cover
Contact Name
Muhammad Nur Faiz
Contact Email
faiz@pnc.ac.id
Phone
+6282324039994
Journal Mail Official
jinita.ejournal@pnc.ac.id
Editorial Address
Department of Informatics Engineering Politeknik Negeri Cilacap Jln. Dr.Soetomo No.01 Sidakaya, Cilacap, Indonesia
Location
Kab. cilacap,
Jawa tengah
INDONESIA
Journal of Innovation Information Technology and Application (JINITA)
ISSN : 27160858     EISSN : 27159248     DOI : https://doi.org/10.35970/jinita.v2i01.119
Software Engineering, Mobile Technology and Applications, Robotics, Database System, Information Engineering, Interactive Multimedia, Computer Networking, Information System, Computer Architecture, Embedded System, Computer Security, Digital Forensic Human-Computer Interaction, Virtual/Augmented Reality, Intelligent System, IT Governance, Computer Vision, Distributed Computing System, Mobile Processing, Next Network Generation, Natural Language Processing, Business Process, Cognitive Systems, Networking Technology, and Pattern Recognition
Articles 160 Documents
Application of the NIST 800-86 Framework to Forensic Digital Evidence for Signal and Litmatch Hapsari, Nurul Puspa; Parga Zen, Bita
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2025

Abstract

Exchanging messages is a routine that cannot be avoided at this time. With the development of technology, exchanging messages has become easier to do. The thing that makes exchanging messages easier is the instant messaging application. Examples of instant messaging applications are the Signal and Litmatch applications. In addition to the ease of exchanging messages, there are also negative impacts, such as threats and bullying. Forensic analysis is carried out to find and obtain evidence of digital crimes. This research was conducted to find and obtain evidence of Signal and Litmatch applications by conducting case scenarios and using the National Institute of Standards and Technology (NIST) 800-86 method. This study uses the MobilEdit Forensic and Autopsy tools to obtain evidence from the Signal and Litmatch applications.
Decision Making for The Most Outstanding Students Award using TOPSIS: a Case Study at Institut Teknologi Sumatera Pratama, Borneo Satria; Drantantiyas, Nike Dwi Grevika; Marvie, Ilham; Sembiring, Noveliska Br; Nadi, Muhammad Abi Berkah
Journal of Innovation Information Technology and Application (JINITA) Vol 5 No 2 (2023): JINITA, December 2023
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v5i2.2114

Abstract

The internal selection of Pemilihan Mahasiswa Berprestasi, or known as Pilmapres, is an annual competition held by Institut Teknologi Sumatera (ITERA) to award the most outstanding student of the year which will be further sent to compete in regional and national event of Pilmapres held by Balai Pengembangan Talenta Indonesia. This study aimed to implement TOPSIS as a decision-making tool to determine the winner of Pilmapres ITERA in 2023. The criteria used in this study were general achievements, English competencies, and creative ideas, with weight of 50, 20, and 30, respectively. The scores for the criteria for each of the students are obtained from nine members of the board of jury in the final stage of Pilmapres ITERA in 2023. The calculation result using TOPSIS concluded that the 1st, 2nd, and 3rd winners of the internal selection of Pilmapres ITERA in 2023 were Alpha, Beta, and Omega, with the final preference scores of 0.995, 0.799, and 0.795, respectively.
An AIoT-Based Automated Farming Irrigation System for Farmers in Limpopo Province Langa, Relebogile; Moeti, Michael Nthabiseng; Maubane, Thabiso
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2187

Abstract

Limpopo, one of South Africa's nine provinces, is mostly rural, where agriculture serves as the primary occupation for around 89 percent of the total population. Agriculture relies on water, making it its most valuable asset. Through irrigation, water is supplied to crops for growth, frost control, and crop cooling. Irrigation can occur naturally, as with precipitation, or artificially, as with sprinklers. However, artificial irrigation is wasteful as it is regulated and monitored through human intervention, leading to water scarcity which is one of the obstacles that threatens the agricultural sector in the province of Limpopo. A machine learning precipitation prediction algorithm optimizes water usage. The paper also describes a system with multiple sensors that detect soil parameters, and automatically irrigate land based on soil moisture by switching the motor on/off. The objective of this paper is to develop an automated farming irrigation system that is both efficient and effective, with the intention of contributing to the resolution of the water crisis in the province of Limpopo. The proposed solution ought to be capable of decreasing labour hours, generating cost savings, ensuring consistent and efficient water usage, and gathering informed data to inform future research. Thus, farmers will have greater access to information regarding when to irrigate, how much water to use, weather alerts, and recommendations. In acquiring these, the ARIMA model was applied alongside DSRM for implementing the mobile application. The results obtained indicate that the use of AI and IoT (AIoT) in agriculture can improve operational efficiency with reduced human intervention as there is real-time data acquisition with real-time processing and predictions.
A Classification Data Packets Using the Threshold Method for Detection of DDoS Sukma Aji; Davito Rasendriya Rizqullah Putra; Riadi, Imam; Fadlil , Abdul; Faiz , Muhammad Nur; Arif Wirawan Muhammad; Purwaningrum, Santi; Sari, Laura
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2224

Abstract

Computer communication is done by first synchronizing one computer with another computer. This synchronization contains Data Packages which can be detrimental if done continuously, it will be categorized as an attack. This type of attack, when performed against a target by many computers, is called a distributed denial of service (DDoS) attack. Technology and the Internet are growing rapidly, so many DDoS attack applications result in these attacks still being a serious threat. This research aims to apply the Threshold method in detecting DDoS attacks. The Threshold method is used to process numeric attributes so obtained from the logfile in a computer network so that data packages can be classified into 2, namely normal access and attack access. Classification results using the Threshold method after going through the fitting process, namely detecting 8 IP Addresses as computer network users and 6 IP addresses as perpetrators of DDoS attacks with optimal accuracy.
Website Penetration Analysis Against XSS Attacks using Payload Method Luthfi Arian Nugraha
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2225

Abstract

This research aims to analyze the effectiveness of various penetration testing methods in identifying and mitigating XSS (Cross-Site Scripting) vulnerabilities in web applications. XSS is a type of web security attack that takes advantage of weaknesses in web applications to insert malicious code into web pages displayed to users. This attack can steal user data, take over user sessions, or spread malware. This research uses a penetration testing method with a black-box approach, where the researcher does not know the construction of the system being tested. Tests were conducted on 10 random websites, including 5 open-source websites and 5 commercial websites. The test results show that the payload method used is effective in exploiting XSS vulnerabilities on some websites. Of the 10 websites tested, 6 of them were successfully exploited using different payload methods. This research highlights the importance of using open-source penetration testing tools in detecting and addressing security vulnerabilities in web applications. These tools are easy to implement, supported by extensive documentation, and have a strong community. This research also emphasizes the importance of a deep understanding of how penetration testing tools work to identify and address security vulnerabilities. To address XSS vulnerabilities, this research recommends good programming techniques such as programming language updates, use of OOP (Object-Oriented Programming), MVC (Model-View-Controller) concepts, and use of frameworks. Further research can be done to develop and test new payload methods, explore the use of other penetration testing tools, and test security vulnerabilities in other types of web applications.
Blockchain Based Donation Management in Disaster Response K C, Ankit
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2257

Abstract

Both natural and man-made disaster leave thousands of people in vulnerable and in need for essential aid. While individuals generously donate resources, traditional donation management systems suffer from limitations. Centralized control, opaque transactions, and potential corruption often hinder aid delivery and leave victims in despair. This paper proposes a novel Ethereum blockchain-based system for transparent and secure disaster donation management. Utilizing smart contracts, the system ensures traceability, accountability, and immutability of donations, empowering donors and fostering trust. This paper presents the system's architecture, detailing its components and interactions through sequence diagrams and algorithms. Additionally, successful testing on the Sepolia Ethereum testnet validates its functionality. To assess its effectiveness, a cost and security analysis is conducted. This blockchain-based framework offers a promising solution for transparent and efficient disaster response, potentially revolutionizing donation management. Further research, particularly on donation allocation optimization within the system holds immense potential for future development.
Performance Optimization in Three-Modality Biometric Verification using Heterogeneous CPU-GPU Computation Bopatriciat Boluma Mangata; Pierre Tshibanda wa Tshibanda; Guy-Patient Mbiya Mpoyi; Jean Pepe Buanga Mapetu; Rostin Mabela Matendo Makengo; Eugène Mbuyi Mukendi
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2286

Abstract

This paper proposes a method to improve the performance of tri-modal biometric verification using a heterogeneous computing system exploiting the synergy between CPU and GPU. The main objective is to reduce the time required for verification while maintaining the system's accuracy. The design of this system is based on a decision fusion algorithm based on the logical OR connector, enabling the results of the three modalities to be combined. The implementation is being carried out in C# with Visual Studio 2019, using the Task Parallel Library to parallelize tasks on the CPU, and OpenCL.NET to manage processing on the GPU. The tests carried out on a representative sample of 1,000 individuals, show a clear improvement in performance compared with a sequential system. Execution times were significantly reduced, ranging from 0.03 ms to 0.67 ms for data sizes between 50 and 1000. Analysis of the performance gains, based on Amdahl's law, reveals that the proportion of tasks that can be parallelized remains higher in heterogeneous systems than in parallel and sequential systems, even though part of processing remains sequential for large data sizes. This study highlights the ability of heterogeneous computing systems to effectively reduce the verification time of biometric systems while maintaining an optimal balance between processing speed and overall efficiency. The results demonstrate the potential of this approach for advanced biometric applications, particularly in distributed environments.
Implementation of Payment Gateway in the Mobile-Based Pawon Mbok`E Eating House Ordering System Fajar Mahardika; Ratih; R. Bagus Bambang Sumantri
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 1 (2024): JINITA, June 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i1.2289

Abstract

This paper discusses the implementation of a payment gateway in the mobile-based Pawon Mbok'E eating house ordering system. The integration of a payment gateway into mobile applications is crucial for facilitating secure and convenient transactions. Pawon Mbok'E aims to enhance customer satisfaction by enabling users to order food and make payments seamlessly through their mobile devices. Method research used is development system order mobile based with payment gateway integration. This implementation involves selecting an appropriate payment gateway, integrating it with the existing ordering system, ensuring security measures are in place, and testing for reliability and user-friendliness. The success of this implementation will provide Pawon Mbok'E customers with a streamlined ordering and payment process, thereby improving overall service efficiency and customer experience. Obtained testing reliability with amount respondents there are 65 as well percentage prove 100%, subject This show if 65 respondents That breast milk as well as No there is incoming respondents​ to type Excluded
Comparative Analysis of Keypoint Detection Performance in SIFT Implementations on Small-Scale Image Datasets Arif Rahman; Suprihatin; Imam Riadi; Tawar; Furizal
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2399

Abstract

Scale-invariant feature transform (SIFT) is widely used as an image local feature extraction method because of its invariance to rotation, scale, and illumination change. SIFT has been implemented in different program libraries. However, studies that analyze the performance of SIFT implementations have not been conducted. This study examines the keypoint extraction of three well-known SIFT libraries, i.e., David Lowe's implementation, OpenSIFT, and vlSIFT in vlfeat. Performance analysis was conducted on multiclass small-scale image datasets to capture the sensitivity of keypoint detection. Although libraries are based on the same algorithm, their performance differs slightly. Regarding execution time and the average number of keypoints detected in each image, vlSIFT outperforms David Lowe’s library and OpenSIFT.
Sentiment Analysis of Universitas Jember’s Sister for Student Application Using Gaussian Naive Bayes and N-Gram Mochamad Bagoes Alfarazi; Muhammad 'Ariful Furqon; Harry Soepandi
Journal of Innovation Information Technology and Application (JINITA) Vol 6 No 2 (2024): JINITA, December 2024
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v6i2.2400

Abstract

This research aims to classify sentiment in reviews of the Universitas Jember Sister for Student application on Google Play Store, a vital student platform. The primary challenge tackled is the automated identification of positive and negative user sentiments. The study employs the Gaussian Naive Bayes method for classification and uses N-Gram techniques for sentiment analysis. The dataset consists of 1097 reviews, with 673 negative and 424 positive reviews, after removing 86 neutral spam reviews. The data is divided into 80% training data (877 reviews) and 20% test data (220 reviews). Gaussian Naive Bayes is used for modeling and combined with TF-IDF vectorization. The findings reveal that the Gaussian Naive Bayes model achieves an accuracy of 68%, precision of 68%, and recall of 71% on the test data. N-Gram analysis shows frequent occurrences of words like "bisa", "bagus", and "aplikasi" in positive sentiments, while "bisa", "hp", and "absen" are prevalent in negative sentiments. The study concludes that the Gaussian Naive Bayes model effectively classifies sentiment in application reviews, with the potential for further performance improvements.