Articles
12 Documents
Search results for
, issue
"Vol 6 No 3 (2021): Informatics Journal (INFORMAL)"
:
12 Documents
clear
Perancangan Sistem Informasi Supply Chain Management Pengadaan Barang Perlengkapan Penanganan Covid-19.
Izatun Nihayah;
Anna Retno Indrawati;
Rubby Harris;
Irawan Syaifulloh;
Yusuf Amrozi
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.21945
The Supply Chain Management Information System combines several business processes across organizations from the initial organization to the end user. In the procurement of raw materials, the procurement of Covid-19 takes time and causes inventory. With the Supply Chain Management Information System, it is expected to simplify the procurement process and minimize shortages of goods so as to speed up patient handling. This study resulted in the design of an SCM information system that uses the waterfall model software development method which is useful for helping the health industry get the flow of information, goods, and money because the related parties have been integrated with the designed system.
Implementasi OLAP pada Data Kerja Praktik dan Tugas Akhir Menggunakan Framework Modular Cube JS
I Komang Arya Ganda Wiguna;
Desak Putu Diah Kumala Dewi;
I Gede Iwan Sudipa
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.27614
The government's role in the implementation of higher education in Indonesia is to provide a university database. It is hoped that the government and the public can participate in assessing and conducting surveillance with the database. Every tertiary institution must report everything related to the implementation of education, starting from lecturer data, student data, and lecture data. In its performance, a Dikti Feeder application has been prepared that can transmit data. Each university will adjust the data entry following the Dikti standards. As one of the higher education providers, STMIK STIKOM Indonesia has been able to report data well, but specifically for final assignments and work practices, it has not been maximized due to the development of a separate system from the academic system. For this reason, a suitable system will be developed to accommodate Thesis and Internship data related to reporting on the Dikti Feeder by applying the Online Analytical Processing (OLAP) method using the Cube JS modular framework. Some of the tests carried out are schema file testing, frontend and backend testing, cube client testing, querying testing and load request testing showing the data can be displayed correctly and the process is successful.
Penerapan Algoritma K-Medoids dalam Menentukan Daerah Rawan Banjir di Kabupaten Karawang
Cepy Sukmayadi;
Aji Primajaya;
Iqbal Maulana
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.25423
Flood disasters often occur during the rainy season. Karawang is one area that is often flooded. Based on the risk index from BNPB, the flood disaster in Karawang affected 84% of the community, so efforts need to be made to reduce and overcome flood disasters. These problems are the beginning of efforts that need to be known which areas are prone to flooding. Therefore, this study aims to determine flood-prone areas in Karawang as an initial effort in tackling flood disasters. The research was conducted by classifying flood-prone areas using the k-medoids algorithm. K-Medoids uses the partition clustering method to group lists and objects into a number of clusters. This algorithm uses objects in a collection of objects that represent a cluster. The attributes used are flood-causing factors such as rainfall, elevation (soil height), population density, and distance to the river. The results of the study found three potential floods, namely low, medium, and high. There are 1 sub-district with low flood potential, 24 sub-districts with moderate flood potential, and 5 sub-districts with high flood potential. The test results using the silhouette coefficient get a value of 0.370.
Rancang Bangun Sistem Informasi Penilaian Pencapaian Materi dan Absensi Murid di Taman Pendidikan Al-Quran (TPA) DPD Lembaga Dakwah Islam Indonesia Kabupaten Manokwari menggunakan Metode Prototype
Afifah Ummi Sholihah;
Christian Dwi Suhendra;
Pawit Rianto
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.21963
The Regional Representative Council of Indonesia Institute of Islamic Dakwah of Manokwari Regency has four departments from Al-Quran Education School which are required to report the attendance and achievements of students each month in their respective departments. This report will be presented to the parents and to the Head of the school for evaluation. Both of these assessments are still carried out manually so it is inefficient because the data will be easily lost or scattered. With these problems, the author did some researches to carry out the Design and Development of Information System for Assessment of Material Achievement and Student Attendance at Al-Quran Education School - Regional Representative Council of Indonesia Institute of Islamic Dakwah in Manokwari Regency. This research was conducted by creating an assessment input information system and responsive web-based data recap, using the Laravel framework, MySQL database and the research method used was the Prototype Method. At the final stage of this research is testing the system with the Black Box Method. The final result of this research is the formation of the Information System for Assessment of Material Achievement and Student Attendance for the Al-Quran Education School - Regional Representative Council of Indonesia Institute of Islamic Dakwah in Manokwari Regency. The test results show that the Prototype Method can be used in building the information system in question.
Implementasi Metode Weighted Moving Average Untuk Sistem Peramalan Penjualan Markas Coffee
Muchamad Rizqi;
Antonius Cahya;
Nova El Maida
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.28467
Headquarters Coffee is one of the businesses engaged in the culinary field of coffee drinks. The problem that occurs at the Coffee Headquarters is that business activities are still carried out manually. In addition, determining sales in the next period only refers to the sales data of the previous period, resulting in owners often experiencing shortages or excess stocks of coffee to be sold due to uncertain sales. Therefore we need a forecasting method (Forecasting) that is appropriate and can be applied to an Information System in the form of a Website. The purpose of making this forecasting information system is to assist companies in recording sales to make it more practical by applying the Weighted Moving Average (WMA) method. From the results of the calculation of the WMA method, the level of accuracy will then be calculated using the Mean Absolute Percentage Error (MAPE) method. The results of forecasting by applying the WMA method and MAPE calculations on weights 3, 4 and 5 show that the Robusta coffee on the Robusta menu which has the smallest MAPE is weight 3 with a calculation result of 19.2499 and the Robusta Milk menu which has the smallest MAPE is weight 4 with the calculation result is 15.21879166 and Excelsa coffee on the excelsa menu which has the smallest MAPE is weight 3 with a calculation result of 19.1538 and the Excelsa Susu menu which has the smallest MAPE is weight 5 with a calculation of 17.27650182 while for Arabica coffee on the Arabica menu which has the smallest MAPE is weight 4 with a calculation result of 18.1735 and the Arabica Susu menu which has the smallest MAPE is weight 5 with a calculation result of 16.24012072. Where the Mape value produced by each type of coffee is still below 20%, which means the forecasting results can be categorized as good.
Sistem Pendanaan Proyek Perusahaan Jasa Konstruksi Berbasis Web
Hilyah Magdalena;
Hadi Santoso;
Litha Leonita
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.26853
CV. Yusti Karya as a construction company realizes that the ability to manage project finances is an important requirement for smooth project management. CV.Yusti Karya often has to manage several projects simultaneously in remote locations. This condition makes it difficult for the finance staff in the office to manage project financial allocations and also makes it difficult for project managers in the field and must report the status of project expenditures to the office. This difficulty drives CV. YustiKarya improved the project's financial management system from using spreadsheets to a web-based information system. Web-based information system will be developed using object-oriented methods. The object- oriented system development method was chosen because of its modular development capabilities and adapts to system requirements. The development of this system aims to enable Person in Charge (PIC) projects in the field to submit expenditures and can be immediately approved by the financial staff in charge. Online project finance management between project PICs and finance staff helps harmonize financial management. The Director can monitor the flow of the latest project finance developments online.
Digitalisasi Pelayanan Publik Desa Palewai Dengan Sistem Informasi Desa
Suharsono Bantun;
Jayanti Yusmah Sari;
Noorhasanah Z;
Syahrul Syahrul;
Arief Budiman
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.25185
One of the basic functions of government is to provide public services. Even during the Covid-19 pandemic, these needs must still be met and optimally adjusted by service providers. The Palewai Village Office, is one of the local government agencies that does not escape its obligation to improve public service standards during this pandemic. However, based on observations, it was found that the performance of public services in the office was not optimal because population data processing was still manual and data storage media still used physical documents. Therefore, an online information system is needed that can provide clear and up-to-date information, as well as make it easier for people to fill out forms from anywhere so that there is no crowd in the service room. This study aims to develop a Website- Based Village Information System at the Palewai Village Office which will handle population data, services for making cover letters and distributing population data and current information for the community. The results of this study are a website-based village information system that can manage community data effectively and efficiently and can be accessed quickly and easily to provide information related to services at the Palewai Village office.
Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment
Erick Irawadi Alwi;
Lutfi Budi Ilmawan
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.27053
The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.
Pengujian Unit Plugin Pemberian Anotasi Efek Secara Semantik pada Proses Bisnis BPMN
Hilman Nuril Hadi
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.26793
Business process model was created to make it easier for business process stakeholders to communicate and discuss the structure of the process more effectively and efficiently. Business process models can also be business artifacts and media that can be analyzed further to improve and maintain organizational competitiveness. To analyze business processes in a structured manner, the effect/results of the execution of business processes will be one of the important information. The effect/result of the execution of certain activities or a business process as a whole are useful for managing business processes, including for improvements related to future business processes. This effect annotation approach needs to be supported by business process modeling tools to assist business analysts in managing business processes properly. In previous research, the author has developed a plugin that supports business analysts to describe the effects semantically attached to activities in the Business Process Model and Notation (BPMN) business process model. In this paper, the author describes the unit testing process and its results on the plugin of semantic effect annotation that have been developed. Unit testing was carried out using the basic path testing technique and has obtained three test paths. The results of unit test for plugin are also described in this paper.
Penggunaan Karakter Kontrol ASCII Untuk Integrasi Data Pada Hasil Enkripsi Algoritma Caesar Cipher
Nur Putrananda Setyapuji Winarno;
Triawan Adi Cahyanto
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.19184/isj.v6i3.21091
Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.