cover
Contact Name
Ike Yunia Pasa
Contact Email
intek@umpwr.ac.id
Phone
+6282326676888
Journal Mail Official
intek@umpwr.ac.id
Editorial Address
Universitas Muhammadiyah Purworejo Jl. KHA. Dahlan 3 Purworejo Jawa Tengah 54111
Location
Kab. purworejo,
Jawa tengah
INDONESIA
INTEK: Informatika dan Teknologi Informasi
ISSN : 26204843     EISSN : 26204924     DOI : https://doi.org/10.37729/intek.v3i1
Focus and Scopes INTEK Jurnal Informatika dan Teknologi Informasi (INTEK) is a peer-reviewed Journal of Information and Computer Sciences published by Universitas Muhammadiyah Purworejo. This journal publishes two times a year (May and November). INTEK is a media for researchers, academics, and practitioners who are interested in the field of Computer Science and wish to channel their thoughts and findings. The articles contained are the results of research, critical, and comprehensive scientific study which are relevant and current issues covered by the journals. The Scopes of this journal, but not limited to, are: Computer Architecture Parallel and Distributed Computer Pervasive Computing Computer Network Embedded System Human—Computer Interaction Virtual/Augmented Reality Computer Security Software Engineering (Software: Lifecycle, Management, Engineering Process, Engineering Tools and Methods) Programming (Programming Methodology and Paradigm) Data Engineering (Data and Knowledge level Modeling, Information Management (DB) practices, Knowledge Based Management System, Knowledge Discovery in Data) Network Traffic Modeling Performance Modeling Dependable Computing High Performance Computing Bioinformatics Computer Security Human-Machine Interface Stochastic Systems Information Theory Intelligent Systems IT Governance Networking Technology Optical Communication Technology Next Generation Media Robotic Instrumentation Information Search Engine Multimedia Security Computer Vision Information Retrieval Intelligent System Distributed Computing System Mobile Processing Next Network Generation Computer Network Security Natural Language Processing Business Process Cognitive Systems, etc
Articles 6 Documents
Search results for , issue "Vol. 1 No. 1 (2018)" : 6 Documents clear
Kompleksitas Algoritma Quick Sort Guna Menemukan Efisiensi Waktu Dan Memori Wahju Tjahjo Saputro
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.96

Abstract

Many algorithm methods slve a problem many research have done various performance of each algorithm, until now has growth rapidly the performance of algorithms in the field of computer science. One of the methods from all of algorithms is used such as the quick sort algorithm.Qucik Sort Algorithm in the process of sorting data used divide and conquer techniques. Divide and conquer techniques can be determined right left or middle pivot. So they have 3 performance such as base case O(n2 log n), worst case O(n2) and average case Tavg = O(n2 log n). In certain, case the worst case was able to work well in place and in virtual memory.
Pendekatan Algoritma Apriori Pada Data Mining Untuk Menemukan Pola Belanja Konsumen Wahju Tjahjo Saputro; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.97

Abstract

Data mining is often used in research-related pattern and knowledge of an information is stored in large-scale databases. Today many companies have large amounts of data was stored in the database. The large-scale databases are only used to generate tabular information fo the needs daily of managers. So it can be called rich data but poor information.Data mining has one assocation method that can generate certain patterns and knowledge of data have an assocate between two itemsets, so it has an if-then property. Algorithm used to produce assocation rule is called apriori.The result of research represent that the apriori algorithm can work optimally to generate pattern the sales transaction. This research represents transaction frequency{2,3} -> {28} has support 10.5%, confidence 66.6% and {7,8} -> {22} has support 10.5%, confidence 66.6%. Both of rules have frequencies often represent quite high with > 2.
Desain Pengontrolan Objek 3D Interaktif Berbasis Natural User Interface Dengan Microsoft Kinect Murhadi Murhadi
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.98

Abstract

Subjects of Fundamentals of Engine, has been described using a real model of a stand engine. This method is difficult because the teachers have to carry the stand engine to the classroom. To solve this problem, teacher present learning materials using sketches, images and 3D graphics of engine models. It is difficult for teachers to control the learning material to explain certain parts and this method is ineffective and inefficient for teaching process. In this paper, the pro-posed solution to control 3D engine models with hand gestures by Kinect. Therefore, it’s neces-sary to study the hand gesture that is easily operated by teacher and the usefulness of control with hand gesture. To achieve the goal of the research carried out application design, applica-tion development, internal testing and performance testing directly to the teacher as a user. Testing software that will do is the performance test and usability.To rotate the 3D engine model can be done by locking the object first by moving the right hand to the top of the right shoulder as far as 30 cm. To rotate the object to the right, the right hand to the right side of head, to turn to the left, the left hand to the left side of head, to rolling upwards, left hand on the left shoulder and to rolling downwards, the left hand to the bottom of left shoulder as far as 30 cm. To zoom in the object, right hand to the front of the right shoulder, to zoom out, the left hand to the front of left shoulder as far as 40 cm.
Evaluasi Efektivitas Web Portal Dengan Pendekatan Utility System (Studi Kasus: Universitas Muhammadiyah Purworejo) Singgih Arif Widodo; Wahju Tjahjo Saputro
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.99

Abstract

This research aimed to evaluate portal web University Muhammadiyah Purworejo by using utili-ty system approach. Utility system approach to evaluate portal web from the point of the system effectiveness, firstly proposed by Kendall. This approach captured the perception of the system based on 6 points of view, which are possession, form, place, time, actualization and goal, as well as the scale of measurement using a likert scale and SPSS software. This study uses a re-search instruments with a likert scale questionnaire. The results showed how good the quality of the portal web University Muhammadiyah Purworejo, and any item of utility system that con-tributed the most to improving the quality of the system, as well as proposals that may be submit-ted to the management of portal web to develop more qualified information system.
Identifikasi Barang Bukti Percakapan Aplikasi Dual Apps Whatsapp Pada Ponsel Xiaomi Menggunakan Metode NIST Mobile Forensics Dedy Hariyadi; Dedy Hariyadi; Ike Yunia Pasa
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.101

Abstract

Mobile Forensics is a scientific branch of Digital Forensics related to the handling of digital evidence on mobile devices. The growth of mobile devices technologies such as smartphones need quite unique and adaptive handling with technological developments. Technological innovations in mobile devices should be handled thoroughly. As an example of Dual Apps new features launched by Xiaomi also need to be identification of digital traces. Dual Apps feature allows 1 phone to have 2 accounts on 1 social media app. Using the NIST Mobile Forensics method to identify digital evidences left behind by the Dual Apps ecosystem.
Model Pengujian Celah Keamanan Bug Host Pada Layanan Promosi Operator SelulerModel Pengujian Celah Keamanan Bug Host Pada Layanan Promosi Operator Seluler Dedy Hariyadi; Imam Ahmad Subhan; Alfirst Radena Julio Vanca
INTEK : Jurnal Informatika dan Teknologi Informasi Vol. 1 No. 1 (2018)
Publisher : Universitas Muhammadiyah Purworejo

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37729/intek.v1i1.102

Abstract

The growth of internet usage in Indonesia can not be separated from market penetration role by Cellular Operator. In this case Celullar Operators often provide promotional services to customers. Behind the promotional services there are several security holes that are utilized by customers. Usually the security hole is called a bug host. This research proposes a model of security testing of the promotional services.

Page 1 of 1 | Total Record : 6