cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pekanbaru,
Riau
INDONESIA
IT JOURNAL RESEARCH AND DEVELOPMENT
Published by Universitas Islam Riau
ISSN : 25284061     EISSN : 25284053     DOI : -
Information Technology Journal Research and Development (ITJRD) adalah Jurnal Ilmiah yang dibangun oleh Prodi Teknik Informatika, Universitas Islam Riau untuk memberikan sarana bagi para akademisi dan peneliti untuk mempublikasikan tulisan dan karya ilmiah di Bidang Teknologi Informatika. Adapun ruang lingkup dalam jurnal ini meliputi bidang penelitian di teknik informatika, ilmu komputer, jaringan komputer, sistem informasi, desain grafis, pengelolaan citra dan multimedia.
Arjuna Subject : -
Articles 11 Documents
Search results for , issue "Vol. 6 No. 2 (2022)" : 11 Documents clear
Flood Vulnerability Analysis using Weighted Overlay Ferzha Putra Utama; Yudi Setiawan; Arie Vatresia; Julia Purnama Sari
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.6193

Abstract

Several areas in Bengkulu City are affected by floods every year; one of the worst is the Sungai Serut sub-district. The existence of a river that stretches along Sungai Serut also plays a role in floods over the Bengkulu area. Furthermore, this study to see the priority area over this district is still limited. Mapping flood areas is one way to provide information, especially for decision-makers in flood control using geographic information systems. Our research aims to map flood vulnerability areas based on land height, slope, and river buffer by weighting these criteria. This thematic map is the result of overlaying several maps according to the flood vulnerability criteria. The results of this study indicate that Sungai Serut is an area with "Very Vulnerable" and "Vulnerable" levels of flood vulnerability. The story of flood vulnerability is dominated by gently sloping contours, with land elevation levels mostly below 20 m above sea level. In addition, the thing that exacerbates the potential for flood vulnerability is the existence of the river that runs along the Sungai Serut sub-district.
Cloud-Based NAS (Network Attached Storage) Analysis as an Infrastructure as A Service (IAAS) Using Open Source NAS4FREE and Owncloud Hariyo Sasongko; T Yudi Hadiwandra
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.5712

Abstract

At this time, computer systems and networks are an essential part of human life. The number can see this of computer users in the office or on campus, and at school. This need has reached a relatively large number. To access data, many computer users in the network continue to increase, impacting the selection of servers, and large data storage media is necessary. Currently, the storage media that is often used to store data still uses physical media such as hard disks, flash disks that are virus-prone and easy to lose. Another problem also arises when physical storage has a relatively high price compared to cloud storage that can be accessed anywhere when needed.
Multiple Linear Regression and Deep Learning in Body Temperature Detection and Mask Detection Faisal Najib Abdullah; Mohamad Nurkamal Fauzan; Noviana Riza
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7424

Abstract

In this new normal era, many activities began to operate again, such as offices, malls, etc. This creates a potential mass crowd. The public must follow health protocols as recommended by the government, including wearing masks and checking the temperature to anticipate the spread of the coronavirus. This study tested a tool that included image processing and artificial intelligence to help implement health protocols as recommended by the government. This tool connects Raspberry PI, Thermal Camera (amg8833), Pi Camera, an ultrasonic sensor with Multiple Linear Regression and Deep Learning algorithms. The purpose of this tool is to detect body temperature and detect the use of masks. The system will check on the pi camera frame whether the person is wearing a mask or not. The system is trained using the Deep Learning method to detect the use of masks. The system will check the temperature of the human body and the distance between humans and the tool. Temperature and distance data are entered in multiple linear regression formulas to get more accurate results. The processed results of the system will be displayed on the monitor screen if detected using a mask and the normal temperature will be green and if it is not detected it will be red and give a warning sound. The data is sent to the server and displayed via the web. We found that this tool succeeded in detecting body temperature within a distance of 1 to 3 meters with an accuracy of 99.49%, detecting people using masks with an accuracy of 94.71%, and detecting people not wearing masks with an accuracy of 97.7%.
New Student Drug Tests at College Using Principal Component Analysis Method Agnes Chrisnalia; Edwar Ali; Mardainis Mardainis; Rahmiati Rahmiati
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7583

Abstract

Drugs are substances or illegal drugs that can endanger human life. Someone who consumes it in an inappropriate way will become dependent and even result in death. The physical characteristics of people who use drugs vary, but the more obvious characteristics are on the faces of drug users such as red eyes, stiff facial muscles, dark spots, pupils susceptible to light, sunken face shape, and dullness. The lack of physical characteristics of drug users due to similarities with other diseases makes it difficult for people to recognize them initially. However, for users whose face data has been tracked by the National Narcotics Agency, the facial data is stored in the dataset. This research was conducted with the aim of building a system that can detect and recognize prospective students whether they have ever been included in drug users recorded in the National Narcotics Agency dataset or not as one of the requirements for new student admissions to universities. The system built using the Principal Component Analysis method to process and extract images of the physical characteristics of drug users through the facial image data of drug users stored in the dataset. If the detected face has similarities with the characteristics in the dataset, it is necessary to suspect that the detected face is a drug user. The results of this study are the system is able to detect the faces of drug users using the Principal Component Analysis method with an accuracy of 90% and it is hoped that with this research the system can be one solution in helping universities as an identification effort to minimize drug use so that it can be an additional identification tool which strengthens someone detected using drugs.
Analisis Pola Penjualan Barang Teknologi Informasi (TI) Menggunakan Algoritma FP-Growth Rizky Wandri; Anggi Hanafiah
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8155

Abstract

Determination of sales patterns is very important in marketing. Sales pattern serves to conduct an effective analysis in improving marketing. Sales analysis aims to explore new knowledge that can help design effective strategies by utilizing sales transaction data. This study processes sales data for 12 transaction days containing 47 items using the Fp-Growth algorithm. The results of this study are items with a minimum value of support > 0.10 and confidence 0.60 and will be compared with testing data using RapidMiner to test whether the results are valid so that the test results can help in designing sales strategies.
Fuzzy-Based Screening System for Determination of Enhanced Oil Recovery (EOR) Method in Reservoir Nesi Syafitri; Tomi Erfando; Widya Lestari; Niken Karina Rinaldi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8640

Abstract

The petroleum industry is developing technology to increase oil recovery in reservoirs. One of the technologies used is Enhanced Oil Recovery (EOR). Selecting an EOR method for a specific reservoir condition is one of the most challenging tasks for a reservoir engineer. This study tries to build a fuzzy logic-based screening system to determine the EOR method. It created the system intending to be able to assist in selecting and determining the appropriate EOR method used in the field. There are nine input criteria used to screen the EOR criteria, namely: API Gravity, Oil Saturation, Formation Type, Net Thickness, Viscosity, Permeability, Temperature, Porosity, Depth criteria. The output criteria generated from the calculation of the EOR screening criteria are 14 outputs, namely: CO2 MF Miscible Flooding, CO2 IMMF Immiscible Flooding, HC MF Miscible Flooding, HC IMMF Immiscible Flooding, N2 MF Miscible Flooding, N2 IMMF Immiscible Flooding, WAG MF Miscible Flooding , HC+WAG IMMF Immiscible Flooding, Polymer, ASP, Combustion, Steam, Hot Water, Microbial. In this system, 512 rules are generated to produce 14 different outputs of the EOR method, with Mamdani's Fuzzy Inference reasoning. This fuzzy-based screening system has an accuracy rate of 80.95%, so this system is suitable to be used to assist reservoir engineers in determining the appropriate EOR method to be used according to the conditions in the reservoir. The sensitivity level of the system only reaches 53.1%, while the specificity level reaches 94%.
Analysis Performance Intrusion Detection System in Detecting Cyber-Attack on Apache Web Server Doddy Teguh Yuwono
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7853

Abstract

Network security on the webserver is the most important part to ensure integrity and service for users. Web servers are often the target of attacks that result in data corruption. One of them is the SYN Flood attack, which is a type of Denial of Service (DOS) attack that provides massive SYN requests to the webserver. This research is to analyze attack indications and maintain system security from the threat of data flooding. One way to maintain a computer network security system is to use Snort as an IDS (Intrusion Detection System). Snort is software that functions to detect intrusions. Data packets passing through network traffic will be analyzed first. Data packets detected as intrusions will trigger an alert which is then stored in a log file. That way, network administrators can find out intrusions that occur on computer networks. The method of testing flood attack data is using the penetration testing method. The three test samples are data flooding attacks against ICMP, UDP, and TCP protocols. The results obtained when testing flooding attack data where detection sensors can detect all attacks and all attack samples, while the warnings generated by Snort are shown in a web form which can be seen in the detail of each attack that occurred.
Optimization of Genetic Algorithm in Courses Scheduling Dewi Nasien; Andi Andi
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.7896

Abstract

Scheduling courses is an intricate and pivotal part of a university as it impacts the teaching and learning process. The problem frequently occurs is the struggle of placing schedules which is manual, takes a long time, and inaccurate. This paper explores the process and how effective the genetic algorithm method is in solving scheduling problems in lecture environment. The selection of genetic algorithms owes to it produces an optimal scheduling solution. To build a scheduling optimization system, it is essential to collect room data, lecturers, courses, days and hours of teaching. The data collection comes from field studies by observations and interviews. Literature studies are also needed to acquire the basic course scheduling, optimization, genetic algorithms, PHP, MySQL, Bootstrap, and Visual Studio Code. The test outcomes attained the preeminent one with the highest fitness value in the number of generations, populations, the crossover combination and mutation rates. The final result showed that the first chromosome is the finest chromosome produces scheduling with the highest fitness value. The outcomes of the whole algorithm process are consistent with the original predicted data, and the same lecturer is not scheduled to teach more than once at the same time. It is expected that the application of the genetic algorithm method optimizes course scheduling with great outcome.
Evaluasi Kepuasan Pengguna Terhadap Kualitas Layanan Sistem Pengembangan Daerah (Simbangda) Kabupaten Banyuasin Menggunakan Metode Electronic Government Quality Ragil Tri Wahyudi; Gusmelia Testiana
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8198

Abstract

Sistem Pengembangan Daerah (Simbangda) Kabupaten Banyuasin is a public service as a forum for data and information from all Regional Government Organizations in the Banyuasin Regency environment to realize program Banyuasin Terbuka. A public service must be evaluated periodically to optimize the services provided. This study aims to evaluate user satisfaction with Simbangda's service quality using Electronic Government Quality (E-GovQual) method. The results showed that there were 5 variables in the level of satisfaction and 1 variable in the level of less satisfied. The variable ease of use averaged 2.80 in the satisfied category, trust with an average 2.75 in the satisfied category, functionality of the interaction environment with an average of 2.61 in the satisfied category, reliability with an average of 2.53 in the satisfied category, content and appearance with an average of 2.49 in the less satisfied category, and citizen support with an average of 2.99 in the satisfied category.
Pekanbaru City Snack E-Commerce Application Design Based on Android Panji Rachmat Setiawan; Ardiansyah Ardiansyah
IT Journal Research and Development Vol. 6 No. 2 (2022)
Publisher : UIR PRESS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25299/itjrd.2022.8669

Abstract

E-Commerce is a concept that quite developed in the field of information technology. E-Commerce gives more convenience and advantages when compared with conventional, including all the information needed by cunsomers can be accessed more detail, without being limited with place and time, and transactions process can be done much easier. So that the implementation of this system will make it easier and more profitable for many parties, both consumers and sellers. This development method in building E-Commerce application is based on the theory of the Waterfall Model. Waterfall is a software development methodology, which proposes an approach to systematic and sequential software which starts at the system progress level throughout the analysis, design, code, testing and maintenance. The purpose of this research is to produce Pekanbaru city snack E-Commerce application based on android. By implementing this system will make it easier and more profitable for many parties, both consumers and sellers.

Page 1 of 2 | Total Record : 11