cover
Contact Name
Oman Somantri
Contact Email
ejournal.jict@gmail.com
Phone
-
Journal Mail Official
ejournal.jict@gmail.com
Editorial Address
-
Location
Kota cirebon,
Jawa barat
INDONESIA
Jurnal ICT : Information Communication & Technology
Published by STMIK IKMI Cirebon
ISSN : 23020261     EISSN : 23033363     DOI : -
Core Subject : Science,
Jurnal ICT : Information Communication & Technology (JICT) (p-ISSN: 2302-0261, e-ISSN: 2303-3363 ) is a scientific journal and open access journal published by Lembaga Penelitian dan Pengabdian Masyarakat (LPPM) of STMIK IKMI Cirebon, Indonesia. Jurnal JICT covers the field of Informatics, Computer Science, Information Technology and Communication. It was firstly published in 2012 for a printed version. The aims of Jurnal JICT are to disseminate research results and to improve the productivity of scientific publications. Jurnal JICT is published two times a year (July and December).
Arjuna Subject : -
Articles 268 Documents
Klasifikasi Status Calon Pendonor Darah Menggunakan Algoritma Support Vector Machine dan Kernel RBF Usep Tatang Suryadi; Nindi Azis Andriyani
Jurnal ICT : Information Communication & Technology Vol 19, No 1 (2020): JICT-IKMI, Juli 2020
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v19i1.113

Abstract

To donate blood, generally must qualify the requirements, including physically and mentally healthy, aged 17-65 years, minimum body weight of 45kg, Hb levels 12.5g% - 17.0g%, upper tension (systole) 100-170mmHg, under tension (diastole) 70-100mmHg, 36.6-37.5 degrees Celsius body temperature, never had hemophilia, pulse range 50-100 times/minute, and the timescales 3 months after a previous blood donors. The problem that arises is the small number of officers who often have difficulty recording donor data on the form sheets. Thus allowing unwanted error occurred when registering the identity or the results of the initial examination of prospective donors. Based on these problems, the classification of potential donors is needed as a step to determine the status of potential donors, whether the prospective donors are accepted as donors or rejected based on predetermined requirements. According to this research that using primary data which obtained from The Indonesian Red Cross Subang Regency, the data are using a plenty 50 of the data has accepting and 50 of the data has rejected. Afterwards required to doing continued analysis toward a method capability based on age, Hb level, body weight, sistolik dan diastolik, that using SVM (Support Vector Machine) algorithm.and using Sequential method for training phase in SVM and Kernel RBF for calculating the dot product value. The algotirhm accuration reached 90% / excellent categories with the value gamma = 0.5, C = 1, epsilon = 0.001.
Pencegahan Serangan Siber Pada Sistem Informasi Manajemen Sekolah Di SMK Wahidin Kota Cirebon Asep Suherman; Tedi Susanto; Djohar Syamsi; I Putu Robin Sunjaya; Muhammad Nasir
Jurnal ICT : Information Communication & Technology Vol 20, No 2 (2021): JICT-IKMI, Desember 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.362

Abstract

Seiring dengan perkembangan Teknologi Informasi dan Komunikasi (TIK) yang semakin cepat, banyak kegiatan yang terkait dengan bisnis organisasi telah dilakukan secara  on-line dengan memanfaatkan Teknologi Informasi dan Komunikasi. Salah satu organisasi bisnis yang telah memanfaatkan Teknologi Informasi dan Komunikasi dalam mengelola kegiatannya adalah di bidang pendidikan, khususnya di Sekolah Menengah Kejuruan. Seiring dengan perkembangan manajemen sekolah berbasis digital, maka potensi gangguan keamanan sistem juga semakain besar. Permasalahan gangguan keamanan yang terkait dengan cyber crime pada saat ini telah masuk dalam Top Ten Global Risk, yang artinya memberikan dampak yang sangat merugikan. Bentuk cyber crime antara lain kecurangan sistem komputerisasi, pencurian identitas, hacking, dan pelanggaran terhadap keamanan jaringan. Paper ini bertujuan untuk membahas upaya dalam pencegahan terhadap gangguan atau serangan terhadap sistem informasi manajemen sekolah, berdasarkan studi kasus pada Sistem Informasi Manajemen Sekolah di SMK Wahidin, Kota Cirebon. Diharapkan studi ini dapat menjadi salah satu acuan dalam pencegahan terhadap cyber crime, khususnya di sekolah kejuruan. 
Penerapan Algoritma Naive Bayes Untuk Diagnosa Penyakit Gagal Ginjal Kronis Arim Nur Faddillah; Jeffry Wijaya; Riko Hidayat
Jurnal ICT : Information Communication & Technology Vol 18, No 2 (2019): JICT-IKMI, Desember 2019
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v18i2.69

Abstract

Kidney is an organ that has a big role in filtering substances that enter the body. This can be seen in kidney function, which is excreting metabolic waste. Damage to the kidneys that cause damage to kidney function. One of the diseases of the kidney that cannot be treated is chronic kidney failure (Chronic Kidney Disease). Chronic kidney failure is difficult to know, certain methods are needed and it is not enough just by a medical examination. This study discusses the application of the Naif Bayes algorithm method for diagnosis or predict chronic kidney failure. This system is based on a dataset from Indian Chronic Kidney Disease (CKD) obtained from the UCI Machine Learning Repository website created in 2015.The results of this study get an accuracy of 91.25% for the 400 datasets tested.
Pengembangan E-Commerce Menggunakan Metode Business Model Canvas (BMC) Pada Toko Amira Bucket Samsinar Samsinar; Nada Permatasari
Jurnal ICT : Information Communication & Technology Vol 20, No 2 (2021): JICT-IKMI, Desember 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.393

Abstract

Covid-19 telah mengubah tren ekonomi global. E-Commerce telah berkembang pesat dalam beberapa tahun terakhir dan menjadi semakin intens karena pandemi Covid-19. Toko Amira Bucket adalah sebuah toko yang menjual berbagai macam buket, Seiring berkembangnya waktu pemilik toko ingin meningkatkan penjualannya tapi terbatas pada media yang bisa dimanfaatkan untuk mempromosikan buket dan melayani para pelanggannya. Media sosial yang saat ini dimanfaatkan untuk mempromosikan buket sekaligus melayani para pelanggan yang memesan secara daring kurang efektif karena sering terjadinya penumpukan chat dari para pelanggan yang hanya ingin bertanya mengenai produk ataupun para pelanggan yang mengirimkan bukti pembayaran kepada pemilik sehingga pemilik toko sering kesulitan dalam mencari bukti pembayaran dari para pelanggannya. Oleh karana itu dibutuhkan sebuah sistem e-commerce sebagai solusi atas permasalahan yang ada, dan dengan menerapkan Business Model Canvas untuk menganalisis model bisnis Toko Amira Bucket sehingga dapat menghasilkan kinerja yang lebih maksimal. Dengan adanya sistem e-commerce pada Toko Amira Bucket ini dapat menjadi sarana untuk memasarkan produk yang ditawarkan menjadi lebih luas dengan menggunakan fitur Search Engine Optimizitation.
Sistem Keamanan Sepeda Motor Menggunakan GPS Dan Radio Frequency Identification (RFID) Berbasis Arduino Herwin Simanjuntak; Rully Pramudita; Nadya Safitri
Jurnal ICT : Information Communication & Technology Vol 19, No 2 (2020): JICT-IKMI, Desember 2020
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.263

Abstract

Abstract- At this time motorcycle theft cases are still often occur plus the increasing use of motorcycle vehicles, motorcycle theft is caused by the lack of a security system on the ignition which only uses keys and key covers, where security systems like this have been understood mostly motorcycle thieves, the necessity of a motorcycle safety system is needed. To overcome this, a Motorcycle Safety System was made using Arduno-based GPS and Radio Frequency Identification (RFID) to prevent and facilitate the recovery of stolen motor vehicles. The results of this study, the system is made using the Global Positioning System (GPS) as a tool to detect the location of motorcycles, and smart key contacts are added using RFID, SMS gateway and DC-DC Converter.
Deteksi Intrusi Pada Basis Data Menggunakan Random Forest Novianti Indah Putri; Arief Zulianto; Wiwin Suwarningsih
Jurnal ICT : Information Communication & Technology Vol 20, No 2 (2021): JICT-IKMI, Desember 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.424

Abstract

More services have been made online in recent years, more and more data is being stored virtually. This important and confidential data becomes an easy target for criminals in the era of digitalization. Database security becomes very necessary to keep data safe. Attacks can come from outside or from within, attacks caused by insiders are the second biggest threat after hacking. Conventional security has not been able to detect anomalies from internal users. This can be anticipated using an intrusion detection mechanism. This mechanism has previously been applied to networks and hosts. However, some actions that are harmful to the database are not necessarily harmful to the network and hosts so that intrusion detection on the database becomes extra security to defend the database from intruders. This system uses the Random Forest algorithm which includes supervised learning to detect anomalous transactions. The dataset used is a transaction log containing 773 records and 9 attributes. Anomalies are determined based on the threshold value of 3 attributes, namely operation, object and field name. The test uses 6 different trees, 10, 20, 40, 60, 80 and 100. The results of the test on 762 records and 5 attributes used, the Random Forest algorithm has the highest accuracy value on the number of trees 80 and 100 which have a test time difference of 0 .03 seconds. In the dataset used, the optimum number of trees is found at number 80 with an accuracy value of 99.56% and an execution time of 0.13183 seconds.
Peningkatan Keamanan Aplikasi Web Menggunakan Web Application Firewall (WAF) Pada Sistem Informasi Manajemen Kampus Terintegrasi Randi Rizal; Yusuf Sumaryana
Jurnal ICT : Information Communication & Technology Vol 20, No 2 (2021): JICT-IKMI, Desember 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.416

Abstract

Increasing the security of web applications on the integrated campus management information system needs to be done because the application is accessed by public networks so that there are many attacks and attempts to prevent threats from attackers. This study applies a Web Application Firewall (WAF)-based application security using ModeSecurity and Core Rules Set from Owasp which aims to improve the security system of the web application by using a firewall. This study uses an experimental method by implementing a Web Application Firewall (WAF) as a web-based protection system, then the process of analysis and testing to obtain accurate advice on firewall implementation. The results of this study indicate that the firewall used with Web Application Firewall (WAF)-based ModeSecurity has succeeded in stopping attacks from attackers using Cross Site Scripting (XSS) and SQL Injection methods.
Game Edukasi 3D Teknik Bercocok Tanam Secara Hydroponic Dengan Pendekatan Adaptive Learning Raditya Danar Dana; Dita Rizki Amalia; Martanto Martanto
Jurnal ICT : Information Communication & Technology Vol 18, No 2 (2019): JICT-IKMI, Desember 2019
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v18i2.86

Abstract

The yard can be optimized to fulfill family consumption needs independently. Hydroponic farming techniques are very suitable to be developed on limited land. However, not many people use the yard to fulfill household consumption needs, this is due to the lack of community knowledge about hydroponic farming techniques. In order to improve the understanding of planting techniques with hydroponic techniques, this research will develop interactive learning media based on 3D games using the ADDIE system development method. Meanwhile, the Sugeno model is used to implement the adaptive quiz feature. Development of 3D Educational Games provides an alternative way to learn Hydroponic farming techniques in a fun way through learning methods while playing through the adaptive learning approach and simulation features provided. The level of compatibility of the behavior of the questions with the fuzzy rules set in Fuzzy Rules produces 80% accurate performance.
Penerapan Augmented Reality berbasis Android sebagai Media Promosi di Toko Furniture Jery Meubel Rita Wahyuni Arifin; Shilka Dina Anwariya
Jurnal ICT : Information Communication & Technology Vol 20, No 2 (2021): JICT-IKMI, Desember 2021
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v20i2.415

Abstract

Perkembangan teknologi pada seluruh bidang sangat pesat, bahkan saat ini kita dihadapkan pada fenomena Revolusi Industri 4.0, yaitu pemanfaatan teknologi informasi yang . Dampak dari fenomena Revolusi Industri 4.0 dirasakan oleh berbagai sektor bidang tanpa terkecuali Toko Meubel Jerry Bogor. Kendala yang dialami oleh Toko Meubel adalah kegiatan promosi produk furniture dengan cara memberikan katalog, brosur dan majalah yang menampilkan gambar produk dalam bentuk dua dimensi dengan alasan ekonomis, mengakibatkan konsumen menjadi tidak puas dan tidak bisa melihat kondisi produk secara keseluruhan serta mengharuskan konsumen datang ke toko jika ingin membeli produk. Untuk dapat beradaptasi dan bertahan dalam menghadapi fenomena Revolusi Industri 4.0 maka Toko Meubel Jerry mencoba untuk menerapkan teknologi Augmented Reality (AR) sebagai sarana pemasaran yang lebih interaktif, inovatif dan komunikatif, hal ini sebagai solusi dari permasalahan yang dihadapi oleh Toko Meubel Jery. Metode pengembangan yang digunakan adalah Metode Multimedia Development Life Cycle model Luther, tahapan dalam model ini terdiri dari concept, design, material collecting, assembly, testing dan distribution. Dalam penelitian ini penulis membuat aplikasi media promosi dengan teknologi Augmented Reality dan buku marker untuk menampilkan produk secara tiga dimensi sehingga konsumen puas karena dapat melihat produk secara keseluruhan.
Pendukung Keputusan Rawat Inap Dengan Menggunakan Algoritma Naive Bayes Ridi Satrio Adi
Jurnal ICT : Information Communication & Technology Vol 18, No 2 (2019): JICT-IKMI, Desember 2019
Publisher : STMIK IKMI Cirebon

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36054/jict-ikmi.v18i2.63

Abstract

Actual absorption Budget Work Plan is often inappropriate and beyond the ones in the previous plan, the suspect that this occurs because the current formulation does not use methods that can provide assistance in the calculations, so that the calculation of the original approach Realization of the health budget and their families and retired personnel and their families often do not match and exceed what was planned earlier, in guessing that this happens because when the preparation is not using methods that can provide assistance in the calculations, so that the original calculation approach using only the data absorption history of the current year (year N) and the prediction of possible rate in the next year (N + 1) can not fully count on, this can occur in the absence of predictions that allow participants will lead to greater use of health care costs or commonly called cost drivers, and in fact the use of tables morbidity and mortality table is still not able to fully answer to the problem, but just so the constant factor on each participant by age and gender specific.By taking data from database transactions in clinic visits for treatment, which is done by creating an Entity Relationship (ER) and using the menu view in its database software download data into excel the data.Excel data downloaded yet to be fully informed and do not contain meaning and appropriate information is correct so that further processing should be done by using Data Mining and Naive Bayes algorithm, which will determine the participants who could potentially be a cost driver based on the pattern of illness in the next year.In experiments using Naive Bayes algorithm showed that of the 65,535 processed data are 3,915 people who could potentially be a cost driver that is likely to in the Inpatient Hospital, the results obtained with the accuracy of 93.63% and the AUC curve 0.975.

Page 9 of 27 | Total Record : 268