Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur
{"title":"IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION","authors":"Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur","doi":"10.55606/jitek.v3i2.1826","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1826","url":null,"abstract":"This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana
{"title":"KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2","authors":"Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana","doi":"10.55606/jitek.v3i2.1377","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1377","url":null,"abstract":"Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN","authors":"Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i","doi":"10.55606/jitek.v3i2.1838","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1838","url":null,"abstract":"Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha
{"title":"ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE","authors":"Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha","doi":"10.55606/jitek.v3i2.908","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.908","url":null,"abstract":"Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER","authors":"Hendra Gunawan, Efori Bu'ulolo","doi":"10.55606/jitek.v3i2.1519","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1519","url":null,"abstract":"CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL","authors":"Aris Sunandar, Henri Septanto","doi":"10.55606/jitek.v3i2.1846","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1846","url":null,"abstract":"Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL","authors":"Edi Kalsid, Henri Septanto","doi":"10.55606/jitek.v3i2.1844","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1844","url":null,"abstract":"A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut
{"title":"IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE","authors":"A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut","doi":"10.55606/jitek.v3i2.1736","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1736","url":null,"abstract":"In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA","authors":"Dion Fahrul, Henri Septanto","doi":"10.55606/jitek.v3i2.1856","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1856","url":null,"abstract":"Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"183 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini
{"title":"CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA","authors":"M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini","doi":"10.55606/jitek.v3i2.1506","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1506","url":null,"abstract":"Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}