Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii <p>Jurnal Teknologi, Informasi dan Industri adalah Jurnal ilmiah sebagai wadah publikasi tentang teknologi, informasi dan industri yang diterbitkan oleh Fakultas Teknologi Industri. Jurnal ini diterbitkan dengan tujuan menjadi wadah akademisi dan praktisi. Secara khusus Jurnal Teknologi, Informasi dan Industri menerima artikel ilmiah terkait perkembangan pemanfaatan Teknologi berupa Sistem Informasi bagi dunia industri di Segala bidang fungsional manajemen perusahaan.</p> en-US Fri, 19 Sep 2025 12:28:52 +0700 OJS 3.3.0.2 http://blogs.law.harvard.edu/tech/rss 60 SISTEM AHLI UNTUK MENDIAGNOSA PENYAKIT PADA IBU HAMIL MENGGUNAKAN METODE FUZZY MAMDANI BERBASIS WEB https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/513 <p><em>Pregnancy is a complex physiological process that requires special attention, especially in detecting disorders or diseases that may endanger both the mother and the baby. Medical knowledge possessed by health workers is often difficult to access quickly by the general public, especially in remote areas. Therefore, an expert system process is needed to help provide an early diagnosis of diseases or disorders experienced by pregnant women. This study aims to design and build a web-based expert system to diagnose diseases in pregnant women using the Mamdani Fuzzy method. This method was chosen because it can handle uncertain data and provide results that are closer to human reasoning. The system is designed using a combination of medical knowledge obtained from health experts, then optimized </em><em>using fuzzy logic to produce conclusions. This application was developed using the PHP programming language and MySQL database, and can be accessed online to allow users to conduct consultations remotely. The test results show that the system can provide diagnoses with a fairly good level of accuracy and assist users in taking initial steps for treatment or further consultation with medical professionals. With this process, it is expected to become an alternative solution in providing fast, easy, and accurate health consultation services for pregnant women, especially in areas with limited access to medical personnel.</em></p> Febriyanti Giawa, Jeremia Siregar, Sahat Marbun Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/513 Fri, 19 Sep 2025 00:00:00 +0700 IMPLEMENTASI METODE TOPSIS PADA SISTEM PENDUKUNGKEPUTUSAN UNTUK PEMILIHAN LAPANGAN FUTSAL DI KOTA MEDAN https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/514 <p>The futsal field rental industry in Medan has grown rapidly, yet users often face challenges in selecting the most suitable option due to limited information and the complexity of various criteria, such as number of fields, facilities, rental price, membership fees, and promotional strategies. This study aims to design a web-based Decision Support System (DSS) by applying the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) method. The system development follows the waterfall model up to the testing stage. Testing was conducted using black-box and User Acceptance Testing (UAT), both showing a 100% success rate across all scenarios. The results confirm that TOPSIS is effective in providing objective, fast, and accurate recommendations for futsal field selection.</p> Sifania Duha, Swingly Purba, Marvin S.F. Hutabarat Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/514 Fri, 19 Sep 2025 00:00:00 +0700 PENGARUH PENGEMBANGAN KARIR DAN FAKTOR MOTIVASI TERHADAP PENINGKATAN KUALITAS SUMBER DAYA MANUSIA https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/515 <p><em>Every organization or company, in facing the era of globalization and welcoming the 21st century, recognizes that improving the quality of human resources is extremely important for the organization or company to survive and thrive in order to win the competition. Such conditions require every organization/company to provide career development for workers, which must be carried out in a planned and sustainable manner. The goal is to identify what motivational factors are needed by employees to support the company's performance. Human resources are classified into three categories: Staff, Non-Staff (Employees), and Daily Workers (SKU). The methods used include literature study, field surveys, and questionnaires. Education and training need to be implemented to enhance knowledge and skills.</em></p> Olwin Nainggolan, Omry Pangaribuan, Jeremia Siregar Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/515 Fri, 19 Sep 2025 00:00:00 +0700 ANALISIS KOMPARASI PROTOKOL VIRTUAL PRIVATE NETWORK (VPN) PADA METODE PPTP, L2TP, SSTP, DAN OPEN VPN https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/516 <p><em>Virtual Private Network (VPN) is a network technology that allows encrypted data exchange between</em><em>&nbsp;</em><em>two</em><em>&nbsp;</em><em>or</em><em>&nbsp;</em><em>more</em><em>&nbsp;</em><em>users</em><em>&nbsp;</em><em>securely.</em><em>&nbsp;</em><em>From</em><em>&nbsp;</em><em>test</em><em>&nbsp;</em><em>results,</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>OpenVPN</em><em>&nbsp;</em><em>method</em><em>&nbsp;</em><em>shows</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>strongest encryption</em><em>&nbsp;</em><em>performance</em><em>&nbsp;</em><em>compared</em><em>&nbsp;</em><em>to</em><em>&nbsp;</em><em>PPTP,</em><em>&nbsp;</em><em>L2TP,</em><em>&nbsp;</em><em>and</em><em>&nbsp;</em><em>SSTP,</em><em>&nbsp;</em><em>because</em><em>&nbsp;</em><em>its</em><em>&nbsp;</em><em>code</em><em>&nbsp;</em><em>scrambling</em><em>&nbsp;</em><em>process takes</em><em>&nbsp;</em><em>longer,</em><em>&nbsp;</em><em>making</em><em>&nbsp;</em><em>it</em><em>&nbsp;</em><em>harder</em><em>&nbsp;</em><em>to</em><em>&nbsp;</em><em>breach.</em><em>&nbsp;</em><em>The</em><em>&nbsp;</em><em>main</em><em>&nbsp;</em><em>advantage</em><em>&nbsp;</em><em>of</em><em>&nbsp;</em><em>VPN</em><em>&nbsp;</em><em>is</em><em>&nbsp;</em><em>that</em><em>&nbsp;</em><em>every</em><em>&nbsp;</em><em>data</em><em>&nbsp;</em><em>sent</em><em>&nbsp;</em><em>will pass through a tunnel, providing a better level of security. Tunneling itself is a technique for moving</em><em>&nbsp;</em><em>data</em><em>&nbsp;</em><em>from</em><em>&nbsp;</em><em>one</em><em>&nbsp;</em><em>network</em><em>&nbsp;</em><em>to</em><em>&nbsp;</em><em>another</em><em>&nbsp;</em><em>by</em><em>&nbsp;</em><em>leveraging</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>internet</em><em>&nbsp;</em><em>as</em><em>&nbsp;</em><em>a</em><em>&nbsp;</em><em>hidden</em><em>&nbsp;</em><em>medium.</em><em>&nbsp;</em><em>Based on DoS attack tests, the PPTP and L2TP protocols produce a delivery time of 100 ms with a relatively large number of packets, while SSTP and OpenVPN record a shorter time of 2 ms with 28 data packets. Measurement results using QoS parameters show that OpenVPN has a Packet Loss value of 0% (satisfactory category), Average delay 0 ms (satisfactory), Jitter 17 ms (good), and</em><em>&nbsp;</em><em>stable</em><em>&nbsp;</em><em>Throughput.</em><em>&nbsp;</em><em>Among</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>four</em><em>&nbsp;</em><em>methods,</em><em>&nbsp;</em><em>PPTP</em><em>&nbsp;</em><em>achieved</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>highest</em><em>&nbsp;</em><em>throughput</em><em>&nbsp;</em><em>score</em><em>&nbsp;</em><em>of </em><em>3.428</em><em>&nbsp;</em><em>Mbps,</em><em>&nbsp;</em><em>however,</em><em>&nbsp;</em><em>OpenVPN</em><em>&nbsp;</em><em>is</em><em>&nbsp;</em><em>rated</em><em>&nbsp;</em><em>more</em><em>&nbsp;</em><em>balanced</em><em>&nbsp;</em><em>because</em><em>&nbsp;</em><em>it</em><em>&nbsp;</em><em>supports</em><em>&nbsp;</em><em>both</em><em>&nbsp;</em><em>security</em><em>&nbsp;</em><em>and</em><em>&nbsp;</em><em>data transfer performance</em></p> Jerico Sola Reinier Sumbayak, Jeremia Siregar, Ruth Meivera Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/516 Fri, 19 Sep 2025 00:00:00 +0700 APLIKASI PEMILIHAN DESA TERBAIK DI KECAMATAN PANTAI LABU MENGGUNAKAN METODE SIMPLE ADDITIVE WEIGHTING https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/517 <p><em>Selecting the best village is a crucial step in improving village performance and governance. However, the current evaluation process often faces subjectivity and difficulties in differentiating between similar performance results. This study aims to address these challenges by designing and implementing a Decision Support System (DSS). The method used is Simple Additive Weighting (SAW). This method was chosen because of its ability to sum performance rating weights and normalize the decision matrix. The assessment criteria include security and order, community economy, health, education, village cleanliness, and community institutions and Family Welfare Empowerment (PKK). This application was developed using the Unified Modeling Language (UML) approach and implemented using the PHP programming language and MySQL database. The resulting system is expected to assist sub-district management in analyzing data objectively, efficiently, and systematically, resulting in accurate and fair decisions.</em></p> Meyanti Lingga, Swingly Purba, Rikardo Hotman Siahaan Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/517 Fri, 19 Sep 2025 00:00:00 +0700 Perangkat Lunak Bantu Pembelajaran Identity-Based Encryption (IBE) https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/518 <p><em>Identity-Based Encryption (IBE) is a data security encryption technique that utilizes asymmetric keys. The public key can be any string, allowing data to be secured without the need for a certificate. The public key in Identity-Based Encryption can be an email address, a telephone number, or a sentence identifying the recipient. This software explains each step in the IBE cryptography method. It also includes supporting algorithms used in the calculation process for each step in IBE cryptography. This learning software is expected to serve as a reference and initial study for readers, especially students studying cryptography, to learn more about IBE cryptography.</em></p> Yulius Zamili, Jeremia Siregar, Ruth Meivera Siburian Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/518 Fri, 19 Sep 2025 00:00:00 +0700 APLIKASI PENYEMBUNYIAN PESAN PADA CITRA DIGITAL DENGAN MENGGUNAKAN METODE KRIPTOGRAFI HILL CIPHER DAN TEKNIK LEAST SINGNIFICANT BIT https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/519 <p><em>Maintaining message confidentiality by encrypting it with cryptography renders it unreadable. This can raise suspicions that the message being sent is important. To avoid suspicion, the message can be hidden in the image, thus preventing such suspicion. Initially, the message is encrypted using the Hill Cipher cryptography method. The key to the Hill Cipher is a numeric value in the form of a matrix K. The encryption process uses the matrix K, while the decryption process uses the inverse matrix of K. Therefore, to ensure that K has an inverse, the determinant of K must be equal to one. The resulting encrypted message is then hidden in the image using the Least Significant Bit (LSB) technique. The designed application can be used to hide messages in digital images using the LSB technique and secure messages using the Hill Cipher cryptography method.</em></p> Riesman Hulu, Swingly Purba, Rikardo Hotman Siahaan Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/519 Fri, 19 Sep 2025 00:00:00 +0700 Penggunaan Metode Leaching Dengan Variasi Temperatur Larutan Asam (HNO3 Dan CH3COOH) Yang Optimum Untuk Memperoleh Recovery Nikel Maksimum Pada Industri Logam Morowali https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/520 <p>Salah satu mineral logam yang banyak dimanfaatkan dalam industri kimia dan memiliki nilai jual yang tinggi adalah nikel. Nikel merupakan salah satu mineral logam&nbsp;yang bernilai jual tinggi dan banyak dimanfaatkan dalam bidang industri kimia. Nikel banyak dimanfaatkan sebagai <em>electroplanting</em>, baterai isi ulang dan 65% digunakan sebagai bahan baku <em>stainless steel</em>. Nikel memiliki sifat tahan korosi dan tahan pada temperatur tinggi sehingga ruang lingkup penggunaannya luas dalam berbagai industri. Nikel sebagai mineral yang tersedia di alam terdapat dalam wujud Bijih Laterit (Oksida) dan Bijih Sulfida. Pada penelitian ini dilakukan proses&nbsp;ekstraksi&nbsp;menggunakan asam nitrat dan asam asetat. Salah satu metoda yang digunakan untuk mendapatkan persen recovery nikel proses &nbsp;ekstraksi. Proses ekstraksi dilakukan dengan variasi temperatur mulai dari 60<sup>o</sup>C, 70&nbsp;<sup>o</sup>C, 80&nbsp;<sup>o</sup>C, 90&nbsp;<sup>o</sup>C, 100&nbsp;<sup>o</sup>C dan 110&nbsp;<sup>o</sup>C pada masing-masing asam. Penelitian dilakukan untuk menentukan temperatur optimum terhadap persentase <em>recovery </em>proses CH<sub>3</sub>COOH. Penelitian dilakukan dengan preparasi sampel dan analisa kadar menggunakan Spektrofotometer XRF. Filtrat hasil proses ekstraksi dianalisa menggunakan AAS agar mengetahui kandungan hasil proses ekstraksi untuk selanjutnya diolah data demi mendapatkan temperatur optimum terhadap persen <em>recovery </em>proses ekstraksi. Dari hasil penelitian didapatkan temperatur optimum terhadap persen <em>recovery </em>proses ekstraksi nikel menggunakan asam nitrat yaitu 100<sup>o</sup>C dengan persen <em>recovery </em>sebesar 17,66%. Dan pada asam asetat didapat temperatur optimum yaitu 100<sup>o</sup>C dengan persen <em>recovery </em>sebesar 2,66%.</p> Mac Kensey Gogo Pasaribu, Rasmi Sitohang, Saut Situmorang Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/520 Fri, 19 Sep 2025 00:00:00 +0700 SISTEM MANAJEMEN DAN PEMESANAN LAUNDRY TERINTEGRASI WHATSAPP STUDI KASUS SHIP LAUNDRY https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/521 <p><em>The</em><em>&nbsp;</em><em>Integrated</em><em>&nbsp;</em><em>Laundry</em><em>&nbsp;</em><em>Ordering</em><em>&nbsp;</em><em>and</em><em>&nbsp;</em><em>Management</em><em>&nbsp;</em><em>System</em><em>&nbsp;</em><em>(WHATSAPP)</em><em>&nbsp;</em><em>-</em><em>&nbsp;</em><em>Ship</em><em>&nbsp;</em><em>Laundry</em><em>&nbsp;</em><em>Case Study</em><em>&nbsp;</em><em>is</em><em>&nbsp;</em><em>a</em><em>&nbsp;</em><em>system</em><em>&nbsp;</em><em>designed</em><em>&nbsp;</em><em>to</em><em>&nbsp;</em><em>manage</em><em>&nbsp;</em><em>laundry</em><em>&nbsp;</em><em>orders,</em><em>&nbsp;</em><em>reports,</em><em>&nbsp;</em><em>promotions,</em><em>&nbsp;</em><em>customers,</em><em>&nbsp;</em><em>and</em><em>&nbsp;</em><em>raw materials online. Data processing is still done manually, namely by recording all orders in a book, which requires a lot of time and space, and can lead to errors in generating revenue reports. From this manual process, the author attempted to design and implement a website- based system to address these issues. This shortened time and costs, made data recording easier and more organized, and reduced errors caused by human error. In conducting this research, the author used the RAD (Rapid Application Development) method. The research tools used were UML (Unified Modeling Language), the PHP (CodeIgniter) framework, and the MySQL database. With this system, the author hopes to assist Ship Laundry in managing business</em><em>&nbsp;</em><em>data</em><em>&nbsp;</em><em>and</em><em>&nbsp;</em><em>information.</em><em>&nbsp;</em><em>It</em><em>&nbsp;</em><em>can</em><em>&nbsp;</em><em>also</em><em>&nbsp;</em><em>facilitate</em><em>&nbsp;</em><em>transaction</em><em>&nbsp;</em><em>processes</em><em>&nbsp;</em><em>for</em><em>&nbsp;</em><em>both</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>laundry and customers.</em></p> Emiliana Laia, Jeremia Siregar, Sutrisno Situmorang Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/521 Fri, 19 Sep 2025 00:00:00 +0700 APLIKASI WEB WEDDING INVITATION MENGGUNAKAN MEDIA SOSIAL UNTUK MENGIRIM UNDANGAN BERBASIS QR CODE https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/522 <p><em>A digital wedding invitation is a non-printed invitation in the form of an</em><em>&nbsp;</em><em>image or web page containing the invitation sentences and information of an event that can be shared online. In recent times, people have been upset about the issue of arranging weddings, namely the cost of the wedding, and a common problem is the difficulty of the prospective bride when it comes to sharing</em><em>&nbsp;</em><em>information</em><em>&nbsp;</em><em>about</em><em>&nbsp;</em><em>the</em><em>&nbsp;</em><em>wedding</em><em>&nbsp;</em><em>with</em><em>&nbsp;</em><em>relatives</em><em>&nbsp;</em><em>or</em><em>&nbsp;</em><em>friends</em><em>&nbsp;</em><em>who</em><em>&nbsp;</em><em>are</em><em>&nbsp;</em><em>located</em><em>&nbsp;</em><em>far</em><em>&nbsp;</em><em>away.</em><em>&nbsp;</em><em>There are</em><em>&nbsp;</em><em>social</em><em>&nbsp;</em><em>media</em><em>&nbsp;</em><em>that</em><em>&nbsp;</em><em>can</em><em>&nbsp;</em><em>be</em><em>&nbsp;</em><em>used</em><em>&nbsp;</em><em>to</em><em>&nbsp;</em><em>spbaca</em><em>&nbsp;</em><em>wedding</em><em>&nbsp;</em><em>invitations,</em><em>&nbsp;</em><em>guest</em><em>&nbsp;</em><em>candidates</em><em>&nbsp;</em><em>who</em><em>&nbsp;</em><em>get</em><em>&nbsp;</em><em>a</em><em>&nbsp;</em><em>link to the wedding address and Qr-code can get information about wedding addresses, as well as can make absences, and can give a wedding speech or prayer on the main page of the wedding invitation web application. The research aims to build a wedding invitation web application by integrating it with social media. The programming language used is PHP, the Mysql database, and the codeigniter3 framework. As well as the method used is the waterfall.</em></p> Wismawati Halawa, Swingly Purba, Marvin S.F. Hutabarat Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/522 Fri, 19 Sep 2025 00:00:00 +0700 OPTIMALISASI BEBAN KERJA MANPOWER DENGAN MENGGUNAKAN METODE WORK LOAD ANALYSIS PADA LOKASI PROGRAM ONSITE RESTORATION https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/523 <p><em>The On-site Restoration Program at PT. XYZ requires efficiency in workforce allocation to achieve optimal productivity. This study aims to measure employee workload and determine the required number of workers using the Work Load Analysis (WLA) method. The analysis was conducted on four types of restoration activities. The uniformity test results showed that all data were within acceptable control limits. The highest standard time was found in the plant tilling task, reaching 289,951 minutes per 3 months, while the lowest was 5,632 minutes per 3 months. Data processing results indicated that the workload of all workers exceeded the maximum threshold of 100% for an 8-hour workday. Based on the calculations, a total of 9 workers are required, while only 5 are currently employed. Additional workers are needed for fertilization, replanting, and invasive species cleaning tasks. Further adjustments are still necessary to align workload with worker capacity and field conditions.</em></p> Kemri Unggul Parhusip, Rasmi Sitohang, Omry Pangaribuan Copyright (c) 2025 Jurnal Teknologi, Informasi dan Industri https://istp.ac.id.202-10-43-25.cpanel.site/index.php/jtii/article/view/523 Fri, 19 Sep 2025 00:00:00 +0700