cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. jember,
Jawa timur
INDONESIA
INFORMAL: Informatics Journal
Published by Universitas Jember
ISSN : 2503250X     EISSN : -     DOI : -
Core Subject : Science,
Arjuna Subject : -
Articles 219 Documents
The Implementation of Minimum Forest Graph for Centroid Updating Process on K-Means Algorithm Achmad Maududie
INFORMAL: Informatics Journal Vol 3 No 3 (2018): INFORMAL - Informatics Journal
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

K-Means is one of algorithms based on partitioning clustering method, particularly on sum-of-squared error criterion. It generates a single partition data for a single group of data that has high degree in similarity. This method has some advantages such as linear complexity, ease of interpretation, simplicity of implementation, speed of convergence, adaptability to sparse data, and versatile in almost every aspect. However, this method also has some weaknesses, such as very sensitive to initial centroids (center) that drives the quality of clustering output. Although there is a recommendation to make some runs with different initial centroids and select the initial centroid that produces cluster with minimum error, frequently, this procedure does not achieve a satisfying result. This paper introduces a new method to overcome this problem through enhancing the refinement mechanism in K-Means algorithm. This method focuses on rebuilding new centroids using minimum forest graphs to reproduce better models in the refinement mechanism. Based on the conducted experiments, the proposed method yielded better value of gain information and Dunn index than Forgy method in both relatively well distributed and relatively noisy dataset. Furthermore, the members of each cluster in every run of the conducted experiments were consistent for the proposed method, while it was not happen for Forgy method.
Penerapan Metode Design Thinking Pada Perancangan UI/UX Sistem Informasi Penelitian Mahasiswa Berbasis Web Arizona Firdonsyah; Zahra Arwananing Tyas; LM Ma'rifatun
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.33468

Abstract

Advances in technology provide opportunities to increase efficiency in various sectors, including the licensing process and the operations of government agencies. The Bantul District Health Office, as a health and research service provider, still relies on a semi-manual research licensing process. To overcome this, a structured research licensing information system is needed on a website basis. The stages of making a website start with UI/UX design. This study designed a UI/UX system using the Design Thinking method. The Empathize stage involves interviews and observations to understand the needs of users, especially the Head of the Health Office Program Subdivision. The Define phase identifies core requirements such as a list of user requirements, business process flowcharts, and the use of Figma for design and prototyping. The Ideate Stage involves brainstorming and wireframes, while the Prototype Stage produces the final design for testing. The Test phase involved Usability Testing, with fixes such as changing the message feature to notifications and adding the option to sign in with a Google account. The results showed that the prototype answered the problems of the Bantul District Health Office in designing the SIPENA UI/UX according to user needs.
Rancang Bangun Chatbot Pengaduan Kekerasan Perempuan Anak Dengan Metode Fuzzy String Matching Dan Enhanced Confix Stripping Stemmer Al Muhtadi Billah; Diah Ayu Retnani Wulandari; Yudha Alif Auliya
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.42310

Abstract

Violence against women is a serious issue affecting many individuals in society. In Indonesia, including Kota Probolinggo, the number of cases of violence against women remains high. This research aims to design a chatbot application as a means for reporting violence against women and children (VAWC) in Kota Probolinggo. The application provides an anonymous and safe space for victims to report their complaints without revealing their identities. Additionally, the chatbot delivers information and education about different types of violence against women and preventive measures. The development of the chatbot application utilizes Fuzzy String Matching, Enhanced Confix Stripping Stemmer, and preprocessing methods to enhance data search accuracy and provide appropriate responses to users. The testing results show that the chatbot offers responses with satisfactory accuracy. Leveraging AI technology in the form of a chatbot is expected to provide an effective solution in addressing and preventing violence against women, offering a secure and anonymous platform for victims to report incidents. The application is envisioned to offer better support and assistance to victims of violence. The chatbot application implements fuzzy string matching, the Levenshtein distance algorithm, and Enhanced Confix Stripping Stemmer to process user input before matching it with the database. During the Enhanced Confix Stripping Stemmer process, sentences are transformed into an array of basic words, enhancing the accuracy of data matching when using fuzzy string matching and the Levenshtein distance algorithm. Testing results indicate a 4.77% difference between manual calculations and the chatbot system. This difference may be attributed to variations in text processing and other factors.
Analisis Kepuasan Penggguna Pada Layanan Aplikasi Mobile Jaminan Kesehatan Nasional (JKN) Menggunakan Metode User Experience Questionnaire (UEQ) Achlis Amalia Masruroh; Ratna Juita; Bertha Pangaribuan
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.38011

Abstract

Although application mobile JKN would facilitate the public. However, until now has a view on the level of satisfactiom users application mobile JKN particulary in the area of west Papua. Reseach objectives to be evalution when do for improve te weaknesses and shortage of system. Raising the level of satisfaction mobile users JKN. The use writer method user experience questionnaire (UEQ) to assess the variable UEQ: attractiviness, clarity, efficiency, the reliability of, stimulation and novelty. The result of the research by the number 117 respondents from 5 administrative areas west papua, category above average on a scale attractiviness with the 1.22. Scale clarity with the 1.13 to a category bellow average. Scale efficiency the average value of 1.42 with category above average. Scale the accuracy of get result the average score 2.04 to a category excellent. The stimulation average scoring 1.16 category above average. The last a novelty average 1.85 with excellent categories.
Analisis Kesenjangan Antara Pengguna dan Penyedia Elitag Yusrida Muflihah; Agyl Ardi Rahmadi; Jessica Angelina Gatur; Ahmad Alfianto
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.29548

Abstract

The Elitag service is a single point of application used by University Lecturers on August 17 1945 to provide teaching through courage to students. Elitag Services has a role in helping lecturers deliver material, conduct attendance and discussions boldly. Elitag's services have increasingly gained value since distance lectures were held during the Covid-19 pandemic. However, the provision of Elitag services cannot be separated from several problems, including: 1) there is a gap between the expectations and perceptions of Elitag service users, 2) the Service Level Agreement (SLA) for Elitag services does not yet explain service requirements regarding capacity, performance and service availability, 3 ) minimum level of service evaluation. Seeing this problem, it is necessary to carry out an error analysis among Elitag service users and Elitag service providers. This research focuses on Service Level Management (SLM) which can ensure that agreements made are in accordance with customer needs, meetings between Elitag Service users and Elitag Service providers can be minimized. Referring to ITIL, the first stage that needs to be carried out is to conduct a survey using the SERVQUAL method to determine the expectations and perceptions of service users, then review the current conditions of Elitag Service SLM based on the dimensions of the SERVQUAL method. The research results show that there is a gap between the expectations and perceptions of service users, namely that the expectations of service users are higher but not in accordance with the perceptions of service users. This is indicated by the overall average score of -0.58, with the highest gap score in the responsiveness dimension (-0.73) and the lowest gap score in the Tangibles dimension (-0.43). This score shows that there is a gap but it is not significant
Algoritma Apriori Dalam Identifikasi Pola Pembelian Konsumen Pada Produk Minuman Vita Choirul Nisa; Fata Nidaul Khasanah
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.41514

Abstract

Competition between companies is getting tougher and entrepreneurs indirectly need a better product marketing strategy. Inventory management system is a very popular business in Indonesia, especially in the beverage industry. Related to inventory, there is a technique in the development of science today, one of which is data mining techniques or mining techniques. In data mining, a priori algorithms contain a type of association rules that aim to find interesting relationships between combinations of elements hidden within the dataset. The application of a priori algorithm in this study can help Pekopen tavern managers find the right consumer buying behaviour . So that it can be used as material for business decision-makers to determine marketing strategies and optimize sales of menu variants, especially for several types that are in great demand. These results are used to find new information to determine a better product marketing strategy. Data processing using apriori algorithm is carried out by conducting the highest frequency analysis based on the minimum support value followed by determining the association rules based on the confidence value and then continued with the evaluation process through determining the lift ratio. There are 2000 sales transaction data processed from the data processing process obtained from a combination of itemset {Chizu Redvelvet, Cokolateh} with a support value of 40% and a confidence value of 67%.
Penanganan Data Tidak Seimbang Menggunakan Hybrid Method Resampling Pada Algoritma Naive Bayes Untuk Software Defect Prediction Moch Lutfi; Arief Tri Arsanto; Muhammad Faishol Amrulloh; Ummi Kulsum
INFORMAL: Informatics Journal Vol 8 No 2 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i2.41090

Abstract

Software defect prediction is software data that is used to identify a software module and can also be used to predict software defects. Before carrying out further trials, it is necessary to carry out special handling, especially by using algorithm models as predictions of software defects with the aim of obtaining information from the device being developed. Therefore, it is necessary to predict software defects using appropriate classification and prediction methods, so that the resulting accuracy results are better. In this study, the naïve Bayes algorithm was used as a classification with a resampling technique approach to handle unbalanced data, including SMOTEENN and SMOTETomek. The best accuracy results in the research conducted were 92.5% on the Nasa Repository PC4 dataset
Ekstraksi Fitur pada File Gambar dengan Metode Fast Fourier Transform Prasetiyowati, Maria Irmina
INFORMAL: Informatics Journal Vol 9 No 1 (2024): INFORMATICS JOURNAL (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i1.44471

Abstract

There are several methods for performing feature extraction, one of which is the Fast Fourier Transform (FFT). FFT is an effective way to convert signals or time series data to the frequency domain. This study uses the FFT method for image data. Image data is transformed using FFT and returned using the Inverse Fast Fourier Transform (IFFT). From the results of the feature extraction test on nine image files, it was found that 78% of the image data experienced a decrease in size, 11% of the images had a fixed size, and 11% of the image data experienced an increase in size.
Rancang Bangun Aplikasi Pengelolaan Keuangan Berbasis Android Menggunakan Framework React Native Harry, Soepandi; Wijonarko, Dwi; Afif, Hasnan
INFORMAL: Informatics Journal Vol 8 No 3 (2023): Informatics Journal (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v8i3.44032

Abstract

Financial management application is an information system that facilitates the organization to manage financial data for related fields so that it can help complete activities in the financial sector, especially for the process of recording and financial statements quickly. The aim is to realize the Implication of a android-based Financial Information System to support the presentation of information in the decision-making process by the leadership, as well as the finance department. The method used is analytical methods and design methods. The design method is making the implementation of information systems, database design and financial data analysis. The method of analysis is done by using observation and interview techniques, literature studies, direct surveys at de.Blado Coffee & Tea by interviewing related people to complete the information needed. The end result of implementing a android-based financial information system is used to simplify and speed up data access and provide the leadership with full access to data without processing operational data. With the establishment of information systems, structured and integrated data can be produced well as input for management in the decision making process.
Implementasi SSL untuk Keamanan Data pada Sistem Inventaris Mufreni, Sadr Lufti; Wijayanto, Danur; Maryani, Sri
INFORMAL: Informatics Journal Vol 9 No 1 (2024): INFORMATICS JOURNAL (INFORMAL)
Publisher : Faculty of Computer Science, University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/isj.v9i1.40398

Abstract

The issue of data security and confidentiality of communications on the network is one of the most important aspects. Data security in the Inventory System is currently not completely safe; this is because the Inventory System has not implemented client and server communication security. Secure Socket Layer (SSL) is one of the efforts that can be made to prevent illegal attacks. This study applied the SSL method, in which SSL acted as a data security protocol in client and server communication networks. The purpose of this research was to implement SSL in order to improve data security in the Inventory System at Sanggar Tari Natya Lakshita. The process of observing and analyzing the data security of the Inventory System was carried out using Wireshark tools. The results showed that the implementation of SSL in the Inventory System was successful; this was evidenced by the results of observing and analyzing the data packets captured by Wireshark; the data was not easy to read. The success rate of doing 3 trials, namely logging in, inputting and deleting the data packet, was 100% encrypted.