In the industrial era 4.0, it has surpassed increasingly complex technological advances in the information system that required a very high infrastructure and facilities and prevented fraud. Counterfeiting is a proced...
详细信息
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting...
详细信息
ISBN:
(纸本)9781665473286
This study examines the mapping of research data on digital technology in the field of health education using bibliometric analysis method. Data was collected by identifying keywords in the Scopus database and sorting them out to sort the studies from the last 10 years (2012–2021). Through this step, a total of 1482 documents were obtained (articles, journals, proceedings, books, and others). The data is then processed using the VOSViewer instrument to obtain a visualization of the mapping analysis. This study also analyzes the network types of authors and co-authors through the VOSViewer instrument. The result of this study indicates that the most document types published within ten years are Articles (66.5%), Review (22.9 % ), Conference Paper (4.2 % ), and others. The most studied subjects are Medicine (55.7%), Nursing (9.0%), Health Professions (8.2%), Social sciences (7.8%), Engineering (3.9%), computerscience (2.6 % ), Environmental science (2.6 % ), Biochemistry-Genetics and Molecular Biology (2.2%), Psychology (1.6%), and Dentistry (1.3%). This study offers a written communication process and the nature and direction of developing descriptive means of counting and analyzing the various phases of communication as well as recognizing the authorship and direction of its symptoms in documents on the subject of digital technology in the health sector.
This study aims to create a virtual reality-based tourism map application for Sumenep city to support the implementation of science learning field trips at SMPN 1 Kamal. The development follows the ADDIE model, encomp...
This study aims to create a virtual reality-based tourism map application for Sumenep city to support the implementation of science learning field trips at SMPN 1 Kamal. The development follows the ADDIE model, encompassing five stages: (1) Analysis, (2) Design, (3) Development, (4) Implementation, and (5) Evaluation. The product undergoes expert validation, material testing, and student testing. The instruments for validity and testing utilize a Likert scale questionnaire ranging from 0 to 5. Results from the expert validation indicate a score of 93% (very high), demonstrating high validity. Material expert validation yields a score of 90% (very high), and individual trials result in a score of 92% (very high). Small group trials achieve a score of 87% (high), while large group trials yield an 86% score (high). These outcomes lead to the conclusion that the development of the virtual reality-based tourist map application is deemed effective, efficient, and appealing for use in the science learning process.
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the mai...
详细信息
Active modeling is required in learning settings to cope with the dynamic evolution of the knowledge, since learners competences evolves over time as they participate in the course activities. Moreover, one of the main issues in a competence based eLearning process is to deliver personalized instructional designs adjusted to both 1) intrinsic characteristics of users (i.e. learning styles) and 2) the desired and achieved competences in the learning process (i.e. specific and generic competences). This delivery includes the adaptation of the content and the activities in a learning scenario based on a dynamic user model that evolves according to user interactions. In this paper, an approach to support Conditional Plans Generation (IMS Learning Designs) in the context of a virtual learning environment is presented. The process is supported by a pervasive usage of standards and specifications (IMS family of specifications) in conjunction with an integral user modeling.
E-Report is developed based on the web to make it easier in preparing students' assessment reports in the form of rating reports, competency achievement reports, and ledgers. Even, many high schools/vocational sch...
E-Report is developed based on the web to make it easier in preparing students' assessment reports in the form of rating reports, competency achievement reports, and ledgers. Even, many high schools/vocational schools in Bali have not implemented the E-Report. Implementation of cognitive walkthrough techniques, heuristic evaluation, and users' experience questionnaire in this research aimed to find out the results of evaluating user experience from the aspects of effectiveness, efficiency, user satisfaction, and recommendations for improvement. Effectiveness and efficiency were calculated by Cognitive Walkthrough techniques (CW), user satisfaction by user experience questionnaire techniques (UEQ) and recommendations for improvement, obtained from experts who discuss aspects of usability with Heuristic Evaluation techniques and Cognitive Walkthrough data. Based on the results obtained in terms of users, E-Report has been ineffective and inefficient. While in terms of user satisfaction, respondents were satisfied with Applications E-Report. This is because the effectiveness of a task that has a very large error and failure in one of the features as well as the clarity of results that poor user satisfaction can affect processing time. Therefore, evaluation of user experience based on aspects of usability in the E-Report has not met the criteria for products with good usability. Improvements made on the start page, page values, page value results were done through a photo frame. Therefore, identifying the problems from these three sources can further optimize the usability and improve user experience on E-Report.
It is highly important to protect the society's sensitive personal data. The reason is that many personal data are published by the government institution without paying attention to the prevailing regulations. In...
It is highly important to protect the society's sensitive personal data. The reason is that many personal data are published by the government institution without paying attention to the prevailing regulations. In this current study, the search for the data in the form of hyperlink with its contents in the legitimate site of the General Election Committees was conducted with the assistance of Crawling Web. The obtained contents were preprocessed using the Preprocessing Text, which were then weighted using the TF-IDF method before they were classified using the Naїve Bayes method. After that, an analysis on the types of the published sensitive personal and the extent of the publication based on the area groups was conducted. Out of 6,700 instances of the personal data which were analyzed, 6.430 were published. The personal data which were published were full name, place and date of birth, religion, marital status, ID Number of the government civil servants, identity card number, number of the tax payer, account number, mobile number, e-mail, address, position, and face photo. The level of publication based on the total data found was as follows: 11.45% in the Central General Election Committee, 21.60% in the eastern area, 17.01% in the central area and 49.94% in the eastern area. The accuracy of the Naїve Bayes method averaged 96.99%. Prior to publication, the General Election Committee is recommended to respect someone's personal data as privacy and the data which would be published should obtain approval and an easily-contacted contact person.
The falsification and embezzlement of personal data are still found in several cases in the past year. The reason is personal data in physical form are easily manipulated and difficult to be distinguished from the ori...
The falsification and embezzlement of personal data are still found in several cases in the past year. The reason is personal data in physical form are easily manipulated and difficult to be distinguished from the original. The most detrimental impact is if a person's personal data is used for credit application fraud in the banking industry. Implementation of blockchain technologies, one of which is Ethereum, allows the use of contracts as a rule that must be fulfilled by the parties involved. All stored transactions are perpetual (cannot be deleted or changed), easy to be audited, transparent, and distributed at each participating node. This study aimed to develop a smart contract for personal data transactions with a case study of credit submission at the Bank. The authors developed a trial application using the prototype method in the process of assessment. Assessment was done by black box testing method in the scope of the lab with 10 credit submission data to be transacted. It is resulting in all credit submission data can be transacted and stored in the smart contract. The interview resulted in an opinion that blockchain technology can be used to store personal data and submit credit submissions at the Bank. The results of the analysis on assessments and interviews conclude that blockchain technology can be used as a medium to store personal data and secure credit applications. For future research, testing transactions can be done on Testnet networks with changing several blocks of data.
The present study used Neural Network Backpropagation combined with Nguyen-Widrow to optimize the disadvantages of ANN causes, which is the difficulty in initializing initial weights. The test was conducted on a datas...
The present study used Neural Network Backpropagation combined with Nguyen-Widrow to optimize the disadvantages of ANN causes, which is the difficulty in initializing initial weights. The test was conducted on a dataset of values in semesters 1 and 2. The test results show that the best performance in training model of artificial neural networks with Nguyen-widrow is the smallest average MSE error of 0.002 and the highest average accuracy of 96.38%. Training on artificial neural network model training data with Nguyen-widrow has the smallest MSE error, 0.000996 and the highest accuracy is 97.49% on architecture ANN 9-9.1 with training function parameters: traingdx, epoch: 1000, learning rate: 0.1, and error: 0.001. The best performance was also seen in testing the testing of artificial neural network models with Nguyen-widrow with the smallest average error-MSE of 0.026 and the highest average accuracy of 87.85%. Training data testing on artificial neural network models with Nguyen-widrow has the smallest error-MSE which is 0.004436 and the highest accuracy is 94.50% on architecture ANN 9-9.1 with training function parameters: traingdx, epoch: 1000, learning rate: 0.1, and error: 0.001. The artificial neural network model with Nguyen-widrow has an accuracy difference of 8.53% smaller than the artificial neural network model with an accuracy difference of 9.28%. It can be concluded that the Artificial Neural Network with Nguyen-Widrow can overcome the ANN problem in determining initial weights so that it gives an increase in the accuracy of the prediction of students' competency selection better than the Artificial Neural Network without Nguyen-Widrow.
Jejak Bali is a website created specifically by PUSTEKKOM to manage learning activities so Bali Provincial education Office can carry out supervision and guidance for e-learning in Bali. Many obstacles were experience...
Jejak Bali is a website created specifically by PUSTEKKOM to manage learning activities so Bali Provincial education Office can carry out supervision and guidance for e-learning in Bali. Many obstacles were experienced by teachers and students when using Jejak Bali. It encouraged the design of a study looking at the usability of a system from a user perspective to increase user satisfaction. The methods used were usability testing technique, Concurrent Think Aloud, and Performance Measurement which measured the effectiveness, efficiency, and user satisfaction. The population of this study were teachers and students from SMAN 2 and SMKN 3 Denpasar. In measuring Performance Measurement and CTA, the sample used consisted of 40 participants including teachers and students as well as 86 users who used the questionnaire SUS. The results of the research were: (1) Jejak Bali, for teacher and student users, was still ineffective because there were still errors made while doing the assigned assignments, (2) Jejak Bali which was seen from the time when teacher and student users were working was still inefficient because of the differences of the significant time from the advanced group to the beginners, (3) Jejak Bali still did not meet user satisfaction as seen from the results of the SUS questionnaire recapitulation in which a teacher scored 49.0 and a student scored 48.3. Because the value obtained was below 60 in the percentile rank, so it can be concluded that Jejak Bali still did not meet usability good as seen from the results obtained.
Cryptography is the science and art of maintaining the security of messages when messages are sent from one place to another. One of the ways securing the form of text message information is by the encryption process ...
详细信息
暂无评论