JISKa (Jurnal Informatika Sunan Kalijaga)
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Articles
221 Documents
Pengembangan Aplikasi Computer Based Test dengan Protokol Two Central Facilities
Muhannad Nasyithul Ibad
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1929.728 KB)
|
DOI: 10.14421/jiska.2020.43-02
The Indonesian government has issued a policy on Ujian Nasional Berbasis Komputer (UNBK), or it can be called CBT (Computer Based Test). In this study is the development of the CBT system using the Two Central Facilities protocol, which consists of the Central Legitimization Agency (CLA) and the Central Tabulating Facilities (CTF). In developing this CBT system, CLA is used to authenticate the examinees, while CTF is used to provide questions and calculation of exam answers. To maintain security added encryption using the RSA Algorithm (Rivest-Shamir-Adleman) which functions to convert data into ciphertext. From the results of functional trials, this system has succeeded in applying the Two Central Facilities protocol. This system has been connected to the CLA and CTF servers and all data has been successfully encrypted. For this reason, in the future schools will be endeavored to implement the development of the CBT system to avoid fraud.
Aplikasi Pemberitahuan Rapat pada STMIK Dumai Berbasis SMS Gateway
Putri Yunita;
Masrizal Masrizal;
Fitri Pratiwi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1092.384 KB)
|
DOI: 10.14421/jiska.2020.52-01
Short Message Service (SMS) is a technology that provides service for sending and receiving messages between cell phones. Every individual, government, private or educational institution cannot be separated from using SMS as one of the information media. One of them is meeting notification information. But SMS technology can only carry limited data. SMS Gateway is a system that bridges mobile phones with the system that becomes a server with SMS as the information. In the SMS Gateway work system, the user's cellular phone sends an SMS containing the written format to access the information needed through the GSM network. The SMS will be received by the SMS Gateway cellular phone which will then be retrieved by the PC using the mfbus protocol via a data cable. Up to the PC, the text format will be processed by the SMS Gateway application program to produce information that will be sent to the SMS Gateway cellular phone using the mfbus protocol via a data cable. After that the information is sent by the SMS Gateway cellular phone to the user's cellular phone. With the SMS Gateway-based meeting notification application, it can provide detailed and concurrent notification of meeting information so that each meeting member can follow according to his schedule.
Pengembangan Sistem Informasi Industri Jasa Menjahit Online Berbasis Web Menggunakan Metode Waterfall
Elsa Oktavia;
Yulindon Yulindon;
Rahmat Hidayat
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (558.021 KB)
|
DOI: 10.14421/jiska.2020.52-06
Information systems are currently increasing very rapidly, but it is unfortunate if the utilization is not yet optimal. Reviewing the data from literature studies and observations that have been made, many people need sewing services. The drastic increase in demand makes competition in the convection industry. Most of the work systems in the convection industry are done manually and are not economical. Product development also lacks creativity. Therefore, this researcher will use IT as marketing and design work, this can make processing time shorter and more optimal. Thus, customers will be facilitated in ordering ready-made clothes or clothes that match the customer's wishes by using a web application that only sends data on the size of the clothes or clothing model that the customer wants. This web-based application system can make it easier for customers to transact with the owner and transactions do not have to meet face to face. In addition, clothing sales and large-scale orders can be neatly organized and financial reports can be well structured and organized clearly. The results of this research will be in the form of research reports and web-based online sewing service information systems using the waterfall method.
System Design Estimation of Cost for Laying Chicken Feed Formulation using Web-Based Square Pearson Method
Anton Setiawan Honggowibowo;
Astika Ayuningtyas;
Yuliani Indrianingsih
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (955.408 KB)
|
DOI: 10.14421/jiska.2020.52-07
Feed is one important element that needs to be considered in the livestock business, one of which is laying hens. The type and amount of feed will affect the nutrients obtained, these nutrients will affect the ability to produce eggs. One way to produce feed that contains optimal nutrition is done by mixing various types of feed ingredients such as corn, bran, cake, soybeans, concentrate and so on into one right composition. Expenditures for the purchase of feed are also among the highest expenses in any livestock business and therefore need to be regulated in such a way as to provide optimal benefits. The square pearson method is a method of determining the formulation of feed which on one hand contains complete nutrients, on the other hand is economically inexpensive and easily obtained so that it can provide benefits. The results of this study produce a system that can estimate the cost of calculating web-based laying hens feed formulations.
Perbandingan Algoritma Contraharmonic Mean Filter dan Arithmetic Mean Filter untuk Mereduksi Exponential Noise
Mhd Furqan;
Sriani Sriani;
Yuli Kartika Siregar
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (501.948 KB)
|
DOI: 10.14421/jiska.2020.52-05
Noise in the image caused a decrease in image quality, so that the image will look dirty and spots appear on the resulting image. Noise also results in reduced information on the resulting image so that noise limits valuable information when image analysis is performed. Filtering technique is one way to overcome noise. The filtering technique used in this study is using the Contraharmonic Mean Filter algorithm and the Arithmetic Mean Filter algorithm with the type of noise used to reduce the Exponential Noise. The results of the two algorithms show that the Arithmetic Mean Filter algorithm is a better algorithm to reduce the Exponential Noise compared to the Contraharmonic Mean Filter algorithm which is proven based on the value of MSE (Mean Square Error) and PSNR (Peak Signal-to-Noise Ratio).
Aplikasi Manajemen Surat Masuk dan Surat Keluar Berbasis Mobile di Perum Bulog Subdivre Dumai
Rahmat Hidayatullah;
Vivi Asmawati;
Deasy Wahyuni
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (962.048 KB)
|
DOI: 10.14421/jiska.2020.52-02
Letters are a means of communication used to convey written information by one party to other parties both related to business and non-business activities. Handling and managing letters, both incoming and outgoing letters at the Perum Bulog Subdrivre Dumai are still done manually. Where incoming and outgoing letters are recorded in the agenda book. Therefore, a mobile-based incoming and outgoing mail management application was designed at the Perum Bulog Subdivre Dumai using a laravel framework with the Hypertext Preprocessor (PHP 7.1.3) programming language and JavaScript. For mobile devices built using the Native React Framework. The application can facilitate the information of incoming mail to the leadership, facilitate the allocation of follow-up and disposition of incoming mail in the relevant fields, facilitate approval of outgoing letters to the leadership and accelerate the search for data.
Implementasi Data Mining pada Penjualan Kartu Perdana Internet di Purnama Ponsel Menggunakan Metode Algoritma Apriori
Sukri Adrianto;
Nur Khasanah;
Deasy Wahyuni
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (499.2 KB)
|
DOI: 10.14421/jiska.2020.52-03
Purnama Ponsel is a mobile business which is engaged in selling internet starter packs. Internet starter packs are cards that are used with restrictions or limits on internet usage, where by using this internet starter pack the user can save credit because all activities use quotas except telephone (voice calls) and Short Message Service (SMS). Some companies compete by issuing internet premieres so as to reduce access costs. This competition can be seen from the number of internet starter packs that are sold simultaneously and know the inventory for the next month. So to facilitate the calculation of cell phone owners using data mining with apriori algorithm method to complete this research. Using the apriori algorithm method can help mobile full moon owners in the calculation process on full moon cellphones using the Tanagra application and is expected to reduce the number of cards that expire and can predict how many card supplies are needed for the following month.
Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM
Muh Hajar Akbar;
Sunardi Sunardi;
Imam Riadi
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 2 (2020): September 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (969.618 KB)
|
DOI: 10.14421/jiska.2020.52-04
Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.
Rancang Bangun Sistem Informasi Manajemen Proyek Departemen IT PT. Pertamina UPMS V Surabaya
Yunita Ardilla;
Shinta Pramesti;
Dwi Sunaryono
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 3 (2020): November 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (649.833 KB)
|
DOI: 10.14421/jiska.2020.53-01
Department of IT M&T PT. Pertamina UPMS V Surabaya has currently implemented a management guideline based on COBIT 5.0 to support the process of monitoring and scheduling projects that will be implemented or currently being worked on PT. Pertamina UPMS V Surabaya. But in the process of implementing management guidelines, the department of IT M&T has not maximized the implementation of the monitoring and scheduling because it does not yet have a project management information system application. So far employees from the department of IT M&T use the process of monitoring and scheduling projects manually, namely by making a report in the form of an excel file for each progress of the projects. Of course, this is considered inefficient and often encounters human errors. Therefore, a web-based project management information system application was made, the application was built using the C3 programming language and Microsoft SQL Server database. Based on observation, it was concluding that the features available in the project management information system application had been running well and were able to meet the needs of users.
Analisis Kerentanan Serangan Cross Site Scripting (XSS) pada Aplikasi Smart Payment Menggunakan Framework OWASP
Imam Riadi;
Rusydi Umar;
Tri Lestari
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 5 No. 3 (2020): November 2020
Publisher : UIN Sunan Kalijaga Yogyakarta
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (488.364 KB)
|
DOI: 10.14421/jiska.2020.53-02
E-commerce that is growing so rapidly can provide space for unauthorized parties in carrying out cybercrime, security anticipation is needed so that e-commerce applications can be protected from harassment or hacking attacks such as cross-site scripting (XSS), malware, exploits, and database injection. This research was conducted to determine the vulnerability of the Smart Payment application by self-test using the ZAP tool. This test is carried out to secure applications that serve as recommendations for follow-up in securing the Smart Payment application. The results of this study found vulnerabilities in the Smart Payment application. Vulnerabilities found were Information Disclosure-Suspicious Comments, X-Frame-Options Header not Set, X-Content-Type-Options Header Missing, Timestamp Disclosure-Unix, XSS Protection Not Enabled Web Browsers, and Directory Browsing. In addition to obtaining vulnerabilities from the Smart Payment application, solutions are also provided to overcome vulnerabilities in the Smart Payment application.