cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 6,945 Documents
Sistem Klasifikasi Pengaduan Masyarakat Berdasarkan OPD (Organisasi Perangkat Daerah) Menggunakan Pendekatan Ensemble Naive Bayes (Studi Kasus: Dinas Komunikasi, Informatika Dan Statistik Kota Denpasar): English Ade Yudys Triawan; Satrio Agung Wicaksono; Welly Purnomo
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (843.723 KB)

Abstract

Abstract Pro Denpasar+ is a public complaint managed by the Denpasar City Communication, Information and Statistics Office (CISO) in the form of a forum. Complaints made by the community will then be replied to by the admin or personnel from the designated Regional Device Organization (RDO). However, the admin at CISO as the verifier who examined each complaint felt confused choosing the RDO because of the similarity between complaints. In this case CISO requires a system that can classify complaints that can help the verifier in determining the destination RDO. The method used is text mining. One of the uses of text mining is classification using Ensemble Naive Bayes. Naive Bayes is a statistical classification that uses probability calculations to predict class membership in tuple data into a particular class. Ensemble technique is a technique of combining the results of various specific models to produce the best model. The results of the functional requirements of the system are 6 functional requirements and the design produces 6 use cases and 15 classes. The implementation uses the JAVA programming language with the WEKA library on classification and MYSQL on the database. Validation testing produces a value of 100% with the results of Confusion Matrix using a 90:10 ratio resulting in an accuracy value of 91.8182% while the value of area under ROC produces a value of 0.982825. In addition, the value of User Acceptance Testing produces a value of 97.5%.
Aplikasi Data Mining untuk Memprediksi Mahasiswa Berpotensi Drop Out menggunakan Algoritme K-Nearest Neighbor (K-NN) Mardiani Putri Agustini; Ahmad Afif Supianto; Welly Purnomo
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 6 (2019): Juni 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (476.111 KB)

Abstract

Drop out is a problem related to the success of student learning. This problem has also happened in Information System study program at Brawijaya University. The results of interviews were conducted with the Head of the Information System Study Program that there was a drop out every year. The existence of students who drop out can cause a decrease in the quality of higher education. Therefore, as handling of these problems needs a system that capable to help make decisions to predict on students who have the potential to drop out so prevention can be done. This system is expected to be able to help the Brawijaya Information System Study Program in making decisions, become the material for early evaluation and provide early treatment for students who have the potential to drop out. One technique for predicting is to use data mining. Classification using K-Nearest Neighbor (K-NN) algorithm is one of data mining method that can be used to predict student drop out potential. The results of processing with the help of Weka tool found the best proximity value using the K-NN algorithm is k=5. The results of evaluating algorithms obtained using confusion matrix have an accuracy rate of 99.2337%. The AUC value result of ROC curve shows a value of 0.8918. The level of usability testing generated by utilizing SUS is 67.
Implementasi Algoritme Grain-128 pada Wireless Sensor Network dengan Media Pengiriman Data nRF24L01 Muhammad Khatib Barokah; Ari Kusyanti; Mochammad Ali Fauzi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 9 (2019): September 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (653.845 KB)

Abstract

nRF24L01 is a data communication module commonly used on Wireless Sensor Network (WSN) devices. This communication module is often used because of its low power consumption and using little memory. The nRF24L01 module sends data by broadcasting it into an address. To receive data, the nRF24L01 module listen at the same address as well. However, this will create a vulnerability if the device is used to send data only to designated device. Therefore, a solution is needed to secure the data in the module such as implementing the Grain-128 algorithm. Grain-128 algorithm is an encryption algorithm that is designed to be implemented on hardware that requires limited resources. The Grain-128 algorithm is a variant of the Grain algorithm family. Grain-128 algorithm is a stream cipher where this algorithm requires 128 bit key input and 96 bit Initialization Vector (IV). That way, this study uses the Grain-128 algorithm to secure data communication with the nRF24L01 module in terms of confidentiality. Based on testing, the system takes 41363,25 micro seconds to generate keystream. The system also requires 12.02 and 12.26 micro seconds to encrypt and decrypt 8 bit data. The system is vulnerable to active attack but invulnerable to passive attack.
Monitoring Umur Padi berdasarkan Data Sensor Warna dengan menggunakan Protokol MQTT Abdul Khafid; Wijaya Kurniawan; Mochammad Hannats Hanafi Ichsan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (463.944 KB)

Abstract

Indonesia is an agricultural country known to the world as a rice producer. However, it is very unfortunate that this cannot meet the national rice needs which require Indonesia to import rice from other countries. One reason is the selection of rice harvest times by farmers. Based on these problems, there is a need for a system to help farmers calculate the age of paddy. This research utilizes NodeMCU V3, IC TCS3200 color sensor, Arduino IDE software and MQTT protocol to be assembled into a system. After several types of testing, it can be seen that this system can detect colors precisely as many as 13 times out of 20 attempts. In testing the reliability of data transmission carried out 20 times, all data totaling 10 data from the MQTT server to the serial monitor and the MQTT dashboard application were successfully sent and received as a whole without missing a single one. This means that the accuracy of delivery reaches 100% from 20 trials. In the experiment counting the delivery time that has been done as much as 20 times obtained the average delivery time is only 1.35 seconds.
Analisis Pembelian Fitur Premium Pada Pengguna Aplikasi Spotify Menggunakan Variabel Hedonic Motivation System Randy Indraswara; Komang Candra Brata; Admaja Dwi Herlambang
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 1 (2020): Januari 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (357.84 KB)

Abstract

Music is one of entertainment that is relatively easy and is often accessed in the digital world. Many music application developers compete to provide the best applications to satisfy the desires of world music lovers, especially in Indonesia. One application that is popular and popular right now in the music application is Spotify. With an assessment of the standard music player application, Spotify with premium or paid features already meets the requirements to be an excellent application for playing music judged by appearance, song completeness, standard features such as creating playlists, radio and others, sound quality, additional features such as music charts, total song listeners, and events regularly held by Spotify. In this study using the Hedonic Motivation System variable to analyze the motivation of premium users of the Spotify music player application in purchasing premium features because in the hedonic motivation system it has variables that are used to analyze the motivation of users of premium features which are seen in the motivation of customer pleasure and loyalty in the Spotify music application . It is expected that by using the Hedonic Motivation System variable can find out the results of the analysis of the motivation of users of the Spotify application premium features in purchasing premium features. Based on the explanation above, it is expected that with this research the success rate of the Spotify music player application can be seen as a reference for developers to develop online music player applications.
Implementasi Data Mirroring Pada Metode Hot Standby Redundancy Berbasis Protokol I2C dan Arduino Uno Arif Nur Agung Laksana; Wijaya Kurniawan; Agung Setia Budi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (610.05 KB)

Abstract

Each electronic component must have an active time limit and will certainly suffer damage at any time. A system can experience fatal failure if there is damage to components that are crucial. Therefore the crucial component in a system must be fault tolerant, where the system is able to work as it should even though it failed. One way that can be applied to realize a fault tolerant system is by applying the Hardware Redundancy mechanism. Hardware Redundancy is a mechanism to improve system reliability by providing backup components that have the same function as these crucial components. There are several types of this method, one of which is Hot Standby Redundancy in which the method is added a duplicate of the crucial component that is in active condition and will take over the role of the crucial component when the crucial component fails. In this study Hot Standby Redundancy is applied to an Arduino UNO and RFID based door lock system. In that system, which acts as a crucial component is Arduino UNO which acts as a controller in the system. Through I2C serial communication the master sends a probe message periodically to the slave as a sign that the master is still operating or is experiencing damage. The process of switching control of the system is carried out by the slave if the master fails to send the probe message within the specified time period. In addition to redundancy, the system can also synchronize data between the main components and backup components. The process is needed to ensure the two components have similar data. The system test results show that the average time taken by the system to synchronize data with each other is 950.4 microseconds and 784.8 microseconds.
Pengembangan Sistem Informasi Distribusi Produk Dengan Menggunakan Rational Unified Process (Studi Kasus Pada CV. Chiara Muslimah) Randy Pramono Rahadian; Djoko Pramono; Adam Hendra Brata
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 2 (2019): Februari 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (810.533 KB)

Abstract

CV. Chiara Muslimah is one of the Muslim fashion distributors in the city of Mojokerto. CV. Chiara Muslimah has become a distributor of many well-known brands, Seply, Elif, Ethica and others. Besides that, CV. Chiara Muslimah also has many members spread across various cities. Based on interviews, 83% of employees who work every day have the task of managing WhatsApp messaging group communications respectively. As well as employees can only serve customer requests only during business hours, as a result customer questions are not answered and orders are not received. Based on these problems, a solution can be given, namely an information distribution system. The method used in development is the Rational Unified Process, the method was chosen because there is an analysis of business processes in one phase and complete in the documentation. The results of this study produced 13 sequence diagrams, 2 class diagrams, and 1 physical data model. From the results of testing the black box the results are 100% valid. Based on UAT testing which contained 18 questionnaires, it was obtained an examination of 86.51%. And a comparison of the business process of question and answer as much as 5 minutes and accelerate business processes as much as 8 minutes 27 seconds.
Klasifikasi Hoaks Berbahasa Inggris menggunakan Boosting Weighted Extreme Learning Machine Luthfi Mahendra; Indriati Indriati; Putra Pandu Adikara
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 8 (2019): Agustus 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1210.53 KB)

Abstract

Rapid technological developments have caused hoax to be more easily disseminated through the internet, especially for politic related news. Although it looks trivial, hoax can cause various kinds of problems such as community riots and the blocking of social media sites. To overcome the problems that can be caused by hoaxes, this study attempts to create an automatic English language hoax classification system using the Weighted Boosting ELM algorithm. The algorithm was chosen because it has high accuracy results for various types of document classification problems and has good results even if the data used has an unbalanced number of classes, making it suitable for hoax classifications which are fewer than factual news. The research methodology is divided into several stages consisting of pre-processing, term weighting, normalization, training and algorithm evaluation. The data used are 180 articles consisting of 90 hoax and 90 factual news. Evaluation was carried out by measuring F1 values ​​(results of average harmonic precision and recall) using K-Fold cross validation, the highest results obtained were 0,787.
Evaluasi Pengelolaan Sumber Daya Manusia menggunakan Kerangka Kerja COBIT 5 (Studi Kasus : Dinas Komunikasi dan Informatika Kabupaten Sidoarjo) Rifdah Nur Fadhilah; Widhy Hayuhardhika Nugraha Putra; Suprapto Suprapto
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 7 (2019): Juli 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (323.855 KB)

Abstract

Dinas Komunikasi dan Informatika Kabupaten Sidoarjo provides services to the public in the field of information and communication, statistics and coding transparently and accountably in the field of communication and informatics. To provide maximum service, Dinas Komunikasi dan Informatika Kabupaten Sidoarjo must have sufficient and qualified human resources. Based on the results of the interview, several problems were found in managing human resources. To find out the current conditions in human resource management can be done Capability level assessment in the EDM04 process Ensure Resource Optimization and APO07 Manage Human Resources by using the COBIT 5 framework. Data collection is done through interviews, observations, and assessment sheets. Assessment is done in stages from level 0 Incomplete Process to level 5 Optimization Process to find out the value of capability level. Then, do an analysis of the value of the capability level obtained and the level target. Then, improvements will be obtained to improve human resources in the organization. Capability level for EDM04 Ensure Resource Optimization is at level 1 with level target at level 2 and for APO07 Manage Human Resources is at level 2 with level target at level 3. Thus, the gaps obtained by each process are as many as 1. Recommendations for improvement given refer to the activities and documents related to each process.
Pengembangan Sistem Informasi Point of Sales untuk Bengkel berbasis Cloud Computing (Studi Kasus: Bengkel Mas Pur Baturaja) Bella Hersy Lavenia; Widhy Hayuhardhika Nugraha Putra; Buce Trias Hanggara
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 3 No 10 (2019): Oktober 2019
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (322.009 KB)

Abstract

Bengkel Mas Pur Baturaja is a company that focuses on vehicle body repair services, especially for four-wheel vehicle. In the very beginning, Bengkel Mas Pur Baturaja uses manual data processing which requires that every transaction must be recorded. In this management, this company has many problem including unregistered transactions and incomplete transaction data. From these problems, a point of sales information system for car services shop was made. Point of sales information system for car services shop is a cloud computing-based system that can be accessed by users through a web browser, users will be easily to record every transaction by the company. The development of point of sales information systems for a workshops is using the CodeIgniter framework, a programming languages like PHP, HTML, CSS, Javascript and used MySQL as database. The implementation for cloud computing will be used Infrastructure service (IaaS) as service type that is AWS EC2 from Amazon Web Services as a cloud provider and the instance is t2.micro with Ubuntu Server 16.04 as operating system. Tests carried out on this system will use functional testing and non-fuctional testing. Functional testing on the system has 93% declared valid according to user requirements, and the system has been successfully run on several web browsers that are often generally used.

Filter by Year

2017 2026


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 4 (2026): April 2026 Vol 10 No 3 (2026): Maret 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue