cover
Contact Name
Prajanto Wahyu Adi
Contact Email
jmasif@live.undip.ac.id
Phone
+6281222260833
Journal Mail Official
jmasif@live.undip.ac.id
Editorial Address
Ruang E305 Ged. E Lt.3 Jurusan Ilmu Komputer / Informatika Fakultas Sains dan Matematika Universitas Diponegoro Jl. Prof. Soedarto, S.H Tembalang, Semarang, 50275 Telp. 024-7474754 ext. 5001
Location
Kota semarang,
Jawa tengah
INDONESIA
Jurnal Masyarakat Informatika
Published by Universitas Diponegoro
ISSN : 20864930     EISSN : 27770648     DOI : https://doi.org/10.14710/jmasif.crossmark
Core Subject : Science,
JURNAL MASYARAKAT INFORMATIKA - JMASIF is a Journal published by the Department of Informatics, Universitas Diponegoro invites lecturers, researchers, students (Bachelor, Master, and Doctoral) as well as practitioners in the field of computer science and informatics to contribute to JMASIF in the form of research articles and review articles. We accept articles in English and Bahasa. Detailed information about the submission process can be read HERE. Authors can also download Templates at HERE. JMASIF Topics include, but are not limited to Applied Computer Science, Artificial Intelligence, Text and Natural Language Processing, Image Processing and Pattern Recognition, Computer Vision, Data Mining, Cryptography, Cybersecurity, Computer Network, Computational Theory and Mathematics, Game Technology, Human and Computer Interaction or UI/UX, Information System, Software Engineering.
Articles 205 Documents
Penerapan Algoritma Fuzzy Simple Additive Weighting untuk Pemeringkatan Kinerja Pegawai Yani Parti Astuti; Sheryn Aulia Miyanthi; Egia Rosi Subhiyakto
Jurnal Masyarakat Informatika Vol 13, No 2 (2022): JURNAL MASYARAKAT INFORMATIKA
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.13.2.49804

Abstract

PDAM Tirta Giri Nata merupakan salah satu cabang perusahaan daerah air minum yang berada di Kota Cirebon. Pengelolaan data kenaikan gaji berkala di PDAM ini dilakukan berdasarkan dari data absensi. Namun proses pengolahan dan pemilahan data menjadi sulit dikarenakan jumlah pegawai yang banyak dan masih menggunakan metode manual. Penelitian ini bertujuan untuk mendapatkan nilai akurasi sistem yang dibangun untuk memudahkan proses pengolahan dan pemilahan data pegawai yang telah memenuhi syarat. Pengelolaan data pegawai dengan menormalisasi data kemudian memasukkan nilai masing-masing kriteria menggunakan metode Fuzzy Simple Additive Weighting, sehingga muncul nilai preferensi yang dapat digunakan untuk pendataan peringkat pegawai yang telah memenuhi syarat. Terdapat beberapa kiriteria yang digunakan yakni presentase absen, kinerja pegawai, golongan, pangkat, dan status. Pegawai dengan kode A1 merupakan pegawai yang mendapatkan nilai preferensi tertinggi, yaitu berada pada angka 1. Sistem telah dibangun dengan menerapkan metode F-SAW dengan tingkat keakuratan sistem yang dibangun sebesar 93,33%.
Hash Value Security Improvement of PCS Password using Signed Binary Operation Haikal Rahmadi; Ary Bayu Nurwicaksono
Jurnal Masyarakat Informatika Vol 15, No 1 (2024): May 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.1.62545

Abstract

Convenience and security have always been inversely related requirements in data protection systems. Users want a short and simple password that is easy to remember. On the other hand, the system that is widely used in securing user data, especially passwords, is using a one-way message digest. In addition, users are also required to use complex passwords through a combination of letters, numbers, and symbols. It aims to increase security but a complex password will make it difficult for users to remember their passwords. Even though a complex password does not necessarily make it secure because it's still on a PCS which is vulnerable to hacking. Moreover, in the current development of cybersecurity science where password hacking systems are very easy to obtain and can be used by anyone to find hash value of password on PCS quickly. A preliminary test that has been carried out proves that even complex passwords can be hacked easily. This study proposes the use of a code extension system for passwords before the hashing process is carried out through two simple schemes C1 and C2 through bitwise xor and addition operators respectively. The code from the password data is mapped out of PCS by using a unique value of data. Experimental results show that the C1 scheme is able to thwart hacking attempts by 80%, while C2 is able to increase the security of alphanumeric passwords by up to 90%. The proposed method is able to make a simple but strong password system.
Non-Blind Watermarking Menggunakan Discrete dan Wavelet Transform Daurat Sinaga; Cahaya Jatmoko
Jurnal Masyarakat Informatika Vol 13, No 1 (2022): JURNAL MASYARAKAT INFORMATIKA
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.13.1.43714

Abstract

Pada zaman sekarang orang mudah untuk mengakses internet sehingga semua orang dapat memperoleh suatu karya seni digital seperti gambar dengan mudah, kemudian seseorang dapat memodifikasi dan menyebarkan kembali karya tersebut tanpa izin atau tanpa memberikan sumber originalnya. Pada masalah ini dibutuhkan upaya untuk memberikan watermark yang tidak terlihat sehingga tidak mudah untuk menghilangkan watermark gambar tersebut, menggunakan kombinasi DCT dan DWT 1 level untuk memberikan watermark secara tak terlihat pada suatu karya seni. Dari metode kombinasi DCT-DWT diperoleh dengan gambar watermark 64x64 nilai PSNR 39.1529 dB dari hasil tersebut dapat disimpulkan bahwa metode kombinasi DCT-DWT mendapatkan nilai imperceptibility yang baik. Ketahanan gambar diuji dari berbagai proses maipulasi gambar seperti noise, filter, kompresi JPG, dan lain-lain. Hasil dari manipulasi gambar mendapatkan rata-rata NCC bernilai lebih dari 0.6 sehingga dapat disimpulkan metode DCT-DWT tahan (robust) terhadap beberapa serangan citra.
Analisis Sentimen pada Ulasan Aplikasi Access by KAI Berbahasa Indonesia Menggunakan Word-Embedding dan Classical Machine Learning R. Damanhuri; Vito Ahmad Husein
Jurnal Masyarakat Informatika Vol 15, No 2 (2024): November 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.2.62383

Abstract

Indonesia has a railway application called Access by KAI, released by PT Kereta Api Indonesia (KAI). The public can download and review this application through the Google Play Store. The rating of Access by KAI has declined since 2022, indicating that the application has not met user expectations despite being updated. Reviews on the Google Play Store platform can be analyzed to extract important information, one of which is sentiment. This research conducts sentiment analysis on Access by KAI reviews using word embedding with the Word2Vec model for feature extraction and classical machine learning with Naive Bayes and Logistic Regression for classification algorithms. The Logistic Regression method outperforms Naive Bayes in terms of accuracy and precision with values of 68.83% and 75.49% respectively. However, the Naive Bayes method has an advantage in terms of recall with a value of 45.07%. In this study, reviews of Access by KAI have a predominantly negative sentiment, with 334 out of 400 test data reflecting this sentiment. The words "easy" and "like" are relevant as reasons why reviews have positive sentiment, while the words "application", "pay", and "ticket" are relevant as reasons why reviews have negative sentiment.
Kriptografi Homomorfik dalam Anonimisasi Data untuk Pengolahan Data pada Sistem E-Voting Muhammad Naufal Zhafran Soleh
Jurnal Masyarakat Informatika Vol 15, No 2 (2024): November 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.2.66317

Abstract

In today's age of technological advancement, protecting data security and privacy is a significant challenge. This study seeks to prove the effectiveness of Homomorphic Cryptography techniques, which allow data to be processed while remaining encrypted, addressing the limitations of standard encryption methods that only secure data but do not enable processing of encrypted information. The research approach involves analyzing Homomorphic Cryptography by designing an e-voting system that utilizes the Paillier algorithm, enabling the processing of vote data while it is encrypted, along with generating keys for encrypting and decrypting the votes. The results of this study indicate that implementing Homomorphic Cryptography within a web-based e-voting platform successfully facilitates data processing in an encrypted state. Additionally, security testing via a Ciphertext-only attack did not reveal any plaintext information, while performance testing recorded an encryption-decryption time of 0.010 seconds. Shannon entropy analysis also yielded a result of 3.20 bits for a single encrypted vote.
Evaluasi Usability pada Aplikasi Sistem Pencatatan Pegawai Menggunakan Metode Usability Testing dan USE Questionnaire Abraham Timotius Asmoro Putro; Adi Wibowo; Sutikno Sutikno
Jurnal Masyarakat Informatika Vol 15, No 2 (2024): November 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.2.67263

Abstract

In the era of increasingly rapid digitalization, employee recording system applications have become an unavoidable necessity for companies for the efficiency and effectiveness of human resource management. In this context, the usability or usefulness of employee management system applications is a crucial factor in ensuring that users can smoothly and efficiently utilize the system provided. Usability is an important aspect in application design that is often overlooked. The success of an application is not only determined by its features and functionality, but also by the ease of use and user satisfaction in operating it. Therefore, usability evaluation is a very necessary step to ensure that the application being developed meets user needs optimally. The usability testing method and the use of questionnaires are common approaches used in evaluating the usability of an application. In the context of the CV. Cupang Semarangan employee recording system application, this study aims to evaluate the usability of the application using the usability testing method and questionnaire. This study resulted in usability values for the aspects of effectiveness, efficiency, ease of use, ease of learning, and satisfaction being 87.96%, 77.47%, 64.88%, 71.43%, and 68.57% respectively.
Pengembangan Aplikasi Media Pembelajaran Berbasis Game Edukasi Tanaman Obat dan Herbal Madura Juwita Nurqomariah; Muhlis Tahir
Jurnal Masyarakat Informatika Vol 15, No 2 (2024): November 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.2.68165

Abstract

This study aims to develop an educational game-based learning media application that introduces medicinal plants and Madurese herbs to class X students majoring in Pharmacy at SMKS Yannas Husada Bangkalan. This application is expected to improve students' understanding of simplisia, herbs, and rhizomes in Pharmacognosy subjects, as well as foster higher interest in learning through an interactive and technology-based approach. Application development uses the Multimedia Development Life Cycle (MDLC) model which consists of six stages, namely concept, design, material collecting, assembly, testing, and distribution. The test results from media experts showed that this application reached an achievement level of 88% and was very feasible to use. Assessment from material experts also showed an achievement of 88.89%, indicating that this application is valid and suitable for use. In addition, testing conducted by class X students majoring in Pharmacy at SMKS Yannas Husada Bangkalan showed an achievement level of 93%, which also indicates that this application is very feasible to use. Based on these results, it can be concluded that this application is effective and valid to be used as a learning media.
Pengembangan Aplikasi Monitoring Informasi Proyek Berbasis Web Menggunakan Metode ICONIX Process (Studi Kasus: PT Telkom Akses Witel Semarang) Emmanuel Bagas Agustha; Satriyo Adhy; Dinar Mutiara Kusumo Nugraheni
Jurnal Masyarakat Informatika Vol 15, No 2 (2024): November 2024
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.15.2.62416

Abstract

This research explores the importance of a project information monitoring application in supporting effective decision-making within companies, with a focus on PT Telkom Akses Witel Semarang. Currently, internal reports are manually compiled, leading to data integration imperfections, difficulties in monitoring job billing, and potential errors in decision-making. These issues were identified as key factors motivating the development of a web-based "Project Information Monitoring" application. The application is designed to address these problems by improving operational ease, accurately monitoring job billing, and centralizing divisional reports. This research employs the ICONIX Process methodology, which plays a crucial role in ensuring that the application’s design and development are structured and well-documented. The application is developed using the Laravel 10 framework with a Model View Controller (MVC) approach, ensuring an efficient and correct development process. The application was tested using black box testing with various scenarios based on predefined use cases. The test results demonstrate that the application meets user needs, as evidenced by acceptance in each test scenario.
An Ensemble-Based Approach for Detecting Clickbait in Indonesian Online Media Sandy Kurniawan; Adhe Setya Pramayoga; Yeva Fadhilah Ashari
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.73115

Abstract

Clickbait headlines are widely used in online media to attract readers through exaggerated or misleading titles, potentially leading to user dissatisfaction and information overload. This study proposes a machine learning approach for detecting clickbait in Indonesian news headlines using classical classification models and ensemble learning. The dataset consists of labeled clickbait and non-clickbait headlines in Bahasa Indonesia, which were processed and represented using TF-IDF vectorization. Three base classifiers, Multinomial Naive Bayes, Logistic Regression, and Support Vector Machine, were integrated using soft voting and stacking ensemble methods. The experimental results indicate that the stacking ensemble model achieved the highest accuracy of 0.7728, while the voting ensemble recorded the best F1-score of 0.7080, outperforming individual classifiers. Despite these gains, the SVM model demonstrated the most substantial decline in accuracy after stopwords removal, dropping by 0.0410. These findings highlight the effectiveness of ensemble learning in enhancing clickbait detection performance and suggest potential for further optimization in model selection and integration strategies.
A Combination of SHA-256 and DES for Visual Data Protection Aristides Bima Wintaka; Christy Atika Sari; Eko Hari Rachmawanto; Rabei Raad Ali
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72615

Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.

Filter by Year

2010 2026


Filter By Issues
All Issue Vol 17, No 1 (2026): May 2026 (Ongoing) Vol 16, No 2 (2025): November 2025 Vol 16, No 1 (2025): May 2025 Vol 15, No 2 (2024): November 2024 Vol 15, No 1 (2024): May 2024 Vol 14, No 2 (2023): JURNAL MASYARAKAT INFORMATIKA Vol 14, No 1 (2023): JURNAL MASYARAKAT INFORMATIKA Vol 13, No 2 (2022): JURNAL MASYARAKAT INFORMATIKA Vol 13, No 1 (2022): JURNAL MASYARAKAT INFORMATIKA Vol 12, No 2 (2021): JURNAL MASYARAKAT INFORMATIKA Vol 12, No 1 (2021): JURNAL MASYARAKAT INFORMATIKA Vol 11, No 2 (2020): JURNAL MASYARAKAT INFORMATIKA Vol 11, No 1 (2020): JURNAL MASYARAKAT INFORMATIKA Vol 10, No 2 (2019): JURNAL MASYARAKAT INFORMATIKA Vol 10, No 1 (2019): JURNAL MASYARAKAT INFORMATIKA Vol 9, No 2 (2018): JURNAL MASYARAKAT INFORMATIKA Vol 9, No 1 (2018): JURNAL MASYARAKAT INFORMATIKA Vol 8, No 2 (2017): JURNAL MASYARAKAT INFORMATIKA Vol 8, No 1 (2017): JURNAL MASYARAKAT INFORMATIKA Vol 7, No 2 (2016): JURNAL MASYARAKAT INFORMATIKA Vol 7, No 1 (2016): JURNAL MASYARAKAT INFORMATIKA Vol 6, No 12 (2015): JURNAL MASYARAKAT INFORMATIKA Vol 6, No 11 (2015): JURNAL MASYARAKAT INFORMATIKA Vol 5, No 10 (2014): JURNAL MASYARAKAT INFORMATIKA Vol 5, No 9 (2014): JURNAL MASYARAKAT INFORMATIKA Vol 4, No 8 (2013): JURNAL MASYARAKAT INFORMATIKA Vol 4, No 7 (2013): JURNAL MASYARAKAT INFORMATIKA Vol 3, No 6 (2012): JURNAL MASYARAKAT INFORMATIKA Vol 3, No 5 (2012): JURNAL MASYARAKAT INFORMATIKA Vol 2, No 4 (2011): Jurnal Masyarakat Informatika Vol 2, No 3 (2011): Jurnal Masyarakat Informatika Vol 1, No 2 (2010): Jurnal Masyarakat Informatika Vol 1, No 1 (2010): Jurnal Masyarakat Informatika More Issue