cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota malang,
Jawa timur
INDONESIA
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer
Published by Universitas Brawijaya
ISSN : -     EISSN : -     DOI : -
Jurnal Pengembangan Teknlogi Informasi dan Ilmu Komputer (J-PTIIK) Universitas Brawijaya merupakan jurnal keilmuan dibidang komputer yang memuat tulisan ilmiah hasil dari penelitian mahasiswa-mahasiswa Fakultas Ilmu Komputer Universitas Brawijaya. Jurnal ini diharapkan dapat mengembangkan penelitian dan memberikan kontribusi yang berarti untuk meningkatkan sumber daya penelitian dalam Teknologi Informasi dan Ilmu Komputer.
Arjuna Subject : -
Articles 6,850 Documents
Analisis Sentimen Pada Ulasan "Lazada" Berbahasa Indonesia Menggunakan K-Nearest Neighbor (K-NN) Dengan Perbaikan Kata Menggunakan Jaro Winkler Distance Yane Marita Febrianti; Indriati Indriati; Agus Wahyu Widodo
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (474.914 KB)

Abstract

The development of an information technology currently carries a considerable impact against the pattern of life one on purchasing power. The current purchasing power are more likely to shop online because it's considered easier. But, how does a consumer know if the items to be purchased good or otherwise. Therefore it appears there is a review or comment on any goods sold. Review on items bring considerable influence against the purchasing power of consumers to know the quality of the goods, does not be surprised if a review into one of the main goals being viewed by consumers after the price. However, not all reviews provided the consumers can be understood by other consumers due to use the word is abbreviated, it use modern languages, in typing letters, the researcher proposes the creation of a system Analysis of Sentiment on the Reviews “Lazada” Berbahasa Indonesia Using the K-Nearest Neighbor (K-NN) and Repair Word Using Jaro Winkler Distance. Testing based on the value of precission, recall, and accuracy at each analysis sentiment without repair word, or with repair word. The test result with good accuracy value is present on the analysis sentiment with repair word is 76 %, with value of precission 0,76, and recall 1.
Klasifikasi Jenis Kanker Berdasarkan Struktur Protein Menggunakan Algoritma Naive Bayes Tawang Wulandari; Marji Marji; Lailil Muflikkah
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (329.824 KB)

Abstract

Kanker adalah beberapa sel tubuh yang mulai membelah tanpa berhenti dan menyebar ke jaringan sekitarnya. Setiap tahun terdapat ribuan kasus baru kanker yang menyerang warga Indonesia. Terlambatnya deteksi dini meyebabkan banyak kasus kematian akibat kanker. Faktor penyebab kanker adalah faktor genetik dan lingkungan yang dapat merubah struktur DNA. Perubahan DNA tersebut merugikan proses pembelahan sel dan menguntungkan proses mutasi. Pada proses mutasi dapat menghasilkan gen p53, perubahan genetik tersebut paling umum ditemukan pada kanker manusia. Dari permasalahan tersebut dibutuhkan sistem untuk mengklasifikasikan jenis kanker yang diderita oleh pasien. Salah satu metode yang digunakan adalah Naive Bayes. Naive Bayes merupakan sebuah pengklasifikasian probabilitas sederhana yang mengaplikasikan Teorema Bayes dengan asumsi ketidaktergantungan yang tinggi. Algoritma tersebut diketahui telah banyak digunakan dalam bidang kedokteran. Algoritma ini diterapkan pada hal-hal yang berhubungan dengan diagnosa medis. Diagnosa dilakukan dengan cara melihat gejala-gejala yang berkaitan kemudian melihat probabilitas kemungkinan dari penyakit. Pengujian dilakukan dengan menggunakan 5 dataset yaitu 320, 400, 480, 588 dan 848 data dari data total sebanyak 848 data. Data dibagi menjadi data latih dan data uji. Data uji diambil 10% hingga 60% dari dataset. Hasil akurasi yang didapatkan pada pengujian 848 data dengan persentase data uji 60% didapatkan akurasi sebesar 79,17%.
Implementasi Modul Antarmuka Perangkat Sensor Dan Komunikasi Pada Uart Dan I2C Dengan Fitur Plug And Play Bunga Boru Hasian Siahaan; Sabriansyah Rizqika Akbar; Dahnial Syauqy
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (624.815 KB)

Abstract

Currently there are many products from various vendors of IOT service providers in the world. The product that intended here is a sensor and Communication Module. Sensor is a device that can sensing a condition and can provide value of the condition. Communication Module is a devices that can allow two or more microcontrollers like Arduino to communicate. Each sensor and Communication Module from each vendor has its own configuration and also its own way to communicating. While users have a variety of needs that sometimes require to combine various devices. Therefore, it takes a way to connect the various sensors and Communication Modules in one module that is a Interface Module, so that it can be easier in its use. In this study there are four sensors and two Communication Modules that connected to one Interface Module. Installation of sensors and Communication Modules with Plug and play features that eliminate configuration during installation. The path used for the installation of sensors is I2C (Inter Integrated Circuit) through path SDA and SCL. Connecting lines with the Communication Module that is UART (Universal Asynchronous Receiver Transmitter) through path RX (receiver) and TX (transmitter). From the test results, the Interface Module successfully detects the Sensor through the address and detects the Communication Module with the translation of the code. Data successfully received from the sensor and successfully forwarded to the Communication Module without configuration.
Implementasi Ekstraksi Fitur Jumlah Keypoint Descriptor Pada Pengenalan Tanda Tangan Dengan Algoritme Learning Vector Quantization Imada Nur Afifah; Wayan Firdaus Mahmudy
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (662.934 KB)

Abstract

Signature recognition is important for signature verification process. One of the signature recognition method is implementation Learning Vector Quantization (LVQ) for signature recognition with additional method of features extraction using Scale Invariant Features Transform (SIFT). In the train process, this research used some features such as maximum of black pixel in horizontal and vertical histogram, center of mass, normalized area of signature, aspect ratio, tri surface feature, the Six Fold Surface feature, transition feature and additional features called number of keypoints. Number of keypoints are output of Scale Invariant Features Transform (SIFT) method. The dataset used is 100 images for training data and 100 images for testing data from 20 different classes. And 25 images from out of trained class as unknown data. The result of algorithm testing is 71,2% from testing of non-threshold process, 56% from testing process with maximum value of minimum euclidean distance between data and class as threshold value, 45,6% % from testing process with second maximum value of minimum euclidean distance between data and class as threshold value.
Analisis Minat dan Risiko Dalam Penggunaan Whaff Reward Menggunakan Model Technology Acceptance Model (TAM) Richie Mahfud Ahmed Sambora; Ari Kusyanti; Admaja Dwi Herlambang
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 8 (2018): Agustus 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1240.782 KB)

Abstract

The difficulty of getting a job is no longer a new problem for the public, especially Indonesian citizens. The rapidly evolving technology has allowed the public to open their horizons to search for grains of income on the internet. One of them by using Whaff Reward. Of the approximately 10,000,000 users are already using Whaff Reward (Android Playstore, 2017). Whaff Reward is an advertising medium as well as Paid per Download application with a segment of developers and users of Whaff Reward itself. Among the many attacks on the security sistem e-money it will trigger user worries Whaff Reward application. In this study, researchers conducted a parametric analysis to determine what faktors make Whaff Reward users in Indonesia using Whaff Reward. By combining several models of Technology Acceptance Model (TAM), Trust, Perceived Risk and Theory of Planned Behavior (TPB). Collection of sample data by using questionnaire and analyzed by Linear Regression method. The number of samples used in this study amounted to 154 data. The results of this study show that users in Indonesia use Whaff Reward because they feel they have perceived results, benefit themselves, the influence of the nearest people, the available infrastructure, the feeling of trust in the organization's commitment, the good reputation of the organization and the experience positive results obtained when using Whaff Reward
Penerapan Klasifikasi Tweets pada Berita Twitter Menggunakan Metode K-Nearest Neighbor dan Query Expansion Berbasis Distributional Semantic Galih Nuring Bagaskoro; Mochammad Ali Fauzi; Putra Pandu Adikara
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 10 (2018): Oktober 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (704.287 KB)

Abstract

The use of short text based on digital to date is still growing and extending to various social media. Twitter has news features in tweets to represent information representing each type. Each categorization of this type is done to make it easier for users to use it. The purpose of the use of categories in this classification, to evaluate and improve the quality of social media in grouping categories of content of the content provided. Traditional classification is still used today, but the results are sometimes not maximal, it is necessary to expand the word to add words to the text in order to improve the accuracy. Word expansion is used with a semantic-based distributional euclidean distance technique to find the closest word from an external source to be a query to be added to the test data text. Using test data 105 and training data 400, the classification using K-Nearest Neighbor can obtain 90% results with nearest neighbor K=5. These results are similar to the results of tests conducted without using word expansion techniques. While the test is done by adding the expansion of words with threshold 0.5 and the nearest immediate value K-Nearest Neighbor K=5 obtained an accuracy of 92%.
Implementasi Pervasive Computing untuk Smart Bag dengan menggunakan RFID Muhammad Yaqub; Rizal Maulana; Issa Arwani
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1113.672 KB)

Abstract

In this era of technology, we are required to move quickly and precisely without making a significant mistake. However, individuals who experience problems that have not been resolved in the case of negligence that causes the goods are often left behind. Many ways have been done to find a solution, one of them by writing notes about the list of goods to be carried. But this way can be troublesome and time consuming. This is where the role of Internet-based technology It is most needed to help solve the problem by developing a smart device. This system functions into several parts of hardware and software. This research uses NodeMCU as microcontroller, Wi-Fi network as connectivity at Firebase Realtime Database. Firebase is used as a communication between hardware and software to store data on read items, as well as reminders of smartphone applications. The RFID Reader sensor device will eliminate readings on the goods UID and the microcontroller will send status data of incoming and outgoing goods to Firebase for the goods already read. The LED light actuator device performs a special action for a red or green light based on the status of the goods obtained. From the results of the implementation, each item succeeds in compiling its identity to Firebase and both hardware and software can interact on a pervasive basis.
Penilaian Kapabilitas Penerapan Manajemen Risiko Teknologi Informasi Menggunakan Kerangka Kerja COBIT 5 (Studi pada PDAM Kota Malang Jawa Timur) Yani Iriana Putri; Suprapto Suprapto; Admaja Dwi Herlambang
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 11 (2018): November 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (398.318 KB)

Abstract

PDAM Kota Malang's target it utilizing an effective information technology. Therefore the company has priority on improving reability of information system management, service system improvements, customer data management, development and implementation of the applications. In order to measure the implementation of risk management, an assessment had been done to capability level of EDM03 subdomain (ensure risk optimization), APO12 (manage risk) and APO13 (manage security) using COBIT 5 Framework. This research used self assessment. Started from choosing processes to asses, assessment for level 1, assessment for level 2 to 5, recording all of the assessment result, gap analyzing, and making recommendations. The result of capability level were obtained through several methods, viz. interviews, observation, and self-assessment worksheet. Recommendations were expected to assist the company in archiving the targeted level in EDM03, APO12, and APO13 processes. Where this three processes were in capability level 1 and the targeted level is in level 2. Thus, the gap of the three subdomain is 1. Recommendations for the company are related to documents of each processes which needed to be improved, suggestion to do a further analysis to know the possibility that will occur in the future, establishing a special team for risk and security management, separation of duties and responsibilities, and determining methods to control each processes.
Analisis dan Evaluasi Proses Bisnis Menggunakan Business Process Improvement (BPI) pada UB Guest House Raditya Rizky Putra; Nanang Yudi Setiawan; Retno Indah Rokhmawati
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1003.329 KB)

Abstract

UB Guest House is one of the business unit of Brawijaya University which has responsibility to the Rectorate of Brawijaya University. The running of the business process has a several potential problems that can be hampered to achieve the vision and mission of UB Guest House. The services are not maximal, the system is not integrated, the activities are complex and need a long time, administration and archieving are horrible, they are the problems that founded in the business process at UB Guest House. The Analysis and evaluation are needed to solve the problems and also improvement for the business process. This research uses Business Process Model and Notation (BPMN) Diagrams and Failure Mode and Effect Analysis (FMEA) method for analysis and evaluation business process and also Business Process Improvement (BPI) method for improvement the business process in UB Guest House. The result of this simulation in current business process (as is) and business process recommendation (to be) on reservation and check-in rooms, and check-out rooms have reached 30.15%.
Kendali Robot Berdasarkan Perintah Inisialisasi Awal Pengguna Adit Ilham Nugroho; Mochammad Hannats Hanafi Ichsan; Rizal Maulana
Jurnal Pengembangan Teknologi Informasi dan Ilmu Komputer Vol 2 No 9 (2018): September 2018
Publisher : Fakultas Ilmu Komputer (FILKOM), Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1008.874 KB)

Abstract

Over the past 30 years, robotics research and robotics developments continue to evolve, autonomous robots that used to be called traditional industrial robots and animal like or humanoid robots. One of these developments is industrial robot technology or also called industrial robot. There are several reasons why many articulated robots are developed, among others, this robot into the robot factory where the industry is currently growing and also has a free space 360 ​​°. Industrial robots can improve productivity and efficiency in a factory to run the production line. The author created a protype robot that can move according to the initial initialisation of the user, this robot allows users to run the robot if you want to change the robot movement, compared with existing autonomous robot. This robot is classified as a manual robot that reduces the cost of purchasing a robot. In this study only use Arduino software with EEPROM function to save the movement that has been given. Arduino Software is an open-source software for easy code writing. Arduino hardware device type Mega 2560, Arduino Mega 2560 is a hardware development of Arduino-based microcontroller using ATmega2560 chip to create research prototype. This study uses a total of 5 joints using Servo drives, Servo motors used are Servo SG90. Testing servo movement 0⁰-180⁰ has an average error rate of 1.85% and servo servicing 0⁰-360⁰ has an average error rate of 2.32%. Then in order analysis 1 movement the average value of error is only 2.9% and in the overall command analysis the average error rate is only 1.5%.

Page 50 of 685 | Total Record : 6850


Filter by Year

2017 2026


Filter By Issues
All Issue Vol 10 No 13 (2026): Publikasi Khusus Tahun 2026 Vol 10 No 01 (2026): Januari 2026 Vol 10 No 2 (2026): Februari 2026 Vol 9 No 13 (2025): Publikasi Khusus Tahun 2025 Vol 9 No 12 (2025): Desember 2025 Vol 9 No 11 (2025): November 2025 Vol 9 No 10 (2025): Oktober 2025 Vol 9 No 9 (2025): September 2025 Vol 9 No 8 (2025): Agustus 2025 Vol 9 No 7 (2025): Juli 2025 Vol 9 No 6 (2025): Juni 2025 Vol 9 No 5 (2025): Mei 2025 Vol 9 No 4 (2025): April 2025 Vol 9 No 3 (2025): Maret 2025 Vol 9 No 2 (2025): Februari 2025 Vol 9 No 1 (2025): Januari 2025 Vol 8 No 13 (2024): Publikasi Khusus Tahun 2024 Vol 8 No 10 (2024): Oktober 2024 Vol 8 No 9 (2024): September 2024 Vol 8 No 8 (2024): Agustus 2024 Vol 8 No 7 (2024): Juli 2024 Vol 8 No 6 (2024): Juni 2024 Vol 8 No 5 (2024): Mei 2024 Vol 8 No 4 (2024): April 2024 Vol 8 No 3 (2024): Maret 2024 Vol 8 No 2 (2024): Februari 2024 Vol 8 No 1 (2024): Januari 2024 Vol 7 No 13 (2023): Publikasi Khusus Tahun 2023 Vol 7 No 9 (2023): September 2023 Vol 7 No 8 (2023): Agustus 2023 Vol 7 No 7 (2023): Juli 2023 Vol 7 No 6 (2023): Juni 2023 Vol 7 No 5 (2023): Mei 2023 Vol 7 No 4 (2023): April 2023 Vol 7 No 3 (2023): Maret 2023 Vol 7 No 2 (2023): Februari 2023 Vol 7 No 1 (2023): Januari 2023 Vol 7 No 14 (2023): Antrian Publikasi Vol 6 No 13 (2022): Publikasi Khusus Tahun 2022 Vol 6 No 12 (2022): Desember 2022 Vol 6 No 11 (2022): November 2022 Vol 6 No 10 (2022): Oktober 2022 Vol 6 No 9 (2022): September 2022 Vol 6 No 8 (2022): Agustus 2022 Vol 6 No 7 (2022): Juli 2022 Vol 6 No 6 (2022): Juni 2022 Vol 6 No 5 (2022): Mei 2022 Vol 6 No 4 (2022): April 2022 Vol 6 No 3 (2022): Mei 2022 Vol 6 No 2 (2022): Februari 2022 Vol 6 No 1 (2022): Januari 2022 Vol 5 No 13 (2021): Publikasi Khusus Tahun 2021 Vol 5 No 12 (2021): Desember 2021 Vol 5 No 11 (2021): November 2021 Vol 5 No 10 (2021): Oktober 2021 Vol 5 No 9 (2021): September 2021 Vol 5 No 8 (2021): Agustus 2021 Vol 5 No 7 (2021): Juli 2021 Vol 5 No 6 (2021): Juni 2021 Vol 5 No 5 (2021): Mei 2021 Vol 5 No 4 (2021): April 2021 Vol 5 No 3 (2021): Maret 2021 Vol 5 No 2 (2021): Februari 2021 Vol 5 No 1 (2021): Januari 2021 Vol 5 No 13 (2021) Vol 4 No 13 (2020): Publikasi Khusus Tahun 2020 Vol 4 No 12 (2020): Desember 2020 Vol 4 No 11 (2020): November 2020 Vol 4 No 10 (2020): Oktober 2020 Vol 4 No 9 (2020): September 2020 Vol 4 No 8 (2020): Agustus 2020 Vol 4 No 7 (2020): Juli 2020 Vol 4 No 6 (2020): Juni 2020 Vol 4 No 5 (2020): Mei 2020 Vol 4 No 4 (2020): April 2020 Vol 4 No 3 (2020): Maret 2020 Vol 4 No 2 (2020): Februari 2020 Vol 4 No 1 (2020): Januari 2020 Vol 3 No 12 (2019): Desember 2019 Vol 3 No 11 (2019): November 2019 Vol 3 No 10 (2019): Oktober 2019 Vol 3 No 9 (2019): September 2019 Vol 3 No 8 (2019): Agustus 2019 Vol 3 No 7 (2019): Juli 2019 Vol 3 No 6 (2019): Juni 2019 Vol 3 No 5 (2019): Mei 2019 Vol 3 No 4 (2019): April 2019 Vol 3 No 3 (2019): Maret 2019 Vol 3 No 2 (2019): Februari 2019 Vol 3 No 1 (2019): Januari 2019 Vol 2 No 12 (2018): Desember 2018 Vol 2 No 11 (2018): November 2018 Vol 2 No 10 (2018): Oktober 2018 Vol 2 No 9 (2018): September 2018 Vol 2 No 8 (2018): Agustus 2018 Vol 2 No 7 (2018): Juli 2018 Vol 2 No 6 (2018): Juni 2018 Vol 2 No 5 (2018): Mei 2018 Vol 2 No 4 (2018): April 2018 Vol 2 No 3 (2018): Maret 2018 Vol 2 No 2 (2018): Februari 2018 Vol 2 No 1 (2018): Januari 2018 Vol 2 No 8 (2018) Vol 2 No 6 (2018) Vol 1 No 12 (2017): Desember 2017 Vol 1 No 11 (2017): November 2017 Vol 1 No 10 (2017): Oktober 2017 Vol 1 No 9 (2017): September 2017 Vol 1 No 8 (2017): Agustus 2017 Vol 1 No 7 (2017): Juli 2017 Vol 1 No 6 (2017): Juni 2017 Vol 1 No 5 (2017): Mei 2017 Vol 1 No 4 (2017): April 2017 Vol 1 No 3 (2017): Maret 2017 Vol 1 No 2 (2017): Februari 2017 Vol 1 No 1 (2017): Januari 2017 More Issue