cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 962 Documents
PERFORMANCE OF TEXT SIMILARITY ALGORITHMS FOR ESSAY ANSWER SCORING IN ONLINE EXAMINATIONS Susanto, Muhammad Riza Radyaka; Husni Thamrin; Naufal Azmi Verdikha
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1025

Abstract

The purpose of assessment is to determine learning success. Exams with question descriptions have several advantages, including ease of preparation and the ability to reveal student comprehension and originality. The problem with space is that it takes time to fix. Therefore, it is important to develop algorithms and software that automatically evaluate space. With the help of this algorithm and this software, you can solve some exam and assessment problems. This study aims to investigate similarity algorithms that approximate human patterns in evaluating ambiguous answers. This study examines his five similarity algorithms, including TF-IDF and LSA. The data was a collection of correct answers with a total of 371 texts. The similarity algorithm's performance was compared with human correction results. Evaluation was performed using Root Mean Square Error (RMSE). This study shows that his TF-IDF algorithm like Jaccard has the lowest his RMSE compared to human judgement. However, the LSA algorithm tended better to follow human rating patterns for descriptive tests..
DESIGN OF APPLICATION INFORMATION SECURITY SELF-ASSESSMENT USING VBA AND MSXML2.XMLHTTP CASE STUDY: DISKOMINFO KABUPATEN KAMPAR Fahmi Rifai; Jazman, Muhammad; Angraini, Angraini; Megawati, Megawati
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1033

Abstract

Information security includes the issues that may threaten accountability, reliability, trustworthiness, privacy, authenticity, and trustworthiness of information in an agency. Data and information are very risky things in Information Security, and therefore it is important to do information security governance. The process of evaluating information security using the Index KAMI and ISO 27001: 2013 will be carried out in this study by recording data using Microsoft Excel which has been provided by the National Cyber and Crypto Agency (BSSN). To make it easier to conduct information security assessments and simplify the Excel display, Visual Basic for Applications (VBA) will be utilized as a medium for adding ISO 27001: 2013, then it will be connected using MSXML2.XMLHTTP. The results of the self-assessment carried out show that the Communication, Information, and Signaling Service of Kampar Regency has a level of completeness in implementing the ISO 27001 standard at the "Inadequate" level with a score of 151 only reaching level I+. Meanwhile, the results of the ISO 27001: 2013 Annex control evaluation show that there are still clauses that have not been fulfilled. Therefore, the Communication, Informatics, and Coding Office of Kampar Regency urgently needs improvement in order to fulfill the clauses of ISO 27001: 2013.
FACEMASK DETECTION USING YOLO V5 Suroiyah, Lailatul; Rahmawati, Yunianita; Dijaya, Rohman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1043

Abstract

The use of facemasks is one of the obligations when carrying out activities outside the home during the COVID-19 pandemic, but despite the COVID-19 pandemic, the use facemasks is still needed. One of the supporting factors driving this is air pollution. The use of facemasks can reduce the risk of respiratory diseases, because it is important to use facemasks when carrying out activities in place with a high risk of air pollution such as industrial areas, this is done to maintain the safety of its users both in term of healh and comfort. So consistency is needed for users to use masks, through current technological developments detecting the use of masks is one of the right solutions to this problem. One of the mask detection methods used in this study is YOLO (You Only Look Once). YOLO is a method that detects objects using a single neural network consisting of several layers of convolution networks for image feature extraction, then prediction of bounding box coordinates is performed simultaneously. The YOLO v5 training model in this study was carried out with a combination of minimum values ​​on img, batch, and epoch resulting in a maximum F1 value and mAP@50 of 86%.
POLAK-RIBIERE CONJUGATE GRADIENT ALGORITHM IN PREDICTING THE PERCENTAGE OF OPEN UNEMPLOYMENT IN NORTH SUMATRA PROVINCE Amalya, Nanda; Solikhun, Solikhun
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.1.1047

Abstract

The economic problem that has a direct impact on human life and welfare is unemployment. One of the cities in Indonesia with the highest unemployment rate is North Sumatra Province. For example, Tebing Tinggi City had the highest unemployment rate of 9.73% in 2017, while Nias Selatan had the lowest percentage of 0.31%. This research is important to do in order to anticipate the unemployment rate in North Sumatra for any party, be it the government or the private sector, so that they can work together to overcome the problem of unemployment in the future which is the main problem in the economy. For example, the government creates programs to help reduce the number of unemployed, provide preparation or do other things, helping people to become more imaginative and have skills so they can compete in the world market. Predicting unemployment has been the subject of many studies, one of which is by utilizing artificial neural networks. This study aims to predict the percentage of unemployed in North Sumatra from 2022 to 2026, using the Backpropagation Neural Network Algorithm, the Conjugate Gradient Polak-Ribiere method and Matlab version 2011 for research and data analysis. This research utilizes open action rate stimulation data for the population of North Sumatra based on residents aged over 15 years from 2017 to 2021. Using five architectural models, namely: 4-50-1, 4-55-1, 4-70- 1, 4-75-1, and 4-77-1. The final results were obtained using the most accurate architectural model, namely model 4-75-1 which has a Mean Squared Error (MSE) of 0.0000004288 and an accuracy rate of 100% with a time of 00.09 at epoch 452.
ASSESSMENT OF INFORMATION SECURITY RISKS USE FUZZY INFERENCE MODEL (FIS) Lutfi Nukman; Rahmat Kurniawan; Achmad Solichin
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1052

Abstract

Risk analysis is the process of systematically using information to identify and assess risks. This process how to analyze potential information security failure scenarios and the consequences of loss of confidentiality, integrity and preservation Availability of stored information values. Risk assessment is the process of comparing estimated risks against predetermined risk evaluation criteria to determine the level and priority of risk. This operation is performed using the retrieved data Risk analysis results for informed decision making future risk management measures; It is said that this cyber attack could lead to cyber warfare and cyber interference that disrupt national security and sovereignty. All of the above cyber threats are said to have the potential to threaten national assets. Institutions/companies around the world, especially those stored in his ISMS.
APPLICATION OF NAÏVE BAYES CLASSIFIER ALGORITHM IN DETERMINING THE LEVEL OF CUSTOMER SATISFACTION WITH RUMBAI POST OFFICE SERVICES Anisa Halifa; Novita, Rice
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1054

Abstract

Technological advances make service and delivery of goods grow rapidly. Coupled with people's changing shopping habits by shopping online, shipping companies are increasingly needed. PT. POS Indonesia is the first expedition company in Indonesia. Currently PT. POS Indonesia has opened many POS Office branches in every region in Indonesia, one of which is the Rumbai POS Office located in Pekanbaru City. To continue to maintain the company while competing with other expeditions, the Rumbai POS Office must continue to maintain its customers by improving the quality of service. Survey analysis can be done to determine the extent of customer satisfaction with the services provided. To find out the level of customer satisfaction, you can use the classification method. Naive Bayes is a popular and effective machine learning algorithm for classification problems. The study used datasets sourced from the results of questionnaire distribution to customers of the Rumbai POS Office. The questionnaire used 14 indicators derived from the Community Satisfaction Index set by the Ministry of Agriculturein 2004. The classification resulted in a Satisfied class of 16 data with a percentage of 84.2% and a Dissatisfied class of 3 data with a percentage of 15.8%, it can be concluded that the service at the Rumbai POS Office is good. From the classification results, it is proven that the Naïve Bayes algorithm is able to predict well the level of customer satisfaction with an accuracy value of 94.74%, precision of 100%, and recall of 94.12%. The results of this research can later be used as information for the Rumbai POS Office to be able to improve service quality.
SENTIMENT ANALYSIS OF COMMENTS ON GOOGLE PLAY STORE, TWITTER AND YOUTUBE TO THE MYPERTAMINA APPLICATION WITH SUPPORT VECTOR MACHINE Aji Nursalim; Rice Novita
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1059

Abstract

Application is an important requirement in a business because it makes work more efficient thereby increasing the results of the company, pertamina as a supplier of fuel oil (BBM) in Indonesia provides the latest innovations by launching the mypertamina application for purchasing BBM which raises public opinion, and conveys its aspirations in social media. Text mining is a way to group community comments because text mining has an analysis that focuses on analyzing a comment that is extracted into information. The purpose of this study was to determine public sentiment towards the use of mypertamina by classifying comments using the Support Vector Machine (SVM) algorithm and finding the best kernel among linear, polynomial and RBF. In this study, data was taken from three social media, namely Google Play Store with 18.000 data, Twitter with 20.000 data and YouTube with 6.400 data with a total of 44.400 data. Sentiment is carried out by giving positive and negative classes, the accuracy obtained from sentiment is carried out for Google Play Store data of 95%, Twitter 76% and YouTube 99% and it is known that the best svm kernel in this study is the RBF kernel which outperforms the linear and polynomial kernels.
AUTOMATIC GIT REPOSITORY DEPLOYER IN UBUNTU USING PYTHON, JENKINS AND CLOUD FIRESTORE AT PT XYZ Dewangga, Felix Vicky Lugas; Nugraha Saian, Pratyaksa Ocsa
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1062

Abstract

PT XYZ is a retail company using Cloud Computing to support its business operations. The company requires the back-end application deployment process to be done automatically on each server computer. The problem occurs insecure in the process of the back-end application deployed manually causing human error vulnerabilities and inefficient when the version of application change occurs to operate on each server computer takes time as long as the number of server computers that need to be configured. The research aims to design a deployer system that help company to deploy back-end applications on each Ubuntu server computer automatically efficiently and securely. The research method uses Research and Development to create system. The research produces a design and build of an automated deployer system using Jenkins to create data configuration that aim the version of back-end application as target deploy and stored in the Cloud Firestore database. The stored data causing deployer system change version back-end application as stored data using GIT command and provide application to operate as service on each server computer. Operation result of application recorded as data deployment that stored in the Cloud Firestore then Jenkins detect it to store data as deployment log. Based on the results, the deployer system considered is able to operate back-end application automatically according the target version on each server computer as eficient and secure deployment process. This conclusion is supported by the results of the questionnaire, which obtained a 85% percentage and was classified as "Strongly Agree" with the created system.
DESIGN OF A SECURITY VETTING FRAMEWORK FOR MOBILE SPBE APPLICATIONS BASED ON THE ANDROID OPERATING SYSTEM Yopie Maulana Syahrizal; Muhammad Salman
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.6.1064

Abstract

The increasing number of mobile device users in Indonesia has encouraged the government to utilize mobile applications as an SPBE service function. The mobile SPBE application is a form of SPBE service in the form of application that can be operated on a mobile device. The mobile SPBE application can of course provide benefits to its users, however, there are security risks that need to be anticipated. So through BSSN Regulation Number 4 of 2021 it is mandated that every government agency must implement SPBE security and identify security requirements that have not been implemented in the mobile SPBE application. So the security vetting framework becomes important and necessary to identify and validate security requirements that have not been implemented. However, there is currently no such framework. Therefore, in this research, a framework design was proposed for vetting the security of the mobile SPBE application based on the Android operating system. The design of the security vetting framework adopts NIST SP 800-163r1 which is integrated with application security testing using automated tools and manual testing. Manual testing was carried out according to the OWASP MASTG standard taking into account API security testing based on OWASP API Security. Then the results of application security testing are used to validate the mobile SPBE application security requirements. Based on the simulation results of the framework design on a sample SPBE mobile ABC application owned by a local government in Indonesia, violations were found against several mobile SPBE application security requirements. Then based on the simulation results, the framework design can validate all mobile SPBE application security requirements and is expected to be a reference for government agencies to carry out security vetting for mobile SPBE applications.
USER INTERFACE DISPLAY DESIGN TO ASSIST FOOD WASTE MANAGEMENT USING THE USER CENTERED DESIGN METHOD Kamarulredzuan, Moch Baiz; Setiawan, Dadang; Sulistiyo Kusumo, Dana
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.1.1115

Abstract

The designed user interface is mobile-based which aims to help manage food waste, especially for Bandung area students. The user interface display contains education about food waste, food waste banks and food donations. It is hoped that the user interface display created can help in managing food waste. Food waste in Indonesia is very concerning, for example in the city of Bandung there are 772.69 M3/day, which is 44.51% of the total of various types of food waste in 2021. Therefore a solution is needed that can help manage food waste. By utilizing technology, we can provide education about waste using a smartphone. Then a user interface display design is made using the user centered design method. The user centered design method is needed because it has an interface design process that focuses on usability goals. This method begins with collecting user information through questionnaires, then analyzing user information and obtaining user needs, then creating user flows, wireframes, mockups, and prototypes. After that, a usability test is carried out using the system usability scale method to see whether the user interface display that is made can meet user needs. The result of the system usability scale score is 87,5 and is in the excellent category, indicating that the user interface is good.

Filter by Year

2020 2025


Filter By Issues
All Issue Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025 Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025 Vol. 6 No. 3 (2025): JUTIF Volume 6, Number 3, Juni 2025 Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025 Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025 Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024 Vol. 5 No. 5 (2024): JUTIF Volume 5, Number 5, Oktober 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024 Vol. 5 No. 2 (2024): JUTIF Volume 5, Number 2, April 2024 Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024 Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023 Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023 Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023 Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023 Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023 Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023 Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022 Vol. 3 No. 5 (2022): JUTIF Volume 3, Number 5, October 2022 Vol. 3 No. 4 (2022): JUTIF Volume 3, Number 4, August 2022 Vol. 3 No. 3 (2022): JUTIF Volume 3, Number 3, June 2022 Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022 Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022 Vol. 2 No. 2 (2021): JUTIF Volume 2, Number 2, December 2021 Vol. 2 No. 1 (2021): JUTIF Volume 2, Number 1, June 2021 Vol. 1 No. 2 (2020): JUTIF Volume 1, Number 2, December 2020 Vol. 1 No. 1 (2020): JUTIF Volume 1, Number 1, June 2020 More Issue