cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 962 Documents
DECISION SUPPORT SYSTEM FOR PREDICTING EMPLOYEE LEAVE USING THE LIGHT GRADIENT BOOSTING MACHINE (LIGHTGBM) AND K-MEANS ALGORITHM Vasthu Imaniar Ivanoti; Megananda Hervita P.; Gandung Triyono; Dyah Puji Utami
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.3.1084

Abstract

Nowadays, decision support systems have gained wide popularity not only in private companies but also in government sectors. These systems play a crucial role in assisting leaders during the decision-making process. The effective functioning of the government heavily relies on employee performance, which requires discipline in carrying out their duties and responsibilities. Employee discipline is closely linked to their attendance, including leave-taking. Therefore, analyzing employee leave data can reveal trends and interrelationships, providing leaders with valuable information and insights for determining employee leave policies. To address this issue, data mining applications such as the Light Gradient Boosting Machine (LightGBM) regression prediction model can be utilized. This model takes into account factors like gender, age, and the starting year of leave to predict the number of employees who take annual leave simultaneously with holidays. Additionally, clustering algorithms like K-Means can be employed to group reasons for leave into clusters, identifying common leave patterns among employees. In this study, employee leave application data from January 2018 to July 2022 was collected from the Leave module within the HRIS (Human Resource Information System) application. The research outcomes encompass a dashboard visualization presenting descriptive analysis and modeling using LightGBM. The modeling results yielded reasonably accurate predictions, as evidenced by model testing that showed a difference of only 1 employee. Additionally, K-Means clustering formed 4 clusters of leave reasons, with the majority being family-related, illness, childcare, and elderly care. The dashboard can be used by management as a consideration for approving employee leaves, ensuring well-planned leave scheduling for the following year and minimizing disruption to work execution in each department.
IoT-BASED SMART GARDEN USING MQTT PROTOCOL WITH ADAFRUIT IO APP Syafaat, Muhammad; Ramadhan, Armansyah Nur; Syafiun, Ruhman Bani; Haerunnisa, Dian Aprilia
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.636

Abstract

During the COVID-19 pandemic, more community activities were at home with government policies to limit people's movements, especially in urban areas. During the period of restrictions on people's movements due to COVID-19, it was also followed by new habits, namely activities around the house, one of which was the increasing trend of Urban Farming to fill time. However, after the pandemic began to experience a downward trend, people no longer cared for their plants due to activities that had returned to normal. In this research, the design of Internet of Things technology was carried out to help urban communities to monitor and control plants so that people continue to carry out their daily activities without worrying about their plants running out of water. This study uses the NodeMCu V3 microcontroller as the data receiving center at the hardware layer and then a DHT 11 sensor is needed for temperature monitoring, a Soil Moisture sensor for monitoring soil moisture, a raindrop sensor for monitoring rain conditions as well as relays and a mini pump to control the water needs of plants. The results of this study are that the IoT device successfully displays temperature data, soil moisture data, rain status and automatic plant watering controls function properly if the value on the soil moisture sensor is below 25. The data communication path in this study uses the MQTT protocol using a webserver from Adafruit IO with an average packet loss of 0.20%. With the functioning of all the components on the created IoT device, the community can apply an IoT-based Smart Garden in urban farming so that plant maintenance can still be carried out.
DATA WAREHOUSE MODELLING INFORMATION SECURITY LOG MANAGEMENT IN BUILDING A SECURITY OPERATION CENTER IN CENTRAL GOVERNMENT AGENCIES WITH KIMBALL METHOD Asmita, Maya; Henny, Henny; Samidi, Samidi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.649

Abstract

Central Government, is a government agency that manages important and confidential state data and information. The data that is managed needs to be maintained for reliability and security in order to avoid the risk of loss, leakage and misuse of information. To maintain this data, an optimal information security device is needed. Information security tools used today have a variety of functions resulting in many important logs that must be managed, analyzed and evaluated. The log data from each of these information security devices is still separate and must be processed manually to obtain simpler and more efficient data so that it can be monitored and presented to management. The purpose of this research is to make the right data warehouse modeling in order to assist in the process of presenting information quickly and accurately related to the processing of data logs of information security devices as a report that will be given to management in support of the Zero Tollerance data security policy. The method used in designing this data warehouse is using the Kimball 9 step method. The results obtained are in the form of a starflake schema and a data warehouse log of information security devices consisting of a malware fact table, intrusion facts and attack facts that can be used as centralized data monitoring that will be implemented at the Security Operation Center. Testing is done using Pentaho software tools. This data warehouse is expected to provide a quick, accurate, and continuous summary of information so that it can assist management in the decision-making process and policy making for the future.
DIGITAL DATA SECURITY WITH APPLICATION OF CRYPTOGRAPHY AND DATA COMPRESSION TECHNIQUES Kuncoro, Adam Prayogo; Mustofa, Dinar; Krisbiantoro, Dwi; Tarwoto, Tarwoto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.659

Abstract

The need for digital data security is to ensure that the data and information we have are confidential and can only be accessed by authorized users. And no one can change the information in it, thus ensuring complete accuracy. The functions of data security are confidentiality, authentication, integrity, and anti-repudiation. Compression techniques are used to protect digital data because they aim to make less storage space and allow us to transfer more data over the internet. This study aims to plan to prove the application of a combination of 2 (two) techniques, namely compression and cryptography to digital data with the aim of increasing the security of the data. This research has the result that the compression technique of the Huffman method is the most effective in compressing digital data into the smallest file size compared to other compression methods. It can compressed the data size by around 30% (thirty percent) to 40% (forty percent) compared to the original data size. And coupled with data security with cryptographic encryption techniques so that files remain safe when transferred over the network.
AUTOMATIC FISHPOND IRRIGATION DOOR CONTROL SYSTEM BASED ON ATMEGA16 MICROCONTROLLER AND SMS GATEWAY B, Muhammad Fajar; Lestary, Fitriyanty Dwi; M. Miftach Fakhri; Muhammad Agung; Surianto, Dewi Fatmarani; Akmal Hidayat
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.669

Abstract

The process of controlling irrigation doors in fishponds is still mostly done manually, this results in the performance of farmers being less effective and efficient. Current technological developments, especially in the field of IoT, can be used to design a simulation that is able to control irrigation gates automatically. Based on the results of the tests that have been carried out, it can be concluded that the ATmega16-based automatic irrigation gate simulation tool can work well according to the designed working principle. If the condition of fishpond water is less than the ideal height of the fishpond and the condition of river water is more than the height of the fishpond, the motor will move to "open" the irrigation door to fill fishpond water. If the fishpond water condition is more than the ideal height and the river water condition is less than the fishpond height, the motor will move to "open" the irrigation door to discharge fishpond water and if the river water condition is the same as the fishpond water condition, the motor will move "close” the irrigation door so that the ideal height of the fishpond can be achieved. There are certain conditions to control the door manually using the SMS Gateway. Information about the maximum or minimum fishpond water level will be displayed on the LCD to determine the maximum or minimum fishpond height using Keypad.
DEAD FORENSIC ANALYSIS OF QUTEBROWSER AND LIBREWOLF BROWSERS USING THE NIST 800-86 METHOD Al Rasyid, Fajar; Parga Zen, Bita
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.688

Abstract

A browser is software used to access web pages to obtain clear and readable information. Information resources are identified by a Uniform Resource Identifier (URI) and can be web pages, images, videos, or other content. When a browser user engages in online activities, they usually leave traces on the device such as history, cookies, cache files, and even emails and passwords. Such traces can usually help users access a website or input something, such as emails and passwords. The purpose of this research is to obtain digital evidence in the form of a cache on the hard disk in the Librewolf and Qutebrowser browsers. In this study, researchers used the National Institute of Standards and Technology (NIST) 800-86 method which consists of four stages, namely collection, examination, analysis, and reporting. which focuses on the Qutebrowser and LibreWolf browsers. The results obtained from this study were found to be 21 caches, 2 Sessions, 6 Cookies, 8 Network Persistent State, 9 QuotaManager, 11 IndexedDB, 24 LevelDB, 48 Cache Storage, 14 Favicons, 3 History, 6 Database, 3 StartupCache, 4 Alternate Services, 6 Content-Pref, Notification amounted to 1, Permission amounted to 7, Service Worker amounted to 6, SiteSecuristyServiceState amounted to 7, Webappstore amounted to 8, Sessionstore-Backups amounted to 5, Storage amounted to 47 NIST 800-86 method can be properly used in the acquisition of digital evidence and the most crucial data obtained in the Librewolf browser on the telegram and whatsapp sites.
INFORMATION SYSTEM SECURITY AUDIT USING ISO/IEC 27002:2013 AT UNIVERSITY OF XXX Santi, Rusmala; Alfresi, Aminullah Imal; Octariana, Betha
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.689

Abstract

Information system security audit to find out how the current information system security process is implemented, whether it has been implemented in accordance with information security management system standards. The purpose of this study is to examine the suitability of the current information system security process with the ISO/IEC 27002:2013 security standard and to assess the level of capability and maturity of information system security at university of XXX. This audit research resulted in the finding that the information system security process at university of XXX is currently not in accordance with the ISO/IEC 27002:2013 security standard and is at level 2 (managed) with a capability level value of 1,96 and a maturity level of 2,34.
NETWORK PROGRAMMABILITY FOR NETWORK ISSUE USING PARAMIKO LIBRARY Mutiara, Dwi Ayu; Isnaini, Khairunnisak Nur; Suhartono, Didit
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.691

Abstract

In a company, information technology is needed, especially computer networks, to facilitate data communication. The management of a computer network, of course, requires good administration. The criteria for whether or not a network is good can be seen from the performance, reliability, and security indicators so that it will not cause network issues. Events such as server downs, data loss, lost connections, and undetected computers cause the organization's business performance to be disrupted. This study's purpose is to detect network issues with network programmability technology automatically. Paramiko library supports network automation systems and implements OSPF routing protocol in finding the shortest path to send network packets. This study uses the PPDIOO flow, namely prepare, plan, design, implement, operate, and optimize, because it is considered by the flow of making network detection tools. The results showed that the design and implementation of a small-scale network were successfully built by utilizing network programmability technology and the paramiko library, which helps detect network conditions at any time. This design has a dashboard, provisioning, assurance, and policy features that allow administrators to manage and monitor information on each network device. The network design is fitted with REST-API technology and security through a secure shell (ssh) from the Network Controller that can detect the device's connection conditions and the device's health and update the DNS configuration used. Network Issues that have been seen are devices being down, and the connection being lost. Future research can improve features for network troubleshooting when the connection is lost.
MEASUREMENT OF INFORMATION SECURITY AND PRIVACY AWARENESS USING THE MULTIPLE CRITERIA DECISION ANALYSIS (MCDA) METHOD Sukariana Yasa, I Gede Agus; Listartha, I Made Edy; Pradnyana, I Made Ardwi
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.692

Abstract

Information security is an asset that has value so it must be protected, along with increasing assets it is undeniable that many people wish to gain access and control it so that behind the convenience in the digital world there are many risks to information assets. There are several cases that occur related to information security such as data theft, illegal access, information leakage and vandalism where this becomes the privacy of the user. So it is necessary to do research from the user's perspective to measure the level of information security and privacy awareness of students and lecturers as well as recommendations that will be suggested based on the results of measuring information security and privacy awareness. The objects in this research are students and lecturers at the XYZ University. The method used is Multiple Criteria Decision Analysis (MCDA) by measuring the dimensions of knowledge, attitude, behavior in six areas of information security and three areas of privacy. Data were obtained by distributing questionnaires using a Likert scale of 5. Based on the questionnaire from the respondents, it can be seen students and lecturers have awareness that is at a "good" level of 85% in information security while privacy is at a "good" level with a result of 89% but in the behavior dimension there are several areas that are included in the "average" level including the area passwords by 62%, mobile equipment area by 77% incident area by 70% and on privacy security on the behavior dimension there is one area namely the login activity area by 78% so this needs to be given recommendations for improvement in order to reach a "good" level by providing socialization/ training for students and lecturers
PERFORMANCE ANALYSIS OF REAL TIME STREAMING PROTOCOL (RTSP) AND REAL TIME TRANSPORT PROTOCOL (RTP) USING VLC APPLICATION ON LIVE VIDEO STREAMING Kariyamin, Kariyamin; Riadi, Imam; Herman, Herman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.4.698

Abstract

Video is a means of delivering very complete information and can be implemented using streaming technology. Networking services for local media exchange are helpful in teaching and learning activities, such as simultaneous video playback. Submission of information in the form of this video can be done by unicast, multicast or Broadcast packet delivery Live video streaming using RTP and RTSP protocol. The test was done through three experiments ie unicast, multicast and broadcast for five times. The output occurring at (RTP) is 4.73 MBit / sec for 5 client, higher than from (RTSP) of 13.799 MBit / sec for 5 client. This test occurs a very high Delay on RTP while RTSP has a low Delay in RTP. Meanwhile, the packet loss that occurs in (RTP) is 124.50% lower than (RTSP) which is 6.06% from 5 clients each. Because RTSP is an applicationlevel protocol for data delivery control that has real time characteristics such as streaming media. While RTP is designed not for streaming but to handle the actual data transmission of data in the form of sound or image or both, especially those based on real time such as streaming media.

Filter by Year

2020 2025


Filter By Issues
All Issue Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025 Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025 Vol. 6 No. 3 (2025): JUTIF Volume 6, Number 3, Juni 2025 Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025 Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025 Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024 Vol. 5 No. 5 (2024): JUTIF Volume 5, Number 5, Oktober 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024 Vol. 5 No. 2 (2024): JUTIF Volume 5, Number 2, April 2024 Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024 Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023 Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023 Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023 Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023 Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023 Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023 Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022 Vol. 3 No. 5 (2022): JUTIF Volume 3, Number 5, October 2022 Vol. 3 No. 4 (2022): JUTIF Volume 3, Number 4, August 2022 Vol. 3 No. 3 (2022): JUTIF Volume 3, Number 3, June 2022 Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022 Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022 Vol. 2 No. 2 (2021): JUTIF Volume 2, Number 2, December 2021 Vol. 2 No. 1 (2021): JUTIF Volume 2, Number 1, June 2021 Vol. 1 No. 2 (2020): JUTIF Volume 1, Number 2, December 2020 Vol. 1 No. 1 (2020): JUTIF Volume 1, Number 1, June 2020 More Issue