INFORMAL: Informatics Journal
Latest Publications


TOTAL DOCUMENTS

68
(FIVE YEARS 60)

H-INDEX

0
(FIVE YEARS 0)

Published By UPT Penerbitan Universitas Jember

2503-250x

2021 ◽  
Vol 6 (3) ◽  
pp. 170
Author(s):  
Hilman Nuril Hadi

Business process model was created to make it easier for business process stakeholders to communicate and discuss the structure of the process more effectively and efficiently. Business process models can also be business artifacts and media that can be analyzed further to improve and maintain organizational competitiveness. To analyze business processes in a structured manner, the effect/results of the execution of business processes will be one of the important information. The effect/result of the execution of certain activities or a business process as a whole are useful for managing business processes, including for improvements related to future business processes. This effect annotation approach needs to be supported by business process modeling tools to assist business analysts in managing business processes properly. In previous research, the author has developed a plugin that supports business analysts to describe the effects semantically attached to activities in the Business Process Model and Notation (BPMN) business process model. In this paper, the author describes the unit testing process and its results on the plugin of semantic effect annotation that have been developed. Unit testing was carried out using the basic path testing technique and has obtained three test paths. The results of unit test for plugin are also described in this paper.


2021 ◽  
Vol 6 (3) ◽  
pp. 177
Author(s):  
Muhamad Arief Hidayat

In health science there is a technique to determine the level of risk of pregnancy, namely the Poedji Rochyati score technique. In this evaluation technique, the level of pregnancy risk is calculated from the values ​​of 22 parameters obtained from pregnant women. Under certain conditions, some parameter values ​​are unknown. This causes the level of risk of pregnancy can not be calculated. For that we need a way to predict pregnancy risk status in cases of incomplete attribute values. There are several studies that try to overcome this problem. The research "classification of pregnancy risk using cost sensitive learning" [3] applies cost sensitive learning to the process of classifying the level of pregnancy risk. In this study, the best classification accuracy achieved was 73% and the best value was 77.9%. To increase the accuracy and recall of predicting pregnancy risk status, in this study several improvements were proposed. 1) Using ensemble learning based on classification tree 2) using the SVMattributeEvaluator evaluator to optimize the feature subset selection stage. In the trials conducted using the classification tree-based ensemble learning method and the SVMattributeEvaluator at the feature subset selection stage, the best value for accuracy was up to 76% and the best value for recall was up to 89.5%


2021 ◽  
Vol 6 (3) ◽  
pp. 121
Author(s):  
Hilyah Magdalena ◽  
Hadi Santoso ◽  
Litha Leonita

CV. Yusti Karya as a construction company realizes that the ability to manage project finances is an important requirement for smooth project management. CV.Yusti Karya often has to manage several projects simultaneously in remote locations. This condition makes it difficult for the finance staff in the office to manage project financial allocations and also makes it difficult for project managers in the field and must report the status of project expenditures to the office. This difficulty drives CV. YustiKarya improved the project's financial management system from using spreadsheets to a web-based information system. Web-based information system will be developed using object-oriented methods. The object- oriented system development method was chosen because of its modular development capabilities and adapts to system requirements. The development of this system aims to enable Person in Charge (PIC) projects in the field to submit expenditures and can be immediately approved by the financial staff in charge. Online project finance management between project PICs and finance staff helps harmonize financial management. The Director can monitor the flow of the latest project finance developments online.


2021 ◽  
Vol 6 (3) ◽  
pp. 102
Author(s):  
Izatun Nihayah ◽  
Anna Retno Indrawati ◽  
Rubby Harris ◽  
Irawan Syaifulloh ◽  
Yusuf Amrozi

The Supply Chain Management Information System combines several business processes across organizations from the initial organization to the end user. In the procurement of raw materials, the procurement of Covid-19 takes time and causes inventory. With the Supply Chain Management Information System, it is expected to simplify the procurement process and minimize shortages of goods so as to speed up patient handling. This study resulted in the design of an SCM information system that uses the waterfall model software development method which is useful for helping the health industry get the flow of information, goods, and money because the related parties have been integrated with the designed system.


2021 ◽  
Vol 6 (3) ◽  
pp. 197
Author(s):  
Nur Putrananda Setyapuji Winarno ◽  
Triawan Adi Cahyanto

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.


2021 ◽  
Vol 6 (3) ◽  
pp. 160
Author(s):  
Suharsono Bantun ◽  
Jayanti Yusmah Sari ◽  
Noorhasanah Z ◽  
Syahrul Syahrul ◽  
Arief Budiman

One of the basic functions of government is to provide public services. Even during the Covid-19 pandemic, these needs must still be met and optimally adjusted by service providers. The Palewai Village Office, is one of the local government agencies that does not escape its obligation to improve public service standards during this pandemic. However, based on observations, it was found that the performance of public services in the office was not optimal because population data processing was still manual and data storage media still used physical documents. Therefore, an online information system is needed that can provide clear and up-to-date information, as well as make it easier for people to fill out forms from anywhere so that there is no crowd in the service room. This study aims to develop a Website- Based Village Information System at the Palewai Village Office which will handle population data, services for making cover letters and distributing population data and current information for the community. The results of this study are a website-based village information system that can manage community data effectively and efficiently and can be accessed quickly and easily to provide information related to services at the Palewai Village office.


2021 ◽  
Vol 6 (3) ◽  
pp. 131
Author(s):  
Erick Irawadi Alwi ◽  
Lutfi Budi Ilmawan

The use of academic information systems (siakad) has become mandatory for universities in providing user convenience in online academic administrative activities. However, sometimes college siakad has security holes that irresponsible people can take advantage of by hacking. This study aims to identify security vulnerabilities at XYZ Siakad University. The method used in this study is a vulnerability assessment method. A university syakad will conduct an initial vulnerability assessment by doing footprinting to get information related to XYZ syakad after that a vulnerability scan is carried out using vulnerability assessment tools to identify vulnerabilities and the level of risk found. Based on the vulnerability of the XYZ university's vulnerabilities, it is quite good, with a high risk level of 1, a medium risk level of 6 and a low risk level of 14. Researchers provide recommendations for improvements related to the findings of security holes in XYZ university Siakad from XSS (Cross Site Scripting) attacks, Clickjacking, Brute Force, Cross-site Request Forgery (CSRF) and Sniffing.


2021 ◽  
Vol 6 (3) ◽  
pp. 108
Author(s):  
Afifah Ummi Sholihah ◽  
Christian Dwi Suhendra ◽  
Pawit Rianto

The Regional Representative Council of Indonesia Institute of Islamic Dakwah of Manokwari Regency has four departments from Al-Quran Education School which are required to report the attendance and achievements of students each month in their respective departments. This report will be presented to the parents and to the Head of the school for evaluation. Both of these assessments are still carried out manually so it is inefficient because the data will be easily lost or scattered. With these problems, the author did some researches to carry out the Design and Development of Information System for Assessment of Material Achievement and Student Attendance at Al-Quran Education School - Regional Representative Council of Indonesia Institute of Islamic Dakwah in Manokwari Regency. This research was conducted by creating an assessment input information system and responsive web-based data recap, using the Laravel framework, MySQL database and the research method used was the Prototype Method. At the final stage of this research is testing the system with the Black Box Method. The final result of this research is the formation of the Information System for Assessment of Material Achievement and Student Attendance for the Al-Quran Education School - Regional Representative Council of Indonesia Institute of Islamic Dakwah in Manokwari Regency. The test results show that the Prototype Method can be used in building the information system in question.


2021 ◽  
Vol 6 (3) ◽  
pp. 136
Author(s):  
Aski Widdatul Fuadah ◽  
Fajrin Nurman Arifin ◽  
Oktalia Juwita

Clustering is a process of grouping data based on similarities or similarities with other members in a group. Food security is the condition of a country to provide food for individuals, which does not conflict with beliefs, religion and culture and leads a healthy, active and productive life. Food instability and food insecurity can be caused by many factors, one of which is natural disasters. In 2020, Jember Regency experienced 121 natural disasters. Determination of the optimal K value is done to get the right number of group divisions from the clustering process, in this case using the elbow method. The data used in the clustering process are sub-districts in Jember Regency using transient attributes or natural disaster events. Based on the results of sub-district data grouping from the number of clusters k=1 to k=10, the optimal k value was found at the value of k = 4 with the SSE (Sum of Square Error) value = 24,809.


2021 ◽  
Vol 6 (3) ◽  
pp. 187
Author(s):  
Cepy Sukmayadi ◽  
Aji Primajaya ◽  
Iqbal Maulana

Flood disasters often occur during the rainy season. Karawang is one area that is often flooded. Based on the risk index from BNPB, the flood disaster in Karawang affected 84% of the community, so efforts need to be made to reduce and overcome flood disasters. These problems are the beginning of efforts that need to be known which areas are prone to flooding. Therefore, this study aims to determine flood-prone areas in Karawang as an initial effort in tackling flood disasters. The research was conducted by classifying flood-prone areas using the k-medoids algorithm. K-Medoids uses the partition clustering method to group lists and objects into a number of clusters. This algorithm uses objects in a collection of objects that represent a cluster. The attributes used are flood-causing factors such as rainfall, elevation (soil height), population density, and distance to the river. The results of the study found three potential floods, namely low, medium, and high. There are 1 sub-district with low flood potential, 24 sub-districts with moderate flood potential, and 5 sub-districts with high flood potential. The test results using the silhouette coefficient get a value of 0.370.


Sign in / Sign up

Export Citation Format

Share Document