cover
Contact Name
Alam Rahmatulloh
Contact Email
alam@unsil.ac.id
Phone
+6285223519009
Journal Mail Official
innovatics@unsil.ac.id
Editorial Address
Program Studi Informatika Fakultas Teknik Universitas Siliwangi Jl. Siliwangi No. 24 Tasikmalaya, Jawa Barat
Location
Kota tasikmalaya,
Jawa barat
INDONESIA
Innovation in Research of Informatics (INNOVATICS)
Published by Universitas Siliwangi
ISSN : -     EISSN : 26568993     DOI : -
Innovation in Research of Informatics (Innovatics) merupakan Jurnal Informatika yang bertujuan untuk mengembangkan penelitian di bidang: Machine Learning Computer Vision Internet of Things Information System and Technology Natural Language Processing Image Processing Network Security Geographic Information System Knowledge based Computer Graphic Cyber Security IT Governance Data Mining Game Development Digital Forensic Business Intelligence Pattern Recognization Virtual & Augmented Reality Virtualization Enterprise Application Self-Adaptive Systems Human Computer Interaction Cloud Computing Mobile Application Innovatics adalah jurnal peer-review yang ditulis dalam bahasa Indonesia yang diterbitkan dua kali dalam setahun mulai dari Vol. 1 No.1 Maret 2019 (Maret, dan September) dengan proses peninjauan menggunakan double-blind review.
Articles 93 Documents
Digital Watermarking Using Advanced Encryption Standard (AES) And Steganography Methods to Increase The Level Of Security Of User Data In The Image Files On Internet Network Khoerul Umam
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1178

Abstract

The spread of digital media on the internet was very broad, fast, and cannot be monitored in a structured manner about what media has been uploaded and distributed on the internet network. The spread of digital media like this was very difficult to detect whether the media that shared was privately owned or that of others that is re-shared by media theft or digital media piracy. One step to overcome the theft of digital works is to give them a watermark, which is an identity that is placed on top of the work. However, this is still considered unsafe because the identity attached can be cut and manipulated again until it is not visible. In addition, the use of Steganography method to hide messages in an image can still be manipulated by adding messages continuously so that it accumulates and damages the original owner of the image. In this article, the author provides a solution called Digital Watermarking, a step of encrypting the data of the original owner of the work and putting it into the image of his work. This watermark cannot be seen clearly, but actually in the media there is encrypted data with a strong Advanced Encryption Standard (AES) method. As a result, a tool that can improve the security of media owner data by combining the AES and Steganogaphy methods in the formation of new media that cannot be changed anymore. So, when the media is stolen and used by others and has been edited, the owner's personal data can never be changed.
Sistem Pakar Untuk Mendeteksi Kerusakan Pada Diesel Pump Dengan Metode Forward Chaining Berbasis Web Haryadi, Haryadi; Yulia, Yulia
INNOVATICS: International Journal on Innovation in Research of Informatics Vol 3, No 1 (2021): Maret 2021
Publisher : Department of Informatics, Siliwangi University, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v3i1.2831

Abstract

Frequent fires can occur in or like buildings of buildings or high rise buildings. The losses incurred by the fire disaster are enormous. Care and maintenance standards for diesel engine pumps must be observed. All technicians must have expertise in the maintenance and maintenance of the diesel pump engine. Such expertise can be obtained from official training conducted by the education center, reading guidelines for dealing with diesel pump engine damage obtained from diesel pump manufacturing plants and additional knowledge gained from learning while attending education and training. In this study the researchers set "Symptoms of Damage to the diesel engine of the Fire Pump" as a variable. The expert system application detects web-based diesel pump damage with a forward chaining method that has been made, after conducting an expert analysis test then testing the user's response to this expert system application, the test is carried out by consulting using this expert system application. Expert systems are components and elements that are combined into one to achieve certain goals. The system design is done after analyzing the diesel pump damage data and designing a web-based expert system. Chaining forward method is a method of inference that makes sense from a problem to a solution. Damage to the diesel pump by using the forward chaining method provides the right solution of the problem at hand. Based on these suggestions it can be concluded that an expert system detects damage to a web-based diesel pump that has been made can help all users in analyzing the problem based on consultation
Aplikasi Penggajian Karyawan Pada CV System Comutama Bayu Kusumo
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1406

Abstract

CV System Comutama is a business entity engaged in the sale of computer accessories. The payroll system contained in the CV System Comutama has not been carried out to the full potential for it requires a payroll application that can support the delivery of data more effectively and efficiently. The purpose of this research is to design employee payroll applications on the CV System Comutama effectively and efficiently, facilitate the financial department to be able to calculate employee payroll quickly and minimize errors and to facilitate the achievement of reports that are fast, accurate, valid, effective and efficient. The research method used is the grounded research method to collect data and analyze data at the same time. The modeling system used is the Data Flow Diagram (DFD) method using the java programming language while the database uses MySQL. With the employee payroll application is expected to facilitate the calculation of employee salaries and provide employee salary data reports that are stored neatly, safely, and accurately in a database that is systematic.
Perbandingan Algoritma K-Nearest Neighbour (KNN) dan Naive Bayes pada Intrusion Detection System (IDS) Afifaturahman, Aditya Dwi; MSN, Firmansyah
INNOVATICS: International Journal on Innovation in Research of Informatics Vol 3, No 1 (2021): Maret 2021
Publisher : Department of Informatics, Siliwangi University, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v3i1.2852

Abstract

Machine learning techniques are widely used to develop Intrusion Detection Systems (IDS) to detect and classify cyber attacks at the network level and the host level in a timely and automated manner. However, many challenges arise as malicious attacks are constantly changing and occurring in very large volumes requiring a scalable solution. Therefore, this study conducted a comparison of the K-Nearest Neighbor (KNN) and Naive Bayes algorithms. The dataset used in this study is the Ddos features-IDS 2017 dataset published in 2019. This research analyzes the comparison of methods generated from the classification process based on metric accuracy, specificity and sensitivity parameters. The classification process using the K-Nearest Neighbor (KNN) and Naive Bayes algorithms, it can be concluded that the results of the three tests with a percentage split of 60%, 70% and 80% show that the K-Nearest Neighbor (KNN) algorithm gets a higher value than Naive Bayes except the error rate because the error rate indicates that the data failed to be classified properly. Testing on a percentage split of 60% KNN parameter accuracy gets a value of 99.53%, specificity 94.05%, sensitivity 75.20%, testing on a percentage split 70% KNN parameter accuracy gets a value of 99.69%, specificity 94.59%, sensitivity 78.40% and testing on percetage split 80%, KNN parameter accuracy parameter got a value of 99.70%, specificity 94.44%, sensitivity 75.85%.
Perancangan Aplikasi Sistem Basis Data Penelitian dan PPM (Balit) Pada Jurusan Teknik Elektro Politeknik Negeri Pontianak Budianingsih -; Pausta Yugianus
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1906

Abstract

The purpose of this research is to build a database of research and community service. Which so far to monitor or see the title of research and community service is to look at the SK (Decree) research and PPM PNBP that has been published, or see a collection of research and community service lists stored on Microsoft Excel software. This certainly makes it very difficult for parties with an interest in research data and ppm. Where these data are used for accreditation and promotion. Related parties must come to the department administrator to request data stored on the department's computer. The design of this application uses the UML (Unified Modeling Language) modeling language. This application development methodology is based on Design research Science for Information System. For making this application using CodeIgniter and with a MySQL database. With the application of the research database and ppm, it is hoped that it will facilitate the parties concerned in managing data and data search
Penerapan Decision Tree untuk Prediksi Kepuasan Pengguna Bus Transjakarta Reza Hikmatulloh; Hanna Mahaerani Putri; Qurrotul Aini
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.2014

Abstract

Transjakarta buses are one of the public transportation facilities used by residents of the capital city of Jakarta. The existence of Transjakarta Buses, transportation access is easier and easier for its users. With so many users, there are several things that must be considered in the facilities and infrastructure provided by the Transjakarta Bus. User satisfaction is an assessment given by a user of a service, whether satisfied or not. This research was conducted to analyze the satisfaction of Transjakarta Bus users who are students of Syarif Hidayatullah State Islamic University Jakarta. The attributes to be taken in the study include the rates, facilities, and services provided by the Transjakarta Bus where the questionnaire results will be processed using the C4.5 Decision Tree method. The results showed that an accuracy of 92.86% was obtained with accuracy in Good Classification using Confusion Matrix.
Implementasi Manajemen Bandwidth Menggunakan Metode Queue Tree Pada Jaringan Internet MUSMUHARAM .; Cosmas Eko Suharyanto
Innovation in Research of Informatics (INNOVATICS) Vol 2, No 2 (2020): September 2020
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v2i2.1482

Abstract

SMKN 5 Batam City is an educational institution located in Kavling Bukit Kamboja, Sungai Pelunggut, Kec, Sagulung, Batam City, Riau Islands. The availability of network infrastructure to be institutionalized by education will expedite the educational process including internet network services at SMKN 5 Batam City. The networks used in SMKN 5 Kota Batam are the Local Area Network (LAN) and Wireless Local Area Network (WLAN). Batam City Vocational School 5 has 82 PCs (Personal Computers) connected to the network and Access Points as access to the hotspot network, which uses an indie home ISP with a bandwidth capacity of 100Mbps and 5Mbps using an astinet ISP. Problems that occur on the internet network at SMKN 5 Kota Batam, do not yet have an allocation of bandwidth distribution for network users, causing unstable and uninterrupted network access. Therefore there must be proper bandwidth management controls, implementing bandwidth management and optimizing security authentication. So that the available bandwidth can be used fairly, by applying the queue method. And from the tests carried out, authentication of security and bandwidth management using the tree queue method, fair and even bandwidth can be used as well as the tree queue method proven to be able to use bandwidth both for downloading and downloading. uploaded.
Perbandingan Algoritma Naïve Bayes Classifier dan Algoritma Decision Tree untuk Analisa Sistem Klasifikasi Judul Skripsi Rasi Nuraeni; Aso Sudiarjo; Randi Rizal
Innovation in Research of Informatics (INNOVATICS) Vol 3, No 1 (2021): Maret 2021
Publisher : Informatika Universitas Siliwangi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v3i1.2976

Abstract

Penelitian ini mengkaji tentang perbandingan klasifikasi judul skripsi menggunakan algoritma naïve bayes classifier dan algoritma decision tree. Tujuan dari penelitian ini adalah untuk membandingkan dua algoritma dalam pengklasifikasian judul skripsi. Proses pengumpulan data dilakukan dengan cara studi pustaka dan literature sejenis. Hasil pengumpulan data akan di analisis dengan menggunakan algoritma naïve bayes classifier dan algoritma decision tree dengan tools rapidminer. Hasil penenlitian ini menemukan perbandingan yang cukup signifikan dengan hasil akurasi 80,33% untuk algoritma naïve bayes classifier dan 60,33% untuk algoritma decision tree dari 52 data judul skripsi yang digunakan.
PEMODELAN BAYESIAN NETWORK UNTUK MENENTUKAN PROBABILITAS PENYEBAB PELANGGARAN DALAM PERTANDINGAN KARATE KUMITE Putra, Yudha Permadya; Aradea, Aradea; Rianto, Rianto
INNOVATICS: International Journal on Innovation in Research of Informatics Vol 3, No 2 (2021): September 2021
Publisher : Department of Informatics, Siliwangi University, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v3i2.4341

Abstract

Pelanggaran dalam pertandingan karate kumite akan sangat mempengaruhi dalam hasil pertandingan, banyaknya faktor penyebab pelanggaran dalam pertandingan kumite harus diantisipasi se-dini mungkin agar kelak dalam pertandingan berikutnya tidak mengulangi kesalahan yang sama. Itu membuat kompleksitas hubungan faktor ketidakpastian karena bersifat probabilistik. Bayesian Network merupakan Direct Acyclic Graph  (DAG) dengan tabel probabilitas untuk setiap node. Node yang terdapat dalam Bayesian Network adalah representasi proporsional variabel dalam domain, dan garis yang menunjukkan ketergantungan hubungan. Berdasarkan deskripsi tersebut, solusi dari kompleksitas ketergantungan faktor ketidakpastian di dalam pertandingan karate kumite dapat dimodelkan menggunakan Bayesian Network untuk mengetahui penyebab pelanggaran yang menjadi variabel acak di dalam sistem pertandingan. Penelitian ini menerapkan teknik pemodelan Bayesian Network berdasarkan data prestasi atlit Bandung Karate Club (BKC) Kota Tasikmalaya tahun 2020. Hasil penelitian ini menunjukan bahwa pemodelan yang telah dibangun untuk menentukan probabilitas  penyebab pelanggaran dalam pertandingan karate Kumite mendapatkan nilai Mutual Information sebesar  0,01829   (2,01%) untuk terhentinya suatu pertandingan karena terjadi pelanggaran.
Algoritma Fisher-Yates Pada Game Edukasi Aksara Sunda Cacarakan Berbasis Android Sebagai Media Pembelajaran Untuk Anak Usia Dini Anang, Asep; Irham G, Acep
INNOVATICS: International Journal on Innovation in Research of Informatics Vol 3, No 2 (2021): September 2021
Publisher : Department of Informatics, Siliwangi University, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.37058/innovatics.v3i2.4532

Abstract

Aksara Sunda Cacarakan merupakan salah satu warisan budaya Indonesia. Pelestarian Aksara Sunda Cacarakan adalah tugas yang harus dilakukan oleh masyarakat Indonesia sebagai salah satu cara untuk melindungi keberadaan Aksara Sunda Cacarakan, salah satunya dengan mengetahui jenis Aksara Sunda Cacarakan yang dibagi menjadi 4 bagian, seperti ngalagena, angka, swara dan rarangken. Implementasi dari Teknologi Informasi (TI) merupakan suatu keharusan untuk dilakukan sebagai inovasi untuk mendapatkan berbagai macam informasi. Upaya untuk memperkenalkan Aksara Sunda adalah dengan membuat Game Edukasi berbasis Android, Game edukasi dibangun dengan tujuan meningkatkan kemampuan anak-anak dalam pengenalan aksara Sunda Cacarakan, maka untuk penelitian ini, dibuat sebuah Game edukasi berbasis android dengan menggunakan Algoritma Fisher yates Shuffle. Algoritma Fisher Yates adalah algoritma untuk menghasilkan permutasi acak dari himpunan terbatas, dengan kata lain untuk mengacak suatu himpunan. Algoritma Fisher yates shuffle di terapkan dalam pengacakan soal di dalam Game edukasi, Model sistem untuk mendukung penelitian ini menggunakan versi Game Development Life Cycle (GDLC), yang mengemukakan enam langkah (Initiation, Pre-Production, Production, Testing,  Beta, dan Release). Penilaian tanggapan dari responden menggunakan skala Likert. Skala likert memilrata–rata rumus index yang diperoleh dari responden, aspek kegunaan sebesar 80,5%, aspek kualitas interaksi sebesar 87,5% dan aspek kualitas informasi sebesar 82%, termasuk dalam kategori sangat setuju, sehingga game dinyatakan layak untuk digunakan dan dipublikasikan.

Page 3 of 10 | Total Record : 93