cover
Contact Name
Hapnes Toba
Contact Email
hapnestoba@it.maranatha.edu
Phone
+6222-2012186
Journal Mail Official
hapnestoba@it.maranatha.edu
Editorial Address
Fakultas Teknologi dan Rekayasa Cerdas Universitas Kristen Maranatha Jl. Prof. Drg. Suria Sumantri No. 65 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
ISSN : 24432210     EISSN : 24432229     DOI : https://doi.org/10.28932/jutisi
Core Subject : Science,
Paper topics that can be included in JuTISI are as follows, but are not limited to: • Artificial Intelligence • Business Intelligence • Cloud & Grid Computing • Computer Networking & Security • Data Analytics • Datawarehouse & Datamining • Decision Support System • E-Systems (E-Gov, E-Health, E-Commerce, etc.) • Enterprise System (SCM, ERP, CRM) • Human-Computer Interaction • Image Processing • Information Retrieval • Information System • Information System Audit • Enterprise Architecture • Knowledge Management • Machine Learning • Mobile Computing & Application • Multimedia System • Open Source System & Technology • Semantic Web & Web 2.0
Articles 479 Documents
Implementation of Securing Data in the Cloud using Combined Cryptography and Steganography Rosalina Rosalina; Nur Hadisukmana
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1922

Abstract

The recent advance in information technology field forcing us to ensure the privacy of the digital data. It is very important to develop the method that may satisfy the needs. Many methods/techniques applied to reach that goal. One of efficient way to reach that secrecy can be achieved with implementing steganography. TheStego application is using Steganography to work in the digital domain and hides the data information within speech signal. To increase the security, TheStego combines steganography techniques with MD5 encryption techniques. Steganography techniques that applied in TheStego application is using LSB (Least Significant Byte) method. This application have three main features: hide text in an audio carrier, hide image within the audio and an audio inside a wave signal of an audio carrier. TheStego also required the user to enter password before the processing of data hiding begin. The password will act as decryption password. Such approach is implemented to increase the security of this application. So, only the one who knows the password that can extract and decrypt the data inside of the application.
Pengenalan Alfabet American Sign Language Menggunakan K-Nearest Neighbors Dengan Ekstraksi Fitur Histogram Of Oriented Gradients Muhammad Ezar Al Rivan; Hafiz Irsyad; Kevin Kevin; Arta Tri Narta
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1936

Abstract

Sign Language use to communicate to people with dissabilities. American Sign Language (ASL) one of popular sign language. Histogram of Oriented Gradient (HOG) can be use as feature extraction. Then feature stored in database. K-Nearest Neighbor use to measure distance between feature train and feature test. There are three distance use in this paper consist of Euclidean Distance, Manhattan Distance and Chebychev Distance. The best result are 0,99 when using Euclidean Distance and Manhattan Distance with k=3 dan k=5
Penggunaan Algoritma Clustering K-means Untuk Melihat Daerah-Daerah Penyuplai Mahasiswa Di Universitas Kristen Satya Wacana, Salatiga. Rivort Pormes; Daniel H. F. Manongga
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1968

Abstract

The use of k-means algorithm in student supply process is done to see students supply tendency in each region who study at satya wacana christian university (SWCU). This data processing with k-meansis useful for extracting information and knowledge from students data at SWCU. With data mining processing, the stakeholders at SWCU can take strategic steps for the penetration process in regions with potential student supply indication. The use of k-meansalgorithms facilitates the process of data analysis as well as grouping on student data during a 5-year period. The aim of this study is to provide on target strategic picture for regions which potentially have a significant impact on students supply each year.
Ekstraksi dan Analisis Produk di Marketplace Secara Otomatis dengan Memanfaatkan Teknologi Web Crawling Ivan Nathaniel Husada; Edward Hanafi Fernando; Hetthroh Sagala; Ariel Elbert Budiman; Hapnes Toba
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1977

Abstract

Along with the advancement in technology, todays community begins to abandon conventional shopping methods where buyers must come to the seller's shop. Nowadays community mostly doing online shopping because the process is considered more convenience. Because of this, there are more and more online marketplace users. Much more data can be retrieved with the increasing number of online marketplace users. Because of the large amount of data the process for extracting the data so that it can be seen and utilized becomes possible. The purpose of this journal is to show data and extraction method from an online marketplace system so that the results can be visualized and users can analyze the data. The data extraction method that will be used is the web crawling method and web scraping where after the data is successfully extracted and cleaned it will be visualized with the power BI application. The experiments show that the method is useful to conduct analysis.
Penerapan Speeded-Up Robust Feature pada Random Forest Untuk Klasifikasi Motif Songket Palembang Yohannes Yohannes; Siska Devella; Ade Hendri Pandrean
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1978

Abstract

Songket is a historical heritage in the city of Palembang. Where Songket has many different types and motifs. Besides having historical value, Palembang's original Songket has high quality and complexity in the manufacturing process. As known Palembang Songket has a lot of motives, one of the ways to recognize Palembang Songket is through its motives, so that research was conducted for the classification of Palembang Songket motifs. The method used to extract features is the Speeded-Up Robust Feature (SURF), while the classification method is Random Forest. The process of forming the SURF feature is divided into two stages, the first stage is Interest Point Detection, which consists of Integral Images, Hessian Matrix Based Interest Points, Scale Space Representation and Interest Point Localization, the second stage of Interest Point Description consists of Orientation Assignment and Descriptor Based on Sum Haar Wavelet Responses. The resulting feature is used for the Random Forest classification. This study used 345 images of Palembang Songket motifs, among others, Bunga Cina, Cantik Manis and Pulir. The images taken are based on 5 colors from each Palembang Songket motif. For the separation of data there are 300 images used as data train and 45 images for testing data. From the tests that have been done the results of the overall overall accuracy are 68.89%, per class accuracy 79.26%, precision 69.27, and recall 68.89%.
Rancang Bangun Edugame "History of Shodanco Supriyadi": Sejarah Perlawanan Pasukan PETA Blitar Terhadap Jepang Philips Denny Azarya; Pandi Pandi; Yohannes Yohannes; Yoannita Yoannita
Jurnal Teknik Informatika dan Sistem Informasi Vol 6 No 1 (2020): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v6i1.1979

Abstract

Games are not only for entertainment but games can be a means of learning. Historical subjects are often considered boring and uninteresting lessons because there are no innovations to attract students' curiosity. Therefore, a learning media was created and an introduction to the history of the resistance of the Blitar PETA forces through an adventure edugame. The methodology used is an iteration with three increments, each of which consists of the analysis, design, code, and test phases. The game design uses Unity 3D as a tool. Tests carried out include integration testing, system testing, and acceptance testing. From the results of these tests it was found that the edugame application that had been developed was able to assist students in introducing the history of the resistance figure PETA Blitar named Supriyadi.
Evaluasi Deteksi Smell Code dan Anti Pattern pada Aplikasi Berbasis Java Sendy Ferdian Sujadi
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1981

Abstract

This paper presents an evaluation result of smell code and anti pattern detection in java based application development. The main objective to be achieved in this research is to determine the proper way in the detection of smell code and anti pattern in the development of java based software, and to evaluate the impact of using code inspection tools and software metrics to refactoring code in java based software development. Smell code to be detected in this research is Long Parameter List, Large Class, Lazy Class, Feature Envy, Long Method, and Dead Code. Anti pattern that will be detected is The Blob / God Class and Lava Flow. The selection of smell code and anti pattern is based on the definition, characteristics, detection factor, and software metrics. To support the research process is done through the evaluation stage of a case study java based application as a sample for inspection of code for the detection of smell code and anti pattern and calculation software metrics. Case studies of selected applications as sample applications are E-Commerce applications with functional master data management of goods and customers as well as management of sales and payment transactions. The detection of the smell code and anti-pattern on the case study is done in stages so it can be determined whether or not to refact. As well as ensuring the technique of making the program better fit the characteristics and rules of object-oriented programming.
Sistem Perbaikan Kata Tidak Baku Bahasa Indonesia Menggunakan Metode Crowdsourcing Danny Sebastian; Kristian Adi Nugraha
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1983

Abstract

Most languages have two form of words: standard and not-standard. Standard words usually used in formal conversation, while not-standard words used in informal conversation. The massive use of non-standard words in the text-based communication through social media application causing a new problem for its text-processing features such as language translator or artificial intelligence (AI) conversation program (chatbots). Our research purpose is to create a system that can convert any non-standard Indonesian word into standard Indonesian word using crowdsourcing method, a community-based method to create database that contain non-standard Indonesian words and its associated standard words. We hope this system can help people who working on text-mining based application, especially in Indonesian words, to improve their performance in text-processing.
Algoritma Pemilihan Objek pada Interaksi Antarmuka Berbasis Titik Pandang Mata Herlina Herlina
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1984

Abstract

Eye tracking provides an alternative input modality to control the interactive contents in computers, particularly in assistive technology and public display. Instead of fixational eye movement, smooth pursuit eye movement has been used for object selection in gaze-based interactive applications. However, some previous works did not consider various similarity measures to match trajectory of eye movement and the presented dynamic stimulus. Furthermore, there was no correction towards the drift of eye movement during object selection. Hence, gaze-based object selection based on smooth pursuit eye movement is still inaccurate and unstable. To fill the research gaps, we proposed a novel approach for accurate gaze-based object selection using linear regression for eye movement’s drifting correction. We measured accuracy, success timing, and stability of object selection to validate performance of the proposed method. From the experimental results, object selection could be performed without the usage of chinrest using Euclidean distance, moving average and linear regression in gaze-based interfaces. The usage of chinrest did not give significant effect on accuracy, success timing and stability of object selection in gaze-based interfaces. The use of linear regression for predicting gaze points and correcting drift of eye movement has improved overall performance of object selection .In future, our results maybe used as a guideline for developing more accurate and more stable interactive applications based on smooth pursuit eye movement.
Aplikasi Mobile untuk Sistem Antrian Praktek Dokter Dilengkapi dengan Analisis Perhitungan Estimasi Waktu Menggunakan Markov Chain dan Algoritma PageRank: Analisis Perhitungan Estimasi Waktu Menggunakan Markov Chain dan Algoritma PageRank Cato Chandra; David Sanjaya; Julio Narabel; Nucky Vilano; Setia Budi
Jurnal Teknik Informatika dan Sistem Informasi Vol 5 No 3 (2019): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v5i3.1990

Abstract

Along with the increasingly rapid development of technology, especially in the field of computers, ways to overcome the problem of patient queues have been developed. One of them is the use of a mobile application to get a time estimate until a patient gets a turn to consult with a doctor. Many industries still use manual methods to overcome this queue problem. Based on this fact, this final project with title "Mobile Applications for Doctor Examination Queue System Equipped with Analysis of Time Estimation Calculation Using the Markov Chain and PageRank Algorithm" has aims to get time estimates for the patients so that time can be more efficient.