cover
Contact Name
Andi Wahju Rahardjo Emanuel
Contact Email
andi.wre@it.maranatha.edu
Phone
-
Journal Mail Official
jutisi@it.maranatha.edu
Editorial Address
-
Location
Kota bandung,
Jawa barat
INDONESIA
Jurnal Teknik Informatika dan Sistem Informasi
ISSN : 24432210     EISSN : 24432229     DOI : -
Core Subject : Science,
Jurnal Teknik Informatika dan Sistem Informasi (JuTISI) adalah Jurnal Ilmiah yang dibangun oleh Fakultas Teknologi Informasi, Universitas Kristen Maranatha untuk memberikan sarana bagi para akademisi dan peneliti untuk mempublikasikan karya-karya ilmiah di khalayak luas. Jurnal ini merupakan penggabungan dari Jurnal Teknik Informatika dan Jurnal Sistem Informasi yang terbit terakhir pada tahun 2014. JuTISI diterbitkan dalam 3 edisi setiap tahun mulai pada tahun 2015, yaitu pada bulan: April, Agustus, dan Desember.
Arjuna Subject : -
Articles 14 Documents
Search results for , issue " Vol 1 No 2 (2015): JuTISI" : 14 Documents clear
Halaman Belakang JuTISI edisi Agustus 2015 JuTISI, Redaksi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (112.943 KB) | DOI: 10.28932/jutisi.v1i2.586

Abstract

Ini adalah halaman belakang dari JuTISI edisi Agustus 2015
Implementasi dan Pengukuran Kinerja Operasi Aritmatika Finite Field Berbasis Polinomial Biner Senjaya, Wenny Franciska; Rahardjo, Budi
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (725.801 KB) | DOI: 10.28932/jutisi.v1i2.585

Abstract

Cryptography is one of the security techniques that secure information confidentiality and information integrity while electronic transaction processing. There are three kinds of cryptograpy protocols, Symmetric Algorithms, Asymmetric (Public Key) Algorithms, and Cryptographic Protocols. Elliptic Curve Cryptography (ECC) is one of the public key encryption. ECC requires high computation for solving arithmetic operations.Finite field has important role in ECC implementation, which curve operations requires finite field. Finite field has several arithmetic operations, add, multiplication, squaring, and invers. There are many method or algorithm for each arithmetic operation. Finite field can be representation in prime field GF(p) and binary field GF(2m). There are two representation in binary field, polynomial basis and normal basis. This research presents implementation of arithmetic operation algorithms for adding, multiplication, squaring, and invers on polynomial basis with maximum key 299 bits. Besides that, this research presents the measurement of algorithm performance based on processing time and memory usage. Keywords — cryptography, elliptic curve, finite field, polynomial basis, binary field
Analisa Nilai Lamda Model Jarak Minkowsky Untuk Penentuan Jurusan SMA (Studi Kasus di SMA Negeri 2 Tualang) Syaliman bin Lukman, Khairul Umam; Labellapansa, Ause
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (708.585 KB) | DOI: 10.28932/jutisi.v1i2.583

Abstract

SMA Negeri 2 (SMAN 2) is located in Tualang. So far the data report student majors only stored in a database as a final report. Data from the report of the majors could be used as guidelines to determine the students' decision majors for the following year. To take advantage of the data stored in that particular database, we can use data mining disciplines. The method used to make the determination of students majoring done by using Nearest K-Nearest Neighbor (K-NN) algorithm. On the other hand, the method for calculating the distance between the data used models Minkowsky distance with a value of lambda (λ) as a parameter. Lambda values that were analyzed were lambda 1, 2 and 3. Lambda with the value of 1 can generate increasing accuracy in the 11th experiment or with a large amount of data equal to 276 data. Lambda 2 will produce increasing accuracy by the 16th experiment or with the number of training data equal to 356 data while lambda 3 can also produce accuracy continuously increasing by the 11th experiement or with the amount of training data equal to 276 data. The accuracy of the lambda value of 1 is better than lambda 2 and lambda 3. This was proven in 25 experiments at lambda 1 which produces the highest accuracy value for 20 times.Keywords — Classification, Data Mining, K-Nearest Neighbor, Lamda (λ), Minkowsky.
Sistem Pendeteksi Pengirim Tweet dengan Metode Klasifikasi Naive Bayes Wijanto, Maresha Caroline
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (414.501 KB) | DOI: 10.28932/jutisi.v1i2.584

Abstract

Until Januari 2015, social media users reached 29% of the world population. In Indonesia itself had 28% active users from total populasi of Indonesia. The usage of social media gives positives and negatives effect. The negatives effect are the increasing number of fraud by using SMS or social media, such as Twitter. Many people are deceived by the tweet messages sent from known user account when in fact the sender is other person. Because of that, there is a need to have a system to detect wheteher the tweet sender is the same person or not. Naive Bayes classifiers method is used to classify that. The data source is taken from tokens selected based on two models, the minimum n-time number of occurrences and the n-th highest number of occurrences. Each tweets also processed into six different types of tweets, such as formal tweet or lowercase tweet. The test uses tenfold cross-validation and measured by the value of accuracy, precision, recall, and F-score. The common result shows 82,145% level of accuracy. Second model to select the tokens shows consistency level of accuracy for each types of tweets. The fifth types of tweets also get the highest level of accuracy for both models to select the tokens.
Perancangan Model Pengukuran Layanan Teknologi Informasi pada Perguruan Tinggi (Studi Kasus: Perguruan Tinggi X) Adelia, Adelia; Surendro, Kridanto
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (978.585 KB) | DOI: 10.28932/jutisi.v1i2.581

Abstract

Information technology services within the organization need to be taken to ensure that the service providers can provide quality service and benefit for service user. The research model to measure information technology services provided to users of the service providers, especially in college. In the design of model, using the concepts included in the service intelligence and ISO 20000, Balanced Scorecard, Balanced Scorecard and IT Balanced Scorecard management of information technology services. Measurement services performed by using models generated from mapping the concepts used in the study. Colleges may use the measurement model is a college that has been using information technology in supporting the activities of the college. Measurements of IT service level emphasizes on IT services owned by the college and different type of IT services to users in the college
Analisis dan Perancangan Aplikasi Penyusunan Jadwal Mengajar Sesuai Jadwal Kesediaan Mengajar Dosen Di Fakultas Teknologi Informasi (Studi Kasus : Jurusan Teknik Informatika) J., Meliana Christianti; Tan, Robby; Karnalim, Oscar; Imandha, Egie; Cahyadi, Tendy
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (2347.732 KB) | DOI: 10.28932/jutisi.v1i2.580

Abstract

Faculty of Information Technology is one of the faculties at Maranatha Christian University. Currently, scheduling is still done manually. Scheduling process takes quite a long and exhaustive, as the secretary of the department needs to ask the willingness of faculty, and compare each lecturer teaching schedule so it does not clash with other lecturers. As part of Maranatha Christian University, the Faculty of Information Technology would like to shorten its preparation time to arrange faculty teaching schedule and to adjust to the schedule provided by each lecturer. This application will be developed with Java (desktop), PHP (web) programming language, and MySQL database. 
Perbandingan Metode-Metode Klasifikasi untuk Indoor Positioning System Lukito, Yuan; Chrismanto, Antonius R.
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1607.933 KB) | DOI: 10.28932/jutisi.v1i2.579

Abstract

Indoor Positioning System can provide position and navigation guidances inside a building.  This paper discusses about systematic comparison between K-Nearest Neigbors and Naïve Bayes Classifier over WiFi-based Indoor Position System dataset.  The dataset is collected using a custom Android Application, which able to receive and record WiFi signal strengths from the surrounding WiFi hotspots in UKDW campus. The dataset consists of 11658 Received Signal Strength (RSS) data from 41 public locations in UKDW campus.  We use 10-folds cross validation and T-Test with 0.05 significance level to compare classification accuracy between K-Nearest Neigbors and Naïve Bayes classifier.  Based on the experiment result, we can conclude that K-Nearest Neighbors classifier produces better classification accuracy (83.58%) than Naïve Bayes (61.52%).
Extended Vector Space Model with Semantic Relatedness on Java Archive Search Engine Karnalim, Oscar
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (457.357 KB) | DOI: 10.28932/jutisi.v1i2.578

Abstract

Byte code as information source is a novel approach which enable Java archive search engine to be built without relying on another resources except the Java archive itself [1]. Unfortunately, its effectiveness is not considerably high since some relevant documents may not be retrieved because of vocabulary mismatch. In this research, a vector space model (VSM) is extended with semantic relatedness to overcome vocabulary mismatch issue in Java archive search engine. Aiming the most effective retrieval model, some sort of equations in retrieval models are also proposed and evaluated such as sum up all related term, substituting non-existing term with most related term, logaritmic normalization, context-specific relatedness, and low-rank query-related retrieved documents. In general, semantic relatedness improves recall as a tradeoff of its precision reduction. We also proposed a scheme to take the advantage of relatedness without affected by its disadvantage (VSM + considering non-retrieved documents as low-rank retrieved documents using semantic relatedness). This scheme assures that relatedness score should be ranked lower than standard exact-match score. This scheme yields 1.754% higher effectiveness than our standard VSM.
Penerapan Metode KMeans dan Cobweb Terhadap Analisis Prestasi Akademik Mahasiswa yang Mengikuti Kegiatan Kemahasiswaan Sudharmono, Neil Casaandra; Ayub, Mewati
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (411.935 KB) | DOI: 10.28932/jutisi.v1i2.577

Abstract

The growth of an university can be seen with student’s academic records which can be used for determining students’ quality. Besides student’s academic records, other component that can be used to determine students’ quality is student’s participation in non-academic activities which most of universities have to develop their student’s softskill during their study period. Based on these data provision, we can analyze how non-academic activities affect student’s academic achievement. In this research, the data that used for analysis are students’ academic data and students’ activities data from Maranatha Christian University as case study. This analysis use one of data mining technique, which is clustering . The clustering method that used for this research are Kmeans andCobweb. Clustering method groups students and alumni that participate in student activities or not by looking and the student’s and alumni’s faculty, major, years of study, and if the student or alumni participate in student activites, we can analyze it with how many activities that the student and alumni had.
Sistem Informasi Pemilihan Mobil Bekas Menggunakan Decision Support System Analytical Hierarchy Process Pada Showroom Yokima Motor Bandung Hamdhani, Rizal Saiful; Imbar, Radiant Victor
Jurnal Teknik Informatika dan Sistem Informasi Vol 1 No 2 (2015): JuTISI
Publisher : Maranatha University Press

Show Abstract | Original Source | Check in Google Scholar | Full PDF (1516.37 KB) | DOI: 10.28932/jutisi.v1i2.576

Abstract

Sistem Infomasi Pemilihan Mobil Bekas Menggunakan Decision Support System Analytical Hierarchy Process Pada Yokima Motor Bandung

Page 1 of 2 | Total Record : 14