Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
962 Documents
STEEL BOX GIRDER BRIDGE COMPONENT TRACEABILITY SYSTEM USING TREE STRUCTURE DIAGRAM AT PT BUKAKA TEKNIK UTAMA
Condro Wibawa;
Metty Mustikasari;
Dessy Tri Anggraeni
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.662
The International Organization for Standardization (ISO) through ISO 9001:2015requires every product to have product traceability. In response to these challenges, PT Bukaka Teknik Utama developes the Traceability System in the Steel Box Girder Bridge products. Traceability System built by adopting Tree Structure Diagram Concept to describe production system process currently runs. The production process start from identify raw material, cutting process, sub-assembly process, and assembly process. This concept is then translated into Relational Database by applying Parent-Child Concept. The result of this Traceability System is the system able to issue a list of product traceability including raw material information, sub-contractor/employee who work on them, etc, quickly and accurately. System testing was carried out using the black box method, where of the 37 items tested all functioned properly. Tests were also carried out to determine the accuracy and speed of the system compared to the manual method. Of the 10 tests carried out, the system traceability is exactly the same as the manual method with an average processing time of 3 seconds, compared to the manual method, which is 97.6 seconds.
EXPERT SYSTEM FOR INITIAL IDENTIFICATION OF DISEASES CAUSED BY HELICOBACTER PYLORI BACTERIA USING CASE BASED REASONING APPROACH
Dasril Aldo
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.693
Helicobacter pylori, which is a bacterium that can live in the stomach. Infection can occur when bacteria invade and damage the stomach wall. Lack of information and ignorance of the public about the seriousness of these bacteria causes various very serious diseases such as inflammation of the digestive tract (gastritis), gastric bleeding, gastric perforation (leak stomach), infection of the peritoneal wall (peritonitis) and gastric cancer. This expert system aims to provide information and also early identification of diseases caused by the bacterium Helicobacter pylori. After the expert system has identified the type of disease, it will then suggest the actions that need to be taken. The method used is CBR, this method works with the stages of Retrieve, Reuse, Revise, and Retain. The data that will be processed in this study are 30 data, with the results of 29 data in accordance with the doctor's diagnosis. From these results, it can be said that the accuracy of this expert system is 97% so that it can be used as an alternative in identifying diseases caused by the bacterium Helicobacter pylori.
OPEN JOURNAL SYSTEM SECURITY CAPABILITY LEVEL ASSESSMENT USING COBIT 5 FRAMEWORK AT ABDURRAB UNIVERSITY
M. Alfaraby;
Megawati Megawati;
Idria Maita;
Fitriani Muttakin
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.742
Data security is very important in the digital era, this makes it an important issue for companies, organizations and educational institutions. Such as the Open Journal System (OJS) security which is useful for managing online journals. Abdurrab University has utilized the Open Journal System (OJS) to manage published journals. However, the management of the Open Journal System (OJS) security has not been managed properly, such as Abdurrab's Open Journal System (OJS) which has been hacked, there is still a lack of documentation and system security procedures and has never been assessed the level of capability of the information system so that it is not known exactly the level of security management of the Open Journal System (OJS) at Abdurrab University. This study aims to assess the capability level of Abdurrab University's Open Journal System (OJS) using the COBIT 5 domain DSS05 framework and Process Assessment Model (PAM) to assess system capabilities and guide IT management and provide effective and efficient recommendations. The results of the study obtained a questionnaire calculation value of 2.40 with Process Attribute Level domain DSS05 PA 2.1 Performance Management and PA 2.2 Work Product Management until an achievement score of 63.33% was obtained which was included in the Largely Achieved category with achievements at level 2 (Managed Process). The conclusion of this study is that the level of security capabilities of the Open Journal System (OJS) of Abdurrab University needs to be increased to level 3 (Established Process) because it has not been fully met, so that this research can be used as a reference for improvement by Abdurrab University.
THE ROLE OF BLOCKCHAIN TO SOLVE PROBLEMS OF DIGITAL RIGHT MANAGEMENT (DRM)
Jehan Afwazi Ahmad;
Teduh Dirgahayu
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.753
In recent years, internet user was grown significantly. Even though many problems arise due to internet abuse. The sectors affected by the internet is digital assets or digital right. Various ways are done to solve the violation. One of that ways is to develop digital protection or Digital Right Management (DRM). However, the DRM technology has several disadvantages such as there is no way to track the leak and prove a copyright violation, the user is unable to authenticate the content since the content source is unknown, there is no user restriction to download the content, the system isn’t provided the feature to alienate ore transfer ownership the content to other, and the system using centralize model that requires many issues, especially trust issue. Fortunately, the blockchain is a decentralized, secure, reliable, immutable, and tamper-proof paradigm. The blockchain is also built upon public key cryptography and has a smart contract that can solve or complement DRM problems. This paper discusses how the blockchain solves DRM problems. The results show that blockchain solves DRM problems. A narrative literature review was conducted with several stages, including a source search of papers, articles and news articles on digital rights management and blockchain in the last five years. The next step is to identify keywords related to the topic, to review the sources, and to compile the paper.
GEOGRAPHIC INFORMATION SYSTEMS FOR AGRICULTURAL SUITABLE LAND AT KABUPATEN SLEMAN
Agus Qomaruddin Munir;
Indra Listiawan;
Evrita Lusiana Utari;
Muh. Ridho Wahid Solihin
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.759
Indonesia is an agricultural country, the growth rate of various food and crops tends to be stable. However, some plants in certain areas are different from what is expected. This study aims to investigate land suitability for crops such as rice, analysis of development potential, and develop recommendations for land use for agricultural types, Sleman Regency, Special Region of Yogyakarta. Landsat 8 imagery is used for land use extraction as input for making land use directions for agricultural and forestry plant species. The method used in this study is a combination of analysis of Landsat 8 imagery and field data processed using a Geographic Information System in making thematic maps of the physical characteristics of the land to obtain land suitability maps for agricultural crop species and with a weighting method in stages based on the physical parameters of the conditions for growing crops. The analysis results are used to formulate land use directions for the types of crops in Sleman Regency. An area very ideal for the type of rice plant and land planted. For crops, it is directed based on the room's function, namely in the cultivation area. Sites that have the potential to be developed for crops are produced and set in buffer zones because more emphasis is placed on conservation aspects and increasing crop productivity. This geographic information system is one of the recommendations to be used as a reference by farmers in increasing the productivity of agricultural land.
OPTIMIZING SENTIMENT ANALYSIS OF PRODUCT REVIEWS ON MARKETPLACE USING A COMBINATION OF PREPROCESSING TECHNIQUES, WORD2VEC, AND CONVOLUTIONAL NEURAL NETWORK
Fahry Maodah;
Ema Utami;
Sudarmawan Sudarmawan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.815
This research attempts to identify the most accurate and effective model in performing sentiment analysis on product reviews in marketplaces using preprocessing techniques, word2vec, and CNN. We collected 20,986 reviews from 720 products in a marketplace using scrap method, then cleaned and labeled the data to include 515 positive reviews, 490 negative reviews. We then performed preprocessing on the data using four different scenarios and identified word vector representation using word2vec. Subsequently, we applied the results of word2vec to the CNN architecture to classify sentiment in product reviews. After trying various variations of each technique, we found that a combination of the third preprocessing technique (case folding, punctuation removal, word normalization, and stemming), the second word2vec parameter combination (size 50, window 2, hs 0, and negative 10), and the fourth CNN parameter combination (kernel size 2, dropout 0.2, and learning rate 0.01) had the best accuracy of 99.00%, precision of 98.96%, and recall of 98.96%. We also found that the word normalization technique greatly helped to increase model accuracy by correcting improperly written or incorrect words in the reviews. Based on the evaluation of word2vec, the hs 0 method produced a higher average accuracy compared to the hs 1 method because the hs 0 method used negative sampling which helped the model understand the context of the trained words. In the CNN parameter, higher learning rates can cause the model to learn faster, but can also cause the model to be unstable, while lower learning rates can make the model more stable but can also cause the model's learning process to be slower.
IMAGE DETECTION IN THE AIMBOT PROGRAM USING YOLOV4-TINY
Arief Kelik Nugroho;
Ipung Permadi;
Ahmad Habiballah
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.821
Cheats are a way for players to gain an unfair advantage. The rise of cheats in online games encourages game producers to increase the security of their games by implementing an anti-cheat system. However, the currently widely circulated anti-cheat system only monitors incoming and outgoing raw data. With the widespread use of image detection systems, we can fool most of today's anti-cheat systems. This can be done by capturing the image that appears on the screen and then processing it through the image detection system. From the process, it can be seen whether there are opponents that appear on the screen. If there is, the program will move the mouse to the place where the enemy is and shoot it. This program is built on the core of the YOLOv4-tiny image detection system.
APPLICATION OF THE ITERATIVE MODEL IN DESIGNING AN ACADEMIC E-COUNSELING SYSTEM AT BINA DARMA UNIVERSITY
Megawaty Ipan;
Tri Oktarina
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.838
Bina Darma University does not yet have a system for guidance on final assignments, theses, theses so that the mentoring process becomes hampered. Problems are caused by several factors, namely conditions, distance, different schedules between lecturers and students. coupled with the current pandemic conditions, the implementation of online lectures so that the guidance process is not optimal, the mentoring history is not well documented, and the most common thing encountered in the field is that students cannot submit complaints related to academic activities. The purpose of this research is to build a student academic e-counseling system at Bina Darma University. The benefits obtained from research are that the guidance/counseling process can run smoothly even though the supervisor does not meet directly with the students, the guidance history data is well documented and coordinated. Become a forum for students in delivering and consulting with their lecturers. The research method uses a descriptive method while the system development method in this study is the iterative model method. the stages of this method are planning, analysis, design, implementation, Maintenance. The results of this study are in the form of student e-counseling systems such as final assignments, theses, and theses. Where this system can manage title submission data, guidance, virtual guidance, student data, supervisor data. Can be accessed online by lecturers and students anytime and anywhere.
OPTIMIZATION OF THE K-NEAREST NEIGHBORS ALGORITHM USING THE ELBOW METHOD ON STROKE PREDICTION
Febri Sutomo;
Daffa Ammar Muaafii;
Daffa Naufaldi Al Rasyid;
Yogiek Indra Kurniawan;
Lasmedi Afuan;
Teguh Cahyono;
Eddy Maryanto;
Dadang Iskandar
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.839
Stroke is the second most deadly disease in the world according to WHO. The sufferer has an injury to the nervous system. Because of this, health experts, especially in the field of nursing, need special attention. Technological advances continue to change over time so that information needs are needed in life. Currently the data on stroke sufferers is extensive enough so that adequate information presentation techniques are needed so that the information received is very accurate and in accordance with user needs. Therefore, it is necessary to process data mining on stroke patient data to obtain useful information for users. This study aims to prove the performance of the Elbow Method to produce the optimum k value in the stroke prediction data using the K-Nearest Neighbors (KNN) algorithm. The optimum k value is generated from the Elbow Method which is executed with the Google Collaboratory using the Python programming language. The test results show that the Elbow Method produces the optimum k value at k = 7. The KNN model that uses the optimum k value from the Elbow Method can increase the accuracy and precision values reaching 6% and 0.12, respectively.
PROTOTYPE OF THE INTERNET OF THINGS-BASED SWALLOW BUILDING MONITORING AND SECURITY SYSTEM
Didit Suprihanto;
Happy Nugroho;
Aji Ery Burhandenny;
Arif Harjanto;
Muhammad Akbar
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.1.858
The Swallow nest production in a cultivation building have high commercial value. There are several factors that affect nest productivity such as light intensity, temperature and humidity conditions in the cultivation building. Better factors can be found in cultivation building that located far from residential area. However, this led to a risk of theft. Therefore, this study proposes a system that able to monitor the productivity factors and safety status of the building. System development uses a comparison method with black box testing. The system controller uses the Raspberry Pi B+ and the python programming language. Sensor Modules (GY-302, DHT-22, BME-280) are used to monitor light intensity, temperature and humidity. The security system uses sensor modules (LDR LM393, PIR HC-SR501 and SW-420) as flashlight, motion and vibration detectors. The black box testing result shows a good performance of the proposed system. The monitoring and security system can monitor the condition of swallow cultivation parameters and security status that can turn on alert alarms, send WhatsApp messages, store log data and send data to the website periodically according to the level of conditions that occur.