cover
Contact Name
Siti Aminah
Contact Email
sitiaminah@ubhinus.ac.id
Phone
+62341-560823
Journal Mail Official
lppm@ubhinus.ac.id
Editorial Address
Jl. Raya Tidar 100 Malang 65146
Location
Kota malang,
Jawa timur
INDONESIA
Journal of Information Technology
ISSN : 23031425     EISSN : 2580720X     DOI : https://doi.org/10.32664/j-intech
Core Subject : Science,
Journal of Information and Technology is a journal published by Bhinneka Nusantara University, Malang. The scope of this journal includes IT Governance, IS Strategic Planning, IS Theory and Practices, Management Information System, IT Project Management, Distance Learning, E-Government, Information Security and IT Risk Management, E-Business / E-Commerce, Big Data Research, and other related topics.
Articles 307 Documents
Simple Additive Weighting Untuk Penentuan Target Pasar Gabriel Alan Wijaya; Marfuah Marfuah; Suryo Widiantoro
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.841

Abstract

Changes in information and communication technology have encouraged the formation of an information society. One of the strategic elements for business organizations is processing data quickly and accurately for decision making. Therefore we need a computer-based decision support system that can support the company's decision-making process quickly and accurately. Currently, Glints Talenthub Batam still uses manual methods for decision making in determining the target market, so it takes a long time and results are less accurate. Based on this, the authors try to develop a computer-based decision support system with the Simple Additive Weighting (SAW) method to assist the decision-making process in determining the target market at Glints Talenthub Batam. The results of this study are useful for getting a faster and more accurate decision on which target market to take at Glints Talenthub Batam. In this case, the best target market decision to make is Canada and the United States (San Francisco) ranking first with a final score of 18.68, followed by the United Kingdom in the next rank with a final score of 18.35.
Sistem Pendukung Keputusan Seleksi Anggota Paskibraka Kabupaten Pamekasan Moh Fahmi Maulidanitamyizi; Hoiriyah Hoiriyah; Hozairi Hozairi
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.843

Abstract

This study evaluates the use of the Decision Support System (SPK) with the AHP method for the selection of Paskibraka members in Pamekasan Regency. The criteria used in this study were Body Posture (PT), Height (TB), and Health (K). The results of ranking the first priority criteria are Height (K = 0.70), second is Height (TB = 0.21), and third is Body Posture (PT = 0.08). From the results of the alternative ranking of the selected paskibraka participant candidates, A8=0.22, A7=0.20, A6=0.16, A5=0.12, A4=0.09, A3=0.06, A2=0.06, and A3=0.05. The contribution of the SPK application will help the committee evaluate the recruitment process of team members objectively.
Pemanfaatan Deep Convolutional Auto-encoder untuk Mitigasi Serangan Adversarial Attack pada Citra Digital Putu Widiarsa Kurniawan S; Yosi Kristian; Joan Santoso
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.845

Abstract

Adversarial attacks on digital images pose a serious threat to the utilization of machine learning technology in various real-life applications. The Fast Gradient Sign Method (FGSM) technique has proven to be effective in conducting attacks on machine learning models, including digital images found in the ImageNet dataset. This research aims to address this issue by utilizing the Deep Convolutional Auto-encoder (AE) technique as a method for mitigating adversarial attacks on digital images.The results of the study demonstrate that FGSM attacks can be performed on the majority of digital images, although there are certain images that are more resilient to such attacks. Furthermore, the AE mitigation technique proves to be effective in reducing the impact of adversarial attacks on most digital images. The accuracy of the attack and mitigation models is measured at 14.58% and 91.67%, respectively.
Klasterisasi Komentar Cyberbullying Masyarakat di Instagram berdasarkan K-Means Clustering Viry Puspaning Ramadhan; Giasinta Mareskoti Namung
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.846

Abstract

Cyberbullying has become a serious problem on social media platforms like Instagram. In an effort to overcome this problem, this study aims to classify cyberbullying comments made by Instagram users. The method used in this study is K-Means Clustering, which is a grouping technique commonly used in data analysis. The comment data collected from Instagram is then analyzed using the K-Means Clustering algorithm to identify patterns and groups of similar comments. The findings from this study can provide a better understanding of the types and characteristics of cyberbullying comments that often appear on Instagram. By knowing groups of similar comments, prevention and response measures can be designed more effectively. In addition, the results of clustering can also help in the development of automatic detection algorithms to identify cyberbullying comments on social media platforms. Based on the evaluation carried out on the clustering results with a silhouette score = 0.690152, namely in cluster C1, which is a negative cluster. So, the most dominant cyberbullying comments are negative comments.
Analisis Instalasi Jaringan Internet Desa Karangjati Pudji Widodo; Suleman Suleman; Bambang Kelana Simpony
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.848

Abstract

Advances in information technology are currently growing very rapidly in line with the human need to access information quickly, easily and accurately. The Internet network is one of the tools to meet these information needs. BUMDesa of Karangjati Village creates a small village-owned server that is intended to facilitate the community's Internet needs at a more affordable price than the prices of other internet service providers. The research was conducted to observe and improve the network topology, so as to maximize the internet network belonging to BUMDesa Karangjati Village. In addition, research is conducted to solve problems such as running out of ports when there are additional subscribers or overcoming user modems that are often interrupted by replacing a problematic modem adapter or replacing an old modem with a new modem. The method used is by conducting direct observations and interviews with BUMDesa Jati Lestari Karangjati Village. The proposed configuration scheme is created using the Cisco Packet Tracer simulation application. Based on the results of internet research owned by BUMDesa Karangjati Village, it uses a tree topology because there is only one central server and the IP address address configuration uses class C, because it still uses a network on a small scale. The transmission medium uses a fiber optic cable from the server and the addition of ports will continue to be carried out in line with the increase in internet network subscribers.
Sistem Pendukung Keputusan Pemilihan Bibit Sapi Unggul Madura Dengan Menggunakan Metode Analytical Hierarchy Process (AHP) Dan Simple Additive Weighting (Saw) Dewi Amiliana Putri; Bakir Bakir; Hozairi Hozairi
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.851

Abstract

In general, cows are mammals or herbivores which are very useful for the village community, especially the Samatan village community. In addition to the edible meat and milk that can be processed for consumption, most farmers can also use cow dung as fertilizer. Madura cattle are one of the local cattle breeds raised by community farms in Indonesia, especially on the island of Madura, East Java. Livestock is an activity that improves the economy, especially livestock. Because Many people still don't understand which type of high-quality livestock is suitable. How did it develop? In this study, researchers wanted to create a decision support system used to determine the quality of cattle. The research sample focuses on Madura cattle, superior livestock using the AHP (Analytical Hierarchy Process) SAW (Sample Additive Weighting) method and developing application decision support systems (SPK). From the calculation results of the AHP (Analytical Hierarchy Process) SAW (Sample Additive Weighting) method
Aplikasi Penyesuaian Stock Sebagai Pendukung Proses Audit Pada Perusahaan Manufaktur dengan Metode RAD Ralfpiere Charlitos; Steffi Adam
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.859

Abstract

XYZ is one of many manufacturing companies in the city of Batam operating in the field of plastic injection molding attempting to improve their business process by creating and integrating an information processing system. Currently, PT. XYZ is facing an issue regarding inaccuracy between physical and digital stock. This issue caused PT. XYZ to miss an opportunity to appeal towards a larger market. Despite doing an inventory audit, the inhouse system owned by the company didn’t accommodate input of the audit result regarding the stocks real condition, thus causing a need for time to figure out the root cause of a stock inaccuracy issue and to also solve it. This research is done to develop an application using a short and fast development cycle and implementation to receive results quicker with the intention of allowing the company to make a decision. The method used in Rapid Application Development (RAD), contains 3 processes which consists of, Requirements Planning, Design and Implementation. The result of the research shows that implementation of this system speeds up the investigation process of stock inaccuracy so that the company could deal with issue at hand immediately. Furthermore, according to observation results, the accuracy of the data between the system and the actual achieved 90%, which is an increase of around 30-40% compared to before the system was implemented
Perancangan Security Information and Event Management (SIEM) untuk Mendeteksi Insiden pada Situs Web Daniel Rudiaman Sijabat; Stevanus Evo
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.860

Abstract

In an increasingly complex digital era, websites are the main target for attacks by irresponsible parties. Therefore, a system is needed that can monitor, analyze, and provide early warning against suspicious activity or attacks that occur on websites. For this reason, this research analyzes and designs a Security Information and Event Management (SIEM) system that can be used to detect incidents of attacks on websites. The SIEM built in this study uses an Elastic Stack which will be used to analyze, monitor, detect, and store event information or security logs for each connected agent. To simulate testing types of attacks on websites such as the OWASP TOP 10 2017, several vulnerable web applications are used, namely DVWA, XVWA, and MUTILLIDAE. Tests on the SIEM system that was created showed that the system was able to detect the types of attacks on websites as mentioned in the OWASP TOP 10 2017.
Komparasi Performa Algoritma Kompresi Data Lossless Menggunakan Rasio Kompresi Dan Penghematan Ruang Aswar Hanif; Endang Wahyudi; Harna Adianto; Lilik Martanto
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.863

Abstract

Data growth is a sizeable challenge. The goal of data compression is to reduce the size of data needed to still represent useful information. Data compression can be used to increase the efficiency of data storage, transmission and protection. Lossless algorithms can precisely reconstruct the original data from the compressed data. Lossless compression is often used for data that needs to be stored or transmitted accurately. Several lossless compression methods and algorithms include the Lempel–Ziv–Markov chain algorithm (LZMA), Prediction by partial matching (PPM), Burrows-Wheeler block sorting text compression algorithm and Huffman coding (BZip2), and Deflate. Even though all compression systems are based on the same principles, there should still be differences in performance. Because of that, a general guide is needed to help determine the most appropriate data compression algorithm to use. This study aims to determine the data compression algorithm that has the best performance, based on a comparison using the Compression Ratio and Space Saving values. The research phase begins with determining the compression algorithm used, data preparation, performance testing, to then be discussed and conclusions drawn. The results show that the compression ratio and space savings that can be achieved specifically will depend on the data used. Although the range of average values of compression performance is not that big, in general LZMA2 shows the best results with a compression ratio of 1.457 and a space saving of 15.00%. Hopefully, the results of this test can be used as an overview in helping to choose a lossless data compression algorithm.
Sistem Informasi Pemesanan Menu Kafe Menggunakan QR-Code Andrian Eko Widodo; Fanny Fatma Wati; Aprih Widayanto
J-INTECH ( Journal of Information and Technology) Vol 11 No 1 (2023): J-Intech : Journal of Information and Technology
Publisher : LPPM STIKI MALANG

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32664/j-intech.v11i1.865

Abstract

During this pandemic, to reduce the spread of COVID-19, it is necessary to implement health protocols in community activities, including in the culinary business. By utilizing the QR-Code the cafe owner can realize the use of a digital menu that can be accessed from a cafe visitor's smart device. The use of digital menu lists is intended to prevent Covid-19 transmission through manual lists or menu books, which are usually used interchangeably by many visitors. By scanning the QR-Code placed on the cafe table, visitors can select a menu and place an order by minimizing contact with manual menu lists and cafe employees. Through this application, cafe owners can also manage sales at their cafes, including sales statistics, receipt printing, menu updates, etc.