Jurnal Komtika (Komputasi dan Informatika) https://journal.unimma.ac.id/index.php/komtika <p><span style="font-size: 14px; font-family: Arial;"><strong>Jurnal Komtika (Komputasi dan Informatika)<br></strong>Publisher :<a href="https://unimma.ac.id/" target="_blank" rel="noopener">Universitas Muhammadiyah Magelang<br></a>DOI prefix :<a href="https://search.crossref.org/?q=2580-734X" target="_blank" rel="noopener">10.31603/komtika</a>&nbsp;by <img src="http://ijain.org/public/site/images/apranolo/Crossref_Logo_Stacked_RGB_SMALL.png" width="60" height="16"><br>p-ISSN :<a href="http://issn.pdii.lipi.go.id/issn.cgi?daftar&amp;1493192316&amp;1&amp;&amp;" target="_blank" rel="noopener">2580-2852</a><br>e-ISSN :<a href="http://issn.pdii.lipi.go.id/issn.cgi?daftar&amp;1493175893&amp;1&amp;&amp;" target="_blank" rel="noopener">2580-734X</a><a href="http://u.lipi.go.id/1489501324" target="_blank" rel="noopener"><br></a>Frequency :Twice a year (May &amp; November)<br>Editor in Chief :<a title="Google Scolar" href="https://www.scopus.com/authid/detail.uri?authorId=57212675206&amp;hl=en" target="_blank" rel="noopener">Maimunah</a>&nbsp;<a href="https://wa.me/628157945559" target="_blank" rel="noopener"><img src="/public/site/images/maimunah/pngtree-whatsapp-icon-png-image_6315990.png" width="14" height="14"></a>&nbsp;<a href="mailto:komtika@ummgl.ac.id" target="_blank" rel="noopener"><img src="https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcRV2uIls5yQwxhWMCA3o7QeO0IHYqpKQQqlyMVHuoocR4oU17lw&amp;usqp=CAU" alt="Logo email png » PNG Image" width="15" height="15"></a><br>Managing Editor :<a href="https://www.scopus.com/authid/detail.uri?authorId=57189213600&amp;hl=en" target="_blank" rel="noopener">Pristi Sukmasetya</a> <a href="https://wa.me/6285643514545" target="_blank" rel="noopener"><img src="/public/site/images/maimunah/pngtree-whatsapp-icon-png-image_6315990.png" width="14" height="14"></a>&nbsp;<a href="mailto:pristisukmasetya92@gmail.com" target="_blank" rel="noopener"><img src="https://encrypted-tbn0.gstatic.com/images?q=tbn%3AANd9GcRV2uIls5yQwxhWMCA3o7QeO0IHYqpKQQqlyMVHuoocR4oU17lw&amp;usqp=CAU" alt="Logo email png » PNG Image" width="15" height="15"></a><br>Indexing :<a href="https://journal.unimma.ac.id/index.php/komtika/indexingkomtika">Click&nbsp;here</a><br>Citation Analysis:<a href="https://scholar.google.com/citations?hl=id&amp;view_op=list_works&amp;authuser=3&amp;gmla=AJsN-F5nnhHFfxyUUZw650xcDK3A0_-gnTKy-X3xDJfFt8Wx3CrtLwkMVxF1zK5JH5SaGS0UbCty5u4IKMgaeHYnJ60CwcEszDwDtodOEtVDMDX-vkqEGUM6V32syywTA87fV-dz8SnY&amp;user=yx-V0YIAAAAJ" target="_blank" rel="noopener">Google Scholar</a><a href="http://journal.ummgl.ac.id/index.php/cakrawala/indexing" target="_blank" rel="noopener"><br></a>Scope :<a href="http://journal.ummgl.ac.id/index.php/komtika/scope">Click here</a></span></p> Universitas Muhammadiyah Magelang en-US Jurnal Komtika (Komputasi dan Informatika) 2580-2852 Pengenalan Pakaian Adat Aceh Berbasis Augmented Reality Menggunakan Metode Speed Up Robust Featured (SURF) https://journal.unimma.ac.id/index.php/komtika/article/view/9124 <p><em>Aceh Province, especially Langsa City, has a tourist attraction, namely the Langsa City Forest Park House (RTH). One of the most interesting rides in Langsa City Forest Park is Rumoh Aceh. Based on the results of visits and interviews by Rumoh Aceh officers, the large number of visitors from outside Aceh with one officer sometimes made it difficult for the officers to explain the information available about Rumoh Aceh, especially Acehnese traditional clothes, which were only displayed from a printed image, and provided no other information about these traditional clothes, so that many visitors did not know the diversity of designs and motifs of traditional clothes in Aceh. So, a medium was formed that could display Acehnese traditional clothing. The media uses augmented reality technology so that users can add virtual objects to the real environment to make it easier to use. This application uses the Speed Up Robust Featured (SURF) algorithm, which can process marker tracking quickly so that it can obtain better tracking speed times. The shortest distance from the marker to the camera that can show 3D objects is 20 cm, whereas the farthest distance that cannot show 3D objects is 100 cm. The best distance at which a marker can be detected is 20–80 cm. The best average detection time is 0.00049 s, and the average speed obtained is 1261.22 m/s at a distance of 60 cm. The Speed Up Robust Featured (SURF) algorithm can be used in the Augmented Reality-based Aceh Traditional Clothing Recognition application.</em></p> chicha rizka gunawan Nurdin Nurdin Fajriana Fajriana ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-29 2023-11-29 7 2 106 113 10.31603/komtika.v7i2.9124 Penerapan Metode Convolutional Neural Networks pada Pengenalan Gender Manusia berdasarkan Foto Tampak Depan https://journal.unimma.ac.id/index.php/komtika/article/view/9937 <p><em>Recognition is one of the many problems encountered&nbsp;today, this problem has several ways to be solved. This research used Convolutional Neural Networks (CNN), which is a deep neural networks method as a means of face recognition, which has been proven to be widely used in face classification, using a dataset of male and female facial photos totaling 27,167 photos, of which 17,678 are male and 9,489 are male. woman. To avoid unbalanced data processing, the researchers disguised the photos of women and men so that the total photos used for the training amounted to 18,978 photos. Besides that, the researcher also added dropout as a test parameter. The author uses python to implement gender differences in the images in the data that has been prepared. For the preparation of the Convolutional Neural Networks model architecture the authors use several layers. Then the data will be trained before being tested with new data that has been prepared where the new data for testing is divided into two datasets to see if there are differences in accuracy results. What distinguishes the two datasets is the position of the photo and the background of the photo. Of the two existing datasets, the first dataset produces an average of 73.33%, while the second dataset produces the highest 84.34%.</em></p> Aqil Muhammad Dian Pratiwi Agus Salim ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-29 2023-11-29 7 2 114 123 10.31603/komtika.v7i2.9937 Analyzing the Effectiveness of Collaborative Filtering and Content-Based Filtering Methods in Anime Recommendation Systems https://journal.unimma.ac.id/index.php/komtika/article/view/9219 <p><em>In the current digital era where content consumption via streaming platforms is increasing, the need for accurate recommendation systems is becoming increasingly important, especially in the animation industry. This research focuses on implementing a recommendation system that can help viewers easily navigate the abundance of content. By comparing collaborative filtering and content-based filtering methods, this research attempts to find the optimal approach for providing anime recommendations. From the results of A/B testing and further analysis, it was found that Collaborative Filtering was effective in providing recommendations based on similar interests between users. On the other hand, content-based filtering offers the advantage of personalizing recommendations based on content characteristics. Additionally, integrating these techniques into mobile applications will enrich the user experience, allowing them to receive recommendations more quickly and interactively. With these findings, this research contributes to the development of more intuitive and responsive recommendation systems, driving the growth of the anime streaming industry by increasing user satisfaction and retention.</em></p> Helmy Dianty Putri Muhammad Faisal ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-30 2023-11-30 7 2 124 133 10.31603/komtika.v7i2.9219 Analisis dan Penanganan Insiden Siber SQL Injection Menggunakan Kerangka NIST SP 800-61R2 dan Algoritma Klusterisasi K-Means https://journal.unimma.ac.id/index.php/komtika/article/view/10527 <p><em>Based on the OWASP Top Ten document in 2021, attacks or vulnerabilities in an application in the form of injection still rank in the top 3. SQL Injection attacks are still classified as injection vulnerabilities so they need special attention from Information &amp; Communication Technology Managers. Badan Siber dan Sandi Negara (BSSN) has published a document related to preventing SQL Injection attacks. However, the document has not included a cyber attack analysis process that uses the K-Means clustering approach. So in this research, a collaborative method of handling cyber attacks in the form of SQL Injection is proposed using the NIST SP 800-61R2 framework as a fundamental for handling cyber attacks and K-Means clustering. Before analyzing cyber attacks, it is better to use a framework or standardization that applies globally. Based on the research conducted, the K-Means clustering algorithm can help cybersecurity analysts in the process of analyzing cyber attacks that occur. The result of this research is that the optimal value is obtained that cyber attacks in the form of SQL Injection, namely 3 clusters. The hope of the research can facilitate cybersecurity analysts in analyzing cyber attacks that are poured into reports to parties in need</em></p> Choerun Asnawi Dedy Hariyadi Ulfi Saidata Aesyi Puji Winar Cahyo ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-30 2023-11-30 7 2 134 144 10.31603/komtika.v7i2.10527 Evaluation of Maturity Level and Recommendations for Improvement of Software Testing Process Based on Test Maturity Model Integration (TMMi): A Case Study https://journal.unimma.ac.id/index.php/komtika/article/view/9628 <p><em>XYZ company as one of the companies that provides Over-The-Top (OTT) services has problems related to defects that pass into the production environment caused by an ineffective testing process. This has an impact on user satisfaction as indicated by various user complaints when using the application. It is necessary to evaluate the maturity level which shows the ability to perform software testing and what recommendations can be given to improve the software testing process. Test Maturity Model Integration (TMMi) as a model for improving the software testing process has been widely known to improve the testing process and positively impact product quality. XYZ company, which is looking to improve its software testing process, uses the TMMi model as a reference to determine the maturity level of the testing process and provide best practices for the testing process. The assessment was conducted using the TMMi Assessment Method Application Requirement (TAMAR) and information was collected using the Delphi method. The assessment is carried out in the process area at the maturity level of level 2 and produces a rating value of P (Partially Achieved) so that the maturity level of the XYZ company software testing process is level 1 (Initial). Recommendations are prepared based on specific practices in the Test Planning and Test Environment process areas that still have weaknesses that must be improved to reach maturity level 2 (Managed). The process of preparing recommendations is assisted by the Deming cycle which is then validated with stakeholders whether these recommendations can be implemented according to the needs of XYZ company to improve the testing process. </em></p> Rizdiani Tri Prastiti Achmad Nizar Hidayanto ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-30 2023-11-30 7 2 145 154 10.31603/komtika.v7i2.9628 Monitoring dan Klasifikasi Kualitas Air Kolam Ikan Gurami Berbasis Internet of Things Menggunakan Metode Naive Bayes https://journal.unimma.ac.id/index.php/komtika/article/view/10200 <p><em>Ministry of Marine Affairs and Fisheries</em><em> (KKP) noted that Indonesia produced 56,539 tons of gourami fish in the second quarter of 2022 High market demand and economical selling prices encourage farmers to cultivate gourami fish. In cultivating gourami fish there are several obstacles, for example, disease caused by poor water quality. Water quality is the main parameter in the success of gourami fish farming. This research aims to develop a water quality monitoring system based on the Internet of Things. The system prototype uses a temperature sensor (DS18B20), Ph sensor (dfrobot SEN0161), turbidity sensor (dfrobot SEN0189), flowmeter, and ultrasonic sensor (JSN-SR04) as input. The Arduino Mega R3 microcontroller is the processor and the Oled module (SSD1306) is the output. Thingboard is a cloud server that functions as sensor data monitoring. Temperature sensor testing results (DS18B20) average error 0.48%, Ph(dfrobot SEN0161) sensor testing average error 0.64%, ultrasonic sensor testing (JSN-SR04) average error 7.83%, testing Turbidity sensors can measure the level of water turbidity. Next, the water quality parameter data is processed using the Naïve Bayes algorithm method for classifying the water quality of gourami ponds. The results of this classification obtained an accuracy of 99.94% a Kappa Statistics value of 0.9989 and a Mean Absolute Error of 0.0003</em></p> Arip Kristiyanto Fari Katul Fikriah Rully Inkiriwang Zulfi Andriansah ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-30 2023-11-30 7 2 155 167 10.31603/komtika.v7i2.10200 Implementasi Metode The Unified Process Pada Mobile Application Monitoring Gizi Bayi Dibawah Dua Tahun https://journal.unimma.ac.id/index.php/komtika/article/view/10422 <p><em>This study is based on the trend of the nutritional status of Indonesian toddlers which is still unfavorable. In 2021, 24.4% of children under five were stunted, 7.1% were wasted, 17.0% were underweight and 3.5% were overweight. Although in 2022 stunting and overweight decreased to 21.6% and 3.5%, wasting and underweight increased to 7.7% and 17.1%. In addition, there are still many children whose daily needs are not fulfilled, therefore the application of The Unified Process method is used to build a nutrition monitoring application for infants under two years or abbreviated as Baduta. Furthermore, the purpose of the study is the development of a clown child nutrition monitoring application which is expected to help parents, especially those who have babies under two years old, so that they can monitor the development of their child's nutritional intake every day. based on the results of black box testing, it can be concluded that this application is good enough and informative based on providing nutritional information for baduta.</em></p> Muhammad Syarif Hartawan Reni Nursyanti ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-11-30 2023-11-30 7 2 168 175 10.31603/komtika.v7i2.10422 Analysis of User Experience on the MyPertamina Application using User Experience Questionnaire Method https://journal.unimma.ac.id/index.php/komtika/article/view/10467 <p><em>MyPertamina is an application launched by PT Pertamina (Persero) in 2017. Although the MyPertamina application has many programs that should be able to facilitate the community but unfortunately the rating of this application is still bad, namely 3.3 on a scale of 5 on Google PlayStore from hundreds of thousands of user reviews both android and ios this application has negative reviews. Thus user experience (UX) analysis is needed. User Experience Questionnaire (UEQ) is the right method in this research. Because this method interacts directly with what users feel when operating the MyPertamina application. There are 6 variables namely attractiveness, stimulation, and novelty that have a value (above average) except perspicuity and dependability (below average), and there is an average scale of three aspects and a value of Pragmatic Quality 1.11 (positive), Hedonic Quality 0.93 (positive), and Attractiveness 1.21 (positive).</em></p> Muhammad Gilang Ramadhan Nabila Rizky Oktadini Pacu Putra Putri Eka Sevtiyuni Allsela Meiriza ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-12-05 2023-12-05 7 2 176 186 10.31603/komtika.v7i2.10467 Analisa Pengukuran Tingkat Kepuasan Pengguna Aplikasi Daytrans Dengan Kerangka Kerja Pieces Framework https://journal.unimma.ac.id/index.php/komtika/article/view/10432 <p><em>Daytrans is a company that is developing and operates in the field of land transportation services and sending goods between provinces. Based on the results of the author's observations, it was found that no analysis of Daytrans Bandung consumer satisfaction, especially Dipatiukur, had ever been carried out. The main objective of this research is to analyze and measure the level of satisfaction with system service quality. The PIECES method was used to analyze the data in this research. And the Slovin formula was used to determine the sample size of 100 respondents. This number is obtained from measuring the tolerable error limit of 10%. The final results of the questionnaire calculation using the Likert scale and variables in the PIECES Framework produced an average score of 4.47. So that in general service users feel satisfied with the Daytrans Application system services.</em></p> Antonius Purba Jay Idoan Sihotang ##submission.copyrightStatement## http://creativecommons.org/licenses/by-nc/4.0 2023-12-08 2023-12-08 7 2 187 198 10.31603/komtika.v7i2.10432