Jurnal Teknik Informatika (JUTIF)
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles
961 Documents
IMPLEMENTATION OF EIGENFACE ALGORITHM FOR IDENTIFICATION OF ANOPHELES IN SMARTPHONES
Alvianus Dengen
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.1.158
The development of smartphones as tools used in research provides many benefits in several fields, including education, health, and agriculture. Digital image research developed in mobile apps can help us choose the best decision so that the results are by what has been planned. One of the developments in entomology is entomology research that uses digital imagery. In the dataset activity, researchers used the anopheles’s wings type as much as 22 image data. Fifteen types of Anopheles were used by the researcher with 100 experiments as test data. Image training and identification have the same process, taking pictures from a gallery or directly using the camera from an Android device. Preprocessing step in applications includes 1) converting image pixels to 100x100 pixels, then this pixel size becomes the standard of use in applications. 2) Convert an image to a binary using a threshold algorithm; this event is commonly called the Image Binaryization Process. Images derived from the threshold process are converted into one-dimensional vectors. Training Image and image identification using the Eigenface algorithm. The basic principle of the Eigenface algorithm is to quote the unique information of each image and then compare it to the image in the dataset. Identification with anopheles applications results in a good accuracy value with a success rate of 94.29%, with FMR value = 4.62% and FNMR = 2.78%.
COMPARISON OF RANDOM FOREST AND SUPPORT VECTOR MACHINE METHODS ON TWITTER SENTIMENT ANALYSIS (CASE STUDY: INTERNET SELEBGRAM RACHEL VENNYA ESCAPE FROM QUARANTINE)
Sudianto;
Puspa Wahyuningtias;
Hapsari Warih Utami;
Uli Ahda Raihan;
Hasna Nur Hanifah;
Yehezkiel Nicholas Adanson
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.1.168
Coronavirus (Covid-19) is an infectious disease spreading widely throughout the world. Covid-19 has been declared a pandemic. Transmission of Covid-19 spreads through the Droplet. The Indonesian government has made efforts to prevent the spread of Covid-19, one of which is the implementation of quarantine regulated through Circular Letter Number 8 of 2021 concerning International Travel Health Protocols. The case of Selebgram Rachel Vennya's escape from quarantine had become a trending topic on Twitter. Many Twitter users in Indonesia gave their opinions and comments on this case. Therefore, it is necessary to research public sentiment on the case of the escape of Selebgram Rachel Vennya from quarantine. The data used is taken from netizen comments from social media, namely Twitter, in the form of positive and negative comments; the algorithms used are Random Forest (RF) and Support Vector Machine (SVM). This study aims to compare the classification method to public sentiment regarding the case of the escape of Selebgram Rachel Vennya from quarantine using the Random Forest and SVM methods. The classification results show that the Random Forest algorithm has an accuracy value of 94%. In comparison, the SVM algorithm classification results get an accuracy value of 93%. So it can be concluded, Twitter sentiment analysis in the case study of Rachel Venya's escape from quarantine that the Random Forest algorithm got the best results.
FREERTOS BASED AIR QUALITY MONITORING SYSTEM USING SECURE INTERNET OF THINGS
Belen Septian;
Md Misbahuddin;
Fardhan Arkan
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.1.172
As the number of vehicles is increasing, the air quality in the environment becomes more polluted. This problem happens due to concentration of carbon dioxide (CO2) is high in the air and it can lead to various health issues. The air quality meter is an important device to measure the concentration of CO2 in the air. In this study, an air quality monitoring system is built using Arduino Nano along with IoT technology to measure parameters such as CO2, temperature, humidity, and heat index. FreeRTOS is used to run multiple tasks consisting of display and transmit concurrently. MQ135 and DHT22 are used to sense CO2, temperature, humidity, and heat index respectively. Data will be sent periodically to a web server using ESP8266 Wi-Fi module through secure HTTPS POST protocol. On the back-end side, a web server is employed to receive sensor parameters as well as to build a website application securely by which users can monitor it remotely. The system was tested to monitor CO2 in 4 different locations of Pangkal Pinang city, Indonesia. The results showed that the averages of CO2 concentration in Housing Indo Graha, Morning Market, Dea Lova Park, and Pasir Padi Beach are 411.37 ppm, 485.97 ppm, 416.45 ppm, and 444.43 ppm respectively. Based upon the results, public place i.e. Pasir Padi Beach has higher CO2 concentration meanwhile public place with organic waste i.e. Morning Market has the highest CO2 concentration.
PREDICTION OF THE AMOUNT OF PEPPER HARVEST BY USING FUZZY ASSOCIATIVE MEMORY
Ipung Permadi;
Arief Kelik Nugroho;
Maghfira Rosnadila Rachmat
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.1.174
Prediction of pepper data is done by looking at several variables to get optimal results. From the production data of the pepper harvest, the information is not yet available to farmers. By using the fuzzy method, the author tries to create a system to estimate the results of predictions by considering the parameters of the number of seeds, fertilizers, pesticides and labor. The combination of these variables can produce an intelligent system that is able to learn and adapt to environments with incomplete and precise data variations and fuzzy logic that has the ability to translate expert knowledge by using linguistically constructed rules. From the results of the experiments conducted, the results obtained were 900 kg of production data.
NETWORK SECURITY MONITORING WITH INTRUSION DETECTION SYSTEM
Muhammad Anis Al Hilmi;
Emah Khujaemah
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.117
Computer network security is an issue that needs attention, along with the valuable and confidential information that passes through the network. The increasing use of networked computer systems has also led to an increase in cybercrimes worldwide, including Indonesia. The types of attacks carried out vary and go through several phases. Among the initial phases of the attack is the port scanning process. The process uses specific programs, such as Nmap (Network Mapper), to check on the target/victim side which ports are open and can be exploited for further attacks. IDS (Intrusion Detection System) is here to anticipate external attacks; IDS is used to detect suspicious activity in the system or network. This study aims to create a computer network security system that is lightweight, based on open-source, easy to set up, and can be analyzed by administrators by using Maltrail. Maltrail itself is a monitoring service used to detect dangerous traffic/traffic in a computer network, by utilizing a blacklist containing a list of dangerous or suspicious elements/sources. This study describes the stages of Maltrail installation and how Maltrail can detect the suspicious network, in this case, the port scanning business using Nmap. As a result, Maltrail can be relied on to log and notify network administrators of illegal system entry attempts/intrusions when there is a port scanning process from outside. Thus, it is hoped that with the existence of IDS, handling of an attack can be carried out earlier and prevent fatal consequences.
CUSTOMIZATION AND USABILITY TESTING AUTO ESSAY FILE GRADING LMS BASED METACOGNITIVE ASSESSMENT IN ENGINEERING FACULTY
Ridwan Daud Mahande;
Jasruddin;
Fitrah Asma Darmawan;
Muhammad Ayat Hidayat
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.118
Online learning assessment and evaluation has been widely used using the Learning Management system (LMS). However, the form of the questions is still based on multiple choice. Evaluation and form of questions in LMS need to be developed by exploring metacognitive thinking. The LMS plugin supports Essay-based questions and assessments, it's just that this plugin needs to be supported with file submissions and metacognitive assessment rubrics. Therefore, this research aims to customize and test the usability of Auto Essay File Grading (AEG) metacognitive assessment based on LMS. This study uses a quantitative descriptive approach conducted at the Faculty of Engineering, Universitas Negeri Makassar, with lecturers and students as respondents. Data were collected through the USE questionnaire and analyzed using descriptive statistics. The results of the analysis of AEG usability testing from the point of view of lecturers and students who have the highest average are a usefulness. For the lowest average of the lecturers is the ease of use and from the student, the side is the ease of learning. These results also prove that the AEG application/plugin needs improvement in terms of ease and practicality of use so that users learn how to use it faster. Recommendations for ease of use and learning are discussed and explained further, along with the improved display, answer keywords, and minimizing irrelevant menus.
DESIGNING CLEANERS WEBSITE FOR HELMET CLEANSING AND HELMET CLEANSING PRODUCT SELLING USING PHP AND MYSQL
Kevin Kristio;
Wiwied Widiyaningsih;
Mita Lailasari
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.125
Helmet is a protective headgear which is currently a primary and mandatory requirement for every motorcyclist. Helmet hygiene is important, and a dirty helmet not only causes an unpleasant odor when worn, but is also harmful to health. A clean helmet condition will certainly make it comfortable to wear at all times. Currently, there are many businesses that provide services for helmet cleansing and selling helmet cleansing products. Many of these businesses use manual transactions with customers coming directly to the place of business. Cleaners is a place of business that is engaged in helmet cleansing and selling helmet cleansing products, where in carrying out its business Cleaners make transactions with customers by means of customers coming directly to Cleaners' place of business. With the advancement of internet technology, helmet cleansing and sales of helmet cleansing products from Cleaners can be made online using the website. Customers can make transactions through the website, and the Cleaners will come to the customer's place to pick up the helmet to be cleaned, and for the purchase of helmet cleansing products, it will be sent either via expedition or when returning the helmet to the customer. This study discusses the design of the Cleaners website for helmet cleansing and selling helmet cleansing products using PHP and MySQL. The method used for the development of this website is SDLC using the Waterfall method which includes the stages of analysis, design, coding, and testing. Based on the results of the Black Box trial, all menus on the website both from the admin and user side are running well according to their functions. And based on the results of the Portability test using a browser, this website can run smoothly and all pages can appear well.
INFORMATION TECHNOLOGY GOVERNANCE IN ADVISORY AND ECONOMIC DEVELOPMENT SECTOR USING COBIT 5 FRAMEWORK
Arie Vatresia;
Ruvita Faurina;
Diky Kurnia Ramadhan
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.128
Bank Indonesia is the central bank of the Republic of Indonesia and an independent state institution, free from interference from the Government or other parties. Bank Indonesia Bengkulu City has a field of Advisory and Economic Development, which uses information technology to handle and assist operational activities. However, there is no clarity regarding the level of the company's ability to manage information technology. This has an impact on the use of IT that is not in line with company goals. Based on these problems, it is necessary to have a capability level in managing information technology using the COBIT framework, to assist companies in utilizing IT to be in line with company goals, through improving quality and value and simplifying the implementation of an organization's process flow from the information technology perspective. So the researchers chose COBIT as the framework that will be used in this research. From the results of the study, it was obtained that the Capability level got a level 4 value for the as is state. Meanwhile, for the condition of Bank Indonesia Bengkulu Province in the Advisory and Economic Development Sector, it expects to reach level 5. Gap analysis is determined by the condition of the current level with the expected level, where the current level is 4 and the expected level is 5 so that the results obtained The analysis gap is 1. This means that Bank Indonesia Bengkulu Province in the Advisory and Economic Development Sector must meet the requirements for process capability indicators at level 5 which have not been met. Such as constantly developing new technologies through innovative ideas based on the company's information technology potential.
ANDROID-BASED SHUTTLE ORDER APPLICATION USING FRAMEWORK FLUTTER
Mochammad Muslih Maruzi;
Dadang Iskandar;
Yogiek Indra Kurniawan
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.150
The shuttle ticket order process is the main process when someone is going to travel using shuttle transportation. The process of ordering shuttle tickets by visiting shuttle pool in the area or ordering by call has several problems that often make prospective passengers feel a lack of effectiveness and efficiency. This study aims to create an application that makes it easier for prospective passengers to order shuttle tickets and obtain shuttle information and make it easier for service providers to manage fleets and manage orders. This application created by using the waterfall method. The main stages in the system development life cycle in this method, namely: analysis, design, coding, and testing. This application is divided into two parts, Android-based using the Flutter Framework for potential passengers and web-based with PHP programming language for service providers. Black Box test results show valid results, which means the application is as expected. The results of the User Acceptance Test show an average value of 87% in "Very Good" category, which means this application is feasible to use.
APPLICATION OF C4.5 ALGORITHM FOR DETERMINATION OF THE COMMUNITY OF RECIPIENTS OF PROSPEROUS FAMILY CARDS IN THE VILLAGE OF SUKARAMAI BASED ON WEB
Intan Agustina;
Juna Eska;
Indra Ramadona Harahap
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.jutif.2022.3.2.164
The Prosperous Family Card (KKS) is a card given by the Government in lieu of a Social Protection Card (KPS). This card is a marker of underprivileged communities, people who have KKS will get Rice Assistance and Non-Cash Food Assistance (BPNT) every month. To receive the Prosperous Family Card (KKS), the government has set several criteria. As for how to solve the criteria that have been set, namely by utilizing data mining techniques. Data mining can also be interpreted as the process of extracting and extracting knowledge in a set of data using the C4.5 Algorithm. The C4.5 algorithm is a method that can be used for decision making that forms into a decision tree that can later be used as a basis for consideration in determining the community of recipients of the Prosperous Family Card (KKS). The purpose of this study is that the C4.5 algorithm can predict the community of recipients of prosperous family cards so that they can be used in determining the community of recipients of prosperous family cards (KKS) in Sukaramai village.