{"title":"PERBANDINGAN KUALITAS JARINGAN 4G LTE ANTARA TIGA OPERATOR MENGGUNAKAN METODE DRIVE TEST DI PANTAI PARIAMAN TENGAH","authors":"Afrizal Yuhanef, Siska Aulia, Oktarina Permata Yaseva","doi":"10.26798/jiko.v7i2.886","DOIUrl":"https://doi.org/10.26798/jiko.v7i2.886","url":null,"abstract":"Kawasan Pantai Pariaman Tengah memiliki potensi pada sektor pariwisata yang bernilai tinggi dengan jumlah pengguna layanan telekomunikasi yang semakin meningkat. Oleh karena itu, penting untuk menilai kualitas jaringan 4G LTE (Long Term Evolution) dari operator yang tersedia di kawasan tersebut. Penelitian ini dilakukan untuk menguji performansi kualitas jaringan pada tiga jenis operator, yaitu Telkomsel, XL Axiata, dan H3I dengan metode drive test yang menggunakan Idle Mode dan software TEMS Pocket. Parameter kualitas jaringan yang dinilai adalah RSRP (Received Signal Reference Power), RSRQ (Received Signal Reference Quality), dan SINR (Signal to Interference and Noise Ratio). Adapun persentase yang termasuk dalam kategori diatas normal atau dalam range hijau dan biru dijumlahkan dan kemudian dibandingkan antara ketiga operator. Berdasarkan hasil analisis, jumlah persentase RSRP dari operator Telkomsel","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133713727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SISTEM PENDUKUNG KEPUTUSAN PENENTUAN PESERTA DIDIK TERBAIK DENGAN METODE WEIGHTED PRODUCT","authors":"Eka Sulastarih, Eka Rini Yulia","doi":"10.26798/jiko.v7i2.818","DOIUrl":"https://doi.org/10.26798/jiko.v7i2.818","url":null,"abstract":"Pendidikan jenjang menengah atas tidak terlepas dari proses penilaian peserta didik. SMA Putra Bangsa merupakan Sekolah Menengah Atas yang penyelenggaraannya mengikuti standar penilaian dengan acuan Sistem Pendidikan Nasion-al. Penyelenggaraan pembelajaran diawali dengan proses belajar mengajar dan diakhiri dengan proses penilaian. Sebagai apresiasi sekolah terhadap peserta didik yang telah mengikuti proses belajar dengan baik maka sekolah memberikan penghargaan kepada peserta didik terbaik. Implementasi penentuan peserta didik terbaik masih dilakukan secara manual dengan hanya melihat satu aspek saja, sehingga hasilnya tidak objektif. Sistem Pendukung Keputusan digunakan untuk mengambil keputusan dalam situasi yang semi terstruktur dan terstruktur dengan menyiapkan informasi yang interaktif, permodelan dan manipulasi data sehingga SPK dapat mendukung seluruh tahapan keputusan mulai dari mengidentifikasi masalah, memilih data yang relevan","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"1017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134101049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KOMPARASI ALGORITMA DECISION TREE DAN KNN DALAM MENGKLASIFIKASI DAERAH BERDASARKAN PRODUKSI LISTRIK","authors":"Muhammad Alfathan Harriz, Harlis Setiyowati","doi":"10.26798/jiko.v7i2.787","DOIUrl":"https://doi.org/10.26798/jiko.v7i2.787","url":null,"abstract":"contoh untuk","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133708548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Hayati, Yulita Salim, Hasriwiani Habo Abbas, R. Anugrah, Herawati Herawati, Ihwana As’ad, Muflih Awaluddin
{"title":"BACKWARD CHAINING METHOD UNTUK DIAGNOSA PENYAKIT BINTIK MERAH PADA KULIT BAYI MENGGUNAKAN APLIKASI BERBASIS WEB","authors":"L. Hayati, Yulita Salim, Hasriwiani Habo Abbas, R. Anugrah, Herawati Herawati, Ihwana As’ad, Muflih Awaluddin","doi":"10.26798/jiko.v7i2.788","DOIUrl":"https://doi.org/10.26798/jiko.v7i2.788","url":null,"abstract":"Weak immunity or the baby’s immune system makes it very susceptible to bacteria, germs and disease. Babies have difficulty explaining their complaints. Therefore, parents are expected to catch everybody’s language from their children. In general, if a child has health problems, parents will check with a health service provider and consult with health workers who are experts in their field","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130211329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALISIS PENYADAPAN PADA TELEGRAM DENGAN NETWORK FORENSIC","authors":"Nadiya Citra Dewi, Tata Sutabri, Ferry Putrawansyah","doi":"10.26798/jiko.v7i2.789","DOIUrl":"https://doi.org/10.26798/jiko.v7i2.789","url":null,"abstract":"Telegram adalah ebuah aplikasi layanan pesan instan multiplatform berbasis cloud yang bersifat gratis dan nirlabadan mampu bersaing dengan aplikasi whatsapp (WA). Telegram mampu meningkatkan berbagai fitur yang belum dikembangkan WA dari berbagai posisi. Diantarnya pengiriman file besar yang mampu dikirim melalui telegram. Fitur ini tentunya dapat mempermudah pertukaran informasi maupun data. Telegram juga memberikan celah keamanan yang melibatkan kedua device yakni smartphone dan computer. Penanganan tindak kejahatan yang melibatkan piranti digital perlu ditekan sehingga dapat membantu proses peradilan akan efek yang ditimbulkanya. INvestigasi forensic digital turut berperan serta terhadap penindakan penyalahgunaan fitur layanan pesan instan telegram diantaranya Langkah investigasi penanganan kasus penyadapan percakapan telegram melalui serangkaian tahapan baku sesuai proses dan prosedur forensika digital. Eksplorasi barang bukti (Digital evidence) percakapan telegram akan menjadi acuan akan tindak kejahatan penyadapan telekomunikasi yang selanjutnya akan dilakukan report investigation forensics yang melibatkan barang bukti smartphone dan computer korban. Mobile Forensic Analysis dan Investigation pada smartphone Android dan aplikasi ganda berbasis web browser. Database QR Code membutuhkan autentikasi terhadap smartphone hanya sekali setiap saat login pertama kali sehingga dibutuhkan kewaspadaan penggunanya seperti penggunaan pattern lock pada smartphone dan login user password pada komputer penggunanya. Proses akuisisi langsung terhadap smartphone korban dan analisis web browser pada komputer.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116254372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HYPERPARAMETER TUNING ON RANDOM FOREST FOR DIAGNOSE COVID-19","authors":"Anna Baita, Inggar Adi Prasetyo, Nuri Cahyono","doi":"10.33387/jiko.v6i2.6389","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6389","url":null,"abstract":"Diagnosis of Covid using the RT-PCR (Reverse Transcription Polymerase Chain Reaction) test requires high costs and takes a long time. For this reason, another method is needed that can be used to diagnose Covid-19 quickly and accurately. Random Forest is one of the popular classification algorithms for making predictive models. Random forest involves many hyperparameters that control the structure of each tree, the forest, and its randomness. Random Forest is a method which very sensitive to hyperparameter values, as their prediction accuracy can increase significantly when optimized hyperparameters are predefined and then adjusted according to the procedure. The purpose of doing hyperparameter tuning on the random forest algorithm is to increase accuracy in the diagnosis of covid-19. Searching for optimal values of hyperparameters is done by the Grid Search method and Random Search. The result explains that the Random Forest can be used to diagnose Covid-19 with an accuracy of 94%, and with hyperparameter tuning, it can increase the accuracy of the random forest by 2%.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115805464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ananda E S Setyadji, Arief R R Putrananda, Daffa H Permadi, Rais I Nustara, Reyhan B Pratama, Tegar A Masyhuda, Eva Hariyanti
{"title":"CAUSES OF INEFFECTIVE IMPLEMENTATION OF IT GOVERNANCE IN RISK MANAGEMENT: A SYSTEMATIC LITERATURE REVIEW","authors":"Ananda E S Setyadji, Arief R R Putrananda, Daffa H Permadi, Rais I Nustara, Reyhan B Pratama, Tegar A Masyhuda, Eva Hariyanti","doi":"10.33387/jiko.v6i2.6182","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6182","url":null,"abstract":"Information Technology Governance is currently widely implemented in companies. One of the domains that can be of concern is risk management. The application of TKTI in this domain can help companies identify, evaluate, reduce, and manage risks related to their business to achieve company goals better. In this case, three frameworks can be considered, including NIST, ISO 27001, and Octave, but implementing these frameworks only sometimes goes as planned. This study aims to identify the factors that cause the ineffectiveness of implementing Information Technology Governance (ITG) in the risk management domain using the NIST, ISO 27001, and Octave frameworks. Through an analysis of existing literature and data processing, this study found that factors such as lack of understanding of the framework, lack of adequate resources, and implementation challenges play an essential role in ineffectiveness. This study concludes by providing valuable insights for organizations seeking to strengthen their risk management capabilities.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Effectiveness of Deep Learning in Analyzing Review Sentiment","authors":"Mariyanto Totox, H. Pardede","doi":"10.33387/jiko.v6i2.6372","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6372","url":null,"abstract":"This study aimed to analyze sentiment in office product reviews by using word embedding with three neural network modeling approaches: Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM), and Gated Recurrent Units (GRU). Office product review data is taken from Amazon's reviews of office products covering a wide range of sentiments. Word embedding converts text into a numerical vector representation for neural network processing. Experimental comparison of this model reveals that CNN achieves the highest accuracy, 77.99%. The CNN model effectively extracts significant features from review text, improving sentiment classification performance. Although the LSTM and GRU models show satisfactory results, they do not match CNN performance. These findings demonstrate the effectiveness of word embedding and neural networks for sentiment analysis in office product reviews. This provides valuable insights for companies to improve their products based on user feedback from online reviews. Additionally, this research serves as a foundation for further advances in sentiment analysis across a wide range of other products and services","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123534992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THE IMPLEMENTATION OF NETWORK SERVER SECURITY SYSTEM USING HONEYPOT","authors":"Faldi Faldi, Dinamita Romadoni, M. T. Sumadi","doi":"10.33387/jiko.v6i2.6385","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6385","url":null,"abstract":"Network Server security is an important aspect of ensuring the integrity and availability of information systems. This research aims to implement network Server security at Muhammadiyah University of East Kalimantan using Honeypot technology. Honeypots are used to attract the attention of attacks and monitor suspicious activities on the network. The research method used is NDLC (Network Development Life Cycle), which includes the design and implementation of Honeypots, as well as the collection and analysis of detected attack data. The research results show that by using three attack techniques, namely Slowloris attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, GoldenEye attack with a Honeypot processing time of 2 seconds and Snort processing time of 180 seconds, and LOIC tools with a Snort processing time of 180 seconds. Honeypots cannot identify DDoS attacks because they focus more on attacks such as penetration attempts or other suspicious activities.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126304656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HARNESSING THE POWER OF PROTOTYPING METHOD FOR ENGAGING RESPONSIVE WEB PROFILES","authors":"Ananto Tri Sasongko, Sunita Dasman","doi":"10.33387/jiko.v6i2.6399","DOIUrl":"https://doi.org/10.33387/jiko.v6i2.6399","url":null,"abstract":"This research discusses the implementation of the prototyping method in enhancing institutional visibility through the development of responsive web profiles. Institutional visibility is key to achieving success and sustainable growth in today's digital era. Developing a responsive web profile increases visibility by providing optimal user experience across various devices and screen resolutions effectively. The prototyping method was the primary approach in developing this responsive web profile. It allows developers to create initial models that can be tested and evaluated before the full development of the web profile. The research explains the steps in developing a responsive web profile using prototyping. The results show that this method offers an efficient and practical approach to creating a responsive web profile, ensuring user satisfaction, and meeting the increasing expectations of users. Therefore, institutions should consider applying this prototyping method to strengthen their visibility through innovative, responsive web profiles. Responsive web profiles enable institutions to reach and engage their target audience through different devices, enhancing user engagement and providing consistent user experiences. The result shows that prototyping enhances institutional web profiles, improves user experience, and effectively increases visibility with high satisfaction, with an average of 83.2.","PeriodicalId":243297,"journal":{"name":"JIKO (Jurnal Informatika dan Komputer)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128240121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}