{"title":"Implementation of Database Distributed Sharding Horizontal Partition in MySQL. Case Study of Application of Food Serving On Kemkes","authors":"Samidi Samidi, Ronal Yulyanto Suladi, Ario Bambang Lesmana","doi":"10.38101/sisfotek.v12i1.477","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.477","url":null,"abstract":"In today's digital era, database systems are becoming a mandatory thing that is used in every industry field to improve the performance of the industry, over time with the increasing need for databases, single databases and single servers are considered less capable in handling data that continues to increase in number, so it often leads to a decline in performance. Therefore came the idea of centralized data storage that can be modified to accommodate the availability, scalability, reliability, and management of data. One way that can be done is to apply Distribute Database using Sharding Horizontal Partition technique and experimental methods using mariadb and spider engine. The test was carried out on the database of food processing sites (TPP) in the TPP application at the ministry of health. The test results prove that although in some journals about Sharding, more sharding is implemented on NoSQL DBMS such as MongoDB, influx dB. In this study it can be proven that sharding can also be done in relational DBMS such as MariaDB and MySQL, data can be distribute and load process too, test result successful although the performance of time query response is still better single database than distribute database.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121661789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Build a Holomatrix-Based Tactical Combat Simulation Application","authors":"Galih Ashari Rakhmat, Rizki Fauzian","doi":"10.38101/sisfotek.v12i1.474","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.474","url":null,"abstract":"The application of Holomatrix-based information technology advances in the training process as a form of training technology system innovation model to meet the challenges of future tasks, training systems in the military environment, must be implemented in order to be able to provide realistic training in accordance with the description of the actual operating field. In this study, a Holomatrix-based Tactical Combat Simulation Application has been designed that can be used by every member of the various branches of the military, especially the Indonesian Army. The system built and upgraded will provide troops with an overview of modern Holomatrix-based simulations. By using a computer that is able to evoke a three-dimensional atmosphere so that it can display as if it were a physical 3D image. The modern Holomatrix-based simulation will be used to train Tactical Decision Making Procedures (PPKT) and subordinate commanders to map and model yudha so that they can provide an overview of the actual operating field. After testing, it was found that this simulation application can be used as a tactical training tool, where each military branch involved can coordinate properly as it is done in real combat.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121062109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ari Amir Alkodri, S. Supardi, Burham Isnanto, K. Kiswanto
{"title":"Selection of the Best Computer Laboratory Assistant Using AHP and Smart Methods","authors":"Ari Amir Alkodri, S. Supardi, Burham Isnanto, K. Kiswanto","doi":"10.38101/sisfotek.v12i1.451","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.451","url":null,"abstract":"Computer Laboratory Assistant, abbreviated as ASLAB, includes a Lab Assistant in a Computer Laboratory. ASLAB helps improve service performance in the Computer Laboratory, such as assisting Lecturers when teaching practicum at the Computer Laboratory and assisting in installing software on Student laptops so that the performance of Computer Laboratory services is always good. Problems The Head of the Computer Laboratory has difficulty assessing the comparison of ASLAB with other ASLABs to determine the best or not good performance. The calculation of the final value uses the mean value method so that all criteria are considered to be of equal importance, so we cannot know which criterion is more important. The research objective is to apply the AHP and SMART methods for selecting the best Computer Laboratory Assistant so that it can determine the criteria and ranking weights for the best Computer Laboratory Assistant so that it can be used as a basis for decision making and applied by the Head of the Computer Laboratory in selecting the best Computer Laboratory Assistant.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Expert System for Diagnosing Early Symptoms of COVID-19 Using the Certainty Factor Method","authors":"M. Julianti, Nunung Nurmaesah, W. Prayogo","doi":"10.38101/sisfotek.v12i1.475","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.475","url":null,"abstract":"Coronavirus Disease 2019 (Covid-19) is a pathogenic virus that is the main cause of respiratory tract diseases that can cause respiratory problems such as lung infections and can cause death. Based on data from the health department, the city of Tangerang said that the level of transmission of Covid-19 in the Tangerang Raya area was included in the red zone category, where the spread of Covid-19 averaged 130 additional cases per day. The main problem found is the difficulty of detecting early symptoms that arise as an indication of being infected with Covid-19 and tools to assist in detecting early symptoms felt by the general public. In this study, a rule-based knowledge representation process for the initial clinical symptoms of Covid-19 infection was carried out using an expert system with the certainty factor method, which aims to measure the level of certainty that has been confirmed by Covid-19 against the initial clinical symptoms felt by the user and makes it easier for users to detect the early symptoms of Covid-19 and helps the government, in this case, the health service center through the availability of the expert system application. Based on the results and discussions that have been carried out in this study, it can be concluded that the results of experiments to detect early clinical symptoms that were implemented using an expert system with the certainty factor method showed empirical calculations in the range of 81-85% confidence level on the results given by the system in initial clinical symptoms entered by the user. The results of the research above were obtained through a process of validating the suitability of initial clinical symptoms to the level of Covid-19 infection by using the forward chaining method and then measuring the level of confidence in the results that have been given based on the established rules. The expert system application with the proposed certainty factor method is the basis for developing mobile-based applications that can be used easily for the wider community","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126723570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nugroho Saputra, I. Hanafi, S. Soeprijanto, J. Jarudin
{"title":"Effectiveness of Wireless Network Roaming Access Point using PEAP Security System to Improve Internet Access","authors":"Nugroho Saputra, I. Hanafi, S. Soeprijanto, J. Jarudin","doi":"10.38101/sisfotek.v12i1.450","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.450","url":null,"abstract":"Network security was an access prevention measure taken by the network administrator to limit things that were not permitted and were dangerous to threaten the local network. This was done to keep the network working correctly, and there was no threat from anywhere. The research objective was to determine the effectiveness of wireless access point roaming networks with 802.1x security systems in increasing Internet access. The sample number in the study was 40 respondents, with details of 20 respondents from lecturers and 20 respondents from employees at university. The sampling technique was stratified random sampling by classifying the population into two strata. This study's data collection techniques were observation, interviews, and questionnaires. The method used was a mixed-method approach. The subjective test results show that the user interface of the Test ver1.0 hotspot could provide the best experience for users. The effectiveness of an Access Point roaming wireless network with an 802.1x security system as measured on the satisfaction aspect gets an average System Usability Scale score of 81.38, meaning that it could meet the satisfaction aspect and was accepted for use by users.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114471107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Comparison of High Performance Computing between Single Thread Loop and Multiple Thread Loop using Java-Based Programming at Fingerprint Data Processing","authors":"Arief Ginanjar, Kusmaya Kusmaya","doi":"10.38101/sisfotek.v12i1.449","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.449","url":null,"abstract":"High Performance Computing is one of the mechanisms in the programming family with a focus on increasing high performance in any programming environment, especially programming languages that use virtual machine environments such as C/C++, Java and Python. several sub-clusters of information technology such as Big Data, Data Warehouse, Business Intelligence and Artificial Intelligence, the use of HPC is widely applied in sophisticated computer machines that have enterprise data processing capabilities. This research was conducted to compare the ability of HPC with algorithms or java programming techniques in data processing that uses a lot of threads when implemented in ordinary computers used in everyday life, the term java programming technique that uses one thread is called Single Thread Loop then when using multiple threads is called Multiple Thread Loop. Due this comparison between sequential and parallel process so this research try to compare between Single Thread Loop and Multiple Thread Loop in Java Programming. The minimum requirement operating system is to use the MS Windows 7 or 10 and a Unix-based OS using an Intel i5 or i7 processor and use a minimum of 16 GB of RAM.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lukas Umbu Zogara, A. Sururi, Leny Tritanto Ningrum
{"title":"Analysis of COVID-19 Information Based on Social Media Big Data Classification Using the K-Means Data Mining Method","authors":"Lukas Umbu Zogara, A. Sururi, Leny Tritanto Ningrum","doi":"10.38101/sisfotek.v12i1.448","DOIUrl":"https://doi.org/10.38101/sisfotek.v12i1.448","url":null,"abstract":"This Covid-19 began to infect almost all countries in early 2020, including in Indonesia, Covid-19 spread widely throughout the world and was declared as a global pandemic by the World Health Organization (WHO). In the current era of Big Data, large amounts of data have been generated and collected from a variety of rich data sources. Big Data is useful information and valuable knowledge. In this study, the method that will be used for data analysis is the K-Means algorithm with orange tools as a tool to display the results of data classification. One of the information that can be generated is Sentiment Analysis. The purpose of this research was to determining the information such as public sentiment on social media towards government policies in handling COVID-19. In this research, 2000 tweets were used. The keyword used related to government policies are sourced from several online media. The tools used to analyze this twitter data is using Orange Application. The selected keywords are covid19, lockdown, PSBB, and isolation. This keyword is used as a reference to retrieve tweet data from twitter. From each of these keywords, a sentiment classification process will be carried out automatically so that data or tweets are obtained and grouped into positive, negative and neutral sentiment classes. From the result of research conducted, public sentiment on social media towards government policies in handling this virus outbreak tends to be positive.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123107203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Agung Susilo Yuda Irawan, Adi Rizky Pratama, Ryan Antono
{"title":"RC4 Cryptography Implementation Analysis on Text Data","authors":"Agung Susilo Yuda Irawan, Adi Rizky Pratama, Ryan Antono","doi":"10.38101/SISFOTEK.V11I2.408","DOIUrl":"https://doi.org/10.38101/SISFOTEK.V11I2.408","url":null,"abstract":"Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of Facebook user account information. This is certainly a significant issue in the world of information technology and even the world of entrepreneurship because it involves one of the young entrepreneurs, Mark Zuckerberg. Main problem in this case is data security. who can know information and who should not know information. To overcome such things, research is made in the field of data and information security by analyzing one of the encryption and decryption techniques, namely RC4 cryptography. This study explains how RC4 cryptography works, the advantages and disadvantages of RC4 cryptography, and the effectiveness of RC4 cryptography. RC4 (River Ciper 4) is a decryption encryption technique that uses a key as a reference. The process consists of KSA, PRGA, and XOR. To find out the usefulness of RC4 cryptography, in this study, encryption and decryption were carried out on text data. There are several advantages and disadvantages to RC4 cryptography from a technical point of view. The advantage that needs to be underlined is that this RC4 cryptography uses a certain key as a reference, things like this can provide convenience to the encryption maker but can also be a threat. as a result RC4 can hide information very well while the secret key is not known by others. In addition to being used in text data, this cryptography may be used for other data such as audio and video.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125245339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing a Disaster Recovery Plan Using NIST 800-34 Framework on the Information System of The Directorate General of Hajj and Umrah","authors":"Nurhanudin Nurhanudin","doi":"10.38101/SISFOTEK.V11I2.391","DOIUrl":"https://doi.org/10.38101/SISFOTEK.V11I2.391","url":null,"abstract":"The Directorate General of Hajj and Umrah manages an information system that is used to provide services in the business process of organizing Hajj and Umrah, the services provided include registration, cancellation, settlement, portion assignment, hajj document management, embarkation operations, Saudi Arabia operations, and debarkation operations. The services are provided throughout the year, thus requiring infrastructure support and adequate information systems that can run24 hours a day. To maintain and ensure the continuity of Hajj and Umrah services, a Disaster Recovery Plan is designed, which is used as a guide in dealing with disasters or disturbances that can occur at any time and can disrupt all operational activities of the organization. In this study, the NIST 800-34 framework is used, starting with risk identification and assessment, Business Impact Analysis (BIA), preventive controls identification, contingency strategies, and contingency plans. The contingency plan preparation phase includes the activation phase, the recovery phase, and the reconstitution phase. Based on the result of research, there are ten risks that can threaten the continuity of information system services and based on Business Analysis Impact, services with a high critical level are Siskohat and Haji Pintar applications. The research produced is in the form of a Disaster Recovery Plan document that is adapted to the organizational conditions of the Directorate General of Hajj and Umrah.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121986522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Of Things Based Home Electrical Control Device Using Google Assistant","authors":"Rachmat Agusli, Rahmat Tullah, Ali Akbar Jurfri","doi":"10.38101/SISFOTEK.V11I2.411","DOIUrl":"https://doi.org/10.38101/SISFOTEK.V11I2.411","url":null,"abstract":"The increasing use of the internet has resulted in innovations in control systems. Internet of Things or IoT is an innovation where several electronic devices can be controlled remotely by utilizing the internet to obtain a more efficient and time-saving control system. This research uses IoT to control several electronic devices that are usually used in homes, such as lights, fans, and many more. The system built based on the Internet of Things uses Google Assistant or voice by utilizing the NodeMCU device as a control system. With the construction of this application, it is hoped that it can make it easier for people to turn on and turn off lights remotely. Users are only asked to press the voice commad or button on the Android application that was built to carry out the command to turn on and turn off the lights by using an internet connection. Based on the test results, the system can work properly to turn the lights on and off in a long distance.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128460155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}