cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
sji@mail.unnes.ac.id
Editorial Address
-
Location
Kota semarang,
Jawa tengah
INDONESIA
Scientific Journal of Informatics
ISSN : 24077658     EISSN : 24600040     DOI : -
Core Subject : Science,
Scientific Journal of Informatics published by the Department of Computer Science, Semarang State University, a scientific journal of Information Systems and Information Technology which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences.
Arjuna Subject : -
Articles 564 Documents
Software Defined Networks: a Comparative Study and Quality of Services Evaluation Nugroho, Herry Prasetyo; Irfan, Muhammad; Faruq, Amrul
Scientific Journal of Informatics Vol 6, No 2 (2019): November 2019
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v6i2.20585

Abstract

Software-Defined Network (SDN) as architecture network that separates the control and forwarding functions, so that network operators and administrators can configure the networks in a simple and centrally between thousands of devices. This study is designed and evaluate the Quality of Services (QoS) performances between the two networks employed SDN-based architecture and without SDN-based. MinNet as a software emulator used as a data plane in the network Software Define Network. In this study, comparison of the value of the QoS on the network based on Software Defined Network and traditional network during the test run from the source node is investigated. Network testing by using traffic loads. Traffic loads are used starting from 20Mbps-100Mbps. The result is verified that the QoS analysis of the Software-Defined Network architecture performed better than conventional network architectures. The value of the latency delay on the Software Define Network range between 0,019-0,084ms, and with 0% packet loss when addressed the network traffics of 10-100Mbps.
Model Expertise Management System di Universitas Negeri Semarang Purwinarko, Aji; Sukestiyarno, YL
Scientific Journal of Informatics Vol 1, No 2 (2014): November 2014
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v1i2.4024

Abstract

Pemanfaatan sistem informasi sebagai penopang organisasi tidak dapat dipungkiri lagi, dimana setiap bagian dari organisasi diharapkan mampu memberikan pelayanan yang cepat dan akurat kepada setiap end user. Salah satu bentuk layanan sistem informasi tersebut adalah Expertise Management System (EMS). EMS dikembangkan di Universitas Negeri Semarang (UNNES) memiliki kemampuan untuk menyajikan data tentang pakar-pakar yang telah dimiliki UNNES kepada end user. Desain EMS melalui tahap prototype (analisis, perancangan, desain sistem, DFD, ERD, dan desain skema database), pemrograman, pengujian dan pemeliharaan. Melalui EMS ini pula, UNNES dapat menawarkan pakar-pakarnya untuk berkolaborasi dalam penelitian maupun kegiatan lainnya, sehingga dengan sendirinya akan memperkuat posisi UNNES di dalam persaingan tingkat regional maupun global. 
Developing IT-assisted Adversity Response Profile for Lectures Online during New Normal Ardiansyah, Adi Satrio; Sari, Salsabilla Naura; Caesario, Nico
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.28828

Abstract

Purpose: The purpose of this study was to develop valid and reliable IT-assisted ARP in online lectures during New Normal. IT - assisted ARP Product is the innovative learning instruments that was develop to help educators in understanding the problems experienced by students, so that they can maximize the implementation of distance education. Methods: The research method used was Research and Development (RD) which was conducted on 50 students of the Department of Mathematics, Universitas Negeri Semarang. This development research consists of three stages, namely the initial investigation, the prototype phase and the assessment phase which will then be analyzed using quantitative analysis techniques. Result: The results showed that the IT-ASSISTED ARP met the valid and reliable criteria with the rehabilitee value is very high, namely 0, 98. Novelty: With the discover of valid and reliable ARP, educators can use it to determine the level of student ability in dealing with learning problems during the New Normal.
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security Atika Sari, Christy; Rachmawanto, Eko Hari; Haryanto, Christanto Antonius
Scientific Journal of Informatics Vol 5, No 2 (2018): November 2018
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v5i2.14844

Abstract

Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.
Color Space to Detect Skin Image: The Procedure and Implication Endah, Sukmawati Nur; Kusumaningrum, Retno; Wibawa, Helmie Arif
Scientific Journal of Informatics Vol 4, No 2 (2017): November 2017
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v4i2.12013

Abstract

Skin detection is one of the processes to detect the presence of pornographic elements in an image. The most suitable feature for skin detection is the color feature. To be able to represent the skin color properly, it is needed to be processed in the appropriate color space. This study examines some color spaces to determine the most appropriate color space in detecting skin color. The color spaces in this case are RGB, HSV, HSL, YIQ, YUV, YCbCr, YPbPr, YDbDr,  CIE XYZ, CIE L*a*b*, CIE  L*u* v*, and CIE L*ch. Based on the test results using 400 image data consisting of 200 skin images and 200 non-skin images, it is obtained that the most appropriate color space to detect the color is CIE L*u*v*.
Kombinasi Steganografi Berbasis Bit Matching dan Kriptografi DES untuk Pengamanan Data Prasetiyo, Budi; Gernowo, Rahmat; Noranita, Beta
Scientific Journal of Informatics Vol 1, No 1 (2014): May 2014
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v1i1.3643

Abstract

Pada penelitian ini dilakukan kombinasi steganografi dan kriptografi untuk pengamanan data dengan tidak mengubah kualitas media cover. Metode steganografi yang digunakan dengan melakukan pencocokan bit pesan pada bit MSB citra. Proses pencocokan dilakukan secara divide and conquer. Hasil indeks posisi bit kemudian dienkripsi menggunakan algoritma kriptografi Data Encryption Standard (DES). Masukkan data berupa pesan teks, citra, dan kunci. Output yang dihasilkan berupa chiperteks posisi bit yang dapat digunakan untuk merahasiakan data. Untuk mengetahui isi pesan semula diperlukan kunci dan citra yang sama. Kombinasi yang dihasilkan dapat digunakan untuk pengamanan data. Kelebihan metode tersebut citra tidak mengalami perubahan kualitas dan kapasitas pesan yang disimpan dapat lebih besar dari citra. Hasil pengujian menunjukkan citra hitam putih maupun color dapat digunakan sebagai cover, kecuali citra 100% hitam dan 100% putih. Proses pencocokan pada warna citra yang bervariasi lebih cepat. Kerusakan pesan dengan penambahan noise salt and peper mulai terjadi pada nilai MSE 0,0067 dan gaussian mulai terjadi pada nilai MSE 0,00234. 
A Comprehensive Survey On Cloud Computing Simulators Oladimeji, Oladosu Oyebisi; Oyeyiola, Dasola; Oladimeji, Olayanju; Oyeyiola, Pelumi
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.28878

Abstract

Purpose: Cloud Computing is one of the upcoming technologies which has gotten the attention of many researchers and investor.  But cloud computing still faces challenges because it is not economical and impractical for research institutions and industries to set up a physical cloud for research and experiments on it (cloud computing). Due to this, the researchers have chosen to test their contributions with simulators. Therefore, the purpose of this study is to perform a survey on existing cloud simulators. Methods: These cloud simulators aid in modeling cloud application through the creation of virtual machine, data Centre, and other things which can be easily added and configured to it in order to provide stress free analysis. Result: Till this present time, many cloud simulators with various features have been proposed and available for use. Novelty: In this paper, a comprehensive study has been performed on major cloud simulators by highlighting their features, strengths, and weakness through analysis. After which comparative analysis was done on the simulation, from the study, none of the simulators have the feature to simulate mobile cloud computing issues. This study has not been published anywhere else.
A High Performace of Local Binary Pattern on Classify Javanese Character Classification Susanto, Ajib; Sinaga, Daurat; Sari, Christy Atika; Rachmawanto, Eko Hari; Setiadi, De Rosal Ignatius Moses
Scientific Journal of Informatics Vol 5, No 1 (2018): May 2018
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v5i1.14017

Abstract

The classification of Javanese character images is done with the aim of recognizing each character. The selected classification algorithm is K-Nearest Neighbor (KNN) at K = 1, 3, 5, 7, and 9. To improve KNN performance in Javanese character written by the author, and to prove that feature extraction is needed in the process image classification of Javanese character. In this study selected Local Binary Patter (LBP) as a feature extraction because there are research objects with a certain level of slope. The LBP parameters are used between [16 16], [32 32], [64 64], [128 128], and [256 256]. Experiments were performed on 80 training drawings and 40 test images. KNN values after combination with LBP characteristic extraction were 82.5% at K = 3 and LBP parameters [64 64].
Fuzzy Logic Inference System for Determining The Quality Assesment of Student’s Learning ICT Pamuji, Agus
Scientific Journal of Informatics Vol 4, No 1 (2017): May 2017
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v4i1.7082

Abstract

The Assesment that held in the school is one of the learning process in education who do it by teacher. One of the course that exemined is Computer Application. In the computer application have 3 topic, they are Microsoft Word, Microsoft Excel, Microsoft Power Point. The assesment for student’s at politecnic about learning computer application have 3 criteria in the selection. First of all, the students have ability to operate computer system generaly, it has understanding the formula on microsoft excel, the students have skill toward any application. In this study, fuzzy logic used for determining the quality assesment of stundent’s learning Information and Comunication Technology (ICT) as a tools to analyze any constraint that are known as min-max method. As a result, we have found that the students have good for analyzing in the application from the each question or case of study when the course it has been examined. 
Decision Making System to Determine Childbirth Process with Naïve Bayes and Forward Chaining Methods Kumalasari, Putri Laksita; Arifudin, Riza; Alamsyah, Alamsyah
Scientific Journal of Informatics Vol 7, No 2 (2020): November 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i2.25352

Abstract

Childbirth is the last stage before the infant comes into the world. There may be incidents that could cause death in the process of childbirth for mothers and infants. Lack of knowledge and attention to the labor process can increase maternal mortality rate. Maternal mortality rate in Indonesia was recorded at 190 per 100,000 live births on 2015. The figure is still far from the fifth Millennium Development Goals target of 102 per 100,000. The increasing development of technology in health informatics to provide health care more effective can be used to help overcome the problems of pregnant women. To reduce maternal mortality rates, a web-based expert system is perfect one for use. Naïve Bayes method is a simple, fast and high accuracy method. Forward Chaining method is a inference method that performs a fact or statement that starts from the condition (IF) then to the conclusion (THEN). Based on analysis of the method obtained with 233 patients data on childbirth process using expert system, the Naïve Bayes method has accuracy in diagnosing by 90,987124463519% while Forward Chaining method accuracy is 86.69527897%.