cover
Contact Name
Mira Maisura
Contact Email
jurnal.cyberspace@ar-raniry.ac.id
Phone
-
Journal Mail Official
jurnal.cyberspace@ar-raniry.ac.id
Editorial Address
Information Technology Education (PTI) Department administration office, Faculty of Education and Teacher Training (FTK) Building B 1st Floor, Ar-Raniry State Islamic University, Darussalam, Banda Aceh, 23111.
Location
Kota banda aceh,
Aceh
INDONESIA
Cyberspace: Jurnal Pendidikan Teknologi Informasi
ISSN : 25982079     EISSN : 25979671     DOI : -
Core Subject : Science, Education,
Cyberspace: Jurnal Pendidikan Teknologi Informasi is an open access, peer-reviewed journal that will consider any original scientific article that expands the field of information technology education and various other related applied computer sciences themes. The journal publishes articles of interest to Information technology teachers, researchers and practitioners. Manuscripts must be original and educationally interesting to the audience in the field. The goal is to promote concepts and ideas developed in this area of study by publishing relevant peer-reviewed scientific information and discussion. This will help information technology practitioners to advance their knowledge for greater benefit and output in their professional contexts.
Articles 157 Documents
COMPUTER HARDWARE RECOGNITION APPLICATION WITH AUGMENTED REALITY TECHNOLOGY Repiliya Repiliya; Zaid Romegar Mair
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (651.861 KB) | DOI: 10.22373/cj.v5i1.7865

Abstract

In the highly development of technology, thus encouraged to human activity facilitation. One of them was education that required technology in applying the learning system to be effective and flexible. Augmented Reality (AR) was a concept of combining virtual and work reality. Augmented Reality could provide advantages in the interaction between humans and computers, it could be a solution in applying teaching and learning process application in computer majors education, it would be interactive by using 3D.In the 3D object was generated into the the real image so visualization was looked like the original object. The strengthness of this application that the object could rotated so it was looked clearly from any side. This application gave many benefits for the users to know and use the hardware computer in clearly and understandable.
THE EFFECTIVENESS OF E-LEARNING APPLICATION BASED ON FRAMEWORK CODEIGNITER IN THE COVID19 PANDEMIC PERIOD (CASE STUDY STAIN TEUNGKU DIRUNDENG MEULABOH) Mukhlizar Mukhlizar; Hijrah Hijrah; Herman Herman
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (911.089 KB) | DOI: 10.22373/cj.v4i2.7820

Abstract

The rapid development of the covid-19 virus requires learning and teaching to be carried out online or remotely, the online learning process is carried out to break the chain of spreading the covid-19 virus. In the application of online learning STAIN Tengku Dirundeng Meulaboh uses an e-learning application developed with a codeigniter framework. The use of the existing MVC method in the Codeigniter framework can facilitate the development of e-learning applications that must adapt to user needs, therefore a study was conducted to determine the effectiveness of STAIN Tengku Dirundeng Meulaboh e-learning users during the Covid-19 pandemic. Measuring the effectiveness of this is done through a questionnaire by asking several questions to measure user satisfaction based on the End User Computing Satisfaction (EUCS) method. Based on the research results, it was found that 94% of e-learning users were greatly helped in the learning process and the level of user satisfaction was 85%.
IMPLEMENTATION OF GENERIC ROUTING ENCAPSULATION USING CISCO PACKTER TRACER Muhammad Kahfi Aulia; Djuniadi Djuniadi
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.484 KB) | DOI: 10.22373/cj.v5i1.8563

Abstract

Virtual Private Network (VPN) is a technology that offers low-cost remote access solutions for companies. The IPSec protocol provides cryptography services and network security for data transmission. Generic Routing Encapsulation (GRE) tunnel exists to encapsulate multicast and broadcast packets into unicast packets. This is very usable which IPSec does not support encryption of multicast and broadcast packets. The target of this simulation is that Router 1 shows that the network is protected by GRE. The first thing to do is set the network topology. Here, for example, there are two offices that want to transmit data to each other. Each of these offices has a switch, FTP server, DNS server, router, and PC. Then set the IP address of each device and connect it with cables. Router 2 and Router 3 function to connect the two offices in one WAN network. Each of these data transmissions is IPSec protected for data encryption protection then GRE coated for transmission encapsulation. From simulation results, we can conclude that both network can be connected and communicated each other with protection from GRE tunnel.
HYPERTEXT BASED INTERACTIVE MEDIA ANALYSIS IN GROWING STUDENT READING INTEREST THROUGH ONLINE LEARNING Aqidatul Izza; Munawir Munawir
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (643.672 KB) | DOI: 10.22373/cj.v5i1.8793

Abstract

This study discusses the analysis of hypertext-based interactive media in fostering student interest in reading through online learning. The purpose of this study was to determine the use and effectiveness of hypertext-based interactive media use in fostering student reading interest through online learning and the impact of hypertext-based interactive media on students' reading interest through online learning conducted at MTsN 1 Sidoarjo. This study uses a descriptive research method with a qualitative approach. Data collection using, observation, questionnaires, interviews and documentation. The results showed that: 1) The results of the observations proved that students had good enthusiasm. In this learning, Islamic education teachers use interactive media in the form of power points; 2) PAI teachers make various efforts to foster students' reading interest when learning online, one of which is trying to get used to the small things that are applied to students by utilizing the media; 3) From the results of a questionnaire which shows that students' reading interest has increased even though gradually. This can be seen from the aspects of preference, interest, attention and involvement. Keywords: Interactive Media, Hypertext, Reading Interest
REPORTING THE LOCATION OF WASTE COLLECTION IN ANDROID BASES SYSTEM IN BANDA ACEH CITY Sarini Vita Dewi; Riky Yahdin
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 4, No 2 (2020)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (576.38 KB) | DOI: 10.22373/cj.v4i2.7853

Abstract

Trash is a common problem in almost every city in Indonesia, including in Banda Aceh, although not as much as in other cities in the country. The trash's pile is increasing day by day resulting delays in handling by the management. Over time the piles of trash will accumulate and cause another problems, such as strong odors, disease spread, traffic disruption, and flooding. To overcome it, cooperation between the Sanitation Service and the community is needed, therefore an application is made that can be a way for sharing information about the location of trash piles for sanitation officers and related parties. So that later each user can find out exactly where the trash pile is located. This application system is built on a mobile basis for the client side, users use an Android-based on Smartphone or Tablet Computer. This application connects users to the server side by sending location data of coordinate points to be responded by the server by mapping the user's location on the Google Map with the Google Map API.
COMPARISON OF SUPPORT VECTOR MACHINE AND DECISION TREE METHODS IN THE CLASSIFICATION OF BREAST CANCER Helmi Imaduddin; Brian Aditya Hermansyah; Frischa Aura Salsabilla B
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 1 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (628.898 KB) | DOI: 10.22373/cj.v5i1.8805

Abstract

One of the most dangerous cancers in the world is breast cancer. This cancer occurs in many women, in some cases this cancer can also affect men, but it is very rare. The effects of this cancer are very dangerous for humans, in the worst case it can lead to death. So that serious prevention is needed against this cancer. One prevention can be done by early detection. This study aims to implement machine learning methods to detect breast cancer in women. The algorithms used are Support Vector Machine (SVM) and Decision Tree (DT). After classifying the data provided, a comparison is made to find out which machine learning method has the best performance. The data used comes from the Gynecology Department of the University Hospital Center of Coimbra (CHUC), and can be downloaded for free on the UCI repository website. The results of this study indicate that the SVM algorithm with feature selection obtains the best classification results by obtaining an accuracy of 87.5%, a sensitivity of 90%, and a specificity of 85%. Thus this research obtains good results to be able to help provide solutions to detect breast cancer.
IMPLEMENTING DIGITAL SIGNATURE WITH RSA AND MD5 IN SECURING E-INVOICE DOCUMENT Nurul Zaatsiyah; Djuniadi Djuniadi
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 2 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (960.717 KB) | DOI: 10.22373/cj.v5i2.10359

Abstract

Digitalisasi proses bisnis pada organisasi sudah banyak diterapkan pada era society 5.0 ini. Salah satunya yaitu digunakan pada pembuatan dokumen faktur elektronik atau disebut dengan e-invoice. Kegiatan dalam organisasi tidak terlepas dari proses transaksi yang merupakan proses bisnis utama. Oleh karena itu, pentingnya menjaga keaslian data invoice agar tidak terjadi perubahan nilai yang beresiko pada pemalsuan data invoice. Salah satu system kriptografi yang dapat memberikan layanan keamanan data berupa integrasi dan autentikasi data yang dapat mendeteksi keaslian data yaitu tanda tangan digital atau digital signature. Penelitian ini membangun digital signature dengan menerapkan fungsi hashing Message Digest 5 (MD5) dan algoritma asimetris Rivest Shamir Adleman (RSA). Simulasi penerapan digital signature pada dokumen e-invoice dilakukan dengan menggunakan software open-source kriptografi yaitu CrypTool versi 2.1. Desain simulasi sistem digital signature yaitu melalui proses hash menggunakan algoritma MD5, proses pembangkitan kunci menggunakan algoritma RSA, proses enkripsi dan dekripsi. Hasil simulasi digital signature yang dilakukan dengan menggunakan dokumen e-invoice menunjukkan hasil bahwa hasil hash dokumen MD5 dan dekripsi chipertext RSA memiliki nilai yang sama. Hal itu diartikan bahwa dokumen tersebut merupakan dokumen asli dan belum terjadi perubahan data di dalamnya.
FACTORS OF KNOWLEDGE SHARING BETWEEN STUDENTS FACULTY OF EDUCATION AND TEACHER TRAINING UIN AR-RANIRY BANDA ACEH Khairan AR; Misa Rahma Yanti; Nazaruddin Ahmad
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 2 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (540.98 KB) | DOI: 10.22373/cj.v5i2.9525

Abstract

Penelitian ini bertujuan untuk mengetahui faktor-faktor apa saja yang dapat meningkatkan kemampuan knowledge sharing dan melihat bagaimana pengaruh knowledge sharing antar mahasiswa. Subjek penelitian yang dipilih adalah mahasiswa Fakultas Tarbiyah dan Keguruan angakatan tahun 2016 UIN Ar-Raniry Banda Aceh yang berjumlah 300 orang. Teknik pengumpulan data dengan membagikan kuesioner online dengan media google form. Sementara itu, data dianalisis secara deskriptif kuantitatif  yang menggunakan teknik analisis Partial Least Square (PLS) melalui software Smart-PLS. Hasil pada penelitian ini menunjukkan 3 faktor yang meningkatkan kemampuan knowledge sharing dengan persentase 43.65%, 43.38% dan 40.82% berturut-turut merupakan  faktor organisasi, faktor budaya, dan faktor teknologi. Hasil penelitian ini juga menunjukkan analisis koefisien determinasi PLS sebesar 44.1% yang dapat disimpulkan bahwa budaya, reward, sikap, senang membantu, kaidah timbal balik dan teknologi mempengaruhi kemampuan knowledge sharing mahasiswa Fakultas Tarbiyah dan Keguruan UIN Ar-Raniry.
THE EFFECT OF MOTIVATIONAL FACTORS ON USAGE OF PIRATED SOFTWARE AMONG LECTURERS Basrul Abdul Majid; Hazrullah Hazrullah; Yulia Maulida
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 2 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.281 KB) | DOI: 10.22373/cj.v5i2.9527

Abstract

This study aims to determine the influence of motivational factors in using pirate software among lecturers in one of the faculty of education and teacher training in Aceh. The research method that was applied in this study is a quantitative method and it uses simple random sampling for collecting data. It was obtained by distributing the instrument to lecturers with the number of samples determined using the Slovin formula is 68 respondents. After passing the validity and reliability testing phase, data is analyzed by using Pearson Product Moment Correlation. The result explained that there was a significant influence between motivational factors and using pirated software. The final result of the correlation test for two variables with a coefficient value of 0.876 and a significant level of 0.000 with a very good level of relationship category. 
APPLICATION DESIGN DETERMINING STUDENT ACHIEVEMENT SUPPORT FACTORS WITH THE TAU KENDALL METHOD BASED ON QUADRANT INSTITUTE LITERATURE Hijrah Hijrah; Rahmat Musfikar
CYBERSPACE: Jurnal Pendidikan Teknologi Informasi Vol 5, No 2 (2021)
Publisher : UIN Ar-Raniry

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (639.182 KB) | DOI: 10.22373/cj.v5i2.9750

Abstract

There are many factors that can affect student achievement, both internal and external factors. To find out what factors can affect student achievement, each data factor that can affect student achievement is tested for correlation with the Kendall Tau method so that the strength and relationship between student achievement and the supporting factors can be measured the relationship between the two variables. In this study, the correlation test of student supporting factors was carried out based on data obtained from the Quadrant Institute for further implementation into software or applications that can be used by students, parents and also the qudrant institute in improving student achievement and by developing these applications. then all information needs related to improving student learning can be done by simply accessing the application that has been designed.Keywords : Student Achievement Factors, Correlation, Kendal tau, Applications Supporting Student Achievement

Page 6 of 16 | Total Record : 157