JOIN (Jurnal Online Informatika)
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Articles
20 Documents
Search results for
, issue
"Vol 4 No 1 (2019)"
:
20 Documents
clear
Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm
Deny Prasetyo;
Eko Didik Widianto;
Ike Pratiwi Indasari
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.264
SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.
The Advantages from Cloud Computing Application Towards SMME (UMKM)
Tazkia Shabrina Az-zahra
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.307
Small Micro Medium Enterprises (SMME) is one of the business enterprises that has a prime role in the development of economic growth in Indonesia. The SMME also not only reduces the number of jobless but also improve the community’s standard of living. Nonetheless, in this globalization era where the technology reaches its peak in every field, some SMME entrepreneurs have not taken advantage of IT-based business yet. On the other hand, the utilization of IT in the business field has many profitable benefits. This could make the SMME faced trouble and hard to survive in the tight competition with other bigger enterprises that had applied IT in the future. The main reason that SMME entrepreneur has not applied the IT system is that they lack fund. Moreover, cloud computing is a technology that can be used for every SMME entrepreneur without any costs. The advantages of this system utilization are to improve competitiveness, increase its flexibility, reduce costs, and to improve both agility and scalability. This research is based on a literature study that describes research’s aim that is to seek advantages from cloud computing implementation towards SMME in Indonesia so they can compete with international enterprises with a bigger scale. The researcher expects that SMME entrepreneurs in Indonesia can utilize Information technology particularly cloud computing, to support their business.
Finding Nearest Mosque Using Haversine Formula on Android Platform
Indah Setyorini;
Desi Ramayanti
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.267
Prayer is the second pillar of Islam and it is emphasized after the two sentences of syahadat. It has been said that it’s as perfect and as good as worship. Prayer is one of the obligations for Muslims and must be done both for Mukimin and Musafir. The virtue of prayer in the mosque is the same as the value of 20 degrees of reward compared to prayer elsewhere. With the traffic jam phenomenon that is increasing due to heavy traffic. For someone who is traveling home in the afternoon before maghrib, some people are always confused to do Maghrib prayer because of the lack of information about the nearest mosque. The problem can be solved by finding the shortest path is a problem to find the minimum route from the starting point to the destination point with the shortest route. This research was made to design an application that provides direction to the nearest mosque in the area of Larangan, Tangerang city. In the making of this system to find the shortest path can be solved using the haversine formula and using the java programming language, where java is used to build applications while the database used is the MySQL database and the use of Google Maps API in determining the route.
Implementation SHA512 Hash Function And Boyer-Moore String Matching Algorithm For Jpeg/exif Message Digest Compilation
Rachmad Fitriyanto;
Anton Yudhana;
Sunardi Sunardi
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.304
Security information method for JPEG/exif documents generally aims to prevent security attacks by protecting documents with password and watermark. Both methods cannot be used to determine the condition of data integrity at the detection stage of the information security cycle. Message Digest is the essence of a file that has a function as a digital fingerprint to represent data integrity. This study aims to compile digital fingerprints to detect changes that occurred in JPEG / exif documents in information security. The research phase consists of five stages. The first stage, identification of the JPEG / exif document structure conducted using the Boyer-Moore string matching algorithm to find JPEG/exif segments location. The Second stage is segment content acquisition, conducted based on segment location and length obtained. The Third step, computing message digest for each segment using SHA512 hash function. Fourth stage, JPEG / exif document modification experiments to identified affected segments. The fifth stage is selecting and combining the hash value of the segment into the message digest. The obtained result shows the message digest for JPEG/exif documents composed of three hash values. The SOI segment hash value used to detect modifications for JPEG to png conversion and image editing. The APP1 hash value used to detect metadata editing. The SOF0 hash values use to detect modification for image recoloring, cropping and resizing — the combination from three hash values as JPEG/exif’s message digest.
Development of National Digital Evidence Metadata
Bambang Sugiantoro
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.292
The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
An Analysis of Spam Email Detection Performance Assessment Using Machine Learning
Budi Santoso
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.298
Spam email is very annoying for email account users to get relevant information. Detection of email spam has actually been applied to email services for the public with various methods. But for the use of a limited number of company's e-mail accounts, not all e-mail servers provide spam e-mail detection features. The server administrator must add a separate or modular spam detection feature so that e-mail accounts can be protected from spam e-mail. This study aims to get the best method in the process of detecting spam emails. Some machine learning methods such as Logistic Regression, Decision Tree, and Random Forest are applied and compared results to get the most efficient method of detecting spam e-mail. Efficiency measurements are obtained from the speed of training and testing processes, as well as the accuracy in detecting spam emails. The results obtained in this study indicate that the Random Forest method has the best performance with a test data speed of 0.19 seconds and an accuracy of 98%. This result can be used as a reference for the development of spam detection using other methods.
Utilization of E-KTP as Home Safety Using Arduino Nano Based on Android
Riyanto Mustolih;
U Tresna Lenggana;
Jajang Mulyana
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.238
Security is an absolute necessity for every homeowner so that he can create a sense of security and calm when the house is left to travel by the owner of the house. Poor security makes the house a target for theft. Home security currently used still uses conventional methods. E-KTP (Electronic Identity Card) provided by the government to every citizen has a technology in which there is an RFID chip that can be used as a substitute for conventional door locks. In order for the e-KTP to be able to access the home door, an application needs to be made that can be used on android smartphone. The application makes it easy for homeowners in the E-KTP registration process that can be used to open the door. In addition, the application can send notifications to homeowners if the house is entered by thieves via SMS (Short Message Service) and Call / Call through the SIM800L module which is controlled using an Arduino Nano Microcontroller.
Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies
Ade Solihin;
Eka Wahyu Hidayat;
Aldy Putra Aldya
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.293
This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagles
Assessment of Readiness and Usability of Information Systems Use
Dwi Yuniarto;
A’ang Subiyakto;
Aedah Binti Abd. Rohman;
Reny Rian Marliana
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.256
The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.
Implementation of Finding Shortest Route for Pharmacy Location Using A-star Algorithm
Fransiskus Panca Juniawan;
Dwi Yuny Sylfania;
Dini Agrina
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15575/join.v4i1.296
The number of pharmacies in the Pangkalpinang City has increased rapidly. This is directly proportional to the needs of the people of Pangkalpinang City to fulfill the health needs, buy medicine or divert doctor's prescriptions. This is a debate for people who do not know the location of pharmacies in this city. Practically, people can just go to a pharmacy with a location that far from user location, even though there is a pharmacy near the user. This is because there is no pharmacy information location in the Pangkalpinang City. To solve this problem, proposed a system that can display the location of all pharmacies in the Pangkalpinang City. In addition, the system can search the shortest path from the user's location to the nearest pharmacy location around using the A * algorithm. This algorithm was chosen because its advantages that are able to produce optimal solutions according to the expected heuristic functions. The results of the testing are that the system can optimize and be able to search the shortest path from the user's location to the nearest pharmacy.