cover
Contact Name
Karona Cahya Susena
Contact Email
admbengkulu5758@gmail.com
Phone
+6281541234500
Journal Mail Official
admbengkulu5758@gmail.com
Editorial Address
JL. Ratu Agung No. 4A, Anggut Bawah, Ratu Samban, Kota Bengkulu
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Komputer, Informasi dan Teknologi
ISSN : 2807256     EISSN : 28072588     DOI : https://doi.org/10.53697/jkomitek.v1i2
KOMITEK Journal (Computer, Information and Technology) journal was founded in 2021. It is an interesting and useful national journal for all parties with an interest in research in various fields of, or closely related to, the disciplines of Computer, Information and Technology. KOMITEK Journal aims to provide a highly readable and valuable addition to the literature that will serve as an indispensable reference tool for years to come. The scope of the journal includes all new theoretical and experimental findings in the field of Computers, Information and Technology or any closely related field. The journal also encourages submission of critical review articles covering advances in the latest research in the field of Computers, Information and Technology.
Articles 25 Documents
Search results for , issue "Vol. 4 No. 2 (2024): Desember" : 25 Documents clear
Rancangan Pembuatan Puzzle 2D "Perfect Match" untuk Perangkat Android Dhananjaya, Asoka; Pragantha, Jeanny; Haris, Darius
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.1961

Abstract

“Perfect Match” adalah game puzzle match-3 dengan tampilan 2D yang dirancang untuk perangkat Android. Unity serta C# sebagai bahasa pemrograman digunakan dalam pengembangan game ini. Game ini dirancang dengan tujuan sebagai sarana hiburan dengan mengajak pemain untuk mencocokkan objek serta menggunakan strategi untuk menyelesaikan level. Uji yang dilakukan oleh dosen pembimbing menggunakan metode blackbox testing dan alpha testing, pengujian yang dilakukan terhadap responden yang berjumlah 30 dilakukan menggunakan beta testing yang melalui survei. Pengujian yang dilakukan menunjukkan hasil yakni mayoritas responden merasa tampilan dan gameplay menarik, meskipun terdapat kekurangan dalam variasi power-ups pada level lanjut.
Penerapan Kriptografi DES Untuk Keamanan Data Teks Pada File PDF Menggunakan Bahasa Pemrograman Phyton Fahriani, Nuniek
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.1997

Abstract

Pada seni kriptografi banyak teknik enkripsi yang bisa dmanfaatkan, diantaranya adalah teknik “Data Encryption Standard (DES)” yang tergolong jenis cipher blok yang menggunakan kunci simetris yang dapat mengenkripsi pesan sebanyak 64 bit. Terdapat tiga tahapan operasi untuk teknik data encryption standard-DES, tahap satu dengan menjalankan perubahan letak atau permutasi, selanjutnya dilakukan rotasi, dan langkah ketiga adalah melakukan fungsi substitusi. Pada penelitian ini bahasa permograman yang digunakan adalah bahasa python. Objek yang menjadi sebagai plainteks (teks asli) adalah file dokumen PDF (portable document format). Program python yang dijalankan dapat melakukan enkripsi sekaligus melakukan kompresi ukuran PDF (portable document format) menjadi lebih kecil. Dengan hasil file plainteks awal sebesar 7.55 KB (7.732 bytes). Sesudah dilakukan enkripsi menjadi 1.99 KB (2.039 bytes). Selanjutnya adalah proses dekripsi mengembalikan lagi ke dalam teks yang bisa dibaca dengan ukuran file sebesar 1.30 KB (1.336 bytes).
The Use of Naïve Bayes Algorithm in Sentiment Analysis of Grab Application Reviews Aditiya, Febri; Maulana, Donny; Edora
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.1999

Abstract

This study aims to analyze the sentiment of Grab application user reviews using the Naïve Bayes algorithm. In conducting the analysis, how well the Naïve Bayes algorithm can analyze Grab application user review data. Thus, this process refers to the elements that affect the accuracy of the Naïve Bayes analysis. to analyze the sentiment of Grab application user reviews using the Naïve Bayes algorithm. Thus, it not only evaluates the accuracy of the Naïve Bayes method, but also considers the problem of imbalanced class, because in reality not all datasets can be accessed perfectly. To consider the problem of data imbalance, this study requires the Adaptive Synthetic Sampling or ADASYN technique which is used in machine learning to overcome the problem of class imbalance in the dataset. The tools used in processing the algorithm in the method and conducting the analysis use Google Colab. This study focuses on the classification of positive and negative sentiments from user reviews taken by the scraping process from the Google Play Store platform. The analysis process involves data preprocessing, including tokenization, stemming, and word weighting, to improve the accuracy of sentiment classification. Based on the results of this study, the Naïve Bayes model sought an accuracy result of 85.33%, the precision result obtained was 80.55% and the recall result in this research test was 79.09%, from these results by implementing calculations using a confusion matrix and dividing the data into testing data and training data
Klasifikasi Pengadaan Obat Jaminan Kesehatan Nasional Melalui E-Purchasing Menggunakan Algoritma K-Nearest Neighbor Fauzie, Mohammad; Supatman
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2003

Abstract

Pemenuhan stok obat berkualitas dalam jumlah cukup merupakan target yang harus dicapai dalam program Jaminan Kesehatan Nasional (JKN) yang dilaksanakan oleh fasilitas kesehatan secara elektronik. Penelitian ini bertujuan melakukan klasifikasi pengadaan obat JKN melalui E-purchasing. Data penelitian bersumber dari dashboard transaksi pada E-Katalog atau Katalog Elektronik Sektoral Kementerian Kesehatan selama periode Januari hingga Oktober tahun 2024 menggunakan algoritma K-Nearest Neighbor (K-NN). Pengujian dengan euclidean distance yaitu jarak kedekatan data latih dan data uji berdasarkan tiga atribut yaitu tingkat komponen dalam negeri, kuantitas, dan harga satuan obat. Jumlah dataset sebanyak 156 record dengan perbandingan data 80:20. Hasil penelitian menunjukkan accuracy tertinggi sebesar 98% pada nilai k=7 dan k=9 sedangkan accuracy terendah sebesar 94% pada nilai k=3. Hasil ini membuktikan bahwa algoritma K-Nearest Neighbor mampu melakukan klasifikasi obat JKN melalui E-purchasing dengan baik.
Analisis QoS Pada Internet Desa Puguk Menggunakan Standar THIPON Aditam, Afredo; Marhalim; Khairullah; Mahfuzhi, A.R Walad
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2020

Abstract

Jaringan internet juga harus dilakukan analisa agar dapat diketahui bahwa pengguna jaringan atau pelanggan telah merasa puas atau tidak dengan fasilitas jaringan yang diberikan tersebut. Dengan mengetahui analisa jaringan maka akan dapat disimpulkan bahwa pengguna layanan internet mempunyai jaringan yang bagus atau tidak sehingga menjadi salah satu acuan bagi penyedia layanan atau yang disebut ISP (Internet services propeider), untuk memberikan layanan yang lebih baik bagi pengguna. Analisa jaringan menggunakan QoS (Quality of Service) khususnya adalah throughput, dellay dan packet loss mampu memberikan analisa jaringan yang baik, dimana aspek ini yang sering digunakan didalam analisa jaringan. Hasil dari penelitian ini adalah Nilai QoS yang dihasilkan pada pengujian parameter throughput sebesar 52,17% dengan indek 3, sedangkan pada pengujian parameter delay nilai yang dihasilkan sebesar 45ms dengan indek 4 dan pada pengujian parameter packet loss nilai yang dihasilkan sebesar 18,52% dengan nilai indek 2. Dari hasil perhitungan tersebut, layanan internet pada kantor desa puguk termasuk dalam katagori bagus berdasarkan standar THIPON yaitu dengan nilai indeks 3.
Design of a Website-Based Company Profile at SMK Al-Idrus Kutai Kartanegara Fahrozi, Mu; Aspianur; Pranoto, Wawan
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2038

Abstract

The development of technology in education encourages SMK Al-Idrus Kutai Kartanegara to embrace the digital world. This study aims to address the challenges of limited resources in integrating web design skills by developing a web-based company profile application using the prototyping method. The program involves stages such as requirement gathering, prototype development, user evaluation, and final product development. The resulting application includes interfaces such as a homepage, admin panel, news section, departments, student admission (PPDB), school profile, and login page. Through this activity, students gain practical experience in web development, enabling them to compete in the digital era and meet the demands of the information technology and graphic design industries.
Analysis of the Impact of Interview-Based Feature Selection on the Performance of Machine Learning Algorithms in Mental Health Disorder Classification Hendrick
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2039

Abstract

Mental health issues in the workplace have become an increasingly important concern, particularly in the high-pressure environment of the information technology industry. This study aims to evaluate the impact of feature selection based on interviews on the performance of machine learning models in classifying mental health disorders. The dataset used is sourced from Open Sourcing Mental Illness (OSMI), which consists of various features related to employees' mental health conditions, previously used without feature selection in prior research. Through an interview with an experienced Human Capital professional with a psychological background, relevant features were selected based on domain expertise. Subsequently, machine learning models, namely Random Forest and XGBoost, were trained using two scenarios: without feature selection and with feature selection. The results of the study indicate that feature selection based on interviews can improve model accuracy by 1.67% for Random Forest and 0.67% for XGBoost. These findings emphasize the importance of integrating psychological insights into the data processing to produce more relevant and efficient models. This research provides practical contributions to assist companies in implementing early detection of mental health disorders effectively.
Sentiment Analysis Related to Law No. 6 Of 2023 on the Employment Cluster Using the Bidirectional Long Short-Term Memory Algorithm M, Anugra; Munawar
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2051

Abstract

The enactment of UU Cipta Kerja has triggered varied public responses, particularly concerning employment provisions like fixed-term employment (PKWT), the legalization of outsourcing, unfair severance pay, and ease of layoffs. Social media has become a primary platform for the public to share opinions on issues within the law’s employment cluster. This study employs sentiment analysis using the Bidirectional Long Short-Term Memory (Bi-LSTM) algorithm to understand public sentiment about UU Cipta Kerja and sentiment within its content. Bi-LSTM is chosen for its ability to capture temporal relationships and context in long texts, which aids in handling complex sentiment classification. The findings indicate varied public perceptions: neutral sentiment dominates issues like "PKWT" and "Minimum Wage" on Twitter (X), reflecting uncertainty. Positive sentiment appears around "Outsourcing" and "Minimum Wage" provisions, indicating perceived flexibility. Conversely, negative sentiment dominates issues like "Layoffs" and "Severance," on both social media and in UU Cipta Kerja content, signaling concerns over worker rights. The Bi-LSTM model achieved 70.15% accuracy for the Twitter dataset and 83.22% for the law’s content dataset.
Enhancing Data Security and Integrity with Post-Quantum and AES Digital Signatures Puringgar Prasadha Putra, Rayasa; H. A. Danang Rimbawa; Bisyron Wahyudi
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2081

Abstract

Data security and integrity are crucial issues in contemporary information systems, since the emergence of quantum computing presents substantial risks to traditional cryptographic techniques such as RSA and ECC. This work suggests a hybrid technique that combines the Advanced Encryption Standard (AES) for symmetric encryption with Post-Quantum Cryptography (PQC) digital signatures to mitigate these issues. The framework seeks to safeguard sensitive documents, including PDFs, against unauthorized alterations and Man-in-the-Middle (MiTM) attacks. A simulation is executed to illustrate the threats associated with Man-in-the-Middle (MiTM) attacks, whereby the encrypted document and digital signatures are intercepted, altered, and re-encrypted. The technology guarantees data integrity by signature verification and hash comparisons, efficiently identifying and preventing tampering. The findings indicate that the suggested PQC-AES hybrid system not only fortifies defenses against conventional threats but also improves resistance to quantum-based assaults, offering a scalable and safe approach for contemporary data security. The research emphasizes the need of implementing quantum-resistant algorithms to safeguard digital security systems for the future, while preserving the efficacy of existing encryption techniques. The progression of quantum computing presents substantial threats to traditional cryptography methods, including RSA and ECC. These cryptosystems depend on mathematical issues that can be effectively resolved using quantum algorithms, especially Shor's algorithm. Post-Quantum Cryptography (PQC) has emerged as a viable way to mitigate this issue
Quantum Entropy-Based Encryption for Securing Communication Devices in TNI AU Space Units Kencana, Lisdi Inu; H.A Danang Rimbawa; Bisyron Wahyudi
Jurnal Komputer, Informasi dan Teknologi Vol. 4 No. 2 (2024): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v4i2.2091

Abstract

The rising threat of cyber-attacks demands advanced encryption technologies to ensure secure communication. This study evaluates the performance and security of the Quantum Shieldz Cipher integrated with Quantum Entropy-Based Encryption (QEBE) to address the limitations of conventional encryption methods. The main objective is to test the system's ability to generate unpredictable encryption keys, detect interception attempts, and resist quantum-based cyber threats. Experiments were conducted under various operational scenarios, including standard conditions, high interference, and high bandwidth environments, with a focus on its implementation for strategic communication in the Indonesian Air Force (TNI AU).The results show that QEBE effectively generates highly secure encryption keys using the Quantum Random Number Generator (QRNG), significantly reducing the risk of brute-force attacks. The system successfully detects interception by identifying changes in qubit states during data transmission. The implementation within TNI AU demonstrates its effectiveness in securing critical communication systems that require robust protection. However, the system relies heavily on stable network infrastructure with high bandwidth to maintain optimal performance. Compared to conventional methods, QEBE provides superior security and resistance to quantum-based attacks, albeit with a slight trade-off in processing speed. In conclusion, the Quantum Shieldz Cipher integrated with QEBE shows significant potential for enhancing secure communication systems, particularly in critical operations within TNI AU. This technology is a promising solution to safeguard against evolving cyber threats and quantum-based attacks.

Page 2 of 3 | Total Record : 25