cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING
Published by Universitas Medan Area
ISSN : 25496247     EISSN : 25496255     DOI : -
JURNAL TEKNIK INFORMATIKA, JITE (Journal of Informatics and Telecommunication Engineering) is a journal that contains articles / publications and research results of scientific work related to the field of science of Informatics Engineering such as Software Engineering, Database, Data Mining, Network, Telecommunication and Artificial Intelligence which published and managed by the Faculty of Informatics Engineering at the University of Medan Area .
Arjuna Subject : -
Articles 436 Documents
Security Design And Testing of Lan and Wlan Network in Mikrotik Router Using Penetration Testing Method FROM Mitm Attack Haeruddin .
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (918.694 KB) | DOI: 10.31289/jite.v4i1.3832

Abstract

The growth of device user is always increasing and the costs are not expensive. Users already have several sophisticated end user networking tools for daily use, including laptops, smartphones and tablets. For internet access users use LAN and WLAN network services in several public areas such as restaurants, schools / campuses, hotels and offices. Activities done by the users are data and banking transactions. These activities relate to crucial data such as user data including usernames, passwords, accounts, emails and other sensitive data. Mikrotik Router is a router with an affordable price and complete features for both LAN and WLAN networks so that many administrators use this device. The most common attack used on the network is Man in the Middle Attack, which is actively tapping on the user's network connection, where traffic from the user before reaching the destination or when going through a Mikrotik router will be diverted through the attacker's network without the user's knowledge so that user communication can be read. Therefore a network security system on a Mikrotik router is needed to avoid such attacks. In testing the security system that has been made, it needs the right method, one of which is penetration testing. From the results of testing using the penetration testing method, results and solutions will be obtained to maintain network security.Keywords: Penetration Testing, Man in The Middle Attack, Wireless Security, Router dan Wireless Mikrotik.
The Application of Mamdani Method for Predicting The Best Portable Computer Based on Hardware and Price Gelar Lailatul Qodar
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (467.602 KB) | DOI: 10.31289/jite.v4i1.3770

Abstract

A portable computer is a technology tool widely used among students and students. With a very helpful role as in typing needs, presentations, and math calculations. A variety of carry-on computers that many certainly make one difficult to determine a decent and good portable computer to use. In general, in the process of selecting a portable computer, there is no recognized standard to determine the recommended portable computer level. The purpose in this research is to produce predictive values that will be a reference in supporting decisions in determining a portable computer that complies with hardware component criteria and pricing. This study implemented FIS Mamdani models with the analysis stage of the formation of fuzzy sets, application of implications function, rule composition and defuzification. The result of this research is an output of predictive value based on hardware component inputs and prices that will assist the user in supporting decisions in determining the best carry-on computer and according to what they want.Keywords: Predictions, Fuzzy Inference System, Mamdani methods, portable computers, students.
Decision Support System for Selecting Doorprize Receipt Customers By Applying Promethee I Algorithm iin - Parlina; Andi Priatno
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v4i1.3963

Abstract

Door prize is a prize given by Bank Mega Syariah for free through a lottery that has the category of a permanent customer. The permanent customer is a person who saves or saves his money in a mega Islamic bank and often deals regularly. This is what triggers Bank Mega Syariah to give awards to customers so that these customers will be more motivated to save at the Mega Syariah Bank. To determine the right decision in the selection of customers who deserve to get a door prize, then this research was conducted by applying the decision support system method with Promethee's Algorithm.Keywords: Decision Support System, Promethee I, and Doorprize.
Analysis of Face Recognition Algorithm: Dlib and OpenCV Suwarno Suwarno; Kevin Kevin
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (465.619 KB) | DOI: 10.31289/jite.v4i1.3865

Abstract

In face recognition there are two commonly used open-source libraries namely Dlib and OpenCV. Analysis of facial recognition algorithms is needed as reference for software developers who want to implement facial recognition features into an application program. From Dlib algorithm to be analyzed is CNN and HoG, from OpenCV algorithm is DNN and HAAR Cascades. These four algorithms are analyzed in terms of speed and accuracy. The same image dataset will be used to test, along with some actual images to get a more general analysis of how algorithm will appear in real life scenarios. The programming language used for face recognition algorithms is Python. The image dataset will come from LFW (Labeled Faces in the Wild), and AT&T, both of which are available and ready to be downloaded from the internet. Pictures of people around the UIB (Batam International University) is used for actual images dataset. HoG algorithm is fastest in speed test (0.011 seconds / image), but the accuracy rate is lower (FRR = 27.27%, FAR = 0%). DNN algorithm is the highest in level of accuracy (FRR = 11.69%, FAR = 2.6%) but the lowest speed (0.119 seconds / picture). There is no best algorithm, each algorithm has advantages and disadvantages.Keywords: Python, Face Recognition, Analysis, Speed, Accuracy.
Attribute Selection in Naive Bayes Algorithm Using Genetic Algorithms and Bagging for Prediction of Liver Disease Dwi Yuni Utami; Elah Nurlelah; Noer Hikmah
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (294.093 KB) | DOI: 10.31289/jite.v4i1.3793

Abstract

Liver disease is an inflammatory disease of the liver and can cause the liver to be unable to function as usual and even cause death. According to WHO (World Health Organization) data, almost 1.2 million people per year, especially in Southeast Asia and Africa, have died from liver disease. The problem that usually occurs is the difficulty of recognizing liver disease early on, even when the disease has spread. This study aims to compare and evaluate Naive Bayes algorithm as a selected algorithm and Naive Bayes algorithm based on Genetic Algorithm (GA) and Bagging to find out which algorithm has a higher accuracy in predicting liver disease by processing a dataset taken from the UCI Machine Learning Repository database (GA). University of California Invene). From the results of testing by evaluating both the confusion matrix and the ROC curve, it was proven that the testing carried out by the Naive Bayes Optimization algorithm using Algortima Genetics and Bagging has a higher accuracy value than only using the Naive Bayes algorithm. The accuracy value for the Naive Bayes algorithm model is 66.66% and the accuracy value for the Naive Bayes model with attribute selection using Genetic Algorithms and Bagging is 72.02%. Based on this value, the difference in accuracy is 5.36%.Keywords: Liver Disease, Naïve Bayes, Genetic Agorithms, Bagging.
Decision Support System Recommendations of Half and Full Subsidized KPR Houses rizalul akram; Novianda Novianda; Sri Wulandari
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31289/jite.v4i1.3891

Abstract

The house is a primary need for humans because as a place to stay and carry on life. Having a house is certainly not an easy matter because it requires a very large cost for it. This large amount of capital has made the community take a short and practical path by choosing half or full subsidized housing loans. Only with a capital of 20 million housing mortgages can be placed. However, the case of the house also considers the size, area, model, size of the remaining land, and location to be crucial in the selection. At present the types of KPR houses consist of types 36, 45, and 54. All three types have subsidies from the government so that they are affordable by many communities. However, from the results of field observations many people felt that it was not appropriate to choose the type of house. Let's say someone wants a type 45 house but ends up choosing type 36 with an estimated objection to paying monthly installments, even though they are capable. And vice versa who take type 45 then object to paying the monthly installments. Based on these problems, the authors try to help the community through the bank with the application of a decision support system (SPK). With this system, people who have filled out the registration form on the system will get a recommendation for the type of house. This system was built using the simple addative weight (SAW) method.Keywords: House, KPR, Type, SPK, SAW.
Analysis Role of Digital Marketing and Self Image Improving Student Self Presentation in Batam Using Instagram Muhammad Ardiansyah
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (255.938 KB) | DOI: 10.31289/jite.v4i1.3849

Abstract

Nowadays Students often use social media as a tool to communicate and search for a lot of information, social media can also influence changes in the self-image of students shared on social media. This study aims to determine the large social media users of Instagram among students, to analyze Instagram social media as a tool used by students in self-development and self-image, to know the importance of digital marketing in shaping student self-image, analyzing the development of students' Self Presentations, knowing how large students in showing self-image using Instagram social media, knowing the importance of Self Presentation within the university. This study uses variables namely digital marketing, and Self Image as independent variables, Self Presentation as the dependent variable. The target respondents of this study were all university students in the city of Batam by using a sample of 392 students. This research concluded that self image plays a role in shaping student self-appearance because students try to look neat and attractive when uploading videos on Instagram Stories about themselves, wanting to look good in photos or videos, so users can display a good image and other Instagram users who see can give good comments as well.Keywords: Social Media, Instagram, Digital Marketing, Self Image, Self Presentation.
Algorithm Implementation Of Interest Buy Apriori Data On Consumer Retail Sales In Industry Ahmad Fachrurozi; Mufid Junaedi; Jordy Lasmana Putra; Windu Gata
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (294.699 KB) | DOI: 10.31289/jite.v4i1.3775

Abstract

This data processing has the aim to increase the company's turnover, because by being aware of how the interest in buying goods works, the company can buy products other than the main products that it buys. In increasing company revenue can be done using the Data Mining process, one of which uses a priori algorithm and association techniques. With this a priori algorithm found association technique which later can be used as a pattern of purchasing goods by consumers, this study uses a data repository of 958 data consisting of 45 transactions. From the results obtained goods with the name Paper Chain Kit 50's Christmas is a product that is often bought by consumers and it is known that the most frequent combination patterns are the Retro Spot Paper Chain Kit and the Paper Chain Kit 50's Christmas. So that with known buying patterns, the company manager can predict future market needs, and can calculate the stock of goods that must be reproduced, and goods whose stock must be reduced, and also with the results of the association the manager can manage the layout of the product to be better.Keywords: Apriori Algorithm, Sales Data, Retail.
Analysis of Technology Acceptance Model Method To Predict A Person's Interest In The Acceptance of A Technology : A Literature Review Tito Prabowo; Wing Wahyu Winarno; Sudarmawan Sudarmawan
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (210.464 KB) | DOI: 10.31289/jite.v4i1.3986

Abstract

The Technology Acceptance Model (TAM) is a model used by researchers to predict and analyse factors that influence a person's interest in a technology. The purpose of this literature review is to find out how the interests of users of an information system are investigated. This literature review is based on a thorough review of the research and a descriptive discussion based on previous studies that investigate the acceptance of an information system. Previous researchers have used good research methods and research steps, so the results of the study can also give an idea of how user interests strongly influence the usefulness and actual actions when using an information system. The results of a systematic review show that the TAM method for predicting an individual's interest in accepting an information technology relationship between constructs used is a determinant that can measure interest in user behavior and also a determinant that can predict and explain interest in user behavior.Keywords: Technology Acceptance Model, Behavior Interests, User Behavior.
Detection of Attacks on Apache2 Web Server Using Genetic Algorithm Based On Jaro Winkler Algorithm M Rizqi Maulana
JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING Vol 4, No 1 (2020): ---> EDISI JULI
Publisher : Universitas Medan Area

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (213.475 KB) | DOI: 10.31289/jite.v4i1.3873

Abstract

Web server is software that provides data services in the form of HTTP (Hypertext Transfer Protocol) requests and responses in the form of HTML documents (Hypertext Markup Language) with the aim of managing data in the form of text files, images, videos and files. But in managing large amounts of data, good security monitoring is needed so that the data stored on the web server is not easily hacked. To protect the web server from hackers need an application to detect activities that are considered suspicious or possible hacking activities. By utilizing logs from a web server that is processed using the Jaro Winkler algorithm to see hacking attempts that produce a matrix and hacking activity reports to the admin. Thus the web server admin can see suspicious activity on the web server directly.Keywords: Web Server, Jaro Winkler Algorithm.

Page 9 of 44 | Total Record : 436