Journal of Technology and Informatics (JoTI) https://e-journals.dinamika.ac.id/joti <p><img src="https://e-journals.dinamika.ac.id/public/site/images/wawan/joti-vol.-7-no.-2-oktober-2025.jpg" alt="" width="1351" height="1909" /></p> <p>Journal of Technology and Informatics (JoTI) is a Peer-Reviewed Journal published by <a href="https://dinamika.ac.id/">Universitas Dinamika</a> <strong>in collaboration with <a href="https://drive.google.com/file/d/15U0_UmkfQlxMCsZNHiFp5x1C5jgtwjQ0/view?usp=sharing">Asosiasi Pendidikan Tinggi Informatika dan Komputer (APTIKOM) Jawa Timur</a></strong>. This journal is published twice a year in April and October. This journal covers the fields of Information Technology, Communication Systems, Signals, Systems and Electronics.</p> <ol> <li><strong>Journal Title: </strong>Journal of Technology and Informatics (JoTI)</li> <li><strong>Initial:</strong> JoTI</li> <li><strong>Abbreviation:</strong> Technol. Inform.</li> <li><strong>Accreditation Status : </strong><a href="https://sinta.kemdikbud.go.id/journals/profile/9804" target="_blank" rel="noopener">Sinta 3 Accredited Journal</a></li> <li><strong>Publication Frequency: </strong>2 issues per year</li> <li><strong>DOI: </strong><a href="https://doi.org/10.37802/joti">https://doi.org/10.37802/joti</a></li> <li><strong>Online ISSN:</strong> <a href="https://issn.brin.go.id/terbit/detail/1569308412" target="_blank" rel="noopener">2686-6102</a></li> <li><strong>Print ISSN:</strong> <a href="https://issn.brin.go.id/terbit/detail/1577072213" target="_blank" rel="noopener">2721-4842</a></li> <li><strong>Editor in Chief:</strong> <a href="https://scholar.google.co.id/citations?user=GpsCXvwAAAAJ&amp;hl=en" target="_blank" rel="noopener"><strong>Dr. Ira Puspasari, S.Si., M.T.</strong></a></li> <li><strong>Publisher:</strong><a href="https://www.dinamika.ac.id/" target="_blank" rel="noopener">Universitas Dinamika</a></li> <li><strong>Email : </strong><a href="mailto:joti@dinamika.ac.id">joti@dinamika.ac.id</a></li> <li><strong>Indexing:</strong> <a href="https://sinta.kemdikbud.go.id/journals/profile/9804" target="_blank" rel="noopener">SINTA 3</a><strong>|</strong><a href="https://scholar.google.com/citations?user=QdfKQZAAAAAJ&amp;hl=en" target="_blank" rel="noopener">Google Scholar</a><strong>|</strong><a style="background-color: #ffffff; font-size: 0.875rem;" href="https://garuda.kemdikbud.go.id/journal/view/22458" target="_blank" rel="noopener">Garuda</a><strong style="font-size: 0.875rem;">|</strong><a style="background-color: #ffffff; font-size: 0.875rem;" href="https://doaj.org/toc/2686-6102?source=%7B%22query%22%3A%7B%22bool%22%3A%7B%22must%22%3A%5B%7B%22terms%22%3A%7B%22index.issn.exact%22%3A%5B%222721-4842%22%2C%222686-6102%22%5D%7D%7D%5D%7D%7D%2C%22size%22%3A100%2C%22sort%22%3A%5B%7B%22created_date%22%3A%7B%22order%22%3A%22desc%22%7D%7D%5D%2C%22_source%22%3A%7B%7D%2C%22track_total_hits%22%3Atrue%7D" target="_blank" rel="noopener">DOAJ</a><strong style="font-size: 0.875rem;">| </strong><a style="background-color: #ffffff; font-size: 0.875rem;" href="https://app.dimensions.ai/discover/publication?search_mode=content&amp;and_facet_source_title=jour.1424326" target="_blank" rel="noopener">Dimensions</a></li> </ol> Universitas Dinamika en-US Journal of Technology and Informatics (JoTI) 2721-4842 Simulated Phishing Attack and Forensic Analysis Using the D4I Framework: A Case Study on Kredivo https://e-journals.dinamika.ac.id/joti/article/view/1086 <p>Phishing is a form of cyberattack where attackers deceive users into revealing sensitive information such as credentials or financial data, often through fake communication channels or websites. This threat is particularly critical in the financial technology (fintech) sector, where services rely heavily on digital transactions and user trust. This study presents a simulated phishing case targeting Kredivo users to evaluate the effectiveness of the Digital Forensics framework for Reviewing and Investigating cyber-attacks (D4I) in digital forensic analysis. The Cyber Kill Chain (CKC) model was employed to trace attacker behavior across seven phases, from weaponization to actions on objectives. Forensic data was acquired using MOBILedit Forensic Express from two smartphones, namely an iPhone 11 (iOS 15.8.1) and a Vivo Y21 (Android 8.1.0), which served as simulated evidence devices. Using the D4I framework, the investigation successfully identified and correlated key digital artifacts such as phishing links, OTP transmissions, and unauthorized access logs. These findings were organized into a visual chain of artifacts to reconstruct the full attack lifecycle. The results demonstrate that the D4I framework is effective in guiding structured forensic investigations and understanding attack patterns, supporting the enhancement of fintech security strategies.</p> Muhammad Yusuf Halim Toto Raharjo Rosi Rahmadi Syahputra Erika Ramadhani Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-09-25 2025-09-25 7 2 121 133 10.37802/joti.v7i2.1086 Analisis Sentimen Pengguna X terhadap Perempuan di Lingkungan Kerja Menggunakan Algoritma Machine Learning https://e-journals.dinamika.ac.id/joti/article/view/1087 <p><em>Gender bias against women in the workplace persists, including within digital interactions on social media. This study analyzes user sentiment on Platform X regarding women in professional contexts using three machine learning algorithms: Naïve Bayes, Support Vector Machine (SVM), and Random Forest. A total of 2,336 tweets were collected using 14 gender-related keywords and labeled both automatically using the DistilBERT model and manually through contextual interpretation. The automatic dataset was imbalanced (1,823 negative, 479 positive), while the manual dataset was more balanced (1,196 negative, 1,106 positive). After preprocessing and TF-IDF feature extraction, the data were split using the train_test_split method. Evaluation metrics included accuracy, precision, recall, and F1-score. Random Forest achieved the highest accuracy (79%) on automatic labels but showed class imbalance (F1-score: 0.88 for negative, 0.08 for positive). Meanwhile, models trained on manual labels showed more balanced performance with accuracy between 57% and 59%. A web application prototype was developed using Flask to predict sentiment related to workplace gender issues. The findings highlight the importance of balanced labeling and appropriate algorithm selection to build fair and reliable sentiment analysis models, contributing to more inclusive digital discourse on gender equality.</em></p> Muhammad Davit Hilal Fahri Dedi Gunawan Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-09-25 2025-09-25 7 2 134 146 10.37802/joti.v7i2.1087 Sistem Pengenalan Wajah Real-Time Menggunakan YOLOv7 untuk Akses Gedung TVRI Palembang Berbasis Web https://e-journals.dinamika.ac.id/joti/article/view/1063 <p><em>The development of information and communication technology today has had a significant impact on various aspects of life, including in the field of security. The use of face recognition is one of the facial recognition techniques, where the results of the camera capture will be matched with photos or facial curve textures that already exist in the database. The system is widely applied using various methods and artificial intelligence, one of which is YOLO (You Only Look Once). The purpose of this study is to design, develop, and identify challenges in implementing a real-time facial recognition system using web-based YOLOv7 that can detect the faces of people entering the TVRI Palembang building, then photos and times when a person's face is not detected will be stored in the database. The data used comes from literature studies, data collection obtained from photos of TVRI television station employees' faces, software design with technology selection, user interface design, and algorithm structures that will be used. After going through these stages, a system implementation was carried out for the application of the system and analysis of the data results obtained. The results showed that the face detection system using YOLOv7 showed very good performance. In 100 training epochs, the system achieved 96,6% face detection accuracy and 90% face recognition accuracy, successfully identifying almost all registered faces and detecting faces in real time. This system produces high accuracy in detecting faces and almost all faces that should be recognized are successfully detected.</em></p> Fatia Salsabilla Kyara Aryanti Aryanti R.A. Halimatussa'diyah Copyright (c) 2025 Journal of Technology and Informatics (JoTI) 2025-09-29 2025-09-29 7 2 147 160 10.37802/joti.v7i2.1063 Implementasi Sistem Keamanan Brankas Berbasis Face Recognition Menggunakan Algoritma YOLO dengan Verifikasi Fingerprint https://e-journals.dinamika.ac.id/joti/article/view/1072 <p><em>Current technological developments make security crucial in protecting important documents. Safes are commonly used for storage but remain vulnerable to burglary despite conventional locks. Based on data from the Central Bureau of Statistics (BPS) in 2023, aggravated theft was the most frequent crime with 62,872 reported cases. This highlights the need to improve safe security by adding biometric techniques such as face recognition and fingerprint verification. This study proposes a layered security system combining face recognition using the YOLO algorithm and fingerprint sensors. The system uses an ESP32-CAM to capture facial images and an ESP32 microcontroller to control a solenoid lock, fingerprint sensor and buzzer alarm. Face recognition testing on two users showed, the trained YOLO model achieved an accuracy of 83.33%, precision of 83,33% and recall of 100%. from 12 trials, with two failures due to poor lighting conditions. Fingerprint testing on 10 samples, five fingers from each of two users, showed successful recognition of all fingerprints with an average response time of 1.41 seconds. The integration of face and fingerprint biometrics significantly enhances safe security and minimizes unauthorized access risks.</em></p> Amanda Tsabita Putri Tata Irma Salamah Martinus Mujur Rose Copyright (c) 2025 Journal of Technology and Informatics (JoTI) 2025-09-29 2025-09-29 7 2 161 174 10.37802/joti.v7i2.1072 Prediksi Stunting pada Anak Balita Menggunakan Algoritma Extreme Gradient Boosting dan Bayesian Optimization https://e-journals.dinamika.ac.id/joti/article/view/1174 <p><em>Stunting is a chronic malnutrition condition affecting children under five years that impairs cognitive development, physical growth, and future productivity. This study develops a stunting risk prediction model using the Extreme Gradient Boosting (XGBoost) algorithm with hyperparameter tuning and data balancing techniques. The dataset from Kaggle contains 120,998 records with variables including age, gender, height, and nutritional status. The methodology encompasses data preprocessing for outlier handling, categorical encoding, and feature extraction based on height thresholds. Feature selection utilized ANOVA F-test, while Exploratory Data Analysis identified height as the most influential attribute. To address class imbalance, Synthetic Minority Over-sampling Technique (SMOTE) was implemented, followed by Bayesian Optimization for hyperparameter tuning. Model evaluation was conducted using various data splits (80:20, 70:30, 60:40, 50:50) with metrics including accuracy, precision, recall, and F1-score. Results demonstrate that the optimized XGBoost model achieved exceptional performance with 0,982% accuracy, 0,973% precision, 0.979% recall, and 0,976% F1-score, consistently across all data configurations. The combination of XGBoost with Bayesian Optimization and SMOTE proves highly effective in handling imbalanced classification tasks. These findings highlight machine learning's potential in supporting public health initiatives through accurate early identification and targeted intervention for stunting prevention.</em></p> Rangga Yoga Pratama Anna Baita Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-10-31 2025-10-31 7 2 175 189 10.37802/joti.v7i2.1174 Performance Analysis of Provider and Riverpod State Management Library on Flutter Applications https://e-journals.dinamika.ac.id/joti/article/view/1164 <p>State management libraries are essential components in Flutter app development. This research aims to compare the performance of the state management library Provider and its successor, Riverpod, to assist Flutter developers in choosing the right solution. Two versions of the MovieDB app were built, each utilizing Provider and Riverpod. Performance testing was conducted using three metrics: CPU Utilization, Memory Usage, and Execution Time, across three data volumes (1,000, 5,000, and 10,000). The results showed that CPU Utilization varied by only 0.1–0.2% with Riverpod being slightly more efficient at 1,000 and 10,000 data volumes. Execution Times also showed minimal differences, with Riverpod being marginally faster by approximately 0.01 seconds at 5,000 and 10,000 data volumes. Riverpod excelled in Memory Usage, demonstrating an average reduction of about 3–6% across all data volumes, particularly at higher data volumes. In conclusion, the performance of both libraries is fundamentally similar, but Riverpod is offers better memory efficiency and architectural flexibility. Therefore, Riverpod is recommended for new projects, while Provider remains a viable option for stable existing applications that already use it.</p> Jonathan Aditya Puryanto Habibullah Akbar Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-10-31 2025-10-31 7 2 190 200 10.37802/joti.v7i2.1164 Sentiment Perspective of Government's Free Nutritious Meal Policy on Social Media X using Indo-BERT and Bi-LTSM https://e-journals.dinamika.ac.id/joti/article/view/1065 <p>This research has the potential to make an important contribution to the development of computationally-based sentiment analysis, especially in the context of government policies regarding the Free Meal Program that will be implemented throughout Indonesia. This research was conducted using Indo-BERT and Bi-LSTM algorithms. These approaches were used to categorize emotions into three groups: neutral, negative, and positive. Data is obtained from posts on social media X, then after processing the data, it will be applied to both algorithms, namely Indo-BERT and Bi-LSTM. The research findings show that the model's performance in determining the public sentiment of government policies. Validation and valuation were conducted using the f1 score, recall, and precision metrics. The evaluation findings show that the Indo-BERT algorithm is better than the Bi-LSTM algorithm with an accuracy value of 80% for Indo-BERT and 78% for the accuracy value of the Bi-LSTM algorithm, and the Indo-BERT accuracy value is included in the good classification accuracy value. The sentiment analysis results are also represented by word clouds for each positive, negative and neutral class, providing an intuitive picture of the words frequently used in public discourse on free nutritious meals.</p> Pungkas Subarkah Ali Nur Ikhsan Epri Anggraeni Arbangi Puput Sabaniyah Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-10-31 2025-10-31 7 2 201 210 10.37802/joti.v7i2.1065 Segmentasi dan Klasifikasi Risiko Perdarahan dengan Algoritma K-Means dan Naive Bayes Berdasarkan Data Klinis dan Transfusi https://e-journals.dinamika.ac.id/joti/article/view/1124 <p><em>Bleeding risk assessment is essential in clinical decision-making, especially for patients undergoing frequent blood transfusions. This study presents a machine learning approach combining K-Means clustering and Gaussian Naive Bayes classification to assess bleeding risk based on clinical and transfusion history data. Patients were categorised into K-Means clusters, with the ideal number of clusters established by the Elbow Method and Silhouette Score. PCA visualisation demonstrated distinct distinctions among clusters. Cluster 0 contained patients with higher transfusion volume and frequency, showing significantly higher bleeding risk. Subsequently, the Naive Bayes classifier was trained on clinical features to predict bleeding risk and categorized into two risk levels. The model achieved 85.45 percent accuracy on training data and 86.67 percent on testing data, with the highest predictive accuracy observed in Cluster 0 (95.65 percent). These results highlight the potential of combining unsupervised and supervised learning techniques to enhance bleeding risk stratification and support better transfusion management.</em></p> Aryanti Aryanti Fadhilah Dwi Wulandari Muhammad Rafiif Faris Alghaniyyu Naris Kirana M. Nawval Alfazri Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-10-31 2025-10-31 7 2 211 219 Customer Satisfaction, Social Influence, and Facilitating Conditions Affecting Use Behavior in Ride-Hailing https://e-journals.dinamika.ac.id/joti/article/view/1222 <p><em>The rapid expansion of online ride-hailing services has transformed urban mobility; however, sustaining user engagement remains a major challenge due to the interplay of psychological and technical factors. Despite widespread adoption, the determinants influencing users’ continued use of such applications remain inconsistent and not fully understood. Therefore, this study examines the effects of </em><em>Customer Satisfaction (CS), Social Influence (SI), and Facilitating Conditions (FC) on Use Behavior (UB) of online transportation applications, with Behavioral Intention (BI) as a mediating variable. The research was conducted in Surabaya with 150 active users of online ride-hailing services, and data were analyzed using Structural Equation Modeling–Partial Least Squares (SEM-PLS). The findings indicate that FC significantly affects both BI and UB, while CS and SI have significant positive effects on BI but not directly on UB. Moreover, BI is identified as the strongest predictor of UB and acts as a significant mediator in the relationships CS → BI → UB, SI → BI → UB, and FC → BI → UB. These results highlight the central role of intention in linking psychological and technical factors to actual use behavior. The study suggests that service providers enhance customer satisfaction, utilize social influence, and strengthen facilitating conditions to sustain user engagement.</em></p> Erwin Sutomo Sulistiowati Sulistiowati Vivine Nurcahyawati Martinus Sony Erstiawan Ayuningtyas Copyright (c) 2025 Journal of Technology and Informatics (JoTI) https://creativecommons.org/licenses/by-sa/4.0 2025-10-31 2025-10-31 7 2 220 229 10.37802/joti.v7i2.1222