cover
Contact Name
Siti Aminah
Contact Email
sitiaminah@stiki.ac.id
Phone
+62341-560823
Journal Mail Official
jurnal@stiki.ac.id
Editorial Address
Jl. Raya Tidar 100 Malang 65146
Location
Kota malang,
Jawa timur
INDONESIA
J-Intech (Journal of Information and Technology)
ISSN : 23031425     EISSN : 2580720X     DOI : https://doi.org/10.32664/j-intech
J-INTECH merupakan jurnal yang diterbitkan oleh Lembaga Penelitian & Pengabdian kepada Masyarakat (LPPM), Sekolah Tinggi Informatika dan Komputer Indonesia Malang. Ruang lingkup jurnal ini pada bidang Teknik Informatika, Sistem Informatika, dan Manajemen Informatika. Tujuannya guna mengakomodasi kebutuhan akan perkembangan Teknologi Informasi. J-Intech terbit setahun dua kali, yaitu Juni dan Desember.
Articles 288 Documents
Halaman Awal J-Intech Volume 10 No 2 Desember 2022 Aminah, Siti
J-INTECH (Journal of Information and Technology) Vol 10 No 2 (2022): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v10i2.812

Abstract

Halaman awal
Halaman Awal Volume 9 No 1 Desember 2021 Aminah, Siti
J-INTECH (Journal of Information and Technology) Vol 9 No 01 (2021): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v9i01.827

Abstract

Home page Volume 9 No 1 Desember 2021
Halaman Awal J-Intech Volume 8 No 2 Desember 2020 Aminah, Siti
J-INTECH (Journal of Information and Technology) Vol 8 No 02 (2020): Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Halaman awal J-Intech Volume 8 No 2
Pengujian Fungsionalitas dan Kualitas Website Wisata Kotawaringin Timur Menggunakan Metode Black Box dan Standar ISO Minarni, Minarni; Sigit, Sigit
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.820

Abstract

This study aims to test the functionality and quality of the East Kotawaringin tourism website recommendation application using the black box method and ISO standards. Testing and implementation of this tourism website was also carried out using the Likert Scale as a survey instrument to determine the level of satisfaction of respondents. The respondents to this study included the Kotim Kominfo Service, the Kotim Culture and Tourism Office, university students, and the general public of East Kotawaringin. The East Kotawaringin Office of Communication and Information (Kominfo) is responsible for managing the hosting and domain of this tourism website, while the East Kotawaringin Culture and Tourism Office is the user and manager of the website. Therefore, this website really needs to be tested for functionality and quality for optimal use of the website as a provider of information for the public and tourists. Factors tested include functionality, usability, efficiency and portability. The results of testing this website show that travel websites have good results in terms of functionality, usability, efficiency and portability. However, there are still deficiencies in terms of security or security in the functional section.
Prototipe Perancangan Sistem Kendali Jarak Jauh Pada Traktor Roda 2 Menggunakan Arduino E, Poerbaningtyas; Pranata, Candra Hadi
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.828

Abstract

Seeing the conditions in this modern era, many farmers use the help of tools to work on land management, namely the two-wheeled tractor with the quick brand dragonfly model, where this tool has several advantages and disadvantages. An example of the advantages of the quick brand dragonfly model tool is that it has a minimalist design and an affordable price. While the weakness of the tractor tool is that the dragonfly model tractor tool with the Quick brand is still conventional or manual. In order to overcome the use of manual dragonfly model tractors, an idea arose to make a remote control device for a 2-wheeled tractor using Arduino. Where this tractor is equipped with several additional sensors such as ultrasonic sensors as obstacle detection, temperature sensors, potentiometers as position sensors and data storage modules. These sensors are controlled by the Arduino Uno ATmega 328p Microcontroller. Based on the tests that have been carried out, the use of the tractor control device is able to speed up and simplify the tillage process with the right results. The purpose of this research is to get performance effectiveness on the use of 2-wheeled tractors in cultivating agricultural land.
Penerapan Metode Single Exponential Smoothing Pada Peramalan Penjualan Di UD. Kaya Rasa Berbasis Web Prasetyo, Hafedo Rakhmad; Eka Purwiantono, Febry
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.832

Abstract

This research was conducted to help forecast the sales of cakes and foods at UD. Kaya Rasa, which fluctuates and experiences varying sales volumes in each sales period. Based on the aforementioned problem, a system is needed to forecast the sales of cakes and foods, namely Single Exponential Smoothing (SES). This research uses the SDLC Waterfall model for system development, while the application will be web-based using the CodeIgniter framework. Black box testing is conducted for system testing. The result of this research is a web-based forecasting application that can predict the sales of cakes and food in the next period based on actual sales data from the previous period. As a result, UD. Kaya Rasa can accurately estimate sales and sales profits for the next period using the SES formula.
Pemanfaatan Deep Convolutional Auto-encoder untuk Mitigasi Serangan Adversarial Attack pada Citra Digital Kurniawan S, Putu Widiarsa; Kristian, Yosi; Santoso, Joan
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.845

Abstract

Adversarial attacks on digital images pose a serious threat to the utilization of machine learning technology in various real-life applications. The Fast Gradient Sign Method (FGSM) technique has proven to be effective in conducting attacks on machine learning models, including digital images found in the ImageNet dataset. This research aims to address this issue by utilizing the Deep Convolutional Auto-encoder (AE) technique as a method for mitigating adversarial attacks on digital images.The results of the study demonstrate that FGSM attacks can be performed on the majority of digital images, although there are certain images that are more resilient to such attacks. Furthermore, the AE mitigation technique proves to be effective in reducing the impact of adversarial attacks on most digital images. The accuracy of the attack and mitigation models is measured at 14.58% and 91.67%, respectively.
Klasterisasi Komentar Cyberbullying Masyarakat di Instagram berdasarkan K-Means Clustering Ramadhan, Viry Puspaning; Namung, Giasinta Mareskoti
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.846

Abstract

Cyberbullying has become a serious problem on social media platforms like Instagram. In an effort to overcome this problem, this study aims to classify cyberbullying comments made by Instagram users. The method used in this study is K-Means Clustering, which is a grouping technique commonly used in data analysis. The comment data collected from Instagram is then analyzed using the K-Means Clustering algorithm to identify patterns and groups of similar comments. The findings from this study can provide a better understanding of the types and characteristics of cyberbullying comments that often appear on Instagram. By knowing groups of similar comments, prevention and response measures can be designed more effectively. In addition, the results of clustering can also help in the development of automatic detection algorithms to identify cyberbullying comments on social media platforms. Based on the evaluation carried out on the clustering results with a silhouette score = 0.690152, namely in cluster C1, which is a negative cluster. So, the most dominant cyberbullying comments are negative comments.
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web Sijabat, Daniel Rudiaman; Evo, Stevanus
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.860

Abstract

In an increasingly complex digital era, websites are the main target for attacks by irresponsible parties. Therefore, a system is needed that can monitor, analyze, and provide early warning against suspicious activity or attacks that occur on websites. For this reason, this research analyzes and designs a Security Information and Event Management (SIEM) system that can be used to detect incidents of attacks on websites. The SIEM built in this study uses an Elastic Stack which will be used to analyze, monitor, detect, and store event information or security logs for each connected agent. To simulate testing types of attacks on websites such as the OWASP TOP 10 2017, several vulnerable web applications are used, namely DVWA, XVWA, and MUTILLIDAE. Tests on the SIEM system that was created showed that the system was able to detect the types of attacks on websites as mentioned in the OWASP TOP 10 2017.
Sistem Informasi Pemesanan Menu Kafe Menggunakan QR-Code Widodo, Andrian Eko; Wati, Fanny Fatma; Widayanto, Aprih
J-INTECH (Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.865

Abstract

During this pandemic, to reduce the spread of COVID-19, it is necessary to implement health protocols in community activities, including in the culinary business. By utilizing the QR-Code the cafe owner can realize the use of a digital menu that can be accessed from a cafe visitor's smart device. The use of digital menu lists is intended to prevent Covid-19 transmission through manual lists or menu books, which are usually used interchangeably by many visitors. By scanning the QR-Code placed on the cafe table, visitors can select a menu and place an order by minimizing contact with manual menu lists and cafe employees. Through this application, cafe owners can also manage sales at their cafes, including sales statistics, receipt printing, menu updates, etc.