cover
Contact Name
Dyah Palupiningtyas
Contact Email
2025100044@widyakarya.ac.id
Phone
+628812995758
Journal Mail Official
jurnallpkd@gmail.com
Editorial Address
Perum. Bumi Pucang Gading, Jl. Watu Nganten 1 No. 1-6 Desa Batursari Kec. Mranggen, Jawa Tengah
Location
Kota semarang,
Jawa tengah
INDONESIA
Jurnal Informatika Dan Tekonologi Komputer
ISSN : 28099249     EISSN : 28099230     DOI : https://doi.org/10.55606/jitek.v5i1
Jurnal Informatika dan Teknologi Komputer (JITEK), dan P-ISSN:2809-9249 (Cetak) dan E-ISSN:2809-9230 (Online). Jurnal JITEK diterbitkan Pusat Riset dan Inovasi Nasional, terbit setahun Tiga kali (Maret, Juli dan November) menerapkan proses peer-review dalam memilih artikel berkualitas berdasarkan penelitian ilmiah dan teoritis.Jurnal ini terakreditasi SINTA 4 (Surat Keputusan Direktur Jenderal Pendidikan Tinggi, Riset, dan Teknologi Nomor 10/C/C3/DT.05.00/2025 tanggal 21 Maret 2025 tentang Peringkat Akreditasi Jurnal Ilmiah Periode I Tahun 2025) dimulai dari Volume 2 Nomor 2 Tahun 2022 sampai Volume 7 Nomor 1 Tahun 2027. JITEK diterbitkan untuk mengembangkan dan memperkaya diskusi ilmiah bagi para sarjana dan penulis yang menaruh minat pada isu-isu Teknologi dan penerapannya. Redaksi menerima artikel berbasis teori dan penelitian. Cakupan keilmuan Jurnal ini mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi.
Articles 141 Documents
SISTEM PENDUKUNG KEPUTUSAN PENILAIAN KINERJA GURU MENGGUNAKAN METODE MULTI ATTRIBUTE UTILITY THEORY (MAUT) DI SMA NEGERI 10 KOTA TERNATE Abriyanto A. Gani; Santosa Santosa; Mustamin Hamid
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.545

Abstract

Implementing a quality education process is a must for every school, as is the case with SMA Negeri 10 Ternate City. SMA Negeri 10 Ternate City always encourages the improvement of teacher professionalism by monitoring the work of teachers in implementing their duties so that the predetermined competency standards can be achieved. SMA Negeri 10 Ternate City is still manual and not so detailed (detailed). With the assessment that is not detailed, it is feared that there will be a subjective assessment (based on personal interests), which can cause social jealousy for teachers who have not received achievements. To overcome these problems, a decision support system was designed using the Multi Attribute Utility Theory Method. As for in this study using 5 criteria. In this study, the application uses the PHP programming language, while the database uses MySQL. The final result of this study found that the decision support system with the MAUT method was able to overcome problems in assessing teacher performance.
ANALISIS SENTIMEN TWITTER UNTUK MENGETAHUI KESAN MASYARAKAT TENTANG PELAKSANAAN POMPROV JAWA TIMUR TAHUN 2022 DENGAN PERBANDINGAN METODE NAÏVE BAYES CLASSIFIER DAN DECISION TREE BERBASIS SMOTE Mas'ud Hermansyah
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.551

Abstract

Sentiment analysis is a method used to understand, extract, and automatically process text data to get the sentiment contained in an opinion. Sentiment analysis will be used to process comments made by the community or supporters of each participant of POMPROV East Java 2022 through various media, including Twitter, regarding the progress or results of POMPROV East Java 2022. The number of comments, the authors use data mining methods and algorithms to process the comment data to get information about the POMPROV East Java 2022 event. The Naïve Bayes Classifier and Decision Tree classification algorithms are used as tools to classify comments expressed by users. Based on the results of experiments that have been carried out four times according to the number of data splits and twice based on the algorithm used, it can be concluded that the use of the SMOTE algorithm can increase the accuracy of the various data split compositions used. The best results of the Naïve Bayes Classifier method are found in the 7:3 data distribution which increases the accuracy by 14.52% and the Decision Tree method in the 9:1 data division increases the accuracy by 9.45%.
ANALISIS KEAMANAN WEB NEW KUTA GOLF MENGGUNAKAN METODE VULNERABILITY ASSESSMENTS DAN PERHITUNGAN SECURITY METRIKS Rifky Lana Rahardian
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.582

Abstract

Various crimes that are security threats that can occur when we are socially networked, one of them is virtual theft. New Kuta Golf has tournament standard field and the first course with a layout model link. Large mobility companies also make data processing even bigger and more web sites that are concerned with transactions and promotional media. This is a reference to obtain information about the security of the New Kuta Golf website. The data that has been obtained are carried out for the project work step, are: (1) To conduct a Vulnerability assessment. (2) Analyze the results of the scan. (3) Calculate security metrics from the results obtained from the scanning process. (4) Documentation of the installation process, and calculating security metrics. The results of the research then analyzed and discussed with a review of the theory that was embraced. From the results of the tests, the following results are obtained: (1) In carrying out website security testing can be done by Vulnerability Assessment uses the acunetix application to find detailed results. (2) Determining the security of a website can be determined using security metrics. (3) The results of the vulnerability assessment on http://newkutagolf.co.id has a high value.
PERANCANGAN SISTEM KEAMANAN SEPEDA MOTOR DENGAN RFID DI JURUSAN TSM SMKN 1 TIRTAJAYA Fikri Zulfikar; Ahmad Anas
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.614

Abstract

As motorcycles become more popular in Indonesia, more and more“vocational high schools are offering a core course in motorcycle technique (TSM) in addition to life skills training. They also want their students to become entrepreneurs. This study hopes to provide entrepreneurial opportunities to all his TSM students especially in his SMKN 1 Tirtajaya. This research focuses on motorcycle security based on RFID and Arduino Uno. With motorcycle thefts on the rise at the moment and the high cost of motorcycle security equipment, this study will reduce motorcycle theft crimes and provide entrepreneurial opportunities for students after the completion of SMKN 1 Tirtajaya.”
RANCANG BANGUN KRAN AIR TANPA SENTUH BERBASIS SENSOR INFRA MERAH Pebri Prihatmoko
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.675

Abstract

Covid 19 is a disease caused by the corona virus that originated in China. This virus can spread through solid, liquid and airborne droplets. There is no cure for this disease, so only preventive measures can be taken. Preventive measures include wearing masks and washing hands frequently with soap. One of the equipment that is often used to wash hands is a water faucet. In general, to open the valve, the faucet handle must be turned by hand. In the process of opening this valve, it has the potential to be a medium for the spread of the corona virus, considering that in general, faucets are used interchangeably using a hand touch. The purpose of this research is to change the manual water faucet into a water faucet that is operated without a touch of the hand. The method used in this study is a switch based on an infrared sensor. The result of this study is a water faucet unit that operates without the touch of a hand.  
RANCANG BANGUN SISTEM INFORMASI PERPUSTAKAAN PADA SMA ATTAQWA 02 BABELAN BERBASIS WEBSITE Muhammad Muharrom
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.704

Abstract

SMA Attaqwa 02 Babelan is a high school with its address in Babelan District, Bekasi Regency. In ongoing library activities, it is still carried out in a conventional way, which is still taking notes in books and members come directly to the library to find out information about books. Where this activity is considered to still have problems, including limited library operating hours so that students have to go to the library physically to borrow books. The book stock is limited and the current system is not informative, so that when you come to the library to borrow the book you need, the book has not been returned by the previous borrower. The purpose of this study is to analyze the system that is currently running, in order to overcome the problems faced at Attaqwa 02 Babelan High School, by designing a Library Information System Design at Attaqwa 02 Babelan High School Based on Websites. The research framework that will be carried out in solving the problems discussed is identifying, conducting information searches based on theoretical foundations, collecting data using observation and interview methods, analyzing to find solutions to the problems faced by SMA Attaqwa 02 Babelan.
SISTEM INFORMASI MANAJEMEN ARSIP SURAT GMKI CABANG SALATIGA BERBASIS WEB DENGAN FRAMEWORK LARAVEL Elyan Mesakh Kowi; Suprihadi Suprihadi
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.721

Abstract

The Indonesian Christian Student Movement (GMKI) is a student organization that was founded on February 9, 1950. GMKI has approximately 90 branches spread throughout the country, including in Salatiga City. As one of the branches, GMKI Salatiga Branch refers to the Internal Working Mechanism (MKI) as a policy document that regulates correspondence procedures within the organization. In its application, the correspondence mechanism is still carried out in a conventional way and has not utilized technology optimally. This study aims to produce a web-based mail archive management information system with the Laravel framework. The author uses a qualitative descriptive approach in writing. The design method in this study uses the prototype method. Then, for testing the system the author uses the black box testing method. The construction of this web-based information system can make it easier for the Branch Management Board (BPC) of GMKI Salatiga Branch in the process of making template letters and digitally filing letters from anywhere as long as they are connected to the internet.
TEMPAT SAMPAH PINTAR BERBASIS ARDUINO DAN SENSOR ULTRASONIK DI SMKN 1 TIRTAJAYA Muhamad Haikal Syamtamami; Ahmad Anas
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 2 No. 3 (2022): November : Jurnal Informatika dan Teknologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v2i3.773

Abstract

Garbage has become a part of life, we all produce waste every day, garbage can also contain many diseases and become a source of disease if left unchecked. So in this study, we will build an Arduino-based smart trash can with an ultrasonic sensor, where if we are less than 25cm away, the trash can will open automatically without us having to hold it. This study aims to reduce direct contact between humans and trash bins and hopes to reduce disease transmission, especially in the SMKN 1 Tirtajaya environment.
ANALISIS EFEKTIVITAS DAN EFISIENSI METODE ENCODING DAN DECODING ALGORITMA BASE64 Mochammad Syahrul Kurniawan; I Gede Ardi Sukaryadi Putra; I Made Agastya Maheswara; Reynaldus Yoseph Maria Neto Labamaking; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.897

Abstract

This study discusses the methods of encoding and decoding the base64 cryptographic algorithm. The term encoding means a process of converting plaintext into ciphertext. While decoding is a term that means the process of turning ciphertext back into plaintext. In general, classical cryptography has been abandoned because of its logic which can be easily solved, so now it has switched to modern cryptography which operates in bit-binary mode which is formed from ASCII code. The base64 algorithm is a form of modern cryptography which is included in the modern type of block cipher cryptography. This study aims to obtain a comparison between 3 types of tools in carrying out a cryptographic encode and decode process on the base64 algorithm. The 3 types of tools include the Base64 Python Program, Bash Base64 Kali Linux, and CyberChef which are online tools. This type of research method uses qualitative methods because it tends to use analysis in research. Where the results of the first comparison are used to make it easier to see the accuracy of the encoding and decoding processes and the results of the second comparison are used to compare in terms of time efficiency when encoding the three tools using 1,000 words which will continue to be added by 4,000 words, up to a total of 9,000 words . These words are taken using dummy text (lorem ipsum).
ANALISA EVALUASI KINERJA SOFTWARE PASSWORD ATTACKER PADA BERKAS FILE ZIP Irhan Hisyam Dwi Nugroho; Kadek Pebriawan; Ketut Gede Tegar Maranom Jati; I Gede Cipta Aphila Diptha; I Made Edy Listartha; Gede Arna Jude Saskara
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Vol. 3 No. 1 (2023): Maret : Jurnal Informatika dan Tekonologi Komputer
Publisher : Pusat Riset dan Inovasi Nasional

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55606/jitek.v3i1.899

Abstract

As we know, in this era of rapid technological progress, we cannot avoid threats to cyber security, cyber security itself is an effort to protect computer systems and data from various threats. In Indonesia alone, as of September 13, 2022, there have been recorded as many as 12.74 million accounts that have experienced leaks, and this makes Indonesia the 3rd country with the most number of data leaks in the world. One solution that can be done to protect the data that is owned is to put it in an archive such as ZIP, ZIP functions to combine several rice into one and reduce the size. And to secure the data in a ZIP file, you can set a password. The password is a combination of letters, numbers and symbols, with this combination it will be difficult for hackers to carry out their actions.

Page 4 of 15 | Total Record : 141