cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 216 Documents
Design of Decision Support System Selection of Beach Tourism Object in GunungKidul using Fuzzy AHP Method Yudi Istianto; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.233 KB) | DOI: 10.14421/ijid.2017.06203

Abstract

The tourism industry is currently one of the important assessments for a certain region. Gunungkidul has a lot of of beach tourism potentials until visitors are confused to choose the right beach. The purpose of this research is to analyze and apply Fuzzy Analytical Hierarchy Process method in calculating the selection of beach tourism object in Gunungkidul with eight main criteria into a website.Multi Criteria Decision Making (MCDM) is a decision-making method to establish the best alternative of a number of alternatives based on several criteria that will be considered. One method of MCDM is the Fuzzy Analytical Hierarchy Process method. Fuzzy Analytical Hierarchy Process is a method of developing Analytical Hierarchy Process (AHP), which can describe unclear decisions and minimize uncertainty on AHP. Fuzzy approach, especially triangular fuzzy number to AHP scale, is expected to minimize uncertainty so that expected result was obtained more accurately.The decision support system for choosing a beach resort in Gunungkidul has been successfully built by applying the Fuzzy Analytical Hierarchy Process method. The calculation of Fuzzy Analytical Hierarchy Process method with the same computer result with manual calculation. The testing system was done using Black Box method by testing Alpha and Betha. From the results of system testing, it was known that the average result of the overall function score was 104 which was on rating scale 97.51 - 120 (Very Good).
Room Monitoring System Using OpenWRT-Based Webcam Arif Setiawan; Ahmad Subhan Yazid; M Didik Rohmad Wahyudi
IJID (International Journal on Informatics for Development) Vol. 4 No. 1 (2015): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (581.77 KB) | DOI: 10.14421/ijid.2015.04103

Abstract

The development of Closed Circuit Television (CCTV) technology makes it easier for a user to monitor a room. However, the use of CCTV still cannot reach all levels of society due to the price is relatively expensive. Therefore, it is necessary to build a new system that has the same features as CCTV devices in general but at a more affordable price. This system was built using the OpenWRT operating system. The operating system will be installed on a wireless router with several additional tools to support its functionality such as speakers, GSM modems, webcams, and flash drives. The resulting system has the ability to detect movement and store images and videos when suspicious movements are detected. In addition, this system also has several other features such as alarm alerts, Short Message Service (SMS) warnings, user email reports, and easy access via WIFI and the internet.
Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method Mahbub Puba Fawzan; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 6 No. 2 (2017): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (595.86 KB) | DOI: 10.14421/ijid.2017.06204

Abstract

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)
Honeypot Log Analysis as a Network Security Support Widodo, Tri; Muhsina, Elvanisa Ayu; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 2, No 1 (2013): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (816.809 KB) | DOI: 10.14421/ijid.2013.02102

Abstract

The development of information and communication technology could not be separated from the development of computer network and interconnected network (internet). On the other side, there are people who try to access the information illegally, even try to disturb and destroy the flow of information. These people are called hacker or cracker. Because of that reason, it is needed tools to prevent this information. Those tools are like firewall, IPS (Intrusion prevention system), IDS (intrusion detection system), anti-virus, and other tools. This research does literature review by analyzing one of IDS tools that is honeypot using a method of data analyzing using secondary data from Honey net Project Research at January 7th until 29th 2003. The result published by those researchers is a DDOS attack was happen at January 18th and 19th 2003 that caused one of the computer servers with IP (internet protocol) 10.1.1.101 went down at January 19th 2003. A computer with IP 10.1.1.101 at January18th 2003 started to get over packets, that is 293 packet or 41.1% from 707 packets, but the computer had not gone down yet. However, at January 19th 2003 the computer got more packets, that was 795 packets or 58% from 1,370 packets, that cause the computer became down. The evidence was unconnected computers at January 20th 2003. Based on these analyzing we concludes that honeypot is very effective to be a supporting tool to detect a network intrusion, especially DDOS. And the addition value of honeypot implementation is a log which gives information for network administrators to know any activities on the network, both normal activities, or disadvantage activities.
Topology Analysis of iBGP Confederation Case : Indonesia Research and Education Network (IdREN) Irwin Wijaya Lahusen; Widyawan Widyawan; Sri Suning Kusumawardani
IJID (International Journal on Informatics for Development) Vol. 8 No. 1 (2019): IJID June
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (710.743 KB) | DOI: 10.14421/ijid.2019.08104

Abstract

Implementation of the BGP Confederation topology scenario, found a number of new facts that influence the final decision making for BGP network managers. In previous studies it has been mentioned a number of factors that influence QoS from a topology scheme, among others, the number of Sub AS and the number of routers that make up the iBGP topology. In this study, a number of scenarios were developed by giving variants to bandwidth parameters and adding measurement parameters to Lost Datagram in all scenarios. The results obtained are quite significant, affecting QoS and finding a number of new facts related to the effect of using traffic generators. This research was tested on the Indonesia Research and Education Network (IdREN) network using GNS3.
A Reference Architecture for Developing Resource-Limited Disease Surveillance Systems Agung Fatwanto
IJID (International Journal on Informatics for Development) Vol. 1 No. 2 (2012): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (258.766 KB) | DOI: 10.14421/ijid.2012.01205

Abstract

In recent years, several countries have developed and implemented disease surveillance systems. These systems, eventhough having relatively similar functions, are adopting different approaches. Based on a preliminary study, an effective strategy for developing a disease surveillance system was proposed. This paper proposes a reference architecture for building a disease surveillance system based on the medical and technological perspective in the context of resource-limited environment.
Decision Support System for Major Determination in Madrasah Aliyah Qonitat, Ihda Imroatun; Muhsina, Elvanisa Ayu; Uyun, Shofwatul
IJID (International Journal on Informatics for Development) Vol 2, No 2 (2013): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.151 KB) | DOI: 10.14421/ijid.2013.02205

Abstract

During this time, process of major determination in MAN Gondangrejo is based on value, interests, and the results of psychological tests. Interest derived from questionnaires, which gathered information about student interest on a particular subject. While the results of psychological tests are only taken from the results of the largest majors, so the decision is less than the maximum. It is because the results ignore other majors. There is no consideration of class quota of each major. Therefore, to obtain the right decision, this senior high school needs a decision support system that can help the team as the decision maker to determine of students majoring in accordance with the values, interests, intelligence / IQ, personality and skills of students. Moreover, it considers also the class quota of each major. One of application logic fuzzy is support system with Fuzzy Inference System (FIS) Mamdani. There are four stages to get output in FIS Mamdani: formation of a collection of fuzzy, formation of rules, application of function of implications and rules of inferences, and defuzzyfication. The method for developing system that used in this research is waterfall method. There are 5 steps to developing system. They are required analysis of system, interface design of system, implementation of system, testing of system and maintenance of system. This system is capable to display the rank of recommendation to all students for x class based on FIS Mamdani. The ranks are sorted from the highest to the lowest recommendation and quota of majors. This system is useful to give the right determination for majoring in senior high schools. Based on the result of system testing, 100% major decision makers in MAN Gondangrejo totally agree about this decision support system. 
E-Catalog Application Development for Public Facility using Website Usability Evaluation Tool Sri Lestari; Hendra Dea Arifin; Muhammad Dzulfikar Fauzi; Agung Fatwanto
IJID (International Journal on Informatics for Development) Vol. 3 No. 2 (2014): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (388.746 KB) | DOI: 10.14421/ijid.2014.%x

Abstract

The interaction between user and computer is a factor that should be considered in building a website. Most users often judge a system's interface, instead of the function. A good website should ideally have the ease of use (usability) that makes users easier access to the information presented. But in fact, the lack of reusability factor to be considered in designing a website. Bad user interface design is usually a reason for not using an application or software. In addition, bad user interface could make a fatal mistake. The design should be user-centered. Therefore, there is an evaluation process conducted by users on the design results. Webuse (Website Usability Evaluation Tool) is a method that can help a web developer or web designer know the level of usability not only in terms of design but also in terms of content organization, navigation and link, and performance and effectiveness. We build an e-catalog of public facilities in the city of Yogyakarta by applying the Webuse concept. Result shows that these public facilities have good usability level. 
Towing Car Booking System Using Android and Web Based Application Septian Hadinata; Elvania Ayu Muhsina; Bambang Sugiantoro
IJID (International Journal on Informatics for Development) Vol. 4 No. 1 (2015): IJID May
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (446.704 KB) | DOI: 10.14421/ijid.2015.04105

Abstract

To deal with broken cars on the road, a towing car booking system using android operating system is made. By using GIS (Geographic Information System) for the development, ensuring the location of the customer become easier. Meanwhile, the towing car booking management application is developed using PHP programming language. Data management in this application uses the MySQL database engine. While GPRS (General Pocket Radio System) channel is used for sending customer data. This application is designed using the UML (Unified Modeling Language) which is suitable for modeling applications developed with object-oriented language (OOP). In this towing car booking application, the android application acts as a client while the web application as a server which is used by the operator of the towing car company in managing data orders from customers. This application has successfully designed and implemented, it is concluded that the system built has benefits for driver, the system interface built has a simple display and easy to use by users, and the system has running well functionality. Therefore, it can be a reference for android application developers who have integration concept between android and web applications.
VLAN-based LAN Network Management Comparison using Cisco and Brocade Ramadhan Gatra; Reonaldo Akbar; Bambang Sugiantoro; Naufal Asyhab
IJID (International Journal on Informatics for Development) Vol. 7 No. 2 (2018): IJID December
Publisher : Faculty of Science and Technology, UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (380.289 KB) | DOI: 10.14421/ijid.2018.07208

Abstract

The need for security and convenience in carrying out data requires all users to be able to create a safer network, in terms of both data communication and sharing internet connection lines. The effectiveness of performance in work is always required to be able to work quickly and on time without the constraints of high data traffic that may cause problems in network devices. Those problems may ultimately cause all work to be hampered in its completion. Management of VLANs in a LAN connection is able to parse problems especially in terms of data communication and logical data transmission.  This paper studies on this issue.

Page 6 of 22 | Total Record : 216


Filter by Year

2012 2025


Filter By Issues
All Issue Vol. 14 No. 1 (2025): IJID June Vol. 13 No. 2 (2024): IJID December Vol. 13 No. 1 (2024): IJID June Vol. 12 No. 2 (2023): IJID December Vol. 12 No. 1 (2023): IJID June Vol. 11 No. 2 (2022): IJID December Vol. 11 No. 1 (2022): IJID June Vol. 10 No. 2 (2021): IJID December Vol. 10 No. 1 (2021): IJID June Vol. 9 No. 2 (2020): IJID December Vol. 9 No. 1 (2020): IJID June Vol. 8 No. 2 (2019): IJID December Vol. 8 No. 1 (2019): IJID June Vol 7, No 2 (2018): IJID December Vol 7, No 2 (2018): IJID December Vol. 7 No. 2 (2018): IJID December Vol. 7 No. 1 (2018): IJID June Vol 7, No 1 (2018): IJID June Vol 7, No 1 (2018): IJID June Vol 6, No 2 (2017): IJID December Vol. 6 No. 2 (2017): IJID December Vol 6, No 2 (2017): IJID December Vol. 6 No. 1 (2017): IJID June Vol 6, No 1 (2017): IJID June Vol 6, No 1 (2017): IJID June Vol. 5 No. 2 (2016): IJID December Vol 5, No 2 (2016): IJID December Vol 5, No 1 (2016): IJID May Vol. 5 No. 1 (2016): IJID May Vol. 4 No. 2 (2015): IJID December Vol 4, No 2 (2015): IJID December Vol 4, No 1 (2015): IJID May Vol. 4 No. 1 (2015): IJID May Vol 3, No 2 (2014): IJID December Vol. 3 No. 2 (2014): IJID December Vol 3, No 1 (2014): IJID May Vol. 3 No. 1 (2014): IJID May Vol. 2 No. 2 (2013): IJID December Vol 2, No 2 (2013): IJID December Vol. 2 No. 1 (2013): IJID May Vol 2, No 1 (2013): IJID May Vol 1, No 2 (2012): IJID December Vol. 1 No. 2 (2012): IJID December Vol 1, No 2 (2012): IJID December Vol. 1 No. 1 (2012): IJID May Vol 1, No 1 (2012): IJID May Vol 1, No 1 (2012): IJID May More Issue