cover
Contact Name
Ari zulsafar
Contact Email
journals@telkomuniversity.ac.id
Phone
+6285210699259
Journal Mail Official
adertelu@telkomuniversity.ac.id
Editorial Address
PPM Telkom University Gd. Bangkit, Lantai 3 Jalan Telekomunikasi, Terusan Buahbatu, Bandung, Jawa Barat, Indonesia.
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of Informatics and Communication Technology (JICT)
Published by Universitas Telkom
ISSN : -     EISSN : 26861089     DOI : https://doi.org/10.52661/j_ict
ournal of Informatics and Communication Technology (JICT) is a peer-reviewed, scientific journal published by "Penelitian dan Pengabdian Pada Masyarakat (PPM)" Institut Teknologi Telkom Jakarta. The aim of this journal is to publish articles dedicated to all aspects of the latest outstanding developments in the fields of Informatics and Telematics (Telecommunication Technology). It will be publish twice in a year June and December. This journal is an Open Access Journal. This Journal have some focus and scope in the fields of : 1. Informatics 2. Telecommunications 3. Electronic 4. Networking 5. Satelite 6. Radar
Articles 16 Documents
Search results for , issue "Vol. 6 No. 2 (2024)" : 16 Documents clear
Pengembangan Aplikasi Sistem Informasi Praktik Kerja Lapangan (SIPKL) Berbasis Mobile Menggunakan Metode Waterfall Nurdiana, Dian; Maulana, Muhamad Riyan; Aprijani, Dwi Astuti; Amastini, Fitria; Utama, Moh. Rizky Putra Aji
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Youtube merupakan platform video paling populer di dunia saat ini. Banyak video viral di Youtube dari Indonesia. Tapi, membuat video viral di Youtube adalah tantangan yang berat, baik untuk berpengalaman YouTuber dan khususnya untuk youtuber baru. Penelitian ini akan berfokus pada menemukan sifat video viral dengan mengelompokkannya ke dalam kelompok yang berbeda. Algoritma Fuzzy C-Maeans digunakan untuk proses clustering. Tujuan dari proses clustering ini adalah untuk mencari pola dalam data yang sebelumnya tidak terlihat. Hasil menunjukkan bahwa video dibagi menjadi tiga kelompok yang dibangun dari 3 variabel; view_count, likes, comment_count. Pola dan wawasan yang ditemukan dalam penelitian ini dapat berguna bagi calon pembuat video yang ingin meraih kesuksesan sebagai Youtuber. Hasil analisis cluster yang dilakukan memiliki 3 cluster dengan 10184 video berada di cluster 1 dengan indikasi tidak trending, 551 video berada di cluster 2 dengan indikasi sangat trending dan 35 video berada di cluster 3 dengan indikasi trending. Adapun pengujian dan evaluasi kualitas cluster yang terdapat pada sistem menggunakan silhouette dengan hasil mencapai 0.8778072603970618 mendekati angka 1
SISTEM DETEKSI DAN PEMANTAUAN PENCEMARAN UDARA BERBASIS IOT: SISTEM DETEKSI DAN PEMANTAUAN PENCEMARAN UDARA BERBASIS IOT Andre Megantoro, Andre Megantoro; Saidah, Sofia; Sevierda, Raniprima
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Berdasarkan Kementerian Lingkungan Hidup dan Kehutanan (2021), emisi kendaraan bermotor berkontribusi 70% terhadap polusi Nitrogen Oksida (NOx), Karbon Monoksida (CO), Sulfur Dioksida (SO2) dan Particulate Matter (PM) di daerah perkotaan. Penelitian ini bertujuan untuk mengukur kualitas udara dan pemantauan karbon monoksida dan gas amonia berupa alat deteksi dan pemantauan polusi udara berbasis IoT. Penelitian ini menggunakan metode penelitian System Engineering yaitu studi pustaka, analisis kebutuhan, desain sistem, pengembangan perangkat keras, pengembangan perangkat lunak, integrasi komponen, uji coba dan evaluasi, analisis data dan kesimpulan. Perangkat ini terdiri dari serangkaian sensor yaitu MQ-135, sensor MQ-7, Arduino Uno, ESP8266 sebagai alat yang terhubung ke internet dan perangkat lunak telegram. Data yang diperoleh dari sensor ditransmisikan ke Arduino Uno, kemudian ke ESP8266 secara nirkabel. Data pengukuran ditampilkan di kolom bot obrolan perangkat lunak telegram. Hasil penelitian menunjukkan bahwa sistem deteksi dan pemantauan udara berbasis iot menghasilkan deteksi beberapa parameter kadar gas CO dan NH3 pada beberapa objek, yaitu asap kendaraan, asap rokok elektrik, asap tembakau, dan parfum. Data kualitas udara yang diperoleh dari sensor dapat ditampilkan secara real-time melalui telegram dan disimpan dalam database. Sistem akan menampilkan peringatan "Tolong Gunakan Masker" yang muncul di aplikasi bot telegram ketika gas yang terindentifikasi melebihi ambang batas. Keywords: Gas, Kualitas udara, Sensor MQ-135, Sensor MQ-7.
ANALISIS DAN DETEKSI SERANGAN SQL INJECTION PADA JARINGAN KEAMANAN PAYMENT GATEWAY Adhitya Bagus Putra Erlangga; Leanna Vidya Yovita; Sevierda Raniprima
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan sistem pembayaran elektronik melalui payment gateway sangat penting untuk menjaga integritas dan kepercayaan dalam transaksi finansial online. Dalam era digital, website top-up games menjadi komponen penting dalam industri game, namun sering menjadi target serangan, terutama melalui teknik SQL Injection. Penelitian ini bertujuan untuk menganalisis dan mendeteksi potensi kerentanan terhadap serangan SQL Injection pada sistem pembayaran elektronik.Metodologi penelitian melibatkan pengujian penetrasi menggunakan payload SQL Injection dengan pernyataan Data Manipulation Language (DML) dan Data Definition Language (DDL). Tujuannya adalah untuk memahami respons aplikasi terhadap serangan yang mencoba memanipulasi data di dalam database dan mengevaluasi apakah aplikasi memiliki lapisan keamanan yang memadai untuk melindungi struktur database. Hasil pengujian menunjukkan bahwa sistem memiliki mekanisme keamanan yang cukup efektif dalam mendeteksi dan mencegah serangan SQL Injection. Meskipun beberapa serangan berhasil, yang mengindikasikan adanya celah keamanan, sebagian besar serangan gagal berkat mekanisme keamanan yang ada. Hasil ini memberikan wawasan mendalam tentang kerentanan keamanan dan langkah-langkah mitigasi yang diperlukan untuk memperkuat keamanan sistem. Keywords: Data, Database, Injeksi SQL, Keamanan Siber.
Development and Implementation of Mobile Application for Warehouse Inventory Reporting System Julian Ega Prabowo; Sela, Enny Itje
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The company is engaged in the sale of emping mlinjo crackers and currently still uses manual recording methods to manage its operational activities. The main problem faced is the process of making monthly reports to record the movement of goods in and out of goods and monitor the stock of finished goods and raw materials. Along with the rapid growth of the company, this manual method has become inefficient in handling the high volume of goods and many daily transactions. This often leads to errors and discrepancies in reports, resulting in less efficient distribution of goods. This research aims to digitize the warehouse management system of warehouse management by developing a reporting application for the emping warehouse. goods. This application is designed to monitor the movement of goods and generate reports digitally. It is expected that this application will improve operational efficiency by facilitating data recording and management by the SO (Sales Order) Team, Sales Order Team, Production Team, Distribution Team, and provide convenience for the owner as a super admin in managing warehouse activities. The research method used is interviews and observations to identify the problems faced by the company. Based on the findings, the design, development, and implementation of the application and system testing were carried out. Descriptive analysis was used to evaluate the impact of the application on warehouse management and company operations. The results showed that the application was effective in recapitulating incoming and outgoing goods, making it easier to generate reports, and calculating profit or loss from sales transactions. The app enables real-time monitoring, simplifies data input by employees, and increases transaction audit transparency. The digital reporting system simplifies warehouse management, improves operational efficiency, and reduces recording errors and stock management mistakes.
Metadata Management to Accelerate Big Data Implementation Yulfitri, Alivia; Indra Sensuse, Dana; Ulum, M. Bahrul; Fauzia Achmad, Yunita
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Big Data development often encounters obstacles in data quality even though it already has a data warehouse. The lack of high-quality data is the root cause of this issue. One of the causes is the failure to implement metadata management, which leads to issues with non-standardized data, a lack of a common understanding of the meaning and content of a data element, and the use of different data formats and formulas. This leads to a variety of data issues, including data duplication, inconsistent data, inaccurate data, outdated data, and unreliable data. This condition is impacting companies, especially data warehouse managers, who still face problems in cleaning, organizing, and managing data. Therefore, conducting research on metadata management is crucial to determining the necessary preparations for big data development and ensuring the provision of high-quality data. This research utilizes the DMBOK 2 framework, maturity instruments from Standford, and the technical framework from CMMI. The results of the research can help companies with metadata management improve big data implementation.
Value Chain Mapping Value Chain Mapping Based on Deep Learning in Cyber Security for Sustainability Development Smart Bandung City: Value Chain Mapping Based on Deep Learning in Cyber Security for Sustainability Development Smart Bandung City Wijaya, Rahmadi; Rosmiati, Mia; Hidayati, Hetti
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Smart City is a lifestyle of people who use computers or electronic media to make their information needs easier. Through digitalization, everyone can get a more efficient, controllable, economical, productive, integrated, and sustainable life. However, to get this progress, a model for developing smart city initiatives is needed and becomes a chain so that it can continue to be developed in the context of a smart city. Therefore, to develop global smart city technologies, a smart city must create a Value Chain Mapping (VCM). This paper aims to map the layers program with the currently running value chain mapping for smart city sustainable development. For this purpose, this research focused on the use of value chain mapping based on security services on smart city components: the environment and lifestyle, mobility, and health. Furthermore, deep learning methods as well as technology correlation in a smart city are explained. Mapping an environmental program layer using Deep Learning in Cyber Security services could prevent vulnerabilities that occur when implementing information technology

Page 2 of 2 | Total Record : 16