Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
962 Documents
WEB-BASED INFORMATION SYSTEM DESIGN OF INVENTORY AND COVID-19 VACCINE DISTRIBUTION IN BANYUMAS REGENCY
Sheruni Imellia Pamungkas Putri;
Swahesti Puspita Rahayu;
Nofiyati Nofiyati
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.529
This research derived from inventory management and distribution of the COVID-19 vaccine which is still done manually at the Banyumas Regency Department of Health. The big amount of data that needed to be processed made it difficult for officers to organize the data, as a result there are several problems such as missing and damaged data. This system could make health facilities registered under the Banyumas Regency Department of Health to see the stock items and request the goods faster and easier. The built system has made data management more efficient and effective. Web-based Information System Design of Inventory And COVID-19 Vaccine Distribution In Banyumas Regency uses a waterfall model and qualitative methods. The waterfall model is used to facilitate the creation of this system because it has clear and sequential stages, the qualitative methods used in this study include observation, interviews, and literature studies. The system used PHP and HTML as the programming languages which are then supported by MySQL as the database. The tests carried out to test the system are Black Box Testing and Mean Opinion Score Testing. This research produces a system that can carry out the process of managing and processing inventory data and distribution, the test results show that the system runs as expected and succeeds in facilitating user work to be faster, more effective, and efficient.
IMPLEMENTATION OF CERTAINTY FACTOR METHOD IN PEST AND DISEASE DIAGNOSIS IN HYDROPONIC PLANTS
Riski Afdhalis Syahreza;
Jeperson Hutahaean;
Afrisawati Afrisawati
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.531
Pest and disease attacks often occur in hydroponic plants so that many plants are damaged and result in losses for farmers or crop failure. The problem of pests and plant diseases is the main obstacle in increasing agricultural productivity, these conditions affect farmers' income and the provision of hydroponic plant food. The farmers do not know what types of pests and symptoms of diseases attack plants, making it difficult to handle diseases on hydroponic plants. Likewise for hydroponic plants located at the Agricultural Service of Asahan Regency which are attacked by pests, hydroponic experts say that the appearance of small leaf spots appears on the upper side of the leaves that damage hydroponic plants and because the cause of pests that cause disease in hydroponic plants is unknown, so farmers are hesitant to take countermeasures. An expert system is a computer program designed to make decisions such as decisions taken by an expert or expert. Therefore, an expert system with the Certainty Factor method is made in the diagnosis of pests and diseases in hydroponic plants. The purpose of this study was to apply the certanity factor method to diagnose pests and diseases in hydroponic plants. The results of the pest data test found spider mites with a confidence level of 79% and wet rot disease with a confidence level of 62%. The conclusion obtained is that the certainty factor method can detect early types of pests and diseases on hydroponic plants quickly and accurately.
CLASSIFICATION OF BATIK MOTIF USING TRANSFER LEARNING ON CONVOLUTIONAL NEURAL NETWORK (CNN)
Riqqah Fadiyah Alya;
Merlinda Wibowo;
Paradise Paradise
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.564
The number of batik motifs in Indonesia is not comparable to the knowledge possessed by the Indonesian people about batik motifs. The diversity of batik motifs can be a problem because classifying them can only be done by those who are familiar with batik in depth, both the pattern and the philosophy behind the motif, most of which are elderly people. To classify batik accurately and quickly is to use image classification technology. In this study, data were obtained from the previous researchers' GitHub repository, google images, and camera shots with a total dataset of 3,534 images. The data only focused on five batik motifs, namely Ceplok, Kawung, Parang, Megamendung, and Sidomukti. Before the batik motif is processed, preprocessing is carried out to obtain various quality data. Then the dataset was trained using the CNN model then the results were retrained using the VGG-16 and Xception Transfer Learning models. The researcher made several model scenarios, namely the CNN model without Transfer Learning and the model with Transfer Learning which took into account the effect of the learning rate values of 0.0004 and 0.0001. Therefore, the results of the CNN model without Transfer Learning (M0) obtained training accuracy results of 89.64%. While the results of the model with the best Transfer Learning is the M2 model (CNN + VGG-16, learning rate = 0.0001) with an accuracy of 91.23%, a loss of 24.48%, and the test results obtained an accuracy of 89%. Based on the results of the classification method, it can be concluded that the CNN model with Transfer Learning performs classification better in terms of accuracy and computation time than the CNN model.
PREDICTION OF STUNTING PREVALENCE IN EAST JAVA PROVINCE WITH RANDOM FOREST ALGORITHM
M. Syauqi Haris;
Mochammad Anshori;
Ahsanun Naseh Khudori
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.614
Stunting or cases of failure to thrive in toddlers is one of the most serious health problems faced by the people of Indonesia. Based on data from the Ministry of Health and the Central Statistics Agency, East Java Province has a stunting prevalence value of 26.8% which is categorized as a high prevalence value according to the standards of the World Health Organization (WHO). Random forest is one of the machine learning algorithms in the field of artificial intelligence that can learn patterns from labeled data so that it can be used as a method for predicting or forecasting data. This approach is considered very suitable to be used in predicting the value of stunting prevalence because stunting prevalence data is usually accompanied by other data in the health sector according to survey results. Previous studies on the prediction of stunting prevalence used secondary data sourced from one survey only. Therefore, this study is one of the efforts to contribute in providing solutions for the stunting problem in East Java Province by combining several data from different surveys in the same year. The results of this study show that from 20 factor candidates for predicting stunting prevalence value, only 12 factors are suspected to be causative factors based on their correlation value. However, the prediction results obtained using the random forest algorithm in this study, with data consisting of 12 features and a dataset consisting of only 38 data, have results with error values of 1.02 in MAE and 1.64 in MSE that are not better than multi-linear regression which can produce smaller error values of 0.93 in MAE and 1.34 in MSE.
DATA WAREHOUSE MODEL BASED ON KIMBALL METHODOLOGY TO SUPPORT DECISION MAKING IN ASSET MAINTENANCE
Vasthu Imaniar Ivanoti;
Muhammad Royani;
Samidi Samidi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.628
ITSM e-Prime is an ICT service management application based on ITSM framework owned by Pusintek that includes service desk, incident management, problem management, change management, release management, and configuration management processes. Currently there is a problem in determining the number of devices that will be included in the device maintenance contract or determining the number of devices that need to be replaced in a given year. The objective of this research is to build an asset management data warehouse so that it can be utilized by the Data Analysis and Presentation Team to produce a dashboard that presents data on network infrastructure assets that need to be maintained or replaced for budget planning needs. This descriptive verification analysis research used nine out of ninety tables from the ITSM e-Prime application and applied dimensional modeling Kimball to build a data warehouse because this methodology offers high query performance and understandable by end-user. The resulting data warehouse were tables in the form of star-schema. The tests were carried out by qualitative methods, namely quality testing by users (user acceptance test and blackbox testing) and quantitative method, namely comparing the number of infrastructure devices included in the maintenance contract in 2022. The final result of this research is a data warehouse consisting of fact table F_infrastructure and dimension table D_Merk, D_Area, D_Kategori, D_EoS, D_Garansi, and D_StatusPemeliharaan with acceptance percentage of 95% based on the test results.
COMPARATION OF DISTRIBUTED DATABASE MODEL BY CLUSTERING METHOD IN E-GOVERNMENT SYSTEM. STUDY AT KEMENKEU RI
Adinda Krida Wicaksono;
Fauzie Nurrakhman;
Samidi Samidi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.629
MySQL is one of the most popular open source database in the world based on its performance, its reliability, and its easiness that has been proved. MySQL is categorized into community version and commercial version. The commercial version has standalone architecture models and clusters.Database Clustering is one of distributed database model. The case study used is Kemenkeu Learning Center (KLC) Application which is an e-government application in Ministry of Finance. KLC application used for interactive learning media for all ASN especially ASN in Ministry of Finance. This makes the KLC application being categorized into a very high critical application, so it takes a good response time and has high availability. One of the most important factors to fulfill this need is by deciding the appropriate MySQL database architecture for KLC application. This research was conducted by creating 3 (three) database architecture models according to best practice from MySQL, namely the Standalone architecture model, InnoDB Cluster and NDB Cluster. Then tested with several different scenarios to get results in the form of response time and percentage of errors that indicate high availability capabilities. The tools used in testing are Apache JMeter. From the test results, it is found that the MySQL NDB Cluster is the right database architecture model in an effort to realize the need for database services with the best response time and high availability capabilities.
HAND GESTURE AND DETEKSI WAJAHDETECTION USING RASPBERRY PI
Helfy Susilawati;
Ade Rukmana;
Fitri Nuraeni
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.635
Face detection is currently used for various purposes, one of which is to record employees attendance. This strategy is ineffective since the employees still can hack the attendance by making their own photos and put them in their desks. If they are unable to come to the office,they can always ask their colleagues to submit their already available photos.Therefore, an alternative that can complement the current face detection method is highly needed.One of the methods that can be used is hand gesture detection.This study aims to detect hand gestures made by the employees to ensure whether they really come to work or not,so the chance for manipulation is quite small.For the purpose of hand gesture recognition, this study utilized Local Binary Pattern Histogram algorithm. LBPH is an algorithm used for the image matching process between images that have been given training and images taken in real time.The hand gesture image was first taken using a raspberry pi camera and then processed to examine whether it matches the registered ID or not.The results showed that ID recognition by using hand gestures is detectable and is in accordance with the registered ID.The number recognition in hand gestures includes numbers 1 to 10. The test results showed that, the average time required for reading hand gestures using a laptop was 9.2 seconds, while that of using raspberry was 14,2 seconds.Motion reading using a raspberry takes longer than that of using a laptop because the laptop's performance is higher than that of a raspberry.
LANDSLIDE HAZARD MAPPING USING THE SCORE AND WEIGHT METHOD IN BANJARNEGARA
Muhammad Lulu Latif Usman;
Bita Parga Zen;
Zulfina Wiria Ananda;
Siti Roqayah;
Lintang Cahya Mulyadani;
Bunga Laelatul Muna;
Aprilia Intan Prasetya
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.638
Banjarnegara has a category of high or very vulnerable landslide susceptibility, according to data from the National Disaster Management Agency from 2006 to 2021, there has always been at least 1 landslide disaster in Banjarnegara. As a step in disaster reduction in Banjarnegara, a landslide hazard analysis was carried out. The methodology used is scoring and weighting using 4 indicators of rainfall, geology, land use, and slope. Landslide susceptibility is measured by calculating the total score which is then categorized based on the total score. The landslide susceptibility category is divided into 4 categories, namely Very Low, Low, Medium, and High. Areas with high vulnerability category have a proportion of 0.06% with an area of 682,073 m2, Medium has a proportion of 55.51% with an area of 625,539,155 m2, and Low has a proportion of 44.43% with an area of 500,730,369 m2. The results of the landslide hazard map can then be used as a reference for the Regional Disaster Management Agency to reduce the risk of landslide vulnerability.
ANALYSIS OF BRUTE FORCE ATTACK LOGS TOWARD NGINX WEB SERVER ON DASHBOARD IMPROVED LOG LOGGING SYSTEM USING FORENSIC INVESTIGATION METHOD
Rio Pradana Aji;
Yudi Prayudi;
Ahmad Luthfi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.644
Since it was first launched in 1990, the Web Server is still in use today. No exception, almost all companies entering industry 4.0 use Web Servers to show the existence of the company's website and its products. Starting from the websites provided for free by WordPress and Blogspot to independent websites created by their respective companies. The web server itself is available in several types, ranging from apache, nginx, litespeed, etc. Of course, the use of a Web Server for websites cannot be separated from internet crimes or cyber crimes. One of the crimes committed is the hacker's attempt to login to the website Administrator page. The loophole used by hackers is brute force or forced entry by trying every combination of existing Administrator User and Password. This research focuses on building and updating a website monitoring dashboard system with Wazuh technology. The method used in this study is the Quantitative Forensic Investigation Method by examining the logs generated by the System Dashboard using Digital Forensic procedures. This monitoring process aims to detect brute force threats on managed websites by showing the website Administrator login activity log. The results of the metadata log shown by the optimized dashboard show the number of brute force attacks on managed websites. The number of attacks recorded was 259646 attacks on the first cluster and 288676 attacks on the second cluster. In addition, the results of the metadata log can be investigated further to find the location of the Hacker. The location of the hackers found was only limited to the VPN (Virtual Private Network) server used. One of the VPN servers used in this case is Amazon Data Center.
INTEGRATED POPULATED SERVICES SYSTEM USING AGILE APPROACH
Agus Qomaruddin Munir;
Evrita Lusiana Utari;
Desty Ervira Puspaningtyas;
Bayu Indra Wahyudi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.657
The significant and uneven population growth in Indonesia in each region triggers problems for implementing development. The government has tried to overcome various population problems, one of which is using electronic media to record and update population biodata in population administration in Indonesia, namely establishing a Population Administration Information System (SIAK). The goal is that all people can be recorded and recorded accurately in the SIAK database and have a Population Identification Number (NIK) which is helpful as a reference for the government in providing public services to the community, one of which is population services at the village level. Kelurahan is a government agency under the sub-district, led by the village head. Kelurahan consists of several RW, and each RW consists of several RT. For this reason, a government agency requires a system that can assist and facilitate agency devices, so a system is needed, namely a population information system in the Village. This study aims to make an Integrated Population Information System at the Kalurahan level. The Population Information System includes data services for new residents, birth data, death data, moving data, arrival date, and marriage data. The information system is accessed using mobile devices that have easy access for residents. The software development method used is a serial waterfall which starts from the system's planning, analysis, design, and implementation process. The output of this research is an applicative work for using research-based information technology to assist population services where the Integrated Population Service System can be accessed using a mobile application. Digitized data can be used as a basis for information retrieval, one of which is the opportunity to make efforts to facilitate population services through the information collected.