cover
Contact Name
Hapnes Toba
Contact Email
hapnestoba@it.maranatha.edu
Phone
+6222-2012186
Journal Mail Official
hapnestoba@it.maranatha.edu
Editorial Address
Fakultas Teknologi dan Rekayasa Cerdas Universitas Kristen Maranatha Jl. Prof. Drg. Suria Sumantri No. 65 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
ISSN : 24432210     EISSN : 24432229     DOI : https://doi.org/10.28932/jutisi
Core Subject : Science,
Paper topics that can be included in JuTISI are as follows, but are not limited to: • Artificial Intelligence • Business Intelligence • Cloud & Grid Computing • Computer Networking & Security • Data Analytics • Datawarehouse & Datamining • Decision Support System • E-Systems (E-Gov, E-Health, E-Commerce, etc.) • Enterprise System (SCM, ERP, CRM) • Human-Computer Interaction • Image Processing • Information Retrieval • Information System • Information System Audit • Enterprise Architecture • Knowledge Management • Machine Learning • Mobile Computing & Application • Multimedia System • Open Source System & Technology • Semantic Web & Web 2.0
Articles 479 Documents
Pengembangan Sistem Informasi Penjadwalan dan Manajemen Keuangan Kegiatan Seminar dan Sidang Skripsi/Tugas Akhir (Studi Kasus Program Studi Sistem Informasi UNIKOM) Julian Chandra Wibawa; Muhammad Rajab F.
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.661

Abstract

Saat ini penerapan teknologi informasi banyak dimanfaatkan dalam berbagai bidang, tidak terkecuali pada bidang pendidikan. Pada sebuah instansi pendidikan tentunya sangat membutuhkan sistem informasi dalam mengatur kegiatan akademik yang cepat, efektif, efisien, akurat untuk meningkatkan standar mutu pendidikan pada instansi pendidikan tersebut. Kegiatan akademik, terutama pada kegiatan penjadwalan dan manajemen keuangan untuk seminar dan sidang tugas akhir / skripsi di Program studi Sistem Informasi UNIKOM perlu didukung oleh sistem infomasi berbasis teknologi informasi yang dapat memudahkan kegiatan tersebut. Permasalahan yang terjadi saat ini antara lain pembuatan jadwal yang memakan waktu yanglama dan sering kali terjadi bentrok, hingga proses perhitungan honorarium yang masih dilakukan secara manual sehingga beresiko terjadinya kesalahan perhitungan. Penelitian diawali dengan studi literatur, pengumpula data, perancangan, pengujian, dan penyajian perangkat lunak. Dengan adanya SISPMK (Sistem Informasi Penjadwalan dan Manajemen Keuangan) dapat membantu kegiatan penjadwalan kegiatan seminar dan sidang skripsi  / tugas akhir menjadi lebih mudah, meminimalisir resiko terjadinya bentrok antar dosen maupun ruangan kelas dan perhitungan honorarium dan pelapoan keuangan kegiatan seminar dan sidang skripsi  / tugas akhirmenjadi lebih cepat. Kata Kunci— Sistem Informasi, Penjadwalan, Manajemen Keuangan, Skripsi dan Tugas Akhir.
EVALUASI ALGORITMA RUNUT BALIK DAN SIMULATED ANNEALING PADA PERMAINAN SUDOKU Dyah Sulistyowati Rahayu; Arie Suryapratama; Azka Zulham Amongsaufa; Bheli Isya Kurniawan Koloay
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.662

Abstract

Sudoku is one of the popular puzzle games in many countries. How to solve this game is being the Non Polynomial Completeness problem. Because of that, a lot of research has been done to find the most effective algorithm completing Sudoku. This study presents the evaluation of algorithm in completing the Sudoku 2 x 2 and 3 x 3. The most common algorithm is brute force and backtracking. There is also simulated annealing algorithm. The evaluation is done by comparing the step of each algorithm to solve the Sudoku and also their running time. The result of this evaluation shows the differences of each algorithm characteristic in solving this Sudoku problem. By comparing the result of this study, the most effective algorithm can be chosen. Based on the test, concluded that the backtracking algorithm is more effective than the simulated annealing algorithm which the value reach 50%.
Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba) Agung Purnama Saputra; nur widiyasono
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.663

Abstract

Kemajuan teknologi selain membawa dampak positif juga membawa dampak negatif, beberapa contoh organized crime termasuk aktivitas yang mengarah pada terorisme dan perdagangan ilegal seperti narkotika, telah teridentifikasi memanfaatkan teknik steganography untuk berkomunikasi dan menyampaikan pesan-pesan diantara kelompoknya. Steganografi  merupakan  seni  dan  ilmu  menulis  atau  menyembunyikan pesan  tersembunyi  dengan  cara  tertentu  sehingga  selain  si  pengirim  dan  si penerima,  tidak  ada  seorang  pun  yang  mengetahui  atau  menyadari  bahwa  ada suatu  pesan  rahasia. maka peran digital forensik sebagai metode pembuktian suatu kasus kejahatan secara digital menjadi sangat penting, Digital forensik adalah penggunaan teknik analisis dan investigasi untuk mengidentifikasi, mengumpulkan, memeriksa dan menyimpan bukti/informasi yang secara magnetis tersimpan/disandikan pada komputer atau media penyimpanan digital sebagai alat  bukti dalam mengungkap kasus kejahatan yang dapat dipertanggungjawabkan secara hukum. Maksud dan tujuan dari penulisan tugas akhir ini adalah untuk menjelaskan cara menemukan bukti digital yang tersembunyi menggunkan teknik steganografi, sehingga informasi yang diperoleh merupakan sebuah fakta yang akurat sesuai peruntukannya. Terdapat banyak tools yang dapat digunakan dalam kasus forensik untuk memeriksabarang bukti, namun dalam penelitian ini tools yang digunakan adalah WinHex dan InvisibleSecrets.
Implementasi Metode Performance untuk Aplikasi Pemesanan Jasa Paket Dokumentasi (Studi Kasus : Quill Photo) Safila Marina Ramadhani; Adelia Adelia
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.664

Abstract

Quill Photo is a private business that offers photography services which still has many obstacles. Customers could only book the documentation service manually, by cell phone (to call or send a short text message to the institution). Administrator have constraints in data processing where the process is still done manually. Human Resources Development (HRD) experienced difficulty in confirming the schedule to the administrator, showing the photos to the customer, and determining the fastest performance of crew. The Logistics Section has a difficult thingto ship the photos. The execution of sending photos ineffective and inefficient when the number of the photos to be sent over quota. Therefore, the web-based application built with one method approach to Performance is expected to facilitate all users to perform activities relating to Quill Photo easily, especially for HRD which is in scheduling photo sessions and measuring the fastest performance of crew.
Tata Kelola pada Perguruan Tinggi Menggunakan Control Objective for Information & Related Technology (COBIT) 5 asriyanik asriyanik; Mokhamad Hendayun
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 1 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i1.665

Abstract

A College needs a good governance in implementation of information technology, especially which related with information security because information is an important asset. Framework which can be used for the preparation of information security governance is COBIT 5 from ISACA. The first  step to start the preparation of the governance using COBIT is mapping between the goal of college with enterprise goals (EG), IT Related Goals and domain process COBIT 5. From 15 colleges that have been accredited in West Java (15 Januari 2015), produced 13 EG related for college accreditation A, B and 10 for college accreditation EG C. For a sample in process capability assessment of information security governance, we used Universitas Muhammadiyah Sukabumi (UMMI) as the research object, which is an accredited college C, and EG focused on optimization of business process functionality associated with the alignment of IT goals of IT and business strategy, and 10 processes, i.e EDM01, EDM01, APO01, APO02, APO03, APO05, APO07, APO08, BAI01, BAI02. From the results obtained capability assessment process UMMI value of 7 is on level 0, ie the value of the attribute <15-50% and 3 process closer to fulfillment level 1, ie the interval> 50-85%. Gap analysis results, it turns out that making such UMMI lack of work products (evidence / result) of activities of governance processes deemed to have been executed. To meet the achievement level, it is recommended to perform compliance on each best practice and work products, and can be initiated by creating a guide to information security.
Sistem Antrian Online PT. Bank Negara Indonesia TBK Kantor Cabang Parigi Abdi Samuel Mango; Danny Manongga
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 2 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i2.668

Abstract

Abstract – Kebutuhan akan kemudahan pelayanan yang di dapatkan oleh Demand for ease of service in getting by the public from the World the Banking, has its own contribution hearts everyday life. Regardless of these advantages, the banking sector is also characterized by shortages arising from the application of the procedures used, especially within the PT. Bank Negara Indonesia TBK Parigi Branch Office is one branch of PT. Bank Negara Indonesia Manado region that wants continue to improve the pattern of banking services. The situation can be seen from the number of stacking of customers queuing for services provided by the Bank. Thus, this study will be focused on the simulation and implementation of Queue System Online at PT. Bank BNI branched office TBK Parigi. The aim of the implementation of this system is to reduce the accumulation of customers that can not be predicted. This study resulted in an online queue system that serves to reduce the number of queues that can not be predicted. Based on the application, there are advantages and disadvantages of such a system.   Keywords— Queues, bank, queuing systems, queuing systems online. 
Pemanfaatan Raspberry Pi untuk Hacking dan Forensic Ilham Taufiqurrohman; Nur Widiyasono; Husni Mubarok
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 2 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i2.669

Abstract

Cybercrime because of the people who are not responsible, with the aim of damaging, modifying, and eliminating one's data, one of them with hacking techniques to be able to infiltrate into the data storage makes it easy to commit a crime. Treatment can be performed on cybercrime using forensic science as a problem solver. Cybercrime has digital evidence as traces of a criminal case, with digital evidence forensic science analysis to find out what activities performed on a criminal case. This study analyzed digital evidence on the network by utilizing Raspberry pi as a medium for hacking the network and to obtain digital evidence on the network . The method used to perform analysis of digital evidence is NIST (National Institute of Standards and Technology). Keywords – Cybercrime, Digital evidence, Forensic Science, Hacking, NIST (National Institute of Standards and Technology), Raspberry Pi
Powerpoint Controller using Speech Recognition Christina Christina; Rosalina Rosalina; Raden Bagus Wahyu; Rusdianto Roestam
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 2 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i2.670

Abstract

During presentation, it is hard to maintain the slide because we need to stand in front of the room and often not able to touch the computer. The presenters need to take attention at both their voice, and body language such eye contact, facial expression, posture, gesture, and body orientation. Microsoft PowerPoint is a simple but very useful tool to create digital presentation. Even though it is simple to use, but this application required the presenter to take control while using it, such as to star the slide show or moving it to the next slide. The purpose of this research is to minimize physical contact between user and the computer during the presentation by controlling the move of the slide using voice. This research will implement the Hidden Markov Model algorithm and Sphinx-4 library.
AUDIT SISTEM INFORMASI ABSENSI PADA PT. BANK CENTRAL ASIA TBK MENGGUNAKAN COBIT 4.1 Johanes Fernandes Andry
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 2 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i2.671

Abstract

BCA was established in 1957 has continued to grow. Nowdays has supported business processes in various companies, such as the use of attendance information systems. During this system implementation has been running to support the procedures of attendance activities. The purpose of this research is to get an overview of the performance of information technology governance in order to determine the extent of maturity level which is currently running, with a few aspects to consider such as effectiveness, efficiency. The conclusion that can be drawn from the research that has been done is IT governance at the BCA has been done, although still run optimally within each IT process contained in the sub domain Monitor Evaluate Assess (MEA) on average was at 3.0 (defined process) for sub domain DS1, DS5, DS10 and ME2.
Sistem Informasi Toko X Menggunakan Metode Analytical Hierarchy Process Untuk Rekomendasi Supplier Merpanto Kaneko; Radiant Victor Imbar
Jurnal Teknik Informatika dan Sistem Informasi Vol 3 No 2 (2017): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v3i2.672

Abstract

X is a trading companies. Technological developments now make the information system needed by each company in order to compete with other trading companies. Choose the best supplier is not easy, therefore x store need information systems to help the owner to make desicion for procure material using Decision Support System using Analytical Hierarchy Process method for selecting the best suppliers and also implement information system of sales, purchasing, and accounting. Analytical Hierarchy Process is used to determine the best suppliers in terms of quality, delivery time, and price. By doing so, administrators can easily manage data sales, purchasing, accounting, and supplier selection.

Page 10 of 48 | Total Record : 479