cover
Contact Name
Tati Mardiana
Contact Email
jurnal.jri@kresnamediapublisher.com
Phone
-
Journal Mail Official
jurnal.jri@kresnamediapublisher.com
Editorial Address
-
Location
Kota banjar,
Jawa barat
INDONESIA
Jurnal Riset Informatika
Published by KresnaMedia Publisher
ISSN : 26561743     EISSN : 26561735     DOI : -
Core Subject : Science,
Jurnal Riset Informatika, merupakan Jurnal yang diterbitkan oleh Kresnamedia Publisher. Jurnal Riset Informatika, berawal diperuntukan menampung paper-paper ilmiah yang dibuat oleh peneliti dan dosen-dosen program studi Sistem Informasi dan Teknik Informatika.
Arjuna Subject : -
Articles 432 Documents
Utilization of Bluetooth Connections for Arduino Based Door Lock Security Tools Hafdiarsya Saiyar
Jurnal Riset Informatika Vol. 2 No. 4 (2020): Period September 2020
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v2i4.124

Abstract

Home security is something that must be considered for every homeowner. Especially when you have to leave the house empty for work or even on vacation. You must be worried about thieves, lost jewelry, or the safety of other valuables. Therefore, the authors made a door lock security device by utilizing a Bluetooth connection with the Arduino Uno microcontroller. The research method used was direct observation of the selected object, namely the author's house, and conducting literature studies related to the Arduino Uno microcontroller. This door lock tool uses the Arduino Uno as a data processing center, because it is easy to use, and most importantly in the charging program, it does not require a download like a microcontroller in general. This Arduino Uno contains a special program that will give commands to the Servo Motor to open and open the door. Not only opening and opening doors, but this tool can also move the door without us holding or touching it but through a Smartphone. The purpose of this research is to produce a tool that can make it easier to manage or open doors using the Arduino via an Android smartphone using a Bluetooth connection.
The Application of Routing of OSPF and EIGRP using the Method Redistribute to Improve the Efficiency of The Network Ari Ramadhan Wibowo; Anton Anton; Puji Astuti
Jurnal Riset Informatika Vol. 2 No. 4 (2020): Period September 2020
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v2i4.125

Abstract

Cyber ​​Art Group Indonesia is the Head Office in the Ciputat area, South Tangerang which is engaged in wedding planning and has one branch in Depok, West Java. Currently, between branches and head offices, data retrieval, and data transmission is done via email. And in branches there is no local network available, the local network is only at the head office. If you want to pick up or send, the marketing at the branch contacts the head office to send files, this creates obstacles for employees both at the branch and head office. Because all data is stored on the central server, if there is a need, it can be retrieved at any time. So for that researchers here create a local network between the branch office and the head office. By using the Redistribution Router method, data retrieval and sending to the server can be seen whether the time is faster by using the Throughput, Delay, and Packet loss measurement parameters. Connecting multiple routers as gateways and implementing OSPF and EIGRP routing makes data transfer easier and more efficient on multiple routers. After installing the local network between the branch and the head office, it is tested with a package size of 32 bytes, namely 100%. For the Packet loss value with a packet size of 32 bytes in the first and second experiments, it produces a value of 0%, where no packet is lost.
Implementation of Data Mining To Determine the Association Between Body Category Factors Based on Body Mass Index Desti Fitriati; Bima Putra Amiga
Jurnal Riset Informatika Vol. 2 No. 4 (2020): Period September 2020
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v2i4.128

Abstract

The development of the increasing flow of globalization in the field of science and technology as well as increased income has resulted in reduced physical activity of the community which results in diverging diet and physical activity which makes a person not pay attention to his body shape. This method of calculating the Body Mass Index can be used to determine a person's body shape. Several factors can affect the value of the Body Mass Index, including individual factors, consumption patterns, and lack of physical activity which leads to a sedentary lifestyle. These factors are made into 69 itemsets which will be used as the basis for questions in the questionnaire to collect a dataset that will later be processed using the FP Growth algorithm and looking for association rules that have the highest support x confidence value. From the 490 calculation data, the results are categorized into 10, each of which is Men with a Very Thin BMI with the highest support x confidence value of 39.56%, Men with a Thin BMI of 55.90%, Men with a Normal BMI of 70%, men with a fat BMI of 49.23%, men with an obese BMI of 41.34%, women with a very thin BMI of 41.37%, women with a thin BMI of 37.21%, Normal BMI is 68.83%, women with obese BMI are 41.65%, and women with obese BMI are 42.91%.
PREDICTION OF ANDROID HANDPHONE SALES DURING PANDEMIC USING NAÏVE BAYES AND K-NN METHODS BASED ON PARTICLE SWARM OPTIMIZATION Endang Sri Palupi
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.133

Abstract

Abstract During the pandemic, most schools, campuses, and places of education conducted online teaching and learning activities. Many teaching and learning activities are carried out using the Zoom, Google, WebEx, or Microsoft Teams applications. All of that can be done through a laptop, you can also use a cellphone (HP) so that the need for laptops and cellphones increases, both new and used goods. Even though during the pandemic the economic situation was declining, many companies suffered losses, resulting in a reduction in employees and causing a high unemployment rate, the need for Android phones remains high. In addition to online distance learning facilities, Android phones can also be used for online sales through e-commerce, market places, social media, and other digital ceilings. Currently, Android phones have many choices and according to the funds we have, with various brands and specifications. Many brands issue android cellphone products with pretty good specifications and affordable prices, so that even though purchasing power has decreased due to the pandemic, sales of android cellphones are still high. In this study, the author predicts the highest sales of android cellphones using the Naïve Bayes method and the K-Nearest Neighbor method based on Particle Swarm Optimization. accuracy of 81.33%.
DEVELOPMENT OF MANUFACTURING INVENTORY MANAGEMENT SYSTEM USING MATERIAL REQUIREMENT PLANNING METHOD Ami Rahmawati; Rizal Amegia Saputra; Ita Yulianti
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.135

Abstract

Inventory has an important role in business activities. This is because inventory has an effect on changes in the production market and anticipates price changes in the demand for many goods. PT. Barkah Jaya Mandiri is a company engaged in manufacturing where the management of inventory at the company is still done conventionally. This causes various problems such as the occurrence of discrepancies in the stock of goods, discrepancies in data and final reports as well as obstacles in the production process in the event of a shortage or excess of raw materials. (Material Requirement Planning) in order to overcome the problems that occur in the company. The combination of the SDLC model and data collection techniques including observation, interviews and literature study were also carried out in this study in order to achieve the system that will be built to suit the targeted needs. With this system, the management of inventory data at this company can be done easily and accurately and save time compared to the previous system, so that the procurement of manufacturing raw materials is optimal and employee performance is better.
VILLAGE GROUPING BASED ON THE NUMBER OF HEALTH FACILITIES IN WEST JAVA USING K-MEANS CLUSTERING ALGORITHM Frieyadie Frieyadie; Anggie Andriansyah; Tyas Setiyorini
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.140

Abstract

Health is very important for the welfare and development of the Indonesian nation because as a capital for the implementation of national development, it is essentially the development of all Indonesian people and the development of all Indonesian people. Due to the outbreak of the Covid-19 virus, many health facilities must be provided for patients. Of course, the government must pay attention to the health facilities that can be used in every district/city in West Java in the future. Therefore, to determine the level of availability of sanitation facilities in each district/city in West Java, we need a technology that can classify data correctly. One method of data processing in data mining is clustering. The application of clustering to this problem can use the K-Means algorithm method to group the most frequently used data. The purpose of this study is to classify sanitation data on the highest sanitation facilities, medium sanitation facilities, and low sanitation facilities, so that areas/cities that are included in the low cluster will receive more attention from the government to improve/provide sanitation facilities.
IMPLEMENTATION OF CERTAINTY FACTOR IN AN EXPERT SYSTEM FOR DIAGNOSING ORAL CANCER Nurhasan Nugroho; Nurdiana Handayani; Rachmat Destriana; Tia Ernawati
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.141

Abstract

Oral cancer or oral cavity cancer is cancer that attacks the epithelial tissue of the oral mucosa. Cancer is a disease with a high mortality rate. So, it is very important to be able to provide information to the public about oral cancer. One way to help diagnose disease is to use an expert system. In this study, an expert system application was developed to diagnose oral cancer based on symptoms and produce a diagnosis and treatment solution. The expert system developed using the certainty factor algorithm (CF). Where is able to overcome uncertainty by providing a value level of trust from experts and users. From the results of the accuracy test, it shows a value of 87%, so the system can function properly.
IMAGE ENHANCEMENT ON OBJECT DETECTION USING L0 GRADIENT PRIOR Sunario Megawan; Hernawati Gohzali; Apriyanto Halim
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.142

Abstract

Abstract Object detection is a technique used to retrieve certain parts of the image. The part can be in the form of scenery, people, or other objects. At the time of object detection, the image obtained can experience a decrease in image quality which can be caused by weather factors, namely fog, smoke, dust, rain, and others. A decrease in the quality of the image can result in errors in classification and the inability to recognize objects in the image. Therefore, the process of improving image quality becomes very important to do at the pre-processing stage in detecting image objects. The focus of the problem to be solved in this study is the return of a blurred image using L0 Gradient Prior. The results showed that the application of L0 Gradient Prior in restoring a blurred image can increase the number of objects that can be detected by the object detection system.
DESIGN AND DEVELOPMENT OF ACCOUNTING INFORMATION SYSTEM FOR CASH SALES OF MILD STEEL Ari Puspita; Yuyun Yuningsih; Muhammad Fahmi; Rahmat Tri Yunandar
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.145

Abstract

Abstract Technological developments are now experiencing rapid growth, so many entrepreneurs compete to produce new companies. At this time, the light steel business is multiplying. The researcher tries to research the weak steel sales system. Most companies do not have a computerized recording system, so inputting invoices is hampered. Sales notes are written manually to report generation, so that it will take a long time. In making the information system, the author will use the waterfall model and will use the PHP programming language for the manufacture of this software. The purpose of making this sales information system is to make it easier to carry out a mild steel sales system to shorten processing time and minimize all forms of errors in reporting.
COMPARATIVE ANALYSIS OF THE K-NEAREST NEIGHBOR ALGORITHM ON VARIOUS INTRUSION DETECTION DATASETS Andri Agung Riyadi; Fachri Amsury; Tiska Pattiasina; Jupriyanto Jupriyanto
Jurnal Riset Informatika Vol. 4 No. 1 (2021): December 2021
Publisher : Kresnamedia Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34288/jri.v4i1.147

Abstract

Because we have flaws in developing security rules, inadequate computer system settings, or software defects, security in computer networks can be vulnerable. Intrusion detection is a computer network security method that detects, prevents, and blocks unauthorized access to confidential information. The IDS method is intended to defend the system and minimize the harm caused by any attack on a computer network that violates computer security policies such as availability, confidentiality, and integrity. Data mining techniques were utilized to extract relevant information from IDS databases. The following are some of the most widely utilized IDS datasets NSL-KDD, 10% KDD, Full KDD, Corrected KDD99, UNSW-NB15, ADFA Windows, Caida, dan UNM have been used to get the accuracy rate using the k-Nearest Neighbors algorithm (k-NN). The latest IDS dataset provided by the Canadian Institute of Cybersecurity contains most of the latest attack scenarios named the CICIDS2017 dataset. Preliminary experiment shows that the approach using the k-NN method on the CICIDS2017 dataset successfully produces the highest average value of intrusion detection accuracy than other IDS datasets.

Filter by Year

2018 2026


Filter By Issues
All Issue Vol. 8 No. 2 (2026): Maret 2026 Vol. 8 No. 1 (2025): Desember 2025 Vol. 7 No. 4 (2025): September 2025 Vol. 7 No. 3 (2025): Juni 2025 Vol. 7 No. 2 (2025): Maret 2025 Vol. 7 No. 1 (2024): December 2024 Vol. 6 No. 4 (2024): September 2024 Vol. 6 No. 3 (2024): June 2024 Vol. 6 No. 2 (2024): March 2024 Vol. 6 No. 1 (2023): December 2023 Vol. 5 No. 4 (2023): September 2023 Vol 5 No 3 (2023): Priode of June 2023 Vol. 5 No. 3 (2023): June 2023 Vol. 5 No. 2 (2023): March 2023 Vol 5 No 2 (2023): Priode of March 2023 Vol 5 No 4 (2022): Periode September 2023 Vol 5 No 1 (2022): Priode of December 2022 Vol. 5 No. 1 (2022): December 2022 Vol 4 No 4 (2022): Period of September 2022 Vol. 4 No. 4 (2022): September 2022 Vol. 4 No. 3 (2022): June 2022 Vol 4 No 3 (2022): Period of June 2022 Vol 4 No 2 (2022): Period of March 2022 Vol. 4 No. 2 (2022): March 2022 Vol. 4 No. 1 (2021): December 2021 Vol 4 No 1 (2021): Period of December 2021 Vol 3 No 4 (2021): Period of September 2021 Vol. 3 No. 4 (2021): September 2021 Edition Vol. 3 No. 3 (2021): June 2021 Edition Vol 3 No 3 (2021): Period of June 2021 Vol. 3 No. 2 (2021): March 2021 Edition Vol. 3 No. 1 (2020): December 2020 Edition Vol. 2 No. 4 (2020): Period September 2020 Vol. 2 No. 3 (2020): June 2020 Edition Vol. 2 No. 2 (2020): March 2020 Edition Vol. 2 No. 1 (2019): Periode Desember 2019 Vol 1 No 4 (2019): Periode September 2019 Vol. 1 No. 4 (2019): Periode September 2019 Vol. 1 No. 3 (2019): Periode Juni 2019 Vol. 1 No. 2 (2019): Periode Maret 2019 Vol 1 No 2 (2019): Periode Maret 2019 Vol. 1 No. 1 (2018): Periode Desember 2018 More Issue