Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
32 Documents
Search results for
, issue
"Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023"
:
32 Documents
clear
IoT-BASED SMART GARDEN USING MQTT PROTOCOL WITH ADAFRUIT IO APP
Syafaat, Muhammad;
Ramadhan, Armansyah Nur;
Syafiun, Ruhman Bani;
Haerunnisa, Dian Aprilia
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.636
During the COVID-19 pandemic, more community activities were at home with government policies to limit people's movements, especially in urban areas. During the period of restrictions on people's movements due to COVID-19, it was also followed by new habits, namely activities around the house, one of which was the increasing trend of Urban Farming to fill time. However, after the pandemic began to experience a downward trend, people no longer cared for their plants due to activities that had returned to normal. In this research, the design of Internet of Things technology was carried out to help urban communities to monitor and control plants so that people continue to carry out their daily activities without worrying about their plants running out of water. This study uses the NodeMCu V3 microcontroller as the data receiving center at the hardware layer and then a DHT 11 sensor is needed for temperature monitoring, a Soil Moisture sensor for monitoring soil moisture, a raindrop sensor for monitoring rain conditions as well as relays and a mini pump to control the water needs of plants. The results of this study are that the IoT device successfully displays temperature data, soil moisture data, rain status and automatic plant watering controls function properly if the value on the soil moisture sensor is below 25. The data communication path in this study uses the MQTT protocol using a webserver from Adafruit IO with an average packet loss of 0.20%. With the functioning of all the components on the created IoT device, the community can apply an IoT-based Smart Garden in urban farming so that plant maintenance can still be carried out.
DATA WAREHOUSE MODELLING INFORMATION SECURITY LOG MANAGEMENT IN BUILDING A SECURITY OPERATION CENTER IN CENTRAL GOVERNMENT AGENCIES WITH KIMBALL METHOD
Asmita, Maya;
Henny, Henny;
Samidi, Samidi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.649
Central Government, is a government agency that manages important and confidential state data and information. The data that is managed needs to be maintained for reliability and security in order to avoid the risk of loss, leakage and misuse of information. To maintain this data, an optimal information security device is needed. Information security tools used today have a variety of functions resulting in many important logs that must be managed, analyzed and evaluated. The log data from each of these information security devices is still separate and must be processed manually to obtain simpler and more efficient data so that it can be monitored and presented to management. The purpose of this research is to make the right data warehouse modeling in order to assist in the process of presenting information quickly and accurately related to the processing of data logs of information security devices as a report that will be given to management in support of the Zero Tollerance data security policy. The method used in designing this data warehouse is using the Kimball 9 step method. The results obtained are in the form of a starflake schema and a data warehouse log of information security devices consisting of a malware fact table, intrusion facts and attack facts that can be used as centralized data monitoring that will be implemented at the Security Operation Center. Testing is done using Pentaho software tools. This data warehouse is expected to provide a quick, accurate, and continuous summary of information so that it can assist management in the decision-making process and policy making for the future.
INFORMATION SYSTEM SECURITY AUDIT USING ISO/IEC 27002:2013 AT UNIVERSITY OF XXX
Santi, Rusmala;
Alfresi, Aminullah Imal;
Octariana, Betha
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.689
Information system security audit to find out how the current information system security process is implemented, whether it has been implemented in accordance with information security management system standards. The purpose of this study is to examine the suitability of the current information system security process with the ISO/IEC 27002:2013 security standard and to assess the level of capability and maturity of information system security at university of XXX. This audit research resulted in the finding that the information system security process at university of XXX is currently not in accordance with the ISO/IEC 27002:2013 security standard and is at level 2 (managed) with a capability level value of 1,96 and a maturity level of 2,34.
NETWORK PROGRAMMABILITY FOR NETWORK ISSUE USING PARAMIKO LIBRARY
Mutiara, Dwi Ayu;
Isnaini, Khairunnisak Nur;
Suhartono, Didit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.691
In a company, information technology is needed, especially computer networks, to facilitate data communication. The management of a computer network, of course, requires good administration. The criteria for whether or not a network is good can be seen from the performance, reliability, and security indicators so that it will not cause network issues. Events such as server downs, data loss, lost connections, and undetected computers cause the organization's business performance to be disrupted. This study's purpose is to detect network issues with network programmability technology automatically. Paramiko library supports network automation systems and implements OSPF routing protocol in finding the shortest path to send network packets. This study uses the PPDIOO flow, namely prepare, plan, design, implement, operate, and optimize, because it is considered by the flow of making network detection tools. The results showed that the design and implementation of a small-scale network were successfully built by utilizing network programmability technology and the paramiko library, which helps detect network conditions at any time. This design has a dashboard, provisioning, assurance, and policy features that allow administrators to manage and monitor information on each network device. The network design is fitted with REST-API technology and security through a secure shell (ssh) from the Network Controller that can detect the device's connection conditions and the device's health and update the DNS configuration used. Network Issues that have been seen are devices being down, and the connection being lost. Future research can improve features for network troubleshooting when the connection is lost.
MEASUREMENT OF INFORMATION SECURITY AND PRIVACY AWARENESS USING THE MULTIPLE CRITERIA DECISION ANALYSIS (MCDA) METHOD
Sukariana Yasa, I Gede Agus;
Listartha, I Made Edy;
Pradnyana, I Made Ardwi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.692
Information security is an asset that has value so it must be protected, along with increasing assets it is undeniable that many people wish to gain access and control it so that behind the convenience in the digital world there are many risks to information assets. There are several cases that occur related to information security such as data theft, illegal access, information leakage and vandalism where this becomes the privacy of the user. So it is necessary to do research from the user's perspective to measure the level of information security and privacy awareness of students and lecturers as well as recommendations that will be suggested based on the results of measuring information security and privacy awareness. The objects in this research are students and lecturers at the XYZ University. The method used is Multiple Criteria Decision Analysis (MCDA) by measuring the dimensions of knowledge, attitude, behavior in six areas of information security and three areas of privacy. Data were obtained by distributing questionnaires using a Likert scale of 5. Based on the questionnaire from the respondents, it can be seen students and lecturers have awareness that is at a "good" level of 85% in information security while privacy is at a "good" level with a result of 89% but in the behavior dimension there are several areas that are included in the "average" level including the area passwords by 62%, mobile equipment area by 77% incident area by 70% and on privacy security on the behavior dimension there is one area namely the login activity area by 78% so this needs to be given recommendations for improvement in order to reach a "good" level by providing socialization/ training for students and lecturers
PERFORMANCE ANALYSIS OF REAL TIME STREAMING PROTOCOL (RTSP) AND REAL TIME TRANSPORT PROTOCOL (RTP) USING VLC APPLICATION ON LIVE VIDEO STREAMING
Kariyamin, Kariyamin;
Riadi, Imam;
Herman, Herman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.698
Video is a means of delivering very complete information and can be implemented using streaming technology. Networking services for local media exchange are helpful in teaching and learning activities, such as simultaneous video playback. Submission of information in the form of this video can be done by unicast, multicast or Broadcast packet delivery Live video streaming using RTP and RTSP protocol. The test was done through three experiments ie unicast, multicast and broadcast for five times. The output occurring at (RTP) is 4.73 MBit / sec for 5 client, higher than from (RTSP) of 13.799 MBit / sec for 5 client. This test occurs a very high Delay on RTP while RTSP has a low Delay in RTP. Meanwhile, the packet loss that occurs in (RTP) is 124.50% lower than (RTSP) which is 6.06% from 5 clients each. Because RTSP is an applicationlevel protocol for data delivery control that has real time characteristics such as streaming media. While RTP is designed not for streaming but to handle the actual data transmission of data in the form of sound or image or both, especially those based on real time such as streaming media.
IMPLEMENTATION OF CLUSTERING ON TWEET UPLOADING SIDE EFFECTS OF COVID-19 POST VACCINATION USING K-MEANS ALGORITHM
Santi, Santi;
Februariyanti, Herny
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.704
The Covid-19 Vaccination Program has become pros and cons among Indonesian people including Twitter social media users. When the program was running, Twitter users started uploading tweets regarding the side effects that occurred, ranging from mild to severe, both scientifically proven. or not. Of all uploaded tweets, by applying text mining, only tweets containing the queries "vaccine effect" and "post vaccine" in the period from January to June 2022 and Indonesian language tweets will be used and based on these parameters a total of 4800 tweets have been collected, of the total These tweets will be further processed using the clustering method, the k-means algorithm and the silhouette coefficient. The results of implementing the silhouette coefficient show that the best cluster is in cluster 2 with a score of 0.6228720387313319 and the results of the clustering algorithm k-means for 4800 tweets obtained 3917 members in cluster 0, and 883 members in cluster 1 placement. The feature is that cluster 0 contains tweets that state program effects explicitly or explicitly, while cluster 1 states program effects that arise implicitly.
ASPECT EXTRACTION OF E-COMMERCE AND MARKETPLACE APPLICATIONS USING WORD2VEC AND WORDNET PATH
Sari, Dhani Ratna;
Matsaany , Bayun;
Hamka, Muhammad
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.726
Aspect extraction is an essential element in Aspect-Based Sentiment Analysis (ABSA). Errors in determining aspects of ABSA will result in errors in determining the sentiment of an opinion and the accuracy value of ABSA. This study aims to obtain elements of opinion sentences on using e-commerce applications and marketplaces in Indonesia. Corrections of the statement were sourced from social media Twitter with the keywords "e-commerce" and "marketplace" from August 2020 to January 2022, and a total of 54,244 comments were obtained. Determination of the words that are candidate aspects is selected using POS Tagging for classes of noun singular (NN), noun plural (NNS), proper noun singular (NNP), and proper noun plural (NNPS).
DEVELOPMENT OF SCHEDULING SYSTEM WITH GENETIC ALGORITHM IN WEBSITE-BASED SMK NEGERI 1 SINE
Saputra, Shafa Bani;
Pamungkas, Endang Wahyu
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.784
Scheduling is an information that has limited conditions that must be met. Preparation of the schedule will take quite a long time if it is done using conventional media such as writing on paper or books. Scheduling optimization is needed to provide effectiveness and efficiency so that the implementation of learning activities can run more optimally. The genetic algorithm approach method is used to get the optimum schedule. This algorithm produces the best combination for subject pairs and teaching teachers as a whole by determining the initial population and initializing the chromosomes, determining the fitness value, then carrying out crossover selection, and carrying out mutations to produce the best fitness value which will be used to determine the final value of scheduling. The results of the entire algorithm process are consistent with the original prediction data, and the same teacher is not scheduled to teach more than once at the same time. The results of the subject scheduling process using the genetic algorithm obtain a fairly good optimization in subject scheduling.
DESIGN AND BUILD VEHICLE PLATE DETECTION SYSTEM USING YOU ONLY LOOK ONCE METHOD BASED ON ANDROID
Usen, Yolan Anjani;
Hayat, Cynthia
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.4.791
The method of collecting the vehicle data is conducted conventionally by gathering data from each region to be converted into single, raw information in the form of vehicle plates for all regions, to be processed on a computer and sent to the Central Bureau of Statistics. It is then transformed into a form of national data file that provides information on vehicle plates for the Indonesian people. This kind of data gathering method requires a lot of time and effort. Therefore, it is a concern for researchers to detect vehicle plates using image processing by utilizing the Android-based You Only Look Once method. The YOLOv4 technique is used because it processes image data directly with optimal performance in order to produce faster predictions. In its application, the researchers use Google Collaboratory to create models and Android Studio for android applications. At the same time, the parameters studied were precision, recall, F1 score, average IoU, and mAP. By using the "Vehicle Registration Plate" dataset, the ratio of which is 70% in training data and 30% in data validation, an accuracy of 77% is obtained with a detection time of 0.05 seconds, whereas the average accuracy value is 86.82%. Therefore, it can be concluded that this study has an optimized performance for detecting vehicle plates using the Android application.