cover
Contact Name
Alam Rahmatulloh
Contact Email
alam@unsil.ac.id
Phone
+6285223519009
Journal Mail Official
innovatics@unsil.ac.id
Editorial Address
Program Studi Informatika Fakultas Teknik Universitas Siliwangi Jl. Siliwangi No. 24 Tasikmalaya, Jawa Barat
Location
Kota tasikmalaya,
Jawa barat
INDONESIA
Innovation in Research of Informatics (INNOVATICS)
Published by Universitas Siliwangi
ISSN : -     EISSN : 26568993     DOI : -
Innovation in Research of Informatics (Innovatics) merupakan Jurnal Informatika yang bertujuan untuk mengembangkan penelitian di bidang: Machine Learning Computer Vision Internet of Things Information System and Technology Natural Language Processing Image Processing Network Security Geographic Information System Knowledge based Computer Graphic Cyber Security IT Governance Data Mining Game Development Digital Forensic Business Intelligence Pattern Recognization Virtual & Augmented Reality Virtualization Enterprise Application Self-Adaptive Systems Human Computer Interaction Cloud Computing Mobile Application Innovatics adalah jurnal peer-review yang ditulis dalam bahasa Indonesia yang diterbitkan dua kali dalam setahun mulai dari Vol. 1 No.1 Maret 2019 (Maret, dan September) dengan proses peninjauan menggunakan double-blind review.
Articles 6 Documents
Search results for , issue "Vol 2, No 2 (2020): September 2020" : 6 Documents clear
Sistem Informasi Koperasi Simpan Pinjam Pada PT Meiwa Indonesia Berbasis Java Nurrohman Nurrohman; Rudi Apriyadi Raharjo; Anggun Citra Dini Dwi Puspitasari
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1417

Abstract

The purpose of this research is to make a Java-based savings and loan cooperative information system design to accelerate and facilitate performance in managing the search and storage of loan data at cooperatives as well as to produce a Java-based savings and credit cooperative information system. The research method used by researchers is the grounded research method, which is a research method based on facts and uses comparative analysis with the aim of conducting empirical generation, establishing concepts, proving theories, developing theories, collecting data and analyzing data in the same time. The results obtained are designing a savings and loan cooperative information system to assist in processing employee data. The construction of this information system is expected to simplify and provide maximum service for employees as well as to facilitate cooperative staff in collecting loan transaction data for reporting, data and information management processes become more effective, produce faster outputs and there is no misappropriation of loan data input or the occurrence of data duplication.
Digital Watermarking Using Advanced Encryption Standard (AES) And Steganography Methods to Increase The Level Of Security Of User Data In The Image Files On Internet Network Khoerul Umam
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1178

Abstract

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.
Aplikasi Penggajian Karyawan Pada CV System Comutama Bayu Kusumo
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1406

Abstract

CV System Comutama is a business entity engaged in the sale of computer accessories. The payroll system contained in the CV System Comutama has not been carried out to the full potential for it requires a payroll application that can support the delivery of data more effectively and efficiently. The purpose of this research is to design employee payroll applications on the CV System Comutama effectively and efficiently, facilitate the financial department to be able to calculate employee payroll quickly and minimize errors and to facilitate the achievement of reports that are fast, accurate, valid, effective and efficient. The research method used is the grounded research method to collect data and analyze data at the same time. The modeling system used is the Data Flow Diagram (DFD) method using the java programming language while the database uses MySQL. With the employee payroll application is expected to facilitate the calculation of employee salaries and provide employee salary data reports that are stored neatly, safely, and accurately in a database that is systematic.
Perancangan Aplikasi Sistem Basis Data Penelitian dan PPM (Balit) Pada Jurusan Teknik Elektro Politeknik Negeri Pontianak Budianingsih -; Pausta Yugianus
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1906

Abstract

The purpose of this research is to build a database of research and community service. Which so far to monitor or see the title of research and community service is to look at the SK (Decree) research and PPM PNBP that has been published, or see a collection of research and community service lists stored on Microsoft Excel software. This certainly makes it very difficult for parties with an interest in research data and ppm. Where these data are used for accreditation and promotion. Related parties must come to the department administrator to request data stored on the department's computer. The design of this application uses the UML (Unified Modeling Language) modeling language. This application development methodology is based on Design research Science for Information System. For making this application using CodeIgniter and with a MySQL database. With the application of the research database and ppm, it is hoped that it will facilitate the parties concerned in managing data and data search
Penerapan Decision Tree untuk Prediksi Kepuasan Pengguna Bus Transjakarta Reza Hikmatulloh; Hanna Mahaerani Putri; Qurrotul Aini
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.2014

Abstract

Transjakarta buses are one of the public transportation facilities used by residents of the capital city of Jakarta. The existence of Transjakarta Buses, transportation access is easier and easier for its users. With so many users, there are several things that must be considered in the facilities and infrastructure provided by the Transjakarta Bus. User satisfaction is an assessment given by a user of a service, whether satisfied or not. This research was conducted to analyze the satisfaction of Transjakarta Bus users who are students of Syarif Hidayatullah State Islamic University Jakarta. The attributes to be taken in the study include the rates, facilities, and services provided by the Transjakarta Bus where the questionnaire results will be processed using the C4.5 Decision Tree method. The results showed that an accuracy of 92.86% was obtained with accuracy in Good Classification using Confusion Matrix.
Implementasi Manajemen Bandwidth Menggunakan Metode Queue Tree Pada Jaringan Internet MUSMUHARAM .; Cosmas Eko Suharyanto
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1482

Abstract

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.

Page 1 of 1 | Total Record : 6