cover
Contact Name
Imam Asrowardi
Contact Email
imam@polinela.ac.id
Phone
+6281369739001
Journal Mail Official
routers@polinela.ac.id
Editorial Address
Jl. Sukarno Hatta No. 10 Bandar Lampung
Location
Kota bandar lampung,
Lampung
INDONESIA
ROUTERS: Jurnal Sistem dan Teknologi Informasi
ISSN : -     EISSN : 29621224     DOI : https://doi.org/10.25181
ROUTERS: Jurnal Sistem dan Teknologi Informasi includes research in the field of Computer Science, Computer Networks and Engineering, Software Engineering and Information Systems, and Information Security. Editors invite research lecturers, reviewers, practitioners, industry, and observers to contribute to this journal. ROUTERS is a national scientific journal that is open to seeking innovation, creativity, and novelty. Either letters, research notes, articles, supplemental articles, or review articles. ROUTERS aims to achieve state-of-the-art theory and application in this field. ROUTERS provides a platform for scientists and academics across Indonesia to promote, share, and discuss new issues and the development of systems and information technology.
Articles 34 Documents
Autentikasi User Dengan Metode Single Sign-On Berbasis Windows Active Directory Pada PT. XYZ Kemas, Kemas Ocha Khairi Saputra; Supriyatna, Agiska Ria; Putra, Septafiansyah Dwi
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3328

Abstract

To connect to the company network, a WPA2-PSK-based security system is in place, requiring users to input the company Wi-Fi password. One of the issues that arises is the difficulty in identifying the status of users attempting to access the network. Apart from security concerns regarding the network, the use of this security key allows non-employees to connect to the network using personal devices. As a solution to enhance the existing authentication system, security systems like RADIUS can be utilized. This system operates to mitigate threats to the network security. The process undertaken through the implementation of this NDLC method commences with identifying and designing network security authentication, progressing through the implementation phase until the design can be regularly utilized. With the introduction of a user authentication system employing a single sign-on method based on Windows Active Directory at XYZ Inc., users will find it easier to connect to the wireless network. With WPA2-Enterprise, access to the network will be restricted.
Pengukuran Kinerja Pada Aplikasi Video Pembelajaran UMKM Berbasis Web Dengan Metode Pengujian Beban Sentosa, Sucitra Aan; Subyantoro, Eko; Asrowardi, Imam
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3407

Abstract

In the digital era, the use of websites has become crucial for business development, including the SMEs learning application based on video developed by Siger Innovation Hub. Before the application can be widely used, it is important to conduct comprehensive testing to ensure a fast and stable response. This article measures website loading speed through performance testing. This testing identifies issues early on, providing information for improvements and enhancements before implementing the application on a larger scale. The chosen method is load testing, with the research phases following the Software Testing Life Cycle (STLC). The results obtained from the performance testing using the load testing method indicate that the website is capable of meeting the target response time (response time < 3000ms), achieving a peak throughput of 18/seconds, and having a maximum error rate of 0.50%. In conclusion, the website for the SMEs learning application with video media can operate optimally when tested with 1 to 100 users.
Analisis terhadap Enkripsi Data SSL di MySQL: Menguji Keamanan In-Transit Haikal, Antoni; Putra, Septafiansyah Dwi; Nelmiawati, Nelmiawati
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3446

Abstract

Data transmission security has become a pivotal point in database management, especially in response to the evolving cyber threats. This study examines a critical aspect of data security: the in-transit data encryption using Secure Sockets Layer (SSL) within MySQL. The main focus of the research is on testing data encryption by employing Wireshark, a network analysis tool capable of capturing and displaying transmitted data packets. The testing process consisted of two scenarios: first, data transmission with SSL enabled on the MySQL server; second, data transmission without the use of SSL. The results show a significant contrast between the two scenarios. With SSL, the data packets intercepted by Wireshark appeared unreadable, indicating that encryption was successful in preventing data content exposure. Conversely, without SSL, the data packets could be read as plain text, demonstrating a lack of encryption and a high security risk. This research delves only into the aspect of in-transit data encryption security in MySQL and does not explore the implications related to SSL performance or configuration further. This analysis offers a useful perspective for database administrators in efforts to enhance data security, identifying SSL as a crucial tool to ensure the security of in-transit data.
Manajemen Proyek Sistem Informasi Inventaris Pada Toko Apotek Refi, Novtra; Yahfizham, Yahfizham
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3582

Abstract

This research aims to improve the efficiency of warehouse management and sales in pharmacies through transparent and accurate administration. Pharmacies often face challenges in product management and monitoring expiration dates, so complete and accurate data is needed to record purchase and sale transactions. Currently, recording in pharmacies is often done manually, which takes a lot of time and increases the risk of errors and data loss. The research methodology used is qualitative, postpositivist oriented and carried out in a natural environment. This approach aims to understand the context and meaning of the phenomenon under study. Qualitative research is used to hear whether a procedure is right or wrong, as well as to assess the halalness of the process used. With this approach, researchers hope to identify weaknesses in pharmacy administration management and provide more efficient solutions. To overcome this problem, researchers propose implementing a system development process using a waterfall model. The stages in this model include requirements, system design analysis, coding, testing, and implementation. Requirements analysis will help identify the features needed by the pharmacy, while system design will design a solution that meets those needs. Coding will develop the proposed software, which will then be tested to ensure its functionality and security. Ultimately, implementation will ensure the system is implemented well in pharmacies. By implementing this structured and technology-based system, it is hoped that pharmacy management will become more efficient and successful. This system will help pharmacies manage stock, consolidate reach dates, and record transactions automatically and accurately, thereby reducing the risk of errors and increasing productivity. It is hoped that the results of this research can make a real contribution in solving administrative problems often faced by pharmacies.
Penerapan Teknik Cross-Validation untuk Menangani Overfitting pada Studi Kasus Implementasi Decision Tree untuk Prediksi Kanker Paru Faurika, Faurika; Naseh Khudori, Ahsanun; Haris, M. Syauqi
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 2 No. 2, Juli 2024
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v2i2.3631

Abstract

Lung cancer is a condition caused by cancer cells growing in the lungs. Lung cancer causes a weakened immune system, tumors, and other abnormalities that prevent the body from functioning properly. Lung cancer examination uses various technologies, namely CT Scan, X-ray, and others. However, the examination is relatively expensive and takes a long time. The use of machine learning makes it possible to support lung cancer diagnosis. With the large amount of medical data available today, machine learning can recognize patterns in the data so that it will help the process of diagnosing lung cancer more effectively. This study aims to correct overfitting in previous research which used the decision tree method to predict lung cancer with cross-validation techniques. In this research, we use a public dataset from Data World. This dataset consists of 25 data attributes and has 1000 data. The results of this research are rules obtained from decision trees which are then evaluated to produce 96.7% accuracy, 96.7% precision, 96.7% recall, and 96.7% f1-score. These results show that the decision tree method performs well in predicting lung cancer early and the cross-validation technique can overcome overfitting in decision trees with more general and stable results.
PERANCANGAN SISTEM MANAGEMENT E-APPROVAL BERBASIS WEB DI PT. ARWANA CITRAMULIA TBK MENGGUNAKAN REACTJS Priyanto, Sandra; Arfian, Muhamad Hadi; Anwar, Nizirwan
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.3411

Abstract

The process of creating invoices has been carried out by PT. Arwana Citramulia Tbk is currently causing delays in billing invoices to customers because it requires a long process and takes quite a long time to create invoices. Delays in billing invoices to customers will cause problems in terms of payment and repayment of purchases of products that have been sold, so that the company's receivables report will increase. The need for a Web-Based E-Approval Management System is to simplify the process of approval activities by the relevant departments for the Approval process of product invoices and to apply the paperless concept to these invoices with digital signatures. The methods used to carry out the design are Unified Modeling Language, Extreme Programming and Black-Box Testing. The results obtained show that this system can simplify the approval process for product sales invoices by division heads and managers so that signing product sales invoices can be digital and it will be easier to send invoices to customers
Prediksi Kelulusan Siswa dengan Algoritma Pembelajaran Mesin: Aplikasi Regresi Linear dan Logistik pada Faktor-Faktor Pendidikan Fenni Aprilia; Anggraini, Rasti Aulia; Putri, Yunita Dwi
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.3897

Abstract

The main challenge in education lies in accurately predicting student graduation and understanding the factors influencing it. This study aims to provide a data-driven solution using machine learning algorithms, specifically linear regression to predict student exam scores and logistic regression to classify student graduation. The study contributes by developing predictive models that serve as tools to support strategic decision-making in educational institutions. This study utilized the Student Performance Factors dataset, comprising 6,607 samples with independent variables such as study hours, attendance, and parental involvement. Data analysis involved cleaning, transformation, and normalization before applying regression models. The findings showed that linear regression achieved a Mean Squared Error (MSE) of 3.256, indicating high accuracy in predicting exam scores. Logistic regression demonstrated an accuracy of 99.85% in classifying student graduation. These models complement each other by offering strategic insights to enhance educational quality.
PEMBUATAN SISTEM DETEKSI HARDCODE KREDENSIAL PADA REPOSITORY Nababan, Bill Jeferson; Haikal, Antoni; Maulidya, Sity Rahmy
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.3898

Abstract

Hardcoded Credential is the practice of embedding authentication information, such as usernames and passwords, directly into the source code of software or applications. This means that the credential information is not stored separately or managed securely, but rather integrated into the program code. This practice poses significant security risks, one of which is the difficulty of changing credentials, making modifications to the source code impractical and increasing security risks. This research proposes a web-based Hardcoded Credential Detection System that can detect Hardcoded Credentials in the Repository on Github, by implementing security tools in the form of Trufflehog to the website, the system can see the results of Hardcoded Credential detection after the detection process is complete. By using the Prototyping method which is one approach in software development by following a series of stages that are carried out sequentially and completed one by one before entering the next stage. The technologies used include ReactJs as a library for making Front-end, ExpressJs as a Framework for making Back-end with Javascript as a Programming Language, and MYSQL as a database. The results of this system can help in maintaining the security of Github repositories by providing the use of tools that can identify potential leaks of sensitive credentials. Thus, developers and security teams can take action to remove or secure those accidental credentials.
Dampak Berita Emas Palsu Terhadap Harga Saham PT Aneka Tambang TBK (ANTM): Analisis dan Prediksi) Ispaniyah, Ispaniyah; Tyas, Putri Cahyaning; Suseno, Akrim Teguh; Wulandari, Umi Meganinditya
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.3969

Abstract

Fake news or hoaxes, have become a major problem around the world in recent years. This phenomenon not only affects public opinion but can also affect various aspects of socio-economic life, including financial markets. Currently, global stock prices continue to rise and have reached their highest level since 2012-2013. One of the leading mining companies in Indonesia, PT Aneka Tambang Tbk (ANTM), is not entirely dependent on its share price. The impact of fake news on stock prices has become a topic of growing interest in the academic literature. Various previous studies have attempted to identify the relationship between the spread of fake news and stock price fluctuations. Using the RapidMiner application, an analysis of PT ANTM's stock price prediction was conducted using Neural Network (NN) and Linear Regression (LR) algorithms. To assess the accuracy of the prediction, the analysis is performed using the Root Mean Square Error (RMSE) results. The comparative analysis conducted shows that the Neural Network algorithm has a lower error rate of 14,806 +/- 0.000 compared to the Linear Regression algorithm which has a value of 22,379 +/- 0.000. This shows that the Neural Network algorithm has higher accuracy in predicting the share price of PT ANTM. A smaller RMSE value indicates a more accurate prediction. In addition, this study also identified that the time span of the data used (December 19, 2023 - June 19, 2024) can affect the prediction results. Based on the conclusions, the researcher suggests that using a dataset with a longer time span and applying other Deep Learning algorithms to improve prediction accuracy can be used for future research.
Peningkatan Performa Analisis Sentimen Ulasan Pelanggan terhadap Layanan Pengiriman Menggunakan Model Naïve Bayes yang Dioptimalkan dengan PSO Yuda Septiawan; Aglasia, Adimas; Muktiawan, Danang Ade
ROUTERS: Jurnal Sistem dan Teknologi Informasi Vol. 3 No. 1, Februari 2025
Publisher : Program Studi Teknologi Rekayasa Internet, Politeknik Negeri Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25181/rt.v3i1.4001

Abstract

This research is motivated by the rapid growth of the delivery service industry and the importance of customer feedback in competition, especially for ID Express which has a mobile application. The main issue raised is how to analyse the sentiment of customer reviews on the ID Express app on the Google Play Store to improve service quality. User reviews, although rich in information, have not been optimally utilised, making it difficult for companies to understand user perceptions. In this study, we develop a new method to analyse the sentiment of ID Express app user reviews. This method integrates Naïve Bayes algorithm with Particle Swarm Optimisation (PSO)-based feature selection optimisation technique to produce more accurate analysis. The method used includes collecting user review data from the Google Play Store (2020-2023), preprocessing the data, implementing the Naïve Bayes algorithm, and applying PSO for feature selection. Model performance was tested with accuracy and F-measure metrics using 90:10 and 80:20 data sharing ratios. The results showed that the Naïve Bayes algorithm with PSO produced 52% accuracy at 90:10 ratio and 63% at 80:20 ratio, with F-measure values of 43% and 55% respectively. In conclusion, the use of PSO as feature selection improves the accuracy and F-measure of sentiment analysis using Naïve Bayes, especially at a data sharing ratio of 80:20.

Page 3 of 4 | Total Record : 34