cover
Contact Name
Khairul Muttaqin
Contact Email
khairulmuttaqin@unsam.ac.id
Phone
+6282276119180
Journal Mail Official
teknikinformatika@unsam.ac.id
Editorial Address
Jalan Prof.Dr. Syarief Thayeb, Meurandeh, Langsa - Aceh
Location
Kota langsa,
Aceh
INDONESIA
Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Published by Universitas Samudra
ISSN : 27752089     EISSN : 27747115     DOI : https://doi.org/10.33059/j-icom.v2i1.3417
Core Subject :
Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Kecerdasan Buatan Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Perancangan Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Enterprise Computing Cloud Computing Technology Management Topik kajian lainnya yang relevan Dengan artikel yang memiliki sitasi primer dan tidak pernah dipublikasikan secara online atau versi cetak sebelumnya.
Articles 107 Documents
RANCANG BANGUN SISTEM INFORMASI PENGARSIPAN SURAT DI KANTOR GUBERNUR SULAWESI TENGGARA Indah Fauzia; Annisaa Dwi Amalia
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.5850

Abstract

Perkembangan teknologi dan sistem infromasi saat ini semakin berkembang dengan pesat. Seiring dengan perkembangan teknologi , keberadaan teknologi informasi sangat berguna dalam mempermudah kinerja kegiatan sehari-hari terutama dalam pengelolaan arsip surat dalam dunia perkantoran. Pada pengelolaan surat masuk dan surat keluar di Kantor Gubernur Sulawesi Tenggara masih melibatkan banyak kertas yang harus diisi untuk mencatat dan mengelompokkan surat masuk maupun surat keluar. Hal ini berhubungan dengan keamanan dari surat atau informasi yang disimpan karena jika tidak dikelola dengan baik kertas bisa saja rusak maupun hilang. Semakin banyak berkas maka tempat penyimpanan yang dibutuhkan semakin besar. Begitu juga ketika petugas ingin mencari surat dengan kata kunci tertentu, maka petugas akan mencari dan membaca surat satu per satu. Dari permasalahan tersebut diperlukan adanya sebuah sistem yang terintegrasi dengan basis data agar dapat membantu meningkatkan proses pelayanan, khususnya dalam pengelolaan pengarsipan surat masuk dan pengarsipan surat keluar Di Kantor Gubernur Sulawesi Tenggara.
ANALISIS KEUNIKAN SERAT DAN CORAK DAUN CALADIUM MENGGUNAKAN METODE THRESHOLD Ahmad Faisal Hamidi; Ahmad Baihaki; Muhammad aqiba Zaim
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.7230

Abstract

Caladium is one type of ornamental plant which is also widely known by the public as taro. The color and pattern of its beautiful leaves make taro a favorite of many people. The taro plant has the scientific name Caladium. Caladium is one of the genera of the taro family or the Araceace family. Caladium has various types, in each type has different fibers and patterns. To determine the type of fiber and pattern of caladium used image analysis pattern with the threshold method,With this method we will be able to know the types of taro plants according to their patterns and fibers that we have read and compared with the method, so that collectors or sellers are assisted in distinguishing them.
Penerapan KNN Penentuan Pelanggan Baru PDAM dan Clustering K- Means Berdasarkan Wilayah Mutammimul Ula; Muthmainnah; Ridha Maulana; Veri Ilhadi
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.7494

Abstract

The Regional Drinking Water Company (PDAM) Tirta Gunung Pase is a company that distributes and provides drinking water services for the entire region of Lhokseumawe and North Aceh. This research aims to find new customers by determining new pairs and grouping each area in determining clusters in each region. This makes it easier for leaders to view collections by customer ID and the number of household group usage. The research methodology is to collect data at PDAM Tirta Mon Pase, then look at the classification with the KNN model and group it with the K-Means method. A final result is a group of regular customers and non-permanent customers with the variable customer id, house class, and several occupants of the house, and the respective values are seen from UA with a value of 5, RB value of 4, RC value 3, RD value two and SB value 1 with test data using 15 samples. The results of testing the KNN model by entering the customer id 25768, occupants of houses in groups 5 and 4 are included in the class 2 classification. Meanwhile, the customer id is 41162 with the results of group 4 classification and class 1 occupants 3 class 1. Kmeans clustering results for households, businesses and industrial companies. K-Result, while the results of the K-means method contained three clusters which showed that cluster 1 was 46.07%, cluster 2 was 39.79%, and cluster 3 was 14.13%.
Rancang Bangun Alat Pengering Ikan Sistem Blower Dengan Kontrol Panas Berbasis Arduino Mega2560 iskandar iskandar; Nazaruddin Nazarudin; Zainal Arif; Syamsul Bahri
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.7553

Abstract

Indonesia merupakan sebuah negara kepulauan yang memiliki kekayaan laut sangat besar. Hasil kekayaan laut ini mengalami kenaikan setiap tahunnya, salah satunya adalah ikan. Ikan adalah bahan makanan yang dimakan oleh banyak orang di seluruh dunia. bukan hanya tentang rasa, tetapi ikan memiliki kandungan kesehatan yang baik bagi tubuh, khususnya memiliki kandungan protein dan lemak yang tinggi dibandingkan dengan sumber protein hewan lainnya. Meskipun demikian, ikan dapat dengan cepat mengalami kerusakan yang disebabkan oleh bakteri dan enzim bila dibiarkan begitu saja. diperlukan pengolahan dan pengawetan lebih lanjut. Metode Pengolahan dan pengawetan merupakan upaya untuk meningkatkan kualitas penyimpanan pasca panen dan umur simpan hasil laut. Namun saat ini metode yang digunakan adalah metode tradisional. Kekurangan yang disebabkan oleh pengeringan tradisional meliputi: penampilan yang kurang baguas, kontrol suhu yang merepotkan, dan kontaminasi dari udara terbuka secara langsung. Tujuan dari penelitian ini adalah mendesain dan membuat rancang bangun alat pengering ikan dengan sistem blower serta mengetahui suhu dan lama waktu yang dibutuhkan dalam proses alat pengering ikan.dan dari penelitian ini dapat disimpulkan secara keseluruhan alat ini berbentuk seperti tabung dengan beberapa komponen pendukung yaitu gas elpiji, blower dan dudukan drum dan alat ini di uji selama 30 menit, 60 menit, 90 menit dan 120 menit. Sehingga jika ditotalkan menjadi 5 jam hingga ikan cukup kering. Temperatur yang terjadi pun bervariasi seperti yang telah kita lihat pada beberapa grafik pengujian. Pengujian temperatur pada pengujian ini menggunakan sensor MAX6675 dengan thermocouple yang terhubung menuju arduino. Untuk pengukuran berat menggunakan timbangan manual.
Perancangan Animasi 3D Bertemakan Islami dengan Judul “Adab Makan dan Minum” Menggunakan Metode Pose to Pose Widia Saraswati
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 2 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v4i2.3750

Abstract

3-dimensional animation can be regarded as a moving image that is in a 3-dimensional digital space. In making this animation, it is done by imitating something real into the form of an animated image, using a virtual camera to make this 3-dimensional animated film and later will produce a video from the rendering process. In working on this 3-dimensional animation, all processes are done through computer assistance. The manufacturing process is through the Blender software version 2.8, which is an open source 3-dimensional computer graphics software that can be downloaded for free on the official website. The method used in this 3-dimensional animation is the "Pose-to-Pose" method, namely by making key movements or keyposes so that the existing movements appear smoother. This 3-dimensional animated film is designed with the aim of educating and informing about the procedures for a Muslim to eat and drink. As for this 3-dimensional animated film, it informs that the importance of eating and drinking etiquette is expected. The design of the 3-dimensional animated film that is made is expected to produce an animated film that can educate the audience so that they can reap the moral messages that have been presented.
Implementasi Keamanan Jaringan Metode Port Knocking dan Port Blocking Berbasis Mikrotik PT Securindo Packatama Indonesia Ade Eksan Nuryakin
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.5851

Abstract

Network security is important for a company or institution in maintaining data and information security. Often the computer network has problems in managing the computer network. Problems that arise can open up opportunities for irresponsible people to hack and damage the running network. In order to avoid misuse of computer networks by irresponsible people, it is necessary to increase network security that is more secure and stronger. In this research, research has been carried out to develop more secure network security by using port knocking and port blocking methods on Mikrotik. In this study, the author will explain the implementation of the port knocking method to provide filter access to the firewall, aiming to provide security for computer access users so that no party or party can change the configuration on the proxy so that network security is maintained. The final result of the study shows that authentication for ports so as to make the server safe and also other ports, closing ports to prevent access attacks from attackers who are not entitled to enter. By using port knocking and port blocking methods, the attacker will try harder to penetrate the system wall on the firewall.
Penerapan Algoritma Regresi Linear Sederhana Untuk Prediksi Pengaruh Nilai Omset Terhadap Besaran Pendapatan Bersih Usaha Mikro Kecil Dan Menengah ifan
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 1 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v4i1.5935

Abstract

Micro, small and medium enterprises (MSMEs) are one of the business fields that can develop and be consistent in the national economy. Micro, small and medium enterprises (MSMEs) are good forums for job creation, which are planned by the government, private sector and individual business actors. The purpose of this study is to predict the increase in net income of micro, small and medium enterprises that affect the economic growth of Cilegon City. In this study using quantitative methods, namely analyzing and interpreting the relationship between variables through accurate and up-to-date data according to the problems in this study. The research method is carried out by examining data from data that is wrong or can interfere with the analysis process, performs analysis on the dataset and divides the data into training data and test data. The process of data sharing is 80% used for training data and 20% for test data. All processes are processed using Python programming. Python libraries used are numpy, pandas, matplotlib, seaborn, sklearn. The analysis process is done with Kaggel Notebook. The results of the study resulted in a simple linear regression model y = - 374359.94312876 + (0.20259073 (X)) with a Correlation value: 0.9999546662293942 Coefficient of determination 0.7244150380582826, Mean Absolute Error: 243269.23966642626, Mean Squared Error: 71893932500.72606 and 934012073. The final result of the analysis is a comparison between the actual y and the predicted y in the form of tables and graphs.
Pengukuran Efektivitas Serangan SQL Injection Pada Website Dengan Menggunakan Tools JSQL, Havij, Dan The Mole Aprilia Monica
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 2 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v4i2.6926

Abstract

Seiring perkembangan teknologi saat ini, keamanan terhadap informasi data yang berada di dalam website sangat rentan dengan kejahatan di dunia internet seperti serangan terhadap celah keamanan pada lapisan databases atau sering dikenal dengan istilah SQL Injection. Serangan SQL Injection merupakan metode untuk menyisipkan perintah SQL sebagai input melalui suatu aplikasi yaitu Kali Linux agar mendapatkan akses masuk ke dalam database. Serangan ini dapat mengetahui username, password, dan data lainnya yang berada di dalam database. Sehingga serangan SQL Injection merupakan salah satu serangan yang popular dan sering digunakan untuk memanfaatkan celah keamanan pada system karena cara menggunakannya yang mudah . Penelitian ini memiliki tujuan untuk menguji tingkat efektifitas serangan SQL Injection dengan menggunakan tools di dalamnya terhadap suatu website. Pengujian efektifitas dilakukan dengan melakukan perbandingan antara ketiga tools yang berada di dalam SQL Injection. Hasil dari penelitian efektifitas tools dalam SQL Injection adalah akurasi waktu pencarian database dan ketepatan informasi dari database.
Penggunaan Pengembangan Virtual Reality Scratch sebagai Media Pembelajaran Imas Dewi Orvala Nathania Insani; Revina Aurigha Firdaus; Handika Dio Pradana; Aditya Ramadhan Wahyu Santoso; Dodik Arwin Dermawan
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 2 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v4i2.7543

Abstract

Visual-based programming is a method of making a program where the programmer connects objects by drawing, pointing and clicking on diagrams or icons and interacting with flowcharts. Visual-based programming itself uses visualization where there is the use of visual representations such as graphics, images or animations to describe a program, data, structure, or behavior of a complex dynamic system. In Scratch, there is a Windows-based programming language from Microsoft. Virtual Reality is the appearance of three-dimensional images made by computers so that they look real. with the rocks of some specific tools. With this Virtual Reality, users both children, students,
PERKEMBANGAN SISTEM PENDETEKSI BANJIR BERBASIS IoT : SYSTEMATIC LITERATURE REVIEW Muhammad Al Farrabi Bobi
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 4 No 2 (2023): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55377/j-icom.v4i2.7697

Abstract

This study aims to produce a systematic literature review. The process of writing a Systematic Literature Review (SLR) is carried out according to the framework. With high rainfall during the rainy season it can make it rain continuously and cause an increase in the volume of water that has the potential for flooding. While the community did not receive information or notification directly when this would occur. To anticipate these problems, the design of a water level monitoring system as an IoT-based early flood detector is considered efficient. This paper extracts from various publications regarding IoT-based flood detection systems specifically. This study examines identifying and selecting the methods used in this study, what is the purpose of this research in developing an IoT-based flood detection system, how do we compare the results of the flood detection systems that have been carried out. In this paper we present the results of the development of a flood detection system in each of the previous studies. As a result, the main contribution of this paper is to review research on the development of IoT-based flood detection systems.

Page 6 of 11 | Total Record : 107