cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 962 Documents
IMPLEMENTATION OF DATA MINING WITH CLASSIFICATION AND FORECASTING METHOD USE MODEL GAUSSIAN NAÏVE BAYES FOR BUILDING STORE (STUDI CASE: TB SINAR JAYA) Fernando Valentinus; Fabian Sujono; Ilham Ariansyah; Dwi Ade Handayani Capah
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.701

Abstract

In the construction industry, the building materials business is a necessity, one of the businesses that is currently growing rapidly is the property business. The public’s need for a place to live becomes a business opportunity sought by the public. The Industry 4.0 transformation brought building materials stores to the online market, one of which is Tokopedia. TB. Sinar Jaya has a dataset of inventory and sales with a total of approximately 15,000 data rows which are updated each month. With large amounts of data, data mining and machine learning methods are needed in data management. 5 years rapid development of TB. Sinar Jaya has not been without problems, such as competition with online stores that offer lower prices than offline stores and a lack of strong marketing strategy. In this case, TB. Sinar Jaya wants help in making marketing strategy decisions by utilizing information system technology and minimizing existing problems. Based on these problems, it is necessary to implement data mining and machine learning gaussian algorithms naïve bayes to find out the average prices available on Tokopedia to increase sales and carry out classification, forecasting and TSA (Time Series Analysis) at TB Sinar Jaya. Based on the results of testing/research, the gaussian naive Bayes algorithm has good accuracy results with an accuracy level of 0.71 and gains insight, that is, for potential buyers they can do Wishlist efficiency, and for segments that generate profits below 50% of the total profit the researcher recommends carrying out a campaign program according to customer profile in order to improve the resulting profitability.
HYBRIDIZATION OF THE NAIVE BAYES CLASSIFICATION METHOD IN THE FRESHWATER FISH SEED SELLER CLASSIFICATION MODEL M Hafidz Ariansyah; Esmi Nur Fitri; Sri Winarno; Asih Rohmani; Fikri Budiman; Junta Zeniarja; Edi Sugiarto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.715

Abstract

Freshwater fish seed sellers play several roles in the supply chain process in the freshwater fish farming business. The role of the seller of freshwater fish seeds in this process is to distribute fish seeds which are one of the upstream sources in the supply chain process. Freshwater fish cultivators must select competent freshwater fish seed sellers so the supply chain process can run well. A large number of freshwater fish seed sellers in the market remind freshwater fish cultivators to choose the quality of the freshwater fish seed seller in terms of seed quality, low prices, shipping that can reach many areas, ergonomic packaging, and others. This study proposes Hybrid Naïve Bayes Classifiers (HNBCs) as a machine learning method for classification. This study aimed to compare the seed seller classification method in which the appropriate pattern of seed seller was identified by hybridization of Naïve Bayes Classifiers (NBCs), and then the researchers conducted performance appraisal and evaluation. The results are beneficial for freshwater fish cultivators and researchers which will enable them to formulate their plans according to the predicted results. The proposed method has produced significant results by achieving a training data accuracy of 82.61% and the testing data accuracy of 73.91%.
INFORMATION FOR THE IDENTIFICATION AND VERIFICATION OF PROSPECTIVE POVERTY SOCIAL ASSISTANCE RECIPIENTS Aji Supriyanto; Sri Mulyani; Tri Ariyanto; Jeffri Alfa Razaq
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.722

Abstract

One important aspect of the poverty alleviation strategy is the availability of accurate poverty data, so that the government in providing social assistance (Bansos) can be right on target. The problem is that if there is an inaccuracy in the identification process when recording citizen data, it will affect the process of verifying and validating data on prospective Social Assistance recipients. Inaccuracies in prospective Social Assistance recipients can occur due to the process of collecting data on citizen identities and applying the wrong criteria for poverty requirements and the data is not up to date. The purpose of this research is to develop an information system to identify, verify, and validate data on prospective Social Assistance recipients. The identification stage for potential recipients of social assistance is carried out at the RT/RW and Kelurahan levels. The verification stage is carried out by fulfilling the requirements of the poverty criteria. Meanwhile, the validation stage is used to determine the ranking of potential social assistance recipients. The verification process is carried out at the Kelurahan and Kecamatan levels, while the validation process is at the Regency/City level. The waterfall method is used in the development of information system prototypes for prospective Social Assistance recipients with system analysis and design using use case, activity, and sequence diagrams. The prototype was tested with CRUD and trial & error, the result is a prototype system application that is able to collect citizen data by applying a priority scale for prospective recipients of social assistance based on a web by fulfilling the requirements of 14 poverty criteria according to the Central Statistics Agency (BPS).
4G LTE NETWORK WALK TEST ANALYSIS USING ANDROID APPLICATION G-NET TRACK ON SWCU FTI BUILDING Yosefhin Rayaruna Yungka; Dian Chandra Widiyanto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.727

Abstract

The poor performance of a cellular network can hinder student academic activities such as the difficulty of accessing online materials. Therefore, this research aims to obtain data on the quality of the 4G LTE cellular network in the SWCU FTI building area so that the data can be used as a reference for improving network quality. The parameters used for analysis are RSRP (Reference Signal Received Power), RSRQ (Reference Signal Received Quality) and SINR (Signal Interference to Noise Ratio) parameters. The results of measurements in 21 data collection points show that the RSRP parameter shows that the overall average of Telkomsel operators is -111.05 dBm and Indosat operators is -114.48 dBm and based on KPI standards, it is categorized as very poor signal quality. For the RSRQ parameter, the average overall measurement results for Telkomsel operators is -16.25 dB and Indosat operators are -19.57 dB and based on KPI standards, it is categorized as poor signal quality. For SINR parameters, the overall average of Telkomsel operators is -7.5 dB and Indosat operators is -7.8 dB and based on KPI standards, it is categorized as poor signal quality.
LECTURERS ADMISSIONS SELECTIONS MODEL USING FUZZY K-NEAREST NEIGHBOR METHOD Lely Meilina; Nyoman Putra Sastra; Dewa Made Wiharta
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.740

Abstract

Higher Education, or tertiary education, is the final stage which is optional in formal education. It is usually organized in the form of a university, academy, seminary, high school, or institute. Every tertiary institution needs qualified and professional educators because they have an important role in the process of implementing the Tri Dharma of Higher Education. Recruitment for teaching staff usually has several stages and standardization of assessment in selection proces. In order for the process of selecting educators to be carried out objectively, a support system is need to carry out the assessment process. This study applies the Fuzzy K-Nearest Neighbor (FK-NN) method for the classification process in determining prospective educators who pass or not. Data classification is a new data or object grouping into classes or labels based on certain attributes. The application of the FK-NN method has several stages, namely weighting the criteria, then calculating the closeness of the test data and training data, finding the value of k-nearest neighbors between the training data and testing data and determining the membership of each data. Tests were carried out using the Confusion matrix method on several variations of the k value where the highest percentage was obtained from the value of k = 5. The test results for all k values obtained an average accuracy rate of 89.22%, 89.22% precision and 82.45% recall with 114 training data and 50 test data. Based on the average value of the test results, it can be concluded that the FK-NN method is feasible and good to use for the selection of educators with the classification of pass or not.
DEVELOPMENT OF PROTECTION PROFILE FOR SECOND-LEVEL E-KTP CARD READER BASED ON ISO/IEC 15408:2022 AND ISO/IEC TS 19608:2018 Yhufi Swastantri Gustiviana; Yohan Suryanto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.741

Abstract

The second level e-KTP reader device is an electronic data reader device stored in the e-KTP chip by applying a verification device in the form of a fingerprint/face scan. The data stored in the e-KTP chip is personal data that is general and specific, as stated in Law Number 27 of 2022. Therefore, users of e-KTP readers as controllers and processors of personal data are obliged to prevent unauthorised access lawfully by using a security system reliably, safely and responsibly. Permendagri Number 76 of 2020 requires compliance with product standards by involving relevant K/L agencies in the security sector as a form of supervision. Based on BSSN Regulation 15 of 2019, implementing the evaluation process in Indonesia's common criteria scheme requires a Protection Profile document to support the evaluation of IT device security. However, there is no Protection Profile document for e-KTP reader devices that have been certified so that it can be used as a reference in developing IT devices to support the evaluation of IT device security. Therefore, in this study, developing Protection Profiles for e-KTP readers based on ISO/IEC 15408 and ISO/IEC TS 19608: 2018 was carried out to prepare functional security requirements and security guarantees by considering the protection of personal data. While the developing method used is based on ISO/IEC TR 15446:2017. The results of this study are preparing a Protection Profile document consisting of 25 functional security requirements to fulfil 8 device security objectives with a level of security assurance at Evaluation Assurance Level (EAL) 4. Then the design results are tested based on the Assurance Protection Profile Evaluation class (APE) ISO/IEC 18045:2022 and declared to meet the criteria based on the ISO/IEC 15408 series.
CRYPTOGRAPHIC PROTOCOL SECURITY IN NATIONAL ENCRYPTION APPLICATIONS Widodo, Agung; Suryanto, Yohan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.744

Abstract

In the era of digital transformation, information exchange, especially confidential and strategic information has become the most vital aspect for almost all organizations. Various bad precedents regarding classified and strategic information leaks in Indonesia have become a slap in the face that must be acknowledge and answered with effective solutions. In 2020, XYZ Agency developed a file encryption application (ABC Application) to address the challenge of securing confidential information, especially those transmitted on electronic channels. Until 2022, the ABC Application has been implemented in a limited scope and its implementation is planned to be expanded nationally. After 2 years of operation, the XYZ Agency has conducted a study on the security of the algorithm used in ABC Application, but unfortunately has not conducted an in-depth study regarding the security of the protocol suite used in the Application. In this research, a security analysis of ABC application protocol suites, namely the registration protocol, user verification, key generation, and key request for the encryption-decryption process protocol was conducted through formal verification approach using the Scyther Tool. The analysis focuses on aspects of guaranteeing confidentiality of information and authentication with four criteria, namely secrecy, aliveness, synchronization, and agreement. The experimental results showed that these protocols meet the security criteria for the transmitted confidential information but have general weaknesses in the authentication aspect, especially for synchronization and agreement criteria. Based on these weaknesses, technical recommendations are proposed that are able to overcome the identified weaknesses.
BUSINESS PROCESS REENGINEERING SUPPLY CHAIN MANAGEMENT SYSTEM BASED BLOCKCHAIN USING BPR LC Fikri Firdaus Tananto; Wellia Shinta Sari; Farrikh Alzami; Mira Nabila; Filmada Ocky Saputra; Chaerul Umam; Hasan Aminda Syafrudin; L.Budi Handoko
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.746

Abstract

The agricultural sector in Indonesia is a superior sector compared to other sectors. The red onion commodity in Indonesia has the highest household consumption rate. Nowadays, technological developments are widely used to support existing agriculture to get maximum results. One of the technologies that can be used in agriculture is blockchain. The application of blockchain has gained importance in information systems and information technology research in the agricultural sector. However, in Indonesia, precisely in Central Java, there is no red onion supply chain management that uses blockchain technology for data storage, data security and data transparency. The author has a goal to re-engineer to overcome these problems by implementing blockchain technology using the Hyperledger Fabric and modeling business processes with Business Process Modeling Notation (BPMN). This research uses the Business Process Re-Engineering Life Cycle method in which this research produces red onion supply chain management with a new business process that is described by Business Process Modeling Notation (BPMN) and produces blockchain applications with various features and testing has been carried out using the Black box testing method with the result that existing features can run well without problems and the web application is running according to user needs to support supply chain management deficiencies so that they become more optimal and transparent in data storage.
DECISION TREE SIMPLIFICATION THROUGH FEATURE SELECTION APPROACH IN SELECTING FISH FEED SELLERS Esmi Nur Fitri; Sri Winarno; Fikri Budiman; Asih Rohmani; Junta Zeniarja; Edi Sugiarto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.747

Abstract

Feed is a crucial variable because it can determine the success of fish farming. Breeders can use two types of artificial feed, namely alternative feed and pellets. Many cultivators need pellets as the main consumption for the fish they are cultivating because the pellets contain a composition that has been adjusted to their needs based on the type and age of the fish. However, currently, cultivators are facing a problem, namely the high price of fish pellets on the market. Therefore, an analysis of the classification of the selection of fish feed sellers is needed that is adjusted to several criteria like the number of types of feed, price, order, delivery, and availability of discounts. This study conducted a classification analysis of simplification of characteristics in selecting fish feed sellers in Kendal Regency that would then be compared with a model without feature selection by utilizing the Decision Tree C4.5 method. The results of this study are the decision tree with the best performance where C4.5 with the application of the selected feature has an accuracy value of 92%, while C4.5 without the selection feature has an accuracy of 86.8%. The results of this study indicate that the C4.5 method with the application of selection features is better than C4.5 without selection features so that it can be applied to the selection of freshwater fish feed sellers in Kendal Regency.
BLUEPRINT FOR RECORDING DATA ON RED ONION FARMING ACTIVITIES USING THE BPR METHOD Muhammad Riza Noor Saputra; Farrikh Alzami; Kukuh Biyantama; Muhammad Ridho Abdillah; Alvin Steven; Chaerul Umam; Aris Nurhindarto; Firman Wahyudi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.2.748

Abstract

To advance agriculture in Indonesia, farmers must be able to calculate the need for fertilizer, optimal use of pesticides, the amount of irrigation water required, the type of seed and the suitable land area in order to get maximum and sustainable agricultural yields. Besides that, farmers must also know the efforts in preventing and handling diseases. Therefore, researchers developed a prototype for recording data on agricultural activities both carried out by farmers and recording the condition of agricultural land by IOT. The Business Process Reengineering method is used to obtain an AS-IS system analysis so that a blueprint model is obtained that is suitable for recording agricultural activities. So that red onion farmers can manage customer relationships while performing their agricultural activities using this web-based information system application prototype. The results of the recording carried out by farmers and IOT using the Laravel web-based application development and using PostgreSQL version 14 can be used to provide input and notifications to farmers regarding actions that need to be taken.

Filter by Year

2020 2025


Filter By Issues
All Issue Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025 Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025 Vol. 6 No. 3 (2025): JUTIF Volume 6, Number 3, Juni 2025 Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025 Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025 Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024 Vol. 5 No. 5 (2024): JUTIF Volume 5, Number 5, Oktober 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024 Vol. 5 No. 2 (2024): JUTIF Volume 5, Number 2, April 2024 Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024 Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023 Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023 Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023 Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023 Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023 Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023 Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022 Vol. 3 No. 5 (2022): JUTIF Volume 3, Number 5, October 2022 Vol. 3 No. 4 (2022): JUTIF Volume 3, Number 4, August 2022 Vol. 3 No. 3 (2022): JUTIF Volume 3, Number 3, June 2022 Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022 Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022 Vol. 2 No. 2 (2021): JUTIF Volume 2, Number 2, December 2021 Vol. 2 No. 1 (2021): JUTIF Volume 2, Number 1, June 2021 Vol. 1 No. 2 (2020): JUTIF Volume 1, Number 2, December 2020 Vol. 1 No. 1 (2020): JUTIF Volume 1, Number 1, June 2020 More Issue