cover
Contact Name
Yogiek Indra Kurniawan
Contact Email
yogiek@unsoed.ac.id
Phone
+6285640661444
Journal Mail Official
jutif.ft@unsoed.ac.id
Editorial Address
Informatika, Fakultas Teknik Universitas Jenderal Soedirman. Jalan Mayjen Sungkono KM 5, Kecamatan Kalimanah, Kabupaten Purbalingga, Jawa Tengah, Indonesia 53371.
Location
Kab. banyumas,
Jawa tengah
INDONESIA
Jurnal Teknik Informatika (JUTIF)
Core Subject : Science,
Jurnal Teknik Informatika (JUTIF) is an Indonesian national journal, publishes high-quality research papers in the broad field of Informatics, Information Systems and Computer Science, which encompasses software engineering, information system development, computer systems, computer network, algorithms and computation, and social impact of information and telecommunication technology. Jurnal Teknik Informatika (JUTIF) is published by Informatics Department, Universitas Jenderal Soedirman twice a year, in June and December. All submissions are double-blind reviewed by peer reviewers. All papers must be submitted in BAHASA INDONESIA. JUTIF has P-ISSN : 2723-3863 and E-ISSN : 2723-3871. The journal accepts scientific research articles, review articles, and final project reports from the following fields : Computer systems organization : Computer architecture, embedded system, real-time computing 1. Networks : Network architecture, network protocol, network components, network performance evaluation, network service 2. Security : Cryptography, security services, intrusion detection system, hardware security, network security, information security, application security 3. Software organization : Interpreter, Middleware, Virtual machine, Operating system, Software quality 4. Software notations and tools : Programming paradigm, Programming language, Domain-specific language, Modeling language, Software framework, Integrated development environment 5. Software development : Software development process, Requirements analysis, Software design, Software construction, Software deployment, Software maintenance, Programming team, Open-source model 6. Theory of computation : Model of computation, Computational complexity 7. Algorithms : Algorithm design, Analysis of algorithms 8. Mathematics of computing : Discrete mathematics, Mathematical software, Information theory 9. Information systems : Database management system, Information storage systems, Enterprise information system, Social information systems, Geographic information system, Decision support system, Process control system, Multimedia information system, Data mining, Digital library, Computing platform, Digital marketing, World Wide Web, Information retrieval Human-computer interaction, Interaction design, Social computing, Ubiquitous computing, Visualization, Accessibility 10. Concurrency : Concurrent computing, Parallel computing, Distributed computing 11. Artificial intelligence : Natural language processing, Knowledge representation and reasoning, Computer vision, Automated planning and scheduling, Search methodology, Control method, Philosophy of artificial intelligence, Distributed artificial intelligence 12. Machine learning : Supervised learning, Unsupervised learning, Reinforcement learning, Multi-task learning 13. Graphics : Animation, Rendering, Image manipulation, Graphics processing unit, Mixed reality, Virtual reality, Image compression, Solid modeling 14. Applied computing : E-commerce, Enterprise software, Electronic publishing, Cyberwarfare, Electronic voting, Video game, Word processing, Operations research, Educational technology, Document management.
Articles 30 Documents
Search results for , issue "Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023" : 30 Documents clear
DIGITAL DATA SECURITY WITH APPLICATION OF CRYPTOGRAPHY AND DATA COMPRESSION TECHNIQUES Adam Prayogo Kuncoro; Dinar Mustofa; Dwi Krisbiantoro; Tarwoto Tarwoto
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.659

Abstract

The need for digital data security is to ensure that the data and information we have are confidential and can only be accessed by authorized users. And no one can change the information in it, thus ensuring complete accuracy. The functions of data security are confidentiality, authentication, integrity, and anti-repudiation. Compression techniques are used to protect digital data because they aim to make less storage space and allow us to transfer more data over the internet. This study aims to plan to prove the application of a combination of 2 (two) techniques, namely compression and cryptography to digital data with the aim of increasing the security of the data. This research has the result that the compression technique of the Huffman method is the most effective in compressing digital data into the smallest file size compared to other compression methods. It can compressed the data size by around 30% (thirty percent) to 40% (forty percent) compared to the original data size. And coupled with data security with cryptographic encryption techniques so that files remain safe when transferred over the network.
AUTOMATIC FISHPOND IRRIGATION DOOR CONTROL SYSTEM BASED ON ATMEGA16 MICROCONTROLLER AND SMS GATEWAY Muhammad Fajar B; Fitriyanty Dwi Lestary; M. Miftach Fakhri; Muhammad Agung; Dewi Fatmarani Surianto; Akmal Hidayat
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.669

Abstract

The process of controlling irrigation doors in fishponds is still mostly done manually, this results in the performance of farmers being less effective and efficient. Current technological developments, especially in the field of IoT, can be used to design a simulation that is able to control irrigation gates automatically. Based on the results of the tests that have been carried out, it can be concluded that the ATmega16-based automatic irrigation gate simulation tool can work well according to the designed working principle. If the condition of fishpond water is less than the ideal height of the fishpond and the condition of river water is more than the height of the fishpond, the motor will move to "open" the irrigation door to fill fishpond water. If the fishpond water condition is more than the ideal height and the river water condition is less than the fishpond height, the motor will move to "open" the irrigation door to discharge fishpond water and if the river water condition is the same as the fishpond water condition, the motor will move "close” the irrigation door so that the ideal height of the fishpond can be achieved. There are certain conditions to control the door manually using the SMS Gateway. Information about the maximum or minimum fishpond water level will be displayed on the LCD to determine the maximum or minimum fishpond height using Keypad.
DEAD FORENSIC ANALYSIS OF QUTEBROWSER AND LIBREWOLF BROWSERS USING THE NIST 800-86 METHOD Fajar Al Rasyid; Bita Parga Zen
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.688

Abstract

A browser is software used to access web pages to obtain clear and readable information. Information resources are identified by a Uniform Resource Identifier (URI) and can be web pages, images, videos, or other content. When a browser user engages in online activities, they usually leave traces on the device such as history, cookies, cache files, and even emails and passwords. Such traces can usually help users access a website or input something, such as emails and passwords. The purpose of this research is to obtain digital evidence in the form of a cache on the hard disk in the Librewolf and Qutebrowser browsers. In this study, researchers used the National Institute of Standards and Technology (NIST) 800-86 method which consists of four stages, namely collection, examination, analysis, and reporting. which focuses on the Qutebrowser and LibreWolf browsers. The results obtained from this study were found to be 21 caches, 2 Sessions, 6 Cookies, 8 Network Persistent State, 9 QuotaManager, 11 IndexedDB, 24 LevelDB, 48 Cache Storage, 14 Favicons, 3 History, 6 Database, 3 StartupCache, 4 Alternate Services, 6 Content-Pref, Notification amounted to 1, Permission amounted to 7, Service Worker amounted to 6, SiteSecuristyServiceState amounted to 7, Webappstore amounted to 8, Sessionstore-Backups amounted to 5, Storage amounted to 47 NIST 800-86 method can be properly used in the acquisition of digital evidence and the most crucial data obtained in the Librewolf browser on the telegram and whatsapp sites.
CLASSIFICATION OF TOMATO QUALITY BASED ON COLOR FEATURES AND SKIN CHARACTERISTICS USING IMAGE PROCESSING BASED ARTIFICIAL NEURAL NETWORK Andi Sadri Agung; Amin Farid Dirgantara SR; Muh Syachrul Hersyam; Andi Baso Kaswar; Dyah Darma Andayani
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.730

Abstract

Tomato (Solanum Lycopersicum) is a plantation commodity in Indonesia with a production rate that tends to increase every year. With a high economic value, maintenance is important so that the quality is getting better. The problems that arise at this time are related to the determination of the quality of tomatoes which is still done manually and depends on humans so classification using technology is considered important to be developed. Previously there has been researching related to the classification of tomatoes. However, accuracy and computation time still need to be improved. Therefore, in this research, a method of classification of tomatoes was carried out using Artificial Neural Network (ANN) Backpropagation algorithm by utilizing color features and skin characteristics based on image processing. This research followed several stages, from acquiring 300 tomato images with 3 class levels to the classification process using ANN Backpropagation. Several training scenarios and tests were conducted to select the feature combined with the highest accuracy and fastest computation time. The combination of 3 best features used is RGB color feature with shape and texture features as skin characteristic parameters. Based on training results with 210 training images, an accuracy of 100% was obtained with a computation time of 2.58 seconds per image. While test results with 90 test images, accuracy reaches 95.5% with a computing time of 1.39 seconds per image. So it can be concluded that the method used has gone well in classifying tomato image quality based on color features and skin characteristics.
COMPARATIVE STUDY OF DISTRIBUTED DENIAL OF SERVICE (DDOS) ATTACK DETECTION IN COMPUTER NETWORKS Adam Zukhruf; Bagus Fatkhurrozi; Andriyatna Agung Kurniawan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.756

Abstract

Distributed Denial of Service (DDoS) attack is an internet crime that aims to consume server resources so that the server becomes unusable. Suricata, Snort and Wireshark are useful software applications for detecting DDoS attacks. This study aims to compare the performance of the snort, suricata and wireshark applications in detecting Distributed Denial of Service attacks. The comparison parameters used are the total attacks that can be detected and memory usage. The type of attack used in testing is syn flood and ping of death. The research results obtained by Suricata became the most effective application in this study compared to snort and wireshark. Suricata excels in memory usage in the two types of attacks performed with the percentage of memory usage being 0.1891 GB (4.975%) during syn flood attacks and 0.00114 GB (0.03%) during ping of death attacks. Suricata also excels in the percentage of the total number of detected ping of death attacks, namely 86,472%.
TRANSFER LEARNING TO PREDICT GENRE BASED ON ANIME POSTERS Kaka Kamaludin; Woro Isti Rahayu; Muhammad Yusril Helmi Setywan
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.860

Abstract

Anime is an animated film with a distinctive graphic design originating from Japan, which is widely favored by various groups. anime itself has a genre like a movie in general, but there is a slight difference from ordinary films, anime has additional genres that are not in ordinary films, such as the Ecchi, Mahou Shoujou, Seinen, Shounen, and Josei genres. Since those genres only exist in anime, this research is devoted to predicting those anime genres. The prediction will use posters from the anime itself, with the help of image processing, namely the Convolutional Neural Network method and Transfer Learning. Transfer Learning will be implanted as a comparison of the performance of the existing architecture with the architecture that will be created, whether the architecture is able to process the dataset properly. The dataset to be used is a dataset of posters and csv documents containing images and details of the anime, the dataset contains anime data from 1980 to 2021 and contains 11651 anime poster data which has different resolution sizes. The ResNet50 model has the highest accuracy rate of 48% with a loss rate of 36%, while InceptionV3 produces 35% accuracy with 69% loss. At the time of testing ResNet50 gave the smallest genre percentage value of CustomModel and InceptionV3, while CustomModel gave the highest genre value. In addition to the value, all modes also predicted the genre well. Especially InceptionV3 is able to predict the music genre, because the music genre has a very small number of datasets, and this music genre is difficult to predict by the ResNet50 and CustomModel models.
RIAU PROVINCE TOURISM WEBSITE IMPROVEMENT PROGRAM USING E-GOVQUAL AND IMPORTANCE PERFORMANCE ANALYSIS METHODS Ichsan Ahmad Gunawan; Muhammad Jazman; Tengku Khairil Ahsyar; M. Afdal
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.922

Abstract

The Riau Province Tourism Office implements E-Government by building a website as a media public relations. This website is used to provide information on tourist destinations, facilities and news about Riau Province. Previously this website had never been evaluated so that the community's assessment of the quality of the Riau Province Tourism service site was unknown. For this reason, this study aims to analyze the service quality of the Riau Province Tourism Office website based on the perception or point of view of its users, in this case especially the people of Riau Province using the Electronic Government Quality (E-GovQual) and Importance Performance Analysis (IPA) methods. To assess the service quality of the Riau Province Tourism Office website using 6 dimensions and 28 E-GovQual attributes. The results of this study show that the total value of the performance score is Likert 3 (good) which is 3.30, the value of importance is 3.27, and the gap between performance and importance is 0.002 or > 0. The results of this study indicate that service performance has met the interests user. Thus the overall performance of the Riau Province Tourism Office website service is good and has fulfilled the interests of users. Furthermore, from the results of the IPA analysis, 7 attributes (EU1, TR1, FIE2, EU2, TR3, CS2, CAI3) are obtained with top priority and 5 attributes (EU3, FIE1, RB3, CA12, TR2) that need to be improved.
TOPIC MODELING IN COVID-19 VACCINATION REFUSAL CASES USING LATENT DIRICHLET ALLOCATION AND LATENT SEMANTIC ANALYSIS Ulfah Malihatin S; Yulian Findawati; Uce Indahyanti
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.951

Abstract

COVID -19 vaccination is a program provided by the Indonesian government to minimize the spread of the virus. The COVID-19 vaccination program in Indonesia goes hand in hand with issues that are circulating, causing controversy and rejection of vaccination on social media, especially Twitter. There are many factors that influence vaccine rejection on Twitter, to summarize frequently discussed topics and find out hidden topics, this study uses the Latent Dirichlet Allocation (LDA) and Latent Semantic Analysis (LSA) methods from 1797 Twitter scrapping data. Both models require a set of words that have been converted into a matrix, so before conducting LDA topic modeling, the dataset will undergo a bag of word (BOW) calculation. Meanwhile, in LSA topic modeling, the existing dataset will undergo word weighting of frequently occurring words using Term Frequency - Inverse Document Frequency (TF-IDF). This study was conducted to find and summarize hidden information in the form of frequently discussed topics, thus understanding public opinions related to the COVID -19 vaccination refusal case. LDA and LSA methods will display topics based on the probability and mathematical calculations of word occurrences in each topic in the document. The topics that appear will be further analyzed through coherence score by applying a limit of 20 topics to display the best value. Further modeling experiments are carried out to display topics through LDA and LSA models, this study takes 6 topics with the highest coherence values including the right of individuals to choose whether to be vaccinated or not (0.484607), the Ribka Tjiptaning controversy (0.473368), rejection of the COVID-19 vaccine by groups represented by public figures (0.463631), punishment for non-compliance in the form of fines (0.324924), and halal certification (0.312521).
LORAWAN GATEWAY PLANNING USING AS923-2 FREQUENCY IN TASIKMALAYA FOR MONITORING ODC I Ketut Agung Enriko; Fikri Nizar Gustiyana; Gede Chandrayana Giri
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.955

Abstract

This study aims to design a LoRaWAN network and find out how many gateways are needed to cover the research area and to design an IoT-based monitoring system for ODC devices on the FTTH network based on data at PT. Telkom Witel Tasikmalaya. The method used is a simulation using Atoll software version 3.40 and several calculation stages to predict the parameters of RSSI (Received Signal Strength Indicator) and SINR (Signal to Interference Noise Ratio) in a planning area of ​​358.66 km2. This study using AS923 frequency with a bandwidth of 125 kHz and a Spreading factor of 10. The results obtained are signal strength (RSSI) and signal quality (SINR) parameters. Based on the results of calculations and planning simulations, it produces 20 gateways using SF 10 with an RSSI parameter of -69.53 dBm and a SINR parameter of 20.21 dBm, each gateway can cover 4-5 km2 in the planning area.
IMPLEMENTATION OF TEXT INDEXING SYSTEM IN WEB-BASED DOCUMENT SEARCH APPLICATION USING MONGODB Frankie Frankie; Yeremia Alfa Susetyo
Jurnal Teknik Informatika (Jutif) Vol. 4 No. 5 (2023): JUTIF Volume 4, Number 5, October 2023
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2023.4.5.959

Abstract

The rapid growth of information technology has led to an increase in the amount of data stored in databases every day. Relational databases (SQL) that have been in use for a long time are now being developed with the emergence of NoSQL databases such as MongoDB. MongoDB stores data in BSON format and has a Text Indexes feature that is useful for speeding up text search on string content. This feature is particularly useful in searching for data in the form of texts or strings in large quantities. MongoDB's Text Indexes have a flexible schema that does not require a strict schema structure to index text data, unlike SQL databases that require columns with the appropriate data type to perform indexing. MongoDB's Text Indexes support more languages than SQL because they use an open-source text search engine called Apache Lucene. In this study, the researcher will implement Text Indexing on document data (PDF) that has been converted into text, then inserted into MongoDB before indexing. Afterward, the researcher will compare the performance of search queries between indexed and non-indexed data in MongoDB in terms of speed. The comparison results will be presented in tables and graphs to facilitate understanding. Based on the research conducted, it can be concluded that the use of the text indexing feature in MongoDB can speed up keyword or string search time. In the experiment conducted using 5000 data records, the results showed that the use of text indexing for searching 1 keyword resulted in a search speed improvement of 11705,88%, for searching 2 keywords it was 60833,33%, and for searching 3 keywords it was 44320%.

Page 1 of 3 | Total Record : 30