cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kab. indragiri hilir,
Riau
INDONESIA
Sistemasi: Jurnal Sistem Informasi
ISSN : 23028149     EISSN : 25409719     DOI : -
Sistemasi adalah nama terbitan jurnal ilmiah dalam bidang ilmu sains komputer program studi Sistem Informasi Universitas Islam Indragiri, Tembilahan Riau. Jurnal Sistemasi Terbit 3x setahun yaitu bulan Januari, Mei dan September,Focus dan Scope Umum dari Sistemasi yaitu Bidang Sistem Informasi, Teknologi Informasi,Computer Science,Rekayasa Perangkat Lunak,Teknik Informatika
Arjuna Subject : -
Articles 1,011 Documents
Conceptual Model of Blockchain Technology for Chicken Meat Supply Chain in Yogyakarta City Yeyet Maryasa; Utaminingsih Linarti
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2390

Abstract

The limited number of Chicken Slaughterhouses that already have a halal certificate in Yogyakarta city, causes a limited number of chicken meat supplies that have been certified halal. Even though the majority of people in the Yogyakarta city are muslim. Therefore, halal guarantees for products concumed by the puplic are very important. One way that can be done to help track guarantees of halal product is to use blockchain technology. Blockchain can be used to assist in tracking information related to chickhen meat, so that it can increase transparency and increase consumer confidence regarding chichken meat product. The purpose of this research is to design a blockchain model on the chickhen meat supply chain in Yogyakarta city, so that customers can get informastion about chickhen meat that is distributed along supply chain. Based on the result and analysis, it is known that blockchain can allow all stakeholders involved to be able to share the information they have into the blockchain system, which later this information will be tracked by all stakeholders. So that by sharing information into the system will create data transparency an minimze data usage, because information that can no longer be changed. Keywords: Blockchain, Supply Chain Management, Halal.  
Implementation of Business Modeling Canvas (BMC) and Unified Modelling Language (UML) for Android-based Application Fajar Akbar; Dedi Saputra; Irwan Agus Sobari Sobari; Erna Agustine
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.1822

Abstract

The development of digital in indonesia is shown  from the increasing demand of  computers use, and mobile Application. The development technology has an impact on changes in many human habits , especially in human's lifestyles.In this era  People’s  can get everything efficiently and effectively except in needs of foods. People can use VeggieFun for fulfillment fruits and vegetables needs. VeggieFun provides convenience people’s to order and buy fruits dan vegetables without go to market.  As an application for comercial used, VeegieFun use bussines model and UML  methode for development and implementation  VeegieFun aplication. With a Bussines  With Bussines Model Canvas (BMC) we can more get analiysis from bussines model and  using  UML In development of veggiefun applicationt  for simplify the stages of implementation and development an application.Keyword : Busines Modeling Canvas, Unified Modelling Language, Application
Malware Detection on Local Network based on Honeypot and Yara Nur Rohman Rosyid; Budi Bayu Murti; Brama Prayudha; Arul Ferian Ramadloni; Lukman Subekti
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2432

Abstract

The malware threats have never subsided, even the trend shows an increase and varies along with the development of hardware and software technology. End user may not realize if their machine is compromised by malware. It could be the anti-malware mechanism is not working properly, such as the anti-virus is not updated or there is a zero-day attack. Therefore, it is necessary to detect the presence of malware on  end-systems devices or  the existence of zero-day attack in the local network. Implementation of honeypot as a security sensor that collects malware attack data in the form of malware files and malware hashes can be used as signatures for scanning and detecting malware. This research utilizes a honeypot as a security sensor to catching malware. The malware hash from the honeypot is used to scanning and detecting the presence of malware on the end-system in a local network such as a PC or server. Furthermore, Yara helps clarify the type of malware found by scanning suspected files. The results of scanning and detecting of malware by Yara will be reported to the appropriate authorities via Telegram application channles. This research contributes by providing early warning of potential security threats to the network and collecting hash code of recently malware attacking to the network.Keywords: Honeypot, Malware, Yara, Proactive Security.
Comparison of Classification Algorithms toward Sentiment Analysis on Claim of Old Age Guaranteed Ahmad Al Kaafi; Hilda Rachmi; Suparni Suparni
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2221

Abstract

The pros and cons of the Old Age Security (JHT) claim rules contained in the Minister of Manpower Regulation No. 2 of 2022 are unavoidable in Indonesia, especially on Twitter social media. Of course, this is something that deserves to be analyzed as government policy makers so as not to make a wrong move, one of which is using sentiment analysis techniques. The stages of the research carried out include data collection, pre-processing, the model used, experimentation and model assessment, as well as validation and evaluation of results. The researcher crawled 1000 Indonesian-language tweets on the pros and cons of claims related to Old Age Security using the R programming language and carried out the Text Cleaning Process. In the next stage, pre-processing is carried out using Case Folding, Stemming, Tokenizing and Stopword Removal. This research resulted in the sentiments of the Indonesian people being very happy with the president's statement asking for the regulation of the Minister of Manpower No. 2 of 2022 to be revised, then tested using 3 classification algorithms and the application of Particle Swarm Optimization feature selection. The results of the sentiment testing of the JHT benefit claim analysis obtained the highest value on the Support Vector Machine algorithm with the addition of Particle Swarm Optimization, namely the accuracy value of 82.92%, precision of 84.53%, recall of 80.90% and AUC value of 0.892..Keywords: Support Vector Machine, Sentiment Analysis, Old Age Guaranteedsar 0.892
Analysis of Students to Follow Computer Extracurricular Activities using Fuzzy Logic Method Loneli Costaner; Guntoro Guntoro; Lisnawita Lisnawita
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2211

Abstract

An educational institution will carry out activities for the development of human resources. In improving good human resources, additional lessons are needed to increase students' skills, especially in the computer field. The current obstacle is that schools have difficulty measuring students' interest in participating in computer extracurricular, as a result the development of computer hardware needs is hampered. This study aims to provide knowledge to schools to find out what percentage of students are interested in learning computers. The method used is a Likert scale and fuzzy logic by measuring four variables of student feelings, student attention, student interest and student involvement. Measurement of student interest by compiling a questionnaire filled in by students and students there are 14 questions with a choice of each question 5 answer choices, obtained an average weight on the Likert scale variable feeling 74.0%, attention 76.5%, interest 75.7% and the involvement of 78.0% of the weight was tested with fuzzy inference with a firmness value of 38, where the value is included in the output domain not interested. By measuring student interest, it is hoped that it will be useful for institutions to consider implementing computer extracurricular.
User Interface (UI) Design and User Experience (UX) for Mobile-based Quranic Memorizing using the Lean UX Muhammad Arkoun Rifki; Kholid Haryono
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2392

Abstract

The interest of the Muslim community in memorizing the Qur'an is increasing today. The appreciation for the memorizers is also getting higher with the many opportunities for scholarships and other achievements from various institutions, especially universities. Memorizing activities are usually taught at Islamic boarding schools using special manuscripts and accompanied by teachers directly. This luxury cannot be enjoyed by the Muslim community, which is increasingly having high mobility. Therefore, it is an opportunity to present digital memorization manuscripts installed on their devices. In addition, the memorization method taught in Islamic boarding schools is also based on the instructions of the Mushaf and the input from the memorizers has shown that the tikrar method is the most widely used. This study will propose a digital mushaf design for memorizing using the tikrar method which makes it easy for the memorizers. The method used is Lean UX by providing a prototype based on the results of the memorization manuscript review and the currently available application of the Qur'an. This prototype was immediately reviewed by the memorizers to get the appropriate design. The results of the design were tested using the Usability Testing and Important Performance Analysis (IPA) methods in order to gain ease of use and user acceptance with the proposed design. The results show positive review results by achieving an easy, intuitive, and efficient design with a usability score of 79.8 which means it is quite good.Keywords: Al Qur’an memorization, Usability testing, Important Performance Analysis, Lean UX, Tikrar method.
Application of the C4.5 Algorithm to Predict the Effectiveness of Google Adwords Ads Aditya Gusti; Sri Hadianti
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.1978

Abstract

Google Adswords is a product that you can use to promote your business, help sell products or services, raise awareness, and increase traffic to your site. Nayaka Technology is currently using the services of Google Adswords as a way to boost sales and expand the network. However, because broadcast planning was not carried out in advance, the results obtained were not satisfactory. In the next campaign, planning will be carried out first using the history on the previous campaign's broadcast reports, the data is processed using data mining techniques to predict the market. The model used is the C4.5 algorithm, the results of the C4.5 algorithm model are tested using a confusion matrix and get 92.70% of accuracy, 78.23% of precision and 97.25% of recall.Keywords: Google Adswords, Algoritma C4.5, Data Mining. 
Implementation of JSON Web Token on Authentication with HMAC SHA-256 Algorithm Ficry Cahya Ramdani; Alam Rahmatulloh; Rahmi Nur Shofa
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2450

Abstract

The rapid growth of information technology is influenced by globalization to accelerate access to information. This creates new problems, as differences must produce relevant information. Of course, system integration will be required. Web Service is a system integration solution that does not consider the platform, architecture, or programming language used in different sources. The security of web service is considered not yet implemented. The JSON Web Token (JWT) technology is an authentication mechanism for web service and will have a significant impact on data security. This implementation optimizes JWT security with the HMAC SHA-256 algorithm. Testing is conducted on two information systems by comparing the performance size when JWT technology is applied to Tim Bebersih Masjid Information System. The results show that the implementation of JWT on Windows Server 2019 (VM) is 462.8 ms with an average data size of 8.59 kb. Testing on the Windows 10 operating system obtained an average speed of 216.25 ms with an average data size of 8.59 kb. The result on Windows Server 2019 (VM) from the JWT performance test itself obtained the highest result, due to the use of virtual machine which is considered to consume a lot of RAM, resulting in performance that is 2 times higher.Keywords: Algorithm, HMAC SHA-256, JSON Web Token, Web Service, Virtual Machine
Utilization of Telegram application As an Information Media Face Mask Detection Result Muhammad Furqan Rasyid; Andi Asvin Maherssatillah Suradi; Arham Arifin; Muhammad Rizal; Mushaf Mushaf
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2264

Abstract

To know the results of the face mask detection system, one must be near a computer. This problem makes it difficult to reprimand and provide face masks to violators. One of the ways to prevent the spread of the virus is to wear a mask. This study focuses on making a face mask detection system connected to a cellular device. This study aims to make obtaining information more effortless, and monitoring officers can find out from a smartphone. As a medium of communication, we use the telegram application. Smartphone users widely use this application compared to existing messaging media applications. This study uses the YoloV4 algorithm to detect face mask and JSON to send information to the telegram application. The test consists of two stages, the first stage is to determine the accuracy of the face mask detection system and the second stage is to determine the average time required until the information is sent. The two tests performed obtained 97.57% and 0.255 seconds, respectively. The test results show that the system created can solve the existing problems. The researcher can do further research by increasing the number of datasets to increase the accuracy of face mask detection.Keywords: Face Mask Detection, JSON, Telegram Application, YoloV4 Algorithm. 
Utilization of IoT Technology based on Sensors and Arduino for Observation of Industrial Liquid Waste Pollutants in Environmental Water Vemy Nathasya; Suroso Suroso; Irawan Hadi
Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi
Publisher : Program Studi Sistem Informasi Fakultas Teknik dan Ilmu Komputer

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32520/stmsi.v12i1.2153

Abstract

Water plays a vital role in human life. Based on the Regulation of the Minister of Health of the Republic of Indonesia No. 416 / MENKES / PER / IX / 1990, the criteria for clean and healthy water are clean and clear, tasteless, free from odors, toxic substances, and excess chemicals with a water taste standard (pH) that can be consumed is 6.5 to 9.2 and is included in the minimum limit of total dissolved solids (TDS). Therefore, in this study, a measuring instrument was designed consisting of criteria included in clean and healthy water standards that are easy to apply close to the industrial environment. This study aims to (1) find out the system of designing tools to measure water quality with IoT-based Arduino Uno technology, (2) knowing the telecommunications process that occurs in sensors integrated into the internet, and (3) knowing the analysis results of water quality measuring devices with IoT-based Arduino Uno technology. This study conducted testing of water samples in industrial areas. The test was carried out with 3 types of sensors, namely pH sensors, TDS sensors, and turbidity sensors controlled by microcontrollers. The results of this study show the level of pH, dissolved solids and the level of turbidity in water that can be monitored anytime and anywhere through an application while connected to the internet. With this tool, it greatly facilitates the stage of testing pollutants in rivers, it is proven that in one test, it can produce 3 data with different parameters.

Page 39 of 102 | Total Record : 1011


Filter by Year

2013 2026


Filter By Issues
All Issue Vol 15, No 3 (2026): Sistemasi: Jurnal Sistem Informasi Vol 15, No 2 (2026): Sistemasi: Jurnal Sistem Informasi Vol 15, No 1 (2026): Sistemasi: Jurnal Sistem Informasi Vol 14, No 6 (2025): Sistemasi: Jurnal Sistem Informasi Vol 14, No 5 (2025): Sistemasi: Jurnal Sistem Informasi Vol 14, No 4 (2025): Sistemasi: Jurnal Sistem Informasi Vol 14, No 3 (2025): Sistemasi: Jurnal Sistem Informasi Vol 14, No 2 (2025): Sistemasi: Jurnal Sistem Informasi Vol 14, No 1 (2025): Sistemasi: Jurnal Sistem Informasi Vol 13, No 6 (2024): Sistemasi: Jurnal Sistem Informasi Vol 13, No 5 (2024): Sistemasi: Jurnal Sistem Informasi Vol 13, No 4 (2024): Sistemasi: Jurnal Sistem Informasi Vol 13, No 3 (2024): Sistemasi: Jurnal Sistem Informasi Vol 13, No 2 (2024): Sistemasi: Jurnal Sistem Informasi Vol 13, No 1 (2024): Sistemasi: Jurnal Sistem Informasi Vol 12, No 3 (2023): Sistemasi: Jurnal Sistem Informasi Vol 12, No 2 (2023): Sistemasi: Jurnal Sistem Informasi Vol 12, No 1 (2023): Sistemasi: Jurnal Sistem Informasi Vol 11, No 3 (2022): Sistemasi: Jurnal Sistem Informasi Vol 11, No 2 (2022): Sistemasi: Jurnal Sistem Informasi Vol 11, No 1 (2022): Sistemasi: Jurnal Sistem Informasi Vol 10, No 3 (2021): Sistemasi: Jurnal Sistem Informasi Vol 10, No 2 (2021): Sistemasi: Jurnal Sistem Informasi Vol 10, No 1 (2021): Sistemasi: Jurnal Sistem Informasi Vol 9, No 3 (2020): Sistemasi: Jurnal Sistem Informasi Vol 9, No 2 (2020): Sistemasi: Jurnal Sistem Informasi Vol 9, No 1 (2020): Sistemasi: Jurnal Sistem Informasi Vol 8, No 3 (2019): Sistemasi: Jurnal Sistem Informasi Vol 8, No 2 (2019): Sistemasi: Jurnal Sistem Informasi Vol 8, No 1 (2019): Sistemasi: Jurnal Sistem Informasi Vol 8, No 1 (2019): Sistemasi Vol 7, No 3 (2018): Sistemasi: Jurnal Sistem Informasi Vol 7, No 2 (2018): SISTEMASI Vol 7, No 2 (2018): Sistemasi: Jurnal Sistem Informasi Vol 7, No 1 (2018): Sistemasi: Jurnal Sistem Informasi Vol 6, No 3 (2017): Sistemasi: Jurnal Sistem Informasi Vol 6, No 2 (2017): Sistemasi: Jurnal Sistem Informasi Vol 6, No 1 (2017): Sistemasi: Jurnal Sistem Informasi Vol 5, No 3 (2016): Sistemasi: Jurnal Sistem Informasi Vol 5, No 2 (2016): Sistemasi: Jurnal Sistem Informasi Vol 5, No 2 (2016): sistemasi Vol 5, No 1 (2016): Sistemasi: Jurnal Sistem Informasi Vol 4, No 3 (2015): Sistemasi: Jurnal Sistem Informasi Vol 4, No 2 (2015): Sistemasi: Jurnal Sistem Informasi Vol 4, No 1 (2015): Sistemasi: Jurnal Sistem Informasi Vol 3, No 4 (2014): SISTEMASI: Jurnal Sistem Informasi Vol 3, No 3 (2014): Sistemasi: Jurnal Sistem Informasi Vol 3, No 2 (2014): Sistemasi: Jurnal Sistem Informasi Vol 3, No 1 (2014): Sistemasi: Jurnal Sistem Informasi Vol 2, No 4 (2013): Sistemasi: Jurnal Sistem Informasi Vol 2, No 3 (2013): Sistemasi: Jurnal Sistem Informasi Vol 2, No 2 (2013): Sistemasi:Jurnal Sistem Informasi Vol 2, No 1 (2013): Sistemasi: Jurnal Sistem Informasi More Issue