cover
Contact Name
Agus Tedyyana
Contact Email
agustedyyana@polbeng.ac.id
Phone
+6285289866666
Journal Mail Official
jurnaoinformatika@polbeng.ac.id
Editorial Address
Jl. Bathin alam, Sungai Alam Bengkalis-Riau 28711
Location
Kab. bengkalis,
Riau
INDONESIA
INOVTEK Polbeng - Seri Informatika
ISSN : 25279866     EISSN : -     DOI : https://doi.org/10.35314
Core Subject : Science,
The Journal of Innovation and Technology (INOVTEK Polbeng—Seri Informatika) is a distinguished publication hosted by the State Polytechnic of Bengkalis. Dedicated to advancing the field of informatics, this scientific research journal serves as a vital platform for academics, researchers, and practitioners to disseminate their insightful findings and theoretical developments. Scope and Focus: INOVTEK Polbeng - Seri Informatika focuses on a broad spectrum of topics within informatics, including but not limited to Web and Mobile Computing, Image Processing, Machine Learning, Artificial Intelligence (AI), Intelligent Systems, Information Systems, Databases, Decision Support Systems (DSS), IT Project Management, Geographic Information Systems, Information Technology, Computer Networks and Security, and Wireless Sensor Networks. By covering such a wide range of subjects, the journal ensures its relevance to a diverse readership interested in both the practical and theoretical aspects of informatics.
Articles 189 Documents
Information Technology Risk Management Using ISO 31000 Based on the ISSAF Penetration Testing Framework Mgs Afriyan Firdaus; Muhammad Egi Perdianza; Dwi Rosa Indah
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/1tq72v53

Abstract

Information security is critical for higher education institutions, which manage large amounts of sensitive data in the digital age. Data breach incidents in Indonesia's academic sector reached 2,217 in 2021. A university website with 36 web-based information system services was found to have been defaced.  SQL injection and XSS attacks, which can lead to data breaches, system manipulation, and disruption of academic services, are also common. These attacks underscore the importance of strong security measures to protect data and preserve the reputation of education. This research assesses the security risk of the XYZ University website using the ISSAF and ISO 31000. ISSAF was applied in four stages: information gathering, network mapping, vulnerability identification, and penetration testing with customization for university web systems. ISO 31000 was used to assess risk severity, resulting in classifications of two high, six medium, and twelve low risks. Security recommendations were developed to address the key risks and can be applied to other universities facing similar threats. The findings provide great insight for educational institutions to strengthen their cybersecurity. Implementing appropriate measures not only improves privacy, but also builds trust and reputation. Proactive information security is becoming a critical asset for the sustainability and credibility of higher education institutions in this vulnerable digital age    
Enhancing the Efficiency of Customer Data Search in Pamsimas Using QR Code Technology Wildan Razzaq Pratama; Yuli Purwati; Ali Nur Ikhsan
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/h1dj9q42

Abstract

Pamsimas is a government program aimed at providing clean water access for rural communities, including Desa Melung, which manages these services through BUMDes Alam Lestari. However, the customer data retrieval process on BUMDes's website is still manual, impacting both efficiency and accuracy. This study aims to improve data retrieval efficiency by implementing QR code technology. Each customer is assigned a unique code that can be scanned to quickly access their information. Testing results indicate that the QR code implementation reduced data retrieval time by 65% and lowered recording errors by 45%, thus expediting service processes and enhancing customer satisfaction. These findings suggest that QR codes are effective in enhancing operational efficiency and data management accuracy in public service sectors.
Implementation of Test Item Analysis for Learning Evaluation at SMAS YKPP Dumai Pulla Pandika Widodo
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/q663kt04

Abstract

The activity of analyzing items is an activity that must be carried out by the teacher, this is done to evaluate the quality of the test questions used during the exam. So far, teachers have used the anbuso excel application to complete the analysis. The existing application requires entering student answer data and question answer keys one by one, this allows data errors when entering student answer data, and can be imagined if the teacher teaches more than one class it will take more time to be able to complete the analysis and increase the teacher's workload. This research aims to create a question analysis application with the codeigneter framework to help teachers get question analysis results quickly and efficiently without the need to enter student answers one by one. The application created presents analysis data based on the level of difficulty, differentiating power and function of the examiner which is made in tabular form so that it is easy to read. The application provides several users such as teachers, students and admins with different menu access rights. This application allows teachers to enter or change questions along with the answer key, view answer results and get question analysis. Students can get the results of the exam answers available after the exam. For admins, it helps in managing user data, monitoring exam students and activating exams. From the results of the analysis produced by the application, the teacher can use the question criteria.
Designing a Square Transposition Algorithm with a Spiral Schematic hendrikpatiung
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/733ehe89

Abstract

This study aims to improve the security of the square transposition algorithm by implementing a spiral scheme as a more complex character position randomization method. Conventional square transposition algorithms have limitations in the variety of encryption patterns, which can reduce their effectiveness in protecting data from pattern-based cryptanalysis attacks. The spiral scheme is implemented by determining the order of placement and retrieval of characters in the transposition box in a circular manner, both from the outside to the inside and from the center point out, following a non-linear pattern. This method is designed to produce a low correlation between plaintext and ciphertext, thereby increasing the level of randomness in the encryption process. In this study, the effectiveness of the spiral scheme is evaluated through statistical analysis and cryptanalysis tests to measure the level of randomness and security of the encryption results compared to the linear transposition pattern. The test results show that the spiral scheme successfully increases the complexity of the ciphertext structure, making it more resistant to pattern analysis-based attacks. The implementation of this spiral scheme is expected to make a significant contribution to the development of more secure encryption techniques, especially for applications that require high protection against digital security threats. Thus, this method offers a stronger alternative in improving data security without requiring high computational complexity.
Comparison of ArcFace and Dlib Performance in Face Recognition with Detection Using YOLOv8 Berliana Wahyu nurlita; Sri Winarno; Adhitya Nugraha; Almas Najiib Imam Muttaqin; Yasmin Zarifa; Pramesya Mutia Salsabila; Ghina Fairuz Mumtaz7
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/3jy3dy73

Abstract

This study compares the performance of ArcFace and Dlib models in face recognition with YOLOv8 used for face detection on a limited dataset. The evaluation used metrics such as accuracy, F1-score, recall, and precision. ArcFace, which employs the Additive Angular Margin Loss method, demonstrated superior performance with the highest accuracy of 0.90, precision of 0.90, recall of 1.00, and an F1-score of 0.95. Meanwhile, Dlib achieved an accuracy of 0.57, precision of 0.57, recall of 1.00, and an F1-score of 0.73. The aim of the study was to find the best model in terms of accuracy. ArcFace proved to be more accurate and suitable for applications requiring high reliability, such as advanced security systems, identity verification, and research that demands high precision in face recognition. Dlib, although less accurate, offers speed and simplicity, making it suitable for rapid prototyping and lightweight applications with limited resources. The results indicate that ArcFace outperforms in face recognition on limited datasets, while Dlib is more appropriate for simple applications requiring lightweight computation. This study provides guidance for developers in selecting the appropriate face recognition model to meet specific needs in both industry and research.
Implementation of a Network Security System Using the Port Knocking Method at Taruna Satria Vocational School Pekanbaru Zahra Amanda Indira Azmi
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/f5pjjj80

Abstract

SMK Taruna Satria Pekanbaru utilizes its network for teaching and school administration activities. However, security issues have led to incidents where intruders gained access to the MikroTik webfig and altered configurations, such as changing hotspot passwords and adding unauthorized user profiles. Initial data shows that the network experienced up to a 30% performance drop due to illegal access, with a high potential for attacks, especially on HTTP (80), SSH (22), Telnet (23), and Winbox (8291) ports if left open. To address these issues, the Port Knocking method was implemented, which hides ports and only allows access to users who knock on the ports in a specific sequence. Legitimate users must knock on the ports in a designated order to activate access, which then adds their IP address to the whitelist. Access to services is granted only if the correct knocking sequence is followed within a specific timeframe. Testing through simulations of Port Scanning, brute force, and DDoS attacks has demonstrated this method’s effectiveness in hiding ports from scanning detection and reducing brute force and DDoS attack risks. Although effective, this method relies on accurate configuration patterns. Implementing Port Knocking is expected to enhance network security and reduce unauthorized access risks at SMK Taruna Satria Pekanbaru.
Mobile Application System For Point of Sales in Coffee Sales at Langit Coffee Space Yusril Aziz
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/tb6adx44

Abstract

The coffee shop industry in Indonesia is experiencing rapid growth, leading to intense competition among businesses. Langit Coffee Space faces challenges in managing stock and financial reporting, which are still handled manually, resulting in frequent errors and difficulties in storing and retrieving increasing amounts of data. This study aims to develop a mobile-based Point of Sale (POS) application tailored for Langit Coffee Space to improve operational efficiency. Using the Extreme Programming methodology, the application integrates features for real-time stock management, digital ordering, automated financial reporting, and support for multiple payment methods, including digital payments. Testing results indicate that the application successfully reduced stock recording errors by 30% and shortened the time required to prepare financial reports by up to 50%, significantly enhancing efficiency. Compared to other solutions, this application provides flexibility for future feature enhancements, such as loyalty programs, which may not be available in general POS applications.
Threads User Decline Analysis Using the Unfield Theory of Acceptance and Use of Technology method Hafiz Zikra hafiz
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/h5mhed60

Abstract

Threads is the fastest growing software application in history, its success did not last long. users of this application fell more than 75% within 5 days. the purpose of this study was to determine the factors that cause the decline in Threads users. Measurement of user decline was carried out using the Unfield Theory of Acceptance and Use of Technology (UTAUT) using quantitative methods. Several previous studies that tested factors to encourage the use of a system showed that the UTAUT model was proven to be able to explain the acceptance of a technology. Case study on the Threads community with a required sample size of 97 based on the lemeshow formula. The results of the study showed that the variables of performance expectations, facilitation conditions, social influence, had a positive effect on the decline in interest in use. The results of the research analysis showed that the use of Threads did not encourage deep interaction so that users felt less involved and lost motivation to actively subscribe, reviews or suggestions not to use Threads and the lack of superior features that differentiate Threads from other platforms. Influenced the decline in interest in using Threads.  
Development of Information System for Asset Management Safara Cathasa Riverinda Rijadi; Sinung Suakanto
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/jpp2kr39

Abstract

An information system for asset management in a university is very important, especially in a faculty with many majors. There are a lot of assets, including laboratories and items inside. In this research, the authors present the development of an information system using feature-driven development (FDD) methodology, which is one of the agile methods, giving flexible and collaborative methods prioritizing main users. To communicate between stakeholders, the development of initial models using UML diagrams, such as use case diagrams, sequence diagrams, and deployment diagrams. The modules on this asset management website are administration for building and room data, asset categorization, asset search, and asset maintenance and problem reporting. The website was developed using PHP with a Laravel framework and MySQL database. This website is beneficial for increasing the efficiency of assets, with future development involving more advanced technology.
Design and Implementation of Tangerang Regency Korpri and Cooperative E-Commerce Service Applications Irma Yuningsih; Baihaqi Yogie Prasetyo; Samidi
INOVTEK Polbeng - Seri Informatika Vol. 9 No. 2 (2024): November
Publisher : P3M Politeknik Negeri Bengkalis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35314/0k156p07

Abstract

Public services and cooperatives play a crucial role in the local economy. The Koperasi Korpri in Tangerang Regency faces challenges in providing efficient and effective access to its members due to the cooperative building's location, which is not always easily accessible. With advancements in information technology, there is an urgent need to modernize the way services are provided, especially through digital solutions. This project aims to design and implement a service application for Korpri and e-commerce for the Tangerang Regency Cooperative. The goal is to enable Korpri members to access cooperative services without physical location constraints, enhance the efficiency and transparency of transactions, and provide a platform that can be accessed via mobile devices. The project uses the SDLC (Software Development Life Cycle) methodology, which consists of five main stages: planning, analysis, design, implementation, and maintenance. Each stage includes various activities such as requirements identification, UI/UX design, frontend and backend development, application testing, and deployment. It is expected that the resulting application will address geographical challenges and improve the cooperative's operational efficiency. This application is anticipated to enhance transparency and member trust through easily accessible transaction records and provide an intuitive and user-friendly interface. Additionally, the application is expected to strengthen the cooperative's digital infrastructure, support local economic growth, and improve the welfare of cooperative members.

Page 4 of 19 | Total Record : 189