Infotech: Journal of Technology Information
Latest Publications


TOTAL DOCUMENTS

103
(FIVE YEARS 88)

H-INDEX

0
(FIVE YEARS 0)

Published By Sekolah Tinggi Manajemen Informatika Dan Komputer (STMIK) Widuri

2620-5181, 2460-2108

2021 ◽  
Vol 7 (1) ◽  
pp. 27-34
Author(s):  
Akip Maulana Ibrahim ◽  
Didik Setiyadi

Internet of Things (IoT) is a concept with the aim of expanding internet network connectivity that is connected to a global network. The Internet of Things (IoT) can be used to remotely control electronic devices such as lights and air conditioners via the internet. This study aims to create a control device that utilizes internet network technology and uses the telegram application to carry out the control process. There are four control features, namely lamp control which is used to turn on one lamp, the second feature is overall lamp control to turn on all lamps at one time, the third feature controls turning on and off the AC, the fourth feature can monitor lamps and the AC is on or off . The research method used in the manufacture of this control device is the Prototype method, which is considered very suitable for use and this device uses the nodeMCU ES8266 microcontroller. The results of this study are the use of Telegram can help and facilitate users or users in monitoring and controlling lights and air conditioners when not in the house.


2021 ◽  
Vol 7 (1) ◽  
pp. 35-40
Author(s):  
Tupan Tri Muryono ◽  
Ahmad Taufik ◽  
Irwansyah Irwansyah

The banking world in terms of providing credit to customers is a regular activity that has a large effect. In its application, non-performing loans or bad loans are often created due to poor credit analysis in the credit granting process, or from bad customers. The purpose of this study is to compare the results of algorithm accuracy between K-Nearest Neighbor (K-NN), Decision Tree, and Naive Bayes which results in the best accuracy will be implemented to determine creditworthiness. The attributes used in this study consisted of 11 attributes, namely marital status, number of dependents, age, last education, occupation, monthly income, home ownership, collateral, loan amount, length of loan and information as result attributes. The methods used in this research are K-Nearest Neighbor, Decision Tree, and Naive Bayes. From the results of evaluation and validation using k-5 fold that has been carried out using RapidMiner tools, the highest accuracy results from a comparison of 3 algorithms is using a decision tree (C4.5) of 98% in the 3rd test.


2021 ◽  
Vol 7 (1) ◽  
pp. 41-46
Author(s):  
Jusia Amanda Ginting ◽  
I Gusti Gusti Ngurah Suryantara

Awareness of information security will be a priority in the event of data loss or damage. This certainly harms the performance of a company or organization due to unpreparedness to resolve or minimize risks that can occur. The impact that occurs on the security system used is that the system cannot provide a sense of security because the system used and has security holes that can be used to exploit systems and networks at XYZ University. This study aims to examine the internal and external security controls of the system by identifying threats that can pose serious problems to assets at XYZ University by using the penetration testing method, the results can be used as a benchmark in measuring the weaknesses of the network and system from external attacks. The goal is to implement preventive controls against risks that can occur to improve system security at XYZ University.


2021 ◽  
Vol 7 (1) ◽  
pp. 1-6
Author(s):  
Hari Santoso ◽  
Sugesti Sugesti ◽  
Notatema Anugrah Gea

Medical record is a file that contains records about the patient's identity, examination, treatment, actions and other health services to patients. The speed of obtaining data and processing of data is very much needed in the current technological era. With the development of technology makes people think to be able to work more effectively and efficiently. One of them is making a conventional system into a computerized system. By utilizing website facilities that are connected to the internet, medical records can be more effective and efficient in searching and recording medical history. In this research a web-based information system is designed using the PHP programming language and MySQL database using the waterfall method as its research method. With this system, it is expected to be able to overcome the various needs of users to search for patient data and perform data processing as well as facilitate users in making reports. From the results of research and design that has been implemented to produce medical record applications that facilitate the processing of patient data.


2021 ◽  
Vol 7 (1) ◽  
pp. 7-18
Author(s):  
Goldie Gunadi ◽  
I Ketut Sudaryana

In connection with the need for making instructional media applications by teachers in the distance learning process, PT. Bangun Satya Wacana (BSW) through the Diginusa department held training on the use of the Scratch visual programming application to create learning materials such as games, animations and interactive quizzes. Scratch is a graphical programming language using drag and drop command blocks. Besides that, Scratch can be used both online and offline, so it is very helpful for the distance learning process (DLP). This research aims to see how the level of acceptance of teachers to Scratch using the Technology Acceptance Model (TAM) method. The indicators measured are Self-Efficacy, Complexity, Perceived Usefulness, Perceived Ease of Use, Intention to Use and Actual Technology Use, then analyzed by linear regression method with the help of IBM SPSS software. From the results of the analysis carried out, it can be seen that the Intention to Use affects the Actual Technology Use. Perceived Usefulness and Perceived Ease of Use together affect the Intention to Use. Perceived Ease of Use, Self-Efficacy and Complexity together have a significant effect on Perceived Usefulness.


2021 ◽  
Vol 7 (1) ◽  
pp. 55-62
Author(s):  
Evaristus Didik Madyatmadja ◽  
An Nisa’a Nuramalia ◽  
Lusi Kusumawati ◽  
Syahlaa Perdina Jamil ◽  
Wahyu Kusumawardhana

The purpose of this study is to analyze and visualize internet usage data in the Jabodetabek area for the last 3 years, namely 2017, 2018, 2019 using quantitative methods which will display data per city and per year which is processed into the percentage of internet usage in the area. In addition, we also used the K-means clustering method as a method of grouping data and we chose to use the age variable for analysis. Along with the development of information technology, governments in various regions have also begun to expand the circulation of the internet to broaden people's insights and disseminate information more easily. However, in the current situation and conditions, it is felt that the distribution of internet use, especially in the Jabodetabek area, is still not optimal. Even though the area is a metropolitan city as the center of urban community activity. Therefore, through data on the percentage of Jabodetabek areas that access the internet, it can be seen as one of the factors for the government to be able to increase the performance of the internet evenly. The data will be visualized using the Tableau application in graphical form to facilitate information delivery to users in reading the results of data analysis.


2021 ◽  
Vol 7 (1) ◽  
pp. 19-26
Author(s):  
Nur Rofiq ◽  
Agung Perdananto ◽  
Nur Jaya

The Waterfall Model is also very widely used by organizations and is developed with certain software whose results can overcome changes and weaknesses. This research is designed to manage the data of 'Jawara' customers because currently, they are still using a semi-computerized method that only writes them down in a book list. This study uses a qualitative approach with descriptive analysis with stages, namely system engineering, analysis, design, code generation, and the Waste Bank application testing. The application of the waterfall model in the Waste Bank information system application is a solution in the use of previously still recording customer waste deposits in Excel files, making quick and detailed waste price list reports, simplifying customer data processing, accelerating the search for required information and making it easier for customers to view a history of withdrawal and deposit transactions that previously still used semi-computerized methods. The result of this research is an application that has been made into a solution in making quick and detailed waste price list reports, simplifying customer data processing and speeding up information search, viewing withdrawal and deposit transaction history.


2021 ◽  
Vol 7 (1) ◽  
pp. 47-54
Author(s):  
Maria Febrianti Pela ◽  
Rully Pramudita

All work and human needs are highly dependent on the presence of electrical energy, especially on household needs. Human negligence in using electrical energy will cause waste in the use of electrical energy which causes soaring payments among households. This study aims to examine the application of monitoring the electrical power used in the connection of these devices remotely via the internet. The system can be implemented using NodeMCU ESP8266, PZEM-004T sensor, Liquid Crystall I2C, and the Blynk application as a user interface system on a smartphone. To be able to monitor through the Blynk application, the user must be connected to the internet and the microcontroller must be connected to the internet network. This system using the internet network will make it easier to monitor electrical power in electronic devices at home every day. The results of this study are the prototype of the electrical power monitoring system using the Blynk application can help and facilitate homeowners in monitoring electrical power when the homeowner is not at home.


2020 ◽  
Vol 6 (2) ◽  
pp. 83-90
Author(s):  
Ridho Syukuryansyah ◽  
Didik Setiyadi ◽  
Syahbaniar Rofiah

Technology in this modernization era helps many workers and human needs. Various fields have been encroached upon by technology and one cannot be released again, one of which is security systems. The need for increased security is based on human needs for a sense of comfort with the assets they have in a safe condition and can be monitored from anytime and anywhere. This research aims to build a security system using RFID and Arduino which can be monitored through the website. An early warning system for unknown objects is also embedded therein using a magnetic switch sensor on the door, buzzer to create sound frequencies that can attract the attention of the surrounding environment and the Arduino camera module to capture images of objects. The results of this research RFID can facilitate access in and out of the door and increase security compared to conventional keys. Only registered / known objects can access the room through the door. In and out activities are monitored through a website that can be accessed anytime and anywhere.


2020 ◽  
Vol 6 (2) ◽  
pp. 75-82
Author(s):  
Ade Davy Wiranata ◽  
Hafid Sulistyo Rachman ◽  
Yazid Saifudin

The Banjarmasin City Agriculture and Fisheries Office in providing innovation desperately needs a management that can manage an organization to be more structured with the specified procedures. The problem in this study is that there is no application program for processing data. The purpose of this research is to create and implement management applications that can help facilitate and accelerate the management of laboratory data at the Banjarmasin City Agriculture and Fisheries Office. The data collection methods used are interviews, observations, and review literature while the research methods used use SDLC waterfall. The result of this research is that the application that has been created can be used to facilitate and speed up the processing of data at the Office of Agriculture and Fisheries Banjarmasin City.


Sign in / Sign up

Export Citation Format

Share Document