Claim Missing Document
Check
Articles

Graph coloring Sistem Pendaftaran dan Proses Penjadwalan Data Instruktur Berbasis Web dengan Algoritma Welch-powell Sopiyan, Muhamad; Fauziah, Fauziah; Gunaryati, Aris; Fitri, Iskandar
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 1 (2022): January-March
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i1.359

Abstract

Many things in this world are implementations of graph coloring, because the models are very useful for broad applications, such as registration and scheduling of web-based instructor data. The purpose of this study is to support the virtual training process by generating training schedules automatically. of the week. There are types of training programs with a duration of 1 hour, 2 hours and 3 hours. Previously the instructor had to register in advance and determine how many hours of training sessions and the availability of an empty schedule. The application of graph coloring can help formulate instructor schedules so that they do not clash with other instructors' schedules. From the results of this study, each instructor who teaches in a week is selected by the system with the total number of time slots in a week is 8x6 = 48 hours. If the total teaching hours of applicants reach 60, 61 or 62 hours, the system will shut down automatically.
Sistem Monitoring Penyewaan Alat-Alat Outdoor Berbasis Web Iriandi, Aditya Nuryudha; Fitri, Iskandar; Ningsih, Sari
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.445

Abstract

The purpose of this research is to make it easier to collect data to make it easier for business actors to monitor the rental of outdoor equipment. Applications built using HTML, CSS, and Java Script programming language systems then use the CodeIgniter framework and materialize components and use MySQL and XAMPP as databases and tools in running server-side. The waterfall method was chosen as a method in developing the system that was built. The results of the study found that; 1) The role of technology in the current digital era, can facilitate the handling of business management, especially in the field of equipment rental so that it helps problems and handling in processing and processing rental reports, 2) Hiking, Trekking, Mountaineering and so on customers will have a place to borrowing tools and climbing needs, and 3) By using the application that was built, it can make it easier to monitor the rental of outdoor equipment.
Perbandingan Metode Interpolasi Newton dan Lagrange dengan Bahasa Pemrograman C++ Furqaansyah, Yoga; Fauziah, Fauziah; Gunaryati, Agus; Fitri, Iskandar
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.457

Abstract

Interpolation is defined as an estimate of a known value. Extensive interpolation is an attempt to determine the approximate value of an analytic function that is unknown or alternatively a complex function whose analytic equation cannot be obtained. You can combine the use of math and math to analyze the price of an item. This study describes Newton's method and the polynomial method. Therefore, interpolation with Newton's method has an error value that is smaller than the error value of the Lagrange interpolation. The results in this research case study when x = 2.5 using 10 data performed using Newton's polynomial interpolation method have a result of 1.70956 where this value is lower than the value of the analysis using the Lagrange method which is 3.2163.
Monitoring Sistem Keamanan Laci Kasir Dengan Fingerprint Berbasis Android Mardia, Ahmad Muslih; Fitri, Iskandar; Ningsih, Sari
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.426

Abstract

Internet of things menjadi salah satu trend di dunia teknologi, penggunaan teknologi seperti ini dapat ditemukan salah satunya yaitu dalam menjaga keamanan suatu toko. Dalam penelitian ini, kunci laci kasir mekanik akan digantikan dengan teknologi pengenalan biometrik sidik jari yang ada pada ponsel pintar. Penggunaan solenoid doorlock sebagai pengganti kunci laci kasir. Sidik jari akan memverifikasikan oleh aplikasi untuk dapat dicocokkan dengan database, lalu mengirim data ke mikrokontroler nodemcu yang terintegrasi dengan perangkat ponsel pintar sebagai monitoring. Data-data akan dikirimkan ke database dan dibaca oleh sistem aplikasi yang ada pada perangkat ponsel pintar untuk dapat diakses dimana saja. Solenoid doorlock sebagai pengganti kunci laci. Apabila fingerprint berhasil memverifikasikan sidik jari dan sesuai dengan data yang ada pada sistem, maka kunci laci kasir akan terbuka.
Teknik Steganography untuk Menyisipkan Pesan pada Sebuah Citra Menggunakan Metode Least Significant Bit (LSB) Khuzaifi, Ahmad; Fauziah, Fauziah; Fitri, Iskandar
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.461

Abstract

Copyright is a direct right granted to the creator of a work in any form that is real and recognized in accordance with the provisions of the legislation in force in the area. Copyright infringement is very detrimental to the creators of works who have tried hard in creating a work. The steganography technique can be a solution to insert hidden messages into digital data. In writing this scientific research journal, an application was made to give a hidden message sign to an image. The goal is to protect copyrighted works from being easily recognized by irresponsible parties. Making this simple application using MATLAB R2021a software. By using the Least Significant Bit [LSB] method, what happens is that the data bits will be inserted into the digital image bit by changing the last bit. The result is that the image inserted with the message does not experience significant changes, but when the image undergoes an extraction process, the inserted message will appear. The results of the Least Significant Bit [LSB] method in this study are successful in inserting a .txt file into the hidden original image so that it does not change the visualization of the image but only changes the image size from 56.9KB to 732KB
Aplikasi Monitoring Peralatan, Bahan Laboratorium Menggunakan Metode Sequential Search di Laboratorium Mikrobiologi dan Genetika UNAS Rohadi, Chairil; Fitri, Iskandar; Nurhayati, Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.428

Abstract

The Faculty of Biology at the National University has a Microbiology and Genetics laboratory which is used for practicum activities, research, and fieldwork lectures. At the analysis stage, problems were found, namely in recording the use of equipment and materials used by students for research activities still using conventional methods, this resulted in delays in managing and conveying information. Adequate lecture facilities are an important aspect in helping the teaching and learning process. Based on the background of the problem, the author aims to make the equipment monitoring process more efficient, using Android-based devices. The author uses the Sequential search method in the process of monitoring equipment in the laboratory. This research was tested using black-box testing and white box testing by distributing questionnaires conducted using a Likert scale with a value range of 5 to 25 student correspondents with an average value for software testing = 4.6; Interface = 4.44; Software features = 4.32; item search feature = 4.08; with the final mean = 4.09.
Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop Zayana, Muhammad Rafiq; Fitri, Iskandar; Fauziah, Fauziah; Gunaryarti, Aris
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.446

Abstract

In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order to avoid misuse by irresponsible people. Therefore, the main objective of this research is to develop the application of the Message Diggest Algorithm (MD5) Cryptography Algorithm in employee data applications. This application is very appropriate to make it easier for companies to manage their employee data and ensure data security. To secure sensitive data from each employee, the process carried out is by encrypting each sensitive data so that it is not easy to read by others who have no interest or authority over the data. And the desktop-based application was made using Visual Basic. The research was carried out with two methods, namely the method to test the compilation speed of MD5 and to test the validation of the decrypted data from the MD5. And from the results of the study, the average speed of 500-515 milliseconds and data consistency obtained valid results from all tests.
Algoritma RSA (Rivest–Shamir–Adleman) pada Sistem Informasi Pemilihan Ketua Organisasi Ikatan Pondok Pesantren Smart-SIPKOTREN Hasbulloh, Hasbulloh; Fitri, Iskandar; Ningsih, Sari
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.453

Abstract

The objectives of this research are; 1) Help simplify the process of selecting the chairman who previously used the manual method or did not have a web-based evaluation application, 2) This application can secure the details of the names that have chosen the chairman through the admin, only the admin knows, and 3) Improve speed and accuracy the results of the e-voting data that replaced the previous conventional voting system were carried out manually. In making the application, implementing RSA (Rivest–Shamir–Adleman) on the e-voting system that was built, for designing the application using web-based programming languages such as HTML, PHP, and MySQL used as e-voting database management. The results showed that the e-voting application simplifies the vote-counting process because it is done online and you can find out directly the results of the upcoming elections, without the need to count votes like a manual selection process. the participation of students in Islamic boarding schools is determined as the maximum power. The election of the head of the hut has become an inseparable part of the hut, almost all the huts hold elections. The election of the chairman is the procedure for selecting the representative of the booth in the booth based on the majority of votes. 
Pengelolaan Penyewaan Auditorium Universitas Nasional dengan Metode Rational Unified Process Haryono, Muklis; Fitri, Iskandar; Nurhayati, Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.429

Abstract

Auditorium Universitas Nasional merupakan salah satu aset dan fasilitas di Universitas Nasional yang dikelola oleh Unit Administrasi Umum (BAU). Biasanya auditorium disewakan untuk berbagai keperluan seperti seminar, pernikahan, pelatihan dan lain sebagainya. Namun saat ini proses penyewaan auditorium masih bersifat manual, dimana tenant harus datang langsung ke unit BAU Universitas Nasional untuk mendapatkan informasi gedung dan kepastian jadwal. Hal ini membuat penyewa membutuhkan lebih banyak waktu jika ingin menyewa. Penelitian ini mengembangkan aplikasi Manajemen Sewa Auditorium Universitas Nasional berbasis web dengan metode Rational Unified Process (RUP) sebagai solusi dari permasalahan tersebut. Pengembangan akan menyoroti model RUP dan memanfaatkan alat Unified Modeling Language (UML) untuk pemodelan dan menggunakan bahasa PHP untuk konstruksi. Hasil dari penelitian ini adalah tersedianya aplikasi manajemen persewaan yang memudahkan penyewa untuk menyewa auditorium dan membuat unit BAU lebih mudah dalam mengelola persewaan auditorium. Hasil pengujian aplikasi menggunakan metode black box menunjukkan bahwa semua fungsi aplikasi berjalan dengan baik. Selain itu, pengujian menggunakan aplikasi User Acceleration Test (UAT) mudah digunakan 92%, tampilan menu asy 88,8% dan fitur software 86,4%.
Rancang Bangun Aplikasi Peminjaman Ruangan Pertemuan di Universitas Nasional Berbasis Web Suryadi, Suryadi; Fitri, Iskandar; Nurhayati, Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.430

Abstract

The National University has a number of rooms that can be used by the entire academic community to support their activities. Currently, the use of the room is managed by the General Administration Unit (BAU) of the National University. Anyone who will use the room must apply for a permit to the BAU unit. The problem is, currently the existing process is still manual where the borrower must come directly to the unit. If the room has been borrowed by someone else or the BAU unit admin is not in place, then the borrower's efforts will be in vain. This is certainly not effective and efficient. This research designs and develops a Web-based application for borrowing meeting rooms at the National University. The application was designed using the Unified Modeling Language (UML) tool and developed with the PHP and MySQL languages. The result of this research is the availability of room loan applications at the National University. The results of testing the logic path with the white box testing method, testing is carried out on the admin and borrower flowcharts resulting in cyclomatic complicity 8, region 8, and independent path 8 logic paths that are good and have good functionality based on the black box method testing.