cover
Contact Name
Andri Nofiar
Contact Email
garuda@apji.org
Phone
+6285885852706
Journal Mail Official
febri@apji.org
Editorial Address
Perum Cluster G11 Nomor 17 Jl. Plamongan Indah, Kadungwringin, Pedurungan, Semarang, Provinsi Jawa Tengah, 50195
Location
Kota semarang,
Jawa tengah
INDONESIA
Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika
ISSN : 30318904     EISSN : 30318912     DOI : 10.61132
Core Subject : Science,
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika memuat naskah hasil-hasil penelitian di bidang Sistem Informasi dan Teknik Informatika
Articles 242 Documents
Implementasi Network Automation untuk Backup Konfigurasi Perangkat Jaringan Melanie Putria; Agustinus Marcello Soebiantoro; Harry Aprianto; Wasis Haryono
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.929

Abstract

PT Multipolar Technology Tbk is a leading information technology (IT) solutions provider in Indonesia, specializing in system integration, IT consulting, and outsourcing services. As part of the Lippo Group business ecosystem, the company plays a pivotal role in driving digital transformation across various industries, including banking, retail, telecommunications, and government sectors. Through strategic partnerships with global technology leaders such as IBM, Oracle, Cisco, and Microsoft, Multipolar Technology delivers comprehensive solutions encompassing hardware, software, cloud services, and data center infrastructure. Additionally, through its subsidiary PT Visionet Data Internasional (VisioNet), the company offers large-scale managed services. Its commitment to service excellence and technological advancement positions Multipolar Technology as a trusted partner in the digital journey of organizations throughout Indonesia.
Analisis Sentimen Masyarakat terhadap Program Makan Siang Gratis di Indonesia Tahun 2024 Menggunakan Long Short-Term Memory (LSTM) Silvia Amara; Novriyenni, Novriyenni; Muammar Khadapi
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.930

Abstract

The free lunch program is a goverment initiative aimed at addressing the issue of stunting in Indonesia. This program focuses on toddlers, school-age children and pregnant women. Various opinions have emerged from the public regarding this initiative, especially through sosial media platform X (Twitter) and news portals. In this research, sentiment analysis was conducted to understand public responses to the program, whether they are positive, neutral or negative. To evaluate the accuracy of the sentiment analysis perfomed, a deep learning approach was applied using the Long Short-Term Memory (LSTM) algorithm. The results show that public sentiment varies responses, on social media X tend to be negative, while those on news portals tend to be positive toward the free lunch program in Indonesia. Through LSTM-based testing, sentiment analysis on tweet data achieved an accuracy of 88.6%, with a precision of 84.6%, recall of 88.6% and an F1-Score of 86.3%. Meanwhile, sentiment analysis on news portal data reached an accuracy of 89%, with a precision of 81.7%, recall of 89% and an F1-Score of 85.1%.
Analisis Kepuasan Pengguna Jaringan WiFi di Badan Pusat Statistika Lombok Tengah dengan Metode Servqual Rial Husne; Sofiansyah Fadli
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.931

Abstract

Reliable internet connectivity is a crucial element in supporting work effectiveness at the Central Bureau of Statistics (BPS) in Central Lombok. However, users of the internal WiFi network have reported various issues, including inconsistent speed and weak signal stability. This study aims to analyze user satisfaction with the WiFi network services using the Servqual method, which assesses service quality based on five dimensions: tangibles, reliability, responsiveness, assurance, and empathy. A quantitative approach was employed by distributing questionnaires to employees and staff who utilize the network. Data analysis was conducted by measuring the gap between users’ expectations and their perceptions of the service quality. The results show that most dimensions experienced a negative gap, particularly responsiveness (-0.47) and tangibles (-0.40), indicating inadequate response speed and suboptimal infrastructure conditions. Conversely, assurance (+0.40) and empathy (+0.27) showed positive gaps, reflecting users’ trust in the competence of IT staff and their perceived attentiveness. These findings highlight the need for technical evaluations, infrastructure improvements, and capacity building of human resources through regular training. This research contributes to the understanding of information technology service quality in the public sector and provides a foundation for strategic decision-making to enhance digital services. Moreover, the study encourages further research using mixed methods to gain a more comprehensive understanding of user satisfaction with WiFi services in government institutions.
Implementasi Metode Optical Character Recognition (OCR) untuk Deteksi Karakter pada Citra Plat Nomor Kendaraan Bermotor Mohammad Ridwan Bayu Pratama; Asrorul Faradis; Soffiana Agustin
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.938

Abstract

Manual collection of vehicle license plates is often inefficient and prone to errors, so an automatic identification system is needed. This research aims to implement and evaluate the performance of a license plate character detection system, focusing on the accuracy comparison between black and white base plates in Indonesia. The method used is Optical Character Recognition (OCR) with image preprocessing workflow including Grayscale, Gaussian Blur, and edge detection implemented in Google Colab. The system was tested using 100 primary data samples consisting of 50 black base plates and 50 white base plates. The findings showed that the system achieved a combined average accuracy of 84.36%. Specifically, it was found that the accuracy on the black base plate (85.40%) was slightly superior to that on the white base plate (83.32%). The implication of this study is that the change in license plate standards has a measurable technical impact on the ANPR system, where the findings can serve as a foundation for developers to calibrate the system to be reliable on both plate types during the transition period.
Penerapan Metode K-Means Clustering dalam Menentukan Strategi Operasi P2tl Berdasarkan Data Pelanggaran Pelanggan: (Studi Kasus : PT. PLN (Persero) UP3 Binjai) Indah Permata Sari; Hotler Manurung; Suci Ramadani
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.940

Abstract

PT. PLN (Persero) UP3 Binjai faces challenges in handling electricity usage violations that increase every year. Lack of utilization of data violations that can be utilized to produce useful information in supporting strategic decision making by PLN, especially in the implementation of Electricity Usage Control (P2TL) activities. This study aims to identify customer violation patterns based on rayon, power, and type of violation with data mining methods using the K-Means Clustering algorithm. The results of the study show that the 3rd cluster represents the most violation-prone area, namely in the West Binjai Rayon, with a power of 450 VA and the most frequent type of P2 violation. The results of the study show that the K-Means algorithm with the Elbow method is able to systematically group data violations based on certain characteristics. The results of this study can provide recommendations to PLN UP3 Binjai to improve the effectiveness of monitoring and enforcement strategies through a more targeted approach.  
Perancangan Sistem Informasi Pelayanan Kantor Desa Berbasis Website Menggunakan PHP di Desa Serasah Kecamatan Pemayung Kabupaten Batang Hari Saidul Mubarok Afifuddin Syah; Bastomi Baharsyah; Albet Triadi
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.942

Abstract

In the current era of digitalization, villages are expected to follow technological developments to modernize correspondence services. Village administration services delivered via the internet enable the village government to communicate information quickly and simply to all village officials, the community, village organizations and the community within the village. Apart from that, the community can submit input to the village government through village information services to direct development in a more positive direction. The problem in Serasah Village that often occurs is that the village head and office staff concerned with carrying out services are often not at the village office because they are out of town on business or there are sub-district meetings and currently there are additional activities in the form of training. electrical installation from BLKP Jambi. So many residents experience obstacles because of this, in fact, some residents who live far from the office area often receive less than optimal service. Based on this problem, it is necessary to design an information system at the Serasah Village office which will take the form of a website which has features regarding information regarding news and activity agendas that will be carried out at the Serasah Village Office, features for online letter submission services and checking the status of letter submissions made. by society. The system development method used to develop websites is the waterfall model. After creating the website, the website testing stage was carried out using the black box testing method with successful test results and a feasibility test was carried out using a Likert scale model. The results of the feasibility test were carried out using a questionnaire and data was obtained with an average percentage of 81.6%.
Analisis Manajemen Risiko Teknologi Informasi pada Dinkominfo Surabaya Menggunakan Metode Failure Mode and Effect Analysis (FMEA) Fidyah Salsabila Putri Sillehu; Marisca Amanda Hidayat; Raihana Sakhi Aswanda; Audrey Septya Rosanti; Agung Brastama Putra; Amalia Anjani Arifiyanti
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.947

Abstract

The use of information technology (IT) in the government sector requires structured risk management to ensure the continuity of public services. The Department of Communication and Information Technology (Dinkominfo), as a digital service provider, faces various potential risks such as network disruptions, hardware failures, and cyberattacks that could interfere with daily operations. This study employs the Failure Mode and Effect Analysis (FMEA) method to identify, analyze, and formulate strategies to mitigate existing IT risks. Through the FMEA approach, each potential failure is evaluated based on its severity, occurrence, and detection capability, which are then used to calculate a Risk Priority Number (RPN). The analysis reveals that the highest RPN values are associated with information system errors, hardware failures, and network overloads. As mitigation measures, the study recommends conducting regular system audits, upgrading network capacity, and performing preventive maintenance on devices. This approach demonstrates that FMEA is an effective method for managing IT risks within government institutions.
Perancangan Sistem Informasi Absensi Berbasis Website Menggunakan Model Pengembangan Waterfall Gilang Perdana; Damars Alfi Syahri; Chairina Fachrunnida; Wasis Haryono
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.948

Abstract

Employee PT TRAFINDO PRIMA PERKASA is a company engaged in the medium voltage electrical equipment industry. The employee attendance system currently in place at PT TRAFINDO PRIMA This is still done manually, starting from recording employee entry times, recording employee exit times to making employee attendance reports. Therefore, during the recording process, there is a possibility of errors, or the resulting report is less precise and slow in finding the required data. The research method applied is the waterfall method. This employee attendance information system is web-based. With this application, the attendance information system will be better than the manual system, so that it can operate more effectively and efficiently, and this system will be more supportive and improved when compared to the previous system. In addition, the best solution is to use a computerized system that can solve various problems in this company, to support activities within the company.
Analisis Keamanan Layanan SSH terhadap Brute Force Attack Putri Balqis; Rakhmadi Rahman
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.949

Abstract

To securely access servers remotely, an important protocol in the modern era is Secure Shell (SSH). However, brute force attacks, which are automated attempts to guess repeated username and password combinations, are often the main target of this service. The purpose of this research is to evaluate the vulnerability of SSH services to brute force attacks and evaluate how effective Fail2Ban is as a mitigation tool. This method uses simulated experiments with two virtual machines; Kali Linux is used as the attacker with the Hydra tool and Ubuntu Server is used as the target. The results show that SSH is highly vulnerable to brute force attacks if not protected. Hundreds of login failures from the same IP without restrictions show this. After using Fail2Ban, the system can automatically find and block the attacker IP after three unsuccessful logins. With easy configuration and fast threat detection, Fail2Ban has been proven to improve the security of SSH services. This study suggests using Fail2Ban to improve the defense of SSH services against cyberattacks, especially brute force attacks.
Sistem Pakar Diagnosa Kerusakan Notebook Berbasis Web Menggunakan Metode Certainty Factor dengan Pengujian Blackbox Riston Burju Jordan Simatupang; Nur Nawaningtyas Pusparini
Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika
Publisher : Asosiasi Riset Teknik Elektro dan Informatika Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61132/merkurius.v3i4.955

Abstract

An expert system is a computer program designed to imitate the decision-making ability of an expert in a particular field, combining knowledge and rules obtained from experts to diagnose problems, provide advice, or make complex decisions, especially in notebook damage, so this requires the design of an expert system application for diagnosing notebook damage based on a website for users who support the diagnosis process using the certainty factor method, in terms of explaining the certainty factor which has a concept based on symptoms and diagnoses from the weight of an expert's value and the user's value, then calculated using the formula in CF, the final result is the creation of a website-based notebook damage diagnosis expert system.

Filter by Year

2023 2026


Filter By Issues
All Issue Vol. 4 No. 1 (2026): Januari : Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 6 (2025): November: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 6 (2025): November: Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 5 (2025): September : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 4 (2025): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 3 (2025): Mei : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 2 (2025): Maret: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 2 (2025): Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 1 (2025): Januari: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 3 No. 1 (2025): Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 6 (2024): November: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 6 (2024): November: Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 5 (2024): September: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 5 (2024): September : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 4 (2024): Juli: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 4 (2024): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 3 (2024): Mei: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 3 (2024): Mei : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 2 (2024): Maret: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 2 (2024): Maret : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 2 No. 1 (2024): Januari : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 1 No. 5 (2023): September: Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 1 No. 4 (2023): Juli : Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 1 No. 4 (2023): Juli: Merkurius: Jurnal Riset Sistem Informasi dan Teknik Informatika Vol. 1 No. 2 (2023): Maret: Merkurius : Jurnal Riset Sistem Informasi dan Teknik Informatika More Issue