cover
Contact Name
Syaiful Bahri
Contact Email
syaifulpb11@gmail.com
Phone
+6281263823278
Journal Mail Official
jurnalintekom@gmail.com
Editorial Address
Dusun Suka Mulia Desa Karang Rejo, Kecamatan Stabat, Kabupaten Langkat
Location
Unknown,
Unknown
INDONESIA
Indonesian Journal of Education And Computer Science
ISSN : 29877644     EISSN : 29872650     DOI : https://doi.org/10.60076/indotech
Core Subject : Science, Education,
INDOTECH : Indonesian Journal of Education And Computer Science adalah jurnal nasional dalam bahasa indonesia dengan frekuensi terbitan sebanyak 3 (tiga) kali dalam setahun. Jurnal ini bertujuan untuk mempublikasikan hasil penelitian terbaik anda agar bisa dibaca oleh banyak orang. Jurnal INDOTECH hanya menerbitkan artikel dengan tema komputer. Ruang lingkup publikasi ini meliputi : Teori Komputasi (Computational Theory, Arsitektur dan Organisasi Komputer (Computer Architecture and Organization), Sistem Operasi (Operating Systems), Jaringan Komputer (Computer Networks), Basis Data (Database Systems), Keamanan Komputer (Computer Security), Grafika Komputer (Computer Graphics), Kecerdasan Buatan (Artificial Intelligence), Pemrosesan Bahasa Alami (Natural Language Processing), Pemrograman (Programming), Sistem Informasi (Information Systems), Ilmu Data (Data Science), Pengembangan Perangkat Lunak (Software Development), Komputasi Awan (Cloud Computing), Komputasi Kuantum (Quantum Computing)
Articles 8 Documents
Search results for , issue "Vol. 1 No. 3 (2023): INDOTECH - December 2023" : 8 Documents clear
Analisis Data Mining Untuk Klasterisasi Data Rekam Medis Menggunakan Algoritma K-Means Pada Rumah Sakit Sylvani Binjai Nanda, Wahyu Surya; Akim M.H. Pardede; Magdalena Simanjuntak
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i2.43

Abstract

Medical record is a record of the history of patients who take treatment in hospitals or clinics. RSU Sylvani has many patients, every month and makes patient history data accumulate in the medical record data, but there is no follow-up benefit from the available data. Even though these data have great potential to provide new information and valuable insights if explored with data mining using the k-means clustering method. The amount of data that was tested was 893 data and produced 4 groups from the variables of disease diagnosis, gender and address. Where group 1 totaled 268 data with a diagnosis center for hypertension and female gender at the Pepper Garden address. Group 2 totaled 289 data with a diagnosis center for Asthma and female gender at the Hero's address. Group 3 totaled 185 data with GERD disease diagnosis center and male gender at Kebun Pepper address. group 4 totaling 151 data with a diagnosis center for Prostate Enlargement disease and male sex at Kebun Pepper address.
Hybrid Sistem Algoritma Rivest Shamir Adleman (RSA) dan Algoritma Blum Blum Shub (BBS) dalam Mengamankan File Database E-Absensi Surbakti, Tania Br; Fauzi, Achmad; Khair, Husnul
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i2.59

Abstract

The E-Attendance System has become an efficient solution in monitoring individual attendance at various institutions. However, new challenges arise regarding data security and privacy in managing E-Attendance database files. Facing potential risks such as hacking and data leaks, data security becomes very important. Therefore, in this study, we propose the implementation of a hybrid system that combines the strengths of the Rivest Shamir Adleman (RSA) Algorithm and the Blum Blum Shub (BBS) Algorithm to improve the security of the E-Absence database file. RSA is a cryptographic algorithm that is widely used for encryption and digital signatures. On the other hand, BBS is a random number generation algorithm that has a strong level of security. The combination of the two in the form of a hybrid system is expected to provide a higher level of security in securing E-Absence data. The aim of this research is to develop a hybrid RSA and BBS system in the context of securing E-Attendance database files. This research outlines the basic concepts of the two algorithms and how they can be integrated. The results of this study are the combination of the Rivers, Shamir, Adleman (RSA) algorithm and the Blum Blum Shub (BBS) algorithm in a hybrid system to increase security in the process of encoding messages
Rancang Bangun Lengan Robot Mikrokontroller Dengan Kendali Smartphone Berbasis Internet of Things Alifiah, Umar; Buatin, Relita; Lumbanbatu, Katen
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i2.60

Abstract

This research discusses the design and implementation of a robot arm that is controlled via smartphone using the Internet of Things (IoT) concept. This robotic arm is controlled using a microcontroller connected to the internet. The aim of this research is to develop a system that allows users to easily control the movement of the robot arm via a specially designed smartphone application. At the design stage, the microcontroller is programmed to control the motors that drive the robotic arm joints. Communication between the smartphone and the robot arm is implemented via a network communication protocol, so the user can give commands via an intuitive application interface. The use of IoT technology allows this robot arm to be controlled remotely via the internet, opening opportunities for use in various contexts, such as use in production, education or even entertainment environments. Test results show that the robotic arm can automatically carry out repetitive tasks with a high level of accuracy. This advantage can increase productivity in the production process and reduce the potential for human error. In addition, robots can operate in environments that are potentially dangerous to humans, such as toxic, radioactive or extreme temperature (hot or cold) areas. This capability effectively reduces the risk of human exposure to these potential hazards
Perancangan Lampu Pintar Berbasis Internet Of Things (IoT) Menggunakan Nodemcu Dan Blynk Sirait, Fahmi Aulia; Akim M. H. Pardede; Milli Alfhi Syari
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i2.61

Abstract

This study focuses on the design of a smart lamp adopting the Internet of Things (IoT) concept using NodeMCU and the Blynk platform. This smart lamp is designed to provide users with more flexible and convenient control through the use of the internet network. NodeMCU, a development module based on the ESP8266 microcontroller, is employed as the core of the smart lamp to connect it to the Wi-Fi network. In the design phase, the smart lamp system is implemented with the capability to be controlled through the Blynk application downloadable to the user's smartphone device. Users can control the lamp, adjust its brightness, and change the light color according to preferences through the intuitive Blynk interface. Integration with the Blynk platform allows remote access and real-time monitoring of the smart lamp's status.The test results demonstrate that the designed smart lamp can effectively communicate with the Blynk application through the Wi-Fi network. The responsive control functionality and the ability to adjust light colors and brightness provide a satisfying user experience. By combining IoT technology and the Blynk platform, this study produces a tangible example of a smart lamp implementation that enhances the convenience and comfort of managing room lighting
Pengembangan User Interface Dan User Experience Aplikasi BNI Mobile Banking Menggunakan Metode User Centered Design (Studi Kasus Aplikasi Bni Mobile Banking) Hedi Yusuf
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i3.230

Abstract

As one of the biggest banking companies in Indonesia, Bank Negara Indonesia (BNI) needs to innovate and face the new challenges of the digital era revolution. Mobile banking apps is a crucial component that is currently needed by and being used by most citizen in this era. To become a competitive banking app, many aspects need to be considered and continuously improved; one of them being the comfort and convenience of users in using the application through user interface and user experience (UI/UX) research and development. Unfortunately, users still experience issues and complaints while using this app that can be found in the Google Play Store and Apple App Store review columns. Data taken using the System Usability Scale (SUS) questionnaire in the current application condition also showed poor results. This research focuses on improving the usability of the application and answering user complaints through interface redesign on the features most used by users using the User Centered Design (UCD) approach. The redesigned results will then be tested using the usability testing method and successfully obtained a positive score of 94. The SUS score also significantly went up from 54 to 90.5. Therefore, this research can be concluded as successful with positive results and went according to plan
Keefektifan Metode Proteksi Data dalam Mengatasi Ancaman Cybersecurity Arfan Dwi Madya; Bagas Djoko Haryanto; Devi Putri Ningsih; Fried Sinlae
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i3.236

Abstract

Information security has become a primary concern in the current digital era, where the threat of cyber attacks is on the rise. This article discusses the significant growth of internet users and its impact on the increasing incidence of cyber attacks, with a focus on the situation in Indonesia. Data indicates a drastic surge in cyber attacks in Indonesia, reaching approximately 190 million attempts in 2020. Recognizing the importance of a national cyber security strategy, this research aims to evaluate the effectiveness of data protection methods in addressing cybersecurity threats. The research methodology employs a qualitative descriptive approach to explore and understand the effectiveness of data protection methods. Data analysis is conducted holistically to comprehend the context and dynamics influencing the success of data protection methods in facing cybersecurity threats. The research findings emphasize the crucial role of cyber security in safeguarding data, privacy, and the smooth operation of services. Cyber threats encompass various types, including physical, logical, and operational threats. Human factors also pose a serious threat, including user errors and social engineering techniques. Data protection is identified as a key strategy in tackling cybersecurity threats. Measures such as malware detection, defense against DoS and phishing attacks, database security, data encryption, monitoring and response to attacks, as well as education and training, are highlighted as primary focuses for the banking sector
Perancangan Keamanan Jaringan Untuk Mencegah Terjadinya Serangan Bruteforce Pada Router Bahri, Syaiful
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i3.239

Abstract

The development of information technology demands the need for effective network security design to protect communications infrastructure, especially routers, from brute force attacks. Brute force attacks are a method commonly used by attackers to try password combinations repeatedly until they successfully enter the system. This research aims to design a network security solution that can prevent routers from being exposed to brute force attacks. This research combines technical and conceptual approaches to identify potential vulnerabilities in routers and develop security strategies that can overcome these challenges. Security methods include implementing strong password policies, real-time attack detection, and improving response to suspicious access attempts. By implementing this security solution, it is hoped that it can increase the level of network security, reduce the risk of brute force attacks, and protect data and services that pass through routers. The results of research using Mikrotik RouterOs show that RouterOs is able to defend against bruteforce attacks. The attack that was attempted was successfully blocked by RouterOs
Analisis User Experience Menggunakan HEART Framework dan Importance Performance Analysis (Studi Pada TikTok Shop) Salma Luthfiyah Yulvi; Mery Citra Sondari
Indonesian Journal of Education And Computer Science Vol. 1 No. 3 (2023): INDOTECH - December 2023
Publisher : PT. INOVASI TEKNOLOGI KOMPUTER

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.60076/indotech.v1i3.245

Abstract

This research aims to describe the experiences of TikTok Shop users using two interrelated methods. This research uses a quantitative approach to measure user experience with TikTok Shop. Primary data was collected through an online questionnaire filled in by 257 respondents. The results of measuring user experience using HEART are measured through five variables, namely happiness, engagement, adoption, retention, task success. Based on these measurements, a criterion value for the level of usefulness is produced for each variable. Of the five variables, four are included in the very high criteria because they get a Level of Usability (LoU) value of >80% and one variable is included in the high criteria. It can be interpreted that the level of usability of TikTok Shop is good and following user preferences. Based on the results of the analysis, it is known that using the second method, namely performance importance analysis, that two variables required further feature development, namely happiness and engagement. Indicators that TikTok Shop needs to pay further attention to are simplicity and intensity. The TikTok Shop development team needs to pay attention to the statement of items in quadrant II because they need to continuously remember that they have a good level of importance and performance

Page 1 of 1 | Total Record : 8