Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
962 Documents
ANDROID MOBILE-BASED ENGLISH LEARNING GAME EDUCATION FOR CHILDREN IN INDONESIA
Devi Afriyantari Puspa Putri;
Diah Priyawati;
Nur Khaulah Arrizka;
Fadilla Setia Khasanah;
Inesti Litaswari
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.915
The increasing use of english languange and its importance as a global languange make english languange become important to learn and understand by many people. However, there are some difficulties in learning English, especially for early childhood in Indonesia, due to various factors, including: lack of vocabulary, and teaching materials and books that are less innovative. Therefore, this study aims to build an edugame that contains animal and fruit vocabulary for early childhood in Indonesia based on the CCI guidelines to make applications that are quite innovative. The ADDIE method was chosen as the research method used which consists of: pre-production, production, and post-production. The edugame application in this reseacrh contains of two main menus, are: learning menu that contain fruits and animal vocabularies alongside with sound of their spelling, and play game menu, that challenge children to guess the correct answer of every vocabulary. According to the result of pretest and posttet test that conducted on 40 children with parental assistance showed the increasing of scores in answering list of questions. Besides that, the SUS testing carried out in this research got an average point about 84.81 which means that the applicatian has a good function and can be accepted by users.
IMPLEMENTATION OF THE RANDOM FOREST ALGORITHM IN CLASSIFYING THE ACCURACY OF GRADUATION TIME FOR COMPUTER ENGINEERING STUDENTS AT DIAN NUSWANTORO UNIVERSITY
Devi Ayu Rachmawati;
Nitho Alif Ibadurrahman;
Junta Zeniarja;
Novi Hendriyanto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.920
To ensure the existence of a university remains intact, one way that can be done is by optimizing the performance of the students so that they can graduate on time. A high percentage of on-time graduation will result in a good assessment of the accreditation of the department in the university. However, there are many factors that affect the graduation rate, such as the student's academic performance, extracurricular activities, and other factors. The data of graduation of students in the Computer Science program at the Faculty of Computer Science, Dian Nuswantoro University, for the academic years 2008-2017 is the object of this study. The objective of this research is to create the best classification model using the Random Forest algorithm to predict the accuracy of the graduation time of students, which will be useful for policy making in the future. The results of the classification using this algorithm received an accuracy of 93% for the training data and 91% for the test data.
HEALTH SERVICE QUALITY VALUES OF PRIMARY CLINIC USING EPARTICIPATION SERVICE QUALITY ASSESSMENT
Siswanto, Joko;
Lisangan, Erick Alfons;
Zaenudin, Zaenudin
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.934
The use of technology to manage participation in the quality of health services needs to be carried out to produce relevant, valid and accurate assessments of service quality. Not all Primary Clinics have health service quality standards and quality evaluation data for participation services using information technology (via electronic media). This is crucial for evaluating clinic development, upgrading the status to Main Clinic, and improving the service quality. The methodology used adopts the eParticipation framework with the stages of Areas of Participation (determining the main areas of participation), Category of Tools (determining the categories of ICT support tools), and Technology (determining ICT support technologies). The participation area is limited to Primary Clinic patients who act as participants of 1,308 people. 14 elements with a total of 33 detailed elements are the basic elements for assessing service quality. Application of eParticipation SQA website-based is used to manage and present the results of service quality assessments by Primary Clinic Managers. The highest average service quality assessment is in the answers to Good (62%), the Worse and Poor options are minimized, and the options of Good and Very Good are maximized. The technology required consists of software, hardware, and network devices. The application is supported by Manager and is used easily, quickly, and precisely.
COMPARISON OF IMAGE SEGMENTATION METHOD IN IMAGE CHARACTER EXTRACTION PREPROCESSING USING OPTICAL CHARACTER RECOGINITON
Condro Wibawa;
Dessy Tri Anggraeni
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.956
Today, there are many documents in the form of digital images obtained from various sources which must be able to be processed by a computer automatically. One of the document image processing is text feature extraction using OCR (Optical Character Recognition) technology. However, in many cases OCR technology are unable to read text characters in digital images accurately. This could be due to several factor such as poor image quality or noise. In order to get accurate result, the image must be in a good quality, so that digital image need to be preprocessed. The image preprocessing method used in this study are Otsu Thressholding Binarization, Niblack, and Sauvola methods. While the OCR technology used to extract the character is Tesseract library in Python. The test results show that direct text extraction from the original image gives better results with a character match rate average of 77.27%. Meanwhile, the match rate using the Otsu Thressholding method was 70.27%, the Sauvola method was 69.67%, and the Niblack method was only 35.72%. However, in some cases in this research the Sauvola and Otsu methods give better results.
INFORMATION SECURITY RISK MANAGEMENT DESIGN OF SUPERVISION MANAGEMENT INFORMATION SYSTEM AT XYZ MINISTRY USING NIST SP 800-30
Ricko Dwi Pambudi;
Kalamullah Ramli
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.978
SIMWAS is an information system at the XYZ Ministry that is used to manage supervisory activities and follow up on supervisory results. SIMWAS is an important asset that contains all internal control business processes, but in practice, SIMWAS information security risks have not been managed properly. To overcome these problems, information security risk management is needed at SIMWAS. This study aims to design and analyze SIMWAS information security risk management using the NIST SP 800-30 framework. NIST SP 800-30 focuses on a particular infrastructure and its boundaries. Since the purpose is to perform a technical risk analysis of the core IT infrastructure, it is highly prescriptive. It has nine primary steps to conduct risk assessment. The NIST SP 800-30 framework is used to design and analyze SIMWAS information security risks by identifying threats, vulnerabilities, impacts, likelihoods, and recommendations for controls. SIMWAS information security risk assessment is carried out by analyzing data obtained from the results of interviews, observations, and document reviews. The results of this study show that SIMWAS information security has four low-level risks, eight moderate-level risks, and five high-level risks. Very low and low risk levels are acceptable according to the risk appetite of the business owner, but moderate, high, and very high-risk levels require risk avoidance, risk transfer and risk reduction. The XYZ Ministry need to carry out residual risk analysis and cost-benefit analysis from implementing controls in each risk scenarios.
ACCREDITATION PREDICTION OF EARLY CHILDHOOD EDUCATION INSTITUTIONS USING MACHINE LEARNING TECHNIQUES
Noripansyah Noripansyah;
Abdul Kadir;
Dewi Kusumaningsih;
Haderiansyah Haderiansyah
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.999
Accreditation is an acknowledgement of an educational institution regarding the feasibility of carrying out the educational process. Making predictions can save time for early childhood education institutions in compiling accreditation forms that will be submitted. Prediction in determining accreditation becomes an important lesson for an institution in self-assessing the quality of its services. Choosing which method to use in the accreditation prediction process becomes a serious problem, so the prediction results can be the closest or most accurate. Machine Learning is an application that is part of Artificial Intelligence which is widely used in prediction research. In this experiment, three algorithms in machine learning are tested, namely SVM, KNN and ANN. This study uses data from the accreditation results of early childhood education institutions in South Kalimantan; the sample data is 75%, and the remaining data is 25%. The results of the KNN algorithm with Euclidean distance and the number of neighbours 5 have the best performance in predicting the value of the accreditation predicate compared to other methods. The results of calculations using the KNN method produce Area Under Curve values of 1,000, CA 1,000, F1 1,000, precision 1,000 and Recall 1,000.
ANALYZING SURICATA ALERT DETECTION PERFORMANCE ISSUES BASED ON ACTIVE INDICATOR OF COMPROMISE RULES
Didit Hari Kuncoro Raharjo;
Muhammad Salman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.1013
Many studies have been related to the Intrusion Detection System (IDS) performance analysis. Still, most focus on inspection performance on high-capacity networks with packet drop percentage as a performance parameter. Few studies are related to performance analysis in the form of detection accuracy based on the number of rules activated. This research will analyze the performance of IDS Suricata based on the number of active rules in the form of Indicator of Compromise (IoC), including IPRep, HTTP, DNS, MD5, and JA3. The analysis method focuses on the detection accuracy of varying the number of active rules up to 1 million, expressed in 5 scenarios. In scenarios 1 to 4, where IoC rules are tested separately, the reduction in detection accuracy performance starts to occur when the number of active rules is at 100,000 and continues to decrease when the number reaches 1 million. However, in scenario 5, where the IoC rules are tested together, the percentage of rules detection accuracy decreases when the number of active rules from each IoC is less than 10,000. The percentage decrease in detection accuracy performance in scenario five can occur with an average reduction of 19.64%. Even further in scenario 5, when the total number of rules reaches 1,000,000 or 200,000 from each IoC, IDS Suricata fails to detect all rules (detection percentage is 0%). This research show that the higher number of rules activated, the decrease in the Suricata IDS performance in terms of detection accuracy.
A MACHINE LEARNING APPROACH TO EYE BLINK DETECTION IN LOW-LIGHT VIDEOS
Rasyid, Muhammad Furqan;
Rizal, Muhammad;
Musu, Wilem;
Hadis, Muhammad Sabirin
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.1024
Inadequate lighting conditions can harm the accuracy of blink detection systems, which play a crucial role in fatigue detection technology, transportation and security applications. While some video capture devices are now equipped with flashlight technology to enhance lighting, users occasionally need to remember to activate this feature, resulting in slightly darker videos. Consequently, there is a pressing need to improve the performance of blink detection systems to detect eye accurately blinks in low light videos. This research proposes developing a machine learning-based blink detection system to see flashes in low-light videos. The Confusion matrix was conducted to evaluate the effectiveness of the proposed blink detection system. These tests involved 31 videos ranging from 5 to 10 seconds in duration. Involving male and female test subjects aged between 20 and 22. The accuracy of the proposed blink detection system was measured using the confusion matrix method. The results indicate that by leveraging a machine learning approach, the blink detection system achieved a remarkable accuracy of 100% in detecting blinks within low-light videos. However, this research necessitates further development to account for more complex and diverse real-life situations. Future studies could focus on developing more sophisticated algorithms and expanding the test subjects to improve the performance of the blink detection system in low light conditions. Such advancements would contribute to the practical application of the system in a broader range of scenarios, ultimately enhancing its effectiveness in fatigue detection technology.
IMPLEMENTATION AND ANALYSIS OF THE INTERNET OF THINGS SYSTEM FOR ELECTRICAL ENERGY MONITORING AT INSTITUT TEKNOLOGI TELKOM PURWOKERTO
Agung Enriko I Ketut;
Mas Aly Afandi;
Herryawan Pujiharsono;
Fikri Nizar Gustiyana;
Hedi Krishna;
Filbert H. Juwono
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.1027
Measurement of electric power usage is carried out using simple measuring instruments and the recording is still manual so that the data obtained is not real-time and accurate. This research aims to implement an electrical energy monitoring system using the Internet of Things (IoT) to obtain real-time information related to electrical energy in the education industry. This research uses an Industrial Grade Power Meter to get a more accurate measurement value. To connect the Power Meter device with the IoT system, this research uses Modbus RS485 communication and a mini PC to process data from the meter, so that the data can be sent to a server using the MQTT communication protocol, and displayed on the Dashboard. The test results of this study indicate that the monitoring system can be implemented and the system runs well with end-to-end measurement results. From the measurement results, the current value (3 phase average) has an average deviation of 0.001 Amperes, Voltage (3 phase average) has an average deviation of 0.519 V, Power factor has an average deviation of 0.012, Active power has a deviation average of 0.000 kW, reactive power with an average deviation of 0.000 kVAR, apparent power with an average deviation of 0.000 kVA and frequency with an average deviation of 0.124 Hz. Then the MQTT protocol has a quality of service with index 4 based on TIPHON standardization on delay, throughput, and packet loss parameters, and index 3 based on TIPHON standardization on jitter parameters.
DATA AVAILABILITY IN DECENTRALIZED DATA STORAGE USING FOUR-NODE INTERPLANETARY FILE SYSTEM
Tony Haryanto;
Kalamullah Ramli;
Arga Dhahana Pramudianto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.52436/1.jutif.2023.4.3.1030
Centralized storage is a data storage model in which data is stored and managed in a single physical location or centralized system. In this model, all data and information are stored on servers or data centers managed by one entity or organization. This model also has disadvantages such as risk of system failure against distributed denial of service (DDoS) attacks, natural disasters, and hardware failures causing a single point of failure. This threat results in loss of data and a lack of user confidence in the availability of data in centralized storage. This study proposes to evaluate the availability of data in decentralized data storage using a four-node interplanetary file system (IPFS) that is interconnected with a swarm key as the authentication key. Unlike centralized storage which has only one data center, four-node IPFS allows users to upload and download data from four interconnected data centers. This can avoid dependence on the central server and reduce server load. The evaluation results show that decentralized data storage using a four-node IPFS system is three times more resilient than centralized storage against a single point of failure. This system can increase data availability so that organizations can minimize data loss from the threat of system failure.