cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 60 Documents
Search results for , issue "Vol 6 No 11 (2022): November 2022" : 60 Documents clear
Analisis Dampak Serangan Wormhole terhadap Protokol Routing Ad-Hoc On Demand Distance Vector (AODV) pada LoRa Muhamad Ralfi Akbar; Dany Primanita Kartikasari; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Long Range (LoRa) is one of IoT technology used in a system that require long distance communication and in a need of low cost system. Delivering a packet on LoRa takes time depending on the distance to the destination, the farther the distance, the longer delivery time will take. This makes LoRa network security while delivering packet, vulnerable to attacks. This research analyze packet delivery on LoRa using the AODV routing protocol and the impact of Wormhole attack lon the AODV routing protocol on LoRa. This study uses 3 LoRa nodes and 1 malicous wormhole node. The analysis is reviewed with QoS paramers, namely Troughput, Delay, Jitter, and Packet Loss. The result of the test show that Wormhole attack affects the performance of packet delivery in LoRa. In the non-attack scenario, the average Delay value is 0.171s, Packet Loss is 0%, the average of Troughput is 408,321 kbps, and the average of Jitter is 0.0003ms. In the Wormhole attack scenario, the average Delay values is increased to 0.343s, Packet Loss increased to 70%, Troughput decreases by an average of 204,105 kbps and Jitter increases by an average of 0.05724ms. It can be concluded that Wormhole attack on the AODV routing protocol affects the qualiy of QoS on the delivery of each packet.
Analisis Peran Pengalaman Kerja dan Linearitas Background Pendidikan terhadap Produktivitas Kerja Karyawan Work From Anywhere Muhammad Faisal Shabri; Diah Priharsari; Fajar Pradana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Amid the “new normal” period after the receding of the Covid-19 pandemic and the change in the Work From Home (WFH) work system to Work From Anywhere (WFA). Every company must be able to maximize every element they have in order to survive, such as the productivity of their WFA employee. This research goal was to analyze the role of work experience and the educational background linearity of a WFA employee on his productivity using a mixed method. Techniques in qualitative methods are semi-structured interviews involving 10 informants processed using thematic analysis methods. While the quantitative method will use a questionnaire technique that gets 138 respondents. In qualitative data analysis, work experience has a role in the productivity of a WFA employee in terms of ease of adaptation. Meanwhile, it was found that employees with non-linear education directly would not have problems with their productivity as long as these employees were able to make up for their lack of knowledge. It is confirmed in the quantitative method, where there was a significant difference in average productivity between group levels of work experience of WFA employees and no significant difference in average productivity between linear and non-linear WFA employees.
Analisis Pengaruh Node Density pada Vehicular Ad Hoc Network (VANET) dengan menggunakan Protokol Routing Dynamic Source Routing (DSR) di Model Jalan Perkotaan Rexy Marten; Dany Primanita Kartikasari; Fariz Andri Bakhtiar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

VANET is a wireless network which using vehicle as a moving node for exchange information and provide comfort and security for vehicle user. Characteristics of VANET are high mobility and different number of vehicle. Number of vehicle in urban area is affected by activity on the area at certain hour such as rush hour in the morning and evening, this caused number of vehicle varies. Previous research stated that DSR is a reactive routing protocol that able to work in VANET and produces good performances based on overhead, packet delivery ratio, and normalized routing load parameter. This study presents an analysis of the effect of node density in VANET network using DSR in urban model area as the simulation. Testing is based on changes in the number of nodes using 30, 60, 90, 120, 150 and 300 nodes with testing parameters end to end delay packet and delivery ratio, also using coefficient determination, F test, and T test for validity testing. The result showed that node density impacted VANET performance when using linier regression for validity testing. The performance of VANET by using DSR produces the best end to end delay in 30 nodes with 3057.79ms, and the worst in 300 nodes with 25432.9ms, while in packet delivery ratio parameter produces the packet successfully sent in 300 nodes with 92.79%, and the least in 30 nodes with 76.88%.
Implementasi Simple Network Management Protocol (SNMP) pada Bot Monitoring Telegram Muhammad Taruna Praja Utama; Arief Andy Soebroto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One useful network management function to determine whether the network is still practical, viable, or needs more capacity is network monitoring. If an administrator is looking to redesign an existing network, monitoring the results may also be helpful. Monitoring device status, such as CPU percentage, RAM, and traffic using SNMP, is one of many network monitoring techniques. To facilitate this monitoring process, it can be done remotely with a program that provides alert messages to the user. One of the communication media is using the Telegram application, Telegram also has bot facilities that can be programmed to run continuously without stopping. The purpose of the research is to find out how to design a monitoring bot program using SNMP that sends notification messages to Telegram and to find out how to test the Telegram monitoring bot program using SNMP.
Analisis Kesediaan Berbagi Identitas Digital Berdasarkan PMT: Faktor Self-Efficacy, Response Efficacy, dan SNS Experience Hanum Dwi Rosidi; Diah Priharsari; Buce Trias Hanggara
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The growth of the internet has led to a large number of users participating in various global online. Social Networking Sites (SNS) are virtual platforms that allow users ito interact with each other, participate in various social and collect information about other site members. Protection motivation theory (PMT) or protection motivation theory is a theory that explains how a person's situation manages his behavior when experiencing risk. This study aims to determine the effect of self-efficacy and efficacy responses on privacy information concerns and also to determine user privacy information concerns about their availability in various digital identities on SNS, and to find out whether there are differences between the experience of using social networks and their willingness to share identities digitally. This study used the CB-SEM method by distributing questionnaires to users of social networks and getting 309 respondents. After testing the hypothesis, it was found that one hypothesis was rejected (not accepted), namely that there was a difference between SNS experience and willingness to share digital identities because it had P-Value of 0.239. In this case, users are not necessarily willing to share their digital identities even though users have long or little experience in social networking.
Perancangan Antarmuka Pengguna Website Responsif Mobile Byboot Menggunakan Metode Design Thinking Naufal Zulfikar Priambodo; Satrio Hadi Wijoyo; Hanifah Muslimah Az-Zahra
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Byboot is a Micro, Small and Medium Enterprise (MSME) in Jombang Regency which is engaged in fashion, specifically selling various needs for sandals and women's shoes. Byboot wanted to expand its business reach and wanted an e-commerce website. This website will be used to assist transactions between Byboot and its customers so that the transaction process runs effectively and efficiently. Based on these problems, the researcher provides a solution for designing the user interface of an e-commerce website that will be made in the form of a high-fidelity prototype. This design will make it easier for Byboot and consumers to make buying and selling transactions that they will do. The process of designing this system will use the design thinking method in which there are five stages in the process, namely empathize, define, ideate, prototype and test. The testing process will include usability testing, user interviews, and a system usability scale (SUS) questionnaire. From the test results with the system usability scale questionnaire, it was obtained a value of 77 for the consumer system and a value of 75.5 for the stakeholder system. The results of the two systems are included in the high acceptability level, with a grade scale C, and also an adjective rating of Good.
Sistem Kendali Robot Beroda Wall-Follower pada Tembok Lurus dan Berbelok menggunakan Metode PID Haryanto Sihombing; Eko Setiawan; Sabriansyah Rizqika Akbar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Wall following navigation is one of the navigation systems used in competitions, for example, in the Indonesian Intelligent Robot Contest (KRCI), where the robot's task is to follow the contours of the walls that form hallways and rooms or is called a wall follower robot. The method used in this wall follower robot is PID method, can make system movement more stable and capable to do an effective error correction. PID controller can hold motor speed at required fixed value and navigate the wall follower. Arduino Uno R3 microcontroller, ultrasonic sensor, and L298N motor driver are used in making this robot system. The determination of the PID controller parameters was obtained using the Ziegler-Nichols second method. This method was chosen to anticipate changes in distance that cause oscillations in the ultrasonic sensor. The combination of PID and Ziegler-Nichols second method will speed up the process of determining PID controller parameters without having to go through a trial-and-error tuning process. The results of the tests showed that with the help of the PID controller, the wall follower robot has been able to make decisions about the movements that must be carried out to follow the side of the wall. The results of the PID parameters achieved from this final project research obtained values of Kp = 6, Ki = 17.1, and Kd = 0.525.
Perancangan Arsitektur Sistem Informasi Pengelolaan Data Feedback di Perusahaan Pertambangan Batubara menggunakan TOGAF ADM Aisha Edna Alicia Sanyoto; Aditya Rachmadi; Andi Reza Perdanakusuma
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

PT Kaltim Prima Coal is the largest coal mining company in the world. PT Kaltim Prima Coal carries out the process of extracting coal to manage it until it is ready to be distributed to customers. One of the departments at PT Kaltim Prima Coal is the CPPM department where this department focuses on repairing and maintaining coal processing machines. The CPPM Department is required to carry out follow-up actions for machine damage quickly, effectively and efficiently. One of the business processes related to these demands is the business process for managing data feedback in the CPPM Department. Currently, the process of managing feedback data is still carried out using a manual system and simple applications such as Microsoft Excel and Whatsapp, so an effective, efficient and integrated IS/IT is needed. To overcome the problems that arise from the manual data feedback management process, it is necessary to design an enterprise architecture in the CPPM Department to align business strategy with IS/IT strategy and requires careful planning to plan and manage IS/IT. This study uses the TOGAF (The Open Group Architecture Framework) enterprise architecture framework design with the ADM (Architecture Development Method) method. This research is limited to phase C Information System Architecture. The design produces a blueprint of the proposed business architecture and information system architecture for managing data feedback in CPPM Department of PT Kaltim Prima Coal.Based on the evaluation results it is known that the business architecture model has 100% validity based on syntactic, semantic, and pragmatic quality and the degree of completeness between the quality attributes of the information system design that is built reaches 66.67%
Analisis Peran Jenis Pekerjaan dan Fasilitas IT Pendukung terhadap Produktivitas Kerja Karyawan Work From Anywhere Nadya Nur Fadhila; Diah Priharsari; Fajar Pradana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

During the global COVID-19 pandemic information systems have overcoming the limitations of interaction when working, which is considered a digital transformation, such as the Work From Home policy, which is currently shifting to the WFA (Work From Home) work system. anywhere). The existence of this new work system certainly has an impact on employee work productivity which is influenced by several factors, especially technology. In this study, the factors that will be examined are the type of work and IT facilities owned by WFA employees through the Exploratory Mix Method. By conducting a Thematic Analysis, the results show that the type of work can be seen from the existence of work flexibility policies and the frequency of interaction needs which can cause overtime on the job, and in IT facilities it is found that the company's role in fulfilling IT facilities can increase productivity. To confirm the qualitative findings, a quantitative study was carried out through a questionnaire with 115 respondents, through the multiple linear regression analysis method, it was found that the final result of this study was on the type of work of employees during WFA who had work time flexibility coupled with a high frequency of interaction between employees who tended to make these employees work overtime and this has a significant effect on work productivity. Then for IT facilities, the company's role in fulfilling IT facilities in order to have standardized devices that have been determined, then these employees must have self-motivation in working to achieve increased work productivity.
Pengembangan Aplikasi Sistem Informasi Pelayanan Desa berbasis Website (SIMPEDE) pada Desa Dawuhan Kecamatan Poncokusumo Kabupaten Malang Ahmad Shofi Nurur Rizal; Djoko Pramono; Arief Andy Soebroto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 6 No 11 (2022): November 2022
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dawuhan Village is located in the Poncokusumo District, Malang Regency, East Java. Dawuhan is a developing village with a population of 7115 people. However, in this case, administrative services and population data processing in Dawuhan village still use conventional methods, which still use book archives to process written data so that the processing of certificate documents and civil registration letters still encounters many problems. To solve this problem, an information system that handles letter requests is needed. This research was conducted to find out the Village Service Information System (SIMPEDE) is running effectively. Answering these problems, business process modeling, needs analysis, system design and implementation, and testing are carried out to find out the system is running as desired. Business process modeling generates AS-IS and To-Be business processes. Requirements analysis is done by identifying actor activities with the system, identifying functional and non-functional requirements, visualizing use case diagrams, use case scenarios, and sequence diagrams, then makes database design with MySql, as well as system interface design. System implementation produces a specification for hardware and software environment, the implementation of the source code, then produces a system interface according to what user expects.

Filter by Year

2022 2022


Filter By Issues
All Issue Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue