Jurnal Informatika Dan Tekonologi Komputer (JITEK)最新文献

筛选
英文 中文
IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION 采用 C4.5 算法评估社区满意度
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1826
Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur
{"title":"IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION","authors":"Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur","doi":"10.55606/jitek.v3i2.1826","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1826","url":null,"abstract":"This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2 第二届下一代聚会锦鲤展打字应用指导活动
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1377
Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana
{"title":"KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2","authors":"Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana","doi":"10.55606/jitek.v3i2.1377","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1377","url":null,"abstract":"Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN 使用德隆和麦克莱恩方法分析市场用户对 facebook 应用的满意度
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1838
Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i
{"title":"ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN","authors":"Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i","doi":"10.55606/jitek.v3i2.1838","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1838","url":null,"abstract":"Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE 使用 owasp nikto 和 burpsuite 对 Dvwa 网站进行漏洞扫描的比较分析
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.908
Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha
{"title":"ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE","authors":"Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha","doi":"10.55606/jitek.v3i2.908","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.908","url":null,"abstract":"Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER 在确定客户购买模式时采用阿普里里算法
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1519
Hendra Gunawan, Efori Bu'ulolo
{"title":"IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER","authors":"Hendra Gunawan, Efori Bu'ulolo","doi":"10.55606/jitek.v3i2.1519","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1519","url":null,"abstract":"CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL 基于网络的人力资源信息系统(pt the master steel
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1846
Aris Sunandar, Henri Septanto
{"title":"PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL","authors":"Aris Sunandar, Henri Septanto","doi":"10.55606/jitek.v3i2.1846","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1846","url":null,"abstract":"Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL 电子文件应用设计作为分发定购单和基于网络的pt.ICOAC数字数据存储的媒介
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1844
Edi Kalsid, Henri Septanto
{"title":"RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL","authors":"Edi Kalsid, Henri Septanto","doi":"10.55606/jitek.v3i2.1844","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1844","url":null,"abstract":"A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE 基于移动设备的文本加密的 sha 算法实现
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1736
A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut
{"title":"IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE","authors":"A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut","doi":"10.55606/jitek.v3i2.1736","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1736","url":null,"abstract":"In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA 为 CV Loka 媒体的自由职业者开发一个与网络邮件档案应用程序相结合的工资单系统
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1856
Dion Fahrul, Henri Septanto
{"title":"PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA","authors":"Dion Fahrul, Henri Septanto","doi":"10.55606/jitek.v3i2.1856","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1856","url":null,"abstract":"Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"183 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA K 均值聚类法用于印度尼西亚自然灾害分布模式分析
Jurnal Informatika Dan Tekonologi Komputer (JITEK) Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1506
M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini
{"title":"CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA","authors":"M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini","doi":"10.55606/jitek.v3i2.1506","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1506","url":null,"abstract":"Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信