cover
Contact Name
Taufiq Iqbal
Contact Email
taufiq.iqbal@lembagakita.org
Phone
+6285277777449
Journal Mail Official
jtik@lembagakita.org
Editorial Address
Teuku Nyak Arief Street Number: 7b Lamnyong, Banda Aceh City, Aceh Province
Location
,
INDONESIA
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi)
ISSN : -     EISSN : 25801643     DOI : https://doi.org/10.35870/jtik
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi), e-ISSN: 2580-1643 is a free and open-access journal published by the Research Division, KITA Institute, Indonesia. JTIK Journal provides media to publish scientific articles from scholars and experts around the world related to Hardware Products, Software Products, IT Security, Mobile, Storage, Networking, and Review An application service. All published article URLs will have a digital object identifier (DOI).
Articles 18 Documents
Search results for , issue "Vol 6, No 3 (2022): July-September" : 18 Documents clear
Sistem Monitoring Penyewaan Alat-Alat Outdoor Berbasis Web Iriandi, Aditya Nuryudha; Fitri, Iskandar; Ningsih, Sari
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.445

Abstract

The purpose of this research is to make it easier to collect data to make it easier for business actors to monitor the rental of outdoor equipment. Applications built using HTML, CSS, and Java Script programming language systems then use the CodeIgniter framework and materialize components and use MySQL and XAMPP as databases and tools in running server-side. The waterfall method was chosen as a method in developing the system that was built. The results of the study found that; 1) The role of technology in the current digital era, can facilitate the handling of business management, especially in the field of equipment rental so that it helps problems and handling in processing and processing rental reports, 2) Hiking, Trekking, Mountaineering and so on customers will have a place to borrowing tools and climbing needs, and 3) By using the application that was built, it can make it easier to monitor the rental of outdoor equipment.
Sistem Pendeteksi Gejala Stunting pada Anak dengan Metode Certainty factor Berbasis Website Chafidin, Afiyan Nur; Triayudi, Agung; Andrianingsih, Andrianingsih
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.434

Abstract

The purpose of this study is to design and develop a stunting symptom detection system in children using the Website-based certainty factor method which aims to create a stunting symptom detection system in children from an early age and help parents in maintaining nutrition in their children, indirectly said to be computerized to detect stunting means that when applied, it makes it easier for parents to monitor nutrition quickly and precisely. This study uses a system development method where the model used is Waterfall. The results of this study are in the form of an application that provides several symptoms of stunting in children then the user can conduct consultations to determine the calculation of the results of stunting symptoms correctly. The use of this certainty factor method is implemented in an expert system that is used to look for symptoms caused by stunting and in solving the case, the certainty factor obtains an accuracy of 80%.
Perbandingan Metode Interpolasi Newton dan Lagrange dengan Bahasa Pemrograman C++ Furqaansyah, Yoga; Fauziah, Fauziah; Gunaryati, Agus; Fitri, Iskandar
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.457

Abstract

Interpolation is defined as an estimate of a known value. Extensive interpolation is an attempt to determine the approximate value of an analytic function that is unknown or alternatively a complex function whose analytic equation cannot be obtained. You can combine the use of math and math to analyze the price of an item. This study describes Newton's method and the polynomial method. Therefore, interpolation with Newton's method has an error value that is smaller than the error value of the Lagrange interpolation. The results in this research case study when x = 2.5 using 10 data performed using Newton's polynomial interpolation method have a result of 1.70956 where this value is lower than the value of the analysis using the Lagrange method which is 3.2163.
Sistem Pakar Diagnosis Penyakit Lupus Berbasis Mobile Application Android dengan Metode Certainty Factor (CF) Febry, Fransiskus; Darussalam, Ucuk; Esti Handayani, Endah Tri
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.433

Abstract

The objectives of this research are; 1) Creating Android software or applications using the Certainty Factor method, and 2) Early diagnosis of a person's indications using the Certainty Factor (CF) method. The research methodology uses interviews, collects information obtained, the next stage is used with the Certainty Method used to calculate the probability value of MD, MB and CF, researchers to display the diagnosis of Lupus, testing techniques using Acceptance Testing techniques. The results of the study have succeeded in making an application using the JAVA programming language assisted by the Android SDK Platform. The results of the disease obtained a confidence value indication of Dry Eyes, Shortness of Breath due to Lung Inflammation, Continuous Chest Pain for Lupus is 0.968815.
Sistem Pakar Deteksi Dini Gejala Poliycystic Kidney Disease (PKD) Menggunakan Metode Forward Chaining Berbasis Android Aldisa, Rima Tamara
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.413

Abstract

The purpose of this study is to build an application with the forward chaining method used to diagnose Polycystic Kidney Disease based on Android. The research method consists of analysis and design, while the use case diagram is used as a model of the system to be built, Forward Chaining is implemented in the system to diagnose Polycystic Kidney Disease and the application is built based on Android. The conclusion from the results of this study is to show the application features that are made to run. An expert system application designed to be able to help Polycystic Kidney Disease based on the symptoms entered by the user using the Forward Chaining method.
Monitoring Sistem Keamanan Laci Kasir Dengan Fingerprint Berbasis Android Mardia, Ahmad Muslih; Fitri, Iskandar; Ningsih, Sari
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.426

Abstract

Internet of things menjadi salah satu trend di dunia teknologi, penggunaan teknologi seperti ini dapat ditemukan salah satunya yaitu dalam menjaga keamanan suatu toko. Dalam penelitian ini, kunci laci kasir mekanik akan digantikan dengan teknologi pengenalan biometrik sidik jari yang ada pada ponsel pintar. Penggunaan solenoid doorlock sebagai pengganti kunci laci kasir. Sidik jari akan memverifikasikan oleh aplikasi untuk dapat dicocokkan dengan database, lalu mengirim data ke mikrokontroler nodemcu yang terintegrasi dengan perangkat ponsel pintar sebagai monitoring. Data-data akan dikirimkan ke database dan dibaca oleh sistem aplikasi yang ada pada perangkat ponsel pintar untuk dapat diakses dimana saja. Solenoid doorlock sebagai pengganti kunci laci. Apabila fingerprint berhasil memverifikasikan sidik jari dan sesuai dengan data yang ada pada sistem, maka kunci laci kasir akan terbuka.
Teknik Steganography untuk Menyisipkan Pesan pada Sebuah Citra Menggunakan Metode Least Significant Bit (LSB) Khuzaifi, Ahmad; Fauziah, Fauziah; Fitri, Iskandar
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.461

Abstract

Copyright is a direct right granted to the creator of a work in any form that is real and recognized in accordance with the provisions of the legislation in force in the area. Copyright infringement is very detrimental to the creators of works who have tried hard in creating a work. The steganography technique can be a solution to insert hidden messages into digital data. In writing this scientific research journal, an application was made to give a hidden message sign to an image. The goal is to protect copyrighted works from being easily recognized by irresponsible parties. Making this simple application using MATLAB R2021a software. By using the Least Significant Bit [LSB] method, what happens is that the data bits will be inserted into the digital image bit by changing the last bit. The result is that the image inserted with the message does not experience significant changes, but when the image undergoes an extraction process, the inserted message will appear. The results of the Least Significant Bit [LSB] method in this study are successful in inserting a .txt file into the hidden original image so that it does not change the visualization of the image but only changes the image size from 56.9KB to 732KB
Aplikasi Monitoring Peralatan, Bahan Laboratorium Menggunakan Metode Sequential Search di Laboratorium Mikrobiologi dan Genetika UNAS Rohadi, Chairil; Fitri, Iskandar; Nurhayati, Nurhayati
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.428

Abstract

The Faculty of Biology at the National University has a Microbiology and Genetics laboratory which is used for practicum activities, research, and fieldwork lectures. At the analysis stage, problems were found, namely in recording the use of equipment and materials used by students for research activities still using conventional methods, this resulted in delays in managing and conveying information. Adequate lecture facilities are an important aspect in helping the teaching and learning process. Based on the background of the problem, the author aims to make the equipment monitoring process more efficient, using Android-based devices. The author uses the Sequential search method in the process of monitoring equipment in the laboratory. This research was tested using black-box testing and white box testing by distributing questionnaires conducted using a Likert scale with a value range of 5 to 25 student correspondents with an average value for software testing = 4.6; Interface = 4.44; Software features = 4.32; item search feature = 4.08; with the final mean = 4.09.
Analisis Sentimen Mengenai Vaksin Sinovac di Media Sosial Twitter Menggunakan Metode Naïve bayes Classification Aldisa, Rima Tamara; Azizah, Azizah; Abdullah, Mohammad Aldinugroho
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.479

Abstract

The Sinovac vaccine is an example of a type of inactivated vaccine. The government bought Sinovac, Novavax, AstraZeneca, and Pfizer vaccines. This vaccine is used to treat the Covid-19 pandemic. This vaccine is used to treat the Covid-19 pandemic. The role of the Indonesian people in expressing and stating the pros and cons often involves public services that are easily accessible by many people, namely social media, one of which is Twitter. This can be used as material to analyze who produces data in support of decisions. The technique that can be used is sentiment analysis. The method used in this study is the Naïve bayes Classification. The purpose of this study was to determine the value of sentiment analysis on the Sinovac vaccine using the Naive Bayes Classification method on Twitter social media using Indonesian. The result of this research is the final probability value based on the condition 0.000002765 for positive and 0.000000359 for negative. A response with a positive comment has a greater probability of a response with a negative comment.
Penerapan Message Diggest Algorithm MD5 untuk Pengamanan Data Karyawan PT. Swifect Berbasis Desktop Zayana, Muhammad Rafiq; Fitri, Iskandar; Fauziah, Fauziah; Gunaryarti, Aris
Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) Vol 6, No 3 (2022): July-September
Publisher : KITA Institut

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35870/jtik.v6i3.446

Abstract

In the era of Society 5.0, technological progress is unstoppable. Technological advances in the era of society 5.0 have become the main needs of humans in helping daily work. Technology is used as a medium for finding information to transportation tools that are integrated with the intervention of digital technology. Almost every company has technology to support their business development needs. And especially in agencies in this era, employee data is also processed using technology, but with the integration of employee data into technology, a lot of sensitive data must be protected in order to avoid misuse by irresponsible people. Therefore, the main objective of this research is to develop the application of the Message Diggest Algorithm (MD5) Cryptography Algorithm in employee data applications. This application is very appropriate to make it easier for companies to manage their employee data and ensure data security. To secure sensitive data from each employee, the process carried out is by encrypting each sensitive data so that it is not easy to read by others who have no interest or authority over the data. And the desktop-based application was made using Visual Basic. The research was carried out with two methods, namely the method to test the compilation speed of MD5 and to test the validation of the decrypted data from the MD5. And from the results of the study, the average speed of 500-515 milliseconds and data consistency obtained valid results from all tests.

Page 1 of 2 | Total Record : 18