cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 6,972 Documents
Deteksi Serangan DDoS pada Jaringan Berbasis SDN dengan Klasifikasi Random Forest Muhammad Khairullah Harto; Achmad Basuki
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 4 (2021): April 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of network technology, threats related to the network are also growing, one of which is DDoS (Distributed Denial of Service). The increasingly advanced and affordable network infrastructure makes DDoS happen more and more. From year to year, there is a significant increase in the number of DDoS attack cases. Therefore, it is still necessary to study various algorithms for classifying data in networks that constitute deep DDoS. The SDN network was chosen because it has a simple implementation and does not require a lot of resources because of the information about the network topology and the controller that will be built using Ryu. The method used is the Random Forest algorithm as a method for classifying DDoS attacks. After conducting the research, the researchers found that Random Forest performed well in detecting DDoS attacks. The accuracy is quite high around 90% with an average detection time of 0.3 seconds.
Implementasi Algoritme Enkripsi Salsa20 untuk Pengamanan Data Video Surveilans secara Real-Time Angger Ramadhan; Ari Kusyanti; Primantara Hari Trisnawan
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 2 (2021): Februari 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Video Video surveillance is a form of surveillance for actions that may violate the law in the form of a collection of frames sent in real-time from a device that has a camera to another device that is tasked with conducting surveillance. However, problems can occur when the frame sent is taken by an unauthorized party, so that it can interfere with the confidentiality of the frame data. In previous research, there is a method for securing these frames, namely in the form of encryption using a block cipher algorithm and not using a stream cipher algorithm. Therefore, in this study, the implementation of the stream cipher algorithm, namely Salsa20, was implemented. Implementation of Salsa20 is applied to systems with client-server network architecture, namely encryption on the server and decryption on the client. After that, tests are carried out related to test vectors, performance, and attacks. The results of the test vector test have been successful because the output from the system is the same as the output on the paper. Furthermore, for the results of the attack test, the sniffing test succeeded in getting the frame on the network but could not get the information because the frame was encrypted and the ciphertext-only attack test failed because it had not succeeded in getting the key or plaintext.
Evaluasi User Experience Pada Aplikasi Programming HUB Menggunakan Indikator UX Honeycomb Ryan Rahmadiansyah; Retno Indah Rokhmawati; Hanifah Muslimah Az-Zahra
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 7 (2020): Juli 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Vocational high schools, especially ICT majors often use e-learning as a learning medium. Talking about ICT majors in Vocational High Schools will definitely learn about programming. Currently there are many applications in PlayStore that can be used to learn programming, one of which is the HUB Programming application. HUB Programming Application is an application on android devices for learning programming. However, many HUB Programming applications get negative reviews. The purpose of this research is to see how well, provide recommendations for improvement and can be taken into consideration by learning media. UX Honeycomb is used to measure the user experience of the HUB Programming application. The number of sample respondents used was 30 and were students of TKJ Class X SMK 3 MALANG who had used e-learning and had knowledge about e-learning. The method used is to spread online questionnaires by taking quantitative and qualitative data. Descriptive statistics are used to process and analyze data by finding the mean (mean) and variation of the data (standard deviation). The results of processing and analysis show that the Usable aspect has an average value of 69% and is in the good category, the Valuable aspect has an average value of 69% and is in the good category, while the Useful aspect has an average value of 72% and is in the category well
Implementasi Algoritme Speck Untuk Enkripsi One-Time Password Pada Two-Factor Authentication Moh. Ahsani Taqwim; Ari Kusyanti; Reza Andria Siregar
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 7 (2021): Juli 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Static authentication is very vulnerable to attacks, Therefore, two-factor authentication is carried out by adding OTP as a factor in the authentication. However, even with all the conveniences offered by OTP, OTP is still very vulnerable to attacks, there are many attacks on OTP such as sniffling, wireless interception, etc. Therefore, it is necessary to have a second security for OTP. The SPECK algorithm provides excellent performance in both software and hardware, SPECK Family also has a variety of block and key sizes to match the application requirements and security needs without hindering the performance. OTP is encrypted with the SPECK algorithm to prevent attacks that directed at OTP. The OTP is encrypted with a key and sent to the user which is then sent back by the user to the system to be decrypted using the user's key. The validated OTP is then deleted to avoid duplicate OTPs. The testing of sniffing and KPA attack that was done to OTP was successfully prevented using SPECK algorithm. We can conclude that the result is invisible in sniffing attack testing, and the plaintext generated from KPA didn't match the main plaintext. The validation of the SPECK data is also true because it matches the test vector.
Prediksi Kinerja Akademik Siswa menggunakan Neighbor Weighted K-Nearest Neighbor dengan Seleksi Fitur Information Gain Rizky Adinda Azizah; Fitra Abdurrachman Bachtiar; Sigit Adinugroho
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk dipublikasikan di Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi)
Analisis Sentimen Ulasan Produk Kecantikan Menggunakan Metode BM25 dan Improved K-Nearest Neighbor dengan Seleksi Fitur Chi-Square Dewi Syafira; Indriati Indriati; Sutrisno Sutrisno
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 11 (2020): November 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pengaruh produk kecantikan merupakan hal yang mulai diminati oleh kaum perempuan. Dengan kemudahan yang diberikan saat ini terdapat platform khusus berbasis web maupun mobile phone yaitu Female Daily. Female daily merupakan situs media informasi yang berisi konten produk kecantikan tentang perawatan wajah hingga tubuh untuk siap diberi ulasan oleh konsumen yang telah mencoba atau sedang menggunakan produknya. Data ulasan dapat digunakan sebagai acuan sebelum konsumen ingin mencoba produk kecantikan. Banyaknya ulasan mengakibatkan konsumen sulit untuk memilih produk yang di inginkan. Pada penelitian ini membantu konsumen untuk mengetahui data ulasan tesebut masuk kedalam sentimen positif atau sentimen negatif. Proses dalam Analisis Sentimen memerlukan metode BM25 yang digunakan sebagai pembobotan kata, Improved K-Nearest Neighbor sebagai penentuan dalam memilah sentimen dan Seleksi Fitur Chi-Square untuk mengurangi jumlah kata dalam klasifikasi pada teks. Pengujian dilakukan menggunakan 5-fold cross validation dengan hasil terbaik diperoleh pada nilai k= 15 menghasilkan rata-rata nilai sebesar presisi= 0,9, recall= 0,8, accuracy= 0,7806 dan f-measure= 0,8428 selanjutnya dari pengujian seleksi fitur Chi-Square berdasarkan persentase dengan parameter k=15 didapatkan hasil tertinggi pada persentase sebanyak 40% dan 50% dengan nilai presisi= 0,888, recall= 0,8, accuracy= 0,7818 dan f-measure= 0,842.
Pengembangan Sistem Manajemen Logistik dan Order di UBCOFFEE Bayu Maulana Imran; Nurudin Santoso
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 6 (2021): Juni 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

UBCOFFEE is a coffee restaurant that has many variation of menus. Varitation of menus in a restaurant has a significant influence to consumer purchasing decision index. The more variety of menus available in a restaurant, the more the the restaurant needs efficiency in management of order and payment data. The restaurant needs a system that can support performance efficiency in logistic and order management. This application system will be built with Waterfall method of Software Development Life Cycle (SDLC) so that the system maintains quality during the development and maintenance process. The application system will be built with Flutter framework to make system more practical and executable by various platforms. This research begins with system design, then implemented into a program code that will be tested through white-box testing and usability testing by selected samples of testerwith System Usabilty Scale (SUS) as a standard. The test results of the system show that the logistics and order management system at UBCOFFEE has a usability scale with 72.63 points from the minimum point limit 68 in a scale between 1 and 100. It can be concluded that the system has met the usability standard.
Deteksi Konten Negatif di Twitter Menggunakan Support Vector Machine dan Pemisahan Hashtag dengan Algoritme Pipeline Hanson Siagian; Putra Pandu Adikara; Sigit Adinugroho
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 5 No 4 (2021): April 2021
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Social media is one of the most used media to get information in Indonesia. The high number of social media usage makes the risk of spreading negative content even greater. This was shown in 2018 the Ministry of Communication and Information received 547.506 complaints of negative content on social media where Twitter became the first most complained social media. The number of complaints creates problems if it has to be checked manually. Therefore, the authors propose research to build a negative content detector on Twitter documents. This research uses the Support Vector Machine method and Pipeline for hashtag segmentation. The process starts with preprocessing the data, then do hashtag segmentation with Pipeline, weighting using Term Frequency-Inverse Document Frequency, followed by classification using Support Vector Machine. In this research the test was carried out by K-Fold Cross Validation using 300 data divided into 10 fold. The test results with the highest accuracy were obtained at 0,8325 with learning rate = 0,0001, complexity = 0,001, lambda = 0,1, epsilon = 0,0001 and maximum iteration = 50.
Pengembangan Sistem Informasi Monitoring Pengelolaan Dana Bantuan Operasional Sekolah berbasis Website Studi Kasus : Korwilcam Bidang Pendidikan Kecamatan Sempor Arief Widiyatmoko; Satrio Agung Wicaksono; Welly Purnomo
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 8 (2020): Agustus 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Education is the right of all Indonesian without exception. The government is obliged to guarantee the implementation of education at the basic level, therefore the government has launched a program called BOS (‘Bantuan Operasional Sekolah'). In its implementation, schools are required to make an accountability report for the use of BOS funds in accordance with government regulations from the education and culture office regarding technical guidelines for the use of BO funds. In reporting the use of BOS funds, several obstacles were encountered, namely frequent delays in reporting which caused the regional coordinator to recap data to be hampered, so that the purpose of this study was to build an information system that could monitor schools so that reports on the use of BOS funds to be more controlled. System development is carried out using the waterfall model. In this study, the problem can be overcome by changing the current business process into a recommendation business process so as to produce functional requirements that will be implemented on a website-based information system whose design uses an object-oriented approach which will be implemented in the system using the PHP framework, CodeIgniter. After the information system built is valid according to user needs, then testing is carried out using user acceptance testing so that the user acceptance index of the system being built is known. Based on this test, the results show that the user accepted the information system and the features in it.
Evaluasi Proses Bisnis Sistem Informasi Kebutuhan Pelatihan (SIBULAT) Badan Pengembangan Dan Pemberdayaan Sumber Daya Manusia Kesehatan (BPPSDMK) Dengan Menerapkan Process Mining Dan Quality Evaluation Framework (QEF) Muhamad Fauziawan Agung Rewanda; Nanang Yudi Setiawan; Aditya Rachmadi
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 4 No 10 (2020): Oktober 2020
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

BPPSDMK is one of the departments within the auspices of the Ministry of Health of the Republic of Indonesia and in the execution of its duties, the responsible accountable directly to the Minister of Health. BPPSDMK have a responsibility in developing and empowerment of existing human resources in the ministry of health. BPPSDMK has had 21 applications one is Information Systems Training Needs (SIBULAT). At this time, in SIBULAT yet there is a Standard OperationaI Procedure (SOP) written so that the evaluation of the performance of the system can be more difficult to do and causes the plot to be irregular according to the schedule and can change at any time.. By therefore, therefore, research needs to be done with how to identify the business processes contained in the BPPSDMK, create a business process model and conduct an evaluation of the business process SIBULAT in order to facilitate the evaluation process and in the future SIBULAT have better business processes as well as efficient. Interview Data and eventlog is used in the evaluation process as a source of data, then the data will be processed using the methods of process mining and proceed with the analysis using the tool help Disco and ProM 6 Tools. After that, the method of Quality Evaluation Framework (QEF) is used to perform a follow-up evaluation. In this method the comparison is done between the target value with the value from the results of the interview as well as the value of the eventlog. 7 quality factor obtained from the output evaIuasi that has been done, with the results of the calculations show that there are 4 quality factor that is not in accordance with the target which means that the processing time recorded in the eventlog exceed predetermined targets.

Filter by Year

2017 2026


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 4 (2026): April 2026 Vol 10 No 3 (2026): Maret 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue