J-SAKTI (Jurnal Sains Komputer dan Informatika)
Latest Publications


TOTAL DOCUMENTS

106
(FIVE YEARS 60)

H-INDEX

1
(FIVE YEARS 1)

Published By Stikom Tunas Bangsa Pematangsiantar

2549-7200, 2548-9771

2020 ◽  
Vol 4 (1) ◽  
pp. 18
Author(s):  
Yuniarti Lestari ◽  
Sunardi S ◽  
Abdul Fadlil

The admission activity of new students is an administrative process that is sure to occur every new school year and always repeats every year as a starting point for the search for quality resources in accordance with the criteria of each school. Selection is done manually such as using a spreadsheet or number processor still raises several problems including the length of the selection process. At the time of the participant selection process, it involved many criteria that were assessed (multi criteria). Efforts to assist the school in selecting participants from the results considered to be acceptable results require a decision support system for selecting new students. The method used to support students' selection decisions is AHP and SAW. AHP method is used to determine the weight of predetermined criteria, while the SAW method is used for alternative ranking. The purpose of alternative ranking is who has the right to be accepted as a new student based on predetermined criteria.


2020 ◽  
Vol 4 (1) ◽  
pp. 157
Author(s):  
Hermansa H ◽  
Rusydi Umar ◽  
Anton Yudhana

Security in the protection of sending messages is a matter that must be considered, because the more the development of the age, the more sophisticated the technology. So that security in sending messages and data communication should be of more concern. Therefore we need a method or algorithm that can protect the message to be sent to the recipient of the message. The algorithm that can be used in encrypting is Caesar Cipher, as a cryptographic coding technique for messages so that messages that look difficult to read and solve. As for the method of inserting messages on encrypted image media using the End of File (EOF) steganography method, which is the method used directly at the end of the file. In the work of securing techniques of messages on this system, using various sizes of images or images that will be inserted a coded secret message or encryption whose capacity is not much different from the photos or images to be used. The conclusion of this study is that the application of the Caesar Cipher Algorithm can be used as a message security technique even though the algorithm is so simple but the level of security is assisted by the End of File (EOF) method to insert the encryption results from the Caesar Cipher algorithm so that the security level it has is sufficient to protect message information to be safe from eavesdroppers or hackers of the message that is not responsible or as a protection of data held.


2020 ◽  
Vol 4 (1) ◽  
pp. 9
Author(s):  
Syaiful Amrial Khoir ◽  
Anton Yudhana ◽  
Sunardi S

Attendance is a document that represents each employee at the company or representative. Some of the challenges experienced by KSPPS BMT INSAN MANDIRI are marketing that is difficult to carry out attendance when coming out of the office because of increased marketing activities that are directly related to members / out-of-office expenses. Therefore the researcher got findings to solve the problem that occurred by making an Android-based online attendance application that can be connected directly with the sarver provided by the office. This application is equipped with the introduction of security and the use of manipulations made by employees, and this application is equipped with monitoring features so that marketing managers and managers can set marketing positions in realtime. In this study, researchers used HTML and PHP programming languages for web applications that use presence servers / data centers, webside uses Google map APIs to obtain marketing positions, and presence reports can be purchased from the webside. The hope of this research is that the online android mobile attendance application with face recognition security can run well and meet the needs of the KSPPS BMT INSAN MANDIRI.


2020 ◽  
Vol 4 (1) ◽  
pp. 112
Author(s):  
Siti Awaliyah Rachmah Sutomo ◽  
Frisma Handayanna

By using data mining methods can be processed to obtain information and assist in decision making, the amount of data on sales transactions in each drug purchase can cause a data accumulation and various problems, such as drug stock inventory, and sales transaction data, with Data mining techniques, the behavior of consumers in making transactions of drug purchase patterns can be analyzed, It can be known what drugs are commonly purchased by mostly people, the application of Apriori Algorithm is expected to help in forming a combination of itemset. The process of determining drug purchase patterns can be carried out by applying the Appriori algorithm method, determination of drug purchase patterns can be done by looking at the results of the consumer's tendency to buy drugs based on a combination of 3 itemset. By calculating the Analysis of High Frequency Patterns and the Formation of Association Rules, with a minimum of 30% support, there is a combination of 3 itemsset namely MOLAGIT PER TAB (M1), VIT C TABLET (V2), and PARACETAMOL 500 MG TABLET (P2) with 33.33 % support results obtained, and with minimum confidence of 65% there are 6 final association rules.


2020 ◽  
Vol 4 (1) ◽  
pp. 191
Author(s):  
Ira Zulfa ◽  
Richasanty Septima S ◽  
Auliadi A

The AHP (Analytical Hierarchy Process) method is suitable for the decision making process because it can determine scores for each different criteria, then proceed with the best alternative selection process. In the SPK (decision support system) is used web-based that can be accessed anytime, anywhere. So that at school, high school students (high school) can access the system through the school's computer. Requirements analysis is divided into 2 types, namely functional requirements (Functional Requirements) are types of requirements that contain the processes that will be carried out by the system and non-functional requirements (Non Functional Requirements) are types of requirements that contain behavioral properties owned by the system. Criteria for test results is a requirement for decision makers in determining the selection of study programs in Higher Education, based on the DAT test, the results of which are divided into 3 criteria, namely verbal ability, numerical ability, and spatial ability. Of the 100% accuracy of the results on the system using the AHP method in this system only results in 75% of the accuracy of the results.


2020 ◽  
Vol 4 (1) ◽  
pp. 66
Author(s):  
Muhammad Romy Firdaus ◽  
Fikri Muhammad Rizki ◽  
Favian Muhammad Gaus ◽  
Indra Kusumajati Susanto

This study aims to determine and analyze responses regarding customer satisfaction Ruangguru Application to the learning space features in the Ruangguru Application at every level of education. This is useful to know the strengths and weaknesses of the Ruangguru Application based on sentiment responses from Ruangguru users. Ruangguru is an online tutoring startup and a technology-based educational content service and provider no. 1 in Indonesia. So of course, customer satisfaction is an important thing that is the goal of the company. So that when customer satisfaction is met, that is where the company can realize their goals. To see how the level of customer satisfaction, sentiment analysis methods and topic modeling are used in processing the data so that responses can be seen as to what is provided by the customer so that it can be an evaluation for the Ruangguru Application.


2020 ◽  
Vol 4 (1) ◽  
pp. 77
Author(s):  
Rinawati R ◽  
Erene Gernaria Sihombing ◽  
Linda Sari Dewi ◽  
Ester Arisawati

Theft is a behavior that causes harm to victims who are targeted and can cause victims. The level of theft behavior is increasing in each region due to the increasing number of unemployment and lazy nature of work that makes a person commit theft to make ends meet. The purpose of this study was to analyze using the technique of datamining in the area of perpetrators of theft crimes by province. The technique used is clustering with the K-means method. Data sourced from the Indonesian Central Statistics Agency with the url address: https://www.bps.go.id/. The results of the study using this technique are clustered in areas in Indonesia which have the highest crime theft rates. From the results of the study using the K-means technique, that there are 17 provinces out of 34 provinces that have the highest crime theft (C1) areas, namely: Aceh, North Sumatra, West Sumatra, Riau, Jambi, South Sumatra, Lampung, DKI Jakarta, West Java, Central Java, East Java, Banten, West Nusa Tenggara, East Nusa Tenggara, South Kalimantan, South Sulawesi, Papua. The results of the study are expected to be information for the government in conducting policies to reduce the crime crime rate in Indonesia which is very high (50%).


2020 ◽  
Vol 4 (1) ◽  
pp. 179
Author(s):  
Susliansyah S ◽  
Annisa Dwi Wijayanti ◽  
Heny Sumarno ◽  
Hendro Priyono ◽  
Linda Maulida

Depok Madani Vocational School is a Vocational High School consisting of 2 majors namely Light Vehicle Engineering (TKR) and Computer and Network Engineering (TKJ) with 20 teachers as instructors from class X to class XII. The selection of the best teachers is done once a month to motivate the teacher in conducting teaching and learning activities. Schools in making decisions are often influenced by subjectivity and are done manually. Resulting in social jealousy among teachers and inaccurate decision results. Therefore, in assessing the best teachers a decision support system is needed in order to obtain accurate results. Decision Support System methods used in this study is Profile Matching. The method determines the value of weights on each criterion, which is to be present on time, responsibility, dress neatly and politely, participate and contribute, be active and productive, and help fellow teachers, which is followed by a ranking process. The result of the comparison of the two methods above is to produce the same chosen alternative, so that both methods can be applied to help the school's decision making.


2020 ◽  
Vol 4 (1) ◽  
pp. 29
Author(s):  
Imam Riadi ◽  
Abdul Fadlil ◽  
Putri Annisa

Katakana is one of the traditional Japanese letters used to absorption words from other languanges. In the inttroduction of an object a learning process is needed, which is obtained through the characteristics and experience of observing similar objects after being acquired. But manually it is quite difficult to distinguish between 5 hiragana vowels starting from the image data acquisition process, image processing, feature extraction using Gray Level Co-occurance Matrix (GLCM) while classifiers use the euclidean distance method. The results of the tests carried out showed an accuracy rate of around 78% using the euclidean method.


2020 ◽  
Vol 4 (1) ◽  
pp. 54
Author(s):  
Muhammad Ibnu Sa’ad ◽  
Muhammad Surahmanto ◽  
Muhammad Rizki Pratono Soemari ◽  
Kusrini K ◽  
M. Syukri Mustafa

Geographic Information System ia a geospatial software system that has the ability to build, store, manage and display geo-referenced information, for example data that is identified by location. By using GIS, it is expected that it will be easier for prospective students and students to find out the location of boarding houses that are located around the campus of Mulawarman University. The system development method uses the waterfall method. While the system design method uses UML (Unified Modelling Language) to visualize, determine, develop and document a software system. The algorithm used in this study uses the haversine formula which will later help to find the nearest boarding house location around the campus of Mulawarman University, the haversine formula will produce the shortest distance between two points, for example on a ball taken from the longitude and latitude. The result of this study will disply detailed boarding location information, besides that on this geograpihic information system the user will later be able to see the details of boarding and admin data can change, add data to the boarding owner and be technically responsible for the running of the application, while the boarding owner is only responsible on managing boarding data on their respective users.


Sign in / Sign up

Export Citation Format

Share Document