cover
Contact Name
Retno Wahyusari
Contact Email
retnowahyusari@gmail.com
Phone
+6282133338253
Journal Mail Official
retnowahyusari@gmail.com
Editorial Address
Jl. Kampus Ronggolawe No.1 Mentul Indah Cepu
Location
Kab. blora,
Jawa tengah
INDONESIA
Jurnal Ilmiah Informatika dan Komputer
ISSN : -     EISSN : 29621399     DOI : https://doi.org/10.51901/jiifkom.v3i1
JIIFKOM: Journal of Scientific Informatics and Computers is a journal that contains scientific papers from researchers, academics, and practitioners, in the form of research results, literature reviews, and/or other forms of scientific writing, which specifically examines the field of Computer Science, among others as follows : Computer Science: Artificial Intelligence, Machine Learning, Data Mining, Expert System, Decision Support System Informatics: Web Programming, Mobile Computing, Computer Networks, Making Information Systems, Database Systems, Security Systems
Articles 6 Documents
Search results for , issue "Vol 1 No 2 (2022): July" : 6 Documents clear
Penentuan Jenis Tomat Menggunakan Ekstraksi Ciri Bentuk dan Ukuran dengan Metode K-Means Devi Tiana Kartikasari; Retno Wahyusari
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.226

Abstract

Tomato plants are developed very rapidly, giving birth to new types of tomatoes. As a result, it is difficult for farmers to distinguish different types of tomatoes from one another. Determination of the type of tomato can be seen based on the size, shape, color and state of the skin of the fruit. One way to distinguish tomatoes from one another is to look at the characteristics of shape and size. Feature extraction is used so that it can be used as a differentiating reference for the type of tomato. Tomatoes are first converted from the original image or RGB to an HSV image then take the channel (S) from HSV for segmentation in order to get the value of extracting shape and size characteristics, grouping the types of tomatoes according to their respective types is by using the K-means method. The choice of the K-Means method is because besides being popular, it is also a simple and effective method. Ensuring that the process carried out gets accurate results, the calculation or process of determining the type of tomato can be added to help tools such as Rapid Miner and Matlab. Extraction of shape and size features with the K-means method was considered capable of distinguishing between types of tomatoes and can be grouped according to type. The number of data sets of 100 tomatoes with 5 types of tomatoes contained 11 points of error in the determination by the K-means method so that the accuracy obtained was 89%.
Analisis Serangan dan Keamanan pada Denial of Service (DOS): Sebuah Review Sistematik Covinia Dinda Berliana; Teguh Adi Saputra; indra gunawan
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.229

Abstract

Threats or attacks on networks or information systems can cause misuse of information in organizational performance. One of the threats or attacks on network security or information systems is Denial of Service (DoS). The risk of losing information assets to the organization can occur if there are signs of adequate protection. Appropriate security technology can be set as anticipation and protection from DoS attacks, it is necessary to map in advance between the types of threats or attacks with existing security technologies based on the aspect of confidentiality. Fail2ban, Wireshark, SDMD, Intrusion Detection System (IDS), and Firewalls are the security technologies of choice in anticipating and protecting networks or information systems in security aspects.Denial of Service; Analisis; Review Sistematik
Analisis Serangan dan Keamanan pada SQL Injection: Sebuah Review Sistematik Tino Imam Maulana Pratama; Muhammad Danni Fawwas Songida; indra gunawan
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.230

Abstract

The website is one of the most widely accessed information services by internet users in the world. As an information service, it is necessary to build a website that is able to handle requests from many users reliably. SQL Injection is a hacking action that is carried out in the client application by modifying the SQL commands that are in the client application memory and is a technique for exploiting web applications which use a database for data storage. SQL injection method is used to enter SQL commands as input on a website to gain access to the database. If the website database can be accessed, then a hacker can easily steal various confidential data, and can even manipulate or destroy data on the website.
Analisis Serangan Penetration Testing: Sebuah Review Sistematik Arya Kukuh Y; Geraldo Alfaren; indra gunawan
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.231

Abstract

In general, the penetration testing system process is often compared by junior system administrators to the system vulnerability assessment process. This mindset error has become a fatal error in managing computer system security. Vulnerability system assessment is a procedure for scanning for vulnerabilities in the system and filtering these weaknesses to avoid exploitation by hackers. This is clearly almost similar to the literal meaning of penetration testing which is the process of searching for vulnerabilities (weaknesses) and exploiting the system until the tester knows the real weak points of the system.
System Monitoring Calibration Oil and Gas Equipment at the Cepu Oil and Gas PPSDM Instrumentation Workshop Using Java Netbeans Muksan Junaidi; Nurul Saidah
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.238

Abstract

Information on calibration reports of oil and gas equipment at the Instrumentation Workshop at the Cepu Oil and Gas Human Resources Development Center (PPSDM Migas) is still not real time, and the filing of reports is still manual in a special cabinet. Often constrained in the process of searching for documents, and confusing information on repair status and recalibration schedule. The purpose of this study was to develop a Calibration Monitoring System for Oil and Gas Equipment at the Instrumentation Workshop at PPSDM Migas Cepu, to facilitate monitoring of the calibration process, search for data, reduce paper usage, and update information on equipment repair status. Research data from calibration reports in 2017 were 113 and in 2018 there were 79 reports. Using UML (Unified Modeling Language) modeling and Java Netbeans programming language. The results of the research are a monitoring system for equipment calibration at the Instrumentation workshop, and it has been tested functionally with blackbox testing, 97% successful in accordance with its function.
Aplikasi Sistem Informasi Jasa Make Up Berbasis Web Pada Studi Kasus IYAIYOH Make Up Muhammad Fatchan; Rohayati Rohayati
JIIFKOM (Jurnal Ilmiah Informatika dan Komputer) Vol 1 No 2 (2022): July
Publisher : Jurusan Informatika STTR Cepu

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51901/jiifkom.v1i2.241

Abstract

Make Up Artists (MUA) usually offer their services using social media such as Facebook and Instagram. However, through the media, it is still not optimal because it is difficult for customers to know the location and whether the make-up service can come directly to the customer's place or not. In the ordering process, lyaiyoh Make Up is still done manually, that is, it is recorded in a book and the customer must contact by telephone or come directly to the salon to place an order. The purpose of this research is to design a web-based make-up service information system that was built using the Waterfall method. The benefits of this research are making it easier to register and ordering for customers, more structured and directed data management so as to minimize errors in recording. The conclusion is that in addition to the data processing process that becomes computerized, this system can also be a promotional media for lyaiyoh Make Up services

Page 1 of 1 | Total Record : 6