Incomtech
https://ejournal.istn.ac.id/index.php/incomtech
<p>Incomtech Journal is a journal managed by the Informatics Study Program, Faculty of Information Science and Technology (FSTI), National Institute of Science and Technology (ISTN). This journal is published twice a year. This journal contains articles related to Information Technology, Communication, Computer Networks, Information Technology Security, Computer Vision, Computer Multimedia & Games, Artificial Intelligence, Data Science, and Software Engineering.</p>Prodi Teknik Informatika Fakultas Sains dan Teknologi Informasi Institut Sains dan Teknologi Nasionalen-USIncomtech2337-6805DESIGN OF WEB-BASED CORRESPONDENCE SYSTEM USING FIFO (FIRST IN FIRST OUT) METHOD AT THE SERPONG UTARA DISTRICT OFFICE.
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2285
<p>The Office of Serpong Utara District is currently managing its correspondence manually by recording incoming and outgoing letters in an agenda book. This method naturally presents several challenges, such as slow processing of correspondence, complex document archiving that makes data retrieval difficult, time-consuming report generation, and excessive paper usage that leads to accumulation. Based on these issues, this study was conducted to develop a web-based correspondence processing and archiving system using the FIFO (First In First Out) method, which is expected to facilitate its users. The analysis method used in this study is PIECES (Performance, Information, Economy, Control, Efficiency, Service), which is applied to evaluate the system's performance. The results of this research provide data and information on incoming and outgoing correspondence. The implementation of this web-based information system can help and simplify the tasks of staff in managing, archiving, and generating reports for incoming and outgoing letters at the Office of Serpong Utara District.<br>Keywords: Correspondence, web-based, FIFO (First In First Out).</p>Dedy IskandarMonika .Prastika Ayuni
##submission.copyrightStatement##
2024-12-312024-12-311321118CHARACTERISTICS OF RESPONDENTS IN COMPLETING THE QUESTIONNAIRE ON BARRIERS TO THE USE OF E-LEARNING
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2287
<p>PT. Industri Keramik Angsa Daya (IKAD) is one of the companies engaged in the ceramic industry, which comprises several divisions, one of which is Kopkar Kesetiaan (Employee Cooperative of Kesetiaan). The cooperative within a company greatly benefits employees by providing services such as secure money storage, savings and loans, and other financial needs, thereby simplifying the management of employee finances. However, currently, the cooperative department still handles savings and loans applications manually using paper forms; loan applications are recorded on paper in ledger books and later entered into an Excel file, resulting in delays in generating management reports on savings and loans. Therefore, a web-based savings and loans information system is needed to streamline the application process and enable periodic reporting by leveraging the growing capabilities of the internet.<br>Keywords: Savings and Loans Cooperative, Website, Management.</p>Sugina .
##submission.copyrightStatement##
2024-12-312024-12-311322935CHARACTERISTICS OF RESPONDENTS IN COMPLETING THE QUESTIONNAIRE ON BARRIERS TO THE USE OF E-LEARNING
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2294
<p><em>This study aims to identify the characteristics of respondents who have participated in answering the questionnaire regarding the barriers to the use of e-learning in Higher Education, especially at one of the Foreign Language Colleges (STBA) located in the Bekasi area, West Java. After the data was collected, processed and analyzed using SPSS ver 29 software, it can be seen that the characteristics of respondents who participated in answering the questionnaire regarding the barriers to the use of e-learning can be grouped into several categories or levels, namely age characteristic categories, gender characteristic categories, education characteristic categories, study program characteristic categories, frequency of use characteristic categories, device characteristic categories used, computer characteristic categories, internet access location characteristic categories, internet characteristic categories, e-learning platform characteristic categories used, e-learning usage characteristic categories, e-learning usage characteristic categories. The age category ranges from 18-24 years as many as 55 respondents or 68.8%, the female gender category as many as 42 respondents or 52.5%, the undergraduate education category (S1) as many as 100 respondents or 100%, the English Study Program category as many as 69 respondents or 86.3%, for more details can be seen in the results and discussion in point IV contained in the contents of this journal.</em></p> <p><strong><em>Keywords :</em></strong><em> e-learning, barrier, online</em></p>Siti NurmiatiRusli Rusli
##submission.copyrightStatement##
2024-12-312024-12-311323644DESIGN OF AN ANDROID-BASED EMPLOYEE LEAVE AND ATTENDANCE SUBMISSION INFORMATION SYSTEM AT PT. ARIF CIPTA MANDIRI
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2295
<p><em>Every company's need for employees is a crucial aspect. One of the needs that must be met by employees is the right to leave as well as employee absences. PT. Arif Cipta Mandiri in inputting employee leave applications is still done semi- computerized using Microsoft Excel data processing software which causes the leave application process to run very slowly. Then the employee attendance process still uses a manual system in the form of filling out a form which employees do when they arrive and leave the office. The aim of the research carried out is to find out how the attendance and return system works as well as applying for employee leave at PT. Arif Cipta Mandiri and the need for a system to make it easier for companies to process attendance and leave requests. To obtain valid data and information, the data collection methods used were observation, interviews and literature study. Before designing the system, the researcher used system requirements analysis using PIECES analysis with indicators (Performance, Information, Economy, Control, Efficiency and Service). The tools used to build Android-based applications are Visual Studio Code, Xampp, Postmant and Github Desktop. So the research results show that by designing an Android application-based information system, PT. Arif Cipta Mandiri for attendance and home attendance as well as employee leave requests, the company's performance regarding absenteeism and leave can increase. Employees can do attendance and leave using an Android- based application and leave can be done through the application. Supervisors and personnel departments can manage employee absences and leave using an Android-based application.</em></p> <p><strong><em>Keywords :</em></strong><em> Absence. Off work. Android Application</em></p>Ajay SupriadiEva Sukmawati
##submission.copyrightStatement##
2024-12-312024-12-311324554IMPLEMENTATION OF WIFI NETWORK SECURITY USING WIRESHARK APPLICATION WITH PACKET SNIFFING METHODE AT KJPP SUGIANTO PRASODJO AND PARTNERS
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2296
<p><em>Security is a very important aspect for the exchange of data on a website. To maintain the security and privacy of website data, it is necessary to have a data encryption method used to hide information from third parties. One of method that is quite reliable in securing real-time data transmission from packet sniffing attacks is the Secure Socket Layer (SSL) protocol. The research was conducted by analyzing before and after implementing the Secure Socket Layer (SSL) protocol security on the website using application named Wireshark. The results of this research are captures that are analyzed and compared to the results of the analysis, so that it can be concluded that the news website before the SSL protocol security was implemented was very vulnerable to packet sniffing attacks and the results of the capture after it was implemented.</em></p> <p><strong><em>Keywords :</em></strong><em> Tiktok, </em><em>Analysis, website, Sniffing</em></p>Moestafa Kemal PashaSiti Madinah LadjamuddinMahar Catur Ferniza
##submission.copyrightStatement##
2024-12-312024-12-311325563ANDROID-BASED INVENTORY CONTROL APPLICATION AT PT. TEKNIK BAGUS SANTOSO
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2297
<p><em>This research aims to overcome the problem of the stock recording system in the PT Teknik Bagus Santosa warehouse which is still done manually, causing time inefficiencies, data errors and waste of paper. By developing an Android-based inventory control application that uses PHP and MySQL for data management and is tested using the black-box testing method, this research succeeded in automating the inventory management process, increasing recording accuracy, and speeding up decision making regarding stock of goods. Test results show that the application functions well, increasing warehouse operational efficiency and minimizing errors in inventory management.</em></p> <p><strong><em>Keywords :</em></strong><em> Inventory Control Application, Android</em></p>Martono MartonoSri Nova Fitri YaniRina Sonia
##submission.copyrightStatement##
2024-12-312024-12-311326470SECURITY ANALYSIS OF THE XYZ ANDRIOD APPLICATION USING THE OWASP API TOP 10 METHODOLOGY (2023)
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2298
<p><em>Application Programming Interface (API) is an important element in application development. APIs are prime targets for attacks because they expose sensitive data. Penetration Testing is an important preventive measure to identify weaknesses and data leaks that may be caused by APIs. Open Web Application Security Project (OWASP) API Top 10 2023 is an API security testing standard. The results of testing many vulnerabilities occur in Broken Object Level Authorization (BOLA), the impact is in the form of changes, disclosure and deletion of data, the way to fix it is to change the object ID to a Universally Unique Identifier (UUID).</em></p> <p><strong><em>Keywords :</em></strong><em> Application Programming Interface (API), Broken Object Level Authorization (BOLA), Open Web Application Security Project (OWASP), Identifier (ID), Universally Unique Identifier (UUID).</em></p>Roni Reza Abdullahandi SupriantoRiadi Marta Dinata
##submission.copyrightStatement##
2024-12-312024-12-311327178FIELD WORK PRACTICE INFORMATION DASHBOARD AT SMK KUSUMA BANGSA TANGERANG DIGITALIZATION-BASED
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2300
<p><em>The design of a digitalization-based information system for internships (PKL) at SMK Kusuma Bangsa Tangerang is an effort to overcome obstacles arising from the use of manual systems in internships (PKL). This research proposes the application of the waterfall method to design a system that integrates user needs, including administrators and students. The new system aims to reduce difficulties in accessing information, data loss, and inefficient processes. Through the design of this system, a solution is formed that allows administrators to manage data of students carrying out internships (PKL), have real-time data through the dashboard menu and information on the implementation of internships (PKL) such as student activities and student attendance. In addition, students can add their activities, and also do online attendance. It is hoped that the results of this design can improve the efficiency and effectiveness of the entire internship process (PKL) at SMK Kusuma Bangsa Tangerang, providing a major positive impact for all related parties.</em></p> <p><strong><em>Keywords :</em></strong><em> Design, information system, digitalization, internship (PKL), waterfall method, user integration, efficiency and effectiveness.</em></p>Deny Andwiyan
##submission.copyrightStatement##
2024-12-312024-12-311327986DESIGN AND DEVELOPMENT OF AN ENCRYPTION AND DECRYPTION APPLICATION FOR THE SQL PERMIKOMAS DATABASE USING THE BLOWFISH ALGORITHM
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2284
<p data-start="0" data-end="1117">To protect the data or information stored in an SQL database, encryption is used. There are many encryption algorithms available, one of which is the Blowfish algorithm. The Blowfish algorithm is a modern symmetric key block cipher. Encryption is performed using a specific key, which produces ciphertext that is unreadable. This ciphertext can be reverted to its original form if decrypted using the same key. The Blowfish algorithm operates through 16 rounds and takes an input of 448 bits. This 448-bit data is divided into two parts, XL and XR, each consisting of 224 bits. Next, the operations XL = XL XOR Pi and XR = F(XL) XOR XR are performed, and then XL and XR are swapped; this process is repeated 16 times. In the 17th round, the operations XR = XR XOR P17 and XL = XL XOR P18 are carried out, and finally, XL and XR are combined back into 448 bits to produce the ciphertext. By using the Blowfish algorithm, the data in the SQL database—including the database itself, tables, fields, and records—remains unreadable due to encryption, so that only authorized users can access the contents by decrypting it.</p> <p data-start="1119" data-end="1187" data-is-last-node="" data-is-only-node="">Keywords: Blowfish Algorithm, encryption, decryption, symmetric key.</p>Ardi JuliardiSiti Madinah LadjamuddinMuhammad Hudzaifah Nasrullah
##submission.copyrightStatement##
2024-12-312024-12-31132110ANALYSIS AND DESIGN OF A SURVIVAL PREDICTION SYSTEM USING THE SUPPORT VECTOR MACHINE (SVM) ALGORITHM AND TITANIC DATASET
https://ejournal.istn.ac.id/index.php/incomtech/article/view/2286
<p><em>A century has passed since the sinking of Titanic on April 15, 2022. The disaster has sparked speculation and public and scientific interest in the shipwreck. This study aims to determine the survival rate of Titanic passengers using the Support Vector Machine algorithm. SVM is used as the model by dividing the dataset into 80% training data and 20% testing data, and then calculating the model's accuracy rate using the Holdout method, which produces 81.12%, and K-Fold Cross Validation, which produces an average score of 81.03%. The result of this study is a simple survival prediction system for ship passengers.</em></p> <p><strong><em>Keywords :</em></strong><em> Titanic, Support Vector Machine, Hold Out Method, K-Fold Cross Validation, Survival Prediction</em></p>Julianti YakinAryo Nur Utomo
##submission.copyrightStatement##
2024-12-312024-12-311321928