cover
Contact Name
Muhammad Taufiq Nuruzzaman
Contact Email
m.taufiq@uin-suka.ac.id
Phone
+6287708181179
Journal Mail Official
jiska@uin-suka.ac.id
Editorial Address
Teknik Informatika, Fak. Sains dan Teknologi, UIN Sunan Kalijaga Jln. Marsda Adisucipto No 1 55281 Yogyakarta
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
JISKa (Jurnal Informatika Sunan Kalijaga)
ISSN : 25275836     EISSN : 25280074     DOI : -
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Arjuna Subject : -
Articles 221 Documents
Rancang Bangun Sistem Informasi Penyediaan Air Minum dan Sanitasi Berbasis Masyarakat (PAMSIMAS) dengan Metode Extreme Programming Maria Ulfa Siregar; Hamid Musafa
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (516.967 KB) | DOI: 10.14421/jiska.2019.42-02

Abstract

Pamsimas or Penyediaan Air Minum dan Sanitasi Berbasis Masyarakat, is a government program for rural communities that greatly helps the village government to provide water and sanitation needs for society. Therefore the management of Pamsimas becomes very necessary and important. But unfortunately the management of Pamsimas at the village level still uses manual methods. It really requires a lot of time and energy, given the large amount of data that must be managed in Pamsimas. This research has the purpose of creating a digital system that is able to makes management process of Pamsimas more effective and efficient of time, effort and costs, with web base PHP programming language and MySQL database. The development method used in this study is extreme programming method. This method was chosen because it has good feedback or communication between the developer and client. Furthermore this methods whose stages are simple and also more flexible to the changes that occur. The results of this research are a web-based digital information system that could make the process of managing data in Pamsimas more effective and efficient, because this system is able to make reports and calculate bills automatically. So that the previous time spent by many managers becomes less, and because of that the energy spent is more effective.Keywords : Web Application, Information System, PAM System, PAM System Information, Laravel, Extreme Programming.
Penerapan Algoritma Hill Cipher dan Least Significant Bit (LSB) untuk Pengamanan Pesan pada Citra Digital Desimeri Laoli; Bosker Sinaga; Anita Sindar R M Sinaga
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (909.824 KB) | DOI: 10.14421/jiska.2020.43-01

Abstract

Nowadays people exchange information in digital media such as text, audio, video and imagery. The development of Information and Communication makes the delivery of information and data more efficient. Current developments in technology which are very significant have an impact on the community in exchanging information and communicating. Confidential hidden data can also be in the form of image, audio, text, or video. The Hill Chiper algorithm uses a matrix of size m x m as a key for encryption and decryption. One way to recover the original text is of course to guess the decryption key, so the process of guessing the decryption key must be difficult. break ciphertext into palintext without knowing which key to use. The LSB part that is converted to the value of the message to be inserted. After affixing a secret message, each pixel is rebuilt into a whole image that resembles the original image media. The Hill Cipher algorithm is used to determine the position of the plaintext encryption into a random ciphertext. 2. Testing text messages using the hill cipher algorithm successfully carried out in accordance with the flow or the steps so as to produce a ciphertext in the form of randomization of the letters of the alphabet.   
Sistem Pakar Diagnosa Penyakit Pohon Karet dengan Metode Certainty Factor Anita Sindar R M Sinaga
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (13.347 KB) | DOI: 10.14421/jiska.2019.42-03

Abstract

The low production of smallholder rubber is caused by various factors, one of the causes is interference from various diseases. Building a system (computer) that is intelligent to analyze problems, observe the work system of an expert or expert. Expertise comes from the development of knowledge of someone who is competent and directly provides instructions to solve a problem. Certainty Factor is a method to prove whether a fact is certain or not certain in the form of metrics that are usually used in expert systems. This method is very suitable for expert systems that diagnose something that is uncertain. To apply the Certainty Factor method to the expert system, data is needed that will be input into the system, processed and display the results of the diagnosis of rubber plant diseases.  Input: rubber plant disease type data and disease symptom data. Process: carry out analysis and calculation to get the diagnosis results using the Certainty Factor method. Output: information on the diagnosis of rubber plant diseases and percentage of confidence level in the diagnosis results in accordance with the rules of the Certainty Factor method. Keywords : Rubber Disease, Symptoms Diagnosis, Value Combination, Certainty Factor   
Metode Iterasi Tiga Langkah untuk Menyelesaikan Persamaan NonLinear dengan Menggunakan Matlab Deasy Wahyuni; Elisawati Elisawati
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (355.022 KB) | DOI: 10.14421/jiska.2019.42-05

Abstract

Newton method is one of the most frequently used methods to find solutions to the roots of nonlinear equations. Along with the development of science, Newton's method has undergone various modifications. One of them is the hasanov method and the newton method variant (vmn), with a higher order of convergence. In this journal focuses on the three-step iteration method in which the order of convergence is higher than the three methods. To find the convergence order of the three-step iteration method requires a program that can support the analytical results of both methods. One of them using the help of the matlab program. Which will then be compared with numerical simulations also using the matlab program.  Keywords : newton method, newton method variant, Hasanov Method and order of convergence
Deteksi Serangan Distributed Denia of Services (DDOS) Berbasis HTTP Menggunakan Metode Fuzzy Sugeno Nadila Sugianti; Yayang Galuh; Salma Fatia; Khadijah Fahmi Hayati Holle
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.622 KB) | DOI: 10.14421/jiska.2020.43-03

Abstract

Distributed Denial of Services (DDOS) is a type of attack that exploits the web. This attack causes the server to go down and a system error. Thus, early detection of DDOS attacks is fundamental. The purpose of this paper is to develop applications that are capable of detecting HTTP-based DDOS attacks. This paper uses the sugeno fuzzy method for a systematic approach. From several studies that have been conducted, the researchers identified that the optimal input variables included the number of users, number of packages, number of lengths / users, and length of packages. Data processing used MATLAB software. The validity of the test uses the formula for the level of accuracy as in equation (3), resulting in an application that is able to detect HTTP-based DDOS attacks using sugeno fuzzy method with an accuracy rate of up to 90%.
Aplikasi Tata Tertib Berdasarkan Poin untuk Pelanggaran Siswa pada Sekolah Menengah Atas Pulla Pandika Widodo
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (545.779 KB) | DOI: 10.14421/jiska.2019.42-04

Abstract

Schools are A tool to gain formal education. Schools have rules that must be followed, these rules are called the Code of Conduct. This code of conduct is binding and has sanctions based on points for each violation. Each student is given a book that contains school rules that must be followed. If a violation is committed by a student, the teacher who processes it will mark the violation committed in the code of conduct book. This book is held by each student, of course this is very risky, if this book is lost it can be difficult for the teacher who will process other student violations if the student commits another violation. So because it is designed an application that can manage this order so that no longer need the code of conduct held by each student. Each violation will be input directly by the teacher who processes it into the application and the number of points will increase along with the number of violations committed by students
Journal Classification Based on Abstract Using Cosine Similarity and Support Vector Machine Muhammad Habibi; Puji Winar Cahyo
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2072.722 KB) | DOI: 10.14421/jiska.2020.43-06

Abstract

One of the problems related to journal publishing is the process of categorizing entry into journals according to the field of science. A large number of journal documents included in a journal editorial makes it difficult to categorize so that the process of plotting to reviewers requires a long process. The review process in a journal must be done planning according to the expertise of the reviewer, to produce a quality journal. This study aims to create a classification model that can classify journals automatically using the Cosine Similarity algorithm and Support Vector Machine in the classification process and using the TF-IDF weighting method. The object of this research is abstract in scientific journals. The journals will be classified according to the reviewer's field of expertise. Based on the experimental results, the Support Vector Machine method produces better performance accuracy than the Cosine Similarity method. The results of the calculation of the value of precision, recall, and f-score are known that the Support Vector Machine method produces better amounts, in line with the accuracy value.
Desain dan Implementasi Simulasi Intrusion Index Berbasis Sistem Pakar dengan Metode Forward Chaining Mardian Mardian; H. Jemakmun; Linda Atika
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 3 (2020): Januari 2020
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2013.036 KB) | DOI: 10.14421/jiska.2020.43-04

Abstract

Adanya kebutuhan internet yang semakin meningkat, ketertarikan dan perhatian pada internet juga semakin luas dan cepat sehingga harus diseimbangi dengan keamanan yang lebih cepat pada jaringan internet, terutama  dari hal gangguan serangan atau akses ilegal pada jaringan internet. Keamanan jaringan bergantung pada kecepatan pengaturan jaringan dalam hal menindaklanjuti sistem saat terjadi gangguan. Untuk itu diperlukan suatu perangkat lunak yang mampu melakukan deteksi dan pengukuran serangan dengan menggunakan sistem pakar. Hasil dari desain dan simulasi yang dilakukan dalam penelitian ini dapat menggambarkan cara atau alur penggunaan sistem dari pengelola yang menjadi aktor, memperlihatkan cara aliran informasi mengalir dalam suatu sistem serta dapat memberikan gambaran sistem secara statis yang memperlihatkan relasi atau hubungan antarkelas yang saling berkaitan mengenai sistem informasi sistem pakar untuk keamanan jaringan internet dan penerapan intrusion index yang dapat menggolongkan jenis serangan ke dalam tiga tingkatan yaitu deflect, prevent, dan preempt dengan menerapkan mesin inferensi ke dalam metode forward chaining.  
Metode HLF untuk Deteksi Objek Terapung pada Permukaan Sungai Martapura Nahdi Saubari; Mukhaimy Gazali; Rudy Ansari
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (499.596 KB) | DOI: 10.14421/jiska.2019.42-06

Abstract

Haar Like Feature (HLF) merupakan metode deteksi objek terbaru yang dapat menghasilkan kualitas visual yang lebih baik. Bila dibandingkan dengan metode deteksi objek lainnya, HLF cenderung lebih sering digunakan untuk mendeteksi wajah manusia, dan baru beberapa kali digunakan untuk deteksi objek bergerak. Objek pada permukaan sungai memiliki kecenderungan mengapung, bergerak, rata-rata berupa transportasi air maupun objek lainnya seperti sampah yang dapat mengganggu perairan sungai. Penelitian ini bertujuan menerapkan metode HLF untuk deteksi objek terapung pada permukaan sungai Martapura dengan menggunakan dua kamera yang memiliki kualitas hasil citra yang berbeda. Objek terapung yang terdeteksi dapat menjadi data yang berguna untuk  menjaga keamanan perairan sungai. Citra pertama diambil menggunakan kamera smartphone, spesifikasi 16 Megapixel, sedangkan citra kedua menggunakan kamera mirrorless, spesifikasi 24 Megapixel. Hasil penelitian menunjukkan bahwa deteksi objek terapung dengan menggunakan kamera smartphone, memiliki persentase keberhasilan 0%. Deteksi objek dengan menggunakan kamera mirrorlesss memiliki keberhasilan 65,5%. Kualitas hasil pixel pada citra sangat berpengaruh terhadap tingkat keberhasilan metode HLF untuk deteksi objek terapung pada sungai Martapura.
Analisa Clustering pada Data Pelanggaran Lalu Lintas di Pengadilan Negeri Dumai Dengan Menggunakan Metode K-Means Elisawati Elisawati; Deasy Wahyuni; Adi Arianto
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 4 No. 2 (2019): September 2019
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (660.852 KB) | DOI: 10.14421/jiska.2019.42-01

Abstract

The order of traffic on the road is very important for motorists on the highway, the lack of awareness of motor vehicle users and the poor drivers of traffic discipline make the level of traffic violations in driving on the highway always increase so that the number of ticket data received by the Dumai District Court. This research was conducted to analyze and classify data violations using the k-means method to facilitate knowing the types of violations that are often violated by vehicle users. The attributes to be analyzed are the types of violations and types of vehicles. The test was carried out using the Rapidminer 5 application where the data tested was data from the Dumai District Court on December 2017, as many as 616 violations. Central cluster data consists of 3 clusters, namely C1 = Many, C2 = moderate and C3 = few who commit traffic violations. So the results of the data obtained where C1 produces 1 data, C2 gets as much as 4 data and C3 as many as 7 data. Where the type of violation that is often violated is the type of violation that does not use a helmet and the type of vehicle is a motorcycle. From the results of this study can be used or can be followed up with the holding of socialization to reduce the number of traffic violations. Keywords: Clustering Analysis, K-Means, Traffic Violations, Rapidminer

Page 8 of 23 | Total Record : 221