cover
Contact Name
Mohammad Sani Suprayogi
Contact Email
yogie@usm.ac.id
Phone
-
Journal Mail Official
santi@usm.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Jurnal Transformatika
Published by Universitas Semarang
ISSN : 16933656     EISSN : 24606731     DOI : -
Core Subject : Science,
Transformatika is a peer reviewed Journal in Indonesian and English published two issues per year (January and July). The aim of Transformatika is to publish high-quality articles of the latest developments in the field of Information Technology. We accept the article with the scope of Information Systems, Web Technology, Computer Networks, Artificial Intelligence, and Multimedia.
Arjuna Subject : -
Articles 16 Documents
Search results for , issue "Vol. 20 No. 2 (2023): January 2023" : 16 Documents clear
Pengembangan Sistem Informasi Destinasi Wisata Pati berbasis Web Semantik Nurkamid, Mukhamad; Fatah, Andrie Adzkia
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5397

Abstract

The purpose of this study is to implement semantic web technology to search for tourist objects in Pati Regency using ontologies. Search engines are currently unable to provide the exact information that users need. While search engines that use semantics can provide relevant information because the data can be understood according to meaning and are interconnected. Ontology is used to store data in the form of objects that are interconnected with each other. The ontology approach was chosen as an alternative to current storage media (relational based), because the data is easier to present. Pati Regency has a lot of tourism potential to be developed. Statistical data on the number of tours in Pati every year has increased, including religious tourism, cultural tourism, nature tourism, educational tourism and industrial tourism. However, the existence of these many tours has not made the city of Pati a tourist destination for both local and foreign tourists. The results of this study are the presentation of data models for tourist destinations which include cultural tourism, educational tourism, nature tourism, historical tourism, industrial tourism, craft tourism and culinary tourism in Pati Regency which contains some information such as the name of the tour, type of tour, description, the location of the tour and the telephone of the tour.
Optimization of the Stemming Technique on Text Preprocessing President 3 Periods Topic Albab, M. Ulil; P., Yohana Karuniawati; Fawaiq, Mohammad Nur
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5374

Abstract

Stemming merupakan suatu proses untuk menemukan kata dasar dari sebuah kata. Penelitian ini bertujuan untuk melakukan tahapan text pre-processing pada data twitter yang menyebutkan topik Presiden 3 Periode , yaitu sebanyak 797 data yang didapatkan dari crawling twitter mulai tanggal 15 April 2022 sampai dengan 30 April 2022, sekaligus melakukan optimasi salah satu teknik stemming terhadap teks berbahasa Indonesia yang memang belum banyak dilakukan. Banyaknya kata yang diolah sebanyak 9401 kata. Optimasi yang dilakukan yaitu dengan memodifikasi kamus bahasa dan menambahkan kata-kata yang dimasukkan dalam stopword sehingga dapat menghasilkan jumlah kata ter-stemming yang semakin meningkat. Sebelum dilakukan optimasi, prosentase keberhasilan stemming mencapai 95,86%, setelah dilakukan optimasi meningkat menjadi 99,93%.
Analisis Kolaborasi Hubungan Karyawan Menggunakan Metode Social Network Analysis (Studi Kasus Dinas Kearsipan dan Perpustakaan Kabupaten Boyolali) Kuncoro, Wreda Agung; Sediyono, Eko; Hartomo, Kristoko Dwi
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.6240

Abstract

Good local government performance, especially related to the realization of good corporate governance, can be created if there is good communication between agencies, employees and compact collaboration to synergize policies that facilitate public services. To optimize government performance, one of which is the Boyolali District Archives and Library Service through collaborative relationships between employees so as to create intense two-way communication. This study aims to identify social networks related to collaboration between employees using the Social Network Analysis method and a total of 40 people as respondents, but only 32 people filled out the questionnaire data completely. The indicators used in viewing the research results are density values, degree centrality values, closeness centrality values, betweenness centrality values, and clique values. The results of the analysis obtained a network density level of 14.8% (considered weak because it is less than 50 percent). Employee number 21 has the highest degree centrality value and betweenness centrality value, then employee number 9 has the highest closeness centrality. This research concludes that there is a good collaborative relationship between the four departments in the Archives and Library Office of Boyolali Regency, namely the Operations department, the Service department, the Archives department, and the Librarian department.  
SISTEM INFORMASI GEOGRAFIS PEMETAAN SUMBER MATA AIR PDAM KABUPATEN PATI BERBASIS WEBSITE Risaldi, Reva Bagus
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.4373

Abstract

Di setiap provinsi atau wilayah memiliki satu atau lebih perusahaan PDAM yang mengelola sumber air, salah satunya ialah PDAM Tirta Bening yang berada di Kabupaten Pati. Akan tetapi, saat ini dalam pengelolan data dan informasinya masih dilakukan secara manual yaitu masih menggunakan data statis menurut data yang telah di petakan sumber mata airnya. Hal ini dirasa informasi yang di dapatkan masih kurang begitu bagus karena masih menggunakan data statis untuk memonitoring pemetaan maupun pendataan suatu sumber airnya. Oleh karena itu penulis membangun aplikasi Sistem informasi geografis pemetaan sumber mata air PDAM Kabupaten Pati berbasis website , dengan metode sistem yang di gunakan adalah pendekatan OOP (Object Oriented Program) dengan menggunakan Unified Modeling Language, dan dengan metode pengembangan sistem waterfall. Hasil pengujian sistem diperoleh dari pengujian blackbox dengan hasil presentase 100% valid, whitebox dengan hasil basis flow memiliki 1 jalur, dan User Acceptance Testing dengan presentase segi kemanfaatannya ialah 98.66% segi tampilan antar muka ialah 100% dan segi kegunaan ialah 100%. Dari hasil pengujian mendapat kesimpulan bahwa sistem sangat layak
MOBILE PRIVACY AWARENESS OF HIGHER EDUCATION STUDENTS IN PLATEAU STATE NIGERIA Jegede, Abayomi; Chagga, Chagga Aku; Aimufua, Gilbert; Mazadu, Jesse; Oloyede, Ayodele; Olubodun, Kolawole
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5444

Abstract

The ubiquitous nature of mobile devices and wide array of applications (and services) they offer make them useful in virtually all areas of human endeavours. Owners of mobile devices store large amounts of vital and sensitive personal information on their devices. Unauthorized access to such information by third parties can violate the privacy of users and expose individuals and businesses to huge financial loses and damage to reputation. This makes it imperative for owners of technology service providers and owners of mobile devices to take proactive steps that prevent privacy violation. One of such critical steps is privacy awareness, which is the knowledge and consciousness of the need for privacy, an understanding of actions that promote or compromise privacy and the consequences of irresponsible online behaviour. The aim of this study is to assess the level of awareness of tertiary institution students with respect to privacy issues associated with the use of mobile communication devices. The research uses questionnaires to obtain data on the privacy awareness of users of mobile devices in some tertiary institutions in Plateau State. The paper investigates the current status of mobile privacy issues and awareness of users in these tertiary institutions. It also attempts to expose the gaps in privacy awareness of mobile device users, the factors responsible for limited privacy awareness and strategies for addressing the low level of privacy awareness of mobile device users. The results from this study show that high level of literacy does not necessarily imply high-level privacy awareness. Many respondents who are privacy aware do not possess the necessary skills or knowledge to ensure data and user privacy on their mobile devices. Others who possess this knowledge are will to engage in practices that compromise privacy in exchange for financial gain. Overall, the study exposes the actual level of privacy awareness and defeat the assumption that high level of education automatically results in high-level privacy awareness. It also contradicts the assumption that being privacy-aware guarantees responsible online behaviour and adherence to practices that promote online privacy.
Peningkatan Fitur Ekstraksi Berbasis Discrete Wavelet Transform dan Principal Component Analysis Pada Pengenalan Citra Batik Sugiarto, Edi; Budiman, Fikri; Muslih, Muslih; Arifin, Zaenal; Fahmi, Amiq; Hendriyanto, Novi
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5613

Abstract

Pengenalan pola batik menjadi penting karena batik sebagai warisan budaya bangsa perlu dilestarikan kepada generasi ke generasi. Salah satu upaya untuk memperkenalkan pola batik ini yaitu dengan memperkenalkan keragaman motif atau polanya. Penelitian ini bertujuan untuk mengoptimalisasi metode fitur ekstraksi dengan menggunakan metode Discrete Wavelet Transform (DWT) dan Principal Component Analysis (PCA) untuk mereduksi hasil fitur ekstraksi yang diperoleh dari DWT berdasarkan fitur-fitur yang memiliki korelasi yang baik. Tahapan dilakukan dengan menggunakan 310 data berupa citra batik yang terdiri dari 7 motif dengan komposisi 240 untuk data training dan 70 untuk data testing. Pada tahap fitur ekstraksi dengan menambahkan metode PCA pada DWT mampu mereduksi fitur dari 20 menjadi 5 fitur. Selanjutnya fitur tersebut diuji dengan melakukan klasifikasi menggunakan metode KNN dan SVM. Hasil dari klasifikasi dapat dibuktikan bahwa dengan menggunakan metode PCA dan DWT pada tahap fitur ekstraksi mampu meningkatkan klasifikasi hingga 5%.
Distributed MD5 Brute Force Using Message Passing Interface (MPI) on ARM Architecture Saputra, Maulana Bagus; Umam, Chaerul
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5630

Abstract

Over the years, there has been a computing paradigm shift towards smart devices. However, the security aspect of this type of device is questionable. In this research, the writer provides a design, implementation, and testing of a distributed MD5 brute-force attack method. Testing is performed using two systems. The first system is an ARM Cluster consisting of four single-board computers. The second system is a conventional server with two Xeon processors. From this research, the writer wants to answer the question of whether distributed brute-force attacks using IoT nodes can be realized in the real world by doing a comparison between increases of ARM Cluster performance with node addition to conventional server performance. From the test result, Xeon model performance is equivalent to 8 ARM Clusters and around 30 ARM nodes are required to match Xeon model performance.
IMPLEMENTATION OF FIREWALL MANGEL ON NETWORKS IN SMK ASSODIQIYAH SEMARANG Putra, Toni Wijanarko Adi; Widodo, Muchamad
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.4565

Abstract

This study aims to regulate bandwidth usage and monitor website access using MikroTik. Bandwidth regulation with the aim of equalizing internet use where the number of students and teachers is 500 people, while monitoring websites and blocking negative websites aims to limit student access, which amounts to 416 students, consisting of 120 junior high school students, 150 vocational high school students, and 150 students. SD 100 and students 66 people. This research was conducted at Asshodiqiyah Vocational School as a technology base in the school environment under the Asshodiqiyah Foundation. The Assodiqiyah Foundation oversees elementary, junior high, and vocational schools and accommodates foreign students as boarding students. The service location is located at Jl. Sawah Besar Timur No 99 Rt.9 Rw. 2 Kaligawe Village, Gayamsari District, Semarang City. The method used in this research is Research and Development (R&D) [4]. This research discusses how to create and implement to the public how to use the Mikrotik tool as a regulator of bandwidth usage and see the sites that are accessed and if necessary block sites that are considered less suitable for students to access. The expected result is an even use of internet bandwidth and security of site access from negative things. So that students will avoid the negative influences that exist from the internet.
SISTEM MANAJEMEN PENEGAKAN DIAGNOSA PENYAKIT TYPUS DENGAN METODE NAIVE BAYES Setijaningsih, Retno Astuti; Setiawan, Aries; Sugiyanto, Zaenal; Farida, Ida; Widjajanto, Budi; Rizqa, Ifan
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5792

Abstract

Dalam dunia kesehatan, beberapa gejala yang timbul bisa menjadi tanda-tanda penyebab dari beberapa penyakit sekaligus. Kondisi yang dilematis ini sering kali mempersulit pengambilan keputusan mengenai penyakit yang diderita seseorang. Penentuan langkah pencegahan maupun pengobatan juga menjadi sulit untuk dilakukan, sehingga pemeriksaan lanjutan perlu dilakukan oleh tim medis. Sangat dimungkinkan jika tim medis kurang akurat dalam menentukan analisis penyakit dikarenakan munculnya gejala yang sama pada beberapa penyakit. Diperlukan sistem penegakan diagnose penyakit dengan metode na ve bayes akan mampu membantu pembelajaran bagi mahasiswa dalam mengenal gejala-gejala penyakit typus, dan juga dilengkapi dengan solusi pencegahan maupun solusi penanggulangan.
Perbandingan LSTM dengan Support Vector Machine dan Multinomial Na ve Bayes pada Klasifikasi Kategori Hoax Cahyo, Puji Winar; Aesyi, Ulfi Saidata
Jurnal Transformatika Vol. 20 No. 2 (2023): January 2023
Publisher : Jurusan Teknologi Informasi Universitas Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26623/transformatika.v20i2.5880

Abstract

Hoax is fake news, now massively spread through social media. The impact of hoaxes is that people's misperceptions in understanding of news are very high. With the existence of hoaxes are spreading through social media, it requires the public to think smart when receiving the news. Currently, many ways to prevent hoaxes, right now we have Fact Checker Directory Platform which is a truth platform sourced from several fact check sites. On the truth check platform, every news detected as hoaxes has been categorized into specific type of hoax, manually by the validator. For this reason, this research attempts to automatically categorize the types of hoaxes using comparation of Deep Learning with Machine Learning classifications. Deep Learning uses Long Short Term Memory Network (LSTM), while Machine Learning uses Support Vector Machine (SVM) and Multinomial Naive Bayes. Through the build model process, SVM produces the best accuracy quality of 0.74, Multinomial Na ve Bayes produces an accuracy quality of 0.62 while LSTM displays 0.49. The results of low accuracy in LSTM need to be evaluated on model architecture and data normalization during preprocessing.

Page 1 of 2 | Total Record : 16


Filter by Year

2023 2023


Filter By Issues
All Issue Vol. 23 No. 2 (2026): January 2026 Vol. 23 No. 1 (2025): July 2025 Vol. 22 No. 2 (2025): January 2025 Vol. 22 No. 1 (2024): July 2024 Vol. 21 No. 2 (2024): Januari 2024 Vol 21, No 1 (2023): July 2023 Vol. 20 No. 2 (2023): January 2023 Vol. 20 No. 1 (2022): July 2022 Vol. 19 No. 2 (2022): January 2022 Vol. 19 No. 1 (2021): July 2021 Vol. 18 No. 2 (2021): January, 2021 Vol. 18 No. 1 (2020): July 2020 Vol. 17 No. 2 (2020): January 2020 Vol. 17 No. 1 (2019): July 2019 Vol 17, No 1 (2019): July 2019 Vol 16, No 2 (2019): January 2019 Vol 16, No 1 (2018): July 2018 Vol 15, No 2 (2018): January 2018 Vol 15, No 1 (2017): July 2017 Vol 14, No 2 (2017): January 2017 Vol 14, No 1 (2016): July 2016 Vol 13, No 2 (2016): January 2016 Vol 13, No 2 (2016) Vol 13, No 1 (2015): July 2015 Vol 12, No 2 (2015): January 2015 Vol 12, No 1 (2014): July 2014 Vol 11, No 2 (2014): January 2014 Vol 11, No 1 (2013): July 2013 Vol 10, No 2 (2013): January 2013 Vol 10, No 1 (2012): July 2012 Vol 9, No 2 (2012): January 2012 Vol 9, No 1 (2011): July 2011 Vol 8, No 2 (2011): January 2011 Vol 8, No 2 (2011) Vol 8, No 1 (2010): July 2010 Vol 7, No 2 (2010): January 2010 Vol 7, No 1 (2009): July 2009 Vol 6, No 2 (2009): January 2009 Vol 6, No 2 (2009) Vol 6, No 1 (2008): July 2008 Vol 5, No 2 (2008): January 2008 Vol 5, No 1 (2007): July 2007 Vol 4, No 2 (2007): January 2007 Vol 4, No 1 (2006): July 2006 Vol 2, No 2 (2005): January 2005 Vol 2, No 1 (2004): July 2004 Vol 1, No 2 (2004): January 2004 Vol 2, No 1 (2004) More Issue