Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 2018-02-12T01:11:22+00:00 Yuhefizar Open Journal Systems <p><span class="" lang="id"><span class="">Ikatan Ahli Informatika Indonesia (IAII) merupakan lembaga/organisasi profesi di bidang informatika yang merangkul semua insan informatika untuk berperan aktif dalam mengembangkan profesi informatika di Indonesia. Dalam panduan Dikti, terkait pengelola Jurnal merupakan salah satu wewenang organisasi profesi dengan penilaian 4. Oleh karena itu Jurnal ini hadir dalam rangka mengemban tugas tersebut.</span></span></p> <p><span id="result_box" class="" lang="id"><span class="">Jurnal </span>RESTI&nbsp; (Rekayasa Sistem dan Teknologi Informasi) adalah sebuah jurnal <em>blind peer-review</em> <span class="">yang didedikasikan</span> untuk publikasi hasil penelitian yang berkualitas dalam&nbsp; bidang Rekayasa Sistem dan Teknologi Informasi namun tak terbatas secara implisit. Semua publikasi di junal RESTI bersifat akses terbuka yang memungkinkan <span class="">artikel </span>tersedia secara bebas online tanpa berlangganan apapun.</span></p> <div class="itanywhere-activator" style="left: 0px; top: 49px; display: none;" title="Google Translator Anywhere">&nbsp;</div> <div class="itanywhere-activator" style="left: 0px; top: 45px; display: none;" title="Google Translator Anywhere">&nbsp;</div> Aplikasi Sistem Pencarian Halte BRT Terdekat Kota Semarang Menggunakan Metode A* Berbasis Android 2018-02-12T01:11:22+00:00 Abimanyu Cahya Pramudhita Muljono Muljono <p>BRT (Bus Rapid Transit) is one of public transportation that can be used in Semarang City. This bus is operated to break down the congestion in Semarang city which is increasing. This paper aims to make the application of the bus stop search system closest and is expected to facilitate the people of Semarang city in the use of BRT (Bus Rapid Transit). &nbsp;A* Algorithm, This algorithm is a Best First Search algorithm that combines Uniform Cost Search and Greedy Best-First Search. Where the Price considered f(n) is derived from the actual price g(n) plus the approximate price h(n). The created application provides the nearest stop information by using the A* method. From the calculations performed using the A* method and conducted 20 experiments at different locations, the A* &nbsp;method has 100% accuracy in determining the nearest up and down stops, if in an accurate Global Positioning System.</p> 2018-02-12T01:11:21+00:00 ##submission.copyrightStatement## Penilaian Kinerja Dosen Menggunakan Metode TOPSIS (Studi Kasus : Amik Mitra Gama) 2018-02-06T14:36:03+00:00 Candra Surya <p><em>To improve the quality or performance of lecturers need an assessment. Assessment of lecturers can be done by Leaders and Chairman of Study Program such as assessment of Teaching, Research, Dedication, Responsibility, Personality, Loyalty, Cooperation, Leadership. Problems that have occurred so far to assess the performance of lecturers are still not optimal because there is no system / method used for assessment. It is therefore necessary to&nbsp; making a decision support system using the Technique For Other Reference by Similarity to Ideal Solution (TOPSIS). This method is able to choose the best alternative from the existing alternative. The alternative is the lecturer who will be assessed it’s performance. The result obtained by using this method is to know the lecturer who has the best performance. The best lecturers' determination will be issued in the form of numerical values and sorted by the largest value to the smallest value.</em> <em>From 5 alternative lecturers that have been tested are Lecturer 1, Lecturer 2, Lecturer 3 Lecturer 4 and Lecturer 5, then selected Lecturer 2 which has the best performance with a preference value of 0.5341.</em></p> 2018-02-05T00:00:00+00:00 ##submission.copyrightStatement## Analisis Keamanan Lalu Lintas Paket Data Pada Ubuntu Menggunakan Metode Attack Centric 2018-01-02T03:58:44+00:00 Feizil Afrizal Rometdo Muzawi Yoyon Efendi <p><em>Data traffic security in a network is very important, especially on a large scale such as companies, agencies and universities that have a lot of personal data. Effective data security is required, effective, flexible, not consuming enough time, big expense and have good advantages and shortcomings that are not too big so that data is not easy to be manipulated, analyzed, and attacked by irresponsible party. In the security analysis of data traffic on the ubuntu operating system is using Attack Centric method where each security attack will be analyzed its characteristics, after analyzing these characteristics then in the security mechanism for defense. This study aims to produce a system for analyzing, documenting attacks and how to handle it simply, in the hope that this analysis results, can reduce crime in the virtual world, to users who are not very proficient in cyberspace, and increase knowledge for users of the Internet network</em></p> 2018-01-02T03:58:44+00:00 ##submission.copyrightStatement## Desain Kebijakan Sistem Informasi dan Teknologi Informasi Dengan Framework Zachman Pada Perguruan Tinggi Negeri Baru di Jakarta 2017-12-28T23:32:58+00:00 Indra Permana Solihin M. Bayu Wibisono <p>Design policy at UPN Veteran Jakarta, which can enhance the competitiveness, effectiveness and efficiency, to reach UPN Veteran Jakarta vision, mission and objectives. The methodology used Enterprise Architecture Planning (EAP) with approximate Zachman Framework. Consequences that were achieved from the research were to make a framework of the integrated strategic IS and IT planning to facilitate the information management needed. The conclusion of this research is the proposed IS/IT strategic planning framework which could be implemented and used in the UPN Veteran Jakarta in the future.</p> 2017-12-28T23:32:56+00:00 ##submission.copyrightStatement## Aplikasi Location Based Services (LBS) untuk Pendataan Potensi Daerah dengan Pendekatan Customer Relationship Management (CRM) 2017-12-28T22:23:12+00:00 Bayu Hananto Ridwan Raafiudin Tri Rahayu <p><em>The purpose of this research is to build an application prototype for potential area data collection by using Location Based Service (LBS). In the prototype building stage of this application, use the method of Customer Relationship Management (CRM). This CRM method is for the benefit of a particular problem. The results obtained from this study are averaged average reliability (Reliability) with a value of 3.62, and category Usability category (Usability) with an average of 3.51. The model of this application will help local governments, to note the potential of their area.</em></p> 2017-12-28T22:23:11+00:00 ##submission.copyrightStatement##