cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
sji@mail.unnes.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Scientific Journal of Informatics
ISSN : 24077658     EISSN : 24600040     DOI : -
Core Subject : Science,
Scientific Journal of Informatics published by the Department of Computer Science, Semarang State University, a scientific journal of Information Systems and Information Technology which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences.
Arjuna Subject : -
Articles 564 Documents
Distribution Route Making for Mushroom Harvest Using Artificial Bee Colony Method Ari Santosa, I Made
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.25942

Abstract

Mushrooms are food ingredient that is currently favored by the public. Seeing the large demand for mushrooms, many mushroom businesses have developed. The high level of demand for mushrooms by consumers in different locations results in the high time and costs spent in distributing mushrooms. In addition, determining distribution routes in mushroom marketing is still done manually based on the sender's knowledge, therefore reduces the effectiveness and efficiency of mushroom marketing because the distribution routes used are not optimal. To overcome these problems, it is necessary to determine an effective and efficient distribution route to reduce distribution costs and speed up distribution time. Based on these problems, this research uses the Artificial Bee Colony (ABC) method in determining the distribution route of mushroom harvest. The purpose of this study was to apply the ABC method in determining the distribution routes of mushroom harvest. The result of this research is a visualization of mushroom distribution routes using the ABC method, so it can help to distribute mushroom harvest effectively and efficiently. The research method consists of defining the problem, collecting data, analyzing systems and implementing methods, designing systems, building systems, and drawing conclusions.
Perancangan Aplikasi Surat Masuk dan Keluar pada PT. Angkasa Pura 1 Semarang Sugiharti, Endang; Triliani, Sulis Eli
Scientific Journal of Informatics Vol 1, No 1 (2014): May 2014
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v1i1.3640

Abstract

Salah satu permasalahan dalam pengelolaan surat di PT. Angkasa Pura 1 terutama dalam pencatatan surat masih menggunakan pencataan dalam buku agenda dan menggunakan Microsoft Excel sebagai catatan record transaksi surat. Dengan banyaknya jumlah surat yang dibuat maka pencarian akan tidak menjadi efisien. Salah satu upaya untuk mengatasi hal tersebut adalah dengan membuat sistem aplikasi surat masuk dan keluar dengan menggunakan Visual Basic 6.0, MySQL sebagai databasenya dan crystal report untuk pembuatan laporannya. Data yang digunakan dalam pembuatan sistem aplikasi ini adalah data surat masuk dan data surat keluar PT. Angkasa Pura 1 (Persero) kantor cabang Bandar Udara Internasional Ahmad Yani Semarang tahun 2013-2014. Hasil dari perancangan sistem aplikasi ini adalah sistem aplikasi penginputan data surat masuk dan surat keluar, update data surat masuk dan keluar, pencarian data surat masuk dan keluar, pembuatan laporan data surat masuk dan keluar. Peneliti menyarankan bahwa sistem aplikasi ini dapat digunakan pada PT. Angkasa Pura 1 (Persero) kantor cabang Bandar Udara Internasional Ahmad Yani Semarang. Apabila sistem aplikasi tersebut ingin dikembangkan, bisa dikembangkan menjadi client server. 
Decision Support for New Employee Admissions With Profile Matching And Electre Methods Sri Rahajeng, Dini Estu; Al Amin, Iman Husni
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.27786

Abstract

Purpose: Employee turnover at large companies is something that often occurs which can result in losses to the company. Difficulties experienced by the company in selecting prospective new employees have resulted in employees being hired not following company expectations. Because of this, we need a decision support system that can help to recommend prospective new employees who match the company's criteria. Methods: The profile matching method is used to determine the alternative values and criteria from the aspects of personality, job aspects, attitudes, and social aspects of prospective new employees, while the Electre method is used to improve the ranking of the best prospective employees. Result: By eliminating the alternative value = 1 on the line, each line is a candidate who is declared accepted with the best alternative value. Novelty: Research on decision support systems for new employee recommendations has been done a lot, but no one has combined methods Profile Matching and Electre in one system.
Implementation of Analytic Network Process Method on Decision Support System of Determination of Scholarship Recipient at House of Lazis Charity UNNES Rahmanda, Primana Oky; Arifudin, Riza; Muslim, Much Aziz
Scientific Journal of Informatics Vol 4, No 2 (2017): November 2017
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v4i2.11852

Abstract

The scholarship is one of the forms of giving/ rewarding funds to individuals or students to use for sustainability during their education. Scholarships are awarded as government or institutional efforts to ease the burden of students in meeting the need for increasingly expensive education costs. The mechanism for selecting scholarship recipients, the selection team of UNNES Charity House of Lazis still use the scoring of the scholarship scores manually based on the total sum of criteria assessment without considering the priority weighted value of each criterion. So that cause the disbursement of scholarship funds that are not on target. To solve the problem, it is necessary to apply a decision support system to help provide consideration of the award of the scholarship recipient. Decision support system used requires data as a guidance assessment in the form of data criteria and alternative data by implementing Analytic Network Process method. The ANP method is used to determine the criteria and alternate priority weight values and the results are rankings. The purpose of this research is to build and implement ANP method in decision support system of awarding of scholarship recipients. The criteria used include the work of parents, parent income, the amount/ grade of Single Tuition, grade point average cumulative. The results of this study indicate that the use of ANP method implementation can determine the scholarship recipients who declared feasible or not to receive the scholarship based on the ranking results of the priority weight of the alternative.
Comparative Analysis of Simple Additive Weighting Method and Weighted Product Method to New Employee Recruitment Decision Support System (DSS) at PT. Warta Media Nusantara Setyawan, Agus; Arini, Florentina Yuni; Akhlis, Isa
Scientific Journal of Informatics Vol 4, No 1 (2017): May 2017
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v4i1.8458

Abstract

Issue handling of inadvertence situations in the decision-making process of recruiting new employees at PT. Warta Media Nusantara that use criteria value of interviews, field test, a psychological test and medical check-up requires Multi Attribute Decision Making (MADM) as an auxiliary method of decision-making on the prospective eligible employee to be accepted in the company. There are various MADM methods, such as Simple Additive Weighting (SAW) method and Weighted Product (WP) method. Both of these methods are known as the most common method used in handling MADM issues, so in this study both methods are applied to the DSS and analyzed the differences in terms of obtained results and the execution time required for each method. The results of the study of the application of SAW and WP methods in the recruitment of new employees DSS there are some differences in the results of the candidates rank order and the differences in execution time of each method. The differences in rank order of these methods are due to the effects of alternative values, weighting criteria, and the calculation method. WP method is able to provide more rigorous result than SAW method, while the difference in execution time of SAW and WP methods explains that the execution time of SAW method relatively quick because SAW calculation method has a simpler process than the process of WP calculation methods 
A Combination of Hill Cipher and LSB for Image Security Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Febrian, Muhamad Rizky Fajar; Rosyida, Ghaitsa Ardelia
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i1.24393

Abstract

The maximum value obtained to test the encrypt hill cipher uses the avalanche effect with modification of one, two, three, and four key matrices 35.71%, therefore an additional security technique is needed. The Least Significant Bit (LSB) method is used to insert the ciphertext that has been generated from the hill cipher algorithm, has been testing using RGB, CMY, CMYK and YUV shapes with 6142 characters in 128 x 128 character images producing the highest PSNR value of 51.2826 dB in CMYK images. Steganography technique is applied because it has advantages in terms of imperceptibility, for example the results of a stego image are so similar to the original image that it is difficult to be distinguished by the human senses. Tests were carried out with 10 images, five images measuring 512 x 512 and five images measuring 16 x 16. While the messages to be inserted were 240, 480, and 960 characters for images measuring 512 x 512 and 24, 48 and 88 characters for images measuring 16 x16. Test results that I have done are calculated using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR) with a minimum PSNR of 51.2907 dB which means the resulting image is quite good. Computation time is calculated using tic toc on Matlab by encrypting 2000 and 6000 characters, and also computation time.
Pengaruh Kekuatan Media Sosial dalam Pengembangan Kesenjangan Digital Tyas, Dyah Listianing; Budiyanto, A. Djoko; Santoso, Alb. Joko
Scientific Journal of Informatics Vol 2, No 2 (2015): November 2015
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v2i2.5083

Abstract

Langkah yang terbaik untuk mengurangi kesejangan digital adalah menyiapkan masyarakat untuk bisa menerima, menilai, memutuskan dan memilih informasi yang tersedia. Penyiapan kondisi psikologis bagi masyarakat untuk menerima, menilai, memutuskan dan memilih informasi bagi diri mereka sendiri akan lebih efektif dan mendewasakan masyarakat untuk bisa mengelola informasi dengan baik. Kemajuan teknologi informasi seseorang atau masyarakat akan mendapat kemudahan akses untuk menggunakan dan memperoleh informasi. Kemajuan teknologi informasi akan mendorong penggunaan internet yang positif. Seperti penggunaan media sosial yang masih menjadi tren disemua kalangan. Hasil dari penelitian ini akan menunjukkan beberapa pengaruh media sosial dalam pengembangan kesenjangan digital. 
Implementation of Support Vector Machine Algorithm with Correlation-Based Feature Selection and Term Frequency Inverse Document Frequency for Sentiment Analysis Review Hotel Ririanti, Novia Puji; Purwinarko, Aji
Scientific Journal of Informatics Vol 8, No 2 (2021): November 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i2.29992

Abstract

Purpose: The study aims to reduce the number of irrelevant features in sentiment analysis with large features. Methods/Study design/approach: The Support Vector Machine (SVM) algorithm is used to classify hotel review sentiment analysis because it has advantages in processing large datasets. Term Frequency-Inverse Document Frequency (TF-IDF) is used to give weight values to features in the dataset. Result/Findings: This study's results indicate that the accuracy of the SVM method with TF-IDF produces an accuracy of 93.14%, and the SVM method in the classification of hotel reviews by implementing TFIDF and CFS has increased by 1.18% from 93.14% to 94.32%. Novelty/Originality/Value: Use of Correlation-Based Feature Section (CFS) for the feature selection process, which reduces the number of irrelevant features by ranking the feature subset based on the strong correlation value in each feature
Security Login System on Mobile Application with Implementation of Advanced Encryption Standard (AES) using 3 Keys Variation 128-bit, 192-bit, and 256-bit Utami, Hamdan Dian Jaya Rozi Hyang; Arifudin, Riza; Alamsyah, Alamsyah
Scientific Journal of Informatics Vol 6, No 1 (2019): May 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i1.17589

Abstract

The development of mobile applications is unbalanced with the level of its security which is vulnerable to hacker attacks. Some important things that need to be considered in the security of mobile applications are login and database system. A login system that used the database as user authentication and passwords are very vulnerable to be hacking. In securing data, various ways had been developed including cryptography. Cryptographic algorithms used in securing passwords usually used MD5 encryption. However, MD5 as a broader encryption technique is very risky. Therefore, the level of login system security in an android application is needed to embed the Advanced Encryption Standard (AES) algorithm in its process. The AES algorithm was applied using variations of 3 keys 128-bit, 192-bit, and 256-bit. Security level testing was also conducted by using 40 SQL Injection samples which the system logins without security obtained 27.5% that be able to enter the system compared to the result of login systems that use AES algorithm 128-bit, 192-bit or 256-bit was obtained 100% that cannot enter into the system. The estimation of the average encryption process of AES 128, 192 and 256 bits are 5.8 seconds, 7.74 seconds, and 9.46 seconds.
Model of Multilevel Sub-Image to Find the Position of Region of Interest Hartono, Budi; Lusiana, Veronica
Scientific Journal of Informatics Vol 3, No 2 (2016): November 2016
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v3i2.7915

Abstract

Searching image is based on the image content, which is often called with searching of image object. If the image data has similarity object with query image then it is expected the searching process can recognize it. The position of the image object that contains an object, which is similar to the query image, is possible can be found at any positionon image data so that will become main attention or the region of interest (ROI). This image object can has different wide image, which is wider or smaller than the object on the query image. This research uses two kinds of image data sizes that are in size of 512X512 and in size of 256X256 pixels.Through experimental result is obtained that preparing model of multilevel sub-image and resize that has same size with query image that is in size of 128X128 pixels can help to find ROI position on image data. In order to find the image data that is similar to the query image then it is done by calculating Euclidean distance between query image feature and image data feature.