cover
Contact Name
Muhammad Taufiq Nuruzzaman
Contact Email
m.taufiq@uin-suka.ac.id
Phone
+6287708181179
Journal Mail Official
jiska@uin-suka.ac.id
Editorial Address
Teknik Informatika, Fak. Sains dan Teknologi, UIN Sunan Kalijaga Jln. Marsda Adisucipto No 1 55281 Yogyakarta
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
JISKa (Jurnal Informatika Sunan Kalijaga)
ISSN : 25275836     EISSN : 25280074     DOI : -
JISKa (Jurnal Informatika Sunan Kalijaga) adalah jurnal yang mencoba untuk mempelajari dan mengembangkan konsep Integrasi dan Interkoneksi Agama dan Informatika yang diterbitkan oleh Departemen Teknik Informasi UIN Sunan Kalijaga Yogyakarta. JISKa menyediakan forum bagi para dosen, peneliti, mahasiswa dan praktisi untuk menerbitkan artikel penelitiannya, mengkaji artikel dari para kontributor, dan teknologi baru yang berkaitan dengan informatika dari berbagai disiplin ilmu
Arjuna Subject : -
Articles 7 Documents
Search results for , issue "Vol. 7 No. 2 (2022): Mei 2022" : 7 Documents clear
Analisis Unjuk Kerja TCP Sack Menggunakan Antrian Random Early Detection Rinny Asasunnaja; Bambang Sugiantoro
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (231.571 KB) | DOI: 10.14421/jiska.2022.7.2.75-82

Abstract

As time goes by, the current technology is also developing very rapidly, the rapid development of technology, especially on the internet network is also developing so that it is expected to continue to provide the best quality to meet the growing and fast information needs. An internet network is highly demanded of its best quality, one of which is in the spotlight to be developed, namely TCP Transmission Control Protocol. The efficiency and smoothness of the data transmission process is the most important thing in a communication network. TCP is one aspect that supports today’s fast internet, with TCP we can exchange information accurately, quickly, and well. In this study, researchers are interested in analyzing the performance of TCP Sack using the Random Early Detection queue. By doing this research is expected to know the performance of TCP Sack by looking at the parameter values of packet delivery ratio, throughput, end to end delay, and packet drop. Based on the results of the analysis, it can be concluded that end-to-end delay parameter testing on the TCP Sack still has poor performance, while for testing the packet delivery ratio, throughput, and packet drop TCP Sack already has good performance.
Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology Imam Riadi; Sunardi; Fitriyani Tella Nani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (832.523 KB) | DOI: 10.14421/jiska.2022.7.2.83-90

Abstract

Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
Comparative Study of K-Means Clustering Algorithm and K-Medoids Clustering in Student Data Clustering Qomariyah; Maria Ulfah Siregar
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (162.943 KB) | DOI: 10.14421/jiska.2022.7.2.91-99

Abstract

Universities as educational institutions have very large amounts of academic data which may not be used properly. The data needs to be analyzed to produce information that can map the distribution of students. Student academic data processing utilizes data mining processes using clustering techniques, K-Means and K-Medoids. This study aims to implement and analyze the comparison of which algorithm is more optimal based on the cluster validation test with the Davies Bouldin Index. The data used are academic data of UIN Sunan Kalijaga students in the 2013-2015 batch. In the k-Means process, the best number of clusters is 5 with a DBI value of 0.781. In the k-Medoids process, the best number of clusters is 3 with a DBI value of 0.929. Based on the value of the DBI validation test, the k-Means algorithm is more optimal than the k-Medoids. So that the cluster of students with the highest average GPA of 3,325 is 401 students.
Respons Pengguna Instagram terhadap Periklanan Paid Promote di Instagram dengan Metode CRI Berkonsep AISAS Bekti Cahyo Hidayanto; Jessica Patricia Halim; Aura Febriyanti Puspa Sari; Muhammad Alrifqi; Nur Aini Rakhmawati; Izzat Aulia Akbar
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (271.977 KB) | DOI: 10.14421/jiska.2022.7.2.100-110

Abstract

Instagram is a social media that has a shopping feature. Instagram can be used for digital advertising, and among them is paid promotion. Paid promotion is a service to promote goods/services on social media. This service offers advantages such as a broad market segment, low cost, and easy technical implementation. Many online shops are willing to spend a lot of money to be promoted. Unfortunately, online shop owners usually do not know how Instagram users respond when they see a paid promotion. Therefore, the purpose of this study is to find out how Instagram users respond to the paid promotion on Instagram. User response data was taken from a questionnaire, then analyzed using the CRI method with the AISAS concept by using 4 models: AISAS, AISS, AIAS, and AIS. As the result, four models showed the CRI is below 50% (AISAS: 2,8%; AIAS: 3%; AISS: 4,5%; AIS: 8,4%). Considering the result, the respondents do not give a good response to the paid promotion service.
Implementasi Algoritma K-Means Clustering Seleksi Siswa Berprestasi Berdasarkan Keaktifan dalam Proses Pembelajaran Falih Pramataning Dewi; Priskila Siwi Aryni; Yuyun Umaidah
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (382.934 KB) | DOI: 10.14421/jiska.2022.7.2.111-121

Abstract

The learning process through various interactions and learning experiences has a considerable influence on developing student activity to improve the quality of education. The teacher is the most important factor in determining the success of students in the implementation of the process. The development of the quality and activeness of students in learning is a basic element as a form of success in the learning process which of course not all students have a level of speed in understanding material. This is a concern for schools in improving the quality of education. The purpose of this study was to classify the level of activity of students at SMP ABC using the correlation between grades and the level of student activity who would be recommended to take part in competitions or prospective scholarship recipients. The data source that we used in this study came from the State Junior High School ABC which consists of several variables, including student attendance data, academic scores, psychomotor scores, and affective values. The method used in this research is the Clustering method with the K-means Algorithm. The results of this study can be grouped into 3 clusters including cluster 0 indicating active students as many as 30 students, cluster 1 showing inactive students as many as 8 students, and cluster 2 indicating less active students as many as 21 students.
Pemilihan Lokasi Budidaya Rumput Laut Menggunakan Metode Analytical Hierarchy Process (AHP) dan Simple Additive Weighting (SAW) Sri Rahayu; Hamdani Hamdani; Ramadiani Ramadiani
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1774.035 KB) | DOI: 10.14421/jiska.2022.7.2.122-133

Abstract

One of the professions in the marine sector that is mostly occupied by people living in coastal areas is seaweed cultivation. Seaweed is one of the marine product commodities with great potential to be developed in Indonesia because it has high economic value. One of the areas that are included as producers of Eucheuma Cottonii seaweed is Nunukan Island, which is located in Nunukan Regency, North Kalimantan Province. The main factor that determines success in seaweed cultivation activities is the selection of land locations. Errors in site selection can lead to crop failure and low quality of the seaweed produced. The purpose of this study is to create a decision support system to facilitate and assist the community in selecting the best location for seaweed cultivation quickly and precisely according to the criteria using the Analytical Hierarchy Process (AHP) method to calculate the criteria weights and the Simple Additive Weighting (SAW) method for performing alternative ratings. The criteria used were 7, namely depth, pH, current speed, brightness, temperature, salinity, and dissolved oxygen, while alternative data were 11 points of seaweed cultivation locations on Nunukan Island. Based on the results of the implementation of the two methods, recommendations for two locations for seaweed cultivation are Sei Banjar I and Sei Banjar II with the same preference value of 0.937 which is the highest value compared to other alternatives.
Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST Irhash Ainur Rafiq; Imam Riadi; Herman
JISKA (Jurnal Informatika Sunan Kalijaga) Vol. 7 No. 2 (2022): Mei 2022
Publisher : UIN Sunan Kalijaga Yogyakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1167.871 KB) | DOI: 10.14421/jiska.2022.7.2.134-142

Abstract

The development of communication media continues to increase with the emergence of various communication applications on smartphones, which are currently very developed from limited communication media to social media. This change in the flow of communication applications gives a new color to communication, not just exchanging messages and sounds but also exchanging videos and pictures. This development was also followed by the rise of digital crimes in the form of defamation, fraud, and hoax news by spreading posts and then deleting them after the news spread widely. This research was conducted to obtain digital evidence with the help of special applications such as Belkasoft Evidence and Axiom Magnets using the NIST method. The results of this study show that the Magnet Axiom is better with an accuracy rate of 83.3% while Belkasoft Evidence is only 50%.

Page 1 of 1 | Total Record : 7