cover
Contact Name
Fitria
Contact Email
lp4mjurin@gmail.com
Phone
+6287899062000
Journal Mail Official
lp4mjurin@gmail.com
Editorial Address
Institut Informatika dan Bisnis Darmajaya jl.ZA Pagar Alam no.93 Bandar Lampung
Location
Kota bandar lampung,
Lampung
INDONESIA
Jurnal Informatika
ISSN : 16933877     EISSN : 24071544     DOI : http://dx.doi.org/10.30873/ji.v20i2
Core Subject : Science,
Jurnal Informatika. Jurnal Informatika adalah jurnal cetak dan elektronik sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan akademisi, peneliti dan praktisi bidang informatika. Jurnal Informatika Terbit 2 kali dalam setahun yaitu Bulan Juni dan Desember dengan No. ISSN : 1693-3877 dan No. e-ISSN : 2407-1544.
Articles 308 Documents
EFEK KEEPALIVE DAN HOLDTIME PADA KOMBINASI PROTOKOL ROUTING OSPF DAN BGP UNTUK MENINGKATKAN WAKTU KONVERGENSI Delles Lesmana; Iskandar Fitri; Novi Dian Nathasia
Jurnal Informatika Vol 18, No 1 (2018): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v18i1.1119

Abstract

Redistribusi protokol routing saat ini sering dijumpai dibanyak kasus seperti penggabungan dua perusahaan atau ketika jaringan internal didalam satu Autonomous System (AS) ingin terhubung dengan internet yang terdiri dari ribuan AS yang berbeda. Open Shortest Path First (OSPF) adalah salah satu protokol routing Interior Gateway Protocol (IGP) yang paling banyak digunakan, sementara Border Gateway Protokol (BGP) merupakan satu-satunya protokol routing yang digunakan di internet. Salah satu kekurangan BGP yaitu memiliki waktu konvergensi yang paling lambat dibanding yang lain [8]. Oleh sebab itu banyak penelitian dilakukan agar dapat mengurangi waktu konvergensi BGP diantaranya adalah dengan pengaturan keepalive dan hold time BGP. Pada penelitian ini dilakukan simulasi redsitribusi protokol routing OSPF dan BGP dengan mengatur nilai keepalive dan hold time BGP untuk menghasilkan waktu konvergensi yang cepat. Nilai optimal keepalive dan hold time pada penelitian ini adalah 30 detik untuk hold time dan 10 detik untuk keepalive yang menghasilkan rata-rata waktu konvergensi 28.86 detik yang lebih cepat dibanding penelitian sebelumnya [2].
KINERJA SISTEM INFORMASI DENGAN DENGAN METODE UNIFIED MODELLING LANGUAGE Yodhi Yuniarthe
Jurnal Informatika Vol 13, No 2 (2013): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v13i2.348

Abstract

The size of the software to achieve its success is the ability to meet the needs of users with accurate data processing and display that can support a decision. One of the biggest factors in the success of software development understands the needs of the user. These needs are outlined in the features provided in the software. This paper discusses the factors that need to be considered by the information system with unified modelling language programming can contribute to the performance of the business organizations that can meet a critical factor companies that implement application programs. In this study, the expected realization of the development model of performance-based information systems software engineering methods unified modelling language that is useful for system developers to provide quality programming that is competitive to the user.Keywords— unified modelling language, performance based information systems
Sistem Pengamanan Ganda Pada Kendaraan Bermotor Menggunakan Kartu Secara Elektronik Berbasis Mikrokontroler Abdi Darmawan; - Nurfiana
Jurnal Informatika Vol 10, No 2 (2010): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v10i2.158

Abstract

Multiple security systems in motor vehicles in Indonesia today is required to reduce vehicle theft by people who are not responsible. Current conditions, vehicle theft rates continue to rise. The data obtained from multiple information media, both print and electronic media. Even the theft of motor vehicles had entered the campus environment. The idea how to make the vehicle security system, although there is now a double security on the vehicle include a remote that is connected with an alarm is limited to the open door, an additional lock on the wheels of motor vehicles, power down with the manual switch button and so forth. This research will be how to generate the security of two-wheeled motor vehicles especially effective and much cheaper if produced. The equipment will be made can be displayed by the LCD (Liquid Crystal Display), an attractive and easy to modify the card as a password. How it works two-wheeled vehicle security system is by entering the card as an input to turn off the alarm signal received from signal input through the motion sensor (switch). If the two-wheeler handlebar position changed from the initial position, and handlebar changed by force then it will give input to the microcontroller to inform the infrared sensor (input card), if the card is wrong then the microcontroller will activate the horn Keyword : LCD, Microcontroller, LED, motion sensor  
PENDEKATAN REVERSE ENGINEERING UNTUK PENGUJIAN KEAMANAN GUNA MENINGKATKAN KUALITAS PERANGKAT LUNAK Muhammad Reza Redo
Jurnal Informatika Vol 16, No 1 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v16i1.938

Abstract

A software development will take time and high cost. Reverse engineering is a technique or a way to find the principles of the technology of a product by analyzing the structure, function and how the product. By studying the structure of the functions of a product, this study aims to patching into software to improve the quality of the software itself. Patching which will be tested in this method is Checksum, Obfuscation / Obfuscated Code, API Redirection, Anti-Dumping where the results of the patching will be tested quality and the measured length of the Code, the Output File Results, and the number of changes that occur so as to increase the quality of the software itself Keywords : Reverse engineering, Patching, Checksum, Obfuscation / Obfuscated Code, API Redirection method, Anti Dumping Software
KAMUS ISTILAH ILMU KOMPUTER DENGAN ALGORITMA BOYER MOORE BERBASIS WEB Dwipa Handayani; Abrar Hiswara
Jurnal Informatika Vol 19, No 2 (2019): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v19i2.1519

Abstract

A dictionary is a reference book that contains words and phrases that are usually arranged in alphabetical order along with an explanation of their meaning, usage and translation and function to help recognize new terms. The field of computer science certainly has specific terms related to computers, so it is needed a dictionary of computer terms, currently the existing dictionary is still conventional in its use ineffective and inefficient. The design and manufacture of applications using algorithms by performing a sequence of logical steps in solving problems that are arranged systematically. Algorithms for searching are now growing day by day. Boyer Moore algorithm is one of the search algorithms that is considered to have the best results, namely the algorithm that moves matching strings from right to left. With this web-based dictionary the user is expected to be able to get information quickly, without any limitations on space and time. Keywords: Boyer Moore's Algorithm, Computer Science, Glossary of Terms, Web.
VISUALISASI PETA RSS FINGERPRINT DALAM FASE OFFLINE PADA LOCALIZATION DI LANTAI 3 GEDUNG TEKNIK ELEKTRO UGM MENGGUNAKAN WLAN chairani chairani; Widyawan Widyawan
Jurnal Informatika Vol 13, No 1 (2013): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v13i1.127

Abstract

This paper discusses about the fingerprint mapping of Received Signal Strength (RSS) WLAN, placed in UGM’s Electrical Engineering (TE) building on 3rd Floor Corridor. RSS WLAN measurements performed by using visualization NetSurveyor software and RSS fingerprint map visualization created using RapidMiner software. Dimension area of 3rd floor of UGM’s TE building is 1696.68 m2 and formed in 1893 grids for each grid is 1 m x 1 m. Measurement of RSS WLAN to 5 access points performed in duration of 1 minute 58 seconds, and produce as many as 86980 record. The results of this research is fingerprint visualization map as calibration of RSS WLAN distribution at JTETI building on the 3rd floor which can be used for the development of indoor localization. Keywords : Fingerprint, RSS, WLAN, Localization.  
TEKNIK MENYEMBUNYIKAN PESAN RAHASIA MENGGUNAKAN STEGANOGRAPHY DAN CRYPTOGRAPHY M. Miftakul Amin
Jurnal Informatika Vol 15, No 1 (2015): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v15i1.427

Abstract

Development of Internet technology has demonstrated the communication that occurs does not require face to face directly. Safety factor becomes an important issue in the communication using the Internet network. Various attempts were made to keep the information security and confidentiality can be maintained. Steganography and cryptography techniques present as a technique to achieve data security. This research attempts to develop an application that can be used for communication by using two techniques. In this study steganography method used is the Least Significant Bit (LSB) whereas cryptography method used is the Caesar cipher. From the research that has been done can be generated an application that has been able to perform encryption and decryption of secret messages that can be hidden in a digital image color (24 bit). Key words : steganography, cryptography, LSB
INTEGRASI DATA STATUS AKADEMIK PADA SISTEM INFORMASI AKADEMIK DENGAN TRANSAKSI PEMINJAMAN BUKU PADA TANOTO LIBRARY BERBASIS ANDROID Abrar Hiswara
Jurnal Informatika Vol 18, No 1 (2018): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v18i1.1014

Abstract

Perkembangan teknologi yang sangat cepat membuat institusi pendidikan harus dapat beradaptasi dengan cepat, kebutuhan akan informasi yang update tidak mengenal waktu dan tempat. Perpustakaan sebagai unit pelayanan teknis disebuah perguruan tinggi, sangat penting untuk menyediakan informasi untuk proses belajar mengajar. Proses pendaftaran mahasiswa menjadi anggota perpustakaan dilakukan dengan memasukkan data mahasiswa ke dalam sistem informasi perperpustakaan. Proses pemasukkan data mahasiswa kedalam database perpustakaan akan mengakibatkan terjadinya duplikat data, antar data mahasiswa pada database sistem informasi perpustakaan dengan database sistem informasi akademik.  Sistem informasi akademik merupakan layanan untuk mengelola semua data-data akademik, termasuk data mahasiswa yang ada di Universitas Bhayangkara Jakarta Raya. Selain itu data mahasiswa yang tersebar rawan terhadap perbedaan data, apabila disalah satu database dilakukan update status akademik mahasiswa sedangkan di database lain tidak. Karena hanya mahasiswa dengan status akademik aktif saja yang dapat melakukan transaksi peminjaman buku. Web service memungkinkan terjadinya pertukaran data dapat menangani masalah tersebut, data mahasiswa dan status akademik mahasiswa di perpustakaan akan diambil langsung dari database sumber sistem informasi akademik dengan teknologi REST.  Selain itu, banyaknya mahasiswa yang terlambat mengembalikan buku, karena beberapa mahasiswa beralasan masih menggunakannya atau menghilangkannya. Hal ini, tentu akan mempengaruhi jumlah koleksi buku dan kondisi buku. Sehingga perlu adanya sistem informasi yang dapat mengingatkan waktu pengembalian buku dan melakukan perpajangan waktu peminjaman.                               
Pendeteksi Propagasi Menggunakan Metode FM Berbasis Personal Komputer Zaidir Jamal
Jurnal Informatika Vol 10, No 2 (2010): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v10i2.154

Abstract

Generally, point to point communication and broadcasting uses VHF band, each function VHF band can use for observes   activities at ionosphere. This research designed and realized   propagation detection use frequency modulation based personal computer.  Results of the research are realization of system and simulation. Simulation results   before ionosphere reflection occur is  50 % and after ionosphere reflection occur is 90 %. Frequency modulation method can be implemented   earthquake detection with realized measurement stations. Keyword : VHF, Propagation, ionosphere
PUSTAKA SANDI KLASIK BERBASIS COMPONENT OBJECT MODEL (COM) M. Miftakul Amin
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30873/ji.v14i2.655

Abstract

Security and confidentiality are important issues that need serious attention in the era of information technology. Cryptography is one technique for securing data and information. In cryptography, the data is disguised in such a way that even if the data can be read, it can not be understood by those who do not have the authority. Data that has not undergone encoding known as The term plaintext, and after camouflaged with an encryption method, then it will turn plaintext into ciphertext. In general, a system equipped with a password to restrict only certain parties were entitled to enter into the system. If the password can be solved or known by an unauthorized person, then the data or information that is in the system is threatened. This research aims to develop a library classical password that can be used as an attempt to realize the aspect of information security in access control, by utilizing the technology component object model (COM). From the results of tests performed can be seen that the COM libraries are packed in COM DDL can be used by a variety of programming languages fairly easily.Keywords— cryptography, component object model (COM)

Page 8 of 31 | Total Record : 308