http://trilogi.ac.id/journal/ks/index.php/JISA/issue/feedJISA(Jurnal Informatika dan Sains)2023-12-27T06:58:48SE Asia Standard TimeBudi Arifitamabudiarif@trilogi.ac.idOpen Journal Systemshttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1652Interactive Multimedia as Information Media Parasitic Infection with Multimedia Development Life Cycle Method2023-12-27T03:26:38SE Asia Standard TimeDasril Aldodasril@ittelkom-pwt.ac.idMiftahul Ilmimiftahulilmi12@gmail.comSapta Eka Putrasaptaeka54putra@gmail.comWidya Lelisa Armywidya.lelisa@pertiwi.ac.id<p>This study focused on the problem of lack of interactive multimedia-based educational information media that is interesting as a provider of information about parasitic infections in humans. This parasitic infection is very dangerous, especially for children who still lack knowledge about it. The aim of this research is to provide educational information media to the wider community, especially at the Seberang Padang Health Center, about parasitic infections in a way that is as interesting as possible and easy to use. Interactive multimedia is a solution to this problem. This research uses the Multimedia Development Life Cycle Method as a guide in building interactive multimedia with the stages of Concept, Design, Material Collecting, Assembly, Testing and Distribution. The results of the alpha test showed that all features of this interactive multimedia can function properly. A beta test was conducted on 30 respondents from the public who accompanied patients to the Seberang Padang Health Center. As a result, this interactive multimedia received a rating of 4.54 out of 5. Therefore, this interactive multimedia is very good and suitable for use as an educational medium for information about parasitic infections. With this interactive multimedia-based educational information media, it is hoped that the wider community can better understand and be aware of parasitic infections and preventive measures that can be taken to avoid these infections.</p>2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Dasril Aldo, Miftahul Ilmi, Sapta Eka Putra, Widya Lelisa Armyhttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1656Penetration Testing Tangerang City Web Application With Implementing OWASP Top 10 Web Security Risks Framework2023-12-27T03:26:39SE Asia Standard TimeYoel Armandoyoel.armando@student.president.ac.idRosalina Rosalinarosalina@president.ac.id<p>The speed of technological development has made it possible for all people to be connected to one another. The creation of web-based information systems that help in all areas, including government, health, and education, is one of the forces behind the development of technology. With these technological advancements, websites are susceptible to cybercrimes that could end in the theft of crucial data. Top 10 Web Application Security Risks is the most effective prevention process for decrease company information leaks. On the website tangerangkota.go.id, the researcher will conduct a test using the Top 10 Web Application Security Risks technique. Top 10 Web Application Security Risks consist of Broken Access Control, Cryptographic Failures, Injection, Insecure Design, Security Misconfiguration, Vulnerable and Outdated Components, Identification and Authentication Failures, Software and Data Integrity Failures, Security Logging and Monitoring Failures, Server-Side Request Forgery. The penetration testing results found on the Tangerang City website which are 4 injections, 2 broken access controls, 1 security misconfiguration.</p>2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Yoel Armando, Rosalina Rosalinahttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1714Sentiment Analysis of 2024 Presidential Candidates Election Using SVM Algorithm2023-12-27T03:26:39SE Asia Standard TimeMichael Alfonsomichaelalfonso95@gmail.comDionisia Bhisetya Rarasatil1783@lecturer.ubm.ac.idElections for presidential candidates are held every 5 years with various candidates, especially on Twitter, arguments about political matters often occur that many Twitter users participate in discussions about the election for presidential candidate. Therefore, this study focuses on sentiment analysis to infer user responses to the presidential election and validate it by looking for a correlation between electability survey results and Twitter sentiment data using Pearson Correlation. In sentiment analysis model, the 10-Fold Cross Validation method is used to find the best model from a dataset with a division of training data and test data with 90:10 split. Then the alphabetic data will be converted into numeric data using the TF-IDF weighting method. To validate the best model, Confusion Matrix is used to get the best f1-score. The model is using Support vector machine algorithm with the Gaussian RBF (Radial Basis Function) kernel. The results of the analysis are compared with the results of the news portal electability survey which contains the 3 candidates using Pearson Correlation. This study produces the best fold for each data on each presidential candidate with the f1-score to find the best model for each fold. In the Peason Correlation result, the higher positive sentiment of each presidential candidate, the higher electability survey data. For further research, research can be discuss about hyper tuning parameters and using other kernels on Support vector machine algorithm.2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Michael Alfonso, Dionisia Bhisetya Rarasatihttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1751DevOps, Continuous Integration and Continuous Deployment Methods for Software Deployment Automation2023-12-27T03:26:39SE Asia Standard TimeMochamad Hanif Rifa'i Istifarulahhanifrifaii@gmail.comRizka Tiaharyadinirizka.tiaharyadini@budiluhur.ac.id<div class="page" title="Page 1"><div class="layoutArea"><div class="column"><p>In the fast-paced landscape of software development, the need for efficient, reliable, and rapid deployment processes has become paramount. Manual deployment processes often lead to inefficiencies, errors, and delays, impacting the overall agility and reliability of software delivery. DevOps, as a cultural and collaborative approach, plays a central role in orchestrating the synergy between development and operations teams, fostering a shared responsibility for the entire software delivery lifecycle. Continuous Integration is a fundamental DevOps practice that involves regularly integrating code changes into a shared repository, triggering automated builds and tests. Continuous Deployment complements Continuous Integration by automating the release and deployment of validated code changes into production environments. The purpose of this research is to create a software deployment automation system to make it easier and reliable for organizations to deploy software. In conclusion, the results of this research show that by adopting DevOps, Continuous Integration, and Continuous Deployment, organizations can achieve enhanced collaboration, shortened release cycles, increased deployment frequency, consistent deployment, and improved overall software quality.<strong><em></em></strong></p></div></div></div>2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Mochamad Hanif Rifa'i Istifarulah, Rizka Tiaharyadinihttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1754Bayah Dome Geopark Information System Based On Website Using Prototype Method2023-12-27T03:26:40SE Asia Standard TimeDentik Karyaningsihkarya.tiek@gmail.comDonny Fernandomr.donny2008@gmail.comReza Pramuditahanyqueen14@gmail.comFauzan Wahyu Ramadhanfauzanwahyu785@gmail.com<p class="IEEEAbtract">To realize a national Geopark and a World Geopark, it is necessary to socialize and disseminate information that can be accessed by the people of Lebak Regency in particular and the wider community in general to introduce all the geological heritage that has been determined by the Minister of Energy and Mineral Resources. Nowadays, digital information system technology has become an undeniable need, and has even become a source of information that can be accessed by all people in the world. The Bayah Dome Geopark management body in Lebak Regency does not yet have a website-based information system, so it is necessary to create a website-based Bayah Dome Geopark information system so that the Bayah Dome Geopark is known nationally and internationally.This research uses a Research and Development approach. Research procedures include: (a) analysis, (b) design, (c) implementation and (d) evaluation. Stage (a) analysis consists of two steps, namely literature study and field survey. The literature study examines concepts and theories relating to Geoparks and the Bayah Dome Geopark, while a field survey was carried out to collect data relating to the Bayah Dome Geopark. Stage (b) design is carried out by designing a website with UML (Unified Modeling Language) which is a program design based on the results obtained in the analysis stage which includes: use case diagrams, activity diagrams using the prototype system development method. In stage (c) implementation, the results of the design are outlined and implemented into a website.</p>2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Dentik Karyaningsih, Donny Fernando, Reza Pramudita, Fauzan Wahyu Ramadhanhttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1758DEVELOPMENT OF ARTS LEARNING MEDIA USING AUGMENTED REALITY WITH MARKERLESS BASED TRACKING METHOD AT SMKN 472023-12-27T06:58:48SE Asia Standard TimeGhali Hananghalihanan@trilogi.ac.idBudi Arifitamabudiarif@trilogi.ac.idSilvester Dian Handy Permanahandy@trilogi.ac.id2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Ghali Hanan, Budi Arifitama, Silvester Dian Handy Permanahttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1766Implementation of The Resident’s Dues Applications (SIUMAS) Using Waterfall Method in RT X Cinere Village2023-12-27T03:26:40SE Asia Standard TimeFebrianto Febriantofebrianto@students.paramadina.ac.idIkhwana Fakih Nur Azizikhwan.aziz@students.paramadina.ac.idMochammad Alvian Kosimmochammad.kosim@students.paramadina.ac.idMuhammad Darwismuhammad.darwis@paramadina.ac.idRetno Hendrowatiretno.hendrowati@paramadina.ac.id2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Febrianto, Ikhwana Fakih Nur Aziz, Mochammad Alvian Kosim, Muhammad Darwis, Retno Hendrowatihttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1773Implementation of Android-Based Tailoring Service Ordering Application with Geolocation Integration2023-12-27T03:26:40SE Asia Standard TimeMuhamad Agung Santosomuhamad.5200411549@student.uty.ac.idJoko Sutopojksutopo@uty.ac.id2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Muhamad Agung Santoso, Joko Sutopohttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1780Forecasting Blood Demand Using the Support Vektor Regression Method (Case Study: Blood Transfusion Unit-PMI Central Lombok)2023-12-27T03:26:41SE Asia Standard TimeYati Apriatiapriatiyati750@gmail.comWafiah Murniatiwafiah.mr@gmail.comSaikin Saikineken.apache@gmail.comSofiansyah Fadlisofiansyah182@gmail.comHairul Fahmiiroel.ami@gmail.comBlood is an important component produced by the human body. Blood is also a very vital part of human survival. When blood levels in the human body are less than they should be, the way to overcome this is by donating blood or blood transfusion. The health facilities that organize blood donations, provide blood and distribute blood are called Blood Transfusion Units (UTD). UTD in carrying out its duties encountered several obstacles, such as blood only having a shelf life of 35 days from donation. If it has passed the expiration date, it cannot be used anymore for blood transfusions. Meanwhile, regarding the demand for blood, the need for blood is greater than those donating. Making it difficult for UTD if the demand occurs when the existing blood stock is not sufficient. And if the stock in UTD experiences an axcess, it can cause losses because the blood is wasted due to expiration. Apart form that. The problem is that in everyday life, many people’s need for blood is reduced. Many of their families intervened directly to find available donors. They even search on social networks or social media such as WhatsApp, Facebook, Instagram and others. And this shows that many of them lack donors. To anticipate these problems. So it is necessary to carry out research on forecasting blood demand using the Support Vektor Regression method at UTD PMI Central Lombok. The aim of this research is to forecast or predict the demand for blood at UTD PMI Central Lombok in the coming period. To reduce the impact of lack or excess blood. SVR is the application of Support Vektor Machine (SVM) in the case of regression to find the best dividing line in the regression function. The advantage of the SVR model is that it can handle overfiting problems in the data. The tests used to measure the best model are Mean Squared Error (MSE), Root Mean Squared Error (RMSE), Mean Absolute Percentage Error (MAPE) and Coefficient of Determination (R2). The results of this research shows that the best model is Support Vektor Regression (SVR) with a polynomial kernel and based on the tuning results, the parameters used are C=10, degree=1, epsilon=1. The SVR model using a polynomial kernel produces a MAPE value of 18.7502% and RMSE value of 0.6919, which means the model has very good predictive ability. Prediction accuracy was achieved with an R2 value of 0.9936 or 99.36% and an MSE value of 0.4787, which means that the prediction of blood demand data at UTD PMI Central Lombok using SVR with a polynomial kernel function had very good prediction accuracy. With predicted result in january for blood type A it was 1654, B was 920, O was 2205 and AB was 11042023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Yati Apriati, Wafiah Murniati, Saikin Saikin, Sofiansyah Fadli, Hairul Fahmihttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1783Improving Firebase BaaS Service Security in Counseling Chat Applications: AES-256 and CBC Approach for End-to-End Encryption2023-12-27T03:26:41SE Asia Standard TimeMogar Nurhandhimogarnurhandhi@gmail.comAgus Suhendaragus.suhendar@staff.uty.ac.id<p>The activities of using the internet and exchanging information and sending messages have used a lot of internet media, one of which is chat message media, but over time data and information security problems in chat messages that are often encountered are active and passive wiretapping. In this research, the author wants to create a counseling chat message security application using the AES (Advanced Encryption Standard) algorithm cryptographic method combined with the CBC (Cipher Block Chaining) technique which is an advanced development of the ECB (Electronic Code Book) technique. AES basically uses a block cipher with a length of 128 bits as the default operation, and the key length size varies from 128, 192 and 256 bits. so AES uses a 4x4 matrix equation with each section having a size of 1 byte. From these problems, research will be conducted to develop an application to accommodate the counseling process using a chat application that has the main focus of securing messages with image types and stored in the Firebase database service (Backend as a Service). As well as using the End-to-End service principle so that users do not need to do the encryption or decryption process directly because the process has been carried out by the system, this will also provide more security aspects in terms of confidentiality of key data and initialization vectors. So that the process of exchanging information using the media chat counseling application is secured and avoids tapping by irresponsible parties.</p>2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Mogar Nurhandhi, Agus Suhendarhttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1789Comparison of ANN Backpropagation Algorithm and Random Forest Regression in Predicting the Number of New Students2023-12-27T03:26:41SE Asia Standard TimePadmavati Darma Tanuwijayapadmavati.tanuwijaya@student.ukdc.ac.idJhonatan Laurensius Tjahjadijhonatan.tjahjadi@student.ukdc.ac.idYosefina Finsensia Ritiyosefina.riti@ukdc.ac.id2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Padmavati Darma Tanuwijaya, Jhonatan Laurensius Tjahjadi, Yosefina Finsensia Ritihttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1801Mobile Based Application Design of the Catholic Church of the Redeemer of Sumbawa Using the Waterfall Method2023-12-27T03:26:42SE Asia Standard TimeClaudio Orlando De Araujoclaudioorlando517@gmail.comMuhammad Zakariyahmuhammad.zakariyah@staff.uty.ac.id2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Claudio Orlando De Araujo, Muhammad Zakariyahhttp://trilogi.ac.id/journal/ks/index.php/JISA/article/view/1813Detection of Hate-Speech Tweets Based on Deep Learning: A Review2023-12-27T03:26:42SE Asia Standard TimeAra Zozan Miranara.miran@auas.edu.krdAdnan Mohsin Abdulazeezadnan.mohsin@dpu.edu.krd2023-12-27T06:46:19SE Asia Standard TimeCopyright (c) 2023 Ara Zozan Miran, Adnan Mohsin Abdulazeez