Claim Missing Document
Check
Articles

PERANCANGAN SISTEM DATA INVENTORY MENERAPKAN ALGORITMA SEQUENTIAL SEARCH PADA TOKO “ALMELLSHOPZ” Prasetiyo, Muhammad Hendrik; Lubis, Hendarman
JSI (Jurnal sistem Informasi) Universitas Suryadarma Vol 11 No 2 (2024): JSI (Jurnal sistem Informasi) Universitas Suryadarma
Publisher : Universitas Dirgantara Marsekal Suryadarma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35968/jsi.v11i2.1251

Abstract

ALMELLSHOPZ is a shop that carries out buying and selling transactions for clothes, trousers and shoes. The problems that occur in the system that is currently running, namely for managing incoming and outgoing goods data, stock data, goods delivery data, customer data are still recorded in the ledger according to receipts containing how many goods came in and went out to be sent to customers. and stock inventory data is only recorded on a piece of paper and then copied back to the computer by the cashier, so that sometimes there are difficulti es in calculating goods and getting stock information is difficult, sometimes the information provided does not match the availability of existing goods. The aim of this research is to create a stock inventory data system, which can manage incoming and outgoing goods, stock of goods, goods delivery data, customer data using a Java-based sequential search algorithm method at the ALMELLSHOPZ store so that management data management activities are more efficient. One of the advantages of the Java programming language is that it is in great demand by developers and programmers because Java is a programming language that is multi-platform, aka universal and can be used on any platform. This makes many application developers use the Java programming language base to create the desired applications. 
ANALISIS KOMPARATIF ALGORITMA MACHINE LEARNING UNTUK MENDETEKSI MALICIOUS URL BERBASIS FITUR GANDA Alexander, Allan Desi; Warta, Joni; Lubis, Hendarman; Mahbub, Asep Ramdhani; Rasim, Rasim
Jurnal Manajamen Informatika Jayakarta Vol 5 No 3 (2025): Jurnal Manajemen Informatika Jayakarta ( JMI Jayakarta)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jmijayakarta.v5i3.2101

Abstract

Malicious URL Detection (MUD) merupakan komponen esensial dalam pertahanan siber, mengingat kerugian finansial global yang disebabkan oleh phishing, penyebaran malware, dan serangan botnet IoT. Pendekatan tradisional seperti blacklisting terbukti tidak efektif melawan URL yang baru dibuat atau polymorphic. Penelitian ini menyajikan analisis komparatif ekstensif dari tiga kelas algoritma utama: Ensemble Learning (Random Forest/RF), Kernel Methods (Support Vector Machine/SVM), dan Deep Learning (DL), dalam mengklasifikasikan URL yang berpotensi berbahaya. Data yang digunakan bersumber dari repositori publik URLhaus, yang sangat fokus pada malware download, khususnya kampanye botnet Mozi dan Mirai. Metodologi studi ini menekankan pada rekayasa fitur multi-modal, yang menggabungkan fitur leksikal, berbasis host/domain, dan fitur berbasis metadata (tag malware). Kinerja model dievaluasi menggunakan metrik yang sensitif terhadap keamanan siber, yaitu Presisi, Recall, dan F1-Score, untuk meminimalisir False Negatives. Hasil analisis memperlihatkan bahwa meskipun model DL mencapai akurasi tertinggi, Random Forest menawarkan keseimbangan optimal antara kinerja deteksi yang kuat dan efisiensi komputasi, menjadikannya ideal untuk implementasi real-time dalam sistem deteksi ancaman. Malicious URL Detection (MUD) is an essential component of cyber defense, given the global financial losses caused by phishing, malware distribution, and IoT botnet attacks. Traditional approaches such as blacklisting have proven ineffective against newly created or polymorphic URLs. This study presents an extensive comparative analysis of three main classes of algorithms: Ensemble Learning (Random Forest/RF), Kernel Methods (Support Vector Machine/SVM), and Deep Learning (DL), in classifying potentially malicious URLs. The data used is sourced from the public repository URLhaus, which focuses heavily on download malware, specifically the Mozi and Mirai botnet campaigns. The study's methodology emphasizes multi-modal feature engineering, combining lexical, host/domain-based, and metadata-based features (malware tags). Model performance is evaluated using cybersecurity-sensitive metrics, namely Precision, Recall, and F1-Score, to minimize False Negatives. The analysis results show that although the DL model achieves the highest accuracy, Random Forest offers an optimal balance between strong detection performance and computational efficiency, making it ideal for real-time implementation in threat detection systems.
PERANCANGAN SISTEM INFORMASI LOCATION BASED SERVICE (LBS) OBJEK WISATA MENGGUNAKAN METODE INKREMENTAL BERBASIS ANDROID DI KOTA BEKASI Fitriyani, Aida; Lubis, Hendarman; Hendharsetiawan, Andy Achmad
Jurnal Manajamen Informatika Jayakarta Vol 4 No 3 (2024): JMI Jayakarta (Juli 2024)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jmijayakarta.v4i3.1496

Abstract

Tourist attractions are a necessity for people to go on holiday with their families. Tourist attractions in Bekasi also have great potential for regional income if they are managed well. Data from the Central Statistics Agency (BPS) shows that the population of Bekasi Regency currently reaches 3.3 million people and Bekasi City 2.6 million, an increase of around 1 million in the last 5 years. In the modern era, technology is developing so rapidly that it has become one of society's main needs. Technology that is always developing, such as smartphones and Android, can be easily utilized in carrying out various activities. Location Based Service (LBS) is a location service that uses GPS (Global Positioning Service) which functions to find a destination location to make it easier for users. Many people travel to a certain place to enjoy their holiday, this is a necessity in life to refresh the mind while working or studying. For this reason, it is necessary to present an information system that provides tourist attraction location services to make it easier for people to find these tourist attractions. The Location Based Service (LBS) information system can help the public in showing directions. This information system can help the public to carry out holiday activities to tourist attractions. This Location Based Service (LBS) system provides information services regarding tourist attractions and travel preparation tips. This tourist attraction's Location Based Service (LBS) system is also equipped with a location route feature.
IDENTIFIKASI CITRA GARIS TELAPAK TANGAN MENGGUNAKAN METODE GLCM & K-NN Nurfiyah, Nurfiyah; Lubis, Hendarman; Salkiawati, Ratna
Jurnal Manajamen Informatika Jayakarta Vol 4 No 3 (2024): JMI Jayakarta (Juli 2024)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jmijayakarta.v4i3.1524

Abstract

Pada era perkembangan teknologi yang pesat, sistem pengenalan seseorang secara otomatis menjadi suatu yang sangat penting salah satunya dengan menggunakan unsur biometrik dari tubuh manusia. Proses identifikasi biometrik dapat menghindari adanya kebocoran data, seperti username dan password suatu akun dapat di bobol, dokumen atau tanda tangan yang ditirukan. Salah satu fitur biometrik yang digunakan dalam penelitian ini adalah telapak tangan, karena telapak tangan memiliki karakteristik unik yang dimana pola garis-garis utama pada telapak tangan (palmprint) seperti, luas area, garis kusut/lemah, dan garis utama pada telapak tangan (principal lines) yang bersifat stabil. Tujuan dari penelitian ini adalah untuk mengidentifikasi citra garis telapak tangan agar dapat melihat nilai akurasi pada citra garis telapak tangan tersebut dan pencocokan pola garis telapak tangan dari inputan yang tersedia pada database dengan menggunakan metode GLCM untuk ektraksi fitur pada citra garis telapak tangan dan menggunakan metode K-Nearest Neighbor (KNN) untuk pengklasifikasian citra tersebut agar dapat dikenali siapa pemilik citra telapak tangan tersebut, dan dari hasil penelitian yang sudah dilakukan identifikasi citra garis telapak tangan menghasilkan nilai akurasi sebesar 66.7%. Kata kunci: Biometrik, Garis Telapak Tangan, K-Nearest Neighbor (KNN).
PENERAPAN METODE AHP DALAM SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PRODUK FURNITUR KAYU JATI (STUDI KASUS AGUNG JAYA MEBEL) Prasojo, Agung Dwi; Lubis, Hendarman; Alexander, Allan Desi
Jurnal Informatika dan Teknik Elektro Terapan Vol. 11 No. 3 (2023)
Publisher : Universitas Lampung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.23960/jitet.v11i3.3242

Abstract

Agung Jaya Mebel adalah usaha dagang yang memasarkan produk furnitur berbahan kayu jati merah di Bekasi. Namun, banyaknya jenis furnitur yang tersedia membuat pelanggan kesulitan dalam memilih produk yang tepat karena adanya berbagai variasi motif, kualitas dan ukuran terutama bagi pelanggan yang berasal dari luar kota yang ingin mencari produk ditoko tersebut. Untuk mengatasi tantangan tersebut, diperlukan suatu sistem yang dapat mengambil keputusan berdasarkan metode yang dapat memperhitungkan bobot relatif dari kriteria yang berbeda. Analytical Hierarchy Process adalah suatu metode yang digunakan untuk mengevaluasi dan membandingkan alternatif berdasarkan kriteria yang relevan. Hal ini memungkinkan pengembangan skor numerik untuk menentukan peringkat alternatif dari setiap alternatif yang memenuhi kriteria tertentu. Dalam pemilihan furnitur ini, AHP digunakan untuk mengevaluasi dan membandingkan furnitur berdasarkan kriteria yang relevan seperti harga, ukuran,  kualitas kayu dan kualitas ukiran, yang diterapkan dalam aplikasi sistem pendukung keputusan yang dibangun dengan PHP MySQL. Hal ini diharapkan akan meningkatkan kepuasan pelanggan serta memastikan bahwa furnitur yang dipilih sesuai dengan kebutuhan dan harapan mereka. Hasil dari sistem pendukung keputusan ini berupa nilai prioritas dari seluruh kriteria dan alternatif serta memberikan informasi rekomendasi produk ketika nilai total >= 0,45.
Pelatihan Keamanan Data Pada Penggunaan Microsoft Office Bagi Guru di SDIT Mutiara Bekasi Nurfiyah, Nurfiyah; Salkiawati, Ratna; Lubis, Hendarman
Journal Of Computer Science Contributions (JUCOSCO) Vol. 3 No. 2 (2023): Juli 2023
Publisher : Lembaga Penelitian, Pengabdian kepada Masyarakat dan Publikasi Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/rem1b822

Abstract

Information Technology Security is increasingly advanced, not only in the world of the manufacturing industrybut also penetrates the world of education. This forces educators to be able to develop their abilities to know howto secure data in Ms.Office. Therefore, as a manifestation of Bhayangkara Jakarta Raya University's commitmentto carrying out the Tri Dharma of Higher Education in community service, the Informatics Study Program carriedout activities with the theme "Data Security Training on the Use of Ms.Office at SDIT Mutiara" as an effort toapply knowledge about information technology security. At the moment. The purpose of this training is to increaseknowledge and insight for participants in terms of Data Security at Ms. Office, as well as providing training tomake data security and broaden knowledge of the use of Ms. Office for teachers of SDIT Mutiara. The materialprovided in this training is in the form of an introduction to the concept of Data Security, types of software inmaking teaching materials with Ms. office. The methodology for carrying out this activity begins with datacollection, determining the theme of the service to be given, literature study, making training materials, presentingtraining. The result of this training is an increased understanding of data security by 97%. From the data securitytraining activities in Microsoft Office that have been carried out for teachers and administrators of SDIT MutiaraBekasi, it can be seen that the participants were very enthusiastic and motivated to do security for their data sothat during the training the participants did not feel bored with the material delivered by the tutor.
PERANCANGAN INTERFACE MOBILE START UP “SERVICE IN” MENGGUNAKAN METODE DESIGN THINKING DAN ANALISIS GSTALT Lubis, Hendarman; Harun, Rofiq; Rahma, Dea Wemona; Satrinia, Dwina
TRANSFORMASI Vol 21, No 1 (2025): TRANSFORMASI
Publisher : STMIK BINA PATRIA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.56357/jt.v21i1.413

Abstract

The development of digital technology has encouraged the emergence of various mobile application-based services to facilitate daily activities. The Service In application is present as a digital start-up solution that provides online technician booking services via mobile devices. The development method used in this study is the Design Thinking Method which consists of the stages of Empathize, Define, Ideate, Prototype and Test. The GSTALT principle consisting of; Proximity, Similarity, Common-region, Focal point, Continuity, Closure and Figure/ground is used in designing the user interface of the "Service In" mobile application. In this study, the UI design testing process uses the Usability Heuristic indicator to be able to observe user activity. The testing results obtained a value of 79% which indicates that the Service.in start-up falls into the user friendly criteria.Keywords: Start Up, Design Thinking, GSTALT, Service In, Usability Heuristic
Keamanan Sistem Login Menggunakan Multifactor Authentication dan Algoritma Hashing Fitriyani, Aida; Lubis, Hendarman; Yaddarabullah, Yaddarabullah; Sari, Rafika
Journal of Information System, Informatics and Computing Vol 9 No 2 (2025): JISICOM (December 2025)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jisicom.v9i2.2137

Abstract

Login system security is a crucial aspect in digital application development to protect user personal data. This research aims to implement a modern hashing algorithm, Argon2, and add a security layer through Multi-Factor Authentication (MFA) using One-Time Password (OTP) codes. The Argon2 algorithm was chosen because it is memory-hard, configurable, and more resistant to brute-force attacks and rainbow table attacks. The system development method used is the Waterfall method, where the system is developed using the Kotlin programming language with the Jetpack Compose architecture, and the Firebase Authentication and Firestore databases. An OTP is sent to the user after successful registration as additional verification. Implementation results show that the time cost parameter in Argon2id significantly affects hashing execution time, with higher values improving security while remaining within performance tolerances. The combination of Argon2 and MFA successfully provides a more secure login system and is more resilient to cyberattacks than traditional authentication methods. Test results indicate that the Time Cost parameter in Argon2id significantly impacts hashing time. With the following configurations: Time Cost = 1 → 2.028 ms, Time Cost = 2 → 48.623 ms, and Time Cost = 3 → 71.219 ms. Higher parameter values increase execution time but also increase resistance to brute-force attacks. The combination of the Argon2 algorithm and MFA methods results in a more secure and reliable login system than traditional authentication, while remaining responsive in application performance.
RANCANG BANGUN SISTEM INFORMASI MONITORING DAN ANALISIS KINERJA PENJUALAN MENGGUNAKAN METODE RAPID APPLICATION DEVELOPMENT ( RAD ) Rasim, Rasim; Mugiarso, Mugiarso; Handayani, Dwipa; Lubis, Hendarman
Journal of Information System, Informatics and Computing Vol 9 No 2 (2025): JISICOM (December 2025)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jisicom.v9i2.2078

Abstract

The sales achievement monitoring process at CV Pakar Prima Buana, which relies on Microsoft Excel, has led to issues such as data duplication and inconsistency due to the manual filtering and target distribution performed by team leaders in a company with over 500 employees. This study aims to develop a web-based information system designed to simplify, accelerate, and streamline the monitoring of each salesperson’s achievement performance. The Rapid Application Development (RAD) methodology was adopted for its fast and adaptive development cycle, consisting of three main phases: Requirements Planning, Design Workshop, and Implementation. The system was developed using PHP, the CodeIgniter framework, and a MySQL database. The black-box testing results demonstrate that all system functions operate as expected. The resulting system successfully automates the calculation and reporting of sales achievements, eliminates data duplication, and provides structured, accurate, and timely information to support managerial decision-making. Keywords: Information System, Sales Achievement, Rapid Application Development, CodeIgniter, Black-box Testing
Aplikasi Sistem Pakar Diagnosa Penyakit Pada Kucing Menggunakan Algoritma Certainty Factor Berbasis Web Handayani, Dwipa; Mahbub, Asep Ramdhani; Noeman, Achmad; Febian, Guruh Putra; Lubis, Hendarman
Journal of Information System, Informatics and Computing Vol 9 No 2 (2025): JISICOM (December 2025)
Publisher : Sekolah Tinggi Manajemen Informatika dan Komputer Jayakarta

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52362/jisicom.v9i2.2071

Abstract

This web-based expert system for diagnosing cat diseases is designed to provide fast and accurate diagnoses. Cat owners can input observed symptoms, which are then analyzed using the Certainty Factor algorithm to calculate the likelihood of possible diseases. Based on test data, the system achieves up to 90% accuracy for common diseases such as Feline Panleukopenia Virus and Feline Calicivirus. The algorithm handles uncertainty by generating values between 0 and 1, indicating the confidence level of each diagnosis. Built with PHP and MySQL, the system is accessible in real-time through a responsive web interface. This enhances the efficiency of disease diagnosis and reduces the reliance on veterinarians for initial assessments. Moreover, the system contributes to the advancement of expert system technology in animal health by integrating the proven effectiveness of the Certainty Factor algorithm.