cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota bandar lampung,
Lampung
INDONESIA
Jurnal Informatika
ISSN : -     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 181 Documents
PEMODELAN CUSTOMER RELATIONSHIP MANAGEMENT (CRM) PERGURUAN TINGGI POLITEKNIK Subyantoro, Eko; Putra, Septafiansyah Dwi
Jurnal Informatika Vol 17, No 2 (2017): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Higher Education is a place for students to get an education to gain knowledge in the field of particular science. Old people entrust their children who are assets to the best colleges. For Higher Education is the belief of parents to be an option, thus it can be said parents and students are the main customers for PerguruanTinggi.Penelitian produces a CRM model for Higher Education Polytechnic to monitor the results of learning achievement so that Stakeholders can see the learning results both academic and nonacademic. Information systems development methodology FAST is a development with a functional analysis of parts associated with the system. The fast method can be developed to facilitate the making of CRM model in Polytechnic. Keywords: CRM, Fast Methodology, Perguruan Tinggi Politeknik
IMPLEMENTASI SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) PADA APLIKASI MONITORING JARINGAN BERBASIS WEBSITE(STUDI KASUS UNIVERSITAS MUHAMMADIYAH BENGKULU) -, Diana; Maulana, Fadel
Jurnal Informatika Vol 16, No 2 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Network management is the ability to monitor, control and planning a computer network and system components. Monitoring the network is part of network management. Simple Network Management Protocol (SNMP) is an application protocol on TCP / IP network that can be used for management and monitoring of computer network system. An application built with web-based will be able to provide advantages in ease of access, has a display in the form of a Graphical User Interface (GUI) to the administrator to read the conditions of a network of value provided by SNMP.The purpose of this study was to find a web-based monitoring system can be implemented using SNMP, as well as to determine the completion of the disruption of the network. From the research results can be shown that the monitoring system of web-based has been successfully implemented using the SNMP protocol as a data collection monitoring and database Round Robin (RRDtool) for the analysis of monitoring data and displays the data results of monitoring in the form of graphs and data obtained in the event of a network interruption enough accurate and sufficient information about the complete disruption.Keyword: network management,Simple Network Management Protocol(SNMP), website
CLUSTERING MENGGUNAKAN METODE K-MEAN UNTUK MENENTUKAN STATUS GIZI BALITA Dhuhita, Windha Mega Pradnya
Jurnal Informatika Vol 15, No 2 (2015): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Malnutrition is one of the health problems that quite often among toddlers in Indonesia. Trace data from the WHO, the number of infants who had died from malnutrition in Indonesia in 2012 was 29 out of 1000 births. Caring parents and village officials (in this case the officer Public Health Service Center - HEALTH) to monitor the nutritional indispensable. Research conducted to try to perform a grouping of 50 children in the village of Karang Songo into 5 clusters nutritional status. Grouping nutritional status of children in the village of Songo Flower using the K-Means method is done through several stages, namely: the determination of business objectives, data collection 50 children in the village of Songo coral, grouping balitake nutritional status in five clusters, namely cluster 1 - malnutrition; cluster 2 - malnutrition; cluster 3 - good nutrition; cluster 4 - nutrition; Cluster 5 - obesity, cluster calculations using SPSS software, analysis of the output data, grouping nutritional status of children using tables Growth Chart, and the latter tested by comparing the results of the grouping of K-means algorithm and tables Growth Chart. By comparing the results of grouping using a table Growth Chart and K-Means algorithm obtained 17 data have the same group. From this figure it can be concluded that the K-Means algorithm only has an accuracy score of 34% correct.Keywords—Data Mining , Nutritional Status , K -Means
PENDEKATAN REVERSE ENGINEERING UNTUK PENGUJIAN KEAMANAN GUNA MENINGKATKAN KUALITAS PERANGKAT LUNAK Redo, Muhammad Reza
Jurnal Informatika Vol 16, No 1 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A software development will take time and high cost. Reverse engineering is a technique or a way to find the principles of the technology of a product by analyzing the structure, function and how the product. By studying the structure of the functions of a product, this study aims to patching into software to improve the quality of the software itself. Patching which will be tested in this method is Checksum, Obfuscation / Obfuscated Code, API Redirection, Anti-Dumping where the results of the patching will be tested quality and the measured length of the Code, the Output File Results, and the number of changes that occur so as to increase the quality of the software itself Keywords : Reverse engineering, Patching, Checksum, Obfuscation / Obfuscated Code, API Redirection method, Anti Dumping Software
PUSTAKA SANDI KLASIK BERBASIS COMPONENT OBJECT MODEL (COM) Amin, M. Miftakul
Jurnal Informatika Vol 14, No 2 (2014): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Security and confidentiality are important issues that need serious attention in the era of information technology. Cryptography is one technique for securing data and information. In cryptography, the data is disguised in such a way that even if the data can be read, it can not be understood by those who do not have the authority. Data that has not undergone encoding known as The term plaintext, and after camouflaged with an encryption method, then it will turn plaintext into ciphertext. In general, a system equipped with a password to restrict only certain parties were entitled to enter into the system. If the password can be solved or known by an unauthorized person, then the data or information that is in the system is threatened. This research aims to develop a library classical password that can be used as an attempt to realize the aspect of information security in access control, by utilizing the technology component object model (COM). From the results of tests performed can be seen that the COM libraries are packed in COM DDL can be used by a variety of programming languages fairly easily.Keywords— cryptography, component object model (COM)
ANALISIS PERFORMA DAN DESAIN JARINGAN KOMPUTER MENGGUNAKAN TOP-DOWN NETWORK DESAINSTUDI KASUS PADA CV. MERAH PUTIH Ikhsanto, Muhammad Nur
Jurnal Informatika Vol 16, No 2 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analysis of computer networking is very important and necessary to help improve network performance. Many companies are designed their networks are not in accordance with its business goals, so the performance of the existing network of the company is not as they expected. Therefore required an analysis on existing computer network within the company, both in terms of performance as well as network design. Existing network designs are closely related to the performance of the network. In this study the parameters that exist in a computer networking such as delay, jitter, bandwidth, packet utilization, packet loss and throughput will be measured to determine the performance of the network and then these parameters are used as information to redesign the network to get better network performance and generate more structured network design according to the needs of the company. Keyword : network performance, Top-Down Network Desain, delay, jitter, bandwidth, paket loss, thoughput, network design.
PENGARUH KEMATANGAN, KINERJA DAN PEMANFAATAN TEKNOLOGI INFORMASI TERHADAP IMPLEMENTASI SISTEM INFORMASI DI KAMPUS STMIK PRINGSEWU DENGAN MODEL COBIT FRAMEWORK Usmanto, Budi
Jurnal Informatika Vol 16, No 2 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Penelitian ini bertujuan untuk memperoleh pemahaman tentang tingkat kematangan ada atau tidaknya pengaruh teknologi informasi, kinerja dan pemanfaatan Teknologi Informasi Implementasi Sistem Informasi di STMIK Pringsewu pada manajemen dan penggunaan Teknologi Informasi. Kuesioner dibagikan kepada dosen dan staf. Responden berdasarkan indikator diambil dari variabel kematangan teknologi informasi, kinerja dan pemanfaatan teknologi informasi dengan Domain COBIT 4. Metode dalam penelitian ini adalah teknik pengumpulan data, metode analisis data, metode analisis regresi. Pengolahan data menggunakan SPSS untuk menguji reliabilitas, uji validasi dan analisis regresi dan menggunakan Matlab untuk menghitung nilai JST sehingga diketahui pengaruh setiap faktornya. Kesimpulan dari penelitian ini adalah terciptanya model dari 4 faktor yaitu Planning & Organization, Deliver and Service, Technology Acquisition & Implementation dan Monitoring and Evaluate. yang memiliki pengaruh signifikan terhadap pelaksanaan Sistem Informasi di kampus STMIK Pringsewu. Kata kunci: Maturity, Pemanfaatan TI, Kinerja TI, COBIT, Analisis Faktor, Implementasi Sistem Informasi
PEMODELAN ARSITEKTUR ENTERPRISE MENGGUNAKAN ENTERPRISE ARCHITECTURE PLANNING UNTUK MENDUKUNG SISTEM INFORMASI AKADEMIK DI JURUSAN TEKNIK INFORMATIKA STMIK DARMAJAYA BANDAR LAMPUNG Zaidal, Nisar; Triloka, Joko
Jurnal Informatika Vol 8, No 1 (2008): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The way of determining information system form able to fulfil requirement of business and aligning with organizational business growth is to develop enterprise architecture. Enterprise architecture defines a process for organizing and directing information system development plan, what consist of data architecture, application architecture and technology architecture to obtain management commitments and support in integrated information system development implementation. Methodology being used in modelling this architecture is Enterprise Architecture Planning (EAP). EAP defines a process for enterprise architects that emphasize interpersonal skills and techniques for organizing and directing enterprise architecture project, obtaining management commitment, presenting the plan to management and leading the organization through the transition from planning to implementation. Research place taken as case study is Informatics Faculty at Business and Informatics Institute Darmajaya Business modelling phase is a process which create business model as representative form that defined business comprise of business function performed by enterprise. Business model used as a basic on define three architecture and making implementation plan. Result of modelling business function in Informatics Faculty at Business and Informatics Institute Darmajaya is defined counted 27 detail business function. Data architecture gets 23 data entities candidate and relationship among others. Application architecture obtains by 20 application candidate. While technological architecture yield conceptual network architecture and enterprise business system architecture.
PENERAPAN METODE USABILITY PADA SISTEM INFORMASI PELAYANAN PELANGGAN Ariantoro, Tri Rizqi
Jurnal Informatika Vol 17, No 2 (2017): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Usability comes from a usable word that generally means it can be used properly. Basic usability usability levels include: Learnability, efficiency, memorability, error and satisfaction. PDAM Tirta Musi Palembang has a website that is www.tirtamusi.com, and has not been evaluated how far the website is useful (usable), in presenting information and service satisfaction to customers. The usability method can be used to evaluate the website. In the process of website evaluation, usability testing can use the supporting application that is Techsmith Morae Recorder. Morae provides functions to assist usability practitioners in planning, testing, data analysis and reporting of results. From the results of research can be seen that the website PDAM Tirta Musi Palembang not yet meet from the level of satisfaction (satisfaction). Where necessary the addition of information menu is Telephone Information and Companys Complete Address, Service Unit Information, Site Map and Searching. Research using this usability is expected to provide an assessment for the development of the website so that it can be useful and provide satisfaction to customers.Keywords: Usability, Website, Evaluation, and Morae Recorder.
DETEKTOR EKSPRESI WAJAH MANUSIA Ali, Rionaldi
Jurnal Informatika Vol 16, No 1 (2016): Jurnal Informatika
Publisher : IIB Darmajaya

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Human face expression is on of the sign of human behavior. Face expression can deliverhuman being tought, so that we can recognize their emotion. But when emotion reach certain of level, details of human expression is lost.Our research will describeand explainabout a technique that could detect human face expression to to determining emotion when persons is in happy emotion, anger, sad, or afraid. Keywords : Face Expression, Emotion Detector