cover
Contact Name
Suharsono Bantun
Contact Email
suharsonobantun@gmail.com
Phone
+6285341502090
Journal Mail Official
jayanti@usn.ac.id
Editorial Address
H. Supu Yusuf street, Korumba, Mandonga District , Kendari City,93461. Indonesia
Location
Kota kendari,
Sulawesi tenggara
INDONESIA
Jurnal Media Informasi Teknologi
Published by CV Digital Innovation
ISSN : 3047521X     EISSN : 30466970     DOI : https://doi.org/10.69616/mit
Media Informasi Teknologi has been published by Digital Innovation since January 2024. MIT contains manuscripts of research results in the fields of Information Technology and Computer Science. MIT is committed to publishing quality Indonesian language articles that can become the main reference for researchers in the fields of Information Technology and Computer Science. The scope of MIT is as follows: Domain Specific Frameworks and Applications : IT Management And IT Governance, e-Government, e-Healthcare, e-Learning, e-Manufacturing, e-Commerce, ERP dan Supply Chain Management, usiness Process Management. Smart Systems: Smart City, Smart Cloud Technology, Smart Appliances & Wearable Computing Devices, Robotic Systems, Smart Sensor Networks, Information Infrastructure for Smart Living Spaces, Intelligent Transportation Systems. Models, Methods and Techniques: Conceptual Modeling, Languages and design, Software Engineering, Information-centric Networking. Human Computer Interaction, Media, Game and Mobile Technologies, Data Mining, Information Retrievel, Information Security, Image Processing and Pattern Recognition, Remote Sensing, Natural Language Processing.
Articles 16 Documents
Design and Development of an Android-Based Interactive Learning Media for Grade VIII Statistics using the ADDIE Model Rahayu, Lestari; Prakisya, Nurcahya Pradana Taufik; Hatta, Puspanda; Wafa, Alfian Fawaidil; Herianto, Tulus Joseph
Jurnal Media Informasi Teknologi Vol. 2 No. 2 (2025): Oktober 2025
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v2i2.236

Abstract

In the 21st-century learning era, students in several regions of Indonesia still use conventional media such as whiteboards and textbooks in mathematics education. This leads to student boredom and relatively low learning outcomes because they are more interested in playing with smartphones rather than studying. The solution to this problem is to utilize Information and Communication Technology (ICT) as a learning medium. The purpose of this research is to develop, evaluate the feasibility, and determine user perceptions of an interactive Android-based learning media for Grade VIII statistics in junior high school. This research follows a research and development design consisting of three stages: development using the ADDIE method, feasibility analysis, and user perception analysis. The result of the development stage is a valid interactive Android-based learning media. The feasibility analysis results indicate that the media is highly feasible with a rating of 92.5% from media experts and 95% from subject matter experts. The user perception analysis shows that 84.4% of students strongly agree with the usefulness aspect of this media, and 89.5% of students strongly agree with the ease of use aspect. Therefore, it can be concluded that this interactive learning media is worthy, user-friendly, and beneficial in the learning process.
Enhancing Sales Reporting with Data Warehousing and Visualization: A Case Study at Graha Mas Sarasvananda, Ida Bagus Gede; Maryani, Putu Dian; Arnawan, I Nyoman
Jurnal Media Informasi Teknologi Vol. 2 No. 2 (2025): Oktober 2025
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v2i2.237

Abstract

This study aims to enhance the sales reporting process by implementing a data warehouse and interactive data visualization, with a case study at Graha Mas. The research adopts the Kimball Nine Step Methodology to guide the development of the data warehouse, supported by the Extract, Transform, Load (ETL) process using Pentaho Data Integration (PDI). Sales data sourced from Excel files undergoes batch processing to ensure data consistency and cleanliness before being stored in the warehouse. A star schema model was applied to structure the data warehouse, consisting of dimension tables for customers, products, and locations, and fact tables for sales categorized by customer, product, and city. The final data is visualized through Google Data Studio dashboards, enabling users to interactively explore sales trends by product, time period, and region. These visualizations assist business decision-makers in identifying high-performing products, monitoring regional sales distribution, and planning inventory more effectively. User acceptance testing (UAT) involving business users resulted in an acceptance score of 89%, indicating that the system meets user needs in terms of data clarity, accuracy, and usability. This research concludes that the proposed solution significantly improves the sales monitoring process at Graha Mas and can serve as a practical reference for similar businesses seeking to adopt cloud-based business intelligence solutions.
Control and Monitoring System for Lighting on Dragon Fruit Plants Kafriandeni, Okhari; Suhery, Cucu; Sari, Kartika; Malik, Abdul
Jurnal Media Informasi Teknologi Vol. 2 No. 2 (2025): Oktober 2025
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v2i2.238

Abstract

Dragon fruit plants require prolonged sunlight exposure to grow and develop optimally. One common practice among farmers is to provide artificial lighting at night. However, this lighting is still operated manually, which is considered less effective. To address this issue, this study developed a lighting control and monitoring system for dragon fruit plants. The system uses a NodeMCU ESP32 as the main controller, an LDR sensor for light detection, a relay module for lamp control, and Firebase with Flutter as the storage platform and real-time monitoring interface. The system is designed to automatically turn on the lamp when the light intensity detected by the LDR sensor falls below a predetermined threshold and to turn it off when the light is sufficient. Implementation of the system over two weeks produced a positive response to dragon fruit flowering, with blossoms appearing at several points on the plants. Accuracy testing of both the sensor readings and the automatic control system was conducted by comparing the number of correct data points with the total collected data. From a total of 5,131 data points recorded during testing, 4,745 matched the system’s logic, resulting in an accuracy of 92.47%. This result indicates that the system performs reliably in providing artificial lighting to extend the photosynthesis process in dragon fruit plants.
Implementation of Door Lock System Using Keyword and RFID Suwanty, Erina; Hidayati, Rahmi; Sari, Kartika
Jurnal Media Informasi Teknologi Vol. 2 No. 2 (2025): Oktober 2025
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v2i2.240

Abstract

Doors are an important element in a building that serve as a connection between rooms. Generally, door locking systems are still conventional, which have several shortcomings, such as being easy to duplicate. Therefore, this study developed a door locking system using a keyword and RFID (Radio Frequency Identification), as combining two security systems enhances security quality. Testing was conducted by collecting data on the performance of the Voice Recognition module at randomly selected distances ranging from 20 to 100 cm, with intervals of 20 cm between the user's voice and the microphone. Then, the RFID capability was tested under two different conditions: the first condition where the RFID card was not covered by a cover, and the second condition using a cover to simulate the condition of the card being inside a wallet or case, and finally, the overall system testing. Based on the test results conducted in this study, using both sensors with a total of 40 data points, the overall system achieved 100% accuracy.
One-Time Pad Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code Asrofa, Muhammad Dito; Bahri, Syamsul; Kasliono, Kasliono
Jurnal Media Informasi Teknologi Vol. 2 No. 2 (2025): Oktober 2025
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v2i2.248

Abstract

The increasing use of the Internet of Things (IoT) in security systems such as Smart Doors has created new challenges for data security, especially the risk of wiretapping through sniffing attacks. This research proposes applying the One-Time Pad (OTP) XOR algorithm as an encryption method to protect QR Code-based data transmission in the Smart Door system. The implementation is carried out on three main communication paths: sending UUID from the server to the user's website, sending the results of QR Code scanning from ESP32-CAM to the server, and sending instructions from the server to the ESP32 device. The test results show that the resulting ciphertext is always different even though the plaintext is the same, with a 0% algorithm identification success rate by Cipher Identifier and a 100% resistance level to brute force XOR, based on testing using dCode.fr tools. In addition, the encryption and decryption processes are very fast, with an average encryption time on the ESP32-CAM of 0.34 milliseconds and an average decryption time on the ESP32 of 0.17 milliseconds. These results show that the OTP XOR algorithm is able to disguise data against basic cryptanalysis attacks and can be run on IoT devices that have limited resources. In the future, it is suggested to apply better key management methods such as pre-shared key (PSK), key rotation, or key derivation function (KDF) to improve the security of key distribution in this symmetrical system. In addition, the security system can be improved through separating the OTP key transmission path using an approach such as Out-of-Band Key Exchange or asymmetric key wrapping with the RSA algorithm so that the key remains protected even if sniffing occurs.
Vigenere Cipher Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code Arasyid, Riski; Bahri , Syamsul; Kasliono
Jurnal Media Informasi Teknologi Vol. 3 No. 1 (2026): Februari 2026
Publisher : Digital Innovation

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.69616/mit.v3i1.250

Abstract

The Smart Door system based on the Internet of Things (IoT) using QR Code offers automated access but remains vulnerable to data sniffing attacks. This study implements the Vigenère Cipher algorithm to encrypt transmitted data and analyzes the ciphertext's resistance to attacks as well as its impact on communication delay. The system is built using ESP32-CAM as the QR scanner and NodeMCU ESP32 as the main controller, with encryption applied across three communication paths: ESP32-CAM to server, server to database, and server to ESP32. Testing involved data sniffing, delay analysis, and ciphertext evaluation using tools such as dCode and CryptoTool. From 20 sniffed QR Code results, 10 random samples were tested, and only 3 were recognized as Vigenère Cipher and none were decrypted successfully. In the server-to-ESP32 path, only 1 out of 10 ciphertexts was detected and all remained undeciphered. The average delay was recorded at 2.473 seconds (door unlocking) and 3.491 seconds (buzzer activation), with variations due to network stability. The results indicate that Vigenère Cipher effectively enhances data security in resource-constrained IoT devices, although delay optimization is needed to meet real-time system requirements.

Page 2 of 2 | Total Record : 16