cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 1,048 Documents
Improving Diabetes Prediction Performance Using Random Forest Classifier with Hyperparameter Tuning Anggreini, Novita Lestari; Yuliana, Ade; Ramdan, Dadan Saepul; Al-Dayyeni, Wissam
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4755

Abstract

Diabetes mellitus is a chronic metabolic disorder that poses a serious challenge to global healthcare systems due to its increasing prevalence and the high costs associated with treatment. Although machine learning has been widely adopted to support early diagnosis, many predictive models still underperform due to limited preprocessing strategies and inefficient hyperparameter settings. This study proposes a comprehensive machine learning pipeline to enhance diabetes prediction accuracy by utilizing a Random Forest classifier optimized through systematic hyperparameter tuning. The novelty of this method lies in its integrated approach, which includes thorough preprocessing such as removing duplicate records, handling inconsistent unique values, addressing missing data, and applying the SMOTE technique to overcome class imbalance. Additionally, hyperparameter tuning is conducted using GridSearchCV combined with 5-fold cross-validation, and only the most influential features are selected to improve model interpretability and efficiency. The proposed model achieved an accuracy of 95 percent, with a recall of 0.88 and an F1-score of 0.85, indicating its robustness in identifying diabetic cases more effectively than previous studies using standard machine learning algorithms. This model contributes to the development of a reliable and scalable early detection system for diabetes, applicable in clinical decision support environments. Further refinement can be achieved by testing on larger and more diverse datasets or by implementing more efficient tuning techniques such as Bayesian optimization.
A Hybrid LSTM–Smith Waterman Model for Personalized Semantic Search in Academic Information Systems Yuliana, Ade; Anggreini, Novita Lestari; Iskandar, Rachmat; Prasanth, G. Rafi
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4763

Abstract

The growing complexity of digital learning environments presents a critical challenge in computer science, particularly in designing intelligent academic systems capable of delivering context-aware and personalized content. Traditional academic information systems often rely on literal keyword matching, failing to interpret the semantic intent behind user queries and ignoring historical learning behavior. This study addresses these limitations by proposing a hybrid semantic search and recommendation model that integrates Long Short-Term Memory (LSTM) networks with the Smith Waterman algorithm. The LSTM component models temporal sequences of user interactions, while Smith Waterman enables local semantic alignment between user queries and learning content. Historical query logs and user-clicked topics are transformed into semantic vectors, which are further enhanced through a contextual graph and semantic relation matrix. Experimental results demonstrate the model’s effectiveness, achieving 89% accuracy, an F1-score of 0.89, and an AUROC of 0.88 by epoch 50. The hybrid architecture successfully captures the evolution of user interest and semantic relevance, outperforming baseline approaches. This research contributes to the field of computer science by bridging natural language understanding and sequential modeling to improve adaptive learning technologies. The proposed model offers a scalable foundation for developing intelligent recommendation systems in academic platforms, fostering improved learner engagement and efficiency.
Garbage Image Classification Using Deep Learning: A Performance Comparison of InceptionResNetV2 vs ResNet50 Rismiyati, Rismiyati; Situmeang, Axelliano Rafael; Khadijah, Khadijah; Endah, Sukmawati Nur
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4770

Abstract

Garbage problem is a worldwide problem. Efforts to address garbage problem have been performed in several aspect, including automatic garbage classification to support automatic garbage sortation in small scale. In the field of garbage classification, deep learning has been widely used because of its ability to learn feature and also to classify with high accuracy.  Several promising architectures in deep learning such as ResNet50 and InceptionNet have been used for this classification task. InceptionResNet is introduced to combine the strength of both architectures. This research aims to classify Garbage Classification data set which consist of 15150 images from 12 classes by using InceptionResNetV2 architecture. In addition, experiment by using ResNet-50 is also performed to provide comparison of its performance. During experiment, Hyperparamater tuning was performed, namely the learning rate, dropout rate, and the number of neuron in the dense layer. The results show that InceptionResNetV2 outperform ResNet50 in all scenarios. This architecture is able to achieve highest accuracy of 97.54%.  Even though the classification time is longer for InceptionResNetV2, this finding is able to prove the outstanding performance of InceptionResNetV2 in garbage classification. This study contributes to the field of garbage classification by introducing robust and better model for better classification.
Comparison of Time Series Algorithms Using SARIMA and Prophet in Predicting Short-Term Bitcoin Prices Brilliant, Muhammad Zidan; Widiyaningtyas, Triyanna; Caesarendra, Wahyu
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4773

Abstract

Digital finance, particularly Bitcoin, has become a global phenomenon with high volatility, posing great challenges for traders in predicting short-term prices. This study compares the performance of the SARIMA and Prophet algorithms in predicting short-term Bitcoin prices using daily closing price data from October 1, 2014, to October 1, 2024. The study utilizes two different data timeframes, a 10-year dataset (2014-2024) and the last 5 years (2019-2024) for comparative analysis. The SEMMA methodology is used to analyze and compare the two algorithms, which consist of the stages Sample, Explore, Modify, Model, and Assess. The experimental results show that SARIMA provides more stable and consistent results with an MAPE value of 1.24% and RMSE of 896.15 in Scenario 1 and an MAPE value of 1.27% and RMSE of 920.24 in Scenario 2. In contrast, Prophet shows different performance in each scenario. In Scenario 1, Prophet shows optimal results but not so good with an average MAPE of 1.74% and an RMSE value of 1214.86. On the other hand, Prophet showed good performance in Scenario 2 with a lower average MAPE of 0.71% and a smaller RMSE of 489.94, indicating Prophet's ability to handle newer and more dynamic datasets. Both models show their respective advantages; SARIMA is better for long and stable historical data, while Prophet is more effective for shorter and dynamic data. This research provides practical insights for traders and investors in choosing the right prediction model, with results for further study in predicting crypto asset prices.
Development of WebGIS for Street Light Mapping Using Geospatial Tools Anisya, Anisya; Fajrin, Fajrin; warman, Indra; Minarni, Minarni; Syahrani, Anna; Nugroho, Fajar
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4777

Abstract

Padang City, as one of the cities the largest on the west coast of Sumatra Island, plays a strategic role in the economy and government. One of the vital infrastructures that supports public activities is the street lighting system. However, the monitoring and maintenance of streetlights still face obstacles, especially in North Padang District, which is the busiest area due to the presence of numerous educational facilities, government offices, and economic centers. This research aims to develop a WebGIS application that facilitates the monitoring and management of street lighting more efficiently. Our research contributes by introducing a new approach to spatial-based streetlight management strategies. This approach is based on a methodology for field data collection and spatial database development to manage all stages of streetlight infrastructure management. This application integrates geospatial technology by utilizing GeoServer, QGIS, and PostgreSQL for visualization and spatial data management. With this system, information about the location and condition of streetlights can be accessed in real-time, thereby facilitating better planning and maintenance of street lighting infrastructure. The result of this study is a WebGIS application capable of mapping and monitoring streetlight points interactively. The implementation of this system is expected to assist relevant authorities in improving the effectiveness of street lighting management in Padang City and contribute to the development of geospatial technology-based solutions for urban infrastructure.
Enhancing Malware Detection in IoT Networks using Ensemble Learning on IoT-23 Dataset Anggriani, Kurnia; Az Zahra, Syakira; Susanto, Agus
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4782

Abstract

The Internet of Things (IoT) has become a technological innovation that brings many benefits in various sectors, but also presents challenges, especially in terms of cybersecurity. One of the main threats is malware, which can damage devices, steal data, and disrupt system performance. With the increasing use of IoT, malware attacks on IoT devices are a serious concern. Previous research shows that malware detection models in IoT devices still have shortcomings, especially in terms of accuracy. One of the algorithms used in malware detection, Naïve Bayes, has been shown to provide low accuracy results. This study aims to improve the accuracy of malware detection on IoT networks by applying Ensemble learning techniques using traffic data from the IoT-23 dataset. The methodology used refers to the CRISP-DM (Cross Industry Standard Process for Data Mining) framework, which includes the stages of domain understanding, data understanding, data preparation, modelling, evaluation, and deployment. The results show that Ensemble learning improved the performance of individual models. Naïve Bayes as a single model produces an accuracy of 0.24, increasing to 0.35 when combined with AdaBoost, and 0.99 when combined with XGBoost. The combination of the three models also produced an accuracy of 0.99. These results demonstrate the effectiveness of ensemble learning in improving malware detection accuracy in IoT environments.
Multi-architectural Transfer Learning CNN for Klowong Batik Fabric Defect Classification Pratama, Dhika Wahyu; Sudiarso, Andi; Atmaja, Denny Sukma Eka; Herliansyah, Muhammad Kusumawan
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4806

Abstract

Klowong is a base cloth that has been given a hot wax pattern as the initial stage in the batik making process but has not yet become a finished batik. Nowdays, written batik machine are available but still limited and production defects still occur, reducing the value of batik. Manual QC makes subjective assessments, so an accurate and efficient automated inspection system is needed for SMEs.This study proposes a defect classification approach on batik klowong fabric based on transfer learning using deep convolutional neural networks (CNN) architecture that has been verified to be reliable in image classification schemes. The basic models used include VGG16, ResNet50V2, InceptionV3, and MobileNetV2, with modifications to the fully connected layers to reduce parameter complexity. The dataset consists of 1000 klowong fabric images with a resolution of 224×224 pixels, with a ratio of 80:10:10 for training, validation, and testing. Data augmentation was applied to improve the generalization of the model. Evaluation is performed based on accuracy, precision, recall, F1-score, and inference time. The experimental results show that VGG16 has the best performance in the testing stage with 92% accuracy. The combination of VGG16 with conventional classifiers (SVM and Random Forest) significantly speeds up the inference time (up to 0.0001 seconds per image) but with a decrease in accuracy to 81-83%. Therefore, the VGG16 model with the modified final layer is recommended as the optimal solution with the best trade-off between classification performance and computational efficiency, especially for application scenarios on low-resource devices such as batik SMEs.
Interpretable Machine Learning for Employee Recruitment Prediction Using Boruta, CatBoost, Lasso, Logistic Regression, NLP, and RFE Feature Selection Sunge, Aswan Supriyadi; Suzanna, Suzanna; Mardi Putra, Hamzah Muhammad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4810

Abstract

Employee recruitment is one of the crucial processes in human resource management that has a direct impact on the performance and success of the company. In the digital era, the use of Machine Learning (ML) in candidate selection processes is increasingly prevalent due to its ability to enhance efficiency, accuracy, and transparency. This research is important because conventional recruitment methods often face issues such as subjective bias, slow processing times, and limitations in assessing a candidate’s true potential. ML offers a more objective, data-driven, and faster approach, enabling companies to identify the best candidates more effectively. This study aims to identify the main features that influence recruitment decisions, as well as evaluate the effectiveness and interpretability of several ML models, namely Boruta, CatBoost, Lasso Regression, Logistic Regression, Natural Language Processing (NLP), and Recursive Feature Elimination (RFE). This study uses a dataset consisting of 1,501 samples with 10 features and one class variable (0 = Not Hired, 1 = Hired). The evaluation is carried out based on the ability of each model to identify the features that make the most significant contribution to the classification results. This study has several limitations, particularly the potential bias in the data, such as demographic bias that may be reflected in historical recruitment decisions. This could lead the ML models to replicate or even reinforce such biases. Additionally, the limited dataset size may affect the models' ability to generalize to new data. In the context of this study, the main parameter used to assess the superiority of the model is the most dominant feature or the highest feature produced by each method. The test results show that the Boruta model identifies Gender as the most influential feature, while the CatBoost, Lasso Regression, Logistic Regression, and NLP models consistently place Recruitment Strategy as the most significant feature in predicting candidate eligibility. Meanwhile, the RFE model produces Distance from the Company as the highest feature that influences recruitment decisions. The uniqueness of this study lies in its approach that integrates feature interpretability models within the real-world context of recruitment decision-making. This approach not only emphasizes prediction accuracy but also promotes transparency and a clear understanding of the rationale behind each decision. It supports the development of a fairer and more accountable selection process, particularly by minimizing unconscious bias in data-driven recruitment systems. From a practical standpoint, the findings are highly relevant for human resource professionals, as the identified key features can be used to design more objective selection strategies and enhance the efficiency of candidate evaluations. Therefore, this study makes a tangible contribution to the advancement of modern, technology-based recruitment systems that prioritize fairness and decision-making efficiency. Additionally, the selection of evaluation metrics could be further elaborated to strengthen the analysis, for example by presenting the overall accuracy of each model or comparing them with alternative approaches to provide a more comprehensive view of the models' performance.
Performance Evaluation of Backend Frameworks for REST API: A Comparative Study of Spring Boot, Flask, Express.js, Laravel FrankenPHP, and Gin Azzahidi, Aufa Syaihan; Wijayanto, Bangun; Darmawan, Agus
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4811

Abstract

One major impact of this development is the shift in application development, particularly in data integration across different platforms. Web services have emerged as a solution for system integration and multi-platform application development. One implementation of Web services is Representational State Transfer. The choice of programming language and framework is also crucial in web application development, directly affecting performance and efficiency. Research on framework performance is necessary to support the development of an Academic Information System. This study will use parameters such as response time, throughput, and resource usage, employing a performance testing method modified by the author. The method includes problem identification, data collection, backend development, performance testing, and conclusion. The test results show that Spring Boot outperforms others in all parameters with stable and efficient performance. Gin is suitable for medium-scale data, Flask excels in scalability but lacks stability, Express.js is efficient CPU usage, and Laravel with FrankenPHP is Memory-efficient. These results serve as a reference for selecting frameworks according to REST API development needs. This research supports developers in selecting appropriate backend frameworks for high-performance REST API systems.
Security and Performance Evaluation of PPTP-Based VPN with AES Encryption in Enterprise Network Environments Heryanto, Ahmad; Setiawan, Deris; Audrey, Berby Febriana; Hermansyah, Adi; Afifah, Nurul; Azhar, Iman Saladin B.; Idris, Mohd Yazid Bin; Budiarto, Rahmat
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.4.4818

Abstract

In the context of the current digital era, Virtual Private Networks (VPNs) serve a critical function in ensuring the confidentiality and integrity of data transmitted across public networks, particularly within corporate environments. This study presents a comprehensive analysis of VPN security and performance, with a specific focus on the Point-to-Point Tunneling Protocol (PPTP) and the implementation of encryption algorithms such as AES-128 and AES-256. Despite the widespread adoption of PPTP due to its simplicity and broad compatibility, it exhibits significant security vulnerabilities, primarily stemming from its reliance on the outdated RC4-based Microsoft Point-to-Point Encryption (MPPE) and the susceptible MS-CHAP authentication protocol, which is highly vulnerable to brute-force and dictionary attacks. Empirical findings indicate that, although AES-128 and AES-256 introduce minor performance trade-offs compared to unencrypted configurations, AES-256 demonstrates markedly enhanced security, achieving a 98.9% authentication success rate and a threat detection time of 122 milliseconds. Nevertheless, increased user load adversely impacts network performance, with throughput declining from 95 Mbps to 40 Mbps as the user count rises from 5 to 50, accompanied by elevated latency and packet loss. Comparative analysis across three encryption scenarios AES-128, AES-256, and MPPE-PPTP reveals a consistent degradation in network performance as user load increases, with AES-256 offering the strongest security at the cost of slightly reduced throughput and increased latency under high-load conditions. MPPE-PPTP, while providing better throughput, lacks adequate security, making it unsuitable for high-risk environments. Based on these observations, this study recommends the implementation of AES-256 encryption in enterprise networks requiring high security, supported by continuous performance monitoring and strategic capacity planning. Furthermore, the adoption of a secure site-to-site VPN architecture is proposed to facilitate reliable and secure communication between geographically distributed office locations.

Page 75 of 105 | Total Record : 1048


Filter by Year

2020 2026


Filter By Issues
All Issue Vol. 7 No. 1 (2026): JUTIF Volume 7, Number 1, February 2026 Vol. 6 No. 6 (2025): JUTIF Volume 6, Number 6, Desember 2025 Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025 Vol. 6 No. 4 (2025): JUTIF Volume 6, Number 4, Agustus 2025 Vol. 6 No. 3 (2025): JUTIF Volume 6, Number 3, Juni 2025 Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025 Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025 Vol. 5 No. 6 (2024): JUTIF Volume 5, Number 6, Desember 2024 Vol. 5 No. 5 (2024): JUTIF Volume 5, Number 5, Oktober 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 Vol. 5 No. 4 (2024): JUTIF Volume 5, Number 4, August 2024 - SENIKO Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024 Vol. 5 No. 2 (2024): JUTIF Volume 5, Number 2, April 2024 Vol. 5 No. 1 (2024): JUTIF Volume 5, Number 1, February 2024 Vol. 4 No. 6 (2023): JUTIF Volume 4, Number 6, Desember 2023 Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023 Vol. 4 No. 4 (2023): JUTIF Volume 4, Number 4, August 2023 Vol. 4 No. 3 (2023): JUTIF Volume 4, Number 3, June 2023 Vol. 4 No. 2 (2023): JUTIF Volume 4, Number 2, April 2023 Vol. 4 No. 1 (2023): JUTIF Volume 4, Number 1, February 2023 Vol. 3 No. 6 (2022): JUTIF Volume 3, Number 6, December 2022 Vol. 3 No. 5 (2022): JUTIF Volume 3, Number 5, October 2022 Vol. 3 No. 4 (2022): JUTIF Volume 3, Number 4, August 2022 Vol. 3 No. 3 (2022): JUTIF Volume 3, Number 3, June 2022 Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022 Vol. 3 No. 1 (2022): JUTIF Volume 3, Number 1, February 2022 Vol. 2 No. 2 (2021): JUTIF Volume 2, Number 2, December 2021 Vol. 2 No. 1 (2021): JUTIF Volume 2, Number 1, June 2021 Vol. 1 No. 2 (2020): JUTIF Volume 1, Number 2, December 2020 Vol. 1 No. 1 (2020): JUTIF Volume 1, Number 1, June 2020 More Issue