cover
Contact Name
Ari zulsafar
Contact Email
journals@telkomuniversity.ac.id
Phone
+6285210699259
Journal Mail Official
adertelu@telkomuniversity.ac.id
Editorial Address
PPM Telkom University Gd. Bangkit, Lantai 3 Jalan Telekomunikasi, Terusan Buahbatu, Bandung, Jawa Barat, Indonesia.
Location
Kota bandung,
Jawa barat
INDONESIA
Journal of Informatics and Communication Technology (JICT)
Published by Universitas Telkom
ISSN : -     EISSN : 26861089     DOI : https://doi.org/10.52661/j_ict
ournal of Informatics and Communication Technology (JICT) is a peer-reviewed, scientific journal published by "Penelitian dan Pengabdian Pada Masyarakat (PPM)" Institut Teknologi Telkom Jakarta. The aim of this journal is to publish articles dedicated to all aspects of the latest outstanding developments in the fields of Informatics and Telematics (Telecommunication Technology). It will be publish twice in a year June and December. This journal is an Open Access Journal. This Journal have some focus and scope in the fields of : 1. Informatics 2. Telecommunications 3. Electronic 4. Networking 5. Satelite 6. Radar
Articles 169 Documents
Web-Based Library Information System Yerezqy Bagus; Prasetyo, Hendy
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Muh 4 Yogyakarta Middle School is still record the borrowing and returning of books in its library manually. This school haven’t yet store book data in a system causes many errors in data collection, one of which is data redundancy. Recording of borrowing and returning each book is still done manually, so the librarian must always check repeatedly. The aim of this research is to design and build a web-based library information system to overcome existing problems. This research uses the Unified Modeling Language (UML) development method. In design process this system uses class diagrams, use case diagrams and activity diagrams as well as applying programs using the CodeIgniter Framework and database storage in MySQL. The result of this research is a web-based library information system that can overcome problems in borrowing and returning books. System testing was carried out twice, namely using alpha and beta tests. Test results show that all features can be built and work well. Beta testing of 80% shows users strongly agree that this system is worth using
IMPLEMENTASI VLAN ROUTER ON A STICK MENGGUNAKAN GNS3 V2.2.23 UNTUK MENINGKATKAN PERFORMANSI JARINGAN KOMPUTER: (Studi Kasus di Institut Teknologi Telkom Jakarta) Purnama Alkhoir; Ade Nurhayati; Nurwan Reza Fachrurrozi
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Untuk mebuat jaringan yang handal, dikembangkan lah berbagai teknik khusus, seperti teknik subnetting dan penggunaan hardware yang lebih baik (antara lain switch dan router) maka muncullah konsep VLAN (Virtual Local Area Network). Agar antar VLAN dapat berkomunikasi dibutuhkan suatu jembatan yang berada pada lapisan OSI layer 3 yaitu router. Dengan menggunakan konfigurasi router “Router on a stick”, yang mana sebuah interface physical me-routing traffic antara beberapa VLAN pada satu network. Router interface dikonfigurasikan untuk beroperasi sebagai link trunk dan terhubung dengan sebuah port switch dalam mode trunk. Router menunjukkan inter-VLAN routing dengan menerima traffic VLAN yang telah di tag pada interface trunk dari switch dan secara internal merutekan antar VLAN menggunakan sub-interface.. Implementasi VLAN Router on a Stick dapat meningkatkan performansi jaringan computer dalam perkembangan jaringan computer kedepannya.
Pengembangan Aplikasi Sistem Informasi Praktik Kerja Lapangan (SIPKL) Berbasis Mobile Menggunakan Metode Waterfall Nurdiana, Dian; Maulana, Muhamad Riyan; Aprijani, Dwi Astuti; Amastini, Fitria; Utama, Moh. Rizky Putra Aji
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Youtube merupakan platform video paling populer di dunia saat ini. Banyak video viral di Youtube dari Indonesia. Tapi, membuat video viral di Youtube adalah tantangan yang berat, baik untuk berpengalaman YouTuber dan khususnya untuk youtuber baru. Penelitian ini akan berfokus pada menemukan sifat video viral dengan mengelompokkannya ke dalam kelompok yang berbeda. Algoritma Fuzzy C-Maeans digunakan untuk proses clustering. Tujuan dari proses clustering ini adalah untuk mencari pola dalam data yang sebelumnya tidak terlihat. Hasil menunjukkan bahwa video dibagi menjadi tiga kelompok yang dibangun dari 3 variabel; view_count, likes, comment_count. Pola dan wawasan yang ditemukan dalam penelitian ini dapat berguna bagi calon pembuat video yang ingin meraih kesuksesan sebagai Youtuber. Hasil analisis cluster yang dilakukan memiliki 3 cluster dengan 10184 video berada di cluster 1 dengan indikasi tidak trending, 551 video berada di cluster 2 dengan indikasi sangat trending dan 35 video berada di cluster 3 dengan indikasi trending. Adapun pengujian dan evaluasi kualitas cluster yang terdapat pada sistem menggunakan silhouette dengan hasil mencapai 0.8778072603970618 mendekati angka 1
SISTEM DETEKSI DAN PEMANTAUAN PENCEMARAN UDARA BERBASIS IOT: SISTEM DETEKSI DAN PEMANTAUAN PENCEMARAN UDARA BERBASIS IOT Andre Megantoro, Andre Megantoro; Saidah, Sofia; Sevierda, Raniprima
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Berdasarkan Kementerian Lingkungan Hidup dan Kehutanan (2021), emisi kendaraan bermotor berkontribusi 70% terhadap polusi Nitrogen Oksida (NOx), Karbon Monoksida (CO), Sulfur Dioksida (SO2) dan Particulate Matter (PM) di daerah perkotaan. Penelitian ini bertujuan untuk mengukur kualitas udara dan pemantauan karbon monoksida dan gas amonia berupa alat deteksi dan pemantauan polusi udara berbasis IoT. Penelitian ini menggunakan metode penelitian System Engineering yaitu studi pustaka, analisis kebutuhan, desain sistem, pengembangan perangkat keras, pengembangan perangkat lunak, integrasi komponen, uji coba dan evaluasi, analisis data dan kesimpulan. Perangkat ini terdiri dari serangkaian sensor yaitu MQ-135, sensor MQ-7, Arduino Uno, ESP8266 sebagai alat yang terhubung ke internet dan perangkat lunak telegram. Data yang diperoleh dari sensor ditransmisikan ke Arduino Uno, kemudian ke ESP8266 secara nirkabel. Data pengukuran ditampilkan di kolom bot obrolan perangkat lunak telegram. Hasil penelitian menunjukkan bahwa sistem deteksi dan pemantauan udara berbasis iot menghasilkan deteksi beberapa parameter kadar gas CO dan NH3 pada beberapa objek, yaitu asap kendaraan, asap rokok elektrik, asap tembakau, dan parfum. Data kualitas udara yang diperoleh dari sensor dapat ditampilkan secara real-time melalui telegram dan disimpan dalam database. Sistem akan menampilkan peringatan "Tolong Gunakan Masker" yang muncul di aplikasi bot telegram ketika gas yang terindentifikasi melebihi ambang batas. Keywords: Gas, Kualitas udara, Sensor MQ-135, Sensor MQ-7.
ANALISIS DAN DETEKSI SERANGAN SQL INJECTION PADA JARINGAN KEAMANAN PAYMENT GATEWAY Adhitya Bagus Putra Erlangga; Leanna Vidya Yovita; Sevierda Raniprima
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Keamanan sistem pembayaran elektronik melalui payment gateway sangat penting untuk menjaga integritas dan kepercayaan dalam transaksi finansial online. Dalam era digital, website top-up games menjadi komponen penting dalam industri game, namun sering menjadi target serangan, terutama melalui teknik SQL Injection. Penelitian ini bertujuan untuk menganalisis dan mendeteksi potensi kerentanan terhadap serangan SQL Injection pada sistem pembayaran elektronik.Metodologi penelitian melibatkan pengujian penetrasi menggunakan payload SQL Injection dengan pernyataan Data Manipulation Language (DML) dan Data Definition Language (DDL). Tujuannya adalah untuk memahami respons aplikasi terhadap serangan yang mencoba memanipulasi data di dalam database dan mengevaluasi apakah aplikasi memiliki lapisan keamanan yang memadai untuk melindungi struktur database. Hasil pengujian menunjukkan bahwa sistem memiliki mekanisme keamanan yang cukup efektif dalam mendeteksi dan mencegah serangan SQL Injection. Meskipun beberapa serangan berhasil, yang mengindikasikan adanya celah keamanan, sebagian besar serangan gagal berkat mekanisme keamanan yang ada. Hasil ini memberikan wawasan mendalam tentang kerentanan keamanan dan langkah-langkah mitigasi yang diperlukan untuk memperkuat keamanan sistem. Keywords: Data, Database, Injeksi SQL, Keamanan Siber.
Development and Implementation of Mobile Application for Warehouse Inventory Reporting System Julian Ega Prabowo; Sela, Enny Itje
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The company is engaged in the sale of emping mlinjo crackers and currently still uses manual recording methods to manage its operational activities. The main problem faced is the process of making monthly reports to record the movement of goods in and out of goods and monitor the stock of finished goods and raw materials. Along with the rapid growth of the company, this manual method has become inefficient in handling the high volume of goods and many daily transactions. This often leads to errors and discrepancies in reports, resulting in less efficient distribution of goods. This research aims to digitize the warehouse management system of warehouse management by developing a reporting application for the emping warehouse. goods. This application is designed to monitor the movement of goods and generate reports digitally. It is expected that this application will improve operational efficiency by facilitating data recording and management by the SO (Sales Order) Team, Sales Order Team, Production Team, Distribution Team, and provide convenience for the owner as a super admin in managing warehouse activities. The research method used is interviews and observations to identify the problems faced by the company. Based on the findings, the design, development, and implementation of the application and system testing were carried out. Descriptive analysis was used to evaluate the impact of the application on warehouse management and company operations. The results showed that the application was effective in recapitulating incoming and outgoing goods, making it easier to generate reports, and calculating profit or loss from sales transactions. The app enables real-time monitoring, simplifies data input by employees, and increases transaction audit transparency. The digital reporting system simplifies warehouse management, improves operational efficiency, and reduces recording errors and stock management mistakes.
Metadata Management to Accelerate Big Data Implementation Yulfitri, Alivia; Indra Sensuse, Dana; Ulum, M. Bahrul; Fauzia Achmad, Yunita
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Big Data development often encounters obstacles in data quality even though it already has a data warehouse. The lack of high-quality data is the root cause of this issue. One of the causes is the failure to implement metadata management, which leads to issues with non-standardized data, a lack of a common understanding of the meaning and content of a data element, and the use of different data formats and formulas. This leads to a variety of data issues, including data duplication, inconsistent data, inaccurate data, outdated data, and unreliable data. This condition is impacting companies, especially data warehouse managers, who still face problems in cleaning, organizing, and managing data. Therefore, conducting research on metadata management is crucial to determining the necessary preparations for big data development and ensuring the provision of high-quality data. This research utilizes the DMBOK 2 framework, maturity instruments from Standford, and the technical framework from CMMI. The results of the research can help companies with metadata management improve big data implementation.
Value Chain Mapping Value Chain Mapping Based on Deep Learning in Cyber Security for Sustainability Development Smart Bandung City: Value Chain Mapping Based on Deep Learning in Cyber Security for Sustainability Development Smart Bandung City Wijaya, Rahmadi; Rosmiati, Mia; Hidayati, Hetti
Journal of Informatics and Communication Technology (JICT) Vol. 6 No. 2 (2024)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Smart City is a lifestyle of people who use computers or electronic media to make their information needs easier. Through digitalization, everyone can get a more efficient, controllable, economical, productive, integrated, and sustainable life. However, to get this progress, a model for developing smart city initiatives is needed and becomes a chain so that it can continue to be developed in the context of a smart city. Therefore, to develop global smart city technologies, a smart city must create a Value Chain Mapping (VCM). This paper aims to map the layers program with the currently running value chain mapping for smart city sustainable development. For this purpose, this research focused on the use of value chain mapping based on security services on smart city components: the environment and lifestyle, mobility, and health. Furthermore, deep learning methods as well as technology correlation in a smart city are explained. Mapping an environmental program layer using Deep Learning in Cyber Security services could prevent vulnerabilities that occur when implementing information technology
INFORMATION SYSTEM FOR MONITORING POSYANDU ACTIVITIES TO IMPROVE COMMUNITY HEALTH Marini Umi Atmaja, Dewi; Rahman Hakim, Arif; Basri, Amat; Rimbawan Oprasto, Raditya; Yakub; Gunawan, Jonathan
Journal of Informatics and Communication Technology (JICT) Vol. 7 No. 1 (2025)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Posyandu (Integrated Service Post) plays a vital role in improving community health by providing essential health services and recording health data. However, observations have shown that the process of recording and processing health data is still done manually, leading to delays in decision-making and inefficiencies in time management. This study aims to develop a web-based information system to monitor Posyandu activities, streamlining the processes of data recording, processing, and reporting, which are essential for health-related decision-making. The research employs the Prototype method and PIECES analysis framework to design and develop the system. The system is built using the PHP programming language and MySQL database. The implementation is carried out on a local network, with functional testing performed using Blackbox testing and software quality assessed using User Acceptance Testing (UAT) through a questionnaire method. The results show that the proposed system improves data processing efficiency, enhances the accuracy of health reports, and supports Posyandu cadres in delivering information quickly and making timely decisions. The system reduces dependency on manual data management, improving overall service delivery. The findings suggest that further research is needed in related areas to enhance system performance and service quality. Additionally, the system should be developed further with the latest technology to ensure effective and efficient health services.
Evaluation of Network Function Virtualization Efficiency in Network Traffic Management Rusdan, Muchamad; Hendayun, Mokhamad; Kuswayati, Sri
Journal of Informatics and Communication Technology (JICT) Vol. 7 No. 1 (2025)
Publisher : PPM Telkom University

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study investigates the efficiency of Network Function Virtualization (NFV) in managing network traffic using a simulation-based experimental approach. NFV offers flexibility, scalability, and cost-efficiency by replacing hardware-based functions with software-based services. The research involves the deployment of Virtual Network Functions (VNFs) such as firewalls, load balancers, and intrusion detection systems within a simulated environment using tools like Mininet, OpenStack, and GNS3. Performance was evaluated under varying traffic conditions—normal, moderate, and high load scenarios—by measuring latency, throughput, jitter, CPU, and memory usage. The findings indicate that while NFV performs comparably to traditional systems under low to moderate load, it suffers from performance degradation under high traffic, particularly in latency and resource utilization. However, the integration of intelligent orchestration and dynamic resource management can mitigate these limitations. The results suggest that with proper optimization, NFV can serve as a viable alternative to traditional network infrastructure, especially in supporting next-generation network applications. This study contributes to the understanding of NFV’s operational performance and provides recommendations for its deployment in modern networks.