cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 32 Documents
Search results for , issue "Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022" : 32 Documents clear
NETWORK SECURITY MONITORING WITH INTRUSION DETECTION SYSTEM Muhammad Anis Al Hilmi; Emah Khujaemah
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.117

Abstract

Computer network security is an issue that needs attention, along with the valuable and confidential information that passes through the network. The increasing use of networked computer systems has also led to an increase in cybercrimes worldwide, including Indonesia. The types of attacks carried out vary and go through several phases. Among the initial phases of the attack is the port scanning process. The process uses specific programs, such as Nmap (Network Mapper), to check on the target/victim side which ports are open and can be exploited for further attacks. IDS (Intrusion Detection System) is here to anticipate external attacks; IDS is used to detect suspicious activity in the system or network. This study aims to create a computer network security system that is lightweight, based on open-source, easy to set up, and can be analyzed by administrators by using Maltrail. Maltrail itself is a monitoring service used to detect dangerous traffic/traffic in a computer network, by utilizing a blacklist containing a list of dangerous or suspicious elements/sources. This study describes the stages of Maltrail installation and how Maltrail can detect the suspicious network, in this case, the port scanning business using Nmap. As a result, Maltrail can be relied on to log and notify network administrators of illegal system entry attempts/intrusions when there is a port scanning process from outside. Thus, it is hoped that with the existence of IDS, handling of an attack can be carried out earlier and prevent fatal consequences.
CUSTOMIZATION AND USABILITY TESTING AUTO ESSAY FILE GRADING LMS BASED METACOGNITIVE ASSESSMENT IN ENGINEERING FACULTY Ridwan Daud Mahande; Jasruddin; Fitrah Asma Darmawan; Muhammad Ayat Hidayat
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.118

Abstract

Online learning assessment and evaluation has been widely used using the Learning Management system (LMS). However, the form of the questions is still based on multiple choice. Evaluation and form of questions in LMS need to be developed by exploring metacognitive thinking. The LMS plugin supports Essay-based questions and assessments, it's just that this plugin needs to be supported with file submissions and metacognitive assessment rubrics. Therefore, this research aims to customize and test the usability of Auto Essay File Grading (AEG) metacognitive assessment based on LMS. This study uses a quantitative descriptive approach conducted at the Faculty of Engineering, Universitas Negeri Makassar, with lecturers and students as respondents. Data were collected through the USE questionnaire and analyzed using descriptive statistics. The results of the analysis of AEG usability testing from the point of view of lecturers and students who have the highest average are a usefulness. For the lowest average of the lecturers is the ease of use and from the student, the side is the ease of learning. These results also prove that the AEG application/plugin needs improvement in terms of ease and practicality of use so that users learn how to use it faster. Recommendations for ease of use and learning are discussed and explained further, along with the improved display, answer keywords, and minimizing irrelevant menus.
DESIGNING CLEANERS WEBSITE FOR HELMET CLEANSING AND HELMET CLEANSING PRODUCT SELLING USING PHP AND MYSQL Kevin Kristio; Wiwied Widiyaningsih; Mita Lailasari
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.125

Abstract

Helmet is a protective headgear which is currently a primary and mandatory requirement for every motorcyclist. Helmet hygiene is important, and a dirty helmet not only causes an unpleasant odor when worn, but is also harmful to health. A clean helmet condition will certainly make it comfortable to wear at all times. Currently, there are many businesses that provide services for helmet cleansing and selling helmet cleansing products. Many of these businesses use manual transactions with customers coming directly to the place of business. Cleaners is a place of business that is engaged in helmet cleansing and selling helmet cleansing products, where in carrying out its business Cleaners make transactions with customers by means of customers coming directly to Cleaners' place of business. With the advancement of internet technology, helmet cleansing and sales of helmet cleansing products from Cleaners can be made online using the website. Customers can make transactions through the website, and the Cleaners will come to the customer's place to pick up the helmet to be cleaned, and for the purchase of helmet cleansing products, it will be sent either via expedition or when returning the helmet to the customer. This study discusses the design of the Cleaners website for helmet cleansing and selling helmet cleansing products using PHP and MySQL. The method used for the development of this website is SDLC using the Waterfall method which includes the stages of analysis, design, coding, and testing. Based on the results of the Black Box trial, all menus on the website both from the admin and user side are running well according to their functions. And based on the results of the Portability test using a browser, this website can run smoothly and all pages can appear well.
INFORMATION TECHNOLOGY GOVERNANCE IN ADVISORY AND ECONOMIC DEVELOPMENT SECTOR USING COBIT 5 FRAMEWORK Arie Vatresia; Ruvita Faurina; Diky Kurnia Ramadhan
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.128

Abstract

Bank Indonesia is the central bank of the Republic of Indonesia and an independent state institution, free from interference from the Government or other parties. Bank Indonesia Bengkulu City has a field of Advisory and Economic Development, which uses information technology to handle and assist operational activities. However, there is no clarity regarding the level of the company's ability to manage information technology. This has an impact on the use of IT that is not in line with company goals. Based on these problems, it is necessary to have a capability level in managing information technology using the COBIT framework, to assist companies in utilizing IT to be in line with company goals, through improving quality and value and simplifying the implementation of an organization's process flow from the information technology perspective. So the researchers chose COBIT as the framework that will be used in this research. From the results of the study, it was obtained that the Capability level got a level 4 value for the as is state. Meanwhile, for the condition of Bank Indonesia Bengkulu Province in the Advisory and Economic Development Sector, it expects to reach level 5. Gap analysis is determined by the condition of the current level with the expected level, where the current level is 4 and the expected level is 5 so that the results obtained The analysis gap is 1. This means that Bank Indonesia Bengkulu Province in the Advisory and Economic Development Sector must meet the requirements for process capability indicators at level 5 which have not been met. Such as constantly developing new technologies through innovative ideas based on the company's information technology potential.
ANDROID-BASED SHUTTLE ORDER APPLICATION USING FRAMEWORK FLUTTER Mochammad Muslih Maruzi; Dadang Iskandar; Yogiek Indra Kurniawan
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.150

Abstract

The shuttle ticket order process is the main process when someone is going to travel using shuttle transportation. The process of ordering shuttle tickets by visiting shuttle pool in the area or ordering by call has several problems that often make prospective passengers feel a lack of effectiveness and efficiency. This study aims to create an application that makes it easier for prospective passengers to order shuttle tickets and obtain shuttle information and make it easier for service providers to manage fleets and manage orders. This application created by using the waterfall method. The main stages in the system development life cycle in this method, namely: analysis, design, coding, and testing. This application is divided into two parts, Android-based using the Flutter Framework for potential passengers and web-based with PHP programming language for service providers. Black Box test results show valid results, which means the application is as expected. The results of the User Acceptance Test show an average value of 87% in "Very Good" category, which means this application is feasible to use.
APPLICATION OF C4.5 ALGORITHM FOR DETERMINATION OF THE COMMUNITY OF RECIPIENTS OF PROSPEROUS FAMILY CARDS IN THE VILLAGE OF SUKARAMAI BASED ON WEB Intan Agustina; Juna Eska; Indra Ramadona Harahap
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.164

Abstract

The Prosperous Family Card (KKS) is a card given by the Government in lieu of a Social Protection Card (KPS). This card is a marker of underprivileged communities, people who have KKS will get Rice Assistance and Non-Cash Food Assistance (BPNT) every month. To receive the Prosperous Family Card (KKS), the government has set several criteria. As for how to solve the criteria that have been set, namely by utilizing data mining techniques. Data mining can also be interpreted as the process of extracting and extracting knowledge in a set of data using the C4.5 Algorithm. The C4.5 algorithm is a method that can be used for decision making that forms into a decision tree that can later be used as a basis for consideration in determining the community of recipients of the Prosperous Family Card (KKS). The purpose of this study is that the C4.5 algorithm can predict the community of recipients of prosperous family cards so that they can be used in determining the community of recipients of prosperous family cards (KKS) in Sukaramai village.
IMPLEMENTATION OF THE K-MEANS CLUSTERING ALGORITHM FOR THE COVID-19 VACCINATED VILLAGE IN THE UJUNG PADANG SUB-DISTRICT Dewi Sinta Saputri; Guntur Maha Putra; Mustika Fitri Larasati
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.165

Abstract

The grouping of villages vaccinated against Covid-19 in Ujung Padang District will produce several village groups with the same characteristics in each group, but there is no technology that is capable of assisting the work of the sub-district office staff in grouping villages vaccinated against Covid-19. carry out data collection, as a submission for the next Covid-19 vaccination submission/request so that it is appropriate and can help make the Covid-19 vaccination program successful in Indonesia in sub-districts. This research method was carried out by applying data mining techniques and using the k-means clustering algorithm method. Tests were carried out using Microsoft Excel, rapidminer application, and PHP programming language with MySQL as the database. The results of this study were 3 clusters consisting of C1 at the village level vaccinated with the highest Covid-19, there are 2 nagori, C2 at the village level being vaccinated against Covid-19, while there are 12 nagori and C3 at the village level vaccinated with Covid-19, there were 6 nagori. This study concluded that the k-means clustering algorithm can be used to make it easier to classified the vaccinated villages of Covid-19 on Ujung Padang sub-district.
WEBSITE-BASED COMPETENCE CERTIFICATION INFORMATION SYSTEM USING RAPID APPLICATION DEVELOPMENT (RAD) METHOD Zidny Fahma Ilmy Gorby; Cepi Ramdani; Khairun Nisa Meiah
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.173

Abstract

Information system is a series of information systems that are overall and organized and rationally capable of transforming data into information. Competency Test Place (TUK) is a unit implementing competency standard testing, competency certification in a professional field and has responsibility for the implementation, guidance and development of competency standards and competency certification. Based on the results of interviews with the TUK unit manager, there are several obstacles in their services, namely, the certification registration process which has not been effective in serving prospective competency test participants, then certification information related to certification is still difficult for students to obtain directly. Based on these problems, it is necessary to have a Competency Certification information system that has a function as a medium for sharing information as well as a media for registration of certification. This study aims to build a Certification Information System and measure the level of conformity. The method that will be used in this research is RAD (Rapid Application Development). RAD was chosen because this model emphasizes the short development cycle of software development. UAT Operational Acceptance Testing was chosen because the level of acceptance of a system by users can be a benchmark for assessing the acceptance of an information technology by users and requires users to use the system or software that has been created. The test results using Operational Acceptance Testing type UAT on the system have obtained valid results which are accepted by 24 respondents who have tried the competency certification information system.
THE BEST HARVESTERS ASSESSMENT SYSTEM AT PT. PADASA ENAM UTAMA BY SIMPLE ADDICTIVE WEIGHTING (SAW) METHOD Trika Ayu Intan Sari; Nuriadi Manurung; Santoso
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.177

Abstract

The selecting of best harvesters at PT. Padasa Enam Utama have been using a manual method so that the announcement of reward results is often delayed. The purpose of this research was application of the simple addictive weighting (SAW) method which has the opportunity to facilitate the management of PT. Padasa Enam Utama to determine the best harvester and make it easier to display reward results to employees. The research method was carried out using the SAW method with the research stages consisting of data collection, analysis, system design, system development. The results of this study that SAW value referring to the criteria for harvesters who deserve to receive rewards according to the relevant data. The results were namely 3 harvesters, Selamet, Agun, and Ateng with the highest SAW value were respectively 0.7647, 0.6235 and 0.5411. This study concluded that SAW method can help CQC (Crop Quality Control) in determining the best harvesters who deserved a reward.
DEVELOPMENT OF BUSINESS INCUBATOR MANAGEMENT INFORMATION SYSTEM AT UNSOED BUSINESS INCUBATOR CENTER lasmedi afuan; Arief Kelik Nugroho; Muhammad Randy Cahya Mardika
Jurnal Teknik Informatika (Jutif) Vol. 3 No. 2 (2022): JUTIF Volume 3, Number 2, April 2022
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.jutif.2022.3.2.180

Abstract

The Unsoed Business Incubator Center (PIB) is one of the incubation centers under the General Sudirman University Community Service Institute. PIB Unsoed aims to help develop the businesses of MSMEs and Startups around the Jenderal Sudirman University area. In the incubation process, of course, there is a lot of data recording related to the tenant incubation process, such as administrative data, data development, data assistance, and other data related to the tenant incubation process. The process of recording data on PIB Unsoed is still done manually without any technological aids such as computers or cellphones. In addition, at PIB Unsoed, there are often cases of data loss regarding the business incubation process that has taken place at PIB Unsoed. From the background of the problem above, the author wants to create a Business Incubator Assistance Management Information System for PIB Unsoed. This system is based on a website using the Laravel framework and developed using a prototyping development method. The results of the research that has been done can be concluded that the Management Information System for managing the Business Incubator can be implemented at PIB UNSOED.

Page 1 of 4 | Total Record : 32