cover
Contact Name
Vany Terisia
Contact Email
vterisia@gmail.com
Phone
+628116688687
Journal Mail Official
vterisia@gmail.com
Editorial Address
Jl. Ir. H. Juanda No. 77, Cirendeu, Tangerang Selatan, Provinsi Banten, 15419
Location
Kota tangerang selatan,
Banten
INDONESIA
Jutech: Jurnal Teknologi Informasi
ISSN : 27974111     EISSN : 27974111     DOI : 1032546
Core Subject : Science,
Rekayasa Perangkat Lunak; Sistem Informasi; Jaringan dan Keamanan Komputer; Pengolahan Citra; Sistem Pendukung Keputusan (SPK); Sistem Pakar; Kecerdasan Buatan; Aplikasi Mobile; Perancangan web; Basis data; dan banyak lagi topik-topik lain terkait bidang teknologi informasi.
Articles 52 Documents
Sistem Keamanan Berlapis Menggunakan Metode Access Control List Dan Enkripsi Source Code Pada Web Login Kamarudin, Kamarudin; Gazali, Mukhaimy
Jurnal Teknologi Informasi (JUTECH) Vol 2 No 2 (2021): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v2i2.1657

Abstract

Web documents are the most important assets for organizations to represent reports managed by servers. Meanwhile, the form is the entrance for the input provided by the user to be able to take advantage of server resources, be it a database, or other features that are owned by the server. This research focuses on the security of the web login form which is the entry point for various users. The level of authority (authorization) of users is set based on the Access Control List (ACL) which is arranged in such a way by the administrator. Multi-layered security goes through several stages that must be passed by the user, from validation, verification, authentication to authorizing according to the rights given to him by the administrator. The results found provide more value for web developers to set a standard security system for the web login form they build. However, various other security opportunities may be found in subsequent research, as developments
Digitalisasi Alat Ukur Ph Air Pada Budi Daya Ikan Air Tawar Gumelar, Tommy; Bakti, Indra
Jurnal Teknologi Informasi (JUTECH) Vol 2 No 2 (2021): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v2i2.1658

Abstract

The high market demand for freshwater fish needs, because it has become a daily commodity for Indonesian people from upper economic circles or low incomes, the need for freshwater fish is very high. The delicious taste of meat and the vitamins contained in freshwater fish are very good for the human body, therefore aquatic fish cultivators are developing to meet market needs. Various efforts were made to meet the market demand for freshwater fish, starting from increasing the number of ponds, improving fish feed to meet protein needs and paying attention to the pH of freshwater ponds. The use of digitalization of freshwater pH measurements is applied to facilitate control of the tolerance level of freshwater fish.
Perancangan Aplikasi Data Mining Menggunakan Association Rule Dengan Metode Algoritma Apriori Untuk Analisis Market Basket (Studi Kasus Pada Tesco Swalayan) Arman, Shevti Arbekti; Terisia, Vany; Toha, Muhamad
Jurnal Teknologi Informasi (JUTECH) Vol 2 No 2 (2021): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v2i2.1659

Abstract

The data contained ranging from business transactions to government is very large in size so we need a system that can sort and select the data. Intense competition in the business world, especially in the food industry or supermarkets, requires developers to find strategies that can increase sales. Data mining is used to find patterns and regularities in data sets that are hidden by using technology. In knowing the products purchased by consumers, developers can use market basket analysis, namely an analysis of consumer buying habits and then detect products that consumers often buy simultaneously using association rules. Search for associations or relationships between items taken from a relational database using an a priori algorithm to form candidate item combinations and then tested whether the combination meets the minimum support and confidence parameters which are the threshold values ​​given by the user. Furthermore, it is applied by performing query processing, decision making and so on. Data mining applications with the association rule method have been able to perform calculations correctly as expected. The knowledge generated by the application and manual calculations is 17.2% of all transactions, granulated sugar and pomegranate cooking oil are purchased simultaneously. And of all transactions that buy granulated sugar, 55.5% will buy Pomegranate Cooking Oil. 17.2% of all transactions, Pomegranate Cooking Oil and Granulated Sugar are purchased simultaneously. And of all transactions that buy Pomegranate Cooking Oil, 55.5% will buy granulated sugar.
Decision Tree Menggunakan Algoritma C4.5 Untuk Analisa Kelayakan Pemberian Kredit Yusuf, Diana; Bahri, Saeful; Larasati, Anggita
Jurnal Teknologi Informasi (JUTECH) Vol 2 No 2 (2021): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v2i2.1660

Abstract

Data mining is a new technology that has been successfully applied in many fields. Many problems are solved by data mining algorithms as a supporter. Classification is one of the methods contained in data mining and not a few researchers who use the classification methods in solving problems. Credit analysis will be done with the digging data against existing data customer credits based on atribute with data mining algorithm. The algorithm C4.5 is itself a group of decision tree algorithm. This algorithm has input in the form of training and samples. Data mining technique used to classify loans with algorithm C4.5. Analysis and processing of data use applied tools of RapidMiner.
Implementasi Teknik Clustering Berbasis Validasi Cluster Pada Data Stunting Oktavianto, Hardian; Fitriyah, Nur Qodariyah
Jurnal Teknologi Informasi (JUTECH) Vol 2 No 2 (2021): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v2i2.1778

Abstract

Kecenderungan prevalensi status gizi balita di Jawa Timur mengalami penurunan dari tahun 2010 hingga tahun 2015. Sementara itu, menurut data Kementerian Kesehatan Republik Indonesia, persentase balita pendek di Jawa Timur pada tahun 2015 adalah sebesar 27,1%. Persentase tersebut menempatkan Provinsi Jawa Timur menjadi wilayah dengan persentase balita pendek tertinggi di Pulau Jawa. Data mining adalah penambangan yang mencirikan proses dalam menemukan informasi berharga dalam sekumpulan data yang sangat besar. Clustering merupakan salah satu cara untuk menganalisis data melalui pengelompokan objek data yang mirip satu sama lain dalam cluster yang sama dan berbeda dengan objek di cluster lain, sehingga setiap objek yang menjadi anggota cluster yang sama akan memiliki karakteristik yang lebih mirip satu sama lain dibandingkan dengan objek dari cluster berbeda. Salah satu metode clustering yang banyak digunakan adalah K-Means, yaitu metode clustering yang termasuk ke dalam jenis non-hierarchical. Penelitian ini melakukan pengelompokan kabupaten di provinsi Jawa Timur berdasarkan faktor – faktor yang mempengaruhi stunting melalui teknik data mining yaitu clustering yang secara khusus menerapkan algoritma K-Means dengan validasi cluster. Hasil dari penelitian ini adalah, bahwa dengan dataset yang ada, dan dengan menerapkan validasi cluster, maka diperoleh jumlah cluster optimal adalah sejumlah 10 cluster. Terdapat beberapa cluster yang hanya mempunyai 1 anggota, yaitu pada cluster 2, 4, dan 9, sedangkan anggota cluster terbanyak adalah pada cluster kelompok 7 yang mempunyai 11 anggota.
Klasifikasi Pneumonia Chest X-Ray Dengan Arsitektur Inceptionresnet-V2 Bakti, Indra
Jurnal Teknologi Informasi (JUTECH) Vol 3 No 2 (2022): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v3i2.2030

Abstract

In the last century, the use utilization of machine learning, especially the Convolution Neural Network (CNN)has helped the world of health (medicine). Through action research on image datasets, CNN was successful and able to show classification or grouping based on the same characteristics and properties on unlabeled images with higher accuracy and faster than other machine learning methods. This study aims to optimize two CNN architectures (Inception Res Net-V2, and Mobile Net-V2) to classify Covid-19 disease, by training 4000 Chest x-ray image datasets. The accuracy test results from InceptionResNet- V2 yield 98%, and MobileNet-V2 yield 93%. with the precision of each class of the CNN Inception Rest Net-V2 architecture is Covid (99%), Lung Opacity (97%), Normal (99%), Viral_Pneumonia (99%).
Implementasi IT Project Management Dalam Pembuatan Sistem Informasi Monitoring Pagu Dan Anggaran (Simpora) Firdaus, Mohamad
Jurnal Teknologi Informasi (JUTECH) Vol 3 No 2 (2022): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v3i2.2031

Abstract

SIMPORA according to the Head of Tanjung pandan Customs office Jerry Kurniawan SE, ME stands for (Sistem Informasi Monitoring Pagu dan Anggaran) Ceiling and Budget Monitoring Information System. In making the application using a Project Management approach. Project management is a scientific discipline in terms of planning, organizing, managing, to be able to achieve project goals. More specifically, the Project Management used is SDLC (Software Development Life Cycle with the waterfall method. while project scheduling uses Gantt Chart with the CPM Method (Critical Path Method) as a reminder of the critical time in the project so that it can be a concern for stakeholders in overseeing the course of the project.
Sistem Pakar Mendiagnosa Penyakit Gigi Anak Usia Satu Sampai Lima Tahun Menggunakan Metode Certainty Factor Razi, Fahrul
Jurnal Teknologi Informasi (JUTECH) Vol 3 No 2 (2022): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v3i2.2032

Abstract

Teeth are one of the most important organs as a digestive tool for the human body. Therefore the teeth must be treated as well as possible. If no treatment is taken, the disease will cause the teeth to become infected. Dental diseases in one-to-five-year-olds most often seen are dental caries and gingivitis. Dental Caries can also be called cavities. While Gingivitis is a disease of tartar and gum inflammation. Expert System is an information system that contains the knowledge of an expert so that it can be used for consultation. In the expert system there are several methods, one of which is Certainty Factor. Cerainty Factor is one technique used to overcome uncertainty in decision making.
Implementasi Arsitektur Firewall Sebagai Sistem Keamanan Jaringan Wifi 802.11ax Aruba Software Defined Wan (SD-Wan) Syamsu, Muhajir; Widodo, Widodo
Jurnal Teknologi Informasi (JUTECH) Vol 3 No 2 (2022): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v3i2.2033

Abstract

The concept of WLAN technology continues to evolve so as to be able to keep up with the increasing number of user densities, schemes with density Access Point (AP) and User Stations (STA), IEEE 802.11 creates an IEEE 802.11ax (TGax) to develop a set of physical layer specifications (PHY) and Media Access New Control (MAC). IEEE 802.11ax is called a high efficiency WLAN (HE). currently in the concept of its application in the implementation of the firewall architecture on the 802.11ax WIFI network security system. This study aims to determine the concept of an 802.11ax Wifi network security system architecture developed by Aruba with the latest Access Point system that is able to support the latest Wi-Fi standards and is a wireless Access Point product that may be the first to get Wi-Fi Alliance (WFA) certification in Indonesia. the field of the latest WPA3 and Enhanced Open security system standards, and can provide much stronger encryption services and have simpler IoT security configuration settings. This research uses the literature method where the researcher collects data - information data related to the subject of the research conducted by the researcher. As well as using the data analysis technique used is using content analysis in the form of written documentation and organizing data into categories, describing it into units, what is meant by data analysis techniques. The results of this study.
Mengiplementasikan Vector Space Model Similarity Euclidean Distance Menggunakan TFIDF Pada Klasifikasi Teks Bahasa Indonesia Fitriansyah, Reza; Sestri, Ellya; Terisia, Vany
Jurnal Teknologi Informasi (JUTECH) Vol 3 No 2 (2022): JUTECH: Jurnal Teknologi Informasi
Publisher : ITB Ahmad Dahlan Jakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32546/jutech.v3i2.2034

Abstract

Weighting based on the term with stemming techniques to get the basic word form term in question. This will the application of the Indonesian language text classification machine using the K-Nearest Neighbor algorithm and the Vector Space Model method on the TFIDF frequency weighting of the number of words and the Euclidean Distance function. comparison between the test documents and the test sample collection Using news documents as learning documents, a total of 10 (10) documents with 3 (three) categories, produces an Precision and Recall 90.00% for k = 5 using frequency weighting in words with the Euclidean Distance function.