cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. jember,
Jawa timur
INDONESIA
INFORMAL: Informatics Journal
Published by Universitas Jember
ISSN : 2503250X     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 219 Documents
Analisis Keamanan Sistem Informasi Akademik (SIAKAD) Universitas XYZ Menggunakan Metode Vulnerability Assessment Erick Irawadi Alwi; Lutfi Budi Ilmawan
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.27053

Abstract

The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.
Pengujian Unit Plugin Pemberian Anotasi Efek Secara Semantik pada Proses Bisnis BPMN Hilman Nuril Hadi
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.26793

Abstract

Business process model was created to make it easier for business process stakeholders to communicate and discuss the structure of the process more effectively and efficiently. Business process models can also be business artifacts and media that can be analyzed further to improve and maintain organizational competitiveness. To analyze business processes in a structured manner, the effect/results of the execution of business processes will be one of the important information. The effect/result of the execution of certain activities or a business process as a whole are useful for managing business processes, including for improvements related to future business processes. This effect annotation approach needs to be supported by business process modeling tools to assist business analysts in managing business processes properly. In previous research, the author has developed a plugin that supports business analysts to describe the effects semantically attached to activities in the Business Process Model and Notation (BPMN) business process model. In this paper, the author describes the unit testing process and its results on the plugin of semantic effect annotation that have been developed. Unit testing was carried out using the basic path testing technique and has obtained three test paths. The results of unit test for plugin are also described in this paper.
Penggunaan Karakter Kontrol ASCII Untuk Integrasi Data Pada Hasil Enkripsi Algoritma Caesar Cipher Nur Putrananda Setyapuji Winarno; Triawan Adi Cahyanto
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.21091

Abstract

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.
Optimasi K-Klasterisasi Ketahanan Pangan Kabupaten Jember Menggunakan Metode Elbow Aski Widdatul Fuadah; Fajrin Nurman Arifin; Oktalia Juwita
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.28363

Abstract

Clustering is a process of grouping data based on similarities or similarities with other members in a group. Food security is the condition of a country to provide food for individuals, which does not conflict with beliefs, religion and culture and leads a healthy, active and productive life. Food instability and food insecurity can be caused by many factors, one of which is natural disasters. In 2020, Jember Regency experienced 121 natural disasters. Determination of the optimal K value is done to get the right number of group divisions from the clustering process, in this case using the elbow method. The data used in the clustering process are sub-districts in Jember Regency using transient attributes or natural disaster events. Based on the results of sub-district data grouping from the number of clusters k=1 to k=10, the optimal k value was found at the value of k = 4 with the SSE (Sum of Square Error) value = 24,809.
Klasifikasi Resiko Kehamilan Menggunakan Ensemble Learning berbasis Classification Tree Muhamad Arief Hidayat
INFORMAL: Informatics Journal Vol 6 No 3 (2021): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v6i3.28396

Abstract

In health science there is a technique to determine the level of risk of pregnancy, namely the Poedji Rochyati score technique. In this evaluation technique, the level of pregnancy risk is calculated from the values ​​of 22 parameters obtained from pregnant women. Under certain conditions, some parameter values ​​are unknown. This causes the level of risk of pregnancy can not be calculated. For that we need a way to predict pregnancy risk status in cases of incomplete attribute values. There are several studies that try to overcome this problem. The research "classification of pregnancy risk using cost sensitive learning" [3] applies cost sensitive learning to the process of classifying the level of pregnancy risk. In this study, the best classification accuracy achieved was 73% and the best value was 77.9%. To increase the accuracy and recall of predicting pregnancy risk status, in this study several improvements were proposed. 1) Using ensemble learning based on classification tree 2) using the SVMattributeEvaluator evaluator to optimize the feature subset selection stage. In the trials conducted using the classification tree-based ensemble learning method and the SVMattributeEvaluator at the feature subset selection stage, the best value for accuracy was up to 76% and the best value for recall was up to 89.5%
Sistem Informasi Persuratan Berbasis Web dan SMS Gateway I Gusti Made Ngurah Desnanjaya; A A Gede Bagus Ariana; I Made Aditya Nugraha; I Gede Adnyana
INFORMAL: Informatics Journal Vol 7 No 1 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i1.30909

Abstract

The process of managing incoming and outgoing letters in government agencies is still using a manual system, recording is still using an agenda book which has several problems, such as the difficulty of administrative staff in finding old data due to the accumulation of letter data and the letter archiving process. In this study, a web-based mail archive system & SMS gateway mail archival system was created. This system can assist the process of filing letters. Testing this system using BlackBox testing. The research method uses the waterfall system development technique, consisting of several stages, namely the stages of needs analysis, system design, writing program code, conducting testing, and program implementation and maintenance. The data collection technique used is through the interview, observation, and literature study. The test results of the correspondence information system with features to manage officer data, manage incoming mail data, manage outgoing mail data, manage letter type data, manage travel letter data outside the region, and reports. This shows that the system created can function as expected.
Implementasi Metode Fuzzy Sebagai Sistem Kontrol Kepekatan Nutrisi Otomatis Tanaman Hidroponik Berbasis Mikrokontroler Pasa Rangkaian Nutrient Film Technique (NFT) Kurniawan Dwi Yulianto; Achmad Maududie; Nova El Maidah
INFORMAL: Informatics Journal Vol 7 No 1 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i1.29386

Abstract

Hydroponics is a method of cultivating plants by utilizing water as a growth medium by emphasizing on meeting the nutritional needs of hydroponic plants. Hydroponics requires special treatment such as maintaining nutrient levels within the range so that the use of a control system is used. The implementation of the automatic nutrition control system aims to make it easier for farmers to regulate the mixing of AB mix + POC nutrients with water at the PPM value of lettuce plants automatically based on the age of plant growth, so that farmers can produce plants with optimal growth and maximum yields. The hydroponic nutrition control system uses the Fuzzy method. The system will also be integrated with the Arduino Uno microcontroller which is equipped with a Total Dissolved Solids (TDS) sensor. The results of this study can be seen that the success of the system can work well in detecting nutrients in the reservoir and can control pumps and water pumps in low, normal, and high conditions. The sensor used can also work well, where the TDS sensor has an error value of 4.81% and then calibration is carried out so that it gets the equation for the TDS value
Aplikasi Data Mining Asosiasi Barang Menggunakan Algoritma Apriori-TID I Made Dwi Putra Asana; I Gede Iwan Sudipa; A.A. Tri Wulandari Mayun; Ni Putu Suci Meinarni; Devi Valentino Waas
INFORMAL: Informatics Journal Vol 7 No 1 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i1.30901

Abstract

Information about consumer spending patterns is needed by retail companies in determining promotion strategies, placing merchandise on shelves, and inventory management. Most applications in retail companies only produce information from the company side. Applications owned by the company have not been able to generate transaction activity information from the customer side. The transaction activity information from the customer side is knowing consumer spending patterns in terms of buying goods. This information can overcome problems that are often faced by companies, namely customer complaints when there is a vacancy in inventory of pairs of goods that are often purchased by customers. This article describes the application of association data mining with the Apriori TID algorithm. Apriori-TID is a development of the Apriori algorithm. Apriori-TID plays a role in finding frequent itemsets based on minimum support. The application can generate goods association rules based on the minimum support and confidence values entered by the user. The association data mining application features dataset import, dataset analysis, and print analysis result reports. The association rules generated by the application are evaluated using the lift ratio method. The number of transactions, minimum support, and minimum confidence affect the number of rules generated by the application.
Implementasi Aplikasi EPANET Dalam Evaluasi Pipa Jaringan Distribusi Air Bersih PDAM Kolaka Romy Talanipa; Tryantini Sundi Putri; Fathur Rahman Rustan; Andi Tria Yulianti
INFORMAL: Informatics Journal Vol 7 No 1 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i1.30802

Abstract

The need for raw water for various reasons, particularly clean water for households, public areas, and industry, will continue to rise as the world's population grows and the pace of growth in various fields accelerates. However, because the existing supply of clean water infrastructure is still limited, it has not been able to cover all of the country's water needs. Residents in Latambaga District, Kolaka Regency, are likewise concerned about the lack of safe water. Although the area has adequate water sources (river water) and a distribution network that distributes clean water to the population, the issue is getting water from these water sources to areas where there isn't an optimal clean water distribution network so that it can be used by the community population. As a result, it is required to assess PDAM Kolaka's clean water distribution network by employing the EPANET program application in its analysis. The findings of the pipeline network evaluation using the EPANET 2.0 application, the diameter of the pipes used in the evaluation, pipes with a diameter of 1" to 4", and the demand for 1,003 rods of PVC pipes
Analisis Perbandingan Implementasi Metode MADM dan Fuzzy MADM SAW Pada Sistem Pendukung Keputusan Agus Sidiq Purnomo; Anief Fauzan Rozi
INFORMAL: Informatics Journal Vol 7 No 1 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i1.30318

Abstract

There are so many studies that use the Multi-Attribute Decision Making (MADM) method as a solution in Decision Support Systems. In addition, there are also many studies that use additional fuzzy which is implemented in the MADM method which is commonly referred to as Fuzzy MADM. For example, using Simple Additive Weighting (SAW), which one is closer to the best solution, whether to use MADM SAW or FMADM SAW, which one is better to use. Based on these problems, in this study analysis will be carried out regarding which method is closer to the best solution to be implemented in the case of Decision Support System between MADM and FMADM, in this case using the case of selecting the best graduates in the study program and the SAW method. Based on the results of the discussion in this study, it can be concluded that the implementation of MADM uses SAW, with 2 approaches, namely: Likert and fuzzy scales. The results obtained from the comparison of assessment ranges using the Likert and fuzzy scales obtained suitability of 100%. While the results of testing using RSD on Likert and fuzzy scales obtained the same results, namely 12.24%. The use of a Likert scale or fuzzy numbers has no effect, what affects the results is the range of the rating scale.