Search Results - "Indra Kharisma Raharjana"
-
1
User Stories and Natural Language Processing: A Systematic Literature Review
Published in IEEE access (2021)“…Context: User stories have been widely accepted as artifacts to capture the user requirements in agile software development. They are short pieces of texts in…”
Get full text
Journal Article -
2
Security Aspect in Software Testing Perspective: A Systematic Literature Review
Published in Journal of information systems engineering and business intelligence (01-04-2023)“…Background: Software testing and software security have become one of the most important parts of an application. Many studies have explored each of these…”
Get full text
Journal Article -
3
Analyzing Variances in User Story Characteristics: A Comparative Study of Stakeholders with Diverse Domain and Technical Knowledge in Software Requirements Elicitation
Published in Journal of information systems engineering and business intelligence (01-02-2024)“…Background: In Agile software development, an essential initial stage is eliciting software requirements. This process engages stakeholders to achieve…”
Get full text
Journal Article -
4
Tool for Generating Behavior-Driven Development Test-Cases
Published in Journal of information systems engineering and business intelligence (27-04-2020)“…Background: Testing using Behavior-Driven Development (BDD) techniques is one of the practices of Agile software development. This technique composes a…”
Get full text
Journal Article -
5
Enhancing Software Feature Extraction Results Using Sentiment Analysis to Aid Requirements Reuse
Published in Computers (Basel) (01-03-2021)“…Recently, feature extraction from user reviews has been used for requirements reuse to improve the software development process. However, research has yet to…”
Get full text
Journal Article -
6
Strategic Management for IT Services on Outsourcing Security Company
Published in Journal of information systems engineering and business intelligence (28-04-2018)“…Information Technology (IT) is used by many organizations to enhance competitive advantage, but many outsource security firms have not used IT in their…”
Get full text
Journal Article -
7
The Continuance Intention of User’s Engagement in Multiplayer Video Games based on Uses and Gratifications Theory
Published in Journal of information systems engineering and business intelligence (28-10-2018)“…One of the key success factors in video game industry, including multiplayer video game (MVG), is the user’s continuance intention. The MVG industry runs in a…”
Get full text
Journal Article -
8
Implementation of QR Code and Digital Signature to Determine the Validity of KRS and KHS Documents
Published in Scientific journal of informatics (Semarang) (10-05-2017)“…Universitas Airlangga students often find it difficult to verify the mark that came out in the Kartu Hasil Studi (KHS) is called Study Result Card or courses…”
Get full text
Journal Article -
9
Perencanaan Arsitektur Perusahaan pada Bagian Instalasi Rawat Jalan dengan Kerangka Kerja TOGAF ADM Studi Kasus Rumah Sakit Jiwa Menur Surabaya
Published in Journal of information systems engineering and business intelligence (28-04-2017)“…Abstrak— Penelitian ini menghasilkan rencana arsitektur perusahaan yang dapat digunakan oleh Instalasi Rawat Jalan RSJ Menur Surabaya dengan kerangka kerja…”
Get full text
Journal Article -
10
PEMBUATAN MODEL SEQUENCE DIAGRAM DENGAN REVERSE ENGINEERING APLIKASI BASIS DATA PADA SMARTPHONE UNTUK MENJAGA KONSISTENSI DESAIN PERANGKAT LUNAK
Published in JUTI (Jurnal Ilmiah Teknologi Informasi) (online) (01-07-2015)“…Konsistensi desain sequence diagram dengan implementasi sering menjadi masalah dalam pembangunan perangkat lunak, penelitian ini akan menerapkan hasil reverse…”
Get full text
Journal Article -
11
Pemanfaatan Teknologi Fingerprint Authentication untuk Otomatisasi Presensi Perkuliahan
Published in Journal of information systems engineering and business intelligence (05-11-2015)“…Abstrak— Dalam dunia pendidikan, daftar kehadiran atau presensi menjadi faktor penting yang tidak dapat dipisahkan dari kegiatan belajar mengajar dan evaluasi…”
Get full text
Journal Article -
12
Penerapan Reverse Engineering Dalam Penentuan Pola Interaksi Sequence Diagram Pada Sampel Aplikasi Android
Published in Journal of information systems engineering and business intelligence (25-06-2015)“…Abstrak—Tujuan penelitian ini adalah penerapan reverse engineering untuk penentuan pola interaksi Sequence diagram yang bisa digunakan oleh sistem analis…”
Get full text
Journal Article -
13
Sistem Pencarian Hotel Berdasarkan Rute Perjalanan Terpendek Dengan Mempertimbangkan Daya Tarik Wisata Menggunakan Algoritma Greedy
Published in Journal of information systems engineering and business intelligence (25-06-2015)“…Abstrak— Pencarian hotel merupakan hal yang penting dilakukan wisatawan dalam melakukan perjalanan wisata. Wisatawan akan mempertimbangkan kriteria hotel…”
Get full text
Journal Article -
14
User story extraction from natural language for requirements elicitation: Identify software-related information from online news
Published in Information and software technology (01-06-2023)“…The user story is a popular artifact in agile software development. Extracting user stories is helpful for process improvement in requirements elicitation,…”
Get full text
Journal Article -
15
Visualisasi Data Menggunakan Sistem Informasi Geografis untuk Potensi Bank Sampah di Surabaya
Published in Journal of information systems engineering and business intelligence (30-04-2016)“…Abstrak—Bank sampah adalah tempat pemilahan dan pengumpulan sampah yang dapat didaur ulang dan digunakan ulang yang memiliki nilai ekonomi. Bank sampah…”
Get full text
Journal Article -
16
Perencanaan Arsitektur Perusahaan untuk Pengelolaan Aset di PT. Musdalifah Group menggunakan Kerangka Kerja Zachman
Published in Journal of information systems engineering and business intelligence (05-11-2015)“…Abstrak— Aset adalah hal penting yang dimiliki oleh setiap perusahaan atau organisasi. Proses manajemen aset yang dilakukan dengan tepat akan membuat aset yang…”
Get full text
Journal Article -
17
Extracting software requirements-related information from online news using DomText-WMDS
Published in Jurnal infotel (Online) (25-08-2023)“…Currently, there are not many studies that assess software requirements extraction from non-software artifacts. Most of the research in these related areas are…”
Get full text
Journal Article -
18
Perencanaan Arsitektur Perusahaan untuk Pengelolaan Aset di PT. Musdalifah Group menggunakan Kerangka Kerja Zachman
Published in Journal of information systems engineering and business intelligence (01-10-2015)“…Perencanaan Arsitektur Perusahaan, Kerangka Kerja Zachman, Manajemen Aset. Abstract— Asset is an important thing that owned by any company or organization…”
Get full text
Journal Article -
19
Pemanfaatan Teknologi Fingerprint Authentication untuk Otomatisasi Presensi Perkuliahan
Published in Journal of information systems engineering and business intelligence (01-10-2015)“…The student’s attendance is an important factor that can not be separated from the learning and evaluation activities. Higher Education usually using a…”
Get full text
Journal Article -
20
Visualisasi Data Menggunakan Sistem Informasi Geografis untuk Potensi Bank Sampah di Surabaya
Published in Journal of information systems engineering and business intelligence (01-04-2016)“…Abstrak—Bank sampah adalah tempat pemilahan dan pengumpulan sampah yang dapat didaur ulang dan digunakan ulang yang memiliki nilai ekonomi. Bank sampah…”
Get full text
Journal Article