cover
Contact Name
Noviyanti. P
Contact Email
ti@shantibhuana.ac.id
Phone
+6285750550228
Journal Mail Official
ti@shantibhuana.ac.id
Editorial Address
Jalan Bukit Karmel No.1 Sebopet Kec. Bengkayang Kab. bengkayang Provinsi Kalimantan Barat, 79211
Location
Kab. bengkayang,
Kalimantan barat
INDONESIA
Journal of Information Technology (JIfoTech)
Published by Institut Shanti Bhuana
ISSN : 27744884     EISSN : 27756734     DOI : https://doi.org/10.46229/jifotech.v1i1
Core Subject : Science,
Journal of Information Technology (JIfoTech) contains research articles in the scope of information technology, in the form of Internet of Things (IoT), web technology, databases, artificial intelligence, business intelligence, security and network infrastructure, human and computer interaction (HCI), data mining, and digital image processing.
Articles 7 Documents
Search results for , issue "Vol 2 No 1 (2022): Journal of information Technology" : 7 Documents clear
Modifikasi Algoritma Kriptografi Caesar Chiper pada Deretan Simbol dan Huruf di Smarphone dan Laptop Prima Giri Pamungkas; Alva Hendi Muhammad
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.234

Abstract

Perkembangan dalam dunia teknologi informasi memanfaatkan teknologi komputer menjadikan salah satu pilihan dalam melakukan berbagai hal yang terdapat di dalamnya dapat berupa aplikasi, sms atapun sistem pegamanan data yang menjaga keamanan dan kerahasiaan data informasi dalam ilmu pengembangan seperti kriptografi. Pada penerapan yang di lakukan tidak dari satu teknik keamanan saja melainkan dapat dilakukan dengan bebagai kombinasi ataupun modifikasi dalam keamanan data dan informasi. Konsep utama pada kriptografi yakni enkripsi dan dekripsi. Sebuah pesan , informasi ataupun data yang di enkripsi agar orang yang tidak berhak untuk membaca pesan tersebut tidak akan dapat membacanya. Dari perkembangan berbagai metode penggunaan kriptografi dapat sering kali di pecahkan dan di selesaikan oleh pihak lain yang tidak berhak di karenakan kunci dari informasi pesan data tersebut tidak sulit memecahkannya. Dalam tulisan yang di buat ini penulis memodifikasi metode Caesar chiper menggunakan beberapa symbol dan angka sehingga menghasilkan pola dengan beberapa tahap metode.
Review : Algoritma Kriptografi Sistem Keamanan SMS di Android Maya Sari; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.292

Abstract

Abstract— The use of smartphones is very widespread in today's society. Android is widely liked by various circles of users as well as among smartphone manufacturers with its very interesting features. However, even though this smartphone technology has many features, users still have special considerations for SMS (Short Message Service) email. Unfortunately, this SMS feature has limitations, only in the security of exchanging confidential information, this system is needed to provide secure information exchange via Android-based SMS. Therefore, it is necessary to secure it using cryptographic methods and a high level of security is required. In this study, we will compare three cryptographic algorithms, namely AES (Advanced Encryption Standard), RSA (Rivest Shamir Adleman), and TEA (Tiny Encryption Algorithm) which is carried out by comparing the characteristics of the encryption algorithm, the results of which will be used for an Android-based SMS security system with better security. higher. Based on the findings of the review it can be concluded that TEA (Tiny Encryption Algorithm) is the best algorithm for this work for an SMS security system on Android.
Modifikasi Algoritma Caesar Cipher pada Kode ASCII dalam Meningkatkan Keamanan Pesan Teks Mira; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.293

Abstract

Abstract— Theft of personal data is a criminal act and violates the law in the field of information technology. Therefore, the security of personal data must have a higher level of security. Personal data security can be done by one of them providing a password to the data file. To avoid password burglary, you can encrypt the password. This study uses the Caesar Cipher algorithm in the encryption process. However, some classical cryptographic algorithms that have been widely known have weaknesses that can be solved by cryptanalysis. Therefore, to avoid this, before encrypting, the caesar cipher algorithm is modified first and then converted into ASCII code. The results of the modified algorithm provide a level of message security complexity, when compared to the caesar algorithm without modification. This is shown from the results of the ciphertext that produces ciphertext in the form of combined characters, making the ciphertext more difficult to read and understand by humans, so as to increase message security and can minimize the occurrence of hacking by irresponsible parties.
Analisis Sistem E-Commerce pada Shopee untuk meningkatkan daya saing menggunakan metode S.W.O.T. Candra Gudiato; Eko Sediyono; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.294

Abstract

The development of information technology has shifted the human paradigm in doing shopping from the traditional way that requires sellers and buyers to meet directly to electronic commerce (e-commerce) which is completely online. Shopee as one of the players in the e-commerce business has transformed into one of the big marketplaces, both in Indonesia and in the world. As an e-commerce company that has a worldwide reputation, Shopee is not the only player in the E-commerce business. To be able to survive in the midst of tight digital competition, of course Shopee is expected to always innovate to maintain service quality and increase competitiveness against its competitors. Therefore, an analysis will be carried out using S.W.O.T. to find out the strengths, weaknesses, opportunities, and threats that can occur to Shopee e-commerce. Based on the results of the analysis carried out, it was found that the strength of Shopee lies in its reputation, its weakness is that it is not e-commerce from Indonesia, the opportunity is a marketplace business that is not bound by space and time, and the threat is that there are many competitors for a similar business model. From these results, to reduce weaknesses and threats, as well as increase the strengths and opportunities that Shopee has, it can be done by implementing the S-O, W-O, S-T, and W-T strategies.
Analisis Sentimen Review Film Menggunakan TF-IDF dan Support Vector Machine Okta Ihza Gifari; Muh. Adha; Fernandito Freddy; Fernandito Freddy Setlight Durrand
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.330

Abstract

Intisari—Dengan kemajuan teknologi saat ini seluruh informasi tentang semua film sudah tersedia di Internet. Jika informasi dikelola dengan baik maka dapat memberikan manfaat berupa informasi yang berguna untuk membantu individu atau organisasi untuk mengambil keputusan. Penelitian ini bertujuan untuk menjelaskan analisis sentimen pada dokumen film. Metode yang digunakan pada penelitian ini adalah TF-IDF (Term Frequency-Inverse Document Frequency) dan SVM (Support Vector Machine) . Metode ini dipilih karena mampu melakukan pembobotan terhadap kata dan mengklasifikasikan data berdimensi tinggi. Dari uji skenario yang dilakukan, diketahui bahwa algoritma TF-IDF dan SVM dapat digunakan untuk kasus review film dengan nilai Accuracy 85%, nilai Precision 100%, nilai Recall 70%, dan nilai F1-Score sebesar 82%.
Analisa Algoritma Kriptografi Klasik Caesar Cipher Viginere Cipher dan Hill Cipher – Study Literature Noviyanti. P; Mira
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.387

Abstract

The process of encryption and description of a message is a third party called cryptography. Cryptography is a technique for securely transferring information between two parties without intervention by external elements. The process of securing information can be done with several available cryptographic algorithms. Cryptographic algorithms consist of two eras, namely, classical algorithms and modern algorithms. Classical algorithms were generally used in the past using only substitution and permutation methods. While modern algorithms are algorithms that can be recognized, read and understood by computers that produce the numbers 0 and 1 or commonly called binary data. The purpose of the analysis is to determine the development of security and complexity of standard classical algorithms and classical algorithms with modifications.
Analisis Sistem Jaringan Berbasis QoS untuk Hot-Spot Di Institut Shanti Bhuana Andri Mikola; Maya Sari
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.398

Abstract

Kemajuan yang sangat pesat di bidang teknologi khususnya teknologi informasi komputer mendorong munculnya inovasi-inovasi baru dalam penyajian informasi untuk memenuhi kebutuhan informasi tidak terkecuali di era pandemic covid-19 ini. Seiring dengan kemajuan teknologi, kebutuhan untuk mengelola layanan dengan lebih cepat dan mudah menjadi kebutuhan baru saat ini. Jaringan yang baik harus mempunyai kualitas layanan yang diberikan kepada pengguna. Ketika ingin membangun sebuah jaringan harus memperhitungkan Quality of Service (QoS). QoS merupakan metode yang digunakan untuk mengukur seberapa baik dalam suatu layanan jaringan. Parameter QoS yang digunakan adalah throughput, packet loss, delay dan jitter menurut standarisasi TIPHON. Hasil dari pengukuran Quality of Service (QoS) pada jaringan hotspot Institut Shanti Bhuana dapat diketahui bahwa throughput sebesar “2152K”, packet loss sebesar “0,9%”, delay sebesar “27,000487ms”, dan jitter sebesar ”27,0221415ms”. Maka dapat di simpulkan bahwa kualitas jaringan hotspot pada Institut Shanti Bhuana menurut standarisasi TIPHON masuk dalam kategori “Sangat Bagus”.

Page 1 of 1 | Total Record : 7