cover
Contact Name
Muhammad Nur Faiz
Contact Email
faiz@pnc.ac.id
Phone
+6282324039994
Journal Mail Official
jinita.ejournal@pnc.ac.id
Editorial Address
Department of Informatics Engineering Politeknik Negeri Cilacap Jln. Dr.Soetomo No.01 Sidakaya, Cilacap, Indonesia
Location
Kab. cilacap,
Jawa tengah
INDONESIA
Journal of Innovation Information Technology and Application (JINITA)
ISSN : 27160858     EISSN : 27159248     DOI : https://doi.org/10.35970/jinita.v2i01.119
Software Engineering, Mobile Technology and Applications, Robotics, Database System, Information Engineering, Interactive Multimedia, Computer Networking, Information System, Computer Architecture, Embedded System, Computer Security, Digital Forensic Human-Computer Interaction, Virtual/Augmented Reality, Intelligent System, IT Governance, Computer Vision, Distributed Computing System, Mobile Processing, Next Network Generation, Natural Language Processing, Business Process, Cognitive Systems, Networking Technology, and Pattern Recognition
Articles 160 Documents
Sistem Informasi Bank Sampah di Bank Sampah Enviro’18 Qonita Fildzah; Cahya Vikasari; Nur Wahyu Rahadi
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (447.338 KB) | DOI: 10.35970/jinita.v4i1.1053

Abstract

Waste Bank is a business The Enviro'18 entity engaged in the social sector that manages and utilizes waste with the aim of maintaining the environment and welfare in the surrounding community. Processes related to activities that can be carried out in the waste bank, such as customer registration, sales of waste, withdrawal of customer balances, preparation of waste sales reports. There are shortcomings in the waste bank process, where all processes are carried out manually and there is no system to facilitate the process. To overcome this, we need a web-based information system that aims to assist in managing customer data and waste data. Making this system using the System Development Life Cycle method with a prototype model. Based on the results of blackbox testing, it can be ensured that the system created can help make it easier for customers to register and view catalogs and make it easier for waste banks to collect waste data and manage data. Broadly speaking, from the test results, all system functionality can run well. This can be proven in process testing and can also be proven in the questionnaire analysis process which shows the functionality of the system that has been built is considered quite good in supporting the processes that run in the enviro'18 waste bank.
Metode Weighted Product Pada Pendukung Keputusan Pemilihan Pengurus Himpunan Mahasiswa Hani Hidayati; Ratih Hafsarah Maharrani; Lutfi Syafirullah; Muhammad Nur Faiz
Journal of Innovation Information Technology and Application (JINITA) Vol 4, No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (21.112 KB) | DOI: 10.35970/jinita.v4i1.1281

Abstract

The Department of Student Association (HMJ) is a student organization at the department level in a university which is an extracurricular activity. HMTI or Informatics Engineering Student Association is one of the HMJ at the Politeknik Negeri Cilacap (PNC). HMTI certainly has a vision and mission, therefore, in order to realize the vision and mission, candidates for management are needed according to the expected criteria. The criteria for determining the decision making of HMTI management include organizational experience, psychology, public speaking, self-confidence, having a warning letter (SP) and IPK. This problem was overcome by making a Decision Support System for the recruitment of HMTI management using the weighted product method. This system makes it easy for HMTI coaches and administrators to determine the candidate for the board. Decision Support System (DSS) is an application of information systems aimed at assisting leaders in the decision-making process. This study resulted in recommendations for prospective HMTI PNC administrators who through optimization of the weighted product method with various criteria used had the highest value, so that they became a reference for HMTI supervisors and administrators to choose candidates for the following year.
End-User Computing Satisfaction on Digital Trade Facilitation in the Philippines Romer C. Castillo; Heizel P. De Villa; Emmanuel C. Encinas; Jesserey Joyce D. Hernandez; Marvic M. Mandocdoc
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (42.021 KB) | DOI: 10.35970/jinita.v4i1.1102

Abstract

Digital trade facilitation is increasingly becoming essential in a modern customs environment. Many countries have started computerizing and automating their trade procedures, the success of which depends upon their government’s information technology development. In usability perspective, the most appropriate success measure of an information system is the end-users’ satisfaction. This study assessed the end-user computing satisfaction (EUCS) on digital trade facilitation in the Philippines, known as electronic to mobile (e2m) system. This also determined the profile of e2m clients and the differences on their satisfaction. This further established correlations among the dimensions of EUCS. The study is a descriptive-survey research, which used a valid and reliable EUCS questionnaire. The respondents consisted of 49 e2m clients who were selected conveniently. Statistical tests employed were Mann-Whitney U-Test, Kruskal-Wallis H-Test, and Spearman’s Correlation. Results showed that majority of respondents are customs brokers, most are 4-6 years in profession, and with more than 10 transactions in a month. The end-users were generally satisfied on the total EUCS, as well as in content, accuracy, and timeliness, while they were very satisfied in format, and ease of use. Results also revealed that there are significant differences on clients’ satisfaction on format when grouped to profession, on ease of use when grouped to years in profession, and on accuracy and total EUCS when grouped to number of transactions in a month. All the five EUCS dimensions have significant positive moderate to strong correlations with each other.
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda Fredrick Kanobe; SP Sambo; Billy Mathias Kalema
Journal of Innovation Information Technology and Application (JINITA) Vol 4, No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.714 KB) | DOI: 10.35970/jinita.v4i1.1292

Abstract

The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda. The study was motivated by the continuous information security governance challenges in the Public Cloud.  The theoretical frameworks that underpinned this study included; Contingency management theory,  the Risk Management framework, the Technological Organisational and Environmental (TOE) model and the Information Security Governance model.  This study adopted a quantitative research approach to obtain data through a survey. Five key factors for information security governance were identified: a) Technological factors: flexibility, scalability, availability, agility, data protection governance, trust of cloud, data source, maintenance, data retention and policy.  b) Organisation: size and structure of the organisation, top management support. c) Environmental factors: governance and regulation, marketing, vendor, resource availability, obsoleteness.  d) Individual: user resistance, attitude, skills, belief and learnability. e) Risk management and control factors: risk assessment, disaster recovery, access and authorisation control, monitoring, auditing, and process risk control. The study contributes to theory and practice in information security. The developed framework and its accompanying model helped to inform public departments, organisational top management and information security strategies to avoid excessive information risks and potential regulatory compliance failures in public cloud. The study was inclined on subjective information security, which alone may not fully address all information security problems in a public cloud. Therefore, it is recommendable that future research studies on objective security in public cloud
Pemanfaatan Teknologi Informasi untuk Peningkatan Pelayanan pada UPT TIK Politeknik Negeri Cilacap Laely Fitri Is Dahlia; Andriansyah Zakaria; Dwi Novia Prasetyanti
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (644.392 KB) | DOI: 10.35970/jinita.v4i1.840

Abstract

Implementation of Forward Chaining for Diagnosis of Dengue Hemorrhagic Fever Isa Bahroni; Nur Wahyu Rahadi; Linda Perdana Wanti; Antonius Agung Hartono; Riyadi Purwanto
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (697.594 KB) | DOI: 10.35970/jinita.v4i1.1204

Abstract

Insects in the form of mosquitoes are transmitting vectors of several types of diseases that are quite dangerous and need to be watched out for because they can be deadly, such as dengue fever mosquitoes, malaria, elephantiasis and the like. Patients suffering from mosquito-borne diseases must be treated immediately to find out the type of disease they are suffering from and their treatment solutions. The era of digitalization that is growing rapidly, including in the field of medical science, makes the use of information technology to help improve quality services for the community. The analysis used in this research is using the forward chaining method, as a comparison of the overall process of the problems obtained in the investigation and developed using the waterfall paradigm. Forward chaining is implemented because the disease diagnosis process begins by observing the symptoms experienced by a patient and then continues with a tracing process that results in conclusions about the dengue fever suffered. While the waterfall method is used in the development of this expert system because the method can accommodate all stages of the system starting from the analysis of functional and non-functional system requirements, system design, coding, expert system testing and the last stage is expert system maintenance. The data used in this study used data from patients infected with mosquito bites at the Maos Health Center, Cilacap Regency in 2021. Testing is carried out using the black box testing method where the expert system is tested on end-users to determine the level of success and usability of the developed system. The questionnaire was given to 76 respondents with the results of the questionnaire: 91.9% indicating the level of user satisfaction, 89.6% indicating the level of effectiveness and 92.2% indicating the level of efficiency of the expert system. The output of this study is the conclusion of the disease suffered by the patient and the solution for handling it. The results of this study were used by the Puskesmas to determine the actions and therapies that were taken and carried out on the patient
Penerapan Metode Median Filtering untuk Optimasi Deteksi Wajah pada Foto Digital Sunardi; Anton Yudhana; Setiawan Ardi Wijaya
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (771.371 KB) | DOI: 10.35970/jinita.v4i1.1424

Abstract

Face detection in digital photos aims to get the face area in the photo. Problems often occur when detecting faces, namely there is a lot of noise in digital photos so that it affects the detection process. Therefore, in this study apply the median filtering method to improve digital photos by reducing noise in the photos to be tested. The advantage of using this filter is to keep the edges smooth while reducing noise which aims to improve image quality. The ability of this method is measured using the parameters of Mean Square Error (MSE) and Peak Noise to Signal Ratio (PNSR). When the MSE value obtained is low and the PNSR value obtained is high, the results can be said to be good. The method used to detect faces in this research, viola-jones, was chosen because it is one of the face detection procedures with a high level of accuracy and good computational ability. The sample used in this study consisted of 10 digital photos taken using a Samsung A11 smartphone camera with a resolution of 13 mega pixels and 8 mega pixels in JPEG format. The results obtained in this study are the best error values in MSE 0.9517 and PSNR 24.2804. Based on these results, it can be concluded that the mean filtering method is feasible to be used in the case of face detection in this digital photo
Implementasi Raspberry Pi untuk membantu Klinik dan Pengembangan Website Klinik menggunakan Rapid Application Development Mochammad Haldi Widianto; Della Ihsanti Kusnadi
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (367.169 KB) | DOI: 10.35970/jinita.v4i1.1425

Abstract

One of the Internet of Things (IoT) components is a microcontroller. One of the many microcontrollers is the Raspberry Pi. This component is often used because it is similar to a small computer. Many people use Rapid Application Development (RAD) in making web-based applications because it is considered very flexible and can iterate on the design and development section. There are several studies related to utilizing website development to help hospitals. However, the real problem is that the use of technology such as clinical information websites has not been widely used for small clinics. This is hampered by the location of the clinics, which are far from the urban center. This study has a goal to develop a website application with the help of a Raspberry Pi. This component works as a computer replacement medium (having wifi and a processor) applied to clinical LED TV because there is no computer to display it, and making the administration of the website itself tested by testing and evaluation using Black Box and User Acceptance Test (UAT). In testing and evaluation, it was found that 5 trials of Black Box testing got good results with all categories achieved. 76.13% of UAT results are included in the "Satisfied" category on the UAT test where the best result is "Very Satisfied". Furthermore, research has not focused on the actual application of IoT and needs to be studied more deeply in making IoT integrated with the website
Metode Weighted Product Pada Pendukung Keputusan Pemilihan Pengurus Himpunan Mahasiswa Hani Hidayati; Ratih Hafsarah Maharrani; Lutfi Syafirullah; Muhammad Nur Faiz
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (442.549 KB) | DOI: 10.35970/jinita.v4i1.1426

Abstract

The Department of Student Association (HMJ) is a student organization at the department level in a university which is an extracurricular activity. HMTI or Informatics Engineering Student Association is one of the HMJ at the Politeknik Negeri Cilacap (PNC). HMTI certainly has a vision and mission, therefore, in order to realize the vision and mission, candidates for management are needed according to the expected criteria. The criteria for determining the decision making of HMTI management include organizational experience, psychology, public speaking, self[1]confidence, having a warning letter (SP) and IPK. This problem was overcome by making a Decision Support System for the recruitment of HMTI management using the weighted product method. This system makes it easy for HMTI coaches and administrators to determine the candidate for the board. Decision Support System (DSS) is an application of information systems aimed at assisting leaders in the decision-making process. This study resulted in recommendations for prospective HMTI PNC administrators who through optimization of the weighted product method with various criteria used had the highest value, so that they became a reference for HMTI supervisors and administrators to choose candidates for the following year
Information Security Governance Framework in Public Cloud a Case in Low Resource Economies in Uganda Fredrick Kanobe; SP Sambo; Billy Mathias Kalema
Journal of Innovation Information Technology and Application (JINITA) Vol 4 No 1 (2022): JINITA, June 2022
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.443 KB) | DOI: 10.35970/jinita.v4i1.1427

Abstract

The study aimed at exploring the critical enablers to the development and usage of information security governance frameworks for cloud computing in Uganda. The study was motivated by the continuous information security governance challenges in the Public Cloud. The theoretical frameworks that underpinned this study included; Contingency management theory, the Risk Management framework, the Technological Organisational and Environmental (TOE) model and the Information Security Governance model. This study adopted a quantitative research approach to obtain data through a survey. Five key factors for information security governance were identified: a) Technological factors: flexibility, scalability, availability, agility, data protection governance, trust of cloud, data source, maintenance, data retention and policy. b) Organisation: size and structure of the organisation, top management support. c) Environmental factors: governance and regulation, marketing, vendor, resource availability, obsoleteness. d) Individual: user resistance, attitude, skills, belief and learnability. e) Risk management and control factors: risk assessment, disaster recovery, access and authorisation control, monitoring, auditing, and process risk control. The study contributes to theory and practice in information security. The developed framework and its accompanying model helped to inform public departments, organisational top management and information security strategies to avoid excessive information risks and potential regulatory compliance failures in public cloud. The study was inclined on subjective information security, which alone may not fully address all information security problems in a public cloud. Therefore, it is recommendable that future research studies on objective security in public cloud.

Page 6 of 16 | Total Record : 160