cover
Contact Name
Hindayati Mustafidah
Contact Email
jurnal.juita@gmail.com
Phone
+6285842817313
Journal Mail Official
jurnal.juita@gmail.com
Editorial Address
Gedung Fakultas Teknik dan Sains Universitas Muhammadiyah Purwokerto Jl. K.H. Ahmad Dahlan, Dukuh Waluh, Kembaran, Banyumas, Central Java, Indonesia
Location
Kab. banyumas,
Jawa tengah
INDONESIA
JUITA : Jurnal Informatika
ISSN : 20869398     EISSN : 25798901     DOI : 10.30595/JUITA
Core Subject : Science,
UITA: Jurnal Informatika is a science journal and informatics field application that presents articles on thoughts and research of the latest developments. JUITA is a journal peer reviewed and open access. JUITA is published by the Informatics Engineering Study Program, Universitas Muhammadiyah Purwokerto. JUITA invites researchers, lecturers, and practitioners worldwide to exchange and advance knowledge in the field of Informatics. Documents submitted must be in Ms format. Word and written according to author guideline. JUITA is published twice a year in May and November. Currently, JUITA has been indexed by Google Scholar, IPI, DOAJ, and has been accredited by SINTA rank 2 through the Decree of the Director-General of Research and Development Strengthening of the Ministry of Research, Technology and Higher Education No. 36/E/KPT/2019. JUITA is intended as a media for informatics research among academics, practitioners, and society in general. JUITA covers the following topics of informatics research: Software engineering Artificial Intelligence Data Mining Computer network Multimedia Management Information System Digital forensics Game
Articles 316 Documents
Promotion of Purbalingga Tourism Object Using Augmented Reality Location Based Service & Virtual Reality 360° Based on Android Gema Kharismajati; Rusydi Umar; Sunardi Sunardi
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1323.143 KB) | DOI: 10.30595/juita.v9i2.9857

Abstract

One of the technologies that can be used as an attraction in Purbalingga Regency is Augmented Reality (AR) merging virtual objects with real objects, where those objects can be seen in real-time. And using the Location-Based Service (LBS) method, this method is a service with the main parameters being the position and location of the user. LBS Location Based Service will be enhanced with Google Maps and GPS (Global Positioning System) to find its user position and information about several locations to be visited. Virtual Reality (VR) brings users can interact in a virtual world environment simulated by a computer, so that users feel they are inside. The appearance of the Image object using 3600 panoramic so that it can display images indefinitely and not cut and can look around the image. Application creation is done by Multimedia Development Life Cycle (MDLC) and Unity3D. The application has been successfully operated on the Android operating system with minimum specifications of 2GB RAM and KitKat version 4.4 OS. The results of the study have been conducted through a questionnaire to 15 respondents with 15 questions earned an The total value of the frequency of each question gets a score of 1,009 or a percentage of eligibility of 89,68% starting that the application is well worth using. Based on the black-box test, the application has been running properly and can display Location Based Service and 3600 panoramic and its information.
Editor Preface and Table of Content JUITA: Jurnal Informatika
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (572.63 KB) | DOI: 10.30595/juita.v9i2.12360

Abstract

Editor Preface and Table of Content Vol 9 No. 2 November 2021
Developing Integrated Smartphones Notification of Server Resource Monitoring System Using Zabbix, Webhook, and Telegram Sulasno Sulasno; Rakhmat Saleh; Intan Savitri
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1611.067 KB) | DOI: 10.30595/juita.v9i2.10411

Abstract

Server monitoring activities are important to ensure the availability of resources used for the execution of its internal processes. Generally, Administrators monitor the use of server resources through a computer using a browser. The problem with monitoring through a computer is less flexible and slow for checking notifications about the state of problem server resources in real-time anytime and anywhere using smartphones. This study aims to develop notification integration on smartphones from a server resource monitoring system using Zabbix Webhook and Telegram. The research method used is the Cisco PPDIOO Lifecycle Approach to Network Design and Implementation. As a case study, it is located at the Center for Empowerment of Informatics and Nuclear Strategic Area, the National Nuclear Energy Agency. The results of the study are notifications on smartphones via the Telegram bot account indicating a problem with resource usage. The results of this study have been used by server Administrators. The server Administrators have provided information about the benefits of this system, for flexibility, speed of getting information in resource usage, identifying, and resolving problems before there are complaints so that the quality of service is getting better.
Pillar Algorithm in K-Means Method for Identification Health Human Resources Availability Profile in Central Java M. Nishom; Sharfina Febbi Handayani; Dairoh Dairoh
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1005.905 KB) | DOI: 10.30595/juita.v9i2.9860

Abstract

Based on data from the Ministry of Health, the distribution ratio between health workers and patients in Indonesia is still not equal distributed. It influenced by the distribution of health human resources that are not in accordance with the ideal needs of health services. This results need to identify the profile of the availability of health human resources in Indonesia. In this study, an approach will be implemented to identify the profile of health human resources availability using K-Means Clustering with a combination of pillar algorithms in optimizing the selection of the initial cluster centroid. Chi-square analysis is used to determine the disparity in the needs of health human resources with the conditions of the availability of health human resources in the Central Java region. The data collection method used in this research is the observation method, while the scientific method used in this research is the K-Means Clustering method. The results showed that the application has been generated can dynamically determine the health human resource cluster based on the disparity category of health human resource availability in the Central Java region. In addition, the labeling of the Pillar K-Means cluster based on the Chi-square test has a high degree of accuracy, namely 80%.
Real-time Vehicle Surveillance System Based on Image Processing and Short Message Service Agustinus Deddy Arief Wibowo; Rudi Heriansyah
JUITA : Jurnal Informatika JUITA Vol. 9 No. 2, November 2021
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1187.755 KB) | DOI: 10.30595/juita.v9i2.8728

Abstract

This paper proposes a real-time vehicle surveillance system based on image processing approach tailored with short message service. A background subtraction, color balancing, chain code based shape detection, and blob filtering are used to detect suspicious moving human around the parked vehicle. Once detected, the developed system will generate a warning notification to the owner by sending a short message to his mobile phone. The current frame of video image will also be stored and be sent to the owner e-mail for further checking and investigation. Last stored image will be displayed in a centralized monitoring website, where the status of the vehicle also can be monitored at the same time. When necessary, the stored images can be used during investigation process to assist the authority to take further legal actions.
Development of Fuzzy-Based Smart Drip Irrigation System for Chili Cultivation Sri Wahjuni; Wulandari Wulandari; M Kholili
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1133.272 KB) | DOI: 10.30595/juita.v10i1.12998

Abstract

Chili plants often fail to harvest in the cultivation process due to improper irrigation. Soil temperature and humidity are essential parameters that affect the amount of water needed by plants in the watering process. This research aimed to apply fuzzy logic to the chili plants' irrigation system. The function of this system was to regulate watering due to the needs of the Chili plant automatically in a real-time fashion. The Sugeno fuzzy inference system (FIS) is embedded in a microcontroller to regulate the water based on the plant's needs appropriately. The system was tested on Chili plants located in the iSurf Computer Science Lab IPB University greenhouse. After four days of testing, the soil moisture sensor results were stable at optimal conditions, between 60%-80% after watering. It shows that the irrigation system has automatically regulated watering due to the Chili plant's needs.
Alphabet Recognition with Augmented Reality Technology Based on Android Using Extreme Programming Model Fitri Yanti; Jaka Sutresna
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (785.136 KB) | DOI: 10.30595/juita.v10i1.12125

Abstract

Lack of literacy or interest in reading is the cause of children having difficulty recognizing the letters of the alphabet and assembling them into words or sentences because the letters are similar. Early childhood students have difficulty learning letters because there are too many letters of the alphabet that must be memorized, the number of letters of the alphabet there are 26 letters that must be memorized. In addition, early childhood students complain that reading is very difficult to pronounce because the way the teacher conveys reading techniques for students is difficult to understand so that it is boring for early childhood students. This makes it difficult for young children to pronounce letters. In software development using Extreme Programming (XP) where writing programs in pairs, two programming people work together to write programs. Currently, computer vision technology has been used in various industries, including trade, medicine, education, and so on. Augmented reality is one of the computer vision technologies. The technology of computer vision is to combine synthetic images into the real world or vice versa. By making an android application with an extreme programming method that utilizes Augmented Reality technology that can display 3D, animation, and sound so that it looks real, it makes early childhood interested and makes it easier for them to learn the letters of the alphabet.
Fraud Detection Using Random Forest Classifier, Logistic Regression, and Gradient Boosting Classifier Algorithms on Credit Cards Muhamad Sopiyan; Fauziah Fauziah; Yunan Fauzi Wijaya
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1177.532 KB) | DOI: 10.30595/juita.v10i1.12050

Abstract

The following credit card records were used in this study of 284.807 transactions made by credit card holders in Europe for two days from the Kaggle dataset. This is a very poor data set, having 492 transactions, an imbalance of only 0.172% of the 284.807 transactions. The purpose of this study is to obtain the best model and then simulate it by electronically detecting unauthorized financial transactions in bank payment systems. The dataset for this study is unbalanced class data with 99.80% for the major class and 0.2% for the minor class. This type of class-imbalanced data problem is solved by applying method a combination of minority oversampling techniques using Synthetic Minority Oversampling Technique (SMOTE). To determine the most appropriate and accurate classification in solving class balance problems, comparisons were made with the Random Forest Classifier (RFC), Logistic Regression (LGR), and Gradient Boosting Classifier (GBC) algorithms. The test results in this study are the Random Forest Classifier (RFC) algorithm is better than other algorithms because it has the highest accuracy the percentage of data-train is 100% and data-test is 99.99% and the evaluation of the AUC score as a result of algorithm testing is 0.9999.
Sentiment Analysis on Covid-19 Vaccination in Indonesia Using Support Vector Machine and Random Forest I Made Sumertajaya; Yenni Angraini; Jamaluddin Rabbani Harahap; Anwar Fitrianto
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1277.257 KB) | DOI: 10.30595/juita.v10i1.12394

Abstract

World Health Organization (WHO) stated Covid-19 as a global pandemic in March, 2020. This pandemic has influenced people’s life in many sectors such as the economy, health, tourism, and many more. One way to end this pandemic is to make herd immunity obtained through the vaccination program. This program still raises pros and cons at the beginning of its implementation in Indonesia. Many people doubt the safety and side effects of the vaccine. There are also pros and cons to vaccination programs in social media such as Twitter. This platform generates a huge amount of text data containing people's perceptions about vaccines. This research aims to predict sentiment using supervised learning such as support vector machine (SVM) and random forest and capture sentiment about vaccines in Indonesia in the first two weeks of the program. The result shows SVM was a better model than random forest based on the precision and F1-score metrics. The SVM approach produces a precision value of 0.50, a recall of 0.64, and an F1-score of 0.52. In the study, it was also found that tweets with neutral sentiment dominated the twitter user sentiment in the study period. Tweets with negative sentiment decreased after the first week of the COVID-19 vaccination program.
Design of Digital Evidence Collection Framework in Social Media Using SNI 27037: 2014 Adi Setya; Abba Suganda
JUITA : Jurnal Informatika JUITA Vol. 10 No. 1, May 2022
Publisher : Department of Informatics Engineering, Universitas Muhammadiyah Purwokerto

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1285.049 KB) | DOI: 10.30595/juita.v10i1.13149

Abstract

Social media is a place that people use to socialize. In addition to socializing, social media is also often used as a crime medium by certain people. In the evidentiary process, law enforcers have the duty to present the evidence used by the suspect in committing his crime. The method used in collecting digital evidence from social media must have a clear scientific basis and guidelines. If the method used is not known as a theory or method in digital forensics, this will undermine all expert testimony and evidence presented in the court. Making a framework that can be recognized by all judicial administrators (judges, public prosecutors, attorneys for defendants, witnesses and defendants) is a solution that can be used as a standard so that the evidence process runs well. The framework that has been created by the researcher is an update from the previous framework. The framework design is made using the Composite Logic method. The composite logic method will collaborate with the Digital Forensics Investigation Models framework to produce a new framework. Based on existing data and facts, this research has produced a framework with better performance than the previous framework.