cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 6,850 Documents
Implementasi Real Time pada Pergerakan Robot Quadruped mengggunakan Multisensor dan RTOS Hendriawan Dwi Saputro; Rizal Maulana; Mochammad Hannats Hanafi Ichsan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1057.462 KB)

Abstract

Technological developments in robotics experience rapid development continuously, one of them the development of robot control systems such as increased program execution speed and better processor performance allows the use of Real Time Operating System (RTOS) in embedded systems. Improved performance is required by the robot so that the robot can reach the target of precision in moving and speed time execution. By the development of RTOS application in this research, it will apply RTOS in embedded system that is movement of quadruped robot. The RTOS used in this study is FreeRTOS because the system is already available in the Arduino microcontroller. For the RTOS type, it is a soft realtime operating system which tolerates when the robot does not match the execution time. RTOS in the system will be applied to the data retrieval of sensors and data processing for decision making. The robot in this study has a four-foot motion tool or can be called a quadruped robot composed of components HC-SR04, Arduino Mega 2560, OpenCM9.04 and OpenCM485 and servo AX-12. From the results of the study, robots have pretty good precision in moving when applying Real Time Operating System.
Analisis Hasil Perbandingan Penerapan Metode Heuristic Evaluation Menggunakan Persona dan Tanpa Persona (Studi Kasus : Situs Web Female Daily) Atika Baladina; Ismiarta Aknuranda; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (815.406 KB)

Abstract

This study aims to analyze the differences in results of usability evaluation using Heuristic Evaluation method without Persona and with Persona. In this study, there are three main steps to get the desired results: making Persona, heuristic evaluation and the analysis of the results, both without Persona and with Persona. The making of Persona in this study using qualitative Persona which start with interviewing 20 respondents who were users of Female Daily Network website. This interview aims to understand users' characteristics and behaviors when accessing the website. Data obtained from interviews is used to build Persona. Website then evaluated using heuristic evaluation method without Persona and heuristic evaluation method with Persona. Each evaluation is carried out by three different evaluators. Results of evaluations from both methods then compared for analysis. Comparison seen from the difference in number of problem findings, graph of the number problems found from each evaluator, problem categories based on severity rating, and differences in heuristic categories that were successfully met from the problems found. The results of this study indicate that evaluations using Heuristic Evaluation method with Persona managed to identify more usability problems than Heuristic Evaluation method without Persona.
Implementasi Wireless Sensor Network Pada Keamanan Rumah Menggunakan Sensor Pir Muhammad Risyat Nashrullah; Rakhmadhany Primananda; Edita Rosana Widasari
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (531.028 KB)

Abstract

Home security is a matter of privacy, many people keep property at home. Many criminal acts and increasing from year to year make people become uneasy. One such crime is theft in a house left behind by the inhabitants. To overcome the crime of theft is needed a security system in an empty house. However, home security systems made so far still have many drawbacks such as, security is only focused on one point, security guard rental to keep the house at risk of theft with violence, installing CCTV at risk of the perpetrator can damage CCTV so difficult in observation. Wireless Sensor Network (WSN) is an embedded system equipment in which there is one or more sensors and equipped with communication system equipment. By utilizing WSN technology can be made home security system that can monitor many points and communication between points done wirelessly. Transceiver module used in this research is wifi module ESP8266 and protocol that used is Hypertext Transfer Protocol (HTTP). Based on the results of tests conducted on wireless delivery has a success rate of 100% at a distance of 5 meters between the point of installation of sensors with human objects, and at a distance of 6 meters sensors can detect but has a success rate of 70%. Based on the results of testing the system as a whole, the system can be controlled and provide reports through android applications online with a success rate of 100%.
Evaluasi Kualitas Website Pemerintah Daerah Menggunakan Metode E-Govqual (Studi Kasus Pemerintah Kabupaten Sumbawa Barat) Rizkialdy Suja Pratama; Admaja Dwi Herlambang; Mochamad Chandra Saputra
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (292.651 KB)

Abstract

The local government website of West Sumbawa Regency is a media owned by government of West Sumbawa Regency to support the information disclosure to the public. But in its implementation, the website has some perceived weakness of its users. This study discusses how the assessment of the website quality based on the point of view of the user, especially the local people. Website quality evaluation can be done using 6 dimensions and 47 attributes of e-Govqual and perform SWOT Analysis to develop strategy recommendations. This study uses quantitative data obtained through questionnaires and qualitative data from interview activities. Questionnaires were conducted on 104 respondents with incidental sampling techniques and interviews were conducted on 2 interviewees from website administrator and 2 interviewees from website user or local people. The result showed that the highest level on Content and Appearance of Information belongs to high category (75.14%), then followed by Ease of Use belongs to high category (74.5%), Reliability belongs to high category (73.04%), Functionality and Interaction belongs to high category (72.4%), Trust belongs to high category (70.94%) and Citizen Support belongs to high category (70.26%). Strategy recommendations that can be formulated based on SWOT Analysis is to improve the technical issues on the website.
Perancangan dan Implementasi Algoritma Enkripsi Idea pada Perangkat Kriptografi Berbasis FPGA Muhammad Adi Wijaya; Wijaya Kurniawan; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (330.752 KB)

Abstract

The use of text data applications is currently growing rapidly, even now many applications are switching to embedded systems. Many users choose to switch to embedded systems because they are more efficient, cheap, and have a fast response so it does not endanger the quality of the submitted text data. One of the embedded systems used today is the use of personal digital assistants or PDAs. The need for a PDA as a wireless communication tool is very important to be noticed, because the data sent through the communication may be company data that cannot be known by anyone. Tapping cellphones / PDAs on wireless communication often occurs. To solve the problem, information security is needed to complete the needs of the data security on PDAs / cellphones. Information security used to resolve these problems is using the IDEA algorithm. The IDEA algorithm is used because it provides high level security based on complex secret keys. The step taken to implement this algorithm is a system needs analysis to find out all the needs needed by the system to be built and tested, after that the system design is done using the Xilinx Spartan FPGA 3-e as a simulator before it can be designed directly on cryptoprocess integrated circuit, then the system design results will be implemented on the FPGA and will be displayed on the PC. After the system is implemented it will be tested and analyzed using functional testing, validity, and execution time. Based on the results obtained the text data encryption implementation with IDEA method can be implemented on FPGA Xilinx Spartan 3-e and generate ciphertext to encrypt existing data and test results using functional testing and validity give 100% correct system results and generate a text data encryption with text data encryption time of 7.788ns.
Pengembangan Sistem Informasi Manajemen Mobil Unit Donor Darah (Studi Kasus : Palang Merah Indonesia (PMI) Kota Malang) Mochammad Ali Hafidz; Satrio Agung Wicaksono; Adam Hendra Brata
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (672.599 KB)

Abstract

The Indonesian Red Cross (PMI) Malang is a national association organization in Indonesia engaged in social humanity where one of its main tasks is to provide blood transfusion service to the community. One way PMI to get blood is through the car blood donation unit by cooperate with agencies or organizations. The problems that arise is take 3-5 days to make the registration process until the date of agreement and reporting activities are still done manually. Based on the problems that have been explained, it developed a Management Information System Car Blood Donation Unit that aim to improve the process of registration car units for organizers candidate and simplify the report of activities car blood donation unit at PMI Malang. The development of this system was built using waterfall method and implemented on the website. The developed system has 16 functional requirements, 1 non functional requirement to support business process at PMI Malang City. Black box test results obtained results of 100% valid. At the time comparison test, the result of decreasing the registration time of the unit car is 98.5% from the previous registration time. In the User Acceptance Testing test given to the organizers generate revenue by 90%, the donor management division is 80%, the unit car officer is 80%, and the head of the utd is 80%.
Implementasi Algoritme Advance Encryption Standard (AES) pada Enkripsi dan Dekripsi QR-Code Dwi Qunita Putri Ambeq Paramarta; Ari Kusyanti; Mahendra Data
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (449.48 KB)

Abstract

Data security are very important in today's technological development. Therefore, it is necessary to find a way to protect the confidentiality and the security from unauthorized accesses. One of the mechanism to increase data security is to use cryptography. There are many form of cryptography, one of them is Advance Encryption Standard Algorithm. This thesis uses AES Algorithm with the size of 128 bit expansion key. That will operate in a 4x4 array. In the state encryption process will go through several stages of Addroaundkey, Subbyte, Shiftrows, and Mixcolumns 10 times round. But in the last round Mixcolumns no longer process directly into the Addraoundkey process, and for the decryption process is a reverse process of the encryption process that InvAddrows, InvShiftrows, InvSubbyte, and InvMixcolumns use the same round key with the encryption process. AES is implemented in PHP programming language and applied to QR-Code because it is a labeling technology that can store data in the form of patterns that can be filled with information. From the results of the implementation of AES Algorithm can be concluded that this application can encrypt all types of characters in the form of strings, alphabet, numbers, and symbols. When decrypting QR-Code the application will activate the camera function and perform QR-Code scanning that will be plaintext again. The execution time of AES encryption and decryption is 0.0034 seconds for the encryption process and for the decryption process takes 0.0029 seconds.
Implementasi Algoritme Trivium Untuk Mengamankan Komunikasi Data Master-Slave Pada Perangkat Berbasis Modul Komunikasi NRF24L01 Sara Yosephina; Adhitya Bhawiyuga; Ari Kusyanti
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (919.952 KB)

Abstract

Internet of Things (IoT) is a network concept that connects various devices so that these devices can produce services and cooperate with each other to achieve common goals. Security is one of the weaknesses of IoT implementation. Trivium algorithm is a hardware-side security candidate by the eSTREAM Project organized by NIST. Trivium algorithm architecture has a complex level of complexity and does not require large power so it is suitable for use on devices that have low power. This study explains how to utilize the Trivium algorithm to secure data communication using NRF24L01. There are 5 tests performed including validation test vector, performance analysis through the validation time keystream and data encryption ecryption, performance analysis of delivery time from master to slave using communication module NRF24L01, and testing with sniffing. Results of this resesarch indicate that the keystream validation in accordance with test vector. The performance of encryption processing time has an average of 695.8 ms for 8 bit data size, 951.2 ms for 16 bit data size and 1460.2 ms for 32 bit data size. And the results of the decryption processing time performance have an average of 443.5 ms for 8 bit data size, 447.8 ms for 16 bit data size and 448.4 ms for 32 bit data size. And the results of the test by sniffing shows that the Trivium algorithm can perform data encryption well with the sniffing process can only sniff the data that has been encrypted.
Perbaikan Usability Aplikasi Pemesanan Tiket Bioskop Menggunakan Metode Usability Testing dan USE Questionnaire Moch Dian Fahmi; Hanifah Muslimah Az - Zahra; Ratih Kartika Dewi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (881.086 KB)

Abstract

Usability is one of the important aspects to be a benchmark for the quality of an application can be said to be good. Usability is used to measure how an application can be used according to the user's desire to achieve the desired goal, supported by the ease of the user to use the application interface. This cinema ticket booking application is an application that is used to book tickets in theaters throughout Indonesia can be accessed through applications on the Android platform. Based on the problems found in the results of user reviews on the platform there are still problems experienced by users, then usability measurement is used to measure the usability level of the application. Testing using usability testing method is done directly to the user, done by giving a task scenario. This test is carried out twice, the initial test to find out the initial usability value and the existing problems, then based on the existing problems given recommendations for improvements in the form of prototypes which are then re-tested to get the final usability value, after that the test results will be compared to get the usability value of the application this cinema ticket booking after repairs and before repairs. When testing there were three stages, namely, usability testing, filling out questionnaires and conducting interviews. Filling in the questionnaire is supported by USE Questionnare which has four parameters, namely Usefulness, Ease of Use, Ease of Learning, Satisfaction, the results of which will be processed and produce usability values ​​in this cinema ticket booking application. Improvements made refer to Material Design and Color Comparison Websites to get good recommendations. The initial test results obtained usability value of 57.4% categorized as sufficient predicate and the final test results obtained 83.1% were categorized as very good
Implementasi Load Balancing Server Basis Data Pada Virtualisasi Berbasis Kontainer Moch. Wahyu Imam Santosa; Rakhmadhany Primananda; Widhi Yahya
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 12 (2018): Desember 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.545 KB)

Abstract

Most of systems that we use nowadays still implement single database server architecture. It makes database server incapable in handling many requests. Horizontal scaling that is done with additional processing units such as nodes, instances, or even containers is a solution in increasing performance of a system in handling many requests. Load balancer is needed as a system that will be used to distribute data requests to the system of database server. In this research, the author tried to solve the problem by implementing load balancing database server in container-based virtualization. Load balancing runs using load balancer and nodeport features that provided by Kubernetes. With each of the replicas connected in a centralized storage system, it makes the data consistent. The result shows that the performance of database server is increased, with throughput that was obtained from load of 750 per second was (61,3 request per second) in 2 replicas, (61,3 request per second) in 3 replicas, (64,6 request per second) in 4 replicas, and (65.,6 request per second) in 5 replicas.

Filter by Year

2017 2026


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue