cover
Contact Name
Ardi Susanto
Contact Email
ardisusanto@poltektegal.ac.id
Phone
-
Journal Mail Official
informatika.ejournal@poltektegal.ac.id
Editorial Address
Gedung B, Politeknik Harapan Bersama, Jl Mataram No 9 Pesurungan Lor Kota Tegal
Location
Kota tegal,
Jawa tengah
INDONESIA
Jurnal Informatika: Jurnal Pengembangan IT
ISSN : 24775126     EISSN : 25489356     DOI : https://doi.org/10.30591
Core Subject : Science,
The scope encompasses the Informatics Engineering, Computer Engineering and information Systems., but not limited to, the following scope: 1. Information Systems Information management e-Government E-business and e-Commerce Spatial Information Systems Geographical Information Systems IT Governance and Audits IT Service Management IT Project Management Information System Development Research Methods of Information Systems Software Quality Assurance 2. Computer Engineering Intelligent Systems Network Protocol and Management Robotic Computer Security Information Security and Privacy Information Forensics Network Security Protection Systems 3. Informatics Engineering Software Engineering Soft Computing Data Mining Information Retrieval Multimedia Technology Mobile Computing Artificial Intelligence Games Programming Computer Vision Image Processing, Embedded System Augmented/ Virtual Reality Image Processing Speech Recognition
Articles 431 Documents
Mobile Hybrid Application Sebagai Solusi Dalam Pelaporan Bencana Menggunakan Framework Cordova Ari Muzakir; Eksen Hidiansah
Jurnal Informatika: Jurnal Pengembangan IT Vol 3, No 2 (2018): JPIT, Mei 2018
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v3i2.864

Abstract

Mobile devices are now almost used by all walks of life. Various platforms available on smartphones like Android, iOS, Windows Mobile provide great opportunities and become a challenge for app developers. The problem is that app developers need to be able to match the needs of the available platform. The solution to this problem is the mobile hybrid application technology, which enables application developers to bridge every different smartphone platform using the cordova framework. The Cordova framework allows application developers to build mobile applications using HTML5, CSS, and javascript (JS). In this research more focused on testing the technology of mobile hybrid application to build mobile application of disaster reporting at Regional Disaster Management Agency (BPBD) South Sumatera. Test results in the form of android and windows phone applications through several tests, among others, ease in the process of building applications, publishing, and configuration. It is expected that this hybrid mobile application software can help disaster management agencies in southern Sumatra region in disaster preparedness in the community.
Review FotoForensic.com dengan Teknik Eror Level Analysis dan JPEG untuk mengetahui Citra Asli Fajar Mahardika; Aurora Dwi Khatulistian; Adam Prayogo Kuncoro
Jurnal Informatika: Jurnal Pengembangan IT Vol 3, No 1 (2018): JPIT, Januari 2018
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v3i1.690

Abstract

In this modern era of photography, many facilities including software or hardware can be used as a tool to produce better images and so on falsified images. This research aimed to simulate falsified image detection, utilizing developed error level analysis method. The output of this research is a decision whether an image is authentic one or falsified one. From the testing phase, it can be concluded that the developed method error level analysis method resulted a good detection accuracy.
Desain dan Analisis Sistem CyberShare Menggunakan Four Node Interplanetary File System (IPFS) Haryanto, Tony; Ramli, Kalamullah
Jurnal Informatika: Jurnal Pengembangan IT Vol 8, No 2 (2023)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v8i2.5141

Abstract

Cybersecurity information sharing is a proactive and collaborative measure in enhancing organizational security by exchanging cybersecurity information using a centralized repository service. However, in practice, the use of centralized services poses a threat to distributed denial-of-service (DDoS) attacks which can result in system failure and cause single point of failure as well as man-in-the-middle (MITM) attacks which can result in modification of information and theft of exchanged information. This threat results in a lack of user confidence in the confidentiality, integrity, and availability of information. This study proposes the design of a secure cybersecurity information sharing (CyberShare) system using a private interplanetary file system (IPFS) network as a decentralized information storage. Unlike centralized storage which only has a single-node, CyberShare systems use four-node IPFS interconnected with swarm keys as authentication keys. This system allows users to store and share information from the sender to the recipient of information, avoiding dependence on a central server and reducing server load. The results of the analysis show that the proposed CyberShare system can guarantee the confidentiality, integrity, and availability of cyber security information. CyberShare systems can enhance the security of the information exchanged so that organizations can safely share and utilize cybersecurity information.
Manajemen Risiko Keamanan Informasi Menggunakan Framework NIST SP 800-30 Revisi 1 (Studi Kasus: STMIK Sumedang) Fathoni Mahardika
Jurnal Informatika: Jurnal Pengembangan IT Vol 2, No 2 (2017): JPIT, Juli 2017
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v2i2.484

Abstract

STMIK Sumedang merupakan institusi yang sudah terbiasa menggunakan perangkat teknologi, dimana pengawasannya dilakukan oleh suatu divisi tersendiri yaitu bagian UPT LPSI. Namun terdapat permasalahan dalam penggunaan TI yang ada saat ini antara lain : (1) Masih sering terjadinya insiden keamanan informasi yang menyebabkan terganggunya proses bisnis perusahaan, (2) Belum adanya pengawasan dan perencanaan yang tepat dalam pengelolaan keamanan informasi di STMIK Sumedang.Manajemen resiko adalah metode untuk penilaian dan mitigasi resiko terhadap aspek kebutuhan keamanan informasi yang memuat 3 unsur penting yaitu : Confidentiality (kerahasiaan), Integrity (integritas), dan Availability (ketersediaan). Manajemen resiko keamanan informasi yang digunakan mengacu pada NIST SP 800-30 Revisi 1. Standar ini digunakan sebagai acuan dalam melakukan manajemen resiko keamanan informasi, untuk mengantisipasi risiko agar kerugian tidak terjadi terhadap organisasi. Sehingga resiko dapat dikelola ke level yang dapat diterima organisasi. Diharapkan akan mengurangi dampak insiden sistem dan teknologi informasi di institusi perguruan tinggi, melindungi proses bisnis organisasi yang penting dari ancaman keamanan, meminimalisir risiko kerugian serta menghindari kegagalan serius terhadap informasi yang ada di STMIK Sumedang. Setelah dilakukan manajemen risiko maka diperlukan control keamanan sebagai dasar acuan bahwa risiko dilakukan mitigasi, diterima/ditransfer oleh pihak manajemen. Kontrol keamanan dikembangkan dari ISO 27002. Untuk mengetahui sejauh mana keamanan informasi organisasi maka dilakukan maturity keamanan informasi organisasi menggunakan control yang dikembangkan dari ISO 27002. Dari hasil maturity ini menjadi dasar dibuatnya rekomendasi standar kebijakan keamanan informasi di STMIK Sumedang.
Analisis Data Penjualan Pasca COVID-19 Menggunakan Algoritma K-Means Hapsari, Yustia; Hidayattullah, Muhammad Fikri; W, M Shidiq Erdi; Wibowo, Dega Surono; Nishom, M
Jurnal Informatika: Jurnal Pengembangan IT Vol 7, No 2 (2022)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v7i2.3810

Abstract

Pandemi Covid-19 memberikan dampak buruk ke berbagai sektor. Tak terkecuali sektor ekonomi. Bahkan negara-negara maju sekali pun ikut terkena dampak yang sangat serius di sektor ekonomi dari adanya pandemi ini. Para pelaku usaha dalam berbagai lini melakukan transformasi yang massif untuk bangkit dari keterpurukan tersebut. Salah satu langkah strategis yang dilakukan adalah dengan mengubah sistem marketing dan transaksi penjualan dari yang sebelumnya offline ke online. Penelitian ini akan melakukan analisis penjualan pasca Covid-19 dengan menggunakan dataset dari Narasio Data. Produk yang akan dianalisis berupa penjualan produk sport dan apparel. Hasil analisis akan menampilkan produk apa saja yang paling cepat terjual, pengaruh rating produk dan pemberian diskon dengan tingkat penjualan, serta keterkatian antara banyaknya variasi brand dengan tingkat penjualan. Proses analisis menggunakan pendekatan segemntasi produk. Algoritma yang digunakan untuk melakukan segmentasi adalah K-Means. Algoritma tersebut sangat handal untuk kasus clustering produk.
Implementasi Metode SCRUM dalam Perancangan Produk Backlog Sistem Cerita Desa Lia Farokhah; Fadhli Almu'iini Ahda; Lilis Widayanti; Vivi Aida Fitria
Jurnal Informatika: Jurnal Pengembangan IT Vol 5, No 1 (2020): JPIT, Januari 2020
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v5i1.1658

Abstract

Abstract  The village is the smallest part of governance. Data from the Central Statistics Agency in 2018, villages have poverty greater than cities. The village has various weaknesses and strengths such as economics, psychology, engineering, skills, capital, successful application of hydroponic agriculture and others. On the other hand, collages have mandatory programs for the entire academic such as society dedication, research and internship programs for students. In the business sector, there are companies that are required to carry out CSR (Corporate social responsibility) to follow regulations in Indonesia. The problem of all actors is the inaccurate target of the distribution of aid in their soft skills and hard skills to bring their contribution to village development. Documentation and classification of problems and strengths in the village need to be mapped. Both of these relationships will be mutually beneficial subjects and objects in a development cycle. This study will examine the importance of the backlog product of the system model that will be developed using the SCRUM method. The results of the level of importance and priority of the backlog product will be used in system development and have an influence in determining the next stage of the Scrum method namely sprint planning meeting, sprint execution and scrum analysis. The results of the college backlog priority analysis are facilities 1,3,4,5,8,2 and 6. On the other hand, the priority order of backlog products for villages / communities is facility 1, 4,2,3,6,7,9, and 8 while Facility 5 is a very undesirable only 36%. The conclusions of the synchronization of two stakeholders based on their respective needs are facility 1, which is about the community's need for assistance from tertiary institutions and the needs of objects by tertiary institutions. Abstrak - Desa merupakan bagian terkecil dalam tata kelola pemerintahan. Data Badan Pusat Statistik tahun 2018, desa memiliki tingkat kemiskinan lebih besar dari kota. Desa memiliki berbagai kekurangan dan kelebihan seperti masalah, perekonomian, psikologi, bidang teknik, skill, permodalan, keberhasilan penerapan pertanian hidroponik dan yang lainnya. Disisi lain, perguruan tinggi memiliki banyak program wajib untuk seluruh civitas akademika dosen seperti pengabdian, penelitian dan program magang atau kuliah kerja nyata (KKN) bagi mahasiswa. Pada bidang bisnis, ada perusahan yang wajib melakukan CSR (Corporate social responsibility) sesuai aturan yang diberlakukan di Indonesia. Permasalahan ketiga aktor tersebut adalah kurang tepatnya sasaran penyaluran bantuan dalam softskill maupun hardskill yang mereka miliki untuk membawa kontribusinya bagi pembangunan desa. Dokumentasi dan klasifikasi permasalahan serta kelebihan yang ada di desa perlu dipetakan. Kedua hubungan ini akan menjadi subjek dan objek yang saling menguntungkan dalam sebuah siklus pembangunan.  Penelitian ini akan menguji tingkat kepentingan produk backlog dari model sistem yang akan dikembangkan menggunakan metode SCRUM. Hasil dari tingkat kepentingan dan prioritas produk backlog akan dipakai dalam pengembangan sistem dan memiliki pengaruh dalam menentukan tahap metode scrum berikutnya yaitu sprint planning  meeting, eksekusi sprint dan analisis scrum. Hasil analisis prioritas backlog perguruan tinggi adalah fasilitas 1,3,4,5,8,2 dan 6. Disisi lain, urutan prioritas produk backlog untuk desa/masyarakat adalah fasilitas 1, 4,2,3,6,7,9, dan 8 sedangkan Fasilitas 5 menjadi fasilitas yang sangat tidak diinginkan karena hanya 36 %. Adapun simpulan singkronisasi dua stakeholder berdasarkan kebutuhan masing-masing adalah adalah fasilitas 1 yaitu tentang kebutuhan masyarakat akan bantuan dari perguruan tinggi dan kebutuhan objek oleh perguruan tinggi. Kata Kunci - Teknologi, Desa, Permasalahan, Solusi, Singkronisasi
Hybrid Fourier Descriptor Naïve Bayes dan CNN pada Klasifikasi Daun Herbal Backar, Sunarti Passura; Purnawansyah, Purnawansyah; Darwis, Herdianti; Astuti, Wistiani
Jurnal Informatika: Jurnal Pengembangan IT Vol 8, No 2 (2023)
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v8i2.5186

Abstract

Plants are vital to human life on earth, and the leaves and their whole parts have many benefits. These parts of the plant can help distinguish between different species. The leaf identification can be performed at any time, while the other parts of the plants can only be identified at a certain time. The study aims to classify two types of herbs i.e. saur-opus androgynous and moringa oleifera, implementing the Fourier Descriptor method to extract the shape and texture features. In the process of classification using the Naïve Bayes method with three types of nuclei (Gaussian, Bernoulli, and Multinomial) and a Convolutional Neural Network. The testing process was carried out using two scenarios, dark and light, where each scenario consisted of 240 images for a total of 480 images divided into 20% of the data testing and 80% of the training data. The Fourier Descriptor-Bernoulli Naive Bayes method gives the lowest accuracy in both light and dark scenarios, at 46% and 52%, respectively. As for the classification of herbal leaves using a combination of the Fourier Descriptor-Convolutional Neural Network method, it is recommended to be used in light image scenarios and Fourier Descriptor-Gaussian Naive Bayes in the dark scenarios because it is able to detect herbal leaf types with 100% accuracy.
Comparison in Quality of service Performance For Wireless Sensor Network Routing between Fuzzy Topsis and SAW Algorithm Muhammad Hafizd Ibnu Hajar; Galang Persada Nurani Hakim; Ahmad Firdausi; Eko Ramadhan
Jurnal Informatika: Jurnal Pengembangan IT Vol 6, No 2 (2021): JPIT, Mei 2021
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v6i2.2530

Abstract

one of the advantages of Wireless Sensor Network would be its ability to reduce cost of communication system using node to node communication. Because of many things data transfer is Wireless Sensor Network operation sometimes has disturbance. A routing algorithm is a network coding that intends to enhance network performance for better operation with or without any disturbance. Fuzzy TOPSIS and SAW as MCDM algorithm is proposed for routing algorithm in Wireless Sensor Network operation. From our simulation both SAW  and Fuzzy Topsis algorithm can be used in network coding (routing) to provide better QOS for Wireless Sensor Network compare with shortest path routing. For delay it perform better at about 2/3 (shortest path routing 50 millisecond, both SAW and Fuzzy Topsis algorithm 33 millisecond), and for packet loss at about 3/4 (shortest path routing 21 bit loss, both SAW and Fuzzy Topsis algorithm 16 bit loss). From our simulation both SAW and Fuzzy Topsis algorithm algorithm has benefit which is lower delay and packet loss but at higher cost which is more hopping for communication channel (shortest path routing 3 hopping, both SAW and Fuzzy Topsis algorithm 5 hopping)
Implementasi Metode Promethee Dalam Sistem Pendukung Keputusan Penilaian Raport Dosen Dyah Apriliani; Oman Somantri
Jurnal Informatika: Jurnal Pengembangan IT Vol 4, No 1 (2019): JPIT, Januari 2019
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v4i1.1251

Abstract

Assessment of lecturer report cards is a decision-making process using information obtained through measuring the results of lecturer performance by students and administrative completeness of each lecturer. The object used in this study is the Informatics Engineering IV Study Program using the promethee method. The Promethee method is used to obtain a ranking of grades from lecturers. Promethee's method of calculating requires several alternatives and criteria. The alternative used for assessment is the lecturer who teaches in the D IV Informatics Engineering Study Program. The criteria used to assess each alternative are lecturer assessment data by students which includes student assessment input taken from the final score or the average resulting from the questionnaire assessment filled in by students. Administrative appraisal data which includes: syllabus collection, collection of college contracts, modules, number of attendance, timeliness of UTS and UAS collection questions as well as the timeliness of collecting UTS and UAS scores. From this study, the assessment of lecturer report cards was obtained, which also included lecturer rankings based on the scores produced. System testing is done by comparing the results of manual assessment with the results of the assessment produced by the system. Based on the testing that has been done it can be concluded that the results of testing both manually and using the system are the same.
Pengembangan Framework Yii Dalam Pembangunan Sistem Inventaris STMIK Prabumulih Dengan Konsep User Centered Design (UCD) Ariansyah Ariansyah; Ahmat Josi
Jurnal Informatika: Jurnal Pengembangan IT Vol 3, No 1 (2018): JPIT, Januari 2018
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v3i1.654

Abstract

STMIK Prabumulih is a college that has two departments, namely the department of the information system level of education (S1) and computerized accounting level of diploma three (D3). STMIK Prabumulih has a vision of "Becoming a high school based on information technology with a national standard in 2025". For the achievement of the vision, STMIK Prabumulih has implemented an IT system, such as Academic System, Alumni Database System, eLearning, Learning System. This research aimed to develop an Equipment Management System as a complimentary from another established system. The Equipment Management System intended to make an efficient equipment management handling like an inventory system.