JITK (Jurnal Ilmu Pengetahuan dan Komputer)
Kegiatan menonton film merupakan salah satu cara sederhana untuk menghibur diri dari rasa gundah gulana ataupun melepas rasa lelah setelah melakukan aktivitas sehari-hari. Akan tetapi, karena berbagai alasan terkadang seseorang tidak ada waktu untuk menonton film di bioskop. Dengan bantuan media internet, berbagai macam aplikasi nonton film android sangat mudah dicari. Hanya bermodalkan smartphone saja para penonton film dapat streaming berbagai macam jenis film di mana saja dan kapan saja mereka inginkan. Akan tetapi, karena banyaknya pilihan aplikasi nonton film android yang bisa digunakan, terkadang seseorang bingung memilihnya. Untuk itu, diperlukan suatu sistem pendukung keputusan yang dapat digunakan para pengguna sebagai alat bantu pengambilan keputusan untuk memilih dengan berbagai macam kriteria yang ada. Salah satu metode yang digunakan adalah metode Analytical Hierarchy Process (AHP). AHP melakukan perankingan dengan melalui penjumlahan antara vector bobot dengan matrik keputusan dengan tujuan agar hasil yang diberikan lebih baik dalam menentukan alternatif yang akan dipilih. Berdasarkan hasil penelitian yang dilakukan oleh 36 sampel responden didapatkan kriteria konten menjadi prioritas pertama pengguna untuk memilih aplikasi nonton film android dengan nilai bobot sebesar 0,224. Sedangkan Netflix menjadi alternatif dengan prioritas pertama keputusan pengguna dalam memilih aplikasi nonton film android dengan nilai bobot sebesar 0,352.
Articles
394 Documents
PEMANFAATAN APLIKASI MOBILE BERBASIS IOS DALAM MENUNJANG USAHA WEDDING ORGANIZER
Nur Ani;
Muhammad Rizky Novaldi;
Muhamad Ega;
Tio Mafaza
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1346.498 KB)
|
DOI: 10.33480/jitk.v5i2.1154
Everyone wants to make their wedding receptions a very special day and give a moment that will not be forgotten in his life, so that the preparation and planning are ripe in making a plan to Provide the required results. But such high activity and mobility are a constraint to prepare such an important event that it does not maximize what is planned. PT H2O Planner is one of the wedding organizer who currently wants to improve the quality of the service provided. By providing mobile-based applications as one of the media in offering the services provided. PlanYourDays is a mobile based application created based on the needs of PT H2O Planner, using the prototype development method in the creation of this application. So that the application is produced according to the needs and desires of PT H2O Planner and can answer the problems of activity and mobility One obstacle in preparing for a wedding.
PENDEKATAN STEGO-KRIPTO MODE CIPHER BLOCK CHAINING UNTUK PENGAMANAN INFORMASI PADA CITRA DIGITAL
Vera Wati;
Hanifatus Sa’diyah;
Dony Ariyus
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1615.791 KB)
|
DOI: 10.33480/jitk.v5i2.1160
The digital image can be one of the media for information security. The contents of information have an important value of effectiveness, one of which is as a support in decision making. Then the information needs to be done to safeguard the authority of parties who are not responsible. Such security can utilize Steganography and Cryptography (Stego-Crypto). The method used combines Stego-Crypto by randomizing information using Cipher Block Chaining (CBC) then the encryption results are secured through digital images. Based on the test results by measuring the capacity of information on the image produces test data if CBC can process characters in uppercase, spaces and other characters and the results of plaintext and ciphertext produce a ratio of 1: 2, but the LSB performance only accommodates characters depending on the number of sizes on digital image. Testing by evaluating the difference in pixel histogram, when viewed with an invisible not very visible difference, but the insertion of messages with 100-200 characters causes the addition of the average image size on stego images larger than 1: 4, the value of 1 from the original image. Besides, testing with the help of communication media, stego images or encrypted images is able to use email to send stego images because LSB is sensitive to the process of resizing images
ALGORITMA KLASIFIKASI NAIVE BAYES DAN SUPPORT VECTOR MACHINE DALAM LAYANAN KOMPLAIN MAHASISWA
Hermanto Hermanto;
Ali Mustopa;
Antonius Yadi Kuntoro
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1425.875 KB)
|
DOI: 10.33480/jitk.v5i2.1181
Service in the world of education is an important element for the creation of an academic atmosphere that is conducive to the implementation of a successful teaching and learning process. The process of service to students there is a tendency to be implemented not following the minimum service standards that must be provided to students so that students tend to complain about the services provided. Submission of criticism, complaints, input, or suggestions for dissatisfaction and problems that exist in the university environment is still very limited. Complaints can be constructive if submitted to the right place and party. In this research the data processing of email complaints from students conducted at the academic student body (students.bsi.ac.id). Student complaint data that will be processed is data in the form of * .xls complaint file. Before text data is analyzed using text mining methods, the pre-processing text needs to be done including tokenizing, case folding, stopwords, and stemming. After pre-processing, the classification method is then performed in classifying each complaint category and dividing the status into two parts, namely complaint and not complaint so that the status becomes a normal condition in text mining research. The purpose of this study is to obtain the most accurate algorithm in the classification of student complaints and can find out the results of the classification of the Naïve Bayes algorithm method and Support vector Machine used and compared. In this study, the results of testing by measuring the performance of these two algorithms using Cross-Validation, Confusion Matrix, and ROC Curves. The obtained Support vector Machine algorithm has the highest accuracy value compared to Naïve Bayes. AUC value = 0.922. for the Support vector machine method using the student academic data collection dataset (students.bsi.ac.id) has 84.45%, from the Naïve Bayes algorithm has an accuracy rate of about 69.75% and AUC value = 0.679.
IMPLEMENTASI LOAD BALANCING MENGGUNAKAN METODE PCC (PER CONNECTION CLASIFIER) DI UNIVERSITAS KRISNADWIPAYANA
Imam Sujarwo;
Desmulyati Desmulyati;
Imam Budiawan
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1428.14 KB)
|
DOI: 10.33480/jitk.v5i2.1184
On the internet connection with 2 service ISP (Internet Service Provider) to consider the possibility of interruption on the internet connection. PCC (Per Connection Clasifier) is a method of load balancing in the merge 2 ISP service. Internet network connection is needed by a company or agency that performs each job with depend internet network connection. It is therefore necessary internet network are always standby when the failure occurs the internet connection. At this writing performed a system. First test done with 1 ISP service. Testing both with the use of PCC in the normal state and with the use of PCC occurs when lost connection on one of the links. By using 2 ISP services can be separated between local bandwidth and internasioan done on the second test. On testing the second can be proved that by using the 2 service ISP with load balancing PCC and much better against the service connection network the internet because there is a system that is always on standby when it happened lost connection on one of the links. With system blocks the IP automatically can protect the server mikrotik from attack heacker.
SISTEM INFORMASI MANAJEMEN ADMINISTRASI DAN KEUANGAN PADA TK-IT PERMATA HATI SUMBERREJO-BOJONEGORO
Salwa Shofia;
Dimas Aryo Anggoro
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1538.606 KB)
|
DOI: 10.33480/jitk.v5i2.1192
Administrative and financial information systems are one of the most widely applied information technologies to facilitate the management of various data into information. TK-IT Permata Hati Sumberrejo still uses manual methods to manage data student, teacher, and staff data as well as recap payment. Data processing is using Microsoft Excel, which results in time-consuming when entering data and when re-doing data correction before reported. This system was developed aiming to help data and financial management to be more effective and efficient. The information from the data entered can be conveyed properly. Therefore, it is necessary to develop a web-based administrative and financial management information system using PHP programming language with Laravel framework. This system designed using the waterfall method. Then the system will be evaluated using the Black Box and User Acceptance Test. The results of this study are an information system with various features that can be used to manage student, teacher, and staff data, as well as to manage recap payments of tuition fees, POMG, uniforms, and activities. The results of the system testing by the Principal, Treasurer, Administrative, and Admin staff can be concluded that the system is running well and meets the needs of the school.
KAJIAN METODE METODE STEGANOGRAFI PADA DOMAIN SPASIAL
Gunawan Wibisono;
Tri Waluyo;
Erik Iman Heri Ujianto
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (803.521 KB)
|
DOI: 10.33480/jitk.v5i2.1212
This paper contains a review of the spatial domain steganographic literature. The purpose of this paper is to provide knowledge about techniques or methods that exist in the spatial domain of steganography. Steganography is the science or technique for hiding secret messages in other messages so that the existence of the secret message cannot be accessed by others who do not have authority. There are several popular spatial domains of steganographic techniques, namely LSB (Least Significant Bit), which is mapping secret message bits in the rightmost bit (LSB) of each color pixel and PVD (Pixel Value Differencing) which in this method offers a larger message storage capacity , with better image quality compared to other methods in the spatial domain. Because privacy issues continue to develop along with various digital communication technologies, and increasingly strong security threats, steganography can play a role in society to maintain the confidentiality of both picture, voice and video messages. For this reason it is important for us to be aware of steganographic technology and its implications.
KOMPARASI ALGORITMA DECISION TREE, NAIVE BAYES DAN K-NEAREST NEIGHBOR UNTUK MEMPREDIKSI MAHASISWA LULUS TEPAT WAKTU
Agus Budiyantara;
Irwansyah Irwansyah;
Egi Prengki;
Pandi Ahmad Pratama;
Ninuk Wiliani
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1084.963 KB)
|
DOI: 10.33480/jitk.v5i2.1214
Private Universities (PTS) compete so tight in providing performance in producing quality graduates. In addition, the number of universities in Indonesia which counts a lot both PTN and PTS makes the higher competition between universities as well. So the university strives to improve quality and provide the best education for service recipients, namely students, where one of the problems if there are some students who are late graduating or not on time so that it becomes an obstacle to the progress of the college. Prediction of students graduating on time is needed by university management in determining preventive policies related to early prevention of Drop Out (DO) cases. This prediction aims to determine the academic factors that influence the period of study and build the best prediction model with Data Mining techniques. There are 11 attributes used for Data Mining Classification, namely NPM, Gender, Age, Department, Class, Occupation, Semester 1 Achievement Index, Semester 2 Achievement Index, Semester 3 Achievement Index, Semester 4 Achievement Index and Information as result attributes. From the results of evaluations and validations that have been carried out using the RapidMiner tools the accuracy of the Decision Tree (C4.5) method is 98.04% in the 3rd test. The accuracy of the Naïve Bayes Method is 96.00% in the 4th test. And the accuracy of the K-Nearest Neighbor Method (K-NN) of 90.00% in the second test.
PERANCANGAN NETWORK ATTACHED STORAGE (NAS) MENGGUNAKAN RASPBERRY PI UNTUK USAHA MIKRO KECIL DAN MENENGAH (UMKM)
Cosmas Eko Suharyanto;
Algifanri Maulana
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1483.471 KB)
|
DOI: 10.33480/jitk.v5i2.1215
The aim of this study is to design a network attached storage (NAS) that is easy to implement, also in terms of cost, affordable for small and medium businesses. We use Raspberry mini computers as media. Raspberry is very flexible and easy to apply for various needs, especially in the field of networking and IoT. With the Openmediavault as an Operatisng System, we success to turn external hard disks into NAS storage that can be easily configured and adapted to storage needed in an office or Small and Medium Business. Based on the evaluation results of NAS network stability with Raspberry Pi 3, showing good network stability status.
DATA MART DESIGN IN BKPP BANDUNG USING FROM ENTERPRISE MODELS TO DIMENSIONAL MODELS METHOD
Amalia Utami;
Bayu Rimba Pratama;
Septian Rheno Widianto
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1311.797 KB)
|
DOI: 10.33480/jitk.v5i2.1219
The data warehouse is a single data storage that is complete and consistent with subject-oriented, integrated, non-volatile, and time-variant characteristics that can be used to support decisions. While Data mart is a subset of a data warehouse that supports the information needs of certain departments or business process functions. Badan Kepegawaian, Pendidikan Pelatihan (BKPP) of Bandung Municipality has a history of employee mutation transactions that have not been optimally utilized so it will be very useful if the data can be made into a data mart. This data mart development method uses the From Enterprise Models to Dimensional Models method as its design method and the Bottom-Up Approach as an approach in developing a data mart. This data mart developed using the PostgreSQL database and the PHP language. The purpose of this research is to develop human resource data mart by optimizing the utilization of historical data from employee mutation transactions. The results of this research are human resources data mart that accommodates historical data on employee mutation transactions and produces information that is useful for the Top Management to support the making decision.
ANALISIS KINERJA ALGORITMA C4.5 DAN NAÏVE BAYES DALAM MEMPREDIKSI KEBERHASILAN SEKOLAH MENGHADAPI UN
Siti Fauziah;
Yeni Angraini;
Siti Fauziah;
Jordi Lasmana Putra
JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) Vol 5 No 2 (2020): JITK Issue February 2020
Publisher : LPPM Nusa Mandiri
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1174.77 KB)
|
DOI: 10.33480/jitk.v5i2.1233
The national exam (UN) is one of the determinants of student graduation, both elementary school, junior high school and even high school. There are many businesses that are carried out by schools to prepare their students to face national examinations. In fact almost all schools provide material deepening to their students for subjects tested at the national examination. Therefore, this study was conducted to determine the level of success of the school in preparing students in facing national examinations. The method used is a decision tree with C4.5 algorithm and naïve Bayes algorithm. From the results of the study, the results of the accuracy of the naïve bayes algorithm were as big as 95,50% , while accuracy using the c4.5 algorithm is equal to 78,50%. Then it can be concluded that the predictions generated from the naïve bayes algorithm are better compared to the c4.5 algorithm .