cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
register@ft.unipdu.ac.id
Editorial Address
Kompleks Pondok Pesantren Darul Ulum, Rejoso, Peterongan, Jombang, East Java, Indonesia, 61481
Location
Kab. jombang,
Jawa timur
INDONESIA
Register: Jurnal Ilmiah Teknologi Sistem Informasi
ISSN : 25030477     EISSN : 25023357     DOI : https://doi.org/10.26594/register
Core Subject : Science,
Register: Scientific Journals of Information System Technology is an international, peer-reviewed journal that publishes the latest research results in Information and Communication Technology (ICT). The journal covers a wide range of topics, including Enterprise Systems, Information Systems Management, Data Acquisition and Information Dissemination, Data Engineering and Business Intelligence, and IT Infrastructure and Security. The journal has been indexed on Scopus (reputated international indexed) and accredited with grade “SINTA 1” by the Director Decree (1438/E5/DT.05.00/2024) as a recognition of its excellent quality in management and publication for international indexed journal.
Arjuna Subject : -
Articles 219 Documents
Pengenalan karakter angka menggunakan metode Integral Proyeksi Liantoni, Febri
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 3, No 2 (2017): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v3i2.706

Abstract

 Saat ini dengan kemajuan teknologi membuat komputer memiliki kemampuan komputasi yang lebih tinggi untuk meningkatkan kemampuan dalam pengolahan data. Kemajuan teknologi ini juga berimbas pada kemampuan teknologi citra digital yang berhubungan dengan pengenalan karakter angka yang merupakan bagian dari pengenalan pola. Pengenalan karakter penting untuk pengolahan informasi yang memungkinkan proses identifikasi secara cepat dan otomatis. Pada penelitian ini dilakukan proses pengenalan karakter angka menggunakan metode Integral Proyeksi. Alasan menggunakan metode integral proyeksi karena mempunyai kelebihan pemrosesan yang sederhana dan cepat dalam mengidentifikasi suatu citra digital. Integral Proyeksi yang digunakan yaitu Integral Proyeksi vertikal dan Integral Proyeksi horisontal. Hasil penelitian menunjukkan pengenalan karakter angka mampu mengenali karakter dengan benar jika hasil praproses menghasilkan gambar yang baik. Pengenalan karakter angka akan kurang sempurna jika gambar yang diproses tidak baik, hal ini dikarenakan metode Integral Proyeksi bekerja dengan menghitung jumlah piksel tiap gambar untuk mengenai nilai gambar tersebut. Pengujian pengenalan karakater angka yang dilakukan terdapat 20 gambar uji menghasilkan nilai akurasi sebesar 65%.    Nowadays with the advancement of technology makes computers have higher computing capabilities to improve the capability of data processing. Advances in technology have also affected the ability of digital image technology related to the introduction of alphanumeric characters that are part of pattern recognition. Character recognition is important for information processing that allows rapid identification process automatically. In this research, numeric character recognition process using integral projection method. Reasons for using integral projection method for processing has the advantage of a simple and quick in identifying a digital image. The integral projection used is vertical projection and horizontal projection. The results showed numeric character recognition could recognize the characters correctly if the results of preprocessing produce good images. The introduction of the characters will be less than perfect if the images are processed is not good, this is because the integral projection method works by counting the number of pixels for each image to the value of the image. Testing the result of recognition from 20 image which is on dataset has been built to get accuracy value about 65%.
Otomatisasi Peringkasan Dokumen Sebagai Pendukung Sistem Manajemen Surat Najibullah, Ahmad; Mingyan, Wang
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 1, No 1 (2015): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v1i1.400

Abstract

Peringkasan dokumen adalah proses penyajian kembali dokumen dalam bentuk yang lebih singkat tanpa membuang informasi penting yang terdapat dalam dokumen tersebut. Dalam penelitian ini, peneliti menggunakan metode Naive Bayes untuk menghasilkan ringkasan sebuah dokumen. Objek dalam penelitian ini berupa dokumen yang berbentuk surat. Dalam proses peringkasan dokumen, penghitungan probabilitas didasarkan pada fitur teks yang ada dalam surat, diantaranya adalah frekuensi kata, kata kunci, frase kunci, dan kata yang termasuk dalam kelas entitas atau numerik. Hasil uji coba menunjukkan bahwa tingkat kompresi adalah 53.67% dengan informasi penting yang tersedia dalam ringkasan mencapai 96.67% dari dokumen asli.
Klasifikasi jenis kejadian menggunakan kombinasi NeuroNER dan Recurrent Convolutional Neural Network pada data Twitter Putra, Fatra Nonggala; Fatichah, Chastine
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 4, No 2 (2018): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v4i2.1242

Abstract

Sistem deteksi kejadian dari data Twitter bertujuan untuk mendapatkan data secara real-time sebagai alternatif sistem deteksi kejadian yang murah. Penelitian tentang sistem deteksi kejadian telah dilakukan sebelumnya. Salah satu modul utama dari sistem deteksi kejadian adalah modul klasifikasi jenis kejadian. Informasi dapat diklasifikasikan sebagai kejadian penting jika memiliki entitas yang merepresentasikan di mana lokasi kejadian terjadi. Beberapa penelitian sebelumnya masih memanfaatkan fitur ‘buatan tangan’, maupun fitur model berbasis pipeline seperti n-gram sebagai penentuan fitur kunci klasifikasi yang tidak efektif dengan performa kurang optimal. Oleh karena itu, diusulkan penggabungan metode Neuro Named Entity Recognition (NeuroNER) dan klasifier Recurrent Convolutional Neural Network (RCNN) yang diharapkan dapat melakukan deteksi kejadian secara efektif dan optimal. Pertama, sistem melakukan pengenalan entitas bernama pada data tweet untuk mengenali entitas lokasi yang terdapat dalam teks tweet, karena informasi kejadian haruslah memiliki minimal satu entitas lokasi. Kedua, jika tweet terdeteksi memiliki entitas lokasi maka akan dilakukan proses klasifikasi kejadian menggunakan klasifier RCNN. Berdasarkan hasil uji coba, disimpulkan bahwa sistem deteksi kejadian menggunakan penggabungan NeuroNER dan RCNN bekerja dengan sangat baik dengan nilai rata-rata precision, recall, dan f-measure masing-masing 94,87%, 92,73%, dan 93,73%.    The incident detection system from Twitter data aims to obtain real-time information as an alternative low-cost incident detection system. One of the main modules in the incident detection system is the classification module. Information is classified as important incident if it has an entity that represents where the incident occurred. Some previous studies still use 'handmade' features as well as feature-based pipeline models such as n-grams as the key features for classification which are deemed as ineffective. Therefore, this research propose a combination of Neuro Named Entity Recognition (NeuroNER) and Recurrent Convolutional Neural Network (RCNN) as an effective classification method for incident detection. First, the system perform named entity recognition to identify the location contained in the tweet text because the event information should have at least one location entity. Then, if the location is successfully identified, the incident will be classified using RCNN. Experimental result shows that the incident detection system using combination  of NeuroNER and RCNN works very well with the average value of precision, recall, and f-measure 92.44%, 94.76%, and 93.53% respectively.
Whats drive someone to share their knowledge? Indonesia virtual community case Satria, Deki
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2142

Abstract

A virtual community is one form of Community of Practices that resides on the internet. This community consists of people who share problems or interests in specific topics. A lot of knowledge comes from this kind of community where the members shared their knowledge voluntarily. Knowledge itself is a valuable resource that gives the owner have an advantage. This research tried to observe what are the driver of this behavior. Knowing these variables could help the organization in defining knowledge sharing system functionality. The variables collected using PRISMA Systematic Literature Review (SLR) protocols, and the hypotheses tested using Partial Least Squares Structural Equation Modeling (PLS-SEM). From this research, we observed that self-efficacy and supporting others significantly influence someone to share their knowledge.
Sistem pendukung keputusan pemilihan tenaga kesehatan teladan menggunakan metode Multi-Attribute Utility Theory Ramadiani, Ramadiani; Rahmah, Auliana
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 5, No 1 (2019): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v5i1.1273

Abstract

Pemilihan tenaga kesehatan teladan merupakan kegiatan rutin setiap tahun oleh Dinas kesehatan yang bertujuan untuk memberi penghargaan kepada mereka yang sudah mengabdikan diri di Puskesmas. Penilaian yang masih manual dianggap kurang produktif, subjektif, dan kurang efisien. Sistem Pendukung Keputusan (SPK) diperlukan untuk memudahkan pekerjaan tim juri dalam memutuskan petugas kesehatan teladan secara objektif, profesional dan transparan. Sistem yang dibangun ini berbasis stand-alone, dan dapat dijadikan alternatif terbaik untuk daerah yang akses internetnya belum cukup memadai. Penelitian ini dilakukan melalui literature review dan wawancara langsung pada tim penilai tenaga kesehatan. Model yang digunakan adalah metode Multi Attribute Utility Theory (MAUT). Hasil metode MAUT dipilih karena tidak memiliki nilai cost dan benefit dalam menentukan keputusan. Penelitian ini telah menghasilkan rekomendasi untuk pemilihan tenaga kesehatan teladan dengan hasil akurasi sebesar 86,67%.   The selection of exemplary medical personnel is an annual event held by the Public Health office which aims to reward those who have already served in the community health centers. Manual evaluation method is considered to be less productive, subjective and less efficient. Decision Support System (DSS) is needed to facilitate the work of the jury team in determining exemplary health personnel to be more objective, professional and transparent. The system was built stand alone made as the best alternative for regions where internet access is not sufficient. This research was carried out through literature review and direct interviews with the health personnel assessment team. The model that was used in this research is Multi Attribute Utility Theory method. MAUT was used because it did not have the value of cost and benefit in determining decisions. This study has produced recommendations for the selection of exemplary health personnel with an accuracy of 86.67%.
Secure random port list generator pada mekanisme autentikasi dengan menggunakan Port Knocking dan Secure Socket Layer Rauf, Abdul; Faiqurahman, Mahar; Akbi, Denar Regata
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 4, No 2 (2018): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v4i2.1162

Abstract

Port Knocking merupakan proses autentikasi yang dilakukan dengan mengetuk port tertentu untuk membuka dan menutup koneksi menuju suatu service. Pada umumnya, Port Knocking memiliki prosedur penetapan daftar port yang bersifat tetap. Hal inilah yang mendorong munculnya penelitian terkait penerapan Secure Random Port List Generator (SRPLG), melalui perancangan sebuah sistem yang mampu mengacak daftar port yang digunakan untuk knocking. Di samping itu, sistem ini juga didesain agar mampu mengirimkan informasi daftar port teracak tersebut kepada client melalui jalur aman. SRPLG server ini akan di integrasikan pada mekanisme autentikasi Port Knocking. Penerapan metode ini bertujuan untuk menciptakan sebuah prosedur autentikasi yang dinamis, aman dan efisien dalam mengamankan Secure Shell server (SSH server). Hasil pengujian yang didapatkan menunjukkan bahwa SRPLG server dalam mengacak daftar Port Knocking mampu menghasilkan daftar port yang selalu berubah setiap kali ada request dari client. Kemudian dari hasil sniffing yang dilakukan terhadap data yang ditransmisikan oleh SRPLG server dan client menunjukkan bahwa seluruh informasi yang ditangkap telah dienkripsi oleh Secure Socket Layer (SSL). Hasil pengujian peforma SRPLG server terhadap jumlah client yang melakukan request, rata-rata membutuhkan waktu antara 0,01 detik sampai 0,06 detik dalam setiap variasi pengujian peformansi. Pengujian terakhir menunjukkan bahwa SSH server telah berhasil diamankan dengan konfigurasi Port Knocking dari serangan port scanning attack, di mana seluruh informasi port yang ditampilkan, tidak ditemukan satupun celah yang dapat eksploitasi.    Port Knocking is an authentication process done by tapping a particular port to open and close the connection to a service. In general, the knocking port has a fixed procedure to assign ports list. This is what prompted the emergence of research related to the implementation of Secure Random Port List Generator (SRPLG), through the design of a system capable of scrambling the list of ports used for knocking. In addition, the system is also designed to be able to transmit random ports list information to clients via a secure path. This SRPLG server will be integrated into the Port Knocking authentication mechanism. Implementation of this method aims to create a dynamic authentication procedure, secure and efficient in securing the SSH server. The test results show that the secure random port list generator server in scrambling the list of knocking ports is able to generate an ever-changing port list every time a client requests. Then from the sniffing done to the data transmitted by the SRPLG server and the client indicates that all captured information has been encrypted by secure socket layer or SSL. Performance test marks SRPLG server to the number of clients who make requests, average takes between 0.01 seconds to 0.06 seconds in every variation of performance testing. In the last test shows SSH server has been successfully secured with Port Knocking configuration from attack port scanning attack, where all port information is displayed, not found any fault that can exploit.
Implementation of the user-centered design (UCD) method for designing web marketplace of qurban cattle sales in Indonesia Rahmawati, Endra
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 6, No 2 (2020): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v6i2.1845

Abstract

This study aims to create a user interface design for the designing web marketplace of qurban cattle sales in East Java, Indonesia. The word qurban referred as  the qurban animal slaughtered during the Eid al-Adha, especially cow.  The qurban web market can help breeders and customers in the process of selling cattle directly without limited territory.  This is because the process of selling qurban cows is still done traditionally by ordering directly by phone and coming directly to the cattle pen for the selection of qurban animals desired by consumers. To deal with these problems, an alternative solution is needed that can create a Web Marketplace interface design that is designed using the User-Centered Design (UCD) method, focusing on the user's primary needs. This method was chosen because it focuses on the user's goals, characteristics, and workflow in the design process. How the system can be understood and used by users is a top priority in this web design and involves users in designing the marketplace web interface. Therefore it is very suitable for designing a website that is simple and easy to use. The design of the web marketplace of qurban cattle sales has four main features which are promotion of qurban cattle, online qurban cattle bookigs (direct purchases or livestock care services), payment confirmation, and qurban cattle contributions for collective purchases or in groups. The results of the System Usability Scale (SUS) test distributed to 30 respondents obtained a value of 79.3 which indicates that the qurban web marketplace design can be accepted by users and can be classified as good design.
Analisis Jaringan Syaraf Tiruan untuk prediksi volume ekspor dan impor migas di Indonesia Andriani, Yuli; Silitonga, Hotmalina; Wanto, Anjar
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 4, No 1 (2018): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v4i1.1157

Abstract

Analisis pada penelitian penting dilakukan untuk tujuan mengetahui ketepatan dan keakuratan dari penelitian itu sendiri. Begitu juga dalam prediksi volume ekspor dan impor migas di Indonesia. Dilakukannya penelitian ini untuk mengetahui seberapa besar perkembangan ekspor dan impor Indonesia di bidang migas di masa yang akan datang. Penelitian ini menggunakan Jaringan Syaraf Tiruan (JST) atau Artificial Neural Network (ANN) dengan algoritma Backpropagation. Data penelitian ini bersumber dari dokumen kepabeanan Ditjen Bea dan Cukai yaitu Pemberitahuan Ekspor Barang (PEB) dan Pemberitahuan Impor Barang (PIB). Berdasarkan data ini, variabel yang digunakan ada 7, antara lain: Tahun, ekspor minyak mentah, impor minyak mentah, ekspor hasil minyak, impor hasil minyak, ekspor gas dan impor gas. Ada 5 model arsitektur yang digunakan pada penelitian ini, 12-5-1, 12-7-1, 12-8-1, 12-10-1 dan 12-14-1. Dari ke 5 model yang digunakan, yang terbaik adalah 12-5-1 dengan menghasilkan tingkat akurasi 83%, MSE 0,0281641257 dengan tingkat error yang digunakan 0,001-0,05. Sehingga model ini bagus untuk memprediksi volume ekspor dan impor migas di Indonesia, karena akurasianya antara 80% hingga 90%.   Analysis of the research is Imporant used to know precision and accuracy of the research itself. It is also in the prediction of Volume Exports and Impors of Oil and Gas in Indonesia. This research is conducted to find out how much the development of Indonesia's exports and Impors in the field of oil and gas in the future. This research used Artificial Neural Network with Backpropagation algorithm. The data of this research have as a source from custom documents of the Directorate General of Customs and Excise (Declaration Form/PEB and Impor Export Declaration/PIB). Based on this data, there are 7 variables used, among others: Year, Crude oil exports, Crude oil Impors, Exports of oil products, Impored oil products, Gas exports and Gas Impors. There are 5 architectural models used in this study, 12-5-1, 12-7-1, 12-8-1, 12-10-1 and 12-14-1. Of the 5 models has used, the best models is 12-5-1 with an accuracy 83%, MSE 0.0281641257 with error rate 0.001-0.05. So this model is good to predict the Volume of Exports and Impors of Oil and Gas in Indonesia, because its accuracy between 80% to 90%.
Advanced detection Denial of Service attack in the Internet of Things network based on MQTT protocol using fuzzy logic Budiana, Mochamad Soebagja; Negara, Ridha Muldina; Irawan, Arif Indra; Larasati, Harashta Tatimma
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 7, No 2 (2021): July
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v7i2.2340

Abstract

Message Queuing Telemetry Transport (MQTT) is one of the popular protocols used on the Internet of Things (IoT) networks because of its lightweight nature. With the increasing number of devices connected to the internet, the number of cybercrimes on IoT networks will increase. One of the most popular attacks is the Denial of Service (DoS) attack. Standard security on MQTT uses SSL/TLS, but SSL/TLS is computationally wasteful for low-powered devices. The use of fuzzy logic algorithms with the Intrusion Detection System (IDS) scheme is suitable for detecting DoS because of its simple nature. This paper uses a fuzzy logic algorithm embedded in a node to detect DoS in the MQTT protocol with feature selection nodes. This paper's contribution is that the nodes feature selection used will monitor SUBSCRIBE and SUBACK traffic and provide this information to fuzzy input nodes to detect DoS attacks. Fuzzy performance evaluation is measured against changes in the number of nodes and attack intervals. The results obtained are that the more the number of nodes and the higher the traffic intensity, the fuzzy performance will decrease, and vice versa. However, the number of nodes and traffic intensity will affect fuzzy performance.
Permasalahan Implementasi Sistem Informasi Di Perguruan Tinggi Swasta Murtadho, Mohamad Ali; Wahid, Fathul
Register: Jurnal Ilmiah Teknologi Sistem Informasi Vol 2, No 1 (2016): January
Publisher : Information Systems - Universitas Pesantren Tinggi Darul Ulum

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26594/register.v2i1.441

Abstract

Efektivitas implementasi sistem informasi dalam proses manajemen kelembagaan sering terhambat oleh banyak faktor. Sehingga mengakibatkan transformasi business process yang diharapkan dengan sistem informasi berakselerasi dengan cepat justru mengalami kemandekan. Pada penelitian ini mengkaji permasalahan dalam impelementasi sistem informasi di perguruan tinggi swasta. Dari hasil penelitian ini menunjukkan bahwa terdapat masalah yang sifatnya teknis dan non-teknis. Masalah teknis, diantaranya adalah internet, infrastruktur jaringan, perangkat komputer dan pendukungnya, keamanan sistem, integrasi sistem, ketersediaan sistem, dan pemeliharaan Teknologi Informasi (TI). Sedangkan masalah non-teknis dalam implementasi sistem informasi di perguruan tinggi swasta, yaitu penerimaan dan partisipasi, budaya dan perilaku, sumber daya manusia, perencanaan, manajemen dan tatakelola TI, organisasi, konten sistem informasi, anggaran dan biaya, serta dukungan pimpinan dan karakter kepemimpinan. Kata kunci: sistem informasi, masalah teknis, masalah non-teknis. Abstract The effectiveness of the implementation of information systems in the process of institutional management is often hampered by many factors. Resulting in business process transformation that is expected to accelerate quickly information systems precisely to stagnate. In this research study the problems in the implementation of information systems in private colleges. From the results of this study indicate that there are problems that are both technical and non-technical. Technical problems, which are internet, network infrastructure, computers and supporters, security systems, system integration, system availability, and Information Technology (IT) maintenance. While the non-technical issues in the implementation of information systems in private colleges, namely acceptance and participation, culture and behavior, human resources, planning, management and governance of IT, organizations content of information systems, budget and cost, support leadership and character of leadership. Key word: information systems, technical issues, non-technical issues.

Page 10 of 22 | Total Record : 219