Jurnal Informatika Universitas Pamulang
Jurnal Informatika Universitas Pamulang is a periodical scientific journal that contains research results in the field of computer science from all aspects of theory, practice and application. Papers can be in the form of technical papers or surveys of recent developments research (state-of-the-art). Topics cover the following areas (but are not limited to): Artificial Intelligence Big Data Business Intelligence Data mining Decision Support Systems Intelligent Systems Machine Learning Network and Computer Security Optimization Pattern Recognition Soft Computing Software Engineering
Articles
625 Documents
Aplikasi Inventarisasi Aset Berbasis Web Dengan Metode Waterfall
Pinem, Sanjaya;
Pakpahan, Victor Maruli
Jurnal Informatika Universitas Pamulang Vol 5, No 2 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (416.393 KB)
|
DOI: 10.32493/informatika.v5i2.5668
Asset inventory management in SMP Negeri 3 Tanah Jawa, Simalungun Regency, still uses the Microsoft Excel application and manual recording. This causes the data collection to be complicated or difficult to manage because the recording is only done on paper and stored in a file cabinet so it is very difficult to see and report data that has been long. As a result, reporting of goods entering and leaving goods occurs an error and is late. This problem was overcome by designing web-based applications. Applications are built using the waterfall method, starting with data collection through observation and interviews, analyzing system requirements to be evaluated based on system testing. Through this application, the process of recording and reporting asset variation can be accessed easily and in an organized manner.
Pengujian Black Box pada Perangkat Lunak Sistem Penilaian Mahasiswa Menggunakan Teknik Boundary Value Analysis
Debiyanti, Debiyanti;
Sutrisna, Sutrisna;
Budrio, Budrio;
Kamal, Alvin Kurnia;
Yulianti, Yulianti
Jurnal Informatika Universitas Pamulang Vol 5, No 2 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (204.671 KB)
|
DOI: 10.32493/informatika.v5i2.5446
With this student assessment application, if there is an error in the program, there will be losses for students and universities. The loss that is in the natural student, if this application has an error (trouble) then the student assessment process will be delayed and difficult in the calculation of the value of students and students will be late in obtaining the value. The losses are in the natural universities where students want a quick assessment process but the university cannot calculate quickly and precisely. Method used in this application use black box method with boundary value analysis technique. The boundary value analysis technique measures application's assessment if there is an error when entering data that will be tested in the field to determine the value has been valid or no more errors will be stored in the database. The test is done on the Student assessment form by measuring the upper limit value and lower limit value through several predefined stages for each of the columns in the form. Test results can be input to improve the application. The results of this test can provide reference to the quality testing of the student assessment application by analyzing the functionality of the programs that have been made in accordance with the results expected
Pengujian Black Box pada Aplikasi Penghitungan Parkir Swalayan ADA Menggunakan Teknik Equivalence Partitions
Nugraha, Bangkit Fajar;
Aditama, Fahmi;
Arrofi, Muhammad;
Ahmad, Solakhul Umam;
Yulianti, Yulianti
Jurnal Informatika Universitas Pamulang Vol 5, No 2 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (173.554 KB)
|
DOI: 10.32493/informatika.v5i2.5350
To ensure that the application (software) Calculation of parking is no error then in need of testing to test the quality of the application. This application has problems with the calculation of the parking in the application, then the application will be tested by the Black Box method based on Equivalence where the application in the overall test is related to the use, benefit, and result of the utilization of such software. The parking application must be error-free, because if there is an error then it will be very detrimental to the self-service that use the parking application, specifically in terms of financial income. The Black Box-based method of Equivalence Partition tests the quality of the application by documenting the software testing which will look at the error in each form, and the errors will be divided into three models, errors, functions, data structures and interfaces. The results of this test, to ensure the quality of the free parking calculation application error by finding an accidental error in the parking calculation application.
Arsitektur Keamanan Siber Dengan Protokol Denning-Sacco
Rama Dian Syah
Jurnal Informatika Universitas Pamulang Vol 5, No 2 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (157.1 KB)
|
DOI: 10.32493/informatika.v5i2.5675
Currently messages can be transmitted using information and communication technology. The message that is transmitted can contain data and information that is privacy or confidential. Messages that are confidential and privacy are only intended for parties that have been determined. Attacks by unauthorized parties may occur during the process of sending the message. Security in a private or confidential message exchange system is very much needed. The message exchange system is regulated by protocol to avoid certain party attacks. The method used in this research is the Denning-Sacco Protocol which is implemented in the exchange of messages from the sender to the recipient. This protocol uses a security key generated by the Key Distribution Center (KDC). The Denning-Sacco Protocol was developed from the Needham-Schroeder Protocol. This study produces an overview of the architecture of the Denning-Sacco Protocol to overcome the weaknesses of the Needham-Schroeder Protocol called the relpy attack. The steps of exchanging messages using the Denning-Sacco Protocol are explained in detail.
Coronavirus Disease (COVID-19): Reviews, Applications, and Current Status
Tanweer Alam;
Shamimul Qamar
Jurnal Informatika Universitas Pamulang Vol 5, No 3 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32493/informatika.v5i3.6563
Presently, the COVID‐19 has directly affected the lives of millions of people. COVID-19 disease symptoms are involving fever, malaise, chest infection, and breathing difficulties, were recognized. The existence of these symptoms is continuously becoming recognized. World Health Organization (WHO) had mentioned the wide diagnostics test besides COVID-19 that would also assist medical facilities to recognize infectious diseases as well as currently focusing efficiently on preventing and afterward defeating these kinds of viral diseases. Infections are usually transmitted among human beings in direct contact, greatest through the liquid bubbles generated through speaking coughing or sneezing. Throughout this paper, the authors review the COVID 19 pandemic, its history, current updates, contact tracing applications, and use of emerging technologies like the Internet of Things (IoT) and Blockchain for stopping the spreading. These emerging technologies provide services online to the patient from a long distance in real-time.
The Implementation of Weighted Products in the Support System of Scholarship Acceptance Decisions at the MA AL-Falahiyah AL-Asytari
Ri Sabti Septarini;
Rohmat Taufiq;
Saiman Al Fattah
Jurnal Informatika Universitas Pamulang Vol 5, No 4 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32493/informatika.v5i4.6243
Scholarships are a form of appreciation given to individuals in order to continue their education to a higher level. The scholarship program held to ease the burden on students in pursuing a period of study. Especially in matters of cost. MA Al-Falahiyah Al-Asytari organizes a scholarship program for students based on criteria determined by the school. The need for a scholarship naming decision system is one of the core needs so that the selection of scholarship acceptance is more objective and practical. Development of a Decision Support System (DSS) using the Weighted Product model chosen because it was able to select the best alternatives from several alternatives and their advantages in weighting techniques. In designing the system using Unified Modeling Language (UML) and making applications using PHP and MySQL as a database. From the research the authors have described, it concluded that the weight product method could use as one method in developing a decision support system for scholarship recipients at the MA Al-Falahiyah Al-Asytari, by inputting data from students who submit scholarships to calculating grades based on criteria which specified.
Penerapan Payment Gateway pada Aplikasi Marketplace Waroeng Mahasiswa Menggunakan Midtrans
Al Fian;
Petrus Sokibi;
Lena Magdalena
Jurnal Informatika Universitas Pamulang Vol 5, No 3 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32493/informatika.v5i3.6719
Catur Insan Cendekia University is one of the universities in Cirebon City which is based on technology and management. As an educational institution that has a technopreneur campus slogan, many Catur Insan Cendekia University students have implemented entrepreneurship courses and have developed into new entrepreneurial owners scattered on various social media. However, due to limited space and marketing reach in the campus area, many academicians do not see the product / service offerings made by Catur Insan Cendekia University students. So a work program called Waroeng Mahasiswa was launched by BKM CIC with the aim of being a space for students to market their products / services in the Catur Insan Cendekia University campus area. The Waroeng Mahasiswa work program will be developed into a web-based marketplace application made using the PHP programming language. This marketplace application will also be equipped with an online payment system that is integrated with Midtrans as a payment gateway service provider to make the transaction process faster, easier and more practical.
Implementasi Elearning Efront Mendukung Sistem Perkuliahan Online Berbasis Web di Kampus STMIK Jakarta STI&K
Munich Heindari Ekasari;
Eko Tri Asmoro
Jurnal Informatika Universitas Pamulang Vol 5, No 4 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32493/informatika.v5i4.7930
STMIK Jakarta STI&K is a computer campus in Indonesia. This campus has not optimally used online learning media. Electronic lecture is an online lecture medium, which allows students and lecturers to carry out lecture activities without having to meet physically. The current pandemic period requires academic activities to be carried out online. This electronic lecture media is widely available to be adopted to build an online lecture system in an institution. E-Learning Efront is an example of a system that can be used. Research on the inline lecture system can produce a system tailored to the needs applied at the STMIK Jakarta STI&K campus. The electronic lecture system using eFront can be changed according to user needs. To get good results from system development requires a good development stage according to the existing method. Development starts from planning until a good system implementation. One of the steps that can be done is to hold training and trials to measure the ability and understanding of system users. The evaluation stage is carried out by measuring and analyzing users interacting with the system. The e-learning implementation plan begins with the first preparation, then the resources are ready and the services and system infrastructure are available. Based on the results of the evaluation, decisions can be made regarding the application of e-learning at the STMIK Jakarta STI&K campus. The results of the implementation that have been carried out, it is found that the online lecture system is needed as an alternative in the use of information technology in the process of academic activities.
Pendeteksi Gerakan Menggunakan Sensor PIR untuk Sistem Keamanan di Ruang Kamar Berbasis SMS
Ruuhwan Ruuhwan;
Randi Rizal;
Rizal Kurniawan
Jurnal Informatika Universitas Pamulang Vol 5, No 3 (2020): JURNAL INFORMATIKA UNIVERSITAS PAMULANG
Publisher : Teknik Informatika Universitas Pamulang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.32493/informatika.v5i3.5706
Room safety is very important considering that the crime scene is very disturbing to the public, one of which is the usual theft case. This might be caused partly because of economic factors that cause people to sometimes take shortcuts to make ends meet by stealing. So the PIR sensor sensor tool was made to detect human movements making it easier for us to control security when leaving a room empty, the media used is Mobile, by utilizing SMS facilities. The purpose of this research is the implementation of the PIR sensor as a detector of human motion in a room based on sms. This tool consists of a sensor that is a pir sensor as a detector of human motion around, and the bazzer will sound every time there is a movement that is captured by a pir sensor, a GPRS Shield which has a sim card inside that works to send SMS. This type of research used is qualitative research with experimental methods, namely by conducting a cona test (trial and error) for mechanical and electronic design components of the hadware and trying to explain. From this research produced information provider using two KC7738 PIR-based SMS sensors can be applied by the public so that they can provide information when leaving a room empty.