Journal of Informatics Information System Software Engineering and Applications (INISTA)
https://journal.ittelkom-pwt.ac.id/index.php/inista
<p align="justify">Journal of Informatics, Information System, Software Engineering and Applications (INISTA) is a peer-reviewed, scientific journal published by Industrial Technology and Informatics Faculty of Purwokerto Institute of Technology Telkom (ITT-P) with ISSN <strong> <a href="https://issn.brin.go.id/terbit/detail/1530165541" target="blank"> 2622-8106 </a></strong>. The aim of this journal is to publish articles dedicated to all aspects of the latest outstanding developments in the fields of Informatics, Information System, Software Engineering and Applications. It will be publish twice in a year <strong>May</strong> and<strong> November.</strong></p> <p align="justify"><strong>Start from edition Vol. 5 No. 2 in May 2023, we are only accept publication journal only in English.</strong></p>LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTOen-USJournal of Informatics Information System Software Engineering and Applications (INISTA)2622-8106<h3>Copyright Notice</h3> <p> </p> <p><strong>Authors who publish with Journal of Informatics, Information System, Software Engineering and Applications (INISTA) agree to the following terms:</strong></p> <ul> <li class="show">Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License (CC BY-SA 4.0) that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.</li> <li class="show">Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.</li> <li class="show">Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ul>The Applications of Mamdani Fuzzy in Water Selection of Pangas Catfish Ponds
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1030
<p>In the field of fisheries, the selection of ponds water for Pangas catfish is very important because it affect the production and quality of fish. The purpose of this research is to apply the Mamdani fuzzy method in selecting suitable ponds water for Pangas catfish. The method used includes collecting data on water quality and environmental conditions, constructing the Mamdani fuzzy system and evaluating the results of selecting ponds water. The results of the study show that the Mamdani fuzzy method is able to provide a good solution in selecting ponds water for Pangas catfish by combining several factors such as temperature, pH and oxygen solubility. This concept can be used as a consideration in selecting the right ponds water for Pangas catfish so as to increase fish production and quality.</p>Rizki Mugi Setya AdiLaureta Mauren MichelliHardian AlkoriRexy Gilang Ramadhan
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-03-062024-03-066210811510.20895/inista.v6i2.1030Classification of Marine Fish Based on Image Using Convolutional Neural Network Algorithm and VGG16
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1466
<p><strong>Marine fish are one of the many natural resources that frequently consumed by people. However, several types of marine fish are prohibited from consumption due to being nearly extinct. Additionally, some fish species contain high levels of mercury that can be harmful to human if consumed. Because of the large number of marine fish species, it becomes challenging to identify them without knowledge of fisheries. Moreover, computers have become highly advanced devices that facilitate various human activities. This advancement allows for the creation of systems capable of processing information from images, known as image classification. There are numerous methods that can be employed in designing an image classification system, one of which is transfer learning. This study was aimed to design an image classification system using the transfer learning method with a pre-trained VGG16 model and Convolutional Neural Network algorithm. The research results showed a training data accuracy of 100% and a validation data accuracy of 99.3%, with an overall accuracy of 84% and a loss value of 0.6591.</strong></p>Dimas Adira WibisonoAuliya Buhanuddin
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-06-212024-06-216211612310.20895/inista.v6i2.1466Utilizing Design Thinking and User Experience Research for Effective Agricultural Labor Recruitment Web Application Design
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1442
<p>The agricultural sector faces a significant challenge in recruiting a skilled workforce, with both landowners and tenant farmers struggling to find new laborers. Factors such as inadequate rural infrastructure and facilities, coupled with limited technology adoption, have diminished the appeal of working in the agricultural sector. Consequently, agricultural productivity has declined due to a shortage of adequate labor. To address this issue, a prototype web application named “Partner Tani” was designed to facilitate labor recruitment for farmers. The application design process employed the Design Thinking methodology and the User Experience Questionnaire (UEQ) to thoroughly understand user requirements. The design outcomes encompass both user interface and administrator interface components, developed using Figma. The prototype application features functionalities such as login, account registration, profile management, job posting and search, and complaint reporting. Evaluation using the UEQ revealed that the prototype application achieved exceptional scores across all user experience dimensions: Attractiveness (average score: 2,11), Perspicuity (average score: 1,42), Efficiency (average score: 2,33), Dependability (average score: 1,50), Stimulation (average score: 1,75), and Novelty (average score: 1,67). Average scores for Attractiveness, Efficiency, Stimulation, and Novelty fell within the “Excellent” range, while Perspicuity and Dependability scores were above average. These findings indicate that the “Partner Tani” application prototype holds promise in delivering a satisfying and efficient user experience for agricultural labor recruitment.</p>Cut Luna SabrinaSarah Astiti
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-06-282024-06-286212413310.20895/inista.v6i2.1442Website Based Academic Information System Design Using Extreme Programming Method
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1214
<p><em>SMP Negeri 3 Watukumpul is a junior high school located in Bongas Village, Watukumpul District, Pemalang Regency, Central Java. This school has implemented website-based technology as a medium for conveying information, but the website is no longer usable. The data obtained from the interview results indicate the need for an academic information system website as a medium for disseminating information and managing academic data digitally. Based on the existing problems, researchers will re-create a website-based Academic Information System for SMP Negeri 3 Watukumpul as a medium for delivering information and managing academic data. This research uses the Extreme Programming method, which is one of the development methodologies of Agile Software Development Methodologies. The Extreme Programming method has several stages: Planning, Design, Coding, and Testing.</em> <em>The system uses black box testing on student, admin, and teacher accounts. Blackbox testing on student accounts includes login, register, profile, news, wall magazine, course material, grades, contacts, and logout menus. Blackbox testing on teacher accounts consists of login menus, course materials, grades, and grade page details. Black box testing on admin accounts consists of login menus, school profiles, teachers and employees, news, wall magazines, extracurriculars, and lesson schedules. In testing this system, researchers use black box testing to test its functionality.</em> <em>The black box test from the student's account got a result of 100%, the black box test result from the teacher's account got 100%, and the black box test from the admin account was 98.57%. Thus, the average black box test result from the three users was 99.52%. With the existence of this school website, it is hoped that information dissemination activities and academic data management activities will become more effective and efficient.</em></p>Deni PrasetyoAnnisaa UtamiTri Ginanjar Laksana
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-07-032024-07-036213414310.20895/inista.v6i2.1214Design of Monitoring System Gryllus Mitratus Cricket Cultivation Based Internet of Things
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1153
<p>Crickets have various types, one of which is <em>Gryllus Mitratus</em>. <em>Gryllus Mitratus</em> crickets in Penolih village are cultivated by 16 cricket breeders, with individuals having at least 6 boxes with a size of 200 x 120 x 65 cm and a cage foot height of 25 cm. Cricket cultivation in Penolih village, Kaligondang sub-district, Purbalingga district, is still not optimal due to several factors, such as temperature, humidity, and light intensity, which are not suitable for crickets and cause stress and death. The temperature that crickets can accept is 20 <sup>o </sup>C to 32 <sup>o </sup>C, humidity is 65% to 80%, and light intensity is 0 lux. A tool is needed to monitor temperature conditions using DHT11, humidity using BME280, and light intensity using BH1750, which is installed in the cricket cage to determine its value and be followed up by cricket breeders. These sensors will send the input data to NodeMCU to be sent to the cloud so that it can be displayed in the Android application. The research method used is waterfall, namely the development of a systematic and sequential information system. Based on testing for 7 days, the average temperature of the cricket cage was 28.26 <sup>o </sup>C, the humidity of the cricket cage was 74.72%, and the light intensity of the cricket cage was 5.1 lux.</p>Aulia Desy Aulia Nur UtomoWahyu Fajaruloh
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-07-042024-07-046214415310.20895/inista.v6i2.1153Analysis of User Satisfaction with the Cards Application Using the End User Computing Satisfaction Method
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1302
<p>The rapid development of technology has significantly facilitated daily activities and brought about numerous changes in society. This swift technological advancement has had a profound impact on the development of payment systems in transactions. Various applications like CARDS have become well-known and widely utilized by many individuals to streamline their day-to-day transactions. CARDS application is also popular within school environments, making it easier for students and cooperative employees to conduct transactions for purchasing food, beverages, and other school necessities. However, there are challenges that need to be addressed regarding the use of the CARDS application. One of them is the lack of understanding among some parents in operating the application and loading credits. End User Computing Satisfaction can be used as a method to measure the level of satisfaction of a system application's users. This method compares user expectations with the reality provided by the application, thereby identifying how well the application meets user expectations. The research results will provide recommendations for improving the application, taking into account the End User Computing Satisfaction method.</p>Xenaya Hawa ElditaSisilia Thya SafitriResad Setyadi
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-07-042024-07-046215416410.20895/inista.v6i2.1302Analysis of NSL-KDD for the Implementation of Machine Learning in Network Intrusion Detection System
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1389
<p>In the world of network data communication, anomaly detection is a crucial element in identifying abnormal behavior among the flowing data packets. Research in the field of intrusion detection often focuses on the search and analysis of anomalous patterns and the misuse of communication data. The research methodology in this study adopts CRISP-DM (Cross-Industry Standard Process for Data Mining) as the framework. The primary goal of this research is to conduct a comparative analysis of classification techniques to identify normal and anomaly records within network data. For this purpose, a publicly available standard dataset, NSL-KDD, is used. The NSL-KDD dataset consists of 41 attributes with relevance, and the 42nd attribute is used to identify normal class and four attack classes. The results of the analysis using the NSL-KDD dataset, applying the CRISP-DM methodology and machine learning techniques in the Network Intrusion Detection System, reveal that the Decision Tree model has the highest accuracy, achieving 100% on the training data and 80% on the testing data. These findings are compared with the results of using other models such as Random Forest, Logistic Regression, and K-Nearest Neighbor. This discovery has significant implications for enhancing NIDS's ability to recognize network threats and improve network system security.</p>Yuliana YulianaDhoni Hanif SupriyadiMohammad Reza FahleviMuhamad Rifki Arisagas
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-02-292024-02-2962808910.20895/inista.v6i2.1389Sentiment Analysis Using Transformer Method
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1383
<p>This research delves into sentiment analysis, employing the transformative capabilities of transformer method. Specifically, leveraging BERT Models, the study aims to advance sentiment classification accuracy by intricately capturing contextual nuances and positive or negative comment on IMDB movies reviews. The transformer architecture's distinctive attention mechanism proves pivotal in comprehending intricate relationships between words, facilitating a profound understanding of sentiment in textual data. Through extensive experimentation, the study establishes the transformative prowess of these methods, showcasing their effectiveness in achieving state-of-the-art results in sentiment analysis tasks. This investigation not only contributes to the evolving landscape of sentiment analysis but also underscores the significance of transformer-based approaches in deciphering the subtleties of human expression within textual data specially for Bert models. This research will predict sentiment analysis on comment of IMDB movies and shows some results which are 3% of loss, 60% off loss validation, 98% of accuracy and 90% of validation accuracy</p>Andi AljabarIrcham AliBinti Mamluatul Karomah
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-02-292024-02-2962909710.20895/inista.v6i2.1383Exploration of the Dempster-Shafer Theory for Diagnosing Hardware Damage: Comparative Study with the Certainty Factor Method
https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/1401
<p>Comparative research is a research method that compares two or more research objects to expand understanding of them. In this context, we compare the Certainty Factor method and the Dempster-Shafer method in diagnosing computer hardware damage. The Certainty Factor method measures an expert's confidence in the solution that will be provided. On the other hand, the Dempster-Shafer method is a useful theory in situations where uncertainty dominates. This research focuses on comparing the effectiveness of the two methods in detecting computer hardware damage. An experimental approach is used to look for causal relationships between variables controlled by the researcher. The research results show that the Certainty Factor method has an average success rate of 14.51%, while the Dempster-Shafer method reaches 84.27% in terms of error difference. From these results, it can be concluded that the Certainty Factor method is more effective in diagnosing computer hardware damage.</p> <p>Keywords: INISTA, journal, MS.Word template</p>Koidah KoidahAzhar BasirAbdul Jamil
##submission.copyrightStatement##
http://creativecommons.org/licenses/by-sa/4.0
2024-03-052024-03-05629810710.20895/inista.v6i2.1401