cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. jember,
Jawa timur
INDONESIA
INFORMAL: Informatics Journal
Published by Universitas Jember
ISSN : 2503250X     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 219 Documents
Scenarios for Securing Content Delivery in the DRM Environment Prihandoko, Antonius Cahya; Ghodosi, Hossein; Litow, Bruce
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the DRM environment, content is usually distributed in an encrypted form. Typically,a secure encryption algorithm is utilized to accomplish such protection. However, executingthis algorithm in an insecure environment may allow adversaries to compromise the system andobtain information about the decryption key. Keeping such a key secret is a major challengefor content distribution systems. We consider two solutions for securing content delivery. Thefirst solution involves modifying the algorithm in such a way as to make implementation unintelligible.The second solution involves setting a buyer-seller protocol to communicate the keysecurely. In addition, the protocol can be set to achieve security for the content provider andprivacy protection for user. This paper describes a study of these scenarios for DRM applicationsw.r.t securing content delivery.
Analisis Sistem Virtual Cluster Pada Komputasi Paralel Menggunakan Layanan IAAS Retnani, Diah Ayu; Alwi, Erick Irawadi
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Industrial technology development needed solutions about increasing computing resource performance. The one of alternative solution could resolve this problem using the high performance computing’s concept example cluster. Cluster could increase performance of computing using many integrated computers in the computer network. cluster had problem in infrastructure system example place and hardware. One of the alternative solutions was virtual computer for infrastructure. one of cloud system services was IAAS. IAAS could produce integrated virtual computation resource on network directly. This study discussed about virtual cluster’s performance using the virtual computer to solve the parallel computing’s problem. Virtual computer in this study used cloud services. The research method was by implementing OpenMPI on a Linux-based computer cluster using five virtual computer and analyzed the performance of the system by different scenario tests. The results of this study Showed that the cloud was able to facilitate user to provide integrated infrastruktures computing service on a network-based and the virtual cluster machine was suitable when large size of data. Ideally, the value of speedup increased when the number of processors increases. The value of Speed-up was ideal when the the data size of 1000 using two nodes (1,346) and three nodes (1.0465). The value of Efficiency decreases when increasing number of processors. Most of the Value of speed-up and efficiency were not ideal at this experiment Because there was the overhead in the parallel system, for example, the additional parallel computing, inter-processor communication and synchronization processes in the cloud as provider of virtual computers.
Penerapan Metode AHP dalam Sistem Informasi Pemetaan Sebaran Strata Desa Siaga Aktif Dinas Kesehatan Kabupaten Jember Nurdiansyah, Yanuar; Rohmatul Fitriyah, Rizka
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Selama ini proses pentahapan strata desa siaga aktif di wilayah kerja Dinas Kesehatan Kabupaten Jember masih dilakukan secara manual dengan mencocokkan data desa yang ada dengan kriteria pentahapan strata desa siaga aktif. Sehingga pentahapan yang dilakukan membutuhkan waktu yang cukup lama mengingat jumlah desa dalam 31 kecamatan di Kabupaten Jember bukanlah jumlah yang sedikit. Selain itu dalam proses pentahapan terdapat 8 kriteria yang harus dicocokkan dengan pencapaian masing-masing desa. Pembuatan sistem informasi pemetaan strata desa siaga aktif pada penelitian ini bertujuan untuk merancang dan membangun sistem informasi dengan mengimplementasikan metode AHP (Analytical Hierarchy Process) yang mampu menganalaisis data capaian desa terhadap kriteria strata desa siaga sehingga dapat melakukan pentahapan terhadap data capaian desa tersebut. Proses analisis pentahapan strata desa siaga aktif menggunakan metode AHP didasarkan pada tingkat prioritas antar kriteria dan subkriteria pentahapan strata desa siaga aktif untuk dapat menentukan ni lai dari masing-masing kriteria dan subkriteria. Selanjutnya terdapat proses penentuan batas nilai interval untuk mengecek nilai yang diperoleh masing-masing desa terhadap strata desa siaga aktif. Terdapat 4 strata desa siaga aktif yaitu pratama, madya, purna, dan mandiri. Hasil dari penelitian ini menghasilkan laporan pentahapan strata desa siaga yang otomatis tersimpan sesuai tanggal dilakukannya pentahapan. Selain itu sistem ini mampu menampilkan hasil pentahapan strata desa siaga dalam bentuk peta digital yang ditampilkan dengan perbedaan warna sesuai dengan strata yang dicapai masing-masing desa.    
Penyisipan Citra Pesan Ke Dalam Citra Berwarna Menggunakan Metode Least Significant Bit dan Redundant Pattern Encoding Sannawira, Rahmandhita Fikri; Purnomo, Agus Sidiq
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Teknik steganografi memiliki peranan penting menyangkut hal yang berkaitan dengan pesan rahasia. Steganografi merupakan teknik penyisipan pesan yang telah digunakan oleh orang-orang jaman dulu untuk menjaga kerahasiaan pesan tersebut. Seiring dengan kemajuan teknologi, teknik ini dapat diaplikasikan menggunakan komputer. Sebagai contoh, pembuatan aplikasi steganografi yang dapat dilakukan menggunakan bahasa pemrograman yang berbeda-beda. Metode least significant bit merupakan cara penyisipan yang mengambil bit rendah dari data piksel yang menyusun sebuah file citra gambar. Penggunaan metode ini memungkinkan adanya perubahan atau penambahan sejumlah besar informasi tanpa adanya perubahan tampilan dari citra itu sendiri. Citra pesan disisipkan secara berulang yang ditempatkan pada piksel citra tujuan mulai dari piksel pertama sampai piksel yang terakhir. Secara garis besar, hasil yang didapat dari penelitian ini yaitu: Pertama, cara menyisipkan citra pesan secara berulang ke dalam citra berwarna yang menjadi citra tujuan penyisipan. Ke-dua, cara meng-ekstrak citra hasil penyisipan tersebut sehingga citra pesan yang telah disisipkan dapat diketahui maksudnya.
Analisa dan Perancanagan Sistem Informasi Inventori Produk Non-BBM PT. Pertamina (Persero) Rorimpandey, Gladly Caren; Kembuan, Olivia
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Unit Sales VII of  PT. Pertamina (Persero) in Bitung Area is one of the Area which place for giving service for the North Sulawesi, the Gorontalo and the Middle Sulawesi (Except Palu). In addition to the fuel distributor, the company also markets products of non-fuel such as lubricants, LPG​​, Chemical Agriculture and so on. However, in the process of storage of non-fuel products, there are several problems such as the data collection process takes a long time because it is done manually which is written on the card type 50, the reporting process becomes cumbersome and often inaccurate because the product data to be reported should be included one by one in a spreadsheet. The purpose of this study is to analyze and design information systems Inventory Products Non-fuel that can help PT. Pertamina (Persero) UPMS VII Depot Bitung in controlling inventory goods and preparation of non-fuel products to improve the performance of the company. By using SDLC systems development methodologies and data modeling tools ERD and DFD Inventory Information System can then be analyzed and designed.
Analisa SWOT untuk Strategi Pengembangan Teknologi Informasi pada Koperasi Simpan Pinjam XYZ Juwita, Oktalia; Dwi Hartadi, Arief
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Koperasi Simpan Pinjam XYZ merupakan salah satu Koperasi Simpan Pinjam yang sedang berkembang saat ini. Sejalan dengan perkembangannya saat ini, Koperasi Simpan Pinjam XYZ harus bisa melihat pesaing dan dunia teknologi modern mengingat Teknologi Informasi menjadi salah satu nilai jual pasar yang tidak kalah pentingnya dengan produk dan pelayanan. Perkembangan dunia Teknologi Informasi yang sangat cepat membuat perkembangan Teknologi Informasi Koperasi Simpan Pinjam XYZ masih di bawah rata-rata walaupun secara kewilayahan dan operasional Koperasi Simpan Pinjam XYZ masih lebih baik dari Koperasi Simpan Pinjam lainnya. Oleh karena itu dibutuhkan pemanfaatan Teknologi Informasi yang disusun dengan baik dan mengadopsi Teknologi Informasi modern yang di dukung dengan SDM yang handal sehingga akan membantu proses bisnis Koperasi Simpan Pinjam XYZ kedepan. Untuk dapat mengembangkan Teknologi Informasi yang ada pada Koperasi Simpan Pinjam XYZ diperlukan evaluasi untuk berbenah dalam membangun sistem yang handal dan terpadu salah satunya dengan menggunakan analisa SWOT. Ada empat aspek yang akan ditinjau, yaitu: kekuatan (strength), kelemahan (weakness), peluang (opportunities) dan ancaman (threats). Pada setiap aspek tersebut di buat 4 indikator utama yaitu Sistem, Infrastruktur, Aplikasi dan SDM. Dari hasil analisa SWOT yang dilakukan, didapatkan 16 startegi S-O, 8 strategi S-T, 5 strategi W-O, dan 6 strategi W-T. XYZ Credit Union is one of the Credit Union that are developing at this time. In line with the current development, XYZ Credit Union should be able to see the competitors and modern technology which is the information technology became one of the selling points of the market besides products and service. The development of the Information Technology rapidly made the development of Information Technology and XYZ Credit Union is still below average although in terms of areal better. Therefore required the utilization of information technology are arranged well andadopt modern information Technologies are supported with reliable human resources so that will help the process of business lending XYZ Credit Union. To be able to develop the existing Information Technology at XYZ Credit Unions, evaluation is needed to improve in building a reliable and integrated system one of which uses SWOT analysis. There are four aspects will be reviewed, including: strengths, weaknesses, opportunities, and threats. In each of these aspects made four main indicators: Systems, Infrastructure, Applications and HR. SWOT analysis of the results, obtained 16 S-O strategies, 8 S-T strategies, 5 W-O strategies and 6 W-T strategies. 
Rear Cover Prihandoko, Antonius Cahya
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Preliminary Pages Prihandoko, Antonius Cahya
INFORMAL: Informatics Journal Vol 1, No 1 (2016): INFORMAL: Informatics Journal
Publisher : Program Studi Sistem Informasi - Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Analisis Sistem Virtual Cluster Pada Komputasi Paralel Menggunakan Layanan IAAS Diah Ayu Retnani; Erick Irawadi Alwi
INFORMAL: Informatics Journal Vol 1 No 1 (2016): INFORMAL: Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Industrial technology development needed solutions about increasing computing resource performance. The one of alternative solution could resolve this problem using the high performance computing’s concept example cluster. Cluster could increase performance of computing using many integrated computers in the computer network. cluster had problem in infrastructure system example place and hardware. One of the alternative solutions was virtual computer for infrastructure. one of cloud system services was IAAS. IAAS could produce integrated virtual computation resource on network directly. This study discussed about virtual cluster’s performance using the virtual computer to solve the parallel computing’s problem. Virtual computer in this study used cloud services. The research method was by implementing OpenMPI on a Linux-based computer cluster using five virtual computer and analyzed the performance of the system by different scenario tests. The results of this study Showed that the cloud was able to facilitate user to provide integrated infrastrukture's computing service on a network-based and the virtual cluster machine was suitable when large size of data. Ideally, the value of speedup increased when the number of processors increases. The value of Speed-up was ideal when the the data size of 1000 using two nodes (1,346) and three nodes (1.0465). The value of Efficiency decreases when increasing number of processors. Most of the Value of speed-up and efficiency were not ideal at this experiment Because there was the overhead in the parallel system, for example, the additional parallel computing, inter-processor communication and synchronization processes in the cloud as provider of virtual computers.
Perbandingan Algoritma Klasifikasi Data Mining Untuk Prediksi Penyakit Kulit Dian Prajarini
INFORMAL: Informatics Journal Vol 1 No 3 (2016): INFORMAL: INFORMATICS JOURNAL
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Skin diseases often thought as a insignificant problem compared to diseases with high mortality, such as HIV/AIDS, ischemic heart disease, stroke, tuberculosis, malaria and cancer. However, skin diseases are some of the most common diseases seen in the developing country. Skin diseases diagnosis and treatment is important because there are a lot of skin diseases that shows similar symptoms and screening for sign of skin disease is an important way for systemic diseases. Prediction of skin disease is diffucult because of a lot of skin disease shows similar symptoms. Data mining with clasification algorithm can be used to predict skin disease. Four data mining clasification algorithm C4.5, Naive Bayes, KNN and SVM was used for data analysis. Medical dataset used in this research is dataset download from UCI repository site. From the tes result by comparing accuration, precision dan recall, it is known that Naive Bayes has the highest accuracy and precision.

Page 1 of 22 | Total Record : 219