cover
Contact Name
Nurul Fadhilah
Contact Email
nawalaedu@gmail.com
Phone
+6282281184080
Journal Mail Official
nawalaedu@gmail.com
Editorial Address
Jl. Raya Yamin No.88 Desa/Kelurahan Telanaipura, kec.Telanaipura, Kota Jambi, Jambi Kode Pos : 36122
Location
Kota jambi,
Jambi
INDONESIA
Technologia Journal
ISSN : -     EISSN : 30469163     DOI : https://doi.org/10.62872/ppr42775
Core Subject : Science,
This journal publishes original articles on current issues and international trends in the field of information engineering and information systems.
Articles 19 Documents
Penerapan Algoritma Decision Tree dalam Klasifikasi Data “Framingham” Untuk Menunjukkan Risiko Seseorang Terkena Penyakit Jantung dalam 10 Tahun Mendatang Raharja, Agung Rachmat; Jayadi; Pramudianto, Angga; Muchsam, Yoki
Technologia Journal Vol. 1 No. 1 (2024): Tecnologia Journal-February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/cwgzp962

Abstract

Heart disease is one of the deadliest diseases in Indonesia and in the world, many of the sufferers do not know the risk of heart disease. This research will analyze and identify factors that will affect the risk of heart disease. With the decision tree algorithm approach which is one of the methods of machine learning that can produce predictive models based on a series of logical decisions. The application is done by classifying framingham data to assess the risk of heart disease in the next 10 years. The result is a Decision Tree model used to predict the risk of heart disease based on the Framingham dataset. The model achieved 74% accuracy on the test data
Perancangan dan Pembuatan Aplikasi SIMPORA Berbasis Online dengan PHP Bakti, Firdaus, Masduki, Indra , Mohamad , Uki
Technologia Journal Vol. 1 No. 1 (2024): Tecnologia Journal-February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/h9fhga20

Abstract

The Tanjung Pandan Customs Office as a State Agency has the opportunity to compete with other customs in Indonesia, as an added value for the Tanjung Pandan Customs Office in its office at the Customs Agency. SIMPORA as an information system for Budget Absorption and Realization was created to meet these needs. The application design in this study was built using the Unified Software Development Process method and the application design used the Unified Modeling Language (UML). This software project iteratively (repeating steps, as feedback from the user) starts from the process of making Software Requirements Design (SKPL), then proceeds with making Software Design (DPPL), then followed by making applications and closing with testing. This process is carried out continuously according to the planning period. The result of this project is software that is also equipped with design and application documentation which in the end is to give the Tanjung Pandan Customs office a winner in the competition between customs offices throughout Indonesia.
Marketplace Design With Joomla Case Study: PT. Lum Cengkareng Firdaus, Mohamad
Technologia Journal Vol. 1 No. 1 (2024): Tecnologia Journal-February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/3v4z3v81

Abstract

Online marketplaces are so mushrooming that it can make it easier for someone to transact in everyday life. With this technology, market penetration is increasingly widespread and can generate large business profits. A company located in the Cengkareng area of West Jakarta is trying to develop its business. In accelerating the development of their business they are trying to organize a design and creation of an online marketplace and also provide training on the use of features in the marketplace online that can be used by the community to make transactions quickly. The method used in making this design is an explorative method in the application life cycle, where a marketplace website will be designed with the Content Management System application. The results of this paper show that the design of a marketplace website can be built using the CMS application, namely Joomla. This research is a form of utilization of online-based information technology at PT LUM.
Distributed Data Base Purnomo, Rahmat
Technologia Journal Vol. 1 No. 1 (2024): Tecnologia Journal-February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/ahwrsf75

Abstract

In the context of a distributed database, data is stored on various computers that are interconnected through communication media such as high-speed buses or telephone lines. A distributed database system consists of a set of sites, where each site has the ability to execute transactions that access data at one or more sites. A distributed database is a collection of logical data that is physically dispersed in a computer network, which is independent of current or future application programs. Fragmentation is a phenomenon in which storage space is inefficiently utilized, resulting in reduced storage capacity, while the term also refers to the condition of the deserted storage itself. Replication, on the other hand, is a technique for copying and distributing data and database objects from one database to another, as well as maintaining data consistency through synchronization between databases.
Design Of Steganography Application To Secure Messages Using Least Significant Bit (Lsb) Method Based On Android Purnomo, Rahmat
Technologia Journal Vol. 1 No. 1 (2024): Tecnologia Journal-February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/7cwb9p82

Abstract

The Internet, an interconnected network, has become one of the most widespread data communications medias in the world. With the development of various illegal information retrieval techniques, many people try to get information that does not belong to them. Various techniques to protect sensitive information from unauthorized persons are widely used to protect important information. Steganography is a technique for hiding message files from the public who know their existence. This technique is often used to avoid suspicion or people who want to know the contents of the message file. Steganography is the science and technique of writing hidden messages so that no one else knows about their existence. Therefore, the application of plain-text steganography is inserted into the Least Significant Bit (LSB) encrypted image carrier. This allows mobile users to send the author's message to the recipient securely..  
Information System Security Analysis in the Era of Internet of Things (IoT) Desi Ratna Sari
Technologia Journal Vol. 1 No. 2 (2024): Technologia Journal-May
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/r0968h04

Abstract

The analysis of information system security in the Internet of Things (IoT) era reveals the complexities and challenges associated with ensuring the integrity and security of an increasingly connected infrastructure. The research method used in this study is qualitative research, Data related to information system security in the context of IoT will be collected from various sources, including scientific literature, research reports, and technical documentation and analyzed in-depth literature. Serious threats such as malware, ransomware, and denial of service (DoS) attacks require a proactive and holistic approach in dealing with them. Lack of consistent security standards, device interoperability vulnerabilities, and lack of end-user security awareness are the main focus of efforts to improve security in IoT environments. Cooperation between industry, government, and other stakeholders is needed to develop robust security standards, increase user security awareness, and address interoperability challenges. Through these measures, it is hoped to create a safer and more secure IoT environment, maintaining data integrity and infrastructure security in an increasingly connected and complex era.
Analysis of Digital Technology on Language Style Changein Online Communication Naela Mikyalul Faizah
Technologia Journal Vol. 1 No. 2 (2024): Technologia Journal-May
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/7w3yg289

Abstract

Penelitian ini bertujuan untuk menyelidiki secara kritis dampak teknologi digital terhadap evolusi gaya bahasa dalam komunikasi daring. Dengan memanfaatkan metode observasi dan pendekatan kualitatif, penelitian ini menggali secara mendalam bagaimana teknologi digital memengaruhi pola komunikasi online. Komunikasi daring tidak hanya menjadi fenomena yang umum, tetapi juga merupakan cerminan dari perubahan budaya yang terjadi akibat penetrasi teknologi digital dalam kehidupan sehari-hari. Melalui pengamatan langsung terhadap interaksi online serta analisis konten pesan yang dihasilkan, penelitian ini bertujuan untuk mengidentifikasi tren perubahan dalam gaya bahasa, termasuk penggunaan singkatan, emotikon, dan bahasa informal. Pemahaman mendalam tentang bagaimana teknologi digital membentuk budaya komunikasi daring menjadi fokus utama dalam penelitian ini. Implikasi dari perubahan gaya bahasa yang teridentifikasi akan dianalisis secara kritis, dengan mempertimbangkan bagaimana hal ini memengaruhi interaksi sosial, literasi bahasa, dan pembentukan identitas remaja dalam lingkungan daring. Dengan memberikan pemahaman yang lebih dalam tentang dinamika komunikasi daring dalam era digital, penelitian ini diharapkan dapat memberikan landasan yang kuat untuk pengembangan strategi yang tepat dalam mempromosikan penggunaan bahasa yang efektif dan bermakna dalam konteks komunikasi daring yang terus berkembang.
Wardriving Jaringan WIFI Serta Menganalisa Qos Pada Jaringan Internet Universitas Sriwijaya Yang Tidak Terenkripsi Keamanannya Pratama, Edo
Technologia Journal Vol. 1 No. 2 (2024): Technologia Journal-May
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/4bqbeq08

Abstract

Wardriving merupakan salah satu metode untuk mengetahui sebuah lokasi pengguna yang ditunjukkan pada teknologi jaringan wireless yang terpasang pada access point dengan bantuan beberapa perangkat yang dapat mendukung pencarian titik koordinat pada peta karena terkadang lokasi sebenarnya seringkali tidak tersedia, jadi dalam pengujian ini menggunakan metode wardriving, dengan menggunakan aplikasi berbasis Android yaitu WiGLE, Google Earth, dan GPS diharapkan dapat memudahkan proses pengamatan.Dalam paper ini saya menganalisis jaringan dengan metode Quality Of Servive (QoS) pada traffic Internet Universitas Sriwijaya menggunakan aplikasi Wireshark.Dalam paper ini kesalahan perkiraan koordinat jaringan tergantung pada aplikasi yang digunakan.Saya juga menganalisa dampak buruk jaringan public yang tidak terenkripsi keamanannya dengan cara menyerang dengan teknik Distributed Denial of Servive (DDoS) untuk mengetahui tingkat kerentanan pada jaringan tersebut.
Data Security Analysis of Chatting Applications Using End-to-End Encryption Intan Juniarmi
Technologia Journal Vol. 1 No. 2 (2024): Technologia Journal-May
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/hrab7v04

Abstract

This research aims to analyze data security in chat applications by applying end-to-end encryption techniques. The research method used is a literature study and qualitative analysis of chat applications that use end-to-end encryption. The results show that the implementation of end-to-end encryption in chat applications is effective in maintaining the confidentiality of user data, securing messages from hacking and data interception attacks, and increasing user security awareness. However, this study also identified some challenges related to application performance and encryption key management. Therefore, this study recommends the development of a more efficient and comprehensive end-to-end encryption technology to maximize user data security in chat applications.
Factors of IT Project Failure: A Literature Review Prayatna, Betantiyo; Suzeta, Muhamad Ihsan; Clausa, Honaris
Technologia Journal Vol. 2 No. 1 (2025): Technologia Journal - February
Publisher : Pt. Anagata Sembagi Education

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62872/6w5saj74

Abstract

This study aims to identify the key factors contributing to IT project failure. A literature review serves as the primary research method, with articles sourced from leading journal databases such as Scopus, IEEE Xplore, Google Scholar, and ProQuest using the keyword "IT project failure factors." The findings reveal that IT project failure is primarily caused by individual, organizational, and technical factors. Specific factors identified include a lack of project management skills, poor communication among team members, inadequate planning, and constraints related to budget and technology. Individual factors involve insufficient expertise and leadership, while organizational factors include weak support from management and unclear project objectives. Technical factors, such as outdated systems and integration issues, also play a significant role. This study emphasizes the need for a holistic approach in IT project management to minimize failure risks. Effective project planning, strong leadership, clear communication, and adequate resource allocation are crucial in ensuring success. By understanding these failure factors, organizations can implement better strategies to enhance project outcomes. Future research could explore specific mitigation strategies and best practices to address these challenges, providing valuable insights for IT professionals and project managers in improving project success rates.

Page 1 of 2 | Total Record : 19