Jurnal Informatika Teknologi dan Sains 2021-08-29T09:27:33+07:00 Eri Sasmita Susanto Open Journal Systems <p><strong>Jurnal Informatika Teknologi &amp; Sain</strong>s (JINTEKS) merupakan media publikasi yang dikelola oleh Program Studi Informatika, Fakultas Teknik dengan ruang lingkup publikasi terkait dengan tema tema riset sesuai dengan bidang keilmuan Informatika yang meliputi Algoritm , Software Enginering, Network &amp; Security serta Artificial Inteligence. disamping itu JINTEKS juga mengelola publikasi yang terkait dengan ilmu Keteknikan / Engineering dan bidang sains yang meliputi matematika komputasi, Biomatematika serta Fisika terapan yang mengarah pada komputasi.</p> <p><strong>Journal of Informatics Technology &amp; Science</strong> is a publication media managed by Informatics Department, Faculty of Engineering. The scope of publication is related to some themes that in accordance with the field of informatics, which comprises Algorithm,Network &amp; Security, Software Engineering, and Artificial Intelligence. Besides, Journal of Informatics, Technology &amp; Science is also managing a publication that related to Engineering And Science Field, such as Mathematics of Computation, Biomathematics, and Applied Physics that leads to computation. </p> ANALISIS KEAMANAN WEBSITE SMAN 1 SUMBAWA MENGGUNAKAN METODE VULNERABILITY ASESEMENT 2021-08-16T07:58:17+07:00 Yudi Mulyanto Eka Haryanti Jumirah Jumirah <p>SMAN 1 Sumbawa is a school that provides information to students through a website-based information system to facilitate school administration services. Considering that the Website can be accessed widely, it is necessary to pay attention to the security of the Website. One of them is by using the Vulnerability Assessment method. The Vulnerability Assessment method is a method for conducting vulnerability testing on a website or application that has the potential to enter an attack which consists of several stages such as Network Discovering, Vulnerability Scanning, and Result Analysis. This stage aims to identify security holes on the SMAN 1 Sumbawa website. The tests that have been carried out have identified four levels of vulnerability, namely high, medium, low, and informational on the SMAN 1 Sumbawa website. The hight vulnerability level obtained is SQL Injection. The SQL Injection vulnerability makes it easy for attackers to access the entire database. The results of the tests that have been carried out show that the SMAN 1 Sumbawa Website has many vulnerabilities or Vulnerability that the SMAN 1 Sumbawa Website is still in an unsafe state.</p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains IMPLEMENTASI HOTSPOT DENGAN USER MANAGERUNTUK INTERNET WIRELESS MENGGUNAKANMIKROTIK Rb 941-2nd DI MTsN 1SUMBAWA BESAR 2021-08-28T16:19:22+07:00 Eri Sasmita Susanto Arsi Dwi Septiarini Yunanri W <p>This study aims to implement a wifi hotspot at MTsN 1 Sumbawa Besar to minimize network disturbances. This research is implemented using network devices such as Mikrotik Router, Windows Server 2007 and other supporting network devices. The network development method uses the Network Development Life Cycle (NDLC) approach. It is starting with the process of analysis, design, simulation to implementation. The instrument of data collection techniques in the study used observation, interviews, documentation and literature study. The final result of this research is to implement a hotspot network that can cover the entire madrasa area. MTsN 1 Sumbawa Besar can<br />Access the internet without any network disturbances.</p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains DESIGN AND BUILD OPEN CLOSE THE GARBAGE ARDUINO BASED AUTO 2021-08-13T06:40:22+07:00 Nabila Oper Nabila Govinda Jibrillah Hasan <p>The environment is one of the most important things in life. A dirty environment can negatively impact humans, so the author designed an Arduino-based automatic trash can. This automatic trash can requires tools that are divided into two<br />parts, namely hardware and software. The hardware consists of ultrasonic sensors and servo motors, while the software is made using the Arduino IDE program. In this study, the author uses the Network Development Life Cycle (NDLC) method so that the design process can be well directed. The results in the study show that if the object is at a distance of &lt;10 cm from the trash can, the trash can will automatically open, and if it's the other way around, the trash can will be closed.</p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains PEMBUATAN FILE SYSTEM GLUSTERFS DISTRIBUTED- REPLICATED VOLUME DI SEKOLAH VOKASI IPB UNIVERSITY 2021-08-09T20:17:41+07:00 Aep Setiawan Rifa Ade Rahmah <p><em>College of Vocational IPB University (SV-IPB) uses a client-server system as an information technology architecture. The server provides several services that are used to assist the teaching and learning process at the IPB Vocational School. The application used to provide services is the Modular Object-Oriented Dynamic Learning Environment (MOODLE) which is used for e-learning. SV-IPB provides two Virtual Machines which are used as a web server and a database server. The use of a single web server to replace the request is certainly less stable because there is no web server to back it up so that the service will stop. This situation states that the use of a single web server does not have high information (high available). To overcome this problem, the cluster technology can be used to group several web servers in SV-IPB. The web server clustering technology used is the </em>Gluster File System<em> (GlusterFS) with the volume type used, namely Distributed-replicated volume. Based on the tests that have been carried out, this project can solve the problem that has been described earlier that "one web server is down, there is still another web server that can so that the client request process does not stop. In addition, the clustering technology used is required for the use of load balancing web servers so that it can reduce the load on each server because the request process will be sent alternately between web servers.</em></p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains APLIKASI TABUNGAN PONDOK PESANTREN DAYAH PERBATASAN DARUL AMIN KUTACANE ACEH TENGGARA MENGGUNAKAN ALGORITMA KEAMANAN AES BERBASIS WEB 2021-08-17T18:08:55+07:00 M. Julkarnain Shinta Esabella Brenny Prasetyo Waty <p><em>This study aims to design and build a Darul Amin Border Pondok Dayah Savings Application, Kutacane Aceh Tenggara Using Web-Based AES Security (1) Can help facilitate Dayah administration to manage data storage, calculate the amount of savings money automatically and process savings financial statements more easily by using computerized application. (2) This savings application is web-based using the AES security algorithm on the login menu and the student data. This research is included in descriptive qualitative research. This application development uses the PHP and MySQL programming languages ??for the database. In this study the authors use data collection methods by observation, interviews, and literature study, application modeling uses a structured model, namely ERD (Entity Relationship Diagram), DFD (Data Flow Diagram), Flowmap and HIPO (Hierarchy Plus Input-Process Output), while testing the application using the black box testing method, namely testing in terms of application functionality.</em></p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains SISTEM INFORMASI MANAJEMEN RUMAH SUSUN SUMBAWA UNIVERSITAS TEKNOLOGI SUMBAWA BERBASIS WEB 2021-08-17T14:23:49+07:00 Yana Karisma M. Julkarnain Shinta Esabella Muhammad Rifqi Fawzan <p><em>This study aims to create a Web-based Sumbawa Flats Management Information System, Sumbawa University of Technology, so that it can be used by the Sumbawa Flats Management (RUSUNAWA) Sumbawa Technology University. The methods used in this study are qualitative methods and data collection methods used in this study, namely interviews, observations, and literature studies and also using the Waterfall Method as a software development method. The Web-Based Management Information System of Sumbawa Flats, Sumbawa University of Technology, was created using the PHP programming language and MySQL as the database. With this information system, it is hoped that it will make it easier for Sumbawa Flats to collect data and manage all activities in Sumbawa Flats.</em></p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains INOVASI TEKNOLOGI PLECING KALENG SEBAGAI PEMULIHAN EKONOMI PASCA GEMPA LOMBOK 2021-08-09T20:18:51+07:00 Agung Prayogo Chadziqatun Najilatil Mazda <p>Lombok is one of the provinces in Indonesia with many tourist destinations. In August 2018, an earthquake measuring 7 on the Richter Scale rocked the tourism destination. The Lombok earthquake has become a regional threat for the public and foreign and domestic tourists. As a result of this incident, hundreds of people were injured and at least 105 people died. The Lombok earthquake not only had an impact on damage to buildings and public facilities, but also on the tourism industry sector which plays a role in increasing the country's economic growth. The economic sector is the most significantly affected. So, we need an idea of ??economic reconciliation after the Lombok earthquake. One of them is through technological innovation in the form of canning plecing kale which is one of Lombok's special foods, consisting of boiled kale and served with tomato sauce. The results showed that the technological innovation of canning plecing kale is able to make this type of food more durable and easy to consume as well as a choice of souvenirs for Lombok domestic and foreign tourists. Through technological innovation of canning plecing kale, it is hoped that the economic reconciliation of the Lombok people after the earthquake by utilizing existing local potential. Thus, in the long term, participate as a solution in the field of sustainable tourism for the Lombok area which is an object of tourist destinations.</p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains SIMULASI DROPLET UNTUK PENDINGINAN ALAT TEKNOLOGI INFORMASI DENGAN METODE LATTICE-BOLTZMANN 2021-08-09T20:16:29+07:00 Wiji Nurastuti Kumara Ari Yuana <p><strong>Abstrak : </strong>Kebutuhan inovasi skema pendinginan untuk pemeliharaan perangkat elektronik dengan suhu aman dibawah batas yang telah ditentukan oleh batasan material dan kendala realibilitas yang terkait pada miniaturisasi microchip yang agresif pada komponen elektronik. Pergeseran dari ketergantungan pada sistem berpendingin kipas menjadi ke skema pendinginan yang memanfaatkan pendingin cairan dielektrik menggunakan berbagai skema pendinginan fase tunggal. Perekayasa (engineer) sistem pendingin memusatkan perhatian pada skema pendinginan dua fase, untuk memanfaatkan kedua system pendingin. Sifat yang harus dimiliki perekayasa sistem pendingin ini yaitu konveksi fluida dan panas laten untuk memindahkan jumlah kalor yang jauh lebih besar dari pada skema fase tunggal, sambil mempertahankan suhu perangkat yang lebih rendah. Beberapa skema pendingin cairan dua fase telah direkomendasikan untuk menghilangkan fluks kalor tinggi dari perangkat yang digunakan diaplikasi. Momentum droplet memungkinkan cairan menembus penghalang uap yang dibuat oleh gelembung nukleasi dan secara lebih efektif mengisi kembali permukaan, keduanya sangat bermanfaat untuk pendinginan fluks tinggi. Pada model dan simulasi pengembangan droplet menggunakan metode LBM multi fase, parameter penting yang selalu didapatkan adalah arus semu maksimum (maximum spurious currents) yang menetukan stabilitas komputasi.</p> <p><strong>Kata kunci : </strong>Modeling Matematis, Simulasi Droplet, Metode Latice-Boltzman</p> <p><strong>&nbsp;</strong></p> <p><strong>Abstract:</strong> The need for innovative cooling schemes for maintaining electronic devices with safe temperatures below predetermined limits by material limitations and reliability constraints associated with aggressive microchip miniaturization of electronic components. Shifting from reliance on fan-cooled systems to cooling schemes that utilize dielectric liquid cooling using a variety of single-phase cooling schemes. The cooling system engineer focuses on two-phase cooling schemes, to take advantage of both cooling systems. Properties that these cooling system engineers must possess are fluid convection and latent heat to transfer a much greater amount of heat than a single-phase scheme, while maintaining a lower device temperature. Several two-phase liquid cooling schemes have been recommended to remove the high heat flux from the apparatus used in the application. The droplet momentum allows the liquid to penetrate the vapor barrier created by the nucleation bubbles and more effectively replenish the surface, both of which are very beneficial for high flux cooling. In droplet development models and simulations using the multi-phase LBM method, an important parameter that is always obtained is the maximum spurious currents which determine the computational stability.</p> <p><strong>Keywords:</strong> Mathematical Modeling, Droplet Simulation, Latice-Boltzman Method</p> <p>&nbsp;</p> 2021-08-29T00:00:00+07:00 Copyright (c) 2021 Jurnal Informatika Teknologi dan Sains