cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota surabaya,
Jawa timur
INDONESIA
Jurnal Infra
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 1,326 Documents
PERANCANGAN DAN PEMBUATAN SISTEM ADMINISTRASI PADA TOKO “JAYADI” PASURUAN Andi Soei; Silvia Rostianingsih; Lily Puspa Dewi
Jurnal Infra Vol 1, No 2 (2013)
Publisher : Jurnal Infra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Toko “Jayadi” Pasuruan, terletak di Pasuruan, merupakan sebuah usaha dagang wiraswasta yang menjual berbagai macam baut dan mur. Beberapa contoh barang yang dijual meliputi baut yang berbahan baja, baut yang kepalanya untuk kunci L. Dalam pencatatan transaksi masih dilakukan secara manual, sehingga sering terjadi kesalahan dalam penulisan. Hal ini mengakibatkan rawan akan tindakan curang dan sulit mengetahui berapa besar keuntungan yang didapatkan. Karena tidak adanya pencatatan persediaan barang mengakibatkan sering terjadi kehabisan stok. Pembuatan sistem informasi administrasi ini, diharapkan dapat membantu Toko “Jayadi” Pasuruan dalam mencatat transaksi pembelian dan penjualan, sehingga dapat meminimalisir kesalahan yang terjadi karena pencatatan pembelian dan penjualan yang dilakukan secara manual. Dengan adanya sistem ini, diharapkan bisa meminimalisir kecurangan yang dianggap bisa terjadi.Sistem ini dirancang dengan Data Flow Diagram dan Entity Relationship Diagram. Rancangan desain sistem ini secara garis besar meliputi sistem pembelian, penjualan dan pencatatan stok. Pembuatan program ini menggunakan bahasa pemrograman Visual Basic 2005.NET dan database MySQL 2005 untuk proses penyimpanan data. Perancangan program ini menghasilkan laporan-laporan yang berguna untuk melihat transaksi yang telah dilakukan.Menurut hasil survey, 66,5% dari user beranggapan bahwa kemudahan penggunaan aplikasi yang dibuat sudah cukup baik dan 33,5% user yang beranggapan bahwa kemudahan penggunaan aplikasi sudah baik.
Evaluasi Tata Kelola Teknologi Informasi Dengan Framework COBIT 5 Di Lembaga XYZ Cabang Denpasar Dwiki Noviandra Kristanto; Alexander Setiawan; Andreas Handojo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

XYZ Institute Denpasar Branch is a company engaged in the field of air traffic control. To carry out its business activities, until 2021, the company has 2 Main Branch Offices (KCU), 31 Branch Offices (KC), 31 Sub-Branch Offices (KCP), and 226 Aviation Navigation Service Units (UPNP). One of them is the Denpasar Branch of the XYZ Institute.Large companies have business processes with complexity and one of their main tasks is controlling spare parts for aviation telecommunications facilities and assisted by information technology. The company strives to control spare parts in detail, carefully and precisely to increase availability and reliability. The evaluation of information technology governance that has been implemented does not provide a definite guarantee for the company. Therefore, in the use of information technology, companies must focus on monitoring, maintenance, and management So in this research, the framework used is the COBIT 5 framework with the stages of Assessment Process Activities. The domain used in this study is EDM04 (Ensure Resource Optimization) which was obtained from the problems that occurred.
Platform Big Data Analytic Berbasis Apache Spark Bagi Pemula Dalam Menyusun Data Analysis Workflow Daniel Jeremia; Henry Novianus Palit; Andre Gunawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data is a concrete foundation for decision-making. The development of technology, in turn, creates a problem in the number and complexity of data as it requires sophisticated methods to analyze. This calls for the need of big data analytics. Analyzing data quickly, simply, and robustly is now a very high requirement, especially for beginners.To combat this problem, a platform for big data analytics that is beginner-friendly is proposed in this research. This platform is created with the purpose of simplifying the process of analyzing data easily without the use of programming for beginners. Diagrams/workflows are designed to manipulate data in a drag-and-drop fashion to make it easier for beginners. Furthermore, this platform uses industry-leading technology such as Apache Spark to deal with the problems of big data analytic without being known by the user at all.A survey/demo of 12 people with 3 different backgrounds, namely commoners, beginners, and experts, is held. The obtained result indicates a positive experience in doing data analysis without programming. An average score of 4.4 out of 5 is given by the participants for how much this platform can simplify the work of data analysis. This big data analytic platform has a huge potential for beginners and professionals alike.
Analisis perbandingan keakuratan deteksi serangan dan efisiensi pemakaian CPU resources dari tools pendeteksi serangan SNORT dan SURICATA yang di pasang di web server Dhanar Restu Arrasy; Agustinus Noertjahyana
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analyze attack detection accuracy and CPU Resource usage efficiency of Snort and Suricata attack detection tools installed on the Web Server..Snort and Suricata are IDS tools used to detect network attacks. Snort Snort is an Open Source Intrusion Prevention System (IPS) using a set of rules that help determine malicious network activity and uses those rules to find packets that match it and generate alerts for users. Suricata is a leading independent open source threat detection engine. By combining intrusion detection (IDS), intrusion prevention (IPS), network security monitoring (NSM) and PCAP processing, Suricata can quickly identify, stop, and assess the most advanced attacks.From the results of this study that at the time of flood DOS Attack Snort had an average of 93.5% while Suricata had 94.2% in the CPU section on port 80. This explains that Suricata is superior in efficiency compared to Snort during flood DOS Attack. As for the port 443, Snort has an average of 94.5% and Suricata has 95.67% in the CPU section on port 443, proving that Suricata is superior in CPU activity. For the memory section, Snort has an average of 19.9% for memory usage or is efficient compared to Suricata which has an average memory usage of 69.3% on port 80. On port 443 Snort has an average memory usage of 30.3% compared to with Suricata which has an average memory usage of 30.5%, it means that Suricata has less usage than Snort
Aplikasi Monitoring Kelembapan Tanah, Suhu, Kadar PH Tanah Serta Penyiraman Dan Pemupukan Otomatis Pada Tanaman Hias Lidah Mertua Berbasis IOT Winsen Winsen; Alexander Setiawan; Resmana Lim
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The maintenance of mother-in-law's tongue ornamental plants often makes mistakes because ornamental plants have many types of plants. Some ornamental plants such as mother-in-law's tongue have a quite different handling compared to most of the existing ornamental plants such as air requirements around 5-8% while most ornamental plants require 50-70%.The problem that the author wants to solve is by utilizing android and IoT applications which function to monitor the mother-in-law's tongue ornamental plants and provide adequate watering and fertilization.The test was carried out using 4 ornamental plants that were treated with different treatments. From the results of the tests carried out, the application that was made was able to monitor and control the water and fertilizer content accurately and the results from the test method were able to achieve an accuracy value of 100%.
Penerapan Metode Convolutional Neural Network Untuk Clothing Image Recognition Fuyi Gunawan Putri; Justinus Andjarwirawan; Anita Nathania Purbowo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Object recognition is a development of the world of AI (Artificial Intelligence) which is used to recognize objects in digital images. Various kinds of recognition can be done with Clothing Image Recognition. In the global industrial era, development of fashion type and variant makes it difficult for people to recognize, for example topwear has variants ranging from sweatshirts, kurtas, waistcoats, etc. This makes users hard to distinguish categories from types of clothing. In fact, users often forget or didn't know the name of a clothing type that they want to find because they just remember the shape.Clothing image recognition uses the CNN (Convolutional Neural Network) method with the VGG16 model. The application of CNN with the VGG16 model will be carried out on Python and Keras as the library to speed up the research process on training data. Application of the program to mobile devices using Android Studio with the Kotlin programming language, with the help of the Tensorflow Lite library as machine learning on mobile devices. The results of this thesis show an accuracy of 81.83% for training data in epoch 1 and 82%-94% for training data in epoch 10 on clothing image recognition.
Penerapan Manajemen Risiko Teknologi Informasi Pada Perusahaan PT. X Christian Natanael Sugiharto; Alexander Setiawan; Silvia Rostianingsih
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Risk Management is one of the most crucial activities in today's business world. Along with the development of an increasingly complex era, making business people have to face many increasingly complex challenges as well. You can say that risk management must be implemented in companies that currently use IT in their dominant business processes in order to minimize risks and identify risks that will arise. The method used in this study to be applied to the company PT. X is COBIT 5 with two process domains, namely DSS01 Manage Operations and APO12 Manage Risk. The results of this study are some 24 (twenty four) company risks and risk mitigation related to what must be done in overcoming these risks.
Kustomisasi dan Implementasi Odoo ERP: Studi Kasus Perusahaan Manufaktur PT. X Natanael Kevin Kurniawan S; Yulia Yulia; Eveline Cynthia Irawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Odoo is an open source based ERP application that has various modules that can be configured and customized. In this era of development, information technology has an important role in the business world. PT. X is a manufacturing company that has not utilized information technology to its full potential. This resulted in the emergence of problems in the company, among others: in obtaining information it takes longer time because the data contained in the company has not been integrated. Then, the possibility of human error problems committed by employees, such as forgetting to enter data into the company's data recording. The ERP program was created to try to overcome the problems that occurred at PT. X. For that the platform chosen is Odoo because it has many advantages such as easy to configure and customize the module. To overcome the problems that exist in the company, the development of the Odoo human resources module is carried out. The development of this module will be preceded by designing and analyzing the workflow of the HR division at PT. X. In addition, a review of other laws and regulations related to manpower in Indonesia is also carried out. To measure the success of the implementation of the Odoo ERP program, user satisfaction analysis was carried out using the Doll and Torkzadeh (1998) method. From the analysis of the implementation of the Odoo ERP program in the company, it can be concluded that the Odoo ERP program has a good impact on meeting company needs properly and quickly.
Aplikasi Sistem Pakar Rekomendasi Makanan untuk Memenuhi Kecukupan Gizi William William; Kartika Gunadi; Anita Nathania Purbowo
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Nutrition problems are one of the common problems in Indonesia. The lack of knowledge about nutritional needs is one of the main causes of nutritional problems. To avoid nutrition problems, everyone needs to know their daily calorie needs so they don’t eat more or less food than the required calories. Eating more than the required calories can lead to obesity while eating less than the required calories can lead to malnutrition. This research was made to help reduce nutrition problems by creating an application that can help users to know their daily calorie needs and provide food recommendations that suit their caloric needs. By using the forward chaining method to collect personal data from user and the genetic algorithm method to filter food to be recommended.Based on the results of the program test conducted, the genetic algorithm method used was successful in filtering food and recommending it where the total calories from the recommended foods are close to the users total calorie needs although not perfect and sometime still exceed the calories needed but not in large amounts. The list of food menus used as a reference is a balanced diet according to Ministry of Health, but further researchers can use other references. 
Implementasi Internet of Things Untuk Pembuatan Keyless Smart Door Dengan NFC Tag Dan QR Code Jason Evander; Resmana Lim; Justinus Andjarwirawan
Jurnal Infra Vol 10, No 1 (2022)
Publisher : Universitas Kristen Petra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the current pandemic that’s been going on, most people will spend their time at home, and wants to feel comfortable and safe because they spend most of the time inside their house. Many burglary door cases happen because the lack of security at their homes.In this research, a trial will be conducted to help resolve the problem by implementing Internet of Things technology on doors as a door lock. There are two ways that can be used for unlocking the lock. First is through scanning a QR Code and second is through a stick from NFC Tag in the form of a sticker that can be attached at a mobile phone. Scanning QR Code will be assisted by a camera, while the NFC Tag reader will be assisted by radio frequency waves to view the objects. Lastly, the fill in QR Code and NFC Sticker data will be assisted by an android-based application, so that the entire technology will be controller by the application. It is hoped that with the help of controlling the entire technology with this application, it will reduce and solve the existing problems regarding door locks that has been happening in our society.