cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota yogyakarta,
Daerah istimewa yogyakarta
INDONESIA
Informasi Interaktif
Published by Universitas Janabadra
ISSN : 25275240     EISSN : -     DOI : -
Core Subject : Science,
Jurnal Informasi Interaktif mempublikasikan artikel dalam bidang teknologi informasi dan komunikasi, rekayasa perangkat lunak dan sistem informasi.
Arjuna Subject : -
Articles 170 Documents
IMPLEMENTASI DETEKSI TEPI MENGGUNAKAN METODE QUADRANT TREE CLASSIFIER PADA PEMISAHAN OBJEK BERBASIS DIGITAL IMAGE PROCESSING (STUDI KASUS : OBJEK BENDERA NEGARA) Nurcahyo1, Azriel Christian; Wati, Vera; Profesi, Dwinda Etika; Kusrini, Kusrini
Informasi Interaktif Vol 4, No 3 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

ABSTRACTEdge detection is segmentation of image input that aims to determine the edge by marking the detail part of an image. From some previous studies it has not been shown the results of detection to be able to separate objects from the center of the image input image itself. The purpose of this study is to perform an edge detection function by dividing into nodes using the concept of the Quadran Tree Classifier method to be applied to the case study of the object colored image of the using national flag. Some input images have different levels of complexity and pixels, including the Korean flag, Wales flag, and the flying Indonesian flag. The method is the adoption of tree data structure, where each has 4 nodes the same number of child nodes. If the node has children, number of nodes must be 4, recursively doing the loop. The working concept of this method split and merge segmentation. The results of object segmentation combined in accordance with the homogeneity of colors, especially those with confusion. This research show which is able to observe the scanning pixel on image Korean flag and the flying Indonesian flag, however level pixel 520 x 347 such as Wales flag, this method is unable to separate between line object that is not nudge. The pixel resolution has an effect with total time execution segmentation (minute/sec), total segmentation identified and the total colour.Keywords : edge detection, quadrant tree, digital image processing, image, segmentation
EVALUASI INVESTASI TEKNOLOGI INFORMASI DENGAN MENGGUNAKAN DOMAIN VALUE GOVERNANCE VAL IT FRAMEWORK 2.0 (STUDI KASUS: CV.BERKA) Ferdy Firmansyah; Wing Wahyu Winarno; Asro Nasiri
Informasi Interaktif Vol 4, No 2 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (340.855 KB)

Abstract

In this study a study was conducted on the use of the Val IT framework in measuring the value of information technology investments. This research was conducted with a case study at CV. Berka who is engaged in public works which deals with the construction of houses. The concept of Val IT Framework 2.0, which was initiated by the Information Technology Governance Institute (ITGI) (2008), through the experience of a set team of practitioners, academics, and practices, some of the methodologies, and research to develop the Val IT framework. Development of the Val IT framework with several research activities, publications and support services. Val IT consists of a set of basic principles and the three main processes for measuring the value of IT Value Gavenance, Portfolio Managament, Investment Management.Masing these 3 main process then broken down into several sub-items. Through the business case method can provide a complete picture and transparent to the management on the benefits of an investment and helps the management to make decisions on investment, so it can be used as controls achieving the expected value of an investment in Information Technology Keywords: Val IT, Investment Technology, Value Governance
PERENCANAAN RENCANA STRATEGIS SISTEM INFORMASI UNTUK TERCAPAINYA VISI MISI DARI RUMAH SAKIT Febriani, Siska; Soedijono, Bambang; Arief, M. Rudyanto
Informasi Interaktif Vol 4, No 3 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

ABSTRACT XXX Regional General Hospital (RSUD XXX) is a Type B Hospital in Yogyakarta. XXX Hospital is the only place of reference for further treatment of patients who feel they need more sophisticated handlers. In 2016 the XXX Hospital was requested by the DIY Health Office to improve facilities and services. In following up on the request of the Yogyakarta Health Office, the RSUD XXX is currently in the process of building a building structure. However, from the increase in infrastructure built it has not been accompanied by the development of adequate technological infrastructure. From the description of the above problems, the purpose of this study is to make a strategic plan to align business objectives with the business process of the RSUD. The limitation of the problem is that in this study the researcher used the Zachman framework with matrix tables 1 to 4 (Scope, Enterprise Model, System Model, Technological Model). The final results of this study are the main activities of the XXX hospital including registration, outpatient care, hospitalization, emergency services, laboratory services, drug services, hospital services, outpatient registration and inpatient registration. Whereas for supporting activities are the procurement of logistics, tools and materials, medical workers requitment, information services. There are 7 applications that are suggested to be developed, namely the Registration application, BPJS, Poly Unit, Laboratory, E-Billing, Medical Support.Keywords: Architecture Enterprise, Informatic System, Hospital
IMPLEMENTASI DATABASE SECURITY MENGGUNAKAN KONSEP ROLE-BASED ACCESS CONTROL (RBAC) DALAM RANCANGAN DATABASE SISTEM INFORMASI MANAJEMEN SEKOLAH DENGAN POSTGRESQL Achmad Yusron Arif; Ema Utami; Suwanto Raharjo
Informasi Interaktif Vol 4, No 1 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

School management information system is an important application used to manage data and information of a school in order to provide the best service to the community. To create an effective and efficient information system, an effective database design is needed. This needs to be done because if the database is not designed properly, in the future when a system starts to develop, the integrity data stored in the database will decrease. One aspect that needs to be considered is database security. Database security is very important, because the data stored in the database is important information for schools, such as student, financial and employee data. One of the method that can be used to improve database security is Role-Based Access Control (RBAC), which is limiting access to users or roles according to their respective roles. In this study the RBAC method was applied in school management information systems using the PostgreSQL database.  Keywords:  Role Based Access Control, RBAC, Database Security, PostgreSQL, SIM Sekolah
MODIFIKASI KRIPTOGRAFI KLASIK VIGENERE CIPHER MENGGUNAKAN ONE TIME PAD DENGAN ENKRIPSI BERLANJUT M Ziaurrahman; Ema Utami; Ferry Wahyu Wibowo
Informasi Interaktif Vol 4, No 2 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (369.726 KB)

Abstract

The development of communication is increasingly rapid which does not escape from various threats such as eavesdropping or data theft, because that security aspect of data security is now very calculated. Various ways have been done to secure data that contains confidential information. One method used is to scramble the data into unclear content, so that when tapped it will be difficult to find out the actual information content. Encryption techniques by changing and randomizing the original form of data are called cryptography. Vigenere cipher is one type of classical cryptography algorithm that is popular and often used. This Vigenere cipher uses a substitution technique in encrypting the message where each plaintext character in the message will be encrypted into another character in the ciphertext based on the key used. One Pad algorithm is one algorithm that has perfection when encrypting and decrypting it. The basic concept of the One Time Pad algorithm is almost the same as the Vigenere algorithm, except that in this algorithm the key is generated randomly. In this paper, we will explain how to strengthen Vigenere cipher by modifying Vigenere ciphers. Modifications are carried out by applying One Time Pad encryption generated from the key and the next key generation technique using Vigenere encryption continues so that the key used for the coding will be different from the key used previously. With the use of this method, the connection between plaintext and ciphertext will become less and more difficult to solve cryptanalis.Keywords: Cryptography, Modification, Vigenere Cipher, One Time Pad, and Cyber Security.
PEMBERDAYAAN KELOMPOK IBU-IBU RUMAH TANGGA MELALUI PENGEMBANGAN USAHA ANEKA KUE BERBAHAN TALAS DI KECAMATAN NGAGLIK KABUPATEN SLEMAN Raharti, Rini; Kusdarjito, Cungki; Jatmiko, Bambang; Lestari, Puji; Qomariyah, Siti
Informasi Interaktif Vol 4, No 3 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

ABSTRACT The target of the program is that people who have not been economically productive but have a strong desire to become entrepreneurs, are a group of housewives with 10 members in the Dsn. Karanglo Sukoharjo Ngaglik Sleman. The aim of the program is to help empower housewives through the development of various taro-based cakes and help create peace and comfort. In general, the problems faced by partners are economic conditions that are still below average and productivity levels that are still low. To overcome this problem, the service team provided a solution in the form of building a business field tailored to the minimum skills of the community and local food-based partner areas. While the specific problem is that the majority of housewives are less able to take advantage of their free time in daily activities, do not have the effort to use taro around their home gardens as processed food, do not have the innovation of taro processing, do not have working capital to make business, do not have the ability to plan, record, and control a business, do not understand who the consumers will buy and do not know how to do the right marketing. The results of this activity are partners have received entrepreneurship training, the addition of production equipment, training and mentoring on how to make various cakes from taro, simple financial management training, and marketing management training.Keywords: taro, local food crops, empowerment, innovation, housewives
PREDIKSI PENJUALAN KOSMETIK DENGAN SUPPORT VECTOR MACHINE Aflahah Apriliyani; Ema Utami; Suwanto Raharjo
Informasi Interaktif Vol 4, No 2 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (343.961 KB)

Abstract

The development of the cosmetics industry experienced a very significant development. Along with the development of cosmetics, information technology has become one of the inputs for the company. Information about the sale of cosmetics and information on cosmetic supplies is an inseparable thing. Cosmetics are products made from plants, minerals and animals. Predictions about future sales can control the amount of available product stock, so that shortages and excess product stock can be minimized. Accurate Prediction results will facilitate the fulfillment of market demand and can provide timely predictions. This research was conducted to predict cosmetic sales. Knowing the supply of cosmetics is something that can be found in cosmetic stores, to facilitate the prediction of cosmetic inventories in the coming period can use sales data in the previous period. Date time series is one of the time series methods used for forecasting methods to find out the pattern of patterns in the past to find out patterns in the future. The Support Vector Machine algorithm will work accurately when the required features are relevant. But inreality the features needed are not relevant, feature selection can be done to select the features needed to obtain accurate information, so as to increase efficiency. In this study the Support Vector Machine algorithm produces the best method, which is 0.136 based on the smallest error value with period 4 variables, Validation Shuffled Sampling 10 and Polynomial kernel type. The best model is also obtained with the Support Vector Machine algorithm with forward selection resulting in the smallest error value of 0.144 with period 8 variables, as well as the Validation Shuffled Sampling 10 and the polynomial kernel type. Keywords: Kosmetik, Data Mining,  Support Vector Machine, feature selection, forward selection
EVALUASI USER INTERFACE PADA APLIKASI E-COMMERCE (STUDI KASUS INFORMA DAN IKEA) Ilkham, Sundari; Kusrini, Kusrini; Arief, M. Rudyanto
Informasi Interaktif Vol 4, No 3 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

ABSTRACT Increasingly complex human needs cause changes in the community environment. This is indicated by the increasingly rapid development of information technology, especially information technology related to online shopping applications through e-commerce applications. The development of technology that is currently being talked about and is the subject of discussion is to develop technology towards modern business by using mobile-based e-commerce applications. Anywhere and anytime quickly and in real time, people can easily make purchases of any product related to the needs of the house they are looking for. The results of this study were to determine the magnitude of the heuristic value of the quality of the mobile e-commerce application user interface Informa and Ikea according to users using the Nielsen 10 principle method. It is expected that the results of this study can be used as input for e-commerce mobile application developers Informa and Ikea to be better, and can be proposed to improve the user interface for e-commerce applications Informa and Ikea.Keywords:  E-Commerce, User Interface, 10 Nielsen Principles. 
IMPLEMENTASI DATABASE SECURITY MENGGUNAKAN KONSEP ROLE-BASED ACCESS CONTROL (RBAC) DALAM RANCANGAN DATABASE SISTEM INFORMASI MANAJEMEN SEKOLAH DENGAN POSTGRESQL Arif, Achmad Yusron; Utami, Ema; Raharjo, Suwanto
Informasi Interaktif Vol 4, No 1 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (25.267 KB)

Abstract

School management information system is an important application used to manage data and information of a school in order to provide the best service to the community. To create an effective and efficient information system, an effective database design is needed. This needs to be done because if the database is not designed properly, in the future when a system starts to develop, the integrity data stored in the database will decrease. One aspect that needs to be considered is database security. Database security is very important, because the data stored in the database is important information for schools, such as student, financial and employee data. One of the method that can be used to improve database security is Role-Based Access Control (RBAC), which is limiting access to users or roles according to their respective roles. In this study the RBAC method was applied in school management information systems using the PostgreSQL database.  Keywords:  Role Based Access Control, RBAC, Database Security, PostgreSQL, SIM Sekolah
PERBANDINGAN METODE WEIGHTED PRODUCT DAN SIMPLE ADDITIVE WEIGHTING DALAM SELEKSI PENGURUS FORUM ASISTEN (STUDI KASUS : UNIVERSITAS AMIKOM YOGYAKARTA) Pradana, Musthofa Galih; Kusrini, Kusrini; Luthfi, Emha Taufiq
Informasi Interaktif Vol 4, No 2 (2019): Jurnal Informasi Interaktif
Publisher : Universitas Janabadra

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (341.697 KB)

Abstract

The assistant forum is an organization built by AMIKOM Yogyakarta University which serves as an official forum for Practicum Assistants. In the Forum Assistant there are daily administrators in charge of managing the daily activities of the organization. In determining the day-to-day management, a selection process is conducted, so that the elected management is the right individual and able to make the Assistant Forum organization better. Because of the importance of the selection process, a system that is able to provide recommendations to determine eligible individuals is needed. administrator. There are many methods that can be used in decision support systems, including the Weighted Product method and Simple Additive Weighting. The data of the candidates for Forum Assistant will be applied to these two methods and a comparison is made of the ranking results of the Weighted Product method and Simple Additive Weighting. The results obtained from this study are ranking from the Weighted Product method and Simple Additive Weighting which produces the same ranking of 3 data from a total of 10 data tested or similarity percentage of 20%.Keywords: Selection, Decision Support System, Weighted Product, Selection.

Page 8 of 17 | Total Record : 170