cover
Contact Name
Bahrawi
Contact Email
bahrawi@kominfo.go.id
Phone
+62411-4660084
Journal Mail Official
jitu.journal@mail.kominfo.go.id
Editorial Address
Jl. Prof. Abdurrahmah Basalamah II No. 25 Makassar 90231
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
Journal of Information Technology and Its Utilization
ISSN : -     EISSN : 2654802X     DOI : 10.56873
Journal of Information Technology and its Utilization adalah jurnal yang diterbitkan oleh Balai Besar Pengembangan Sumber Daya Manusia dan Penelitian (BBPSDMP Kominfo) Makassar. Bertujuan untuk menyebarluaskan hasil penelitian, kajian, rencangan ilmiah dibidang teknologi informasi dan pemanfaatannya. scope: data mining, Iot, Ai, digital processing, information system
Articles 77 Documents
Parallel Matrix Multiplication Algorithms Acquire Connected Network Motifs Efendi Zaenudin; Ka-Lok Ng
Journal of Information Technology and Its Utilization Vol 6 No 1 (2023): June 2023
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The network of interactions between biomolecules is essential to biological processes. Many studies have shown that molecular networks can be analyzed by breaking them down into smaller modules known as network motifs. We hypothesize that identifying the set of possible 5-node motifs and 6-node motifs embedded in a network is a necessary step to elucidate the complex topology of a network. Accomplishing this goal requires determining the complete set of motifs that are composed of five and six connected nodes. We developed a parallel algorithm to reduce time consumption that tackles the exponential problem. It is implemented in matrix multiplication insert in the process of identifying isomorphic patterns and removing the isolated and disconnected patterns. The experiment showed that the parallelization matrix multiplication algorithm is approximately 1.4 times faster than serial programming for identifying 5-node motifs and approximately 1.3 times faster than serial programming for identifying 6-node motifs with all the nodes connected
Implementation of Collision Avoidance System Algorithm in NPC Game 3D Gugah Alwan Hamanako; Adi Sucipto
Journal of Information Technology and Its Utilization Vol 6 No 1 (2023): June 2023
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nowadays, with the rapid development of technology, we are given the convenience of finding entertainment such as games. Now this game can be quickly run on various media, one of them is a smartphone. Most smartphones' operating systems (OS) are Android and IOS. Among the both of OS which is currently popular is Android. This research aims to create an Artificial Intelligent of Non-Player Character (NPC) that can avoid every obstacle using the Collision Avoidance System algorithm. The result of the research is an android game app that applies the Collision Avoidance System that can make AI NPC avoid obstacles. The application of the algorithm to the NPC is made in 3 stages, namely, design by making a flowchart of the algorithm, then writing a program from the Collision Avoidance System, and finally, testing the AI ​​NPC. The test is carried out by comparing the reactions of NPC 1 and NPC 2 in passing through obstacles when on different paths by being carried out jointly between NPC. Based on the tests on AI NPC, NPC managed to avoid obstacles in front of them and the players, and it is almost 93% successful. 
ANALISIS KUALITAS LAYANAN PENYIMPANAN CLOUD PADA NEXTCLOUD DAN PYDIO Lalu Delsi Samsumar; Beni Ari Hidayatulloh; Zaenudin Zaenudin; Putri Novia Dyah Pitaloca
Journal of Information Technology and Its Utilization Vol 6 No 1 (2023): June 2023
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of information technology has greatly influenced the development of current storage media, such as cloud-based storage (cloud). Nextcloud and pydio storage are part of an open based cloud computing system. Measuring service quality can be seen from the aspects of throughput, delay, jitter, and packet loss. This research was conducted to compare the upload and download speeds between the nextcloud server and the pydio server. Of the two cloud storage servers, five trial upload and download respectively. Based on the test results showing that the upload and download processes produce final cloud storage data which has the highest average throughput in terms of uploading files of different types and capacities, the next cloud server is 1,934.6 kbps. The cloud storage that has the lowest average packet loss value is balanced, because the two cloud storages get the same packet loss value of 0%. The cloud storage that has the lowest average file upload delay is the nextcloud server at 222,585 ms. The cloud storage that gets the lowest jitter value is the pydio server of 160.56 ms. Meanwhile, for downloading cloud storage files that have the highest average throughput value, nextcloud server is 1,332 kbps. The cloud storage that has the lowest average packet loss value is balanced, because the two cloud storages get the same packet loss value of 0%. The cloud storage that has the lowest average download delay is the nextcloud server at 132,057 ms, while the cloud storage that has the lowest jitter is the nextcloud server at 132,139 ms.
Analysis on the Impact of Implementing Inter-band Carrier Aggregation (CA) on the 5G-NR Networks Vanessa Agelliza; Solichah Larasati; Alfin Hikmaturokhman
Journal of Information Technology and Its Utilization Vol 6 No 1 (2023): June 2023
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Currently, cellular technology is advancing into the 5G era, which can support data speeds up to 10 Gbps on the uplink side and 20 Gbps on the downlink side. This study aims to plan a 5G NR network by implementing the inter-band carrier aggregation (CA) method. CA is one of the techniques used to achieve high data speeds and to combine two or more radio frequency bands. The primary cell uses band n40 at 2300 MHz with a 40 MHz bandwidth, while the secondary cell uses band n78 at 3500 MHz with a 100 MHz bandwidth. The area that we used for this network design is Agung Podomoro Land (APL) Tower Central Park area in West Jakarta. The propagation model used Urban Macro. Testing process is carried out by comparing the results between using CA and not using CA on the SSRSRP, SS-SINR, and data rate parameters. Simulation results show an average increase in each parameter after the inter-band carrier aggregation method is applied. The SS-RSRP parameter increased by 0.05% with a value of -82.02dBm, the SS-SINR parameter increased by 0.77% with a value of 15.71dB, and the data rate parameter significantly increased by 241.33% with a value of 803.66 Mbps. This proves that implementing the carrier aggregation method can improve the quality and capacity of the network, particularly the data rate, by maximizing the use of the bandwidth and resource block produced by the combination of component carriers.
RANCANG BANGUN SISTEM INFORMASI MANAJEMEN MAGANG MAHASISWA BERBASIS WEB DENGAN MENGGUNAKAN FRAMEWORK LARAVEL Muhammad Nugraha; Ricak Agus; Halimil Fathi; Rizki Baginda
Journal of Information Technology and Its Utilization Vol 6 No 1 (2023): June 2023
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this research, the author will discuss the development of a student internship information system implemented using the Laravel framework. The aim is to provide convenience for students in registering/applying for internships, reporting daily activities, submitting final reports, and updating all other internship-related information, as well as facilitating institutions in managing internship data. The method used in this research is the information system development method, which includes literature review, needs analysis, system design, testing, and evaluation. The Laravel framework was chosen because of its good performance, ease of use, and many features that can facilitate the development of information systems. The student internship management information system designed has easy-to-use internship registration and reporting features that can be accessed from anywhere, as well as integrated internship data management features. The results of this research show that the development of a student internship information system using the Laravel framework can provide convenience in registering and reporting internship results for students, as well as help institutions in managing internship data. It is hoped that with the existence of this student internship information system, it can be a solution to simplify and accelerate the internship process and management for students and participating institutions.
AN IMPLEMENTATION OF TWO-FACTOR AUTHENTICATION TECHNOLOGY USING TIME-BASED ONE TIME PASSWORD (TOTP) METHOD ON PRIVATE CLOUD STORAGE WEBSITE FOR GUIDANCE AND COUNSELING TEACHER Jerry Olbinson
Journal of Information Technology and Its Utilization Vol 5 No 1 (2022)
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jitu.5.1.3854

Abstract

Guidance and counseling teacher, as an assistant profession, provides counseling services for all students. In providing counseling services, the first activity to be performed is the collection of students’ data. The data collected are confidential. Technological advances in private cloud storage media and two-factor authentication can help the guidance and counseling teacher in the fulfillment of students’ data storage and protection. Cloud storage is one of the solutions in dealing with data management so that it is centralized and facilitates access for system users. It is also balanced with the security technology on an application to guarantee the data security in the application. The security technology of two-factor authentication can be combined with a password and time-based one-time password. A time-based one-time password is often used on an application that uses two-factor authentication with the combination of a secret key and current timestamp. This study aims to create a private cloud storage website for guidance and counseling teacher with two-factor authentication using the time-based one-time password method. This website has been tested with black-box testing and user testing. From the results of the tests, a private cloud storage website with two-factor authentication using the time-based one-time password method was well accepted by the users because it helps the guidance and counseling teacher in sharing data safely, and the results of the average percentage in all questions were 85%.
PREDICTING PARTICIPANT COMPETENCE TEST RESULT USING MACHINE LEARNING APPROACH Evi Pane
Journal of Information Technology and Its Utilization Vol 4 No 2 (2021)
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jitu.4.2.3941

Abstract

The 3in1 training for electronics operators aims to deliver competent participants. Therefore, it is necessary to improves the learning curriculum and materials. However, the organizer and teaching staff lack information about the factors that determined the success rate of participant's competence tests. Therefore, this paper aims to build a model for predicting participant competence test result. The data of participant's assessment scores were first collected and prepared as the dataset. The prediction model builds by applying a machine learning approach. These cover the use of ANOVA to ranked the course subjects towards the competency test results (C and NC) and build the prediction model using the Random Forest algorithm. From the results, we found that the competency test results are more affected by the practical subjects rather than theory subjects. From the ANOVA results, the most significant practical subject is the screwing lesson, while for theory subject is 5S-Kaizen. The prediction model obtains an accuracy of 94,6% for 5-subjects and 91,9% for 8-subjects from the original dataset. However, from the precision rate, it was found that the oversampling and hybrid sampling dataset shown better results. This confirms that the resampling technique is working to solve the imbalanced dataset problem.
THE EFFECTIVENESS OF FLEXIBLE WORKING ARRANGEMENTS AS A FORM OF DIGITAL TRANSFORMATION FROM THE PERSPECTIVE OF INDONESIAN GOVERNMENT EMPLOYEES Emyana Sirait
Journal of Information Technology and Its Utilization Vol 4 No 2 (2021)
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jitu.4.2.4178

Abstract

During the COVID-19 pandemic, flexible working arrangements (FWA) in Indonesia become necessary. In the Indonesian government, the opportunities and technical concepts of FWA are still being formulated. The survey answered by 745 respondents or 18.6% of the total employees in the Ministry of Communications and Informatics (MCI) indicates employees' perception from various groups of ages, fields of work, and occupations. The results show that more than 80% thought FWA had positive impacts on individual performance and at the same time maintained organizational performance. Some remained challenges are related to the availability of internet access, household affairs, and coordination difficulties.
LOOKING FOR QUR’AN TEACHER WITH THE HAVERSINE FORMULA METHOD A. MUHAMMAD SYAFAR; RIDWAN A. KAMBAU; NURUL HIKMAH MULYANAH
Journal of Information Technology and Its Utilization Vol 4 No 2 (2021)
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jitu.4.2.4251

Abstract

Education to read and write the Qur'an is the most important thing in Muslim life. The problem that arises is the difficulty of getting a schedule fit between prospective Koran teachers and students, besides the lack of places to study the Koran for adults is also a problem that should be a concern for the sake of the ongoing process of learning the Qur'an.The research method used in this study is a qualitative research method with an experimental approach for programming methods using the Haversine Formula method. The results of this research are in the form of the development of Private Recitation Service and Report Applications Using the Android-Based Haversine Formula Method which can be used to facilitate the community in the process of searching for private Using the Haversine Formula Method Based on Android with distance calculation accuracy rate is 98.92%  
IMPLEMENTATION OF AUTOMATIC DOOR SYSTEM BASED ON BODY TEMPERATURE USING Arduino UNO AND NODEMCU V3 Muhammad Afdhol Rizaldi
Journal of Information Technology and Its Utilization Vol 4 No 2 (2021)
Publisher : Sekolah Tinggi Multi Media "MMTC" Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56873/jitu.4.2.4302

Abstract

So far, the spread of the corona virus disease is very difficult to prevent and reduce because transmission can occur through non-physical contact which can be easily done without being noticed by people when touching common items or objects that are often used, one of which is doorknobs. The design of the automatic door system on the sliding door was made based on body temperature. The purpose of this study is to reduce the occurrence of corona virus transmission through non-physical contact with objects that are often used in this case doorknobs. The infrared temperature sensor is used to measure the temperature when the user wants to enter the room. If the results of the body temperature measurement are normal (below 38ºC), the door will open and then close automatically.