cover
Contact Name
Hapnes Toba
Contact Email
hapnestoba@it.maranatha.edu
Phone
-
Journal Mail Official
jutisi@it.maranatha.edu
Editorial Address
Fakultas Teknologi Informasi, Universitas Kristen Maranatha Sukawarna, Sukajadi, Bandung City, West Java 40164 Telepon: (022) 2012186
Location
Kota bandung,
Jawa barat
INDONESIA
jurnal teknik informatika dan sistem informasi
ISSN : -     EISSN : 24432229     DOI : https://journal.maranatha.edu/
Core Subject : Science,
Jurnal Teknik Informatika dan Sistem Informasi (JuTISI) menerima topik-topik sebagai berikut, namun tidak terbatas pada : Artificial Intelligence • Business Intelligence • Cloud & Grid Computing • Computer Networking & Security • Datawarehouse & Datamining • Decision Support System • E-System • Enterprise System (SCM, ERP, CRM) • Human Computer & Interaction • Image Processing • Information Retrieval • Information System • Information System Audit • Enterprise Architecture • Knowledge Management • Mobile Computing & Application • Multimedia System • Open Source System & Technology • Semantic Web & Web 2.0 • Internet of Things
Articles 412 Documents
Sistem Pendeteksi Pengirim Tweet dengan Metode Klasifikasi Naive Bayes Wijanto, Maresha Caroline
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i2.584

Abstract

Until Januari 2015, social media users reached 29% of the world population. In Indonesia itself had 28% active users from total populasi of Indonesia. The usage of social media gives positives and negatives effect. The negatives effect are the increasing number of fraud by using SMS or social media, such as Twitter. Many people are deceived by the tweet messages sent from known user account when in fact the sender is other person. Because of that, there is a need to have a system to detect wheteher the tweet sender is the same person or not. Naive Bayes classifiers method is used to classify that. The data source is taken from tokens selected based on two models, the minimum n-time number of occurrences and the n-th highest number of occurrences. Each tweets also processed into six different types of tweets, such as formal tweet or lowercase tweet. The test uses tenfold cross-validation and measured by the value of accuracy, precision, recall, and F-score. The common result shows 82,145% level of accuracy. Second model to select the tokens shows consistency level of accuracy for each types of tweets. The fifth types of tweets also get the highest level of accuracy for both models to select the tokens.
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner Senjaya, Wenny Franciska; Rahardjo, Budi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i2.585

Abstract

Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing. There are three kinds of cryptograpy protocols, Symmetric Algorithms, Asymmetric (Public Key) Algorithms, and Cryptographic Protocols. Elliptic Curve Cryptography (ECC) is one of the public key encryption. ECC requires high computation for solving arithmetic operations.Finite field has important role in ECC implementation, which curve operations requires finite field. Finite field has several arithmetic operations, add, multiplication, squaring, and invers. There are many method or algorithm for each arithmetic operation. Finite field can be representation in prime field GF(p) and binary field GF(2m). There are two representation in binary field, polynomial basis and normal basis. This research presents implementation of arithmetic operation algorithms for adding, multiplication, squaring, and invers on polynomial basis with maximum key 299 bits. Besides that, this research presents the measurement of algorithm performance based on processing time and memory usage. Keywords — cryptography, elliptic curve, finite field, polynomial basis, binary field
Halaman Belakang JuTISI edisi Agustus 2015 JuTISI, Redaksi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i2.586

Abstract

Ini adalah halaman belakang dari JuTISI edisi Agustus 2015
Halaman Depan Jutisi Desember 2015 JuTISI, Redaksi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.587

Abstract

Ini adalah halaman depan JuTISI edisi Desember 2015
Rekayasa Algoritma Gravity Location Models Untuk Penentuan Lokasi Lumbung Pangan Masyarakat Kabupaten Minahasa Tenggara Ama, Aldian Umbu Tamu; Sediyono, Eko; Setiawan, Adi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.588

Abstract

Focus of central government program in order to sustain tenacity of food is to align charging of barns of food society. This paper would examine the Gravity Location Model algorithm which is part of the network development strategy of supply chain management to determine the location of a facility (such as warehouse or factory). This algorithm is used theoretically to determine location of food barn in Southeast Minahasa. Determination of location food barm for society using Gravity Location Model is based on the rate of Normative Consumption Ratio per capita in a year. Sample location of 12 districts were taken using GPS and had been adjusted with digital map from Google Map. The result of calculation has get that food barn of society is in North Tombatu district in geographically located at 124° 41' 38.00'' east longitude and 1° 2' 28.39'' north latitude. Based on division 2 regions for the placement food barn society from 12 district. Alternative location of the first area is Ratahan in geographically located at 124° 47' 46.62'' east longitude and 1° 3' 17.71'' north latitude, and for the second alternative location area is at Tombatu in geographically located at 124° 41' 3.49'' east longitude and 1° 2' 18.33'' north latitude. Keywords— Food Security, Gravity Location Model, Normative Consumption Ratio, Supply Chain Management.
Perancangan dan Implementasi Aplikasi Android Streaming (Studi Kasus FTI Universitas Kristen Satya Wacana Salatiga) Tanone, Radius; Ipol, Sushendra
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.589

Abstract

Abstract — FTI UKSW memiliki kegiatan-kegiatan baik yang bersifat kegiatan kemahasiswaan maupun kegiatan umum yang ada di fakultas. Peserta yang mengikuti kegiatan tersebut terdiri dari mahasiswa, dosen dan khalayak umum. Kesibukan atau tidak memiliki kesempatan untuk mengikuti acara tersebut secara langsung dapat menjadi kendala karena tidak mendapatkan kesempatan mengikuti acara tersebut. Berdasarkan masalah yang ada dilakukan penelitian dengan menggunakan tahapan identifikasi masalah, tinjauan pustaka, perancangan sistem dan penulisan laporan untuk membangun sebuah aplikasi android streaming untuk pengambilan gambar. Selain itu juga dibangun sebuah web untuk menghasilkan output dari streaming yang ada kepada user. Hasil dari penelitian ini adalah menghasilkan aplikasi android streaming yang dapat digunakan oleh pihak fakultas sehingga masalah kesibukan atau tidak dapat hadir langsung ditempat dapat terjawab. Aplikasi ini dapat membantu pihak yang berkepentingan agar tetap mendapat kesempatan mengikuti acara secara realtime dengan streaming menggunakan mobile android pada sisi pengambilan gambar dan web untuk melihat hasil streaming. Keywords— Android Streaming, RTMP, RTSP.
Prototipe Sistem Informasi Geografis Fasilitas Kesehatan di Kota Cirebon Berbasis Web Rahardjo, Dani; Warkim, W
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.590

Abstract

In the development of health need the data and information system that is integrated with both the development process so that health facilities can be optimized and the right target. One information system that can be used in the development of health facilities in the city of Cirebon is a geographic information system (GIS). And one of the software to build applications GIS is an Arcview and AlovMap. ArcView software is one of the software (tools) GIS and mapping was developed by ESRI (Environmental Systems Research Institute, Inc). ArcView has the ability to do data visualization, data exploration, the query (both spatial and non-database spatial), analyze the data geographically, and so forth. And AlovMap (including open source software) is a portable application WebGIS Java-based publication that is used to Raster and vector data on the Internet. Excess geographic information system facilities in the city of Cirebon AlovMap use is open source and are cheaper and have the ability to support the visualization of information in decision making. This system can produce a map of the output of these pharmacies, laboratories and hospitals. Utilization of GIS for health facilities that was built is extraordinary in integrating between science, technology and health. Keywords— Arcview, Alowmap, Geographic information system, Health of facilities, Overlay, Shortest path.
Pencarian Nasabah dengan Menggunakan Data Mining dan Algoritma C4.5 Koperasi MADUMA Subang Siallagan, Timbo Faritcan
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.591

Abstract

Abstract - Credit is the provision of money or bills that can be equated with it, based on consent or agreement between the bank and the borrowing other party require that borrowers pay off its debt after a certain period of time by the giving of flowers. Although the Lender has approved a credit proposed by the debtor, but the credit analysis to be done of debtors who have been approved so that the cause of non-performing loans can be examined and get a good classification for the determination of the appropriateness of granting credit. In granting credit need to analyse the needs of creditors, then that must be known in advance is the principles that need to be ditegakan in the framework of granting credit. Things that need to be considered in granting credit to customers is the principle 6 C's Analysis. With these problems, then there is need for troubleshooting existing solutions, by making a decision support System. Thus this decision support System will be able to meet the expectations to be achieved. The algorithm C 4.5 is algorithms used to create the decision tree. Decision tree classification method and prediction is a very powerful and famous. Getting rich in information or knowledge that is conceived by training data, the accuracy of the decision tree will be increased.Keywords - credit Analysis, principles 6 C's Analysis, Data Mining and algorithms C4.5
Pengamanan Sertifikat Tanah Digital menggunakan Digital Signature SHA-512 dan RSA Refialy, Leonardo; Sediyono, Eko; Setiawan, Adi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.592

Abstract

Land trading as investment is sometimes find some barriers or problems. One of the problems is illegal or misclaimed of the land certificate. Badan Pertanahan Nasional (BPN) and Pejabat Pembuat Akta Tanah (PPAT) as institutions and correlated parties in the process of land certificate making need a system to handle the problem of falsification land certificate. The purpose of this research is to make secure system of digital land certificate document with a data protection system to detect if there is a falsification activity from certain party. This research hopefully can help BPN and PPAT as authorized institution of land certificate making and to lower the number of falsification. Digital signature SHA 512 and RSA are used in this research as a solution to keep data integrity of land certificate in a digital format, in this case, in an electronic book with.pdf format. Digital signature derived from xref table in.pdf file. This program has been consulted with BPN and PPAT officer in Salatiga. The result is, this program can be used and applied for authentication process of digital land certificate and help BPN to solve the problem of high number of falsification digital land certificate. Keywords—Sertifikat Tanah Digital, Digital Signature, Hash SHA 512, RSA, Integritas Data, Xref-Table
Audit Tata Kelola Teknologi Informasi Untuk Mengontrol Manajemen Kualitas Menggunakan Cobit 4.1 (Studi Kasus : PT Nikkatsu Electric Works) Fauzan, Rauf; Latifah, Rani
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 3 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.28932/jutisi.v1i3.593

Abstract

Abstract — Information technology has become an important part in the organization, particularly for profit-oriented business organizations. PT Nikkatsu Electric Work is one of the companies that require information technology governance. Information technology governance need to be evaluated to establish the condition of the company in terms of IT performance management to control the quality.One of the important things that can help to evaluate the underlying performance of information technology is a framework for information technology governance that provides the basis for development of information technology governance based on COBIT. Analysis and evaluation are conducted by the COBIT 4.1 framework on ME1 domain. It is monitoring and evaluating the performance of information technology. Method or tool used is AHP calculation.Results of the analysis is that the evaluation of the level of maturity and performance of IT are at level 2. While the level of expectations of the company are at level 4. Recommended strategy of 6 aspects of the attributes of maturity is required to achieve the expected level.  Keywords— IT Governance, Level Maturity, COBIT 4.1

Page 3 of 42 | Total Record : 412