cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 188 Documents
Distributed Database Using Mobile Agent Sugiantoro, Bambang; Wardoyo, Retantyo; Hartati, Sri; Istiyanto, Jazi Eko
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (202.233 KB) | DOI: 10.14421/ijid.2012.01102

Abstract

The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is object oriented design with a development framework
A Comparative Study of ICT Innovation Policy for the Countries Development Perspective Saleem, Ayesha; Higuchi, Kiyohide
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (384.267 KB) | DOI: 10.14421/ijid.2012.01101

Abstract

In the globalized environment, the economic growth significantly depends on the countries capacity to develop, to apply new technologies and vice versa. Diffusion of information communication technologies is a global phenomenon. Despite of rapid globalization there are considerable differences between nations in terms of adoption and usage of new technologies. This paper aims to draw together the highly eclectic literature on the diffusion of Information and Communication Technology (ICT) Innovation in order to know what have been done, highlight the generic issues, relevant to policy and will initiate further research and develop potential opportunities. This paper also highlight the low level and high level income countries data and ICT policies frame work to draw conclusions and some case studies as an example. The objective is to review the finding the social economic factor for diffusion of ICT Innovation to make policy recommendation for the development of the country.
The Mapping of Access Point Workloads at UIN Sunan Kalijaga Based on Log Analysis using K-Means Algorithm Kharisma, Razendra Bintang; Yazid, Ahmad Subhan
IJID (International Journal on Informatics for Development) Vol 6, No 1 (2017): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06105

Abstract

This study aims to map the use of access points based on the log of usage in several locations in the UIN Sunan Kalijaga. The analyzed data are access point records taken three times a day for one week working hours. The data obtained was processed and clustered using the K-Means algorithm. There are five clusters obtained from the processed data, each of which divides the number of access loads from an access point. The results of clustering provide a recommendation on which locations need to be added to access points that it can improve institutional userservices.
Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification Winasis, Bima Putra; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 2 (2017): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06201

Abstract

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
A Counterfeit Paper Currency Recognition System Using LVQ based on UV Light Harjunowibowo, Dewanto; Hartati, Sri; Budianto, Aris
IJID (International Journal on Informatics for Development) Vol 1, No 2 (2012): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (870.108 KB) | DOI: 10.14421/ijid.2012.01202

Abstract

This research is aimed to test a paper currency counterfeit detection system based on Linear Vector Quantization (LVQ) Neural Network. The input image of the system is the dancer object image of paper currency Rp. 50.000,- fluorescent by ultraviolet light. The image of paper currency data was taken from conventional banks. The LVQ method is used to recognize whether the paper currency being tested is counterfeit or not. The coding was carried out using visual programming language. The feature size of the dancer tested object is 114x90 px and the RGBHSI was extracted as the input for LVQ. The experimental results show that the system has an accuracy 100% of detecting 20 real test case data, and 96% of detecting 22 simulated test case data. The simulated case data was generated by varying the brightness of the image data. The real test case data contains of 10 counterfeit paper currency and 10 original paper currency. The simulated case data contains of 11 original paper currency and 11 counterfeit paper currency. The best setting for the system is Learning Rate = 0.01 and MaxEpoh = 10.
The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School Hambali, Muhammad; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07101

Abstract

In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information.  The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.
Semantic Commerce for Developing Country Wardani, Dewi Wisnu
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (397.041 KB) | DOI: 10.14421/ijid.2012.01103

Abstract

The recent real challenges of semantic technology is not in the core of the technology but much more in implementing the semantic technology in the real problem. The common domain in any world is economics. One of the most important domain in economics is marketing. Company moreover small company from developing country desperated in increasing to make their company's product are known wider, around the world as well. Product from developing countries usually has a good quality, unique and cheaper but lack to be known. This paper present idea how semantic technology will give a benefit in marketing strategies for business in developing countries. The short goal is how the common famous search engine will be more understand the company both product and profile, thus present those information in better form and possible to the next processing in the others semantic technology.
Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method Fawzan, Mahbub Puba; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 2 (2017): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06204

Abstract

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)
Development of Task Implementation Evaluation System Online Classroom Guardians with Extreme Programming Methods at The Noble Foundation Consortium Wahid, Abdul; Mulyanto, Agus
IJID (International Journal on Informatics for Development) Vol 6, No 1 (2017): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06102

Abstract

Evaluating the performance of employees in an organization is a necessity if the organization seeks improvement of their service quality. Konsorsium Yayasan Mulia working in the field of education is very concerned with evaluating their employee performance. One of the evaluations which have been routinely carried out is evaluation of homeroom teacher performance. This evaluation is done as a form of Konsorsium Yayasan Mulia attention on the student character building. The evaluation has been made manually spend a lot of time and effort, it is necessary for a system that can be the solution of the problem. The system will be built is the first system, that means it requires development method that flexible to changes.System development method used in this research is eXtreme Programming. This method is part of Agile Programming that emphasizes intense communication with customers to determine their needs. The steps of this method are planning, design, coding and testing.The homeroom task evaluation system is a bridge between the homeroom teacher, the principal and Konsorsium Yayasan Mulia. General overview of the system, the system has three user level, admin, principal and homeroom teacher. Admin can post an evaluation sheet and manage principal. Principal can manage homeroom teacher and homeroom theacher can report their task performance.The result of this research is a system that provides convenience to Konsorsium Yayasan Mulia to evaluate the task performance of homeroom teacher.
Developing Speech Recognition System for Quranic Verse Recitation Learning Software Putra, Budiman; Atmaja, B.; Prananto, D.
IJID (International Journal on Informatics for Development) Vol 1, No 2 (2012): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2725.467 KB) | DOI: 10.14421/ijid.2012.01203

Abstract

Quran as holy book for Muslim consists of many rules which are needed to be considered in reading Quran verse properly. If the recitation does not meet all of those rules, the meaning of Quran verse recited will be different with its origins. Intensive learning is needed to be able to do correct recitation. However, the limitation of teachers and time to study Quran verse recitation together in a class could be an obstacle in Quran recitation learning. In order to minimize the obstacle and to ease the learning process we implement speech recognition techniques based on Mel Frequency Cepstral Coefficient (MFCC) features and Gaussian Mixture Model (GMM) modeling, we have successfully designed and developed Quran verse recitation learning software in prototype stage. This software is interactive multimedia software which has many features for learning flexibility and effectiveness. This paper explains the developing of speech recognition system for Quran learning software which is built with the ability to perform evaluation and correction in Quran recitation. In this paper, the authors present clearly the built and tested prototype of the system based on experiment data.

Page 1 of 19 | Total Record : 188