cover
Contact Name
Noviyanti. P
Contact Email
ti@shantibhuana.ac.id
Phone
+6285750550228
Journal Mail Official
ti@shantibhuana.ac.id
Editorial Address
Jalan Bukit Karmel No.1 Sebopet Kec. Bengkayang Kab. bengkayang Provinsi Kalimantan Barat, 79211
Location
Kab. bengkayang,
Kalimantan barat
INDONESIA
Journal of Information Technology (JIfoTech)
Published by Institut Shanti Bhuana
ISSN : 27744884     EISSN : 27756734     DOI : https://doi.org/10.46229/jifotech.v1i1
Core Subject : Science,
Journal of Information Technology (JIfoTech) contains research articles in the scope of information technology, in the form of Internet of Things (IoT), web technology, databases, artificial intelligence, business intelligence, security and network infrastructure, human and computer interaction (HCI), data mining, and digital image processing.
Articles 69 Documents
Sistem Pengelolaan Data Pesanan dan Servis Jok Berbasis Web Menggunakan Metode RAD Rahmat Robi Waliyansyah; Edi Dwi Supratiyan; Aris Tri Jaka Harjanta
Journal of Information Technology Vol 1 No 2 (2021): Journal of Information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v1i2.279

Abstract

Toko Romeo Jok adalah toko mebel yang menjual berbagai jenis mebel dan menyediakan jasa servis segala jenis mebel yang berada di Kabupaten Pati. Toko Romeo Jok masih menggunakan pendataan data pesanan dan servis secara manual maka terjadi masalah kurang terorganisirnya data pesanan dan servis, dan data mudah untuk hilang. Sehingga diperlukan sebuah sistem pengelolaan data yang dapat menyimpan dan menyajikan data pesanan dan servis secara akurat, efektif, dan efisien. Pembangunan sistem pengelolaan data pesanan dan servis berbasis web ini bisa digunakan Toko Romeo Jok untuk mengelola data pesanan dan servis secara cepat, mudah, dan akurat. Pada tahap perancangan sistem ini memgunakan metode pengembangan Rapid Application Development (RAD), yaitu metode yang menyediakan pengembangan yang cepat dan mendapatkan hasil yang bagus . Sistem pengelolaan data pesanan dan servis jok berbasis web ini di buat menggunakan bahasa pemograman PHP dan mengunakan software xampp dan text editor seperti sublime text, pembuatan desain sistem menggunkan draw.io, basis data nya menggunakan MySQL. Berdasarkan Hasil UAT dari aspek penilaian antar muka mendapat persentase 82% dari aspek penilaian kemudahan pengoperasional mendapatkan presentase 84% dan dari aspek kemanfaatan isi sistem ini mendapat persentase 83%. Sistem ini terbukti layak digunakan karena pada hasil pengujian white box dan black box keduanya mendapat hasil persentase 100%.
Analisis Potensi Daerah Rawan Longsor di Kecamatan Bawen dan Tuntang dengan Metode Simple Additive Weighting (SAW) Mira; Merryana Lestari; Candra Gudiato; Sri Yulianto Prasetyo; Charitas Fibriani
Journal of Information Technology Vol 1 No 2 (2021): Journal of Information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v1i2.280

Abstract

The high intensity of rainfall at the end of 2020 and early 2021 not only caused several areas in Indonesia to be flooded but also landslides. Landslides can occur due to soil movements in the rainy season and are influenced by tectonic conditions in Indonesia which are always changing. Bawen and Tuntang Districts are two districts in Semarang Regency, Central Java. Both areas were hit by floods and landslides in April 2020. The material and moral losses of the local population are inevitable. To take precautions as early as possible in order to reduce future losses, it is necessary to conduct research on the potential of landslide-prone areas in Bawen and Tuntang Districts. The analysis was carried out using the Simple Additive Weighting (SAW) method to calculate the percentage of an area where landslides occurred. The parameters used include land cover, slope, rainfall, Soil Adjusted Vegetation Index (SAVI), Normalized Difference Vegetation Index (NDVI), and Normalized Difference Wetness Index (NDWI). The results of this study indicate that the level of landslide vulnerability in Bawen and Tuntang Districts is classified as "kurang rawan". The results of this study are expected to become a spatial planning document based on landslide disaster mitigation in Semarang Regency, especially in Bawen and Tuntang Districts.
Sentimen Analisis Pelanggan Shopee di Twitter dengan Algoritma Naive Bayes Aditya Hastami Ruger; M Suyanto; Mei P Kurniawan
Journal of Information Technology Vol 1 No 2 (2021): Journal of Information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v1i2.282

Abstract

Sentimen analisis merupakan suatu bidang studi yang menganalisis tentang opini-opini seseorang, mengevaluasi, menilai, perilaku, dan emosi seperti produk-produk, layanan, kejadian, serta topik-topik. Sentimen analisis dalam dunia bisnis biasanya dipakai untuk menganlisis suatu kebutuhan masyarakat dan kebutuhan pasar, yang diharapkan mampu menyusun strategi pemasaran yang dapat meningkatkan pendapatan perusahaan mereka. Penelitian ini mengambil data-datanya dari grup Shopee yang ada di Twitter. Shopee merupakan salah satu market place yang sering digunakan oleh masyarakat Indonesia maupun masyarakat dinegara lain. Market place Shopee yang menjual jasa maupun menjual barang-barang untuk kebutuhan sehari-hari seperti elektronik,alat-alat makan, pulsa, maupun tiket pesawat, tiket kereta, dan masih banyak lagi jasa yang dijual oleh Shopee.Tujuan dari dilakukan penelitian ini yaitu untuk mengetahui berapa jumlah riview dari komentar positif maupun komentar negatif pada grup Shopee yang ada di media sosial Twitter, pengambilan datanya menggunakan Rstudio, Rstudio merupakan suatu aplikasi yang dipakai untuk menulis program-program dengan menggunakan bahasa R. Aplikasi Rstudio dapat dijalankan pada operasi sistem Windows, Linux, maupun Apple. Serta untuk proses menghitung menggunakan metode Naive Bayes yang dimasukkan kedalam sentimen analisis yang pengambilan data di ambil dari grup Shopee. Dalam penghitungan tingkat keakurasian dengan menggunakan convusion matriks. Hasil dari penelitian ini yaitu dapat diketahui bahwa jumlah komentar positif maupun negatif setara yaitu 150:150, karena data yang diambil adalah 300 data dan tingkat keakurasiannya adalah sebesar 97%.
Deteksi Otomatis Jerawat Wajah Menggunakan Metode Convolutional Neural Network (CNN) Fajar Sudana Putra; Kusrini; Mei P Kurniawan
Journal of Information Technology Vol 1 No 2 (2021): Journal of Information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v1i2.308

Abstract

The development of cosmetology in the world lately is growing rapidly. These developments are balanced by the emergence of cosmetics and skin care from various brands, but not a few negative effects from use, one of which is acne. Acne is one of the problems on the skin, especially the face that arises physiologically because almost everyone has experienced it (Wasitaatmadja, 2010). Acne consists of various types, namely blackheads, whiteheads, papules and cysts (Bhate, K. & Williams, 2013). Not a few people who want to remove and be free from acne. The current technological developments in the field of image processing in recent years with the application of convolutional neural networks have shown significant performance by having a high level of accuracy, for example object detection which recently had image restoration. Therefore, technological developments to facilitate the treatment of acne are urgently needed by medical personnel, especially dermatologists. This research focuses on developing the accuracy of the method using the hough circle transform & Convolutional Neural Network (CNN) method. This study proves the increase in accuracy and accuracy of the object of acne detection using the Convolutional Neural Network (CNN) method. The results of the learning process obtained a CNN model with an accuracy of 99.8% to 100%, so it can be concluded that the CNN method designed in this study can classify images well.
Modifikasi Algoritma Kriptografi Caesar Chiper pada Deretan Simbol dan Huruf di Smarphone dan Laptop Prima Giri Pamungkas; Alva Hendi Muhammad
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.234

Abstract

Perkembangan dalam dunia teknologi informasi memanfaatkan teknologi komputer menjadikan salah satu pilihan dalam melakukan berbagai hal yang terdapat di dalamnya dapat berupa aplikasi, sms atapun sistem pegamanan data yang menjaga keamanan dan kerahasiaan data informasi dalam ilmu pengembangan seperti kriptografi. Pada penerapan yang di lakukan tidak dari satu teknik keamanan saja melainkan dapat dilakukan dengan bebagai kombinasi ataupun modifikasi dalam keamanan data dan informasi. Konsep utama pada kriptografi yakni enkripsi dan dekripsi. Sebuah pesan , informasi ataupun data yang di enkripsi agar orang yang tidak berhak untuk membaca pesan tersebut tidak akan dapat membacanya. Dari perkembangan berbagai metode penggunaan kriptografi dapat sering kali di pecahkan dan di selesaikan oleh pihak lain yang tidak berhak di karenakan kunci dari informasi pesan data tersebut tidak sulit memecahkannya. Dalam tulisan yang di buat ini penulis memodifikasi metode Caesar chiper menggunakan beberapa symbol dan angka sehingga menghasilkan pola dengan beberapa tahap metode.
Review : Algoritma Kriptografi Sistem Keamanan SMS di Android Maya Sari; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.292

Abstract

Abstract— The use of smartphones is very widespread in today's society. Android is widely liked by various circles of users as well as among smartphone manufacturers with its very interesting features. However, even though this smartphone technology has many features, users still have special considerations for SMS (Short Message Service) email. Unfortunately, this SMS feature has limitations, only in the security of exchanging confidential information, this system is needed to provide secure information exchange via Android-based SMS. Therefore, it is necessary to secure it using cryptographic methods and a high level of security is required. In this study, we will compare three cryptographic algorithms, namely AES (Advanced Encryption Standard), RSA (Rivest Shamir Adleman), and TEA (Tiny Encryption Algorithm) which is carried out by comparing the characteristics of the encryption algorithm, the results of which will be used for an Android-based SMS security system with better security. higher. Based on the findings of the review it can be concluded that TEA (Tiny Encryption Algorithm) is the best algorithm for this work for an SMS security system on Android.
Modifikasi Algoritma Caesar Cipher pada Kode ASCII dalam Meningkatkan Keamanan Pesan Teks Mira; Hindriyanto Dwi Purnomo; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.293

Abstract

Abstract— Theft of personal data is a criminal act and violates the law in the field of information technology. Therefore, the security of personal data must have a higher level of security. Personal data security can be done by one of them providing a password to the data file. To avoid password burglary, you can encrypt the password. This study uses the Caesar Cipher algorithm in the encryption process. However, some classical cryptographic algorithms that have been widely known have weaknesses that can be solved by cryptanalysis. Therefore, to avoid this, before encrypting, the caesar cipher algorithm is modified first and then converted into ASCII code. The results of the modified algorithm provide a level of message security complexity, when compared to the caesar algorithm without modification. This is shown from the results of the ciphertext that produces ciphertext in the form of combined characters, making the ciphertext more difficult to read and understand by humans, so as to increase message security and can minimize the occurrence of hacking by irresponsible parties.
Analisis Sistem E-Commerce pada Shopee untuk meningkatkan daya saing menggunakan metode S.W.O.T. Candra Gudiato; Eko Sediyono; Irwan Sembiring
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.294

Abstract

The development of information technology has shifted the human paradigm in doing shopping from the traditional way that requires sellers and buyers to meet directly to electronic commerce (e-commerce) which is completely online. Shopee as one of the players in the e-commerce business has transformed into one of the big marketplaces, both in Indonesia and in the world. As an e-commerce company that has a worldwide reputation, Shopee is not the only player in the E-commerce business. To be able to survive in the midst of tight digital competition, of course Shopee is expected to always innovate to maintain service quality and increase competitiveness against its competitors. Therefore, an analysis will be carried out using S.W.O.T. to find out the strengths, weaknesses, opportunities, and threats that can occur to Shopee e-commerce. Based on the results of the analysis carried out, it was found that the strength of Shopee lies in its reputation, its weakness is that it is not e-commerce from Indonesia, the opportunity is a marketplace business that is not bound by space and time, and the threat is that there are many competitors for a similar business model. From these results, to reduce weaknesses and threats, as well as increase the strengths and opportunities that Shopee has, it can be done by implementing the S-O, W-O, S-T, and W-T strategies.
Analisis Sentimen Review Film Menggunakan TF-IDF dan Support Vector Machine Okta Ihza Gifari; Muh. Adha; Fernandito Freddy; Fernandito Freddy Setlight Durrand
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.330

Abstract

Intisari—Dengan kemajuan teknologi saat ini seluruh informasi tentang semua film sudah tersedia di Internet. Jika informasi dikelola dengan baik maka dapat memberikan manfaat berupa informasi yang berguna untuk membantu individu atau organisasi untuk mengambil keputusan. Penelitian ini bertujuan untuk menjelaskan analisis sentimen pada dokumen film. Metode yang digunakan pada penelitian ini adalah TF-IDF (Term Frequency-Inverse Document Frequency) dan SVM (Support Vector Machine) . Metode ini dipilih karena mampu melakukan pembobotan terhadap kata dan mengklasifikasikan data berdimensi tinggi. Dari uji skenario yang dilakukan, diketahui bahwa algoritma TF-IDF dan SVM dapat digunakan untuk kasus review film dengan nilai Accuracy 85%, nilai Precision 100%, nilai Recall 70%, dan nilai F1-Score sebesar 82%.
Analisa Algoritma Kriptografi Klasik Caesar Cipher Viginere Cipher dan Hill Cipher – Study Literature Noviyanti. P; Mira
Journal of Information Technology Vol 2 No 1 (2022): Journal of information Technology
Publisher : Institut Shanti Bhuana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46229/jifotech.v2i1.387

Abstract

The process of encryption and description of a message is a third party called cryptography. Cryptography is a technique for securely transferring information between two parties without intervention by external elements. The process of securing information can be done with several available cryptographic algorithms. Cryptographic algorithms consist of two eras, namely, classical algorithms and modern algorithms. Classical algorithms were generally used in the past using only substitution and permutation methods. While modern algorithms are algorithms that can be recognized, read and understood by computers that produce the numbers 0 and 1 or commonly called binary data. The purpose of the analysis is to determine the development of security and complexity of standard classical algorithms and classical algorithms with modifications.