Jurnal Media Informasi Teknologi
https://www.epublikasi.digitallinnovation.com/index.php/mit
Digital Innovationen-USJurnal Media Informasi Teknologi3047-521X<p>This work is licensed under a <a class="decorated-link" href="https://creativecommons.org/licenses/by-sa/4.0/" target="_new" rel="noopener" data-start="1552" data-end="1668">Creative Commons Attribution-ShareAlike 4.0 International License</a>.<br data-start="1669" data-end="1672" />Authors retain copyright and grant <em>Jurnal</em> <em data-start="1709" data-end="1745">Media Information Technology (MIT)</em> the right of first publication with the work simultaneously licensed under the CC BY-SA 4.0 license, allowing others to share and adapt the work with proper attribution and equal sharing of derived works.</p>Implementation of Door Lock System Using Keyword and RFID
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/240
<p><em>Doors are an important element in a building that serve as a connection between rooms. Generally, door locking systems are still conventional, which have several shortcomings, such as being easy to duplicate. Therefore, this study developed a door locking system using a keyword and RFID (Radio Frequency Identification), as combining two security systems enhances security quality. Testing was conducted by collecting data on the performance of the Voice Recognition module at randomly selected distances ranging from 20 to 100 cm, with intervals of 20 cm between the user's voice and the microphone. Then, the RFID capability was tested under two different conditions: the first condition where the RFID card was not covered by a cover, and the second condition using a cover to simulate the condition of the card being inside a wallet or case, and finally, the overall system testing. Based on the test results conducted in this study, using both sensors with a total of 40 data points, the overall system achieved 100% accuracy.</em></p>Erina SuwantyRahmi HidayatiKartika Sari
Copyright (c) 2025 Erina Suwanty, Rahmi Hidayati, Kartika Sari
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-1522536410.69616/mit.v2i2.240Development of Information System using Scrum Model
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/228
<table width="584"> <tbody> <tr> <td width="423"> <p><em>Islamic boarding schools (pesantren) are Islamic educational institutions in Indonesia that must adapt to technological developments. Developing a digital-based management information system is one of the solutions to support effective data management and administrative processes. However, data collection at Al-Muayyad Windan Islamic Boarding School is still carried out conventionally, which often causes inefficiency in managing student information. Therefore, this research aims to develop a student management information system using an agile software development methodology, namely the Scrum model, which allows iterative development and continuous feedback. The implementation of Scrum was successfully carried out through stages including Product Backlog, Sprint Planning, Sprint Backlog, Sprint, Sprint Review, and Retrospective. The resulting system has passed feasibility testing and usability evaluation. The SUS test involving 10 respondents produced an average usability score of 73, categorized as Acceptable on the Acceptability Range, Grade C on the Grade Scale, and Good on the Adjective Rating. These results indicate that the developed system is functionally feasible, user-friendly, and capable of supporting digital transformation in Islamic boarding school management.</em></p> </td> </tr> </tbody> </table>Arafik Nur FadliansahNurcahya Pradana Taufik PrakisyaYusfia Hafid AristyagamaJimsan
Copyright (c) 2025 Arafik Nur Fadliansah, Nurcahya Pradana Taufik Prakisya, Yusfia Hafid Aristyagama, Jimsan
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-1522658010.69616/mit.v2i2.228Design and Development of an Android-Based Interactive Learning Media for Grade VIII Statistics using the ADDIE Model
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/236
<p><em>In the 21st-century learning era, students in several regions of Indonesia still use conventional media such as whiteboards and textbooks in mathematics education. This leads to student boredom and relatively low learning outcomes because they are more interested in playing with smartphones rather than studying. The solution to this problem is to utilize Information and Communication Technology (ICT) as a learning medium. The purpose of this research is to develop, evaluate the feasibility, and determine user perceptions of an interactive Android-based learning media for Grade VIII statistics in junior high school. This research follows a research and development design consisting of three stages: development using the ADDIE method, feasibility analysis, and user perception analysis. The result of the development stage is a valid interactive Android-based learning media. The feasibility analysis results indicate that the media is highly feasible with a rating of 92.5% from media experts and 95% from subject matter experts. The user perception analysis shows that 84.4% of students strongly agree with the usefulness aspect of this media, and 89.5% of students strongly agree with the ease of use aspect. Therefore, it can be concluded that this interactive learning media is worthy, user-friendly, and beneficial in the learning process.</em></p>Lestari RahayuNurcahya Pradana Taufik PrakisyaPuspanda HattaAlfian Fawaidil WafaTulus Joseph Herianto
Copyright (c) 2025 Lestari Rahayu, Nurcahya Pradana Taufik Prakisya, Puspanda Hatta, Alfian Fawaidil Wafa, Tulus Joseph Herianto
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-1522819010.69616/mit.v2i2.236Enhancing Sales Reporting with Data Warehousing and Visualization: A Case Study at Graha Mas
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/237
<p><em>This study aims to enhance the sales reporting process by implementing a data warehouse and interactive data visualization, with a case study at Graha Mas. The research adopts the Kimball Nine Step Methodology to guide the development of the data warehouse, supported by the Extract, Transform, Load (ETL) process using Pentaho Data Integration (PDI). Sales data sourced from Excel files undergoes batch processing to ensure data consistency and cleanliness before being stored in the warehouse. A star schema model was applied to structure the data warehouse, consisting of dimension tables for customers, products, and locations, and fact tables for sales categorized by customer, product, and city. The final data is visualized through Google Data Studio dashboards, enabling users to interactively explore sales trends by product, time period, and region. These visualizations assist business decision-makers in identifying high-performing products, monitoring regional sales distribution, and planning inventory more effectively. User acceptance testing (UAT) involving business users resulted in an acceptance score of 89%, indicating that the system meets user needs in terms of data clarity, accuracy, and usability. This research concludes that the proposed solution significantly improves the sales monitoring process at Graha Mas and can serve as a practical reference for similar businesses seeking to adopt cloud-based business intelligence solutions. </em></p>Ida Bagus Gede SarasvanandaPutu Dian MaryaniI Nyoman Arnawan
Copyright (c) 2025 Ida Bagus Gede Sarasvananda, Putu Dian Maryani, I Nyoman Arnawan
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-15229110210.69616/mit.v2i2.237Control and Monitoring System for Lighting on Dragon Fruit Plants
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/238
<p><em>Dragon fruit plants require prolonged sunlight exposure to grow and develop optimally. One common practice among farmers is to provide artificial lighting at night. However, this lighting is still operated manually, which is considered less effective. To address this issue, this study developed a lighting control and monitoring system for dragon fruit plants. The system uses a NodeMCU ESP32 as the main controller, an LDR sensor for light detection, a relay module for lamp control, and Firebase with Flutter as the storage platform and real-time monitoring interface. The system is designed to automatically turn on the lamp when the light intensity detected by the LDR sensor falls below a predetermined threshold and to turn it off when the light is sufficient. Implementation of the system over two weeks produced a positive response to dragon fruit flowering, with blossoms appearing at several points on the plants. Accuracy testing of both the sensor readings and the automatic control system was conducted by comparing the number of correct data points with the total collected data. From a total of 5,131 data points recorded during testing, 4,745 matched the system’s logic, resulting in an accuracy of 92.47%. This result indicates that the system performs reliably in providing artificial lighting to extend the photosynthesis process in dragon fruit plants.</em></p>Okhari KafriandeniCucu SuheryKartika SariAbdul Malik
Copyright (c) 2025 Okhari Kafriandeni, Cucu Suhery, Kartika Sari, Abdul Malik
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-152210313210.69616/mit.v2i2.238One-Time Pad Cryptography for Secure Data Transmission in IoT Smart Door Using QR Code
https://www.epublikasi.digitallinnovation.com/index.php/mit/article/view/248
<p><em>The increasing use of the Internet of Things (IoT) in security systems such as Smart Doors has created new challenges for data security, especially the risk of wiretapping through sniffing attacks. This research proposes applying the One-Time Pad (OTP) XOR algorithm as an encryption method to protect QR Code-based data transmission in the Smart Door system. The implementation is carried out on three main communication paths: sending UUID from the server to the user's website, sending the results of QR Code scanning from ESP32-CAM to the server, and sending instructions from the server to the ESP32 device. The test results show that the resulting ciphertext is always different even though the plaintext is the same, with a 0% algorithm identification success rate by Cipher Identifier and a 100% resistance level to brute force XOR, based on testing using dCode.fr tools. In addition, the encryption and decryption processes are very fast, with an average encryption time on the ESP32-CAM of 0.34 milliseconds and an average decryption time on the ESP32 of 0.17 milliseconds. These results show that the OTP XOR algorithm is able to disguise data against basic cryptanalysis attacks and can be run on IoT devices that have limited resources. In the future, it is suggested to apply better key management methods such as pre-shared key (PSK), key rotation, or key derivation function (KDF) to improve the security of key distribution in this symmetrical system. In addition, the security system can be improved through separating the OTP key transmission path using an approach such as Out-of-Band Key Exchange or asymmetric key wrapping with the RSA algorithm so that the key remains protected even if sniffing occurs.</em></p>Muhammad Dito AsrofaSyamsul BahriKasliono Kasliono
Copyright (c) 2025 Muhammad Dito Asrofa, Syamsul Bahri, Kasliono Kasliono
https://creativecommons.org/licenses/by-sa/4.0/
2025-10-152025-10-152213314810.69616/mit.v2i2.248