cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pekanbaru,
Riau
INDONESIA
IT JOURNAL RESEARCH AND DEVELOPMENT
Published by Universitas Islam Riau
ISSN : 25284061     EISSN : 25284053     DOI : -
Information Technology Journal Research and Development (ITJRD) adalah Jurnal Ilmiah yang dibangun oleh Prodi Teknik Informatika, Universitas Islam Riau untuk memberikan sarana bagi para akademisi dan peneliti untuk mempublikasikan tulisan dan karya ilmiah di Bidang Teknologi Informatika. Adapun ruang lingkup dalam jurnal ini meliputi bidang penelitian di teknik informatika, ilmu komputer, jaringan komputer, sistem informasi, desain grafis, pengelolaan citra dan multimedia.
Arjuna Subject : -
Articles 212 Documents
Analisis Pola Penjualan Barang Teknologi Informasi (TI) Menggunakan Algoritma FP-Growth Rizky Wandri; Anggi Hanafiah
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8155

Abstract

Determination of sales patterns is very important in marketing. Sales pattern serves to conduct an effective analysis in improving marketing. Sales analysis aims to explore new knowledge that can help design effective strategies by utilizing sales transaction data. This study processes sales data for 12 transaction days containing 47 items using the Fp-Growth algorithm. The results of this study are items with a minimum value of support > 0.10 and confidence 0.60 and will be compared with testing data using RapidMiner to test whether the results are valid so that the test results can help in designing sales strategies.
Fuzzy-Based Screening System for Determination of Enhanced Oil Recovery (EOR) Method in Reservoir Nesi Syafitri; Tomi Erfando; Widya Lestari; Niken Karina Rinaldi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8640

Abstract

The petroleum industry is developing technology to increase oil recovery in reservoirs. One of the technologies used is Enhanced Oil Recovery (EOR). Selecting an EOR method for a specific reservoir condition is one of the most challenging tasks for a reservoir engineer. This study tries to build a fuzzy logic-based screening system to determine the EOR method. It created the system intending to be able to assist in selecting and determining the appropriate EOR method used in the field. There are nine input criteria used to screen the EOR criteria, namely: API Gravity, Oil Saturation, Formation Type, Net Thickness, Viscosity, Permeability, Temperature, Porosity, Depth criteria. The output criteria generated from the calculation of the EOR screening criteria are 14 outputs, namely: CO2 MF Miscible Flooding, CO2 IMMF Immiscible Flooding, HC MF Miscible Flooding, HC IMMF Immiscible Flooding, N2 MF Miscible Flooding, N2 IMMF Immiscible Flooding, WAG MF Miscible Flooding , HC+WAG IMMF Immiscible Flooding, Polymer, ASP, Combustion, Steam, Hot Water, Microbial. In this system, 512 rules are generated to produce 14 different outputs of the EOR method, with Mamdani's Fuzzy Inference reasoning. This fuzzy-based screening system has an accuracy rate of 80.95%, so this system is suitable to be used to assist reservoir engineers in determining the appropriate EOR method to be used according to the conditions in the reservoir. The sensitivity level of the system only reaches 53.1%, while the specificity level reaches 94%.
Analysis Performance Intrusion Detection System in Detecting Cyber-Attack on Apache Web Server Doddy Teguh Yuwono
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7853

Abstract

Network security on the webserver is the most important part to ensure integrity and service for users. Web servers are often the target of attacks that result in data corruption. One of them is the SYN Flood attack, which is a type of Denial of Service (DOS) attack that provides massive SYN requests to the webserver. This research is to analyze attack indications and maintain system security from the threat of data flooding. One way to maintain a computer network security system is to use Snort as an IDS (Intrusion Detection System). Snort is software that functions to detect intrusions. Data packets passing through network traffic will be analyzed first. Data packets detected as intrusions will trigger an alert which is then stored in a log file. That way, network administrators can find out intrusions that occur on computer networks. The method of testing flood attack data is using the penetration testing method. The three test samples are data flooding attacks against ICMP, UDP, and TCP protocols. The results obtained when testing flooding attack data where detection sensors can detect all attacks and all attack samples, while the warnings generated by Snort are shown in a web form which can be seen in the detail of each attack that occurred.
Optimization of Genetic Algorithm in Courses Scheduling Dewi Nasien; Andi Andi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7896

Abstract

Scheduling courses is an intricate and pivotal part of a university as it impacts the teaching and learning process. The problem frequently occurs is the struggle of placing schedules which is manual, takes a long time, and inaccurate. This paper explores the process and how effective the genetic algorithm method is in solving scheduling problems in lecture environment. The selection of genetic algorithms owes to it produces an optimal scheduling solution. To build a scheduling optimization system, it is essential to collect room data, lecturers, courses, days and hours of teaching. The data collection comes from field studies by observations and interviews. Literature studies are also needed to acquire the basic course scheduling, optimization, genetic algorithms, PHP, MySQL, Bootstrap, and Visual Studio Code. The test outcomes attained the preeminent one with the highest fitness value in the number of generations, populations, the crossover combination and mutation rates. The final result showed that the first chromosome is the finest chromosome produces scheduling with the highest fitness value. The outcomes of the whole algorithm process are consistent with the original predicted data, and the same lecturer is not scheduled to teach more than once at the same time. It is expected that the application of the genetic algorithm method optimizes course scheduling with great outcome.
Evaluasi Kepuasan Pengguna Terhadap Kualitas Layanan Sistem Pengembangan Daerah (Simbangda) Kabupaten Banyuasin Menggunakan Metode Electronic Government Quality Ragil Tri Wahyudi; Gusmelia Testiana
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8198

Abstract

Sistem Pengembangan Daerah (Simbangda) Kabupaten Banyuasin is a public service as a forum for data and information from all Regional Government Organizations in the Banyuasin Regency environment to realize program Banyuasin Terbuka. A public service must be evaluated periodically to optimize the services provided. This study aims to evaluate user satisfaction with Simbangda's service quality using Electronic Government Quality (E-GovQual) method. The results showed that there were 5 variables in the level of satisfaction and 1 variable in the level of less satisfied. The variable ease of use averaged 2.80 in the satisfied category, trust with an average 2.75 in the satisfied category, functionality of the interaction environment with an average of 2.61 in the satisfied category, reliability with an average of 2.53 in the satisfied category, content and appearance with an average of 2.49 in the less satisfied category, and citizen support with an average of 2.99 in the satisfied category.
Pekanbaru City Snack E-Commerce Application Design Based on Android Panji Rachmat Setiawan; Ardiansyah Ardiansyah
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8669

Abstract

E-Commerce is a concept that quite developed in the field of information technology. E-Commerce gives more convenience and advantages when compared with conventional, including all the information needed by cunsomers can be accessed more detail, without being limited with place and time, and transactions process can be done much easier. So that the implementation of this system will make it easier and more profitable for many parties, both consumers and sellers. This development method in building E-Commerce application is based on the theory of the Waterfall Model. Waterfall is a software development methodology, which proposes an approach to systematic and sequential software which starts at the system progress level throughout the analysis, design, code, testing and maintenance. The purpose of this research is to produce Pekanbaru city snack E-Commerce application based on android. By implementing this system will make it easier and more profitable for many parties, both consumers and sellers.
Digital Forensic Investigation for Non-Volatile Memory Architecture by Hybrid Evaluation Based on ISO/IEC 27037:2012 and NIST SP800-86 Framework Rizdqi Akbar Ramadhan; Panji Rachmat Setiawan; Dedy Hariyadi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8968

Abstract

In the implementation of Digital Forensics, one of the derivatives of practice is the handling of Digital Evidence. Handling Digital Evidence requires important steps and procedures. Digital evidence is a source of artifacts in handling a digital-based crime case, one of which comes from digital storage. In this research, the author will design a framework for Digital Forensic investigations by simulating digital evidence in the form of a non-volatile architecture. The reference commonly used by researchers in previous articles is the National Institute of Justice (NIST). The framework is a reference and steps in the practice of acquiring digital evidence. The purpose of designing this framework is as a legal procedure that is specifically implemented in the practice of acquiring non-volatile digital evidence. In the design, the author conducted a literature study on the NIST SP 800-86 and ISO 27037:2012 standards and then combined them in a hybrid terminology. The output of this research is to combine the two standards to become framework as reference for handling and investigating Digital Forensic science.
Schedule Implementing the Modified Euclidean Distance Method in the Course Planning of the USN Kolaka Information Systems Curriculum Sutoyo, Muh Nurtanzis; Sumpala Mangkona, Andi Tenri
IT Journal Research and Development Vol. 7 No. 1 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7976

Abstract

Scheduling is needed to anticipate the clash of lecture hours for lecturers in teaching. Some things that need to be considered when arranging a lecture schedule are lecturers, rooms, courses, hours, and days. In this study, the scheduling system uses the Euclidean Distance method by modifying the algorithm. The aim of this study is to prove the Euclidean distance method in the course planning system in universities. In general, to obtain data that will be used in the scheduling system, observations, interviews and bibliographic studies are carried out. From the research results, the lecture scheduling system using the Euclidean Distance method can be used in the scheduling system, especially lecture scheduling. This is proven, that the lecture scheduling system using the Euclidean Distance method does not have a schedule for lecturers who teach more than one course at the same time (collide).
Analysis of The Quality of The Population And Civil Registration Service System In Ogan Ilir Regency Using Importance Performance Analysis Method (IPA) Alfiatussyuaidah, Siti; Putra, M. Soekarno
IT Journal Research and Development Vol. 7 No. 1 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7985

Abstract

To determine the quality of the Population Administration and Civil Registration Service website in Ogan Ilir Regency and to determine the level of user satisfaction in this study, the Importance Performance Analysis (IPA) method with a descriptive quantitative approach was used. The variable dimension for the questionnaire used is the E-GovQual (E-Government Quality) method which consists of 5 variables, namely ease of use, trust, reliability, content and appreance of information system, and citizen support distributed to 99 respondents. The IPA method itself has 3 stages of analysis, namely GAP analysis, conformity analysis, and Cartesian diagrams then the data is processed using IBM SPSS version 25. The results of this study indicate that the main priority in improvement is indicators no. 3 and 11. With gap analysis, 17 negative indicators are obtained. and 5 positive indicators which means that almost all attributes have not met user expectations. While the average value of the level of conformity is 97%, which means users are not satisfied with the performance of Admindukcapil services because the value of the level of conformity is <100%. Analysis, Service Quality, Importance Performance Analysis, E-Govqual.
Implementation of the Winnowing Algorithm in Detecting Plagiarism in Title and Abstract of Student's Final Project Nasien, Dewi; Putra Yansen, Eka
IT Journal Research and Development Vol. 7 No. 1 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7897

Abstract

In this modern era, technology has become more sophisticated. All information can be accessed quickly and efficiently. Nevertheless, when surfing the internet to search for information, people frequently find it almost similar and even have no different. Moreover, to news information content on the internet, similarities are found in final semester student research titles and abstracts as well. In preventing this, the researchers explored how to establish a website design by checking the similarity of titles and abstracts with winnowing method, which is exacted to complete examining the similarity of titles and abstracts on students' final assignments. The researchers applied dummy data obtained from Google Scholar for this study. The results revealed that the application of the winnowing method can aid in achieving similar results from the student's final assignments. It is deliberated as a benchmark for accepting a title and abstract at a university and reducing plagiarism.