cover
Contact Name
Hapnes Toba
Contact Email
hapnestoba@it.maranatha.edu
Phone
+6222-2012186
Journal Mail Official
hapnestoba@it.maranatha.edu
Editorial Address
Fakultas Teknologi dan Rekayasa Cerdas Universitas Kristen Maranatha Jl. Prof. Drg. Suria Sumantri No. 65 Bandung
Location
Kota bandung,
Jawa barat
INDONESIA
JuTISI (Jurnal Teknik Informatika dan Sistem Informasi)
ISSN : 24432210     EISSN : 24432229     DOI : https://doi.org/10.28932/jutisi
Core Subject : Science,
Paper topics that can be included in JuTISI are as follows, but are not limited to: • Artificial Intelligence • Business Intelligence • Cloud & Grid Computing • Computer Networking & Security • Data Analytics • Datawarehouse & Datamining • Decision Support System • E-Systems (E-Gov, E-Health, E-Commerce, etc.) • Enterprise System (SCM, ERP, CRM) • Human-Computer Interaction • Image Processing • Information Retrieval • Information System • Information System Audit • Enterprise Architecture • Knowledge Management • Machine Learning • Mobile Computing & Application • Multimedia System • Open Source System & Technology • Semantic Web & Web 2.0
Articles 479 Documents
CryptMAIL: Keamanan Ganda Email Menggunakan Algoritma Kriptografi Virra Retnowati A’izzah; Dwi Ramti Asih; Anggi Putri Meriani; Alam Rahmatulloh
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 2 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i2.4962

Abstract

The development of technology and information has changed the way humans communicate. Email is an online correspondence service that makes it easier for users to exchange information and communicate with other parties. The convenience offered attracts many people to switch to using email as a medium for exchanging information, and this creates new opportunities for cybercriminals to take action. Problems with email such as data or information leaks, file misuse or message theft due to negligence or others can occur. One way to anticipate this is to implement Cryptographic Techniques. Cryptography is an encryption technique to hide confidential messages from plaintext messages into ciphertext messages that are difficult to understand. In this study, we will discuss the implementation of cryptography with the AES-128 and RC4 algorithms for encryption and decryption of messages and file attachments sent via email. The result of this research is a web-based application 'CryptMAIL' which can encrypt and decrypt messages using the AES-128 and RC4 cryptographic algorithms. The 'CryptMAIL' application is expected to provide double security to anticipate security problems in email.
Analisis Persepsi Risiko Pekerja di Indonesia Terhadap COVID-19 Dzikri Robbi; Mewati Ayub; Setia Budi
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 2 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i2.5056

Abstract

Since August 2020, the COVID-19 pandemic has affected more than 29 million workers in Indonesia. Therefore, worker protection and job creation must be an important priority to emerge more resilient and productive after the COVID-19 crisis. Threat assessment and risk perception are core features of protective-motivation theory and understanding workers' perceptions of COVID-19 risk is expected to help navigate and manage the impact of this pandemic on workers. This study assesses workers' risk perceptions of COVID-19 using a national sample of size N=1,900 of workers in Indonesia. The level of employee risk perception of COVID-19 is relatively high in all workplaces and the workplace also influences the level of risk perception. From all respondents, it is known that the respondent's knowledge about COVID-19, the respondent's behavior towards COVID-19 and the social environmental conditions at the respondent's workplace are all significant predictors of the perceived risk of COVID-19. Age group and type of workplace were found to be significant determinants of perceived risk, compared to the sex and employment status of the examined workers. In all workplaces, respondents stated that the risk of spreading COVID-19 was at a moderate level and the work area was considered an area that had a higher risk of spreading COVID-19 compared to smoking areas and the canteen or pantry.
Perancangan Aplikasi Pembukuan Menggunakan Metode Agile Scrum Dhandy Joenathan Kurnia Putra; Penidas Fiodinggo Tanaem
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5060

Abstract

The product and transaction management section's business process in the Sepatu Kaki Kaki has not maximized the existing system application. This makes the business processes carried out by the store less effective. The method used in this study uses one of the agile software development models, namely Scrum. Which has advantages, including flexible requirements, speed up application production time, and require fewer team members. This research aims to produce application development that can manage products effectively and help staff analyze in accordance with the expected targets in the future. The application development uses the Kotlin programming language - Android Native, with BaaS (Backend as a Service) Firebase. The results of this research are an android application to speed up and simplify product management, the latest product stock can be known, and minimize manual recording errors.
Segmentasi dan Pembentukan Model Regresi Nasabah Berbasis Analisis Recency, Frequency dan Monetary Ronaldo Cristover; Hapnes Toba; Bernard Renaldy Suteja
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 2 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i2.5075

Abstract

During this pandemic, the number of customers of a securities company has increased quite high. This requires securities companies to conduct analysis related to security customer data against transaction data so that the company can find out the segmentation of registered customers and also so that companies can predict the transaction patterns of customers in the company. In processing transaction data, the RFM (Recency, Frequency, Monetary) model can be used as a way to group customers according to their business values. After doing the modeling using RFM, the data is clustered using the K-Means algorithm to find out the segmentation in the RFM model in each group. The RFM model that has been clustered will produce segments based on the RFM group. In this data, a linear regression analysis process is carried out where each group and segment is analyzed and predicted related to variables such as recency, monetary and frequency. The results of data grouping, customer segmentation and also predictions with linear regression can be one of the company's references to make a business decision. From the linear regression process carried out on the RFM attributes, a prediction of the monetary value of the existing recency value is generated and the monetary value of the frequency can also be known with a fairly good error rate.
Perancangan Desain Antarmuka Website Sekolah Menengah Atas Menggunakan Metode Goals Directed Design Aldito Doni Pasha; Ayouvi Poerna Wardhanie; Endra Rahmawati
Jurnal Teknik Informatika dan Sistem Informasi Vol 9 No 1 (2023): JuTISI (in progress)
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v9i1.5080

Abstract

SMA Muhammadiyah 9 Surabaya is a school located in the city of Surabaya. The school uses the website as a medium for introducing school information, but when using the website, a problem is found, such as a lack of usability, convenience and user satisfaction. In the situation of the corona virus pandemic, educational services have become a service that must be provided to students or the community. Website improvement is one of the stages in improving the quality of education and can also be used as a marketing and branding tool for schools. Therefore, it is necessary to design an interface design using the Goals Directed Design (GDD) method, so that users can feel comfortable when using the website. In this (GDD) there are 6 stages, the first is research conducting interviews, observations and initial testing of the website using usability testing, then modeling doing the preparation of user personas and user journeys, then requirements for designing scenario contexts and compiling website information needs, then framework and refinement wireframe design and design prototypes are carried out, the last one is support for testing usability testing on the prototype design and comparing it with the results of the initial testing at the research stage. The results of the initial test obtained an average value of 2.59 on the Likert scale which can be said to be less good. The results of testing the prototype design obtained an average value of 3.14 on the Likert scale which can be said to be good so that it can be used as a recommendation for improvement on the SMA Muhammadiyah 9 Surabaya website.
Pengembangan Dashboard Informasi Gereja Tangguh Bencana dengan Metode User Centered Design Ebentera Santosa; Kristian Adi Nugraha; Agata Filiana
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5119

Abstract

Indonesia is a country prone to natural disasters, from earthquakes to annual flood. These can affect, and even at times, endanger people's lives. JAKOMKRIS PBI or the Christian community for disaster management in Indonesia has the duty to aid with Christian churches and institutions to actualize the concept of disaster-resilient church. One of the ways that can help JAKOMKRIS PBI's main goal is to create a website-based dashboard displaying information related to the concept of disaster-resilient church. This research applies the principles of User-Centered Design which in its development focuses on the user. User-Centered Design requires information about the appearance of the interface desired by the user. The results of the research are expected to be able to assist users in preparing churches for disaster events by providing provisions and disaster risk reduction based on managed data. This research uses usability tests using performance metrics and System Usability Scale (SUS) methods. The performance metrics test results for the efficiency value of 90.95% for the user role and 100% for the admin role, while the effectiveness value is 96% for the user role and 100% for the admin role and the results of the System Usability Scale (SUS) test are 81.5 for the user role and 81.25 for admin roles.
Menentukan Aksi Lawan Komputer Pada Game Strategi Menggunakan Algoritma K-Nearest Neighbour Michael Freddy; Teady Matius Surya Mulyana
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5137

Abstract

Advances in computer technology allow various devices to complete complex computing, especially in the entertainment industry and the biggest example is games. Strategy game is the type of game that most often gets an Artificial Intelligence or AI system implemented to imitate human behaviour when playing games. Many game AI systems are predictable so players get bored quickly, so adaptive and simple AI is needed to make it easier for game developers. K-Nearest Neighbour is a classification algorithm with supervised learning, this algorithm will be used in this study. The research method tests the level of accuracy in determining the class by providing a sample of data which is divided into training data and test data. The measure of the level of accuracy is calculated using the confusion matrix after the test table is obtained. The results of the study concluded that the K-Nearest Neighbour algorithm can determine computer opponents fairly well. More data samples are needed as data training to increase the level of classification accuracy.
Rancang Bangun Aplikasi Koleksi Resep Makanan Berbasis Sistem Operasi iPhone Jessica Wienadi; Yosua Setyawan Soekamto
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5140

Abstract

Food is a necessity that is needed by anyone. One way to obtain food is to cook. Many people choose to cook their own food, even more so during the Covid-19 pandemic which caused cooking preferences to increase. One of the things used when cooking is recipes. Recipes need to be saved for easy reuse. Hence built a food recipe collection app that helps store recipes on mobile devices. The application is built on iOS. To find out the problems and needs in recipe saving, interviews were conducted, and problems were found regarding separated storing location and diverse storing format, limited search capabilities on current saving method, time-consuming input processes, and disturbing automatic-lock on device. Analysis of similar applications were also conducted and found shortcomings related to the flow and application interface. Based on these results, the application is designed with two main features, namely recipe storage and cooking mode. In recipe storage, users can add, change, and delete recipes. Once a recipe is saved, users can view a list of saved recipes, view recipes by category, and search for recipes by title. In cooking mode, users are given a checklist to prepare ingredients and then given a step-by-step. Application development uses the Swift programming language, with Swift User Interface to build the app's interface. Application data is stored locally using Core Data. Testing of application implementation results is carried out using alpha test and beta test. Alpha tests are performed using black-box test, to ensure the accuracy of inputs and outputs of various application functions. The beta test is done by conducting application trials and interviews with cooks to ensure application usability and to obtain feedbacks from users. Based on the test results, all functions in the application run as expected and this application helps users save food recipe collection.
Implementasi Deep Convolutional Generative Adversarial Network untuk Pewarnaan Citra Grayscale Muhammad Ricky; Muhammad Ezar Al Rivan
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5218

Abstract

The process of adding color to a grayscale image is needed so that improvements to the image can be done quickly and without special knowledge. Image coloring using Deep Convolutional Generative Adversarial Network (DCGAN) and Generative Adversarial Network (GAN) methods. The model training uses the Places365 dataset, which contains 98,721 training data and 6,600 test data. The image is converted into the CIELAB color space, using the L channel as grayscale input and the AB channel as the other input. The test is done by comparing the accuracy values ​​using the Mean Absolute Error (MAE) and Structural Similarity Index Matrix (SSIM) methods. The calculation results of the MAE method show that the average MAE value of the DCGAN method is smaller than the GAN method, with a score of 10.18 and 10.81. The results of the calculation of the SSIM method show that the DCGAN method has a higher average with a score of 91.54% and 68.32% for the GAN method. The results of the questionnaire conducted on 30 respondents showed that the DCGAN method was chosen by more respondents than the GAN method, respectively 88.40% and 11.60%.
Klastering Sayuran Unggulan Menggunakan Algoritma K-Means Lina Mardiana Harahap; Wahyu Fuadi; Lidya Rosnita; Eva Darnila; Rini Meiyanti
Jurnal Teknik Informatika dan Sistem Informasi Vol 8 No 3 (2022): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v8i3.5277

Abstract

Horticulture, especially vegetables, has great potential to be developed because it becomes a source of income for the community and small farmers in each region because Indonesia is called an agrarian country with most of them working in agriculture. Mandailing Natal Regency is the district with the largest area in North Sumatra province, but Mandailing Natal has not been able to outperform vegetable crop production in North Sumatra. Data mining methods can find interesting and invisible patterns in data sets. One of the methods is the K-Means clustering algorithm which groups data into clusters based on the similarity of data characteristics. In this study, vegetable data was clustered which aims to determine the potential commodities in each area in Mandailing Natal Regency, plants that have potential in the area will be maintained and their production increased, while vegetable crops whose production is still low will be a priority to increase their production. The research method used in this study was to collect vegetable data from the Badan Pusat Statistik in the form of data on harvested area, production, plant area, and new planting area. In addition, data collection was carried out by conducting theoretical studies in journals. The results of clustering superior vegetables using the K-Means Algorithm are in the form of potential grouping into 3 clusters, namely low, medium, and high clusters and the output is a web-based system in its application. The results of the clustering analysis were obtained with each total data of 69 data, namely big chili with C1 81%, C2 16% and C3 3%. Cayenne C1 29%, C2 48% and C3 23%. Long Beans C1 26%, C2 38% and C3 36%. Kale C1 39%, C2 36% and C3 25%. Eggplant C1 43%, C2 29% and C3 28%. Tomato C1 41%, C2 58% and C3 1%.