cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
jurnal@if.uinsgd.ac.id
Editorial Address
Gedung Fakultas Sains dan Teknologi Lt. 4 Jurusan Teknik Informatika Jl. A.H. Nasution No. 105 Cibiru Bandung 40614 Telp. (022) 7800525 / Fax (022) 7803936 Email : jurnal@if.uinsgd.ac.id
Location
Kota bandung,
Jawa barat
INDONESIA
JOIN (Jurnal Online Informatika)
ISSN : 25281682     EISSN : 25279165     DOI : 10.15575/join
Core Subject : Science,
JOIN (Jurnal Online Informatika) is a scientific journal published by the Department of Informatics UIN Sunan Gunung Djati Bandung. This journal contains scientific papers from Academics, Researchers, and Practitioners about research on informatics. JOIN (Jurnal Online Informatika) is published twice a year in June and December. The paper is an original script and has a research base on Informatics.
Arjuna Subject : -
Articles 490 Documents
Assessment of Readiness and Usability of Information Systems Use Yuniarto, Dwi; Subiyakto, Aang; Abd. Rohman, Aedah Binti; Marliana, Reny Rian
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.256

Abstract

The assessment of the use of information systems has been carried out by many researchers. This research was conducted in Private Universities in Indonesia, which currently involve many information systems in many ways, especially those related to the management of Higher Education, by measuring the readiness and usability of the use of information systems with models that I build from the integration of two models. The results of the measurement of this study were obtained from the distribution of questionnaires, there were 47% of respondents who filled 61-80% of the level of IS usage and 68% of respondents stated their readiness in the level of readiness to use IS. The stage consists of evaluating reflective measurement models and structural model assessments. Evaluating reflective measurement in evaluating internal consistency reliability using Composite Reliability, Reliability Indicator, Convergent Validity, and Discriminant Validity, finally concluded that the use of the Readiness and Usability integration model can be forwarded to a more complex research stage and can use the questionnaire.
E-Learning Model to Support Industrial Based Adaptive Learning for Student Vocational High School Andrian, Rian; Fauzi, Ahmad
JOIN (Jurnal Online Informatika) Vol 3 No 2 (2018)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v3i2.258

Abstract

Vocational High Schools have an important role in improving the quality of human resources to meet industrial needs. However, the current education system in Vocational Schools especially in Purwakarta, Subang, Karawang, Bekasi (PURWASUKASI) still has disadvantages compared to other countries. The government through the ministry of industry has started vocational education for Vocational Schools in Indonesia. Vocational education conducted to support the creation of qualified human resources that can meet the industrial needs related to labor. The implementation of information technology in the field of education is one of the ways to improve the quality of education, including education in vocational schools. E-learning implementation aims to improve the quality of education. E-learning is often used in the application of adaptive learning in the field of education. In this study, an e-learning system model has been created that has been developed to support industrial based adaptive learning for Vocational High Schools in PURWASUKASI. The system that has been developed has been tested from the functional side of the system and shows that the developed e-learning system is ready to use.
Short Message Service Encoding Using the Rivest-Shamir-Adleman Algorithm Prasetyo, Deny; Widianto, Eko Didik; Indasari, Ike Pratiwi
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.264

Abstract

SMS (Short Message Service) is one of the data exchange features in cellphones, including Android smartphones, which are the most widely used smartphone platforms today. However, the security of the SMS is questionable because the message sent must pass through a third party frist, namely SMSC (Short Message Service Center), so that message can be tapped or misused. One of the ways to reduce this risk is to encrypt or keep the original message secret by applying the cryptography algorithm. This research is to develop a system that serves to encrypt and decrypt SMS for Android-based smartphone users. The application is created to encrypt dan decrypt SMS using the Java programming language on Android, that is applied to smartphone integrated with Android Studio and used RSA cryptography algorithm. The application can be used to encrypt and decrypt SMS using the RSA algorithm on the Android-based smartphone. This application can send an SMS with a size of 86 characters and using QR Code to exchange the public key.
The process capability model for governance of the Election Organizer Ethics Court system Putra, Syopiansyah Jaya
JOIN (Jurnal Online Informatika) Vol 3 No 2 (2018)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v3i2.266

Abstract

The capability level assesment for governance of the Election Organizer Ethics Court Information System [SIPEPP] is necessary to ensure strategic planning allignment, value delivery, risk management, resources management and performance measurement. SIPEPP implementation has special problems in optimizing human resources and weak supervision management, so it is important to asess capability levels to provide solutions to these problems. The purpose of this paper is to assess the current and expected capability level conditions, gap analysis and recommendations for SIPEPP good governance. This research method uses the Process Assessment Model (PAM) from Control Objectives for Information and Related Technology (COBIT 5) which consists of stages of initiation, planning the assessment, briefing, data collection, data validation, process attribute level, and result and recommendation. The results of this study indicate the level of optimization of resources and performance monitoring processes are level 2 (Managed Process) which means that the process has been recorded, measured and in accordance with the objectives. The process of managing human resources, assets and operations are at level 1 (Performed Process), meaning that both processes have been applied to SIPEPP governance. Recommendations related human resources are the selection of appropriate human resources by involving management, while related assets require a priority list of implementation systems, and related supervision requires detailed monitoring schedules. This study result can be taken into consideration for improving good governance of SIPEPP implementation.
Finding Nearest Mosque Using Haversine Formula on Android Platform Setyorini, Indah; Ramayanti, Desi
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.267

Abstract

Prayer is the second pillar of Islam, emphasized after the two sentences of syahadat. It's regarded as perfect worship. Obligatory for both Mukimin and Musafir, its virtue in the mosque equals 20 degrees of reward compared to elsewhere. However, amidst increasing traffic jams, travelers often face difficulty finding the nearest mosque for Maghrib prayer. This problem can be addressed by finding the shortest path from the starting point to the destination. To tackle this issue, a research was conducted to design an application providing directions to the nearest mosque in the Larangan area of Tangerang city. The system utilizes the haversine formula and Java programming language for implementation. Java builds the application, MySQL database stores data, and Google Maps API determines the route.
Front Cover JOIN Vol. 3 No. 2 JOIN, Admin
JOIN (Jurnal Online Informatika) Vol 3 No 2 (2018)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v3i2.290

Abstract

Back Cover JOIN Vol. 3 No. 2 JOIN, Admin
JOIN (Jurnal Online Informatika) Vol 3 No 2 (2018)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v3i2.291

Abstract

Development of National Digital Evidence Metadata Sugiantoro, Bambang
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.292

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality
Application of the Finite State Machine Algorithm on 2D Platformer Rabbit Games vs Zombies Solihin, Ade; Hidayat, Eka Wahyu; Aldya, Aldy Putra
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.293

Abstract

This research develops Android games by applying the FSM Algorithm (Finite State Machine) for the movement of NPC (Non-Player Character) to produce dynamic movements. The popular and legendary game with the appearance of side scroller is Super Mario Bross and Shovel Knight, the game is the most preferred game of its time to the present, but the game does not apply AI (Artificial Intelligence) so the game seems less challenging. The game is a concept game that is currently rarely used. Based on this, a side scroller-based survival game was created by implementing AI on NPCs on the Android platform. The AI used is the FSM Algorithm which functions to regulate enemy movements. The method used in developing multimedia products of this game uses MDLC (Multimedia Development Life Cycle). Based on the tests that have been carried out, the alpha test results are functionally appropriate and the results of beta testing using UserAcceptence Test (UAT) obtained a value of 86.40% which is declared feasible to use and can be developed. The advantages of this game are the presence of shock elements in the form of landslides, bursts of water, rock rain, and attacks by eagles
Implementation of Finding Shortest Route for Pharmacy Location Using A-star Algorithm Juniawan, Fransiskus Panca; Sylfania, Dwi Yuny; Agrina, Dini
JOIN (Jurnal Online Informatika) Vol 4 No 1 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i1.296

Abstract

The number of pharmacies in the Pangkalpinang City has increased rapidly. This is directly proportional to the needs of the people of Pangkalpinang City to fulfill the health needs, buy medicine or divert doctor's prescriptions. This is a debate for people who do not know the location of pharmacies in this city. Practically, people can just go to a pharmacy with a location that far from user location, even though there is a pharmacy near the user. This is because there is no pharmacy information location in the Pangkalpinang City. To solve this problem, proposed a system that can display the location of all pharmacies in the Pangkalpinang City. In addition, the system can search the shortest path from the user's location to the nearest pharmacy location around using the A * algorithm. This algorithm was chosen because its advantages that are able to produce optimal solutions according to the expected heuristic functions. The results of the testing are that the system can optimize and be able to search the shortest path from the user's location to the nearest pharmacy.