cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. jember,
Jawa timur
INDONESIA
INFORMAL: Informatics Journal
Published by Universitas Jember
ISSN : 2503250X     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 219 Documents
Implementasi Sistem Informasi Manajemen Masjid Berbasis Web Herfandi Herfandi; Fahri Hamdani
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.34233

Abstract

The mosque is a place of worship for Muslims. The mosque plays an important role as the center of Muslim activities. However, behind the mosque's very important role in social activities, it is not balanced with the needs of today's modern society. Therefore, this study implements a management information system (MIS) in mosques. This study resulted in a mosque SIM which was developed on a web-based basis so that it was easily accessible and the software development method used the waterfall so that the SIM that was built was quickly resolved and the development process to implementation and hosting. The features for mosque SIM visitors: information on the call to prayer/prayer schedule, parameter information (qibla direction), financial data information (incoming and outgoing), information on mosque donations/alms, and contact information for contacting the mosque SIM manager. Admin features: manage mosque staff data (create, edit and delete), input data types for donation/alms categories, backup and restore SIM, print officer data, and view the history of what activities have been done by the admin. Officer features: managing activity agendas, managing mosque funds (transfer confirmation, mosque cash profit, income data, expenditure data), and managing report management that will be used as a reference for making decisions/policies. The mosque SIM is expected to help and facilitate mosque officials and administrators in managing mosque activities and finances.
Penerapan Metode K-Means untuk Clustering Data Anak Berdasarkan Kepemilikan Akta Kelahiran dan KIA Diah Ayu Rahmayanti
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.34709

Abstract

Having a birth certificate and KIA is very important for every child to have as proof of identity. However, in reality, the number of birth certificates and KIA in Manokwari Regency is not proportional to the number of children. This study aims to classify children's data based on the number of birth certificates and ownership of KIA in Manokwari district by using the K-Means clustering method to produce sub-district groupings with high coverage of non-ownership of birth certificates and KIA, so that it can assist the Department of Population and Civil Registry of Manokwari Regency in provide targeted service programs. This study uses the Davies Bouildin Index (DBI) method to determine the optimum number of clusters used. The optimum number of clusters obtained is 4 with the lowest DBI value of 0.069 so that 4 clusters are formed, namely cluster 0 with a fairly low coverage category, cluster 1 with a fairly high coverage category, cluster 2 in a high coverage category, and cluster 3 in a very high coverage category. The K-Means clustering method succeeded in grouping sub-districts in Manokwari district, as well as informing the number of sub-districts with high coverage that do not have birth certificates and KIA.
Analisis Keamanan Jaringan dari Serangan DoS pada Sistem Inventaris Sanggar Tari Natya Lakshita menggunakan IDS Zahra Arwananing Tyas; Arizona Firdonsyah; Wulan Ramdhani
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.34943

Abstract

Information technology is advancing very quickly. Currently, there is highly qualified support for internet facilities. A quality internet service has both advantages and disadvantages for its users. An example of the negative impact of the development of internet technology is attacks from irresponsible parties or often called hackers. Sanggar Tari Natya Lakshita’s Inventory System is a newly built system, so attack testing is needed because network security is important to maintain data integration in the network. The test is carried out using a DoS attack with the LOIC tool. IDS is the method used in research with the Snort tool that functions as an intruder detector. The study aims to determine the results and effects of attacks on the Inventory System and determine how the IDS framework works with the Snort tool in detecting attacks. carried using 1 computer and 1 laptop. The results of the attack on the inventory system showed that Snort succeeded in detecting an attack sent by LOIC by displaying the attacker's IP and IP target through port 80, then the recommendations were given related to the stages of handling network security based on CSIRT guidelines at Sanggar Tari Natya Lakshita that can be implemented.
Implementasi Scrum dalam Perancangan Aplikasi Pembelajaran Budaya Nusantara berbasis Mobile Tri Agustina Nugrahani; Karina Nine Amalia
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.35210

Abstract

Learning in the field of archipelago insight is very important for the younger generation. The insight of the Indonesian archipelago has a lot of diversity, namely national anthems, regional songs, regional traditional clothes, traditional musical instruments, etc. With the development of technology, the introduction insight into the archipelago can be supported by various innovations. One of the innovations is to create a mobile-based application for learning in field of archipelago insights. This learning is done by designing a mobile-based application. This mobile-based application is the result of a design based on the needs of teachers and parents. Based the results of the application design implemented using Scrum, there are 3 roles, namely super admin, teacher and student. There are 6 main features that can be accessed by students, namely being able to work on games about the national anthem, regional songs, regional traditional clothing, traditional musical instruments, heroes and assessment results. From the product backlog that has been compiled, there are agreed tasks and definitions of done (DoD) of application features. All of the feature implementations are in accordance and have been done with the agreed DoD. It is hoped that this design can help students be active and broaden the cultural insights of the archipelago.
Penerapan Metode K-Means dalam Pengelompokan Data Penduduk Tidak Mampu di Distrik Oransbari Messi Triyana; Ratna Juita; Christian Dwi Suhendra
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.34722

Abstract

Proverty is a serious problem, the occurrence of proverty in the community is caused by a condition of the inability of the family economically to meet primary needs. Poor people are found in almost every country, city, and region. One of them is in the Oransbari District, which is one of the areas in Indonesia where the population does not receive assistance evenly. Based on these conditions, clustering is carried out to assist the district in grouping the poor population, so that the assistance provided can be right on target. With this problem, data mining with k-means clustering method used in clustering the poor population to make it easier for the Oransbari District to provide the population so that it is right on target. The data used is the data of the poor population in 2020 which amounted to 1872 with 17 attributes. Based on the results of tests carried out by applying the k-means algorithm, the results obtained with 3 clusters, the first cluster with a population of 471 with the category of poor population with medium priority, the second cluster has a population of 428 with a high priority category of poor population, and the third cluster has a population of 826 a low priority category of poor population. The k-means method is expected to be able to assist the Oransbari District in making decisions so that assistance is more targeted.
Detail Engineering Deisgn Perancangan Detail Engineering Design Infrastruktur Jaringan Komputer RSUD X Kota Y Aditya Ari Fikri; Diah Ayu Retnani Wulandari; Yudha Alif Auliya
INFORMAL: Informatics Journal Vol 7 No 3 (2022): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v7i3.35144

Abstract

Detailed Engineering Design Computer networks in hospitals are complete planning drawings that include architectural drawings and detailed elements that support the implementation of computer networks and are supported by technical documents in them. DED is required in hospitals as an attachment to the Network infrastructure submission document used for all hospital operations, health services, and other purposes. The method used in analyzing and designing the Detail Engineering Design is using the Gap Analysis Method (GAP). The proposed recommendations include network topology based on an analysis of existing needs and DED results for the computer network of X City Y Hospital. The topology testing parameters consider QOS (Quality of Service), which consists of ping testing on all devices, Traffic Block Firewall, and web server access. The test results were carried out using three parameters, namely the ping test, traffic block, and web server access, where all tests have been successful and are by the steps in carrying out the test.
Penerapan dan Analisis Network Security Snort Menggunakan Intrusion Detection System pada Serangan UDP Flood Karina Fitriwulandari Ilham Ilham; Erick Irawadi Alwi; Farniwati Fattah
INFORMAL: Informatics Journal Vol 8 No 1 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i1.34003

Abstract

The web server is one type of server that was most frequently attacked because the web server is the most vital means for storing databases. The most frequently used attack is Denial of Service (DoS). DoS is an attack technique against a system by consuming data resources from a server so that the server cannot be accessed again. Therefore, this study aims to design a network security system by implementing an Intrusion Detection System (IDS) using the Snort application as a detection system in the event of a DoS attack on the web server. by implementing Snort on a web server will help network administrators to ensure that the web server is protected from various threats. The results of this study indicates that the Snort rule that has been created has been successfully detecting attacks that have been tested through the LOIC tools.
Pengelompokkan Daerah Rawan Bencana di Kabupaten Jember Menggunakan Metode K-Means Clustering Nilam Wahidah; Oktalia Juwita; Fajrin Nurman Arifin
INFORMAL: Informatics Journal Vol 8 No 1 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i1.29542

Abstract

This research aims to classify disaster-prone areas in Jember Regency based on disaster-prone index indicators in 31 sub-districts in Jember Regency. The 6 indicators used in this study are the number of disaster events, the number of victims killed, the number of injured victims, the number of damaged houses, the amount of damage to infrastructure and population density. The clustering method used is the K-Means Clustering method. This method is considered quite effective and efficient for grouping large amounts of data. Researchers also used the Davies Bouldin Index (DBI) method to determine the optimal number of clusters (k) used in the clustering process. The results of this study are the optimal number of clusters (k) is k = 3 with the cluster test k = 2 to k = 10, by classifying groups of low vulnerability, medium vulnerability and high vulnerability.
Pencarian Rute Jasa Pemesanan Penggilingan Padi Berbasis Android Dengan Menggunakan Google Maps Moch Lutfi; Elmaida Khoirotuzzuhria
INFORMAL: Informatics Journal Vol 8 No 1 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i1.34772

Abstract

The location where the rice mill service is located is an important thing for most farmers to improve the quality of rice. Clear information about the rice mill is one of the determining factors in choosing a suitable rice mill. For farmers and people who do not know the surrounding area when they are going to do rice milling, it will be difficult to find the nearest rice mill location. There are several weaknesses when using a manual system, including the information obtained is not in accordance with the expected needs, and the distance traveled requires a relatively long time and relatively large cost. The research conducted by the author is to design an application for ordering rice milling services using the waterfall method and using google maps as a method of finding the closest route. The purpose of the study was to determine the application of google maps to the rice mill ordering application. From the results of system testing using blackbox testing, the results show that the application being tested can run and function as expected. While the results of testing the questionnaire by getting an index of 79.75%.
User Technology Readiness and Acceptance of Mobile Human Resources Information Application Nia Kurnia Mawaddah; Astari Retnowardhani
INFORMAL: Informatics Journal Vol 8 No 1 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i1.35540

Abstract

The Mobile Human Resource Application was developed to provide convenience for users. However, in the implementation phase, they have not been used by all users. There are several reasons users do not use the application, namely, employees often forget because they are not ready to use new applications, employees often fail to absent because there are some bugs at the beginning of implementation where the support team is not ready to help users and the employees’ insecurity when making a presentation using the face and location. The purpose of this study is to conduct empirical testing of the factors that influence the readiness and acceptance of users of the Mobile Human Resources Application. The Technology Readiness and Acceptance Model (TRAM) integrates technology readiness with technology acceptance into one model. TRAM is used to determine the effect of technology readiness on acceptance of the perceived ease of use factor and perceived usefulness will affect the intention to use. The result of the study showed that the Innovativeness and Perceived Ease of Use significantly influenced user technology readiness and acceptance of mobile human resources information application. Innovativeness dimensions of technology readiness have positive and significant effects on perceived ease of use. Perceived ease of use dimensions of technology acceptance has positive and significant effects on perceived usefulness and intention to use Mobile Human Resources.