cover
Contact Name
Iklima Ermis
Contact Email
iklimaermis.ismail@tik.pnj.ac.id
Phone
-
Journal Mail Official
anita.hidayati@tik.pnj.ac.id
Editorial Address
-
Location
Kota depok,
Jawa barat
INDONESIA
MULTINETICS
ISSN : 24432245     EISSN : 24432334     DOI : -
Core Subject : Science,
Multinetics is a peer-reviewed journal is published twice a year (May and November). Multinetics aims to provide a forum exchange and an interface between researchers and practitioners in any computer and informatics engineering related field. Scopes this journal are Content-Based Multimedia Retrieval, Multimedia Application, Mobile Computing & Applications, The Internet of Things, Information Systems and Technologies, E- Learning & Distance Learning, Infrastructure Systems and Services, E-Business & E-Commerce, Artificial Intelligence, Embedded System, Network & Data Communication, Big Data and Data Mining, Software Engineering, Computer Network and Architecture, Soft Computing and Intelligent System and Networks and Telecommunication Systems
Arjuna Subject : -
Articles 314 Documents
Implementasi Sistem Rekomendasi Makanan pada Aplikasi EatAja Menggunakan Algoritma Collaborative Filtering Syaiful Bahri , Muhamad Naufal; Danan Jaya, I Putu Yuda; Dirgantoro, Burhanuddin; mal, Istik; Ahmad, Umar Ali; Septiawan, Reza Rendian
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i2.4062

Abstract

EatAja is a startup company in Indonesia that provides solutions in order in ordering food at mobile app-based restaurants. The variety of menu from various restaurants will make it confusing for users to choosing. Due to this problem, restaurants would be displaying the best sellers’ menu. However, there is not solution for users who eat according to their taste. For restaurants, promoting specific menus based on users’ taste is quite challenging because of users have preferences by themselves and unavailability about that information. Since many users may have similar food preferences, recommender system is a must-have feature to be implemented in such applications that involve data from many users. In this research are using memory-based collaborative filtering method to check a similarity between users’ orders. By using real order history data from EatAja combined with generated auxiliary data to implicitly find customers’ ratings towards menu they have been ordered, the recommender system obtains Mean Absolute Error (MAE) 0.96823 with the best accuracy is 99.03%. The result of the recommendation system can be applied to the application to be able to increase sales to the restaurant as a suggested menu.
IMPLEMENTASI ADVANCED DRIVER ASSISTANCE SYSTEM MENGGUNAKAN METODE SURF DALAM MENGENALI RAMBU-RAMBU LALU LINTAS DI INDONESIA Yudha Pratama; Agus Virgono; Fussy Mentari Dirgantara
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i2.4222

Abstract

Technology to detect traffic signs is made based on awareness to prioritize compliance with driving regulations. There are still many who do not understand what each traffic sign means. With the advanced driver assistance system (ADAS), it is hoped that they will be able to provide solutions that can help the public in understanding traffic signs in Indonesia, especially traffic warning signs. ADAS is useful for detecting traffic signs in front of us when we drive. The speeded-up robust features (SURF) method can be used to detect traffic signs This implementation aims to reduce the number of accidents due to driver's lack of awareness of traffic signs in Indonesia. The highest detection accuracy of SURF with Hessian Threshold 350 is 33.3%, with Hessian Threshold 500 is 23%, and accuracy with Hessian Threshold 750 is 15.3% with average FPS are 7.5 FPS, 10.5 FPS, and 13 FPS, respectively.
Perancangan dan Analisis Intrusion Prevention System Berbasis SNORT dan IPTABLES dengan Integrasi Honeypot pada Arsitektur Software Defined Network Barends, Julian Kevin; Dewanta, Favian; Karna, Nyoman Bogi Aditya
MULTINETICS Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v7i2.4276

Abstract

Software Defined Network is a network architecture that allows the network to be controlled centrally by separating the Control Plane and Data Plane making it easier from the operator's side to manage the network consistently, therefore SDN is believed to be able to replace the existing network which tends to be rigid. But despite the capabilities of the SDN, SDN security is still a major concern. In project, the design of an Snort and IPTables based IPS system that is integrated with the Honeypot system in the Software Defined Network network architecture will be carried out. IPS will detect attacks based on the applied rules and if there is an attack then IPS will give an alert to the Controller which then the Controller will check the database and divert the attack traffic to the Honeypot. The results shows that the accuracy rate is 99.87%, the average detection speed for Port Scanning, Ping of Death, ICMP Flood and TCP SYN Flood attacks are 1.207 s, 1.045 s, 1.047 s, and 1.101 s. While the QoS measurement shows that after the attack is transferred, there is an increase in the Throughput value and a decrease in the Packet Loss value.
Rancang Bangun Prototipe Sistem Pendeteksi Pencurian Burung Berbasis IOT Hudi, Siti Azka Rahmawati; Rafid Rziqullah; Maria Agustin, S.Kom., M.Kom.
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4114

Abstract

The crime of bird theft has always existed in the community and can occur at any time. It is the duty of bird owners to improve the security of their cages so that birds are always protected. Online news media also often report cases of bird theft as in the news from antvklik.com on January 3, 2018, there was a bird theft. The perpetrators acted by forcibly opening the cage door. The action was caught on CCTV, but the perpetrator was not caught. Based on this incident, CCTV can only act as a scout or record the situation, therefore a solution was made by designing a bird theft detection system using a human detector sensor to detect human presence which is connected to the ESP32 camera module to take pictures of the situation outside the cage when suspicious human presence detected. The information is sent to the owner via the Telegram Bot. The research method used is the prototyping method. In addition, it is connected with plus RFID Card technology to open the drum door. The result of this research is that each component in this system has functioned according to the algorithm and has been integrated according to the design that has been made.
Pembuatan Stimuli ASMR (Autonomous Sensory Meridian Response) pada Animasi Pengenalan Makanan Tradisional Indonesia Yuly, Ade Rahma
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4288

Abstract

Pandemic conditions with government regulations to avoid crowds and travel restrictions force the public to stay at home, especially urban communities that cannot visit other regions. The application of ASMR stimuli in animated the introduction of traditional Indonesian food can invite the viewer to feel a more profound atmosphere by adding a trigger to the sense of hearing through an audio enhancement to produce a suitable response for their eyes seen. The method used in this study is efficient DDD-E (decide-design-evaluation) in audio enhancement for ASMR stimuli in an animated production. The four phases of the DDDE method are in sequence and concise, so it is suitable for producing audio on multimedia products. The study results in the form of animation with audio enhancement quality to obtain ASMR stimuli (autonomous sensory meridian response), so the viewer becomes more engaged with the appearance of animated recognition of traditional cuisine. Animation displays the introduction process, cooking processes, and presentation that supports the atmosphere will be added with the audio enhancement technology.
A Analisa Usability Website BAKTI-Kemkominfo Menggunakan System Usability Scale Ali Farzah; Oktaviana, Shinta
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4495

Abstract

BAKTI is a government organization in a Public Service Agency under the Ministry of Communication and Information. A total of 2,485 website visitors are recorded during October. In contrast to the Ministry of Communications and Informatics Legal Bureau website, which reached an average of 24,896 visitors in October. Some menus repeat to the home page, and there are no service product details, causing disinformation on the BAKTI website. The research aims to overview the value of the usability level, acceptance, and quality level of the BAKTI website. The System Usability Scale (SUS) method assesses acceptance or usability by considering the low cost, small sample, and relatively short time with adequate results. The result of calculating the SUS score for the BAKTI website is 71.40. It shows the acceptance level of the BAKTI website at Marginal High, the quality level at level C, and the usability level at the "OK" level. The assessment results for the BAKTI website indicate the need to improve the website by referring to the effects of research instruments. The results of the 4th and 8th instruments, around 19-32%, show that the website is not yet user-friendly because respondents still find it difficult and still need the help of technical people when browsing the website. Then on the 5th and 6th instruments, around 23-35% of respondents' assessments show that there are still impaired functions on the website and the need for content improvement to eliminate inconsistencies when browsing the BAKTI website.
Design of Information Security Risk Management Framework Based on a Risk Profiling Study in the Healthcare Sector Dewi, Amalia Fitri; Suryanto, Yohan
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4532

Abstract

The healthcare sector is currently becoming one of the paramount targets for cyberattacks. The utilization of information technology in the healthcare sector triggers the emergence of its varied vulnerabilities. Information security risk management is considered one of obligatory jobs for healthcare sector organizations. This study aims at constructing an information security risk management framework in the healthcare sector based on a study of its existing risk profile. This research employed qualitative method. Based on risk profiling results, the healthcare sector had two critical assets, namely electronic health records and Internet of Medical Things. These assets had high sensitivity, however, had numerous vulnerabilities that were prone to exploitations. In order to overcome this, an information security risk management framework consisting of four stages is proposed, namely Risk Profiling, Risk Level Assessment, Risk Treatment, and Monitoring. Risk Profiling is a vital stage in the risk management process. This stage is performed to produce an overview of the information security risk profile resulted from critical assets owned by the organization and the condition of cyberspace in the information security in the healthcare sector. The proposed framework is cyclical as the risk profile in the healthcare sector is dynamic. Thus, monitoring changes in the organization's risk profile is imperative. The proposed framework design was tested in Puskesmas XYZ which is  kind of health care facility agencies. The resul of the testing is there are seven risks in the information security contex. There are three High Level riskd and four Medium Level risks. All the risks are reduced by applying some controls. The result of the evaluation of proposed framework state that it has described the sequence of security risk management stage, all activities in information security risk management are includes, and the proposed framework can be applied to health care facilities.
Penentuan Karyawan Terbaik Dengan Sistem Pendukung Keputusan Metode Weighted Product Purnamasari, Indah; Fajria, Maulfi
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4554

Abstract

Employees are one of the supporters in the progress, smoothness and success of a company. Quality employees are one of the company's assets that make the company grow rapidly. For this reason, employees with the best work ethic are entitled to promotions and incentives. In this study, a company has obstacles in selecting the best employees. So far, the determination of the best employees is still done manually, so that the determination of employees takes longer, is not transparent and ineffective. This can actually lead to new conflict problems among employees. Selection of the best employees aims to improve and evaluate employee performance. Therefore we need a Decision Support System to determine the best employees in a company so that it can be more transparent, more efficient, effective and acceptable to all parts of the company. The Weighted Product method is a more efficient method and the time required for calculations is easier and shorter in a Decision Support System. The selection of the Weighted Product Method is based on computational complexity which is not too difficult by obtaining a weight value for each attribute and a ranking process that will determine the best alternative. The results of this study are 0.14414 with criteria consisting of loyalty, productivity and quality of work, discipline, problem solving ability, cooperation, maintaining cleanliness, responsibility and work ability
Perancangan Aplikasi Animasi Interaktif Japanese Vocabulary Berbasis Android Widyaa, Syahruni; Amalia, Rizky; Rismayani, Rismayani
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4577

Abstract

In Indonesia, Japanese is one of the languages that is less attractive. Because Japanese has a lot of vocabulary, it is difficult to learn the language. Therefore, in the research that we are currently doing, we will create and android based application program with an interface that is made as attractive as possible so that people are more interested in learning the language and make it easier to understand. The features provided by this application are the in the form of vocabulary and some games to test how well we understand the material given. In its development used data collection techniques in the form of observation, literature study, and questionnaires. Hopefully in the future this application can be useful and make people interested in the learning Japanese. The application was tested using the blackbox technique.
Prototipe Pendeteksi dan Pengenalan Wajah Berbasis Web Menggunakan Algoritma Local Binary Pattern Histogram untuk Absensi Tarigan, Ita Augustina; Kurniawan, Asep
MULTINETICS Vol. 8 No. 1 (2022): MULTINETICS Mei (2022)
Publisher : POLITEKNIK NEGERI JAKARTA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32722/multinetics.v8i1.4591

Abstract

Abstract-Face Detection and Recognition Prototype for Attendance is a prototype used to perform attendance by using a face as an object. The attendance system, which usually uses fingerprints as an object, has become less effective given the Covid-19 pandemic in Indonesia. Attendance tools that have been contaminated by fingers will become a container for the spread of Covid-19. The design of this attendance system aims to break the chain of spread of COVID-19 by conducting attendance without being directly contaminated with attendance devices. In this study, facial detection and recognition analysis was carried out with the Local Binary Pattern Histogram (LBPH) algorithm feature approach for web-based attendance, where software development used the prototype method. LBPH is an algorithm combination between Local Binary Pattern (LBP) and Histogram of Oriented Gradients (HOG). LBP is a well-known method of recognizing an object by distinguishing the object from the background. Face images taken in real time using a webcam will be compared and matched using histograms that have been extracted with facial images that already exist in the database. The results of the facial recognition process in this system are very dependent on lighting, facial angles and the use of accessories on the face. The face attendance system is able to detect faces well up to 100% accuracy and recognize faces that have been detected up to 60% accuracy.

Filter by Year

2015 2025


Filter By Issues
All Issue Vol. 11 No. 02 (2025): MULTINETICS Nopember (2025) Vol. 11 No. 1 (2025): MULTINETICS Mei (2025) Vol. 10 No. 2 (2024): MULTINETICS Nopember (2024) Vol. 10 No. 1 (2024): MULTINETICS Mei (2024) Vol. 9 No. 2 (2023): MULTINETICS Nopember (2023) Vol. 9 No. 1 (2023): MULTINETICS Mei (2023) Vol. 8 No. 2 (2022): MULTINETICS Nopember (2022) Vol. 8 No. 1 (2022): MULTINETICS Mei (2022) Vol. 7 No. 2 (2021): MULTINETICS Nopember (2021) Vol. 7 No. 1 (2021): MULTINETICS Mei (2021) Vol. 6 No. 2 (2020): MULTINETICS Nopember (2020) Vol. 6 No. 1 (2020): MULTINETICS Mei (2020) Vol 6, No 1 (2020): Multinetics May (2020) Vol. 5 No. 2 (2019): MULTINETICS Nopember (2019) Vol 5, No 2 (2019): Multinetics Nopember (2019) Vol 5, No 1 (2019): MULTINETICS MEI (2019) Vol 5, No 1 (2019): MULTINETICS MEI (2019) Vol. 5 No. 1 (2019): MULTINETICS Mei (2019) Vol 4, No 2 (2018): MULTINETICS NOPEMBER (2018) Vol 4, No 2 (2018): MULTINETICS NOPEMBER (2018) Vol. 4 No. 2 (2018): MULTINETICS Nopember (2018) Vol. 4 No. 1 (2018): MULTINETICS Mei (2018) Vol 4, No 1 (2018): MULTINETICS MEI (2018) Vol. 3 No. 2 (2017): MULTINETICS Nopember (2017) Vol 3, No 2 (2017): MULTINETICS NOPEMBER (2017) Vol 3, No 1 (2017): MULTINETICS Mei (2017) Vol. 3 No. 1 (2017): MULTINETICS Mei (2017) Vol. 2 No. 2 (2016): MULTINETICS Nopember (2016) Vol 2, No 2 (2016): MULTINETICS Nopember (2016) Vol. 2 No. 1 (2016): MULTINETICS Mei (2016) Vol 2, No 1 (2016): MULTINETICS Mei (2016) Vol 1, No 2 (2015): MULTINETICS Nopember (2015) Vol. 1 No. 2 (2015): MULTINETICS Nopember (2015) Vol 1, No 1 (2015): MULTINETICS Mei (2015) Vol. 1 No. 1 (2015): MULTINETICS Mei (2015) More Issue