cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota palembang,
Sumatera selatan
INDONESIA
JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI
ISSN : 24074322     EISSN : 25032933     DOI : -
Core Subject : Science,
JATISI bekerja sama dengan IndoCEISS dalam pengelolaannya. IndoCEISS merupakan wadah bagi para ilmuwan, praktisi, pendidik, dan penggemar dalam bidang komputer, elektronika, dan instrumentasi yang menaruh minat untuk memajukan bidang tersebut di Indonesia. JATISI diterbitkan 2 kali dalam setahun (September dan Maret), makalah yang diterbitkan JATISI minimal terdiri dari 60% dari luar Sumatera Selatan, dan 40% dari Sumatera Selatan. Makalah yang diterbitkan melalui tahap review oleh reviewer yang berpengalaman dan sudah memiliki makalah yang diterbitkan di jurnal internasional yang terindeks SCOPUS.
Arjuna Subject : -
Articles 924 Documents
Rancang Bangun Aplikasi Edugame Peta Buta untuk Anak-Anak Berbasis Android Muhammad Rinaldo Fernandes; Iskhaq Fitriansyah; Rachmansyah Rachmansyah
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 2 No 2 (2016): JATISI MARET 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (687.535 KB) | DOI: 10.35957/jatisi.v2i2.56

Abstract

Related with information and communication technology development nowadays causes habitual and activity changing happen in daily life of people. One of that technology is mobile information and communication technology (hand phone) with purpose to understand that information to be learned. The problem that happening nowadays is children’s desire to learn about the study especially social lesson that has relationship with Indonesian map because of many aspects of knowledge in Indonesia itself so that knowledge is often obeyed and did not known yet. According to that aspect nowadays game is popular serving objectively. Such as edugame which is the game that create as learning facility through the game. So that’s why we need learning application to children that can entertain and pleasure them with include the lesson to the game so it can increase and improve the knowledge that related to Indonesian geography characters, to develop this application uses prototyping method which is the part of product that express logical even physical external that is shown.
Penerapan Algoritma Negamax dan Alpha Beta Pruning pada Permainan Othello William William; Regiza Giovanno; Daniel Udjulawa
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 2 No 2 (2016): JATISI MARET 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (585.524 KB) | DOI: 10.35957/jatisi.v2i2.57

Abstract

The game becoming a means of entertainment for leisure time for many people. One of them is the game Othello is a classic board game. The purpose of this study was to apply the algorithm Negamax and Alpha Beta Pruning Algorithms in Othello game as opposed to a player, as well as the extent of the time required by the opponent using that algorithm. With both of these algorithms cleverness in taking strategy by the computer in the game can be calculated with the grace period currently provides solutions against the player. This game was made using Phonegap framework. Artificial intelligence will be visible when the algorithm used for the process. Identification workflow of Algorithms Negamax and Alpha Beta Pruning provides overview of the time required by the computer to interact with the players. System development using prototyping methods. Results of testing the application of the algorithm Negamax and Algorithms Alpha Beta Pruning in the game "Othello" is proven to help speed up the algorithm Negamax.
Rancang Bangun Sistem Informasi Kepegawaian pada PT. XYZ Muhammad Maisep; Yogie Prakoso; Ery Hartati
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 2 No 2 (2016): JATISI MARET 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (476.514 KB) | DOI: 10.35957/jatisi.v2i2.58

Abstract

This study aims to help PT. XYZ in data processing on data information systems Officer, PT. XYZ is a company engaged in building construction activity. PT. XYZ has a constraint in data processing Personnel acceptance of new, less integrated data storage, calculation of salaries and attendance is less effective, difficulty in performing retrieval leave Personnel as well as in the processing of the warning letter Staff Admin work is still struggling to monitor the warning letters. Thus some of the problems in Pt XYZ information systems need to be built with Iteration methodology. Personnel information system that can cover the deficiencies that exist and present employee data is sistemati in mengolahsistem Personnel data information so that information is obtained quickly and accurately.
Pengenalan Wajah Menggunakan Two Dimensional Linear Discriminant Analysis Berbasis Optimasi Feature Fusion Strategy Sahmanbanta Sinulingga; Chastine Fatichah; Anny Yuniarti
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (619.761 KB) | DOI: 10.35957/jatisi.v3i1.59

Abstract

The era of technology today,, research on biometric image is not common to do. One well researched biometric image is a face recognition (face recognition). Problems on the human face recognition is a diversity of features or shape between one another face to face. Therefore, the need for facial feature extraction and classification using a particular method so that the classification can be recognized correctly.In this study proposed feature extraction method that can overcome the problems of non-linear automatic data contained in the face image, called the Two Dimensional Linear Discriminant Analysis based on Feature Fusion Strategy (TDLDA-FFS). Not stopping on feature extraction, classification methods proposed also faces that can overcome the problems of the adaptive matrix which aims to study the benefit of weight on each - each input with the method Relevanced Generalized Learning Vector quantization (GRLVQ).This research integrates methods TDLDA-FFS and GRLVQ for face recognition. With the combination of both methods are proven to provide optimal results with a level of recognition accuracy ranged between 77.78% to 82.22% with a pilot using a databaseof facial images from the Institute of Business and Information Stikom Surabaya. While the test uses a database derived from YaleB Database achieve accuracy levels ranging from 88.89% to 94.44%.
The Modeling of Information Security Classification With Risk Value Assesment Factor to Good Information Governance on The Indonesia Higher Education Sector IGN Mantra
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (382.932 KB) | DOI: 10.35957/jatisi.v3i1.60

Abstract

Informasi digital saat ini mendominasi pertukaran atau peredaran informasi di institusi manapun, baik di sector Pemerintahan, Swasta, Pendidikan/Perguruan Tinggi, Sosial, Pertahanan dan Keamanan, Ekonomi, Politik dll. Hampir pasti informasi merupakan ujung tombak pergerakan ekonomi, "yang memegang informasi maka ia akan memenangkan perang ". Di era internet saat ini, yang sangat dicari oleh hacker atau cracker dan penyusup adalah informasi, jantung informasi dalam database, komputer dan laptop tidak bernilai lebih di mata hacker atau cracker, hacker baik individu atau tim akan mencoba untuk menerobos informasi pertahanan dan keamanan pada server, mereka berlomba-lomba untuk dapat memperoleh informasi penting, dan bahkan rahasia paling sensitif sekalipun. Penelitian ini bertujuan untuk klasifikasi keamanan informasi dengan dibuat model rating pada tingkat sensitivitas informasi, dengan klasifikasi keamanan informasi akan dapat mengontrol perlindungan keamanan data dan informasi, klasifikasi dihitung dengan dengan faktro penilaian risiko sehingga informasi dapat disimpan jauh dari tangan pemulung informasi terutama di sektor pendidikan tinggi Indonesia.
Process Capability Model Based on COBIT 5 Assessments (Case Study) Johanes Fernandes Andry
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.1 KB) | DOI: 10.35957/jatisi.v3i1.61

Abstract

XYZ Company is Information and Communication Technology solutions provider in Jakarta. Started in 2003 as reseller product IT and development software customized, networking and other outsourcing project base. It has become imperative to strengthen IT governance and audit processes, to ensure the integrity of information systems. COBIT helps business and their IT achieves these, and builds a powerful, integrated framework for IT governance, control and audit processes. COBIT 5 is not only a cost-efficient approach, but also a conceptually easy framework for auditors to understand and communicate to the management. COBIT 5 moves away from the "maturity models" in COBIT 4.1, to Process Capability Model, they seek continuous improvement of business process. Assessing the value of the information and identifying the assets which support the business process. Assessment focused to domain Build Acquire and Implement (BAI). From the perspective of assessment activity, control classification by action is the most usefull conceptualization and within that context: preventive, detective, and corrective controls the most useful for analysis. Assessments of Process Capability Model based on COBIT 5 in domain BAI, average was at 2.4 (managed) until 3.0 (established).
Kriptografi Menggunakan Hybrid Cryptosystem dan Digital Signature Halim Agung
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (641.786 KB) | DOI: 10.35957/jatisi.v3i1.62

Abstract

Security of information at this point becomes easier to be abused by another party when that information is sent and stored. To overcome these problems then do research to create an application that uses a hybrid method cryptosystem and digital signature. Methods in hybrid cryptosystem is done by combining the RC4 and RSA. Digital signature method is done by using a hash function SHA-512 with RSA algorithm approach. Applications that are built to perform encryption and decryption on files as well as improving security in sending data by hybrid cryptosystem and digital signature. Based on the research results of all the file types tested successfully encrypted and decrypted as well as the larger the file size, the longer the encryption and decryption process.
Analisis Penerimaan Layanan Web Tracking dengan Penerapan Technology Acceptance Model (TAM) Dien Novita; Della Oktaviany
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (544.802 KB) | DOI: 10.35957/jatisi.v3i1.64

Abstract

Developments of technology allow businesses in Indonesia to develop its business activities to maintain good relations with customers. Most of the business activities already involve technology, both in terms of the use of hardware and software. In providing freight services, PT XYZ provides additional services to its customers, by giving Web Tracking feature. This feature is the media to check the position of shipments that have been submitted through PT XYZ. Then it needs to be analyzed receipt Tracking Web services. With descriptive analysis method with a sample of 235 respondents, analysis of acceptance of Web services Tracking for delivery of goods in PT XYZ quite well, seen from a variable in the Technology Acceptance Model (TAM) gained an average user agrees with Web services Tracking with percentages ranging between 65,87% to 98.81%. The high attitude to use technology from the users of 98.81% the results of this study, PT XYZ should improve usability and ease of use of Web Tracking service.
Pengaruh Pemanfaatan Kelas Elektronik Terhadap Efektifitas dan Efisiensi Proses Belajar STMIK XYZ Dicky Pratama; Hendri Sopryadi
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (471.709 KB) | DOI: 10.35957/jatisi.v3i1.66

Abstract

Electronic classrooms at STMIK XYZ for this is believed to contribute to the learning process. Lecturers, students and all staff use the classroom to communicate remotely, disseminate knowledge, information capture and so forth. It is not yet known whether the use of electronic classrooms that can impact the efficiency and effectiveness of the learning process. This study aims to measure whether the use of electronic classrooms significantly influence the effectiveness and efficiency of the learning process. The method used is regression analysis to test the normality, linearity and homogeneity. The test results show that a variety of electronic classrooms affect the effectiveness and efficiency of the learning process
Analisis dan Perancangan Sistem Pendukung Keputusan Pemberian Bonus Tahunan Karyawan dengan Metode SAW pada PT. XYZ Triyana Widya Ningrum; Sherly Valentina; Dafid Dafid
JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 3 No 1 (2016): JATISI SEPTEMBER 2016
Publisher : Lembaga Penelitian dan Pengabdian pada Masyarakat (LPPM) STMIK Global Informatika MDP

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1129.898 KB) | DOI: 10.35957/jatisi.v3i1.68

Abstract

Employees are one of important things in PT. XYZ. Therefore, the company continually give a reward to employee in the form of bonus based on employee performance in order to motivate employee to work harder. PT. XYZ have difficulty to decide who employee that meet the criteria to receive bonus. This research intend to make company easier to select qualified employee to receive annual bonus. Method of collecting data using study of literature, interview and obervation. Methodology of system development is iterative. Method of decision support system using Simple Additive Weighting to select employee that meet the criteria to receive bonus. The system will be develop into employee data, criteria data, calculation of criteria, assesment of employee performance and reporting of selected employee. The result of this research is a design of desicion support system that easir company to decide the bonus receiver’s qualified employee

Page 4 of 93 | Total Record : 924


Filter by Year

2014 2023


Filter By Issues
All Issue Vol 10 No 4 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 3 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 2 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 10 No 1 (2023): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 4 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 3 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 2 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 9 No 1 (2022): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 4 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 3 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 2 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 8 No 1 (2021): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 7 No 3 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 7 No 2 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 7 No 1 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 6 No 2 (2020): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 6 No 1 (2019): JATISI (Jurnal Teknik Informatika dan Sistem Informasi) Vol 5 No 2 (2019): JATISI Vol 4 No 2 (2018): JATISI MARET 2018 Vol 5 No 1 (2018) Vol 4 No 1 (2017): JATISI SEPTEMBER 2017 Vol 3 No 2 (2017): JATISI MARET 2017 Vol 3 No 1 (2016): JATISI SEPTEMBER 2016 Vol 2 No 2 (2016): JATISI MARET 2016 Vol 2 No 1 (2015): JATISI SEPTEMBER 2015 Vol 1 No 2 (2015): JATISI MARET 2015 Vol 1 No 1 (2014): JATISI SEPTEMBER 2014 More Issue