cover
Contact Name
Doni Abdul Fatah
Contact Email
simantec@trunojoyo.ac.id
Phone
+6285648688506
Journal Mail Official
simantec@trunojoyo.ac.id
Editorial Address
Jurusan Teknik Informatika - Fakultas Teknik - Universitas Trunojoyo Madura Jl. Raya Telang PO BOX 2 Kamal, Bangkalan 69162
Location
Kab. bangkalan,
Jawa timur
INDONESIA
Jurnal Simantec
ISSN : 20882130     EISSN : 25024884     DOI : https://doi.org/10.21107/simantec.v8i2
Core Subject : Science,
Jurnal Simantec merupakan Jurnal Ilmiah dibawah naungan Program Studi Manajemen Informatika, Fakultas Teknik Universitas Trunojoyo Madura. Jurnal Simantec diterbitkan pertama kali pada bulan Desember 2009, dan diterbitkan dua kali dalam setahun. Jurnal Simantec berisi artikel-artikel ilmiah yang meliputi bidang-bidang : informatika, Sistem Informasi, Multimedia, Mekatronika, Jaringan serta hasil penelitian lainya yang terkait dengan bidang-bidang tersebut.
Articles 218 Documents
Design of information system architecture using TOGAF Architecture Development Method at Rumah Sakit Haji Jakarta Prasetyo, Adit; Waspodo, Bayu
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025 (Article in Progress)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.29807

Abstract

The Information and Technology (IT) Subdivision of Rumah Sakit Haji Jakarta plays a crucial role in supporting operations but faces serious constraints due to the dominance of manual service processes. Reliance on unstructured recording methods and non-integrated systems leads to various inefficiencies, such as hindered issue tracking, the risk of data loss, and slow service responses that impact the productivity of other units. This research aims to address these problems by producing an applicable enterprise architecture blueprint. Using a qualitative case study approach, this research applies The Open Group Architecture Framework (TOGAF) Architecture Development Method (ADM) up to the Information Systems Architecture phase. Data collection was conducted through in-depth interviews with key stakeholders, process observation, and internal document studies to obtain a comprehensive understanding. The result of this research is a structured enterprise architecture design, encompassing business, data, and application architectures. The primary artifacts produced include as-is and to-be business process models, gap analysis, and a functional design for an integrated information system consisting of a helpdesk module, inventory management, digital maintenance, and IT performance reporting. As a result, this validated blueprint provides a clear strategic guide for the hospital to implement appropriate technology solutions. The implementation of this architecture has significant potential to realize more effective, measurable, and transparent IT service management, which ultimately supports the hospital’s overall digital transformation agenda.Keywords: Enterprise Architecture, TOGAF ADM, Rumah Sakit Haji Jakarta, Helpdesk Information System, Information Systems Architecture.
Implementation of Least Significant Bit Steganography with Caesar Cipher Layout Dvorak web-based Kurnia, Ridhwan Nadif; Pradiptha, Al Diras; Permana, Muhammad Fajar Jati; Dipradja, Kimberly Alfa; Afrizal, Rizki; Pradeka, Deden; Khaerunnisa, Zahra
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025 (Article in Progress)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.28794

Abstract

Secure data communication is an essential requirement in the digital age, especially in the exchange of confidential information. One of the main problems is the potential for eavesdropping by unauthorised parties who can access open messages. To overcome this, this research aims to develop a website-based system that combines the Least Significant Bit (LSB) method steganography technique and the Caesar cipher method cryptography with the Dvorak keyboard layout to increase data security. The research method used is prototype method with the stages of concept formulation, prototype design, and continuous evaluation. The system was tested by inserting the word ‘TEKKOM’ into a digital image and measuring the quality using Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The test results show an MSE value of 0.0001466049 and PSNR of 86.47 dB, which means that the visual quality of the image does not decrease significantly and the message is successfully inserted and extracted without errors. The Dvorak keyboard layout adds a layer of security through uncommon input patterns, making it difficult for outsiders to analyse. Thus, the system is able to provide a secure, efficient, and practical solution for web-based information hiding without the need for a database and is still user-friendly.Keywords: Dvorak, Steganography, Caesar Cipher, Least Significant Bit, Website
SISTEM INFORMASI GEOGRAFIS (SIG) PENENTUAN JALUR TERPENDEK UNTUK MENGHINDARI DAERAH RAWAN BANJIR (STUDI KASUS PROPINSI JAWA TIMUR) Musabbichin, Laylul; b, Mula’ab; Yunitarini, Rika
Jurnal Simantec Vol 4, No 3 (2015)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v4i3.1386

Abstract

ABSTRAKPada musim hujan sering terjadi banjir pada beberapa daerah yang berada di Kota Surabaya. Sistem informasi geografis (SIG) mampu menyajikan informasi fisik suatu daerah yang berpengaruh dalam menentukan daerah rawan banjir serta menentukan jalur terpendek yang terjadi pada wilayah jawa timur. Pengguna juga dapat menentukan jalur terpendek dengan menggunakan metode Breadth First Search (BFS) yang menggunakan fungsi heuristic guna mengarahkan pencarian pada peta yang direpresentasikan dalam konsep graph, yang berguna untuk menghindari daerah mana yang seringkali terjadinya bencana banjir serta dapat meminimalkan kerugian serta kemacetan yang terjadi propinsi jawa timur. Penelitian ini dilakukan untuk pencarian rute terpendek antara perumahan sampai dengan tempat perumahan yang akan menjadi tujuan.Kata Kunci: Sistem Informasi Geografis, Bredth First Search (BFS), Banjir.ABSTRACTIn rainy season frequent flooding in some areas in the province of East Java. Geographic information systems (GIS) can present physical information of a region that is influential in determining the flood-prone areas as well as determine the shortest path which occurred in East Java area. Users can also determine the shortest path using Breadth First Search (BFS), which uses heuristic function to guide the search on the map which is represented in the concept graph, which is useful to avoid the area where the often occurrence of floods and to minimize losses and congestion that occurs provinces east Java. This study was conducted to search the shortest route between the place of housing to housing that would be the goal.Keywords: GIS, Breadth First Search (BFS), flooding
RANCANG BANGUN SISTEM INSTANT MESSAGING TERDISTRIBUSI i, Husni
Jurnal Simantec Vol 4, No 3 (2015)
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v4i3.1385

Abstract

AbstrakInstant messaging adalah salah satu jenis aplikasi online untuk komunikasi real-time yang semakin banyak digunakan di Internet. Vendor-vendor besar terlibat dalam penyediaan layanan Internet ini, seperti Microsoft, Yahoo dan Google. Fitur yang ditawarkan juga semakin lengkap sehingga komunikasi langsung antar pengguna Internet dengan berbagai medianya sudah terwujud. Namun berbagai teknologi yang cici4d dimunculkan tersebut tidak terbuka sehingga sulit bagi pemrogram aplikasi atau peneliti awal mengetahui cara kerja dari sistem messaging. Kami telah merancang dan membangun suatu prototipe sistem instant messaging (messenger) sederhana dengan server tunggal dan kemudian diperbaikinya dengan mewujudkan beberapa server terdistribusi yang saling berkoordinasi untuk meningkatkan fault-tolerance dan availability. Implementasi dari dua pendekatan ini telah mampu menjawab bagaimana proses pembangunan aplikasi jaringan komputer yang memanfaatkan lapisan transport dan network pada model referensi OSI. Sentuhan langsung dengan level sistem memungkinkan kita mengetahui secara lebih jelas dan lengkap bagaimana proses komunikasi sesungguhnya yang terjadi pada suatu sistem instant messaging dari pendekatan yang diterapkan.Kata kunci: instant messaging, messenger, sistem terdistribusi, pemrograman jaringan.AbstractInstant messaging is one type of online applications for real-time communications that are increasingly being used on the Internet. Major vendors involved in the provision of the Internet services, such as Microsoft, Yahoo and Google. The features offered are also more complete so that direct communication between Internet users with a variety of media already materialized. However, various technologies that emerged were not open so difficult for the application programmer or early researchers to know the workings of the messaging system. We have designed and built a prototype of simple instant messaging system (Messenger) with a single server and then repaired with realizing several distributed servers which coordinate with each other to increase the fault tolerance and availability. The implementation of these two approaches has been able to answer how the process of building computer networks cici4d applications that take advantage of network and transport layers in the OSI reference model. Touch directly with the level of the system allows us to know more clearly and fully how the actual communication process that occurs in an instant messaging system of the approach applied.Keywords: instant messaging, messenger, distributed system, network programming
Decision support system for superior livestock commodities in North Central Timor using Fuzzy Topsis method Taek, Sisilia Novita Aryenny; Kelen, Yoseph Pius Kurniawan; Tey seran, Krisantus Junarto
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.30059

Abstract

The livestock sector plays a crucial role in supporting regional economic development, including in North Central Timor (TTU) Regency, East Nusa Tenggara. Currently, the selection of superior livestock commodities in this area is still carried out manually, which results in slow, inefficient, and error-prone decision-making processes. Therefore, a system is needed to assist in making decisions more accurately and objectively. This study aims to develop a web-based Decision Support System (DSS) to analyze and determine superior livestock commodities in TTU Regency using the Fuzzy Technique for Order Preference by Similarity to Ideal Solution (Fuzzy TOPSIS) method. The system was developed using the Waterfall model and implemented with PHP and MySQL. The decision criteria include productivity, market potential, production cost, environmental sustainability, and infrastructure support. The livestock alternatives considered in the analysis are cattle, goats, pigs, chickens, sheep, and horses. The implementation results show that beef cattle achieved the highest preference score of 0.76, making it the most superior livestock commodity in the region. This system provides easy access to accurate and real-time data for users and facilitates more effective and efficient decision-making. It also minimizes human error and speeds up the analysis process. With this system, stakeholders and livestock-related agencies can make better-informed decisions, improve resource management, and support sustainable development in the local livestock sector.Keywords: Decision Support System, Leading Commodities, Livestock, Fuzzy TOPSIS
Implementation of Least Significant Bit Steganography with Caesar Cipher Layout Dvorak web-based Kurnia, Ridhwan Nadif; Pradiptha, Al Diras; Permana, Muhammad Fajar Jati; Dipradja, Kimberly Alfa; Afrizal, Rizki; Pradeka, Deden; Khaerunnisa, Zahra
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.28794

Abstract

Secure data communication is an essential requirement in the digital age, especially in the exchange of confidential information. One of the main problems is the potential for eavesdropping by unauthorised parties who can access open messages. To overcome this, this research aims to develop a website-based system that combines the Least Significant Bit (LSB) method steganography technique and the Caesar cipher method cryptography with the Dvorak keyboard layout to increase data security. The research method used is prototype method with the stages of concept formulation, prototype design, and continuous evaluation. The system was tested by inserting the word ‘TEKKOM’ into a digital image and measuring the quality using Mean Squared Error (MSE) and Peak Signal-to-Noise Ratio (PSNR). The test results show an MSE value of 0.0001466049 and PSNR of 86.47 dB, which means that the visual quality of the image does not decrease significantly and the message is successfully inserted and extracted without errors. The Dvorak keyboard layout adds a layer of security through uncommon input patterns, making it difficult for outsiders to analyse. Thus, the system is able to provide a secure, efficient, and practical solution for web-based information hiding without the need for a database and is still user-friendly.Keywords: Dvorak, Steganography, Caesar Cipher, Least Significant Bit, Website
Penerapan analisis sentimen opini masyarakat terhadap ulasan aplikasi Grab pada google play store menggunakan Algoritma Naive Bayes Zadia, Bella Audrey; Lailiyah, Siti; Bustomi, Tommy
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.29886

Abstract

This study aims to analyze public sentiment regarding reviews of the Grab application on the Google Play Store using the Multinomial Naive Bayes algorithm. The research process follows the KDD stages, starting from data selection, pre-processing, sentiment labeling, dataset splitting, model training, to performance evaluation. A total of 5,000 review data were collected through web scraping techniques and processed step by step using cleaning, normalization, tokenizing, stopword removal, and stemming methods. The developed Multinomial Naive Bayes model was able to classify review sentiments into positive, negative, and neutral categories with an accuracy of 69.6%. Precision and recall for negative and positive sentiments are relatively high, but the performance for neutral sentiment remains low due to imbalanced data distribution. The results of this study provide valuable insights for Grab developers to understand user perceptions and can serve as a basis for strategic decision-making to improve application service quality. Thus, Multinomial Naive Bayes has proven to be effective and efficient for sentiment analysis of Grab app reviews on the Google Play Store.Keywords: Sentiment Analysis, Multinomial Naive Bayes, Grab, Google Play Store, KDD
Decision support system for selecting the best pesticide to eradicate pests on bean plants applying the Multi Attribute Utility Theory (MAUT) Approach Ili Sama, Meliana; Kelen, Yoseph Pius Kurniawan; Gelu, Leonard Peter; S. Manek, Siprianus
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.29954

Abstract

The selection of the right pesticide is very important in pest control efforts on bean plants to maximize yields and maintain crop quality. Often, farmers face a mismatch between expectations and reality related to the products they use. The market offers a wide range of pesticide products, each claiming to have certain advantages. Mismatches in pesticide selection can affect the yields obtained by farmers. This study aims to provide insight to farmers in choosing the best pesticide to control pests on bean plants. this study relies based on the Multi Attribute Utility Theory (MAUT) method as a means to weigh various options based on various aspects in a structured manner. to assess each criterion from various alternatives and provide a ranking of the best pesticide recommendations. The criteria considered include price, how it works, shelf life, number of pests, and its impact on bean plants. The application developed uses the PHP and MySQL programming languages. Based on the results of the study, the alternative pesticide Spinosad obtained the highest score of 0.85, making it the best recommendation.Keywords: Pesticide selection, Decision Support System (DSS), MAUT
Design of information system architecture using TOGAF Architecture Development Method at Rumah Sakit Haji Jakarta Prasetyo, Adit; Waspodo, Bayu
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.29807

Abstract

The Information and Technology (IT) Subdivision of Rumah Sakit Haji Jakarta plays a crucial role in supporting operations but faces serious constraints due to the dominance of manual service processes. Reliance on unstructured recording methods and non-integrated systems leads to various inefficiencies, such as hindered issue tracking, the risk of data loss, and slow service responses that impact the productivity of other units. This research aims to address these problems by producing an applicable enterprise architecture blueprint. Using a qualitative case study approach, this research applies The Open Group Architecture Framework (TOGAF) Architecture Development Method (ADM) up to the Information Systems Architecture phase. Data collection was conducted through in-depth interviews with key stakeholders, process observation, and internal document studies to obtain a comprehensive understanding. The result of this research is a structured enterprise architecture design, encompassing business, data, and application architectures. The primary artifacts produced include as-is and to-be business process models, gap analysis, and a functional design for an integrated information system consisting of a helpdesk module, inventory management, digital maintenance, and IT performance reporting. As a result, this validated blueprint provides a clear strategic guide for the hospital to implement appropriate technology solutions. The implementation of this architecture has significant potential to realize more effective, measurable, and transparent IT service management, which ultimately supports the hospital’s overall digital transformation agenda.Keywords: Enterprise Architecture, TOGAF ADM, Rumah Sakit Haji Jakarta, Helpdesk Information System, Information Systems Architecture.
Penerapan teknologi blockchain berbasis smart contract untuk meningkatkan keamanan transaksi finansial online Wirayuda, Steven Aprianto; Lailiyah, Siti; Fajri, Ahmad
Jurnal Simantec Vol 14, No 1 (2025): Jurnal Simantec Desember 2025
Publisher : Universitas Trunojoyo Madura

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.21107/simantec.v14i1.29893

Abstract

The digital transformation in the financial sector demands a transaction system that is not only fast and efficient but also secure and transparent. This study explores the application of blockchain technology as a solution to the problems found in centralized online financial transaction systems that are vulnerable to manipulation. The objective of this research is to design a blockchain-based financial transaction security system architecture that can be evaluated through a conceptual simulation approach. This study uses a descriptive qualitative method with tools such as Ganache, MetaMask, and Remix IDE to simulate smart contract-based transactions within a local blockchain environment. The novelty of this research lies in the integration of a security system modeling approach with realistic scenario-based simulations, which is rarely discussed in previous studies. The research contributes by producing a modular system architecture that integrates key components—users, smart contracts, validators, and regulators—into a cohesive workflow applicable to various digital financial platforms. Simulation results show that the proposed system enhances security, accelerates transaction validation, strengthens auditability, and reduces operational costs compared to conventional transaction systems. This study provides a strong foundation for the broader development of blockchain-based financial systems that are more resistant to external attacks.Keywords: System Architecture, Blockchain, Transaction Security, Smart Contract, Simulation