Jurnal Teknik Informatika dan Sistem Informasi
Latest Publications


TOTAL DOCUMENTS

285
(FIVE YEARS 150)

H-INDEX

2
(FIVE YEARS 0)

Published By Maranatha Christian University

2443-2229, 2443-2210

Author(s):  
I Gusti Ayu Agung Mas Aristamy ◽  
Zain Alaik

Every educational institution provides scholarships that are offered to its students with specified requirements, as well as at SMK Negeri 1 Sukawati. Students who receive scholarships are students who meet the requirements and criteria that have been determined. The criteria determined are report cards, absenteeism, achievement, organizational involvement, and violations. However, some problems arise when determining the prospective recipients of achievement scholarships at SMKN 1 Sukawati, particularly many students who have achievements outside of school activities or non-academic achievements do not get scholarships. One of the criteria-set is to have achievement, which means achievement is not only academic achievement but also non-academic. The design of a system that can provide recommendations to decision makers is needed, so that it is right on target in providing opportunities for students who meet the criteria considered. The Simple Additive Weighting (SAW) method is used in this study because it can choose the best alternative from several alternatives. The results obtained in this study in the form of ranking and then make a recommendation to receiving a scholarship.


Author(s):  
Daniel Apdianto Herman ◽  
Andy Kho

In-game currency can be used to purchase various in-game items, especially in online games. In addition, in-game currency is also widely traded by players in certain online games. This eventually causes the potential for scam in buying and selling in-game currency to increase. This happened because there is no place that can be used by players to do transactions safely. The purpose of this research is to design and develop an e-marketplace for in-game currency using the Extreme Programming method which consists of planning, design, coding, and testing stages. This in-game currency e-marketplace application will be developed using the Laravel framework, which is one of the open-source PHP frameworks. The result of this research is an e-marketplace application that can be used by in-game currency buyers or sellers to do buying and selling easily and safely. With this e-marketplace, buying and selling in-game currency transactions will be easier, faster, and also scam-free


Author(s):  
Heri Purwanto ◽  
Taupik Ridwan ◽  
Yanwar Aryanggara

One of the current operational activities of PT. Geoff Maksimal Jaya is the distribution of goods, every item that has been produced will be stored in the warehouse to be entrusted or distributed to shops, wholesalers, and other related parties. However, data documentation activities related to the distribution of these goods are still carried out manually, so that access to obtain any information is still limited. In response to these problems, the purpose of this study was made to get easy access to information by utilizing the BlueSeer ERP application as a reference for designing information systems. The development method used in this research is the waterfall. It is hoped that this can help companies access information on operational activities of distributing goods effectively and efficiently. In the future, this research can be developed by adding several other aspects such as monitoring the delivery of goods in order to cover the complete access to information on operational activities of the distribution of goods.


Author(s):  
Natanael Christianto ◽  
Wiwin Sulistyo

Network security is the main of the development of today's technology. The ease in accessing the internet also requires protection on users is required. The ease of accessing the internet by people can also cause the occurrence of cyber crime. Cyber crime can be done by all internet users, without exception, to earn a profit. Security monitoring system server through the app messenger Telegram can help administrators in the work because always be on standby in front of the server computer. Notice of Snort as IDS via Telegram also quicked and can be accepted anywhere. In taking action when the server something happened not too late. Target cyber crime also can attack anyone without exception. A system should be a strength, with the protection of a secure network that will be difficult to hack by hackers. The server is the main target in the conduct of cyber crime. The use of the server must maintain to secure all the data is not misused by persons who are not responsible. Each server is a system that should be an administrator as a guard on duty watching and taking action when something happens on the server. To monitor a server, an administrator should always standby in front of the server computer so as not to late take action when the server is about to happen something.


Author(s):  
Arjun Sirojul Anam ◽  
Faris Muslihul Amin ◽  
Mujib Ridwan

Extracurricular activities at MAN 1 Lamongan are still determined without any support from the system. Students are only given extracurricular information and can register according to the conditions if interested. This makes the extracurricular that students have chosen does not fully match their abilities. The result is a decrease in the number of members who are active in extracurricular activities due to loss of interest. A web-based system was developed to assist MAN 1 Lamongan in determining extracurricular according to interests and talents. Case-Based Reasoning (CBR) is the system framework and Certainty Factor (CF) is the algorithm for determining the certainty value. The result is that with test data of 68 students, the system recommends extracurricular well. Testing with Confusion Matrix obtained precision level of 96.03% (high), recall of 99.4% (high), accuracy of 95.76% (high)


Author(s):  
Gary Dimitri Hamidi ◽  
Farida Afira Bestari ◽  
Alexandra Situmorang ◽  
Nur Aini Rakhmawati

Rancangan Undang-Undang Penghapusan Kekerasan Seksual (RUU PKS), or the bill of the Republic of Indonesia on the Elimination of Sexual Violence, is a bill that discusses sexual violence, victim protection and its scope concern the matters related to sexual violence. Elimination of sexual violence according to the PKS Bill aims to prevent all forms of violence. These discussions and conversations also occur on social media, especially on Twitter. Taking public sentiment is significant in choosing the proper messages, interference, and policy. Sentiment analysis is a field of study that analyses opinions, sentiments, judgments, evaluations of a person attitudes and emotions regarding a particular topic, service, product, individual, organization or activity. This study used the method of crawling to get data from Twitter. Then data cleansing, data processing is carried out using Bernoulli, Logistic Regression, and Support Vector Classification (SVC) algorithm. The data is then evaluated using three methods: accuracy, classification report, and confusion matrix. Based on the three algorithms used, it is found that all methods are equally accurate with 0.65. This study found positive, negative, and neutral sentiments expressed to the bill of Elimination of Sexual Violence through comments. It is shown that most people using the keyword “RUU PKS” are positive to the bill of Elimination of Sexual Violence (RUU PKS) while most people’s sentiments using #RUUPKSBukanSolusi are negative to the bill.


Author(s):  
Raden Budiarto Hadiprakoso ◽  
I Komang Setia Buana

Facial recognition-based biometric authentication is increasingly frequently employed. However, a facial recognition system should not only recognize an individual's face, but it should also be capable of detecting spoofing attempts using printed faces or digital photographs. There are now various methods for detecting spoofing, including blinking, lip movement, and head tilt detection. However, this approach has limitations when dealing with dynamic video spoofing assaults. On the other hand, these types of motion detection systems can diminish user comfort. As a result, this article presents a method for identifying facial spoofing attacks through Convolutional Neural Networks. The anti-spoofing technique is intended to be used in conjunction with deep learning models without using extra tools or equipment. Our CNN classification dataset can be derived from the NUAA photo imposter and CASIA v2. The collection contains numerous examples of facial spoofing, including those created with posters, masks, and smartphones. In the pre-processing stage, image augmentation is carried out with brightness adjustments and other filters so that the model to adapt to various environmental conditions. We evaluate the number of epochs, optimizer types, and the learning rate during the testing process. The test results show that the proposed model achieves an accuracy value of 91.23% and an F1 score of 92.01%.


Author(s):  
Christianti Angelin Maarende ◽  
Danny Sebastian ◽  
Restyandito Restyandito

The situation and condition of the spread of Covid-19 in Indonesia have forced everyone to reduce the intensity of going out of the house, including activities related to the need for health services. Therefore, a solution is needed so that people can meet their health needs without leaving the house. Taking into account that the elderly as the community group that is most vulnerable to contracting the virus and has the highest mortality rate, it can be said that the elderly is the group of people who most need online health services. Along with the growing penetration of internet usage and the increasing number of smartphone ownership in Indonesia, m-health is the right choice to help people access health services online via smartphones. KlikDokter is an example of m-health or a mobile-based application that provides various online health services. However, it was found that there were complaints that the KlikDokter application was too complicated and difficult for the elderly to use. From this problem, a usability test was finally carried out on the KlikDokter application interface, to identify what interface elements in the KlikDokter application were difficult for elderly users. The research respondents were divided into two groups with 16 and 17 people respectively. The first group is the elderly group aged >60 years. And the second group is the pre-elderly group with ages between 45 to 59 years. A pre-elderly group is a comparison group (control group). This test is carried out by measuring several aspects of usability, namely effectiveness, efficiency, user satisfaction, error, and cognitive load.


Author(s):  
Julianti Kasih ◽  
Doro Edi ◽  
Radiant Victor Imbar

Success in a career is everyone's dream, and it is not an exception for Information Technology graduates who are engaged in information technology-related jobs. Several studies have documented the role of the following two (2) constructs, namely Career Competence (CC) and Lecturer Competence (LC), in Career Success (CS). The authors believe that University Commitment (UC) must be included in this list. This research aims at developing a model that explains and measures the relationship amongst those four (4) constructs. The model that will be developed is based on the Structural Equations Modelling Technique. Respondents participating in this research are IT graduates working in IT-related jobs who have graduated from three (3) private universities in Bandung (Indonesia), namely, Maranatha Christian University (UKM), Parahyangan Catholic University (UNPAR), and Harapan Bangsa Institute of Technology (ITHB)) with graduating years ranging from 2006 to 2018. The collected data will be processed using IBM SPSS AMOS. This research proves that firstly, LC influences both UC and CC, secondly, UC influences CC, and lastly, CC affects CS. Further hope this model can be developed for other universities in Indonesia to increase Lecture Competency and University Commitments by the strategic plans of each university.   Respondents participating in this research are IT graduates working in IT-related jobs who have graduated from three (3) private universities in Bandung (Indonesia), namely, Maranatha Christian University (UKM), Parahyangan Catholic University (UNPAR), and Harapan Bangsa Institute of Technology (ITHB)) with graduating years range from 2006 to 2018. The collected data will be processed using IBM SPSS AMOS. This research proves that firstly, LC influences both UC and CC, secondly, UC influences CC, and lastly, CC affects CS. Further hope this model can be developed for other universities in Indonesia to increase Lecture Competency and University Commitments by the strategic plans of each university.   Keywords— Department of Information Technology, Career Success, Commitment of Higher Education Lecturer Competency, Career Competence


Author(s):  
Adelia Adelia ◽  
Tiur Gantini ◽  
Victor Kurniawan

Education providers, one of which is a private university in Bandung, conducts entrance exams for student participants through a computer-based test system. In the entrance examination, which is carried out is a test of academic potential and human biology. Every question that belongs to both the TPA and human biology questions is stored in the university's computer-based test system. The saved questions can be used at any time, during the entrance examination period. The stored questions need to be analyzed and reviewed, with the aim that the questions can be used properly and can maintain the quality of the questions given to each examinee. In this study, an analysis of the level of difficulty and effectiveness of the distractor will be carried out. This analysis is carried out using data from 2018 to 2020 stored in the system.


Sign in / Sign up

Export Citation Format

Share Document