle the types of malware that continue to evolve. Therefore, an analysis of other suspicious activities – namely network traffic or network traffic – need to be conducted. Network traffic acts as a medium for sending information used by malware developers to communicate with malware infecting a victim's device. Malware analyzed in this study is divided into 3 classes, namely adware, general malware, and benign. The malware classification implements 79 features extracted from network traffic flow and an analysis of these features using a Neural Network that matches the characteristics of a time-series feature. The total flow of network traffic used is 442,240 data. The results showed that 15 main features selected based on literature studies resulted in F-measure 0.6404 with hidden neurons 12, learning rate 0.1, and epoch 300. As a comparison, the researchers chose 12 features based on the nature of the malware possessed, with the F-measure score of 0.666 with hidden neurons 12, learning rate 0.05, and epoch 300. This study found the importance of data normalization technique to ensure that no feature was far more dominant than other features. It was concluded that the analysis of network traffic features using Neural Network can be used to detect cyber malware attacks and more features does not imply better detection performance, but real-time malware detection is required for network traffic on IoT devices and smartphones.
Usability Testing on QR Code Scanner Application for Lecture Presence Pujastuti, Eli; Laksito, Arif Dwi
Khazanah Informatika Vol. 6 No. 1 April 2020
Publisher : Department of Informatics, Universitas Muhammadiyah Surakarta, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23917/khif.v6i1.9026

Abstract

Universities are obliged to facilitate lectures. Many students require universities to provide a fair teaching and learning services with a minimum of student cheating. In order to improve the quality of teaching and learning, each university develops a lecture presence system electronically. The QR code scanner application became a solution offered for leak problems that previously existed on the magnetic card system. Before the application applied on a large scale, developers needed to conduct an assessment of the usability of the QR scanner application. The assessment aimed to make lectures go smoothly and to maintain the good reputation of the university. The method used is usability testing. The result of this study is a usability system at the level of 65%. This value consists of an effectiveness value of 70%, an efficiency value of 54.31%, and a satisfaction value of 70.85%. The improvements of user interface recommended in this study include adding of placeholders to inform the correct NIM format, changing the QR scanner icon into a titled icon and choosing a stimulating color, providing a zoom feature on the scanner camera, and applying a more familiar logout icon according to the mental model of the user.

Page 2 of 2 | Total Record : 17