cover
Contact Name
Brian Rakhmat Aji
Contact Email
brianetlab@gmail.com
Phone
-
Journal Mail Official
ijid@uin-suka.ac.id
Editorial Address
-
Location
Kab. sleman,
Daerah istimewa yogyakarta
INDONESIA
IJID (International Journal on Informatics for Development)
ISSN : 22527834     EISSN : 25497448     DOI : -
Core Subject : Science,
One important point in the accreditation of higher education study programs is the availability of a journal that holds the results of research of many investigators. Since the year 2012, Informatics Department has English language. Journal called IJID International Journal on Informatics for Development. IJID Issues accommodate a variety of issues, the latest from the world of science and technology. One of the requirements of a quality journal if the journal is said to focus on one area of science and sustainability of IJID. We accept the scientific literature from the readers. And hopefully these journals can be useful for the development of IT in the world. Informatics Department Faculty of Science and Technology State Islamic University Sunan Kalijaga.
Arjuna Subject : -
Articles 39 Documents
Online Test using Design Banana Pi and Local Network Aji, Brian Rakhmat
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07106

Abstract

At this time the exam using paper rated less cumbersome and inefficient. In this case the teacher will make difficult to assess the answers and take a long time to finish the job. In developing this system, the author is still in the development stage by using Banana Pi sebgai server, and use a router to a local network, this system is expected to facilitate the teacher to correct the test results.This test system uses CodeIgniter framework as a backend and frontend using material design. The system is easy to use and portable for a local network to connect them.
Distributed Database Using Mobile Agent Sugiantoro, Bambang; Wardoyo, Retantyo; Hartati, Sri; Istiyanto, Jazi Eko
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (202.233 KB) | DOI: 10.14421/ijid.2012.01102

Abstract

The number of sources of information brings several problems, among them about how to combine the distributed data storage and different. Information on an organization or company is usually stored in separate locations and different formats. When there is an increase in storage capacity and the amount of information search costs, the company faced with an abundance amount of data. System development methodology used is object oriented design with a development framework
A Comparative Study of ICT Innovation Policy for the Countries Development Perspective Saleem, Ayesha; Higuchi, Kiyohide
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (384.267 KB) | DOI: 10.14421/ijid.2012.01101

Abstract

In the globalized environment, the economic growth significantly depends on the countries capacity to develop, to apply new technologies and vice versa. Diffusion of information communication technologies is a global phenomenon. Despite of rapid globalization there are considerable differences between nations in terms of adoption and usage of new technologies. This paper aims to draw together the highly eclectic literature on the diffusion of Information and Communication Technology (ICT) Innovation in order to know what have been done, highlight the generic issues, relevant to policy and will initiate further research and develop potential opportunities. This paper also highlight the low level and high level income countries data and ICT policies frame work to draw conclusions and some case studies as an example. The objective is to review the finding the social economic factor for diffusion of ICT Innovation to make policy recommendation for the development of the country.
The Mapping of Access Point Workloads at UIN Sunan Kalijaga Based on Log Analysis using K-Means Algorithm Kharisma, Razendra Bintang; Yazid, Ahmad Subhan
IJID (International Journal on Informatics for Development) Vol 6, No 1 (2017): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06105

Abstract

This study aims to map the use of access points based on the log of usage in several locations in the UIN Sunan Kalijaga. The analyzed data are access point records taken three times a day for one week working hours. The data obtained was processed and clustered using the K-Means algorithm. There are five clusters obtained from the processed data, each of which divides the number of access loads from an access point. The results of clustering provide a recommendation on which locations need to be added to access points that it can improve institutional userservices.
Design and Implementation of Network Monitoring System on Local Area Network with Social Media Twitter Notification Winasis, Bima Putra; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 2 (2017): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06201

Abstract

A network administrator has responsibility and important role in a computer network. Network security and its services depend on the treatment performed by the administrator. Network administrators who understand the workings of a computer network is needed to obtain the necessary computer networks. One of the obligations of the administrator is to monitor a network which can be done by using the system monitor. Monitoring system is a task to check the computer, operating system and services of computer network to keep the network always work in optimal conditions. In an effort to monitor the condition of the network, one of the technologies that can be used is the notification on twitter social media for providing information in real time to the administrator. Twitter is a social media that is very widely used, free, and secure. Moreover, the use of social media twitter experiencing rapid development. Therefore, the selection of twitter as a medium for the use of the notification is expected to be the right strategy. This system will be made by sending notification via twitter when a LAN network is disconnected or attacked by intruders.Results from the development of systems that have been made based on testing the functionality of the system shows all functions of the system has been running well. While usability testing calculation of the total score of the test system interface to get a score of 38.75 out of a maximum scale of 50. This score is in the range 34-42 value (Satisfied) which means that the respondents were satisfied with the system interface. Therefore, this interface is good to be implemented in the system.
A Counterfeit Paper Currency Recognition System Using LVQ based on UV Light Harjunowibowo, Dewanto; Hartati, Sri; Budianto, Aris
IJID (International Journal on Informatics for Development) Vol 1, No 2 (2012): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (870.108 KB) | DOI: 10.14421/ijid.2012.01202

Abstract

This research is aimed to test a paper currency counterfeit detection system based on Linear Vector Quantization (LVQ) Neural Network. The input image of the system is the dancer object image of paper currency Rp. 50.000,- fluorescent by ultraviolet light. The image of paper currency data was taken from conventional banks. The LVQ method is used to recognize whether the paper currency being tested is counterfeit or not. The coding was carried out using visual programming language. The feature size of the dancer tested object is 114x90 px and the RGBHSI was extracted as the input for LVQ. The experimental results show that the system has an accuracy 100% of detecting 20 real test case data, and 96% of detecting 22 simulated test case data. The simulated case data was generated by varying the brightness of the image data. The real test case data contains of 10 counterfeit paper currency and 10 original paper currency. The simulated case data contains of 11 original paper currency and 11 counterfeit paper currency. The best setting for the system is Learning Rate = 0.01 and MaxEpoh = 10.
The Implementation of Representation State Transfer (REST) Architecture Academic Information System Integrated in Pandanaran Islamic Senior High School Hambali, Muhammad; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2018.07101

Abstract

In the rapid development of technology and the increasing speed of information flow due to globalization, making the role of information is vital and crucial to an educational institution. Institutions of Sunan Pandanaran implement policies of separate education system among male students with female students. This triggered a few problems, especially in the Senior high school of Sunan Pandanaran where researched by the author. The focus of the research is how to implement thearchitecture of Representational State Transfer (REST) on the integrated system academic information between two separate data server so that student academic data can be served easily from two different servers. Through the system resulting from this research, researchers offered easy access to student academic data that can then be recycled by the user into a useful information.  The research methodology where used in this research is system development. The steps begin with a preliminary study research,data collection, design models, identifying system requirements and system development methods.At the end, this research produced a integrated academic system information between male school servers with a female school server where implemented using Representational State Transfer architecture. So that student academic data can be presented either to the user in order to be recycled into useful information.
Analysis of Genetic Algorithm Parameters in A Vendor Managed Inventory Simulation Model Pramudyo, Cahyono Sigit
IJID (International Journal on Informatics for Development) Vol 7, No 1 (2018): IJID June
Publisher : Universitas Islam Negeri Sunan Kalijaga

Show Abstract | Original Source | Check in Google Scholar | Full PDF (30.024 KB) | DOI: 10.14421/ijid.2018.%x

Abstract

To handle the information exchange problem between a vendor and a retailer, Vendor Managed Inventory (VMI) provides a good approach to handle the problem. Information exchanges between both sides enhance supply chain performance. In a previous research work, a stochastic model for one vendor and one retailer has been developed. Simulation optimization using genetic algorithm (GA) has been employed to solve the problem. There are 2 important parameters in genetic algorithm (probability of mutation and probability of crossover). This research aims at analyzing relations between GA parameters and optimal solutions. This research compares many combinations of GA parameters and the effects on optimal solutions and time to reach the optimal solutions. This research concludes that the best combination reaches the optimal solutions. Unfortunately, the best combination is only suitable for a certain condition and increasing/reducing GA parameter  values do not automatically improve the optimal solutions.
Semantic Commerce for Developing Country Wardani, Dewi Wisnu
IJID (International Journal on Informatics for Development) Vol 1, No 1 (2012): IJID May
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | Full PDF (397.041 KB) | DOI: 10.14421/ijid.2012.01103

Abstract

The recent real challenges of semantic technology is not in the core of the technology but much more in implementing the semantic technology in the real problem. The common domain in any world is economics. One of the most important domain in economics is marketing. Company moreover small company from developing country desperated in increasing to make their company's product are known wider, around the world as well. Product from developing countries usually has a good quality, unique and cheaper but lack to be known. This paper present idea how semantic technology will give a benefit in marketing strategies for business in developing countries. The short goal is how the common famous search engine will be more understand the company both product and profile, thus present those information in better form and possible to the next processing in the others semantic technology.
Wireless Access Points Placement Analysis on WI-FI Signal Coverage with BAYESIAN Probability Method Fawzan, Mahbub Puba; Sugiantoro, Bambang
IJID (International Journal on Informatics for Development) Vol 6, No 2 (2017): IJID December
Publisher : Universitas Islam Negeri Sunan Kalijaga Yogyakarta

Show Abstract | Original Source | Check in Google Scholar | DOI: 10.14421/ijid.2017.06204

Abstract

Wireless networks in a room are strongly influenced by interference. To overcome the interference and so that the performance from the wireless network is getting better, then optimization is done. There are several types of propagation that can interfere with the performance of wireless networks, which include the number of transmitters (access points), free space loss, Received Signal Strength (RSSI), coverage that can be served, measuring attenuation on barriers (concrete walls, soft partitions, doors, and floors).This research is an analytical study where the purpose of this study is to determine the position of access point a good in the Shari'ah Faculty Building and the Law using the method of Bayesian probability. The first stage of this research is to determine the distance of the signal reception to find out the strength of the signal with manual random sampling so that the data obtained varies. The second stage is to determine the position of the access point with a choice of several points so that the best position can be compared based on the plan of the Syari'ah Faculty and Law Building. The last step is calculating probability by the method of Bayesian probability.The results of this study are the position of the access point best on the 3rd floor, namely at position B with a probability value of 13 while on the 4th floor the position of access the point best in position A with a value of 10, position D with a value of 13 and position E with a value of 13. The most influential propagation in the Syari'ah Faculty Building and the Law is a concrete wall with a size of 60% reducing the magnitude of the signal emitted.(Abstract)

Page 1 of 4 | Total Record : 39