cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Vol 7, No 2 (2018): IJID December" : 9 Documents clear
Analysis of Personality Characteristic Using the Naïve Bayess Classifier Algorithm (Case Study Official Twitter of Basuki Tjahaja Purnama's and Anies Baswedan) Harsehanto, Ireicca Agustiorini; Wahyudi, M. Didik R.
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07203

Abstract

Abstract - This research uses data from social media Twitter based on the results of tweets from user_timeline @basuki_btp and @aniesbaswedan. This study uses 2100 tweet data. Data that has been collected is then pre-processed first and labeled manually. The next process is classification using the Naïve Bayess Classifier Algorithm using the Big Five Personality Theory. Based on the test results using 500 tweet data as training data and 1600 tweet data as testing data. The classification results obtained by using the Naïve Bayes Classifier Method and grouped in the "Big Five" personality groups: Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism on tweet data in Indonesian.
VLAN-based LAN Network Management Comparison using Cisco and Brocade Gatra, Ramadhan; Akbar, Reonaldo; Sugiantoro, Bambang; Asyhab, Naufal
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07208

Abstract

Abstract— The need for security and convenience in carrying out data requires all users to be able to create a safer network, both in terms of data communication and in terms of sharing internet connection lines. The effectiveness of performance in work is always required to be able to work quickly and on time without the constraints of one of the high data traffic that causes problems in network devices in one building. Which ultimately causes all work to be hampered in its completion. With the management of VLANs in a LAN connection, it will be able to parse problems especially in terms of data communication and logical data transmission. (Abstract)Keywords: LAN, VLAN, Network  
Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases Hikmatyar, Firmansyah Gustav; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07204

Abstract

As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.
Analysis of QOS VLAN Based on Djikstra’s Algorithm on Open Shortest Path First(OSPF) Alfani, Muhammad Nur; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07205

Abstract

As an institution engaged in SMK Muhammadiyah 03 Yogyakarta  requires network infrastructure as a medium of communication. Infrastructure in SMK Muhammadiyah based VLAN but still using static routing and star topologies as a medium of communication between router. This leads to the main router performance overburdened  which makes the network infrastructure down. It is necessary to reform the network, especially in the communication protocol on the router by using protocol Open Shortest Path First(OSPF). OSPF is a link state-based routing protocol that uses Dijkstra’s algorithm to find the best path is taken as a communication medium. Makin paths made by considering various aspects of the parameters that affect network traffic. OSPF can minimize down on network infrastructure caused by the buren of a huge traffic to maintain the stability of traffic on communication lines. The results using the method QOS on infrastructure with the OSPF protocol can be classified very nice. It is obtaine from the measurement parameter delay <150 ms, packet loss (0%), an bandwidth has a very goo category based on the standard TIPHON. From the results of the QOS parameters also obtained a decrease in delay value by 31% on infrastructure with the OSPF protocol. This proves that the network traffic is more stable when using OSPF protocol.
Design and Development of Web Based Employee Payroll Information System Using Codeigniter Framework and Extreme Programming Method Mahardika, Devara Eko Katon; Siregar, Maria Ulfah
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07201

Abstract

Abstract—Universitas Proklamasi 45 Yogyakarta is a private university which is supervised by a Foundation that has implemented various information systems in various fields of work. However, in the payroll process the employees are still done manually and have not utilized a computerized system, such as attendance recap, wage recapitulation in addition to basic salary, as well as the sum of salary received by employees. This makes the payroll process less effective and efficient. This study aims to establish a proposed system that is a web-based employee payroll information system at the Universitas Proklamasi 45 Yogyakarta with the PHP programming language using Codeigniter Framework and MySQL as its database. The system development method used is the Extreme Programming method. This method was chosen because it promotes intense communication between the client and the system developer so that when there are changes or errors in the system, the developer is always ready to fix it. Extreme Programming also has a simple stage, namely planning, design, coding, and testing. The results of this study are the result of a web-based employee payroll information system that has various actors involved in the management and processing of its data. With this information system, the employee payroll process becomes more effective and efficient, because payroll data is processed and calculated by the system so that it has a high level of data accuracy and does not require a long time in the calculation process.
Analysis Of Quality Of Service (Qos) Youtube Streaming Video Service In Wireless Network In The Environment Faculty Of Science And Technology Uin Sunan Kalijaga Wishnu, Asep; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07206

Abstract

The growing number of internet users in Indonesia, making the number of users increasing especially video streaming on Youtube service. This increase is based on rapid technological developments, especially PCs, Laptops and Smartphones that use wireless or wireless internet access. The use of streaming video over wireless networks is different from cable networks Because The characteristics of wireless networks are limited Compared to wired networks, and the characteristics of streaming video transmissions that require different handling than traditional text, and the data transmissions. As a first step towards Achieving an optimum Internet network service effort, Applies Action Research This research method by utilizing video quality with 360p, 480p, and 720p. The QOS parameters Analyzed Consist of delay, jitter, throughput, packet loss and bandwidth using wireshark and NetTools for the testing phase. The results of analysis using QoS for streaming video shows the performance of wireless network services at UIN Sunan Kalijaga, Faculty of Science and Technology is still not maximal especially on video with 480p quality, that has a 20 ms delay and jitter quality level ms According -0.0269 to TIPHON is very good. The amount of throughput is 0:55 MBps throughput and the percentage is 3% and the packet loss value is 28%, if it is Categorized by TIPHON standardization bad this value falls into the category. For the average bandwidth used is 329 714 bps value.
Comparison of Dijkstra dan Floyd-Warshall Algorithm to Determine the Best Route of Train Dermawan, Tri Setya
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07202

Abstract

Abstract - The best route is the path found based on the minimum price of a train journey using the Dijkstra and Floyd-Warshall algorithms. This study aims to find out the comparison of Dijkstra and Floyd-Warshall algorithms in finding the best path on a train trip. The results of route discovery will be displayed in a web-based application using the PHP programming language and MySQL database. The results of these two algorithms are compared using 4 parameters: time complexity, memory complexity, level of completion and level of optimization.Based on the comparison results from the implementation that Dijkstra's algorithm has a time complexity of 81 faster than the Floyd-Warshall algorithm. For the memory complexity, Dijkstra's algorithm uses a memory of 512616 bytes less than the Floyd-Warshall algorithm for the executive category. Whereas for the economic category the Dijkstra algorithm uses a memory of 482488 bytes less than the Floyd-Warshall algorithm. For the level of completion of the two algorithms, there is no error. In addition, for the level of optimization the Dijkstra algorithm has advantages in this study, namely the data used is dynamic or variable data in each stage of the process.
Programmer Performance Influence Factors with Sequential Explanatory Model Case Study in Data Warehouse and IT Center of UIN Sunan Kalijaga Yogyakarta Anggraeny Iskandar, Siska Restu; Sumarsono, Sumarsono; Fitriyani, Norma Latief; Suryana, Sendy Aditya
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (724.663 KB) | DOI: 10.14421/ijid.2018.07207

Abstract

Abstract—   Implementation   is   one   of   phases   in   Software Development   Life  Cycle  (SDLC).  Programmer  as  software development lead actor decided whether software is completed on time or postpone according to  development schedule. Data Warehouse  and  IT  Center  (PTIPD)  as  a  software  developer official   vendor   in   UIN   Sunan   Kalijaga,  they  developed  a growing   number   of   software   to   facilitate   administrative processes  in   college academic community. This is an analysis to determine the factors that most influence the developers. The  object  of  this  research  are  9  (nine)  people.  They  are  all software  programmer  in  PTIPD.  The  research  using  Mixed Methods  Research  that  combines  two  methods  of  research, qualitative   and   quantitative.   Two   factors   from   previous research are factors materialistic and non-materialistic factors. Materialistic   factors   are   Reward  and  Punishment;  Career Development    and   Contra-Accomplishment,   Incentive   and Bonus. Non-Materialistic factors are: Usefulness; Relationships and   Spirituality.   Preliminary   data   taken   from   interviews, observation   and   documentation   study   to   discover   object opinions  and  views.  Validity  Test  and  Reliability  Test  using SPSS software for qualitative data is provided. The most influence factor for programmer performance SDLC of  PTIPD  UIN  Sunan  Kalijaga  is Usefulness with the highest value at 3 (three) informant: Oscar, Bravo, Mike and Relations with  the  highest  value  at  3  (three)  informant:  Delta,  Sierra, Zulu . Keywords: Career development, programmer performance, relationship,    sequential    explanatory,    mixed    method research.
COVER AND TABLE OF CONTENT ijid, Ijid
IJID (International Journal on Informatics for Development) Vol 7, No 2 (2018): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.691 KB)

Abstract

Page 1 of 1 | Total Record : 9