cover
Contact Name
Johan Reimon Batmetan
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
danang@stekom.ac.id
Editorial Address
Jl. Majapahit No.304, Pedurungan Kidul, Kec. Pedurungan, Semarang, Provinsi Jawa Tengah, 52361
Location
Kota semarang,
Jawa tengah
INDONESIA
Journal of Technology Informatics and Engineering
ISSN : 29619068     EISSN : 29618215     DOI : 10.51903
Core Subject : Science,
Power Engineering Telecommunication Engineering Computer Engineering Control and Computer Systems Electronics Information technology Informatics Data and Software engineering Biomedical Engineering
Articles 161 Documents
Framework Of Information System Of IT Service Desk Using UML (Unified Modelling Language) Technique - Study Case In Republic Of Indonesia State Civil Service Agency Melyani Melyani; Ahmad Rafik; Roydawaty Roydawaty; Indra Riyana; Rizkiana Karmelia Shaura; Hendra Kurniawan; Rahayu Swastika
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i2.169

Abstract

At Republic of Indonesia State Civil Service Agency in carrying out work, it is often found that problems both software and hardware are installed in the computer and must be resolved immediately. However, the handling of problems is still not good, where in the process of reporting complaints and requests, you still have to go by telephone or come directly to the IT staff office to notify complaints, as well as in manual records that affect company performance. All recording reports and problem calculations are still manual. This can have a negative effect, namely: there are problems that are at risk of being recorded repeatedly, so it takes a long time to provide reports to managers. Therefore, the authors submit a helpdesk information system application to solve the problems of complaints and employee requests so that they can be resolved quickly and can be handled properly as well as recording reports that are well recorded. In developing this helpdesk information system, the author uses an object-oriented methodology, namely the iteration waterfall, which is modeled using UML (Unified Modeling Language). The tools used are XAMPP as a web server, PHP as a programming language and MySQL as a database. With this system, it is hoped that it can make it easier for employees to report complaints as well as get solutions to the problems they are complaining about and also make it easier for IT staff to automatically generate reports in the system.
Security Design In Doors And Windows Arduino Based Using Fingerprint And Sms Gateway (Case Study At Pesona Asri Tembalang Housing) Siska Setiani; Bagus Sudirman
Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i2.170

Abstract

This research discusses security design for Arduino-based doors and windows using fingerprint technology and SMS Gateway. The case study was conducted at Pesona Asri Tembalang Housing. The main goal of this research is to improve household security by combining fingerprint authentication technology and text messaging (SMS) as a safer and more efficient access mechanism.This system development method includes analyzing household security needs, designing an Arduino-based system, integrating fingerprint modules and SMS Gateway, as well as testing and evaluating system performance. The research results show that this system is able to provide a high level of security with accurate fingerprint authentication and direct notification via SMS Gateway when suspicious activity occurs.In conclusion, an Arduino-based door and window security design with fingerprint technology and SMS Gateway is an effective solution for increasing household security. Implementing these systems can help reduce the risk of intrusion and give homeowners better control over access to their property.
Design and Development of an Automatic Lock System for Cupboards Using Fingerprint Based Microcontrollers Afni Mardhiyah; Siswanto
Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i2.171

Abstract

: Seeing the current condition of the community, most of them still use simple security, such as the cupboard security system at Weleri Muhammadiyah 3 Vocational School, the situation is that schools still use one key in one cabinet where only one person is employed while more than one TU officer is if other officers will use the cupboard, they must look for or wait for the key holder first and the method is not effective for emergency matters. The importance of making security in the closet is because the school is the school with the highest number of students and requires safe storage media for diplomas (not yet taken). Therefore, it is necessary to make a cabinet lock application system using microcontroller-based fingerprints. This cabinet lock system uses a fingerprint scanner as the main determinant of whether the cabinet can be opened automatically. From research at Weleri Muhammadiyah 3 Vocational School, this system was able to add a security system to the cabinet to control access rights in the cabinets that were considered important.
Simulation Of An Automatic Fish Netting Tool With Continuous Servo Motor Drive, Hc-Sr04 Distance Sensor And Button, Using Arduino Mega Muhammad Akmal Mulyono; Eko Siswanto
Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i1.172

Abstract

The current fish harvesting system is still not optimal and requires a lot of human power . In every fish farming place, we can see that the fish netting system still uses manual nets, lots of people, and takes a long time. This affects the turnover / income and profit from the fish empowerment business. Therefore, to increase time efficiency, human energy, turnover and profit, this tool is a solution for every fish empowerment location. Because this tool is designed with an automatic system with a continuous servo motor, HC-SR04 distance sensor, push button, with an Arduino Mega base. button as the input command, the empowerer only needs to input the button (push button) to start harvesting cultivated fish, so that this work becomes more efficient in time, human energy, and influences the increase in turnover and business profits.
Simulation Of A Trash Can Using Line Follower Based On Arduino Iqbal Hakim; Andik Prakasa Hadi
Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i1.173

Abstract

There is a lot of dirt scattered around the State Elementary School (SDN) 03 Purwoyoso, Semarang. The habit of elementary school children and their parents is that they often throw rubbish everywhere and are lazy about throwing away the rubbish. even though there are already rubbish bins provided at the school. Children like new things, especially those shaped like toys. Garbage is a nesting place for bacteria that can cause various diseases. Humans are blessed with five senses which help them detect various things that threaten their lives. However, in the modern world, various forms of threats emerge that are not detected by our five senses, namely various types of poisons made by humans themselves. More than 75,000 synthetic chemicals have been produced by humans in the last decades. Many of them have no color, taste and smell, but have the potential to cause health hazards. Based on the problems described, the author tries to make a trash can using an Arduino-based line follower as a micro controller. This trash can can walk to the desired student line in a certain area with control carried out by a calling mechanism using a recorded voice. And if the smell is strong, the Buzzer will sound, after the students throw away the trash , the Dot Matrix LED will light up the words Thank You. It is hoped that with this rubbish bin, it will make the rubbish bin more attractive so that children will throw rubbish in its place.
Document Security System Using Arduino-Based Fingerprint And Rfid Module Mohamad Irkam; Toni Wijanarko Adi Putra
Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i1.174

Abstract

Documents are valuable/important letters that can be used as evidence of printed or written information. The company where the author conducted research is a company operating in the logistics sector, which of course has a special document storage room, namely the Accounting room . The use of plastic folders containing documents and safes as a place to store important documents and files still carries a lot of risk of misuse and loss. The title of this research is Document Security System Using Arduino- Based Fingerprint and RFID Modules . One of the aims of this research is to minimize loss and prevent misuse of documents/files placed in plastic folders. A security system using fingerprint and RFID is very good to apply as document security because it has double security. The system created uses a fingerprint as a signal breaker or RFID tag electromagnetic waves which are attached to a folder containing important documents/files belonging to the company. This system is also supported by an Arduino kit Uno with an Atmega328 microcontroller as the brain for processing data from the fingerprint sensor and RFID Reader functions as an electromagnetic wave identification system for RFID Tags , therefore two pieces of hardware are needed, called Tags and Readers . Apart from the three main components mentioned, there are several other components used in making this document security system, namely micro SD kit, buzzer, push button, servo . Creating this system is very important to limit misuse of documents and the risk of losing documents in a company.
Web Based Tuition Payment Information System SMS Gateway Based Response Automation (Study at Walisongo Vocational School, Semarang) Fujiama D. Silalahi; Irwan Aji Mahendra
Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i1.175

Abstract

At the Walisongo Vocational School Semarang Semarang SPP payment system that is carried out at this time is by manual method where payment of SPP is still conventional where administrative staff must look for student data and record transactions in the ledger containing student data, then fill in the student payment card column. and come as proof that students have paid. However, the payment system is less optimistic.Seeing these situations and conditions, the author makes a web-based response system for spp payment automation based on the SMS gateway at Walisongo Vocational School Semarang by using the Research And Development (R & D) method where this application can help administrative administrators in this institution to facilitate payment and can make notifications directly to parents of students automatically.This application the author uses the HTML and PHP programming language with the MySQL database, where later the data will be entered and stored in the database and the author also uses the SMS gateway hardware as a notification media to the parents of students so that the use can be more easier and optimal.
Mandiri Unbk Try Out Information System Web Based Using Linear Congruent Method At Madrasah Working Group (Kkm) Mts N 2 Demak Murtadho's Word; Fujiama D. Silalahi
Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v2i1.176

Abstract

The try out process is an exam simulation exercise every year before the National Examination conducted by school institutions. The main objective of this exercise is as an effort of school institutions to prepare students to get maximum scores on the National Examination.Madrasah Working Group (KKM) of MTs 2 Demak is a body within the Ministry of Religion which fosters coordinative cooperative relations between Demak MTs 2 and private Madrasahs in the area of ​​Demak 2 MTs. So far the Try Out system at the KKM level still uses manual procedures and is still off line using paper. As a result of this system, there are still delays in the distribution of questions and reports at the central level. In making Try Out questions, randomization of questions only uses the package method questions A, B and C, so there are still students who give each other answers.LCM (linear congruent method) is a method of generating random numbers on the Try Out. The principle of this method is where the form of the LCM number as the scrambler of the question, including increament (c), modulus (m), multiplier (a), and initial value (Z0), which has provisions: c = 0 ≤ c <m, m = 0 <m, a = 0 <a <m, and Z0 = 0 ≤ Z0 <m. Making this application using the PHP programming language and database used is MySql with the R & D system development method according to Borg and Gall, including: Research and information collecting, Planning, Develop prelminary form of product, Preliminary field testing, Main product revision, Main field testing , Operational product revision, Operational field testing, Final product revision, Dissemination and implementation.Madrasah Working Group (KKM) Demak MTs 2 in conducting a try out system still uses the manual offline method and the problem scrambler is only limited to packages A, B, and C, then with the Try Out Information System the web-based KKM level is expected to facilitate parties KKM and tighten students to avoid fraud.
The Games Design Accesbility For Gamer With Neurological Disorder Melyani Melyani; Anjas Ramadhani; Ajat Sudrajat; Mia Rosmiati; Faif Yusuf; Faizal Roni; Cahyani Budihartanti; Muji Endah Palupi
Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i2.177

Abstract

Computer games have emerged in the past decade as potential media beyond entertainment. Despite its popularity, game accessibility remains a major concern of various researchers. Children population with motor disabilities is a potential target for developing entertainment or therapeutic support games due to their interest to play. This paper presents: (1) a framework for mobile games for children with motor disability using simple hand postures and (2) xgboost decision tree as a hand posture recognizer (98.48 percent training accuracy and 96.76 percent testing accuracy) as a prototype of hand posture-based commands as assistive technology to interact with games.
IMPLEMENTATION OF MULTI-NODE SENSOR DATA DELIVERY USING THE MASTER-SLAVE METHOD IN LORA COMMUNICATION Hendry, Hendry; Manongga, Daniel
Journal of Technology Informatics and Engineering Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering
Publisher : University of Science and Computer Technology

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51903/jtie.v3i2.179

Abstract

This research explains the application of sending data from various sensor nodes using the master-slave method in Long Range (LoRa) communication. This system was created to increase efficiency and reliability in collecting sensor data spread across several locations. Sensor nodes function as slaves that collect and send data to the master. The master then processes and combines the data before sending it to a central server. Experimental results show that this method is successful in reducing latency and increasing data transmission speed and shows great potential for Internet of Things (IoT) applications that require wide communication range and low power consumption.

Page 6 of 17 | Total Record : 161


Filter by Year

2022 2025


Filter By Issues
All Issue Vol. 4 No. 3 (2025): DECEMBER | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 2 (2025): AUGUST | JTIE : Journal of Technology Informatics and Engineering Vol. 4 No. 1 (2025): APRIL | JTIE : Journal of Technology Informatics and Engineering Vol. 3 No. 3 (2024): December (Special Issue: Big Data Analytics) | JTIE: Journal of Technology Info Vol 3 No 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol. 3 No. 2 (2024): Agustus : Journal of Technology Informatics and Engineering Vol 3 No 1 (2024): April : Journal of Technology Informatics and Engineering Vol. 3 No. 1 (2024): April : Journal of Technology Informatics and Engineering Vol 2 No 3 (2023): December : Journal of Technology Informatics and Engineering Vol. 2 No. 3 (2023): December : Journal of Technology Informatics and Engineering Vol. 2 No. 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 2 (2023): August : Journal of Technology Informatics and Engineering Vol 2 No 1 (2023): April : Journal of Technology Informatics and Engineering Vol. 2 No. 1 (2023): April : Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): December: Journal of Technology Informatics and Engineering Vol. 1 No. 3 (2022): December: Journal of Technology Informatics and Engineering Vol 1 No 3 (2022): Desember: Journal of Technology Informatics and Engineering Vol. 1 No. 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): August: Journal of Technology Informatics and Engineering Vol 1 No 2 (2022): Agustus: Journal of Technology Informatics and Engineering Vol 1 No 1 (2022): April: Journal of Technology Informatics and Engineering Vol. 1 No. 1 (2022): April: Journal of Technology Informatics and Engineering More Issue