首页 > 最新文献

Jurnal Informatika Dan Tekonologi Komputer (JITEK)最新文献

英文 中文
IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION 采用 C4.5 算法评估社区满意度
Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1826
Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur
This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy
本研究采用 C4.5 算法来决定社区对社区服务的满意度。C4.5 算法是一种采用决策树技术的分类算法,因其具有许多优点而广为人知并受到青睐。例如,它可以处理数值数据和离散数据,可以处理缺失的属性值,生成的规则易于解释,而且速度最快。本研究采用数据挖掘的概念进行分类,涉及 20 份社区问卷数据,分别为:便宜、贵、合适、不合适、快、长、舒服、不舒服。影响社区满意度的四个属性包括:办理成本、服务程序、办理时间和便利性。根据研究人员的研究结果,可以得出以下结论。通过使用 C4.5 算法的数据挖掘技术,可以预测和评估客户对社区服务的满意度。这项研究还表明,使用 C4.5 算法可以获得较高的准确率。
{"title":"IMPLEMENTATION OF C4.5 ALGORITHM FOR ASSESMENT OF COMMUNITY SATISFACTION","authors":"Rahmat Sulaiman, Agustina Mardeka Raya, Laurentinus, Aria Setiawan, Atma Luhur","doi":"10.55606/jitek.v3i2.1826","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1826","url":null,"abstract":"This Research applies the C4.5 Algorithm in deciding community satisfaction of sommunity services. Algorithm C4.5 is a classification algorithm with a decision tree technique that is well known and preferred because it has many advantages. These advantages, for example, can process numeric and discrete data, can handle missing attribute values, produce rules that are easy to interpret and the fastest. This research is a classification with the concept of data mining involving 20 community questionnaire data which are categorized as: cheap, expensive, appropriate, inappropriate, fast, long, comfortable, uncomfortable. There are four attributes that affect community satisfaction including: handling costs, service procedures, handling time and convenience. From the results of this research that has been conducted by researchers, it can be concluded. The customer satisfaction of the community services can be predicted and evaluated by utilizing data mining techniques using the C4.5 Algorithm to predict community satisfaction. This research also provided that C4.5 Algorihtm can be used to get high result of accuracy","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"56 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2 第二届下一代聚会锦鲤展打字应用指导活动
Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1377
Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana
Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.
在 Next Gen's Party Koi Show #2 的比赛管理中检查和实施信息与传播技术。通过双向互动方法、演示和练习,培训如何使用活动注册应用程序和后台应用程序管理活动参与者,并在活动日提供支持。Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.
{"title":"KEGIATAN PENDAMPINGAN PENERAPAN TIK PADA NEXT GEN’S PARTY KOI SHOW KE 2","authors":"Budi Suyanto, Mangaras Y F, Wilis Kaswidjanti, Dessyanto Boedi P, Nur Heri Cahyana","doi":"10.55606/jitek.v3i2.1377","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1377","url":null,"abstract":"Inspection and implementation of ICT in competition management at Next Gen's Party Koi Show #2. Training with two-way interaction methods, presentations and exercises on how to use the activity registration application and back office application to manage activity participants and provide support on activity days. Next Gen's Party Koi Show #2 Online Registration Application Install Next Gen's Party Koi Show #2 Back Office Online Application Install Next Gen's Party Koi Show #2 Participant Registration Support Activities Next Gen Support Committee Party Koi Show #2 activities in Participant management.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN 使用德隆和麦克莱恩方法分析市场用户对 facebook 应用的满意度
Pub Date : 2023-07-20 DOI: 10.55606/jitek.v3i2.1838
Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i
Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.
现代的交易目前使用的是一种买卖系统,不直接面对面,只用一根手指,在一个地方,不受空间和时间的限制,这就是通常所说的网上买卖和网上交易的一个容器,即网站,而且只要技术不断发展,技术质量不断变化,市场的类型也非常多、在本研究中,作者希望用 Delone 和 McLean 方法对 Facebook 市场进行分析,该市场存在未成年人可以访问的低俗广告、销售违禁物品等问题,而且仍有许多用户违反了 Facebook 市场设定的规则和条件。本研究旨在找出并分析这些问题,同时找出哪些因素对用户对 Facebook Marketplace 的满意度影响最大。根据对占碑市居民问卷调查数据的处理结果,发现在 9 个假设中,有 4 个假设具有正向显著影响,分别是服务质量对用户的影响、使用对用户满意度的影响、使用对净收益的影响以及用户满意度对净收益的影响。
{"title":"ANALISIS KEPUASAN PENGGUNA MARKETPLACE PADA APLIKASI FACEBOOK MENGGUNAKAN METODE DELONE AND MCLEAN","authors":"Putri Nawang Wulan, Kurniabudi Kurniabudi, Imam Rofi’i","doi":"10.55606/jitek.v3i2.1838","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1838","url":null,"abstract":"Trading in the modern era currently uses a buying and selling system, not directly face to face but only with one finger and in one place, not limited by space and time, which is commonly referred to as buying and selling online and online transactions in one container, namely the website and very there are many types of marketplaces as long as technology continues to develop and changes in the quality of technology continue, in this study the author wants to analyze the Facebook Marketplace with the Delone and McLean method, which has problems such as vulgar advertisements that can be accessed by minors, the sale of goods-prohibited items and there are still many users who violate the rules and conditions set by the Facebook Marketplace. The purpose of this study is to identify and analyze these problems and also to find out which factors have the most influence on user satisfaction with the Facebook Marketplace. Based on the results of processing questionnaire data from the people of Jambi City, it was found that 4 of the 9 hypotheses that had a positive and significant effect were service quality to users, use to user satisfaction, use to net benefits and user satisfaction to net benefits.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139357012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE 使用 owasp nikto 和 burpsuite 对 Dvwa 网站进行漏洞扫描的比较分析
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.908
Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha
Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.
信息技术的发展日新月异,已经成为现代人类生活的一部分,随着这些发展,网站扮演着重要的角色,然而,现有的发展也对网站的安全性产生了影响,因此测试网站服务器是非常重要的。需要使用适当的方法和技术来查看网络应用程序的组件、库和系统中可能存在的漏洞,OWASP、Nikto 和 Burp Suite 工具可用于测试网站的安全漏洞。每种工具在速度或持续时间、结果或扫描对象方面都存在差异。本文的研究目标是如何分析比较测试网站安全漏洞的工具。因此,本文将根据扫描对象、持续时间和结果对网站漏洞的检测或分析结果进行比较,然后提出有效和高效使用的工具建议。
{"title":"ANALISIS PERBANDINGAN VULNERABILITY SCANNING PADA WEBSITE DVWA MENGGUNAKAN OWASP NIKTO DAN BURPSUITE","authors":"Ni Putu Ana Rainita, Anak Agung Istri Callysta Athalia, Made Diva Putera Ananta, I Ketut Pratista Tri Pramana, Gede Arna Jude Saskara, I Made Edy Listartha","doi":"10.55606/jitek.v3i2.908","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.908","url":null,"abstract":"Information technology from time to time is growing rapidly and has become part of human life in this modern era, with these developments, websites have an important role, however, existing developments also have an impact on the security of a website, testing web servers is very important. important thing to do, this test aims to test whether the web server is safe or not from the crimes of hackers. Appropriate methods and techniques are needed to see possible vulnerabilities in components, libraries and systems that underlie web applications used in anticipating this, OWASP, Nikto, and Burp Suite tools can be used to test website security vulnerabilities. Each tool has differences in terms of speed or duration, results, or scanned objects. The research objective of this article is how to analyze a comparison of tools in testing website security vulnerabilities. Therefore, the results of detection or analysis of website vulnerabilities are then compared based on scanned objects, duration, and results to then suggest tools that are effective and efficient in their use.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"364 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER 在确定客户购买模式时采用阿普里里算法
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1519
Hendra Gunawan, Efori Bu'ulolo
CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread
简历Syahfira Bakery and Cake 是一家从事蛋糕、糕点和面包生产的企业。企业越发展,每天发生的交易也就越多。然而,有时行政人员和公司所有者并没有充分利用销售交易数据。事实上,如果行政人员对其进行处理和使用,企业主对其进行监督,那么销售数据将对未来的产品销售产生重大影响。数据处理可以使用数据挖掘技术,这些数据集可以产生新的信息,其中之一就是客户购买模式。Syahfira Bakery and Cake 是一家蛋糕、海绵蛋糕和面包店,尚未充分利用数据来确定销售业务战略。面对这些问题,有必要使用 Apriori 算法对交易数据进行处理,以便为店主提供可以利用的新知识。根据已完成的研究,从 20 个经过处理的交易数据中得出的结果符合最小支持度 30% 和最小置信度 70% 的要求,并得出一条规则,即如果顾客购买巧克力果酱产品,他将会购买纯面包。
{"title":"IMPLEMENTASI ALGORITMA APRIORI DALAM MENENTUKAN POLA PEMBELI CUSTOMER","authors":"Hendra Gunawan, Efori Bu'ulolo","doi":"10.55606/jitek.v3i2.1519","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1519","url":null,"abstract":"CV. Syahfira Bakery and Cake is a business engaged in the production of cakes, pastries and bread. The more a business develops, the transactions that occur daily also increase. However, sometimes the sales transaction data is not fully utilized properly by administrative staff and company owners. In fact, if it is processed and used by administrative staff and supervised by business owners, then sales data will have a major influence on product sales in the future. Data processing can be done using data mining techniques, these data sets can produce new information, one of which is customer purchasing patterns. Syahfira Bakery and Cake is a cake, sponge and bread shop that has not fully utilized data for determining sales business strategies. With these problems, it is necessary to use transaction data to be processed with the Apriori algorithm so that it can provide new knowledge that can be utilized by shop owners. Based on the research that has been done, from the 20 processed transaction data, results are obtained that meet a minimum support of 30% and a minimum confidence of 70% and one rule is obtained, namely if a customer buys chocolate jam products, he will buy plain bread","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"158 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL 基于网络的人力资源信息系统(pt the master steel
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1846
Aris Sunandar, Henri Septanto
Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.
人力资源信息系统是现代组织人力资源管理的重要组成部分。为了提高人力资源信息系统的效率和效益,许多组织都开始采用基于网络的解决方案。本研究旨在采用瀑布法作为开发生命周期,设计基于网络的人力资源信息系统。瀑布法是一种线性和顺序的软件开发方法。该方法的各个阶段包括需求分析、设计、实施、测试和维护。通过使用这种方法,可以确定用户需求、分析和设计系统结构、实施基于网络的人力资源信息系统解决方案并对系统进行整体测试。这项研究的成果是一个基于网络的人力资源信息系统,可以有效地管理员工信息、个人资料、考勤、工资单和绩效评估。该人力资源信息系统还可通过网络浏览器轻松访问,使用户可以随时随地访问该系统。
{"title":"PERANCANGAN HUMAN RESOURCE INFORMATION SYSTEM BERBASIS WEB DI PT THE MASTER STEEL","authors":"Aris Sunandar, Henri Septanto","doi":"10.55606/jitek.v3i2.1846","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1846","url":null,"abstract":"Human Resource Information System is an important part of human resource management in modern organizations. In an effort to increase the efficiency and effectiveness of HRIS, many organizations are turning to web-based solutions. This study aims to design web-based HRIS using the Waterfall method as its development life cycle. The Waterfall method is a linear and sequential approach to software development. The stages in this method include needs analysis, design, implementation, testing, and maintenance. By using this method, it is possible to identify user needs, analyze and design system architecture, implement web-based Human Resource Information System solutions and test the system as a whole. The result of this research is a web-based Human Resource Information System that allows efficient management of employee information, personal data, attendance, payroll and performance evaluation. This Human Resource Information System also provides easy accessibility via a web browser, allowing users to access the system from anywhere and anytime.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL 电子文件应用设计作为分发定购单和基于网络的pt.ICOAC数字数据存储的媒介
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1844
Edi Kalsid, Henri Septanto
A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.
采购订单是买方向供应商/供货商订购货物或服务的文件,几乎所有公司都有采购或采购部门,该部门将签发货物订购单或采购订单,本文的目的是让采购或采购部门团队更轻松地分发采购订单文件或采购订单,并以数字方式存储这些文件,以便日后更轻松地查找这些文件。在收集数据时,作者使用的是原始数据,即研究人员直接从研究对象或研究客体处获得、收集和处理的数据,研究人员通过观察、访谈和参与观察等方法进行数据收集。研究成果的形式是基于网络的电子文件应用程序,并以数字化和结构化的方式向供应商分发采购订单文件,从而使双方更容易发送信息。
{"title":"RANCANG BANGUN APLIKASI E-DOCUMENT SEBAGAI MEDIA PENDISTRIBUSIAN PURCHASE ORDER DAN BERBASIS WEB PADA PT. IRC INOACPENYIMPANAN DATA DIGITAL","authors":"Edi Kalsid, Henri Septanto","doi":"10.55606/jitek.v3i2.1844","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1844","url":null,"abstract":"A Purchase Order is a document ordering goods or services from a buyer to a supplier/supplier, almost all companies have a purchasing or purchasing department where the department will issue a goods ordering document or purchase order, the purpose of this writing is to make it easier for the purchasing or purchasing department team to distribute purchase order documents or purchase orders and store these documents digitally to make it easier to find these documents at a later date. in collecting data the author uses primary data, namely data obtained, collected and processed by the researcher directly from the subject or research object, the data collection method carried out by the researcher is carried out through: observation, interviews and participant observation. The results of the research are in the form of a web-based e-document application and distribution of purchase order documents to suppliers in a digital and structured manner so that it makes it easier for both parties to send information.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE 基于移动设备的文本加密的 sha 算法实现
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1736
A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut
In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks
在当今的数字时代,短信已成为世界各地许多人最常用的通信方式之一。然而,使用短信也带来了需要考虑的安全风险。通过短信发送的个人信息或重要数据可能成为黑客攻击的目标。移动设备始终与互联网相连,这使得短信很容易被黑客攻击或被未经授权的人截获。因此,在短信中使用加密方法对提高通过短信发送信息的安全性和隐私性非常重要。本研究的目的是在移动应用程序上实施安全散列算法(SHA),以进行文本加密。在移动应用程序上实施 SHA 算法时使用了 Java 编程语言,并利用 Android 内置库处理数据。研究结果表明,使用 SHA 算法的移动应用程序可以为通过公共网络发送的包含信息的数据提供更高的安全性。
{"title":"IMPLEMENTASI ALGORITMA SHA UNTUK ENKRIPSI TEKS BERBASIS MOBILE","authors":"A. Perdana, R. Syahputra, S. Manurung, Taufiqul Hafizh, Dede Indra, Gunawan Hutasuhut","doi":"10.55606/jitek.v3i2.1736","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1736","url":null,"abstract":"In today's digital era, text messages have become one of the most common communication methods used by many people around the world. However, the use of text messages also poses security risks that need to be considered. Text messages can be targeted by hackers who are after personal information or important data that is sent through text messages. Mobile devices that are always connected to the internet can make text messages easily hacked or intercepted by unauthorized parties. Therefore, the use of encryption methods on text messages is very important to enhance the security and privacy of the information sent through text messages. This research aims to implement the Secure Hash Algorithm (SHA) algorithm on a mobile application for text encryption. The implementation of the SHA algorithm on the mobile application is done using the Java programming language and utilizing Android's built-in library to process data. The results of the study show that the mobile application using the implementation of the SHA algorithm can provide higher security for data containing messages sent over public networks","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"53 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA 为 CV Loka 媒体的自由职业者开发一个与网络邮件档案应用程序相结合的工资单系统
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1856
Dion Fahrul, Henri Septanto
Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.
数据库管理是信息和通信技术发展中的一项主要工作。随着世界信息和通信技术的飞速发展,数据和事务管理系统的管理也经历了发展。在当今这样一个信息时代,数据库管理系统必须在计算机化系统中运行,以便更好、更快地管理数据。薪资系统就是需要计算机化才能更好运行的系统之一。本研究的目的是开发一个基于网络的薪资系统,该系统能够与邮件存档应用程序集成,从而提高根据员工工作计算薪资的效率。本研究采用了系统开发生命周期法,即系统分析员和程序员在建立信息系统时所进行的工作阶段以及开发信息系统的方法。该工资单系统将比以前运行的工资单系统更简便、更高效。本研究的成果是为 CV Loka Media 公司的自由职业者创建了一个与基于网络的邮件存档应用程序(使用 PHP 编程语言)相集成的工资单系统。
{"title":"PENGEMBANGAN SISTEM PENGGAJIAN YANG TERINTEGRASI DENGAN APLIKASI ARSIP SURAT BERBASIS WEB UNTUK PARA STAF FREELANCER DI CV LOKA MEDIA","authors":"Dion Fahrul, Henri Septanto","doi":"10.55606/jitek.v3i2.1856","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1856","url":null,"abstract":"Database Management is the main job that is part of the development of Information and Communication Technology. Along with the very rapid development of the world of Information and Communication Technology, the data and transaction management system has also experienced developments in its management. In the information age like today, a database management system must be run in a computerized system so that data can be managed better and faster. One of the systems that requires computerization to run better is the payroll system. The purpose of this research is to develop a web-based payroll system that is able to be integrated with mail archive applications so that it can increase the effectiveness of calculating salaries from the work of employees. This study uses the Systems Development Life Cycle method, namely the stages of work carried out by systems analysts and programmers in building information systems and also methods in developing them. This payroll system will be easier and more efficient than the payroll system that has been running before. The results of this study are a payroll system that is integrated with a web-based mail archive application created using the PHP programming language for freelancer staff at CV Loka Media.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"183 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA K 均值聚类法用于印度尼西亚自然灾害分布模式分析
Pub Date : 2023-07-14 DOI: 10.55606/jitek.v3i2.1506
M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini
Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.
数据聚类在数据分析中起着至关重要的作用,它可以识别数据中隐藏的模式、趋势和结构。K-Means 算法因其高效性和易于实施而广受欢迎,成为一种广泛使用的数据聚类方法。聚类是一种数据分析技术,用于将相似的对象归类在一起。K-Means 算法是数据科学、模式识别和人工智能等各个领域最著名、最常用的聚类方法之一。在这项研究中,我们收集了印度尼西亚不同地区的自然灾害数据,并将其作为 K-Means 聚类算法的输入。我们利用 K-Means 对发生的自然灾害中的相似模式进行聚类。聚类结果提供了可能表现出相似特征和灾害风险的群体信息。
{"title":"CLUSTERING K-MEANS UNTUK ANALISIS POLA PERSEBARAN BENCANA ALAM DI INDONESIA","authors":"M Aditya Yoga Pratama, Agus Rahmad Hidayah, Tertia Avini","doi":"10.55606/jitek.v3i2.1506","DOIUrl":"https://doi.org/10.55606/jitek.v3i2.1506","url":null,"abstract":"Data clustering plays a crucial role in data analysis for identifying hidden patterns, trends, and structures within the data. The K-Means algorithm has gained popularity as a widely used method for data clustering due to its efficiency and ease of implementation. Clustering is a data analysis technique utilized to group similar objects together. The K-Means algorithm stands out as one of the most renowned and frequently employed clustering methods across various fields, including data science, pattern recognition, and artificial intelligence. In this research, we collected data on natural disasters from different regions in Indonesia and employed it as input for the K-Means clustering algorithm. K-Means was utilized to cluster the similarity patterns within the occurring natural disasters. The clustering results provide information about groups that may exhibit similar characteristics and disaster risks.","PeriodicalId":356696,"journal":{"name":"Jurnal Informatika Dan Tekonologi Komputer (JITEK)","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139359374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Jurnal Informatika Dan Tekonologi Komputer (JITEK)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1