cover
Contact Name
Irpan Adiputra pardosi
Contact Email
irpan@mikroskil.ac.id
Phone
+6282251583783
Journal Mail Official
sinkron@polgan.ac.id
Editorial Address
Jl. Veteran No. 194 Pasar VI Manunggal,
Location
Kota medan,
Sumatera utara
INDONESIA
Sinkron : Jurnal dan Penelitian Teknik Informatika
ISSN : 2541044X     EISSN : 25412019     DOI : 10.33395/sinkron.v8i3.12656
Core Subject : Science,
Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial Neural Network 14. Fuzzy Logic 15. Robotic
Articles 1,196 Documents
Comparison Decision Tree and Logistic Regression Machine Learning Classification Algorithms to determine Covid-19 Arista, Artika
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11243

Abstract

Many people today are unsure whether they have COVID-19. The frequent fever, dry cough, and sore throat are all signs and symptoms of COVID-19. If a person has signs or symptoms of coronavirus disease 2019 (COVID-19), he/she should see the doctor or go to a clinic as soon as possible. As a result, it's vital to learn and comprehend the fundamental differences. COVID-19 can cause a wide range of symptoms. The experiments were carried out using two Machine Learning Classification Algorithms, namely Decision Tree (DT) and Logistic Regression (LR). Both algorithms were written and analyzed using the Python program in Jupyter Notebook 6.4.5. From the results obtained in the experiments of covid symptoms dataset, on average, the DT model has obtained the best cross-validation average and the testing performance average compared to the LR machine learning models. For cross-validation results, the DT model has achieved an accuracy of 98.0%. For performance testing, the DT model has achieved an accuracy of 98.0%. The LR has obtained the second-best result on the average of cross-validation performance and the testing results. For cross-validation results, the LR model has achieved an accuracy of 96.0%. For performance testing, the LR model has achieved an accuracy of 97.0%. Consequently, the DT for the COVID-19 symptoms dataset is outperforming the LR for cross-validation and testing results.
Web-Based Online Queue Design at Puskesmas Siak Hulu I Kabupaten Kampar-Riau Devega, Mariza; Zamzami, Zamzami; Darmayunata, Yuvi
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11247

Abstract

Increasing patient satisfaction in this case, especially Puskesmas as the government agency that provides health services for the community, will certainly have an impact on the quality of service from the Puskesmas Itself. One of them with an efficient queuing system. A good queue will support regularity in an agency. Previously, analysis and calculation of queuing time had been carried out using the Kolgomorov-Smirnov compatibility test at the Puskesmas Siak Hulu I Kabupaten Kampar- Riau, and the results obtained an average of six working hours of patient care. This research is a pilot project that was carried out as a form of increasing effectiveness and efficiency in Puskesmas. The research has been completed and the results are the basis for this research and further research. The purpose of the current research is to make an online queuing system design, where later the results of this design are used to create a web-based online queuing system. The design is adapted to the existing queuing model at the Puskesmas, namely the Sigle Channel-Multi Steps queuing model. System development using System Development Life Cycle (SDLC) consisting of, analysis, design, implementation, and maintenance. The design phase is carried out in three stages, namely conceptual modeling, database design, and interface design. The design starts from making the proposed Rich-Picture, then carries out the predetermined design stages. With this design, it is hoped that in the future it will facilitate the process of developing a web-based online queuing system.
Analisis dan Evaluasi Keamanan Jaringan Wireless dengan Metode Penetration Testing Execution Standard (PTES) Astrida, Deuis Nur; Saputra, Agung Restu; Assaufi, Akhmad Ikhza
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11249

Abstract

The use of computer networks in an agency aims to facilitate communication and data transfer between devices. The network that can be applied can be using wireless media or LAN cable. At SMP XYZ, most of the computers still use wireless networks. Based on the findings in the field, it was found that there was no user management problem. Therefore, an analysis and audit of the network security system is needed to ensure that the network security system at SMP XYZ is safe and running well. In conducting this analysis, a tool is needed which will be used as a benchmark to determine the security of the wireless network. The tools used are Penetration Testing Execution Standard (PTES) which is one of the tools to become a standard in analyzing or auditing network security systems in a company in this case, namely analyzing and auditing wireless network security systems. After conducting an analysis based on these tools, there are still many security holes in the XYZ wireless SMP that allow outsiders to illegally access and obtain vulnerabilities in terms of WPA2 cracking, DoS, wireless router password cracking, and access point isolation so that it can be said that network security at SMP XYZ is still not safe
Implementation of Neural Network Algorithms in Predicting Student Graduation Rates Iin Fiqha; Gomal Juni Yandris; Fitri Aini Nasution
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11254

Abstract

Higher education institutions are required to be providers of quality education. One of the instruments used by the government to measure the quality of education providers is the number of graduates. The higher the graduation rate, the better the quality of education and this good quality will positively affect the accreditation value given by BAN-PT. Therefore, in this study, researchers provide input for research conducted at Bhayangkara University, Greater Jakarta to predict student graduation rates using the Neural Network algorithm. Neural Network is a method in machine learning developed from Multi Layer Perceptron (MLP) which is designed to process two-dimensional data. Neural Network is included in the type of Deep Neural Network because of the depth of the network level and is widely implemented in image data. Neural Network has two methods; namely classification using feedforward and learning stages using backpropagation. The way Neural Network works is similar to MLP but in Neural Network each neuron is represented in two dimensions, unlike MLP where each neuron is only one dimension. The prediction accuracy obtained is 98.27%. unlike MLP where each neuron is only one-dimensional. The prediction accuracy obtained is 98.27%. unlike MLP where each neuron is only one-dimensional. The prediction accuracy obtained is 98.27%.
Implementation and Use of Base64 Algorithm in Video File Security Efendi, Muhammad; Volvo Sihombing; Parulian, Sahat
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11256

Abstract

Personal data is often the target of irresponsible people to misuse. The theft is carried out to profit from the person who has the data. In addition to the theft of work files, theft is also carried out on video files. The theft of this file aims to find out what the contents of the video are. Someone has a private video recording that should not be known by others. Misuse of video files will be fatal for the owner of the video. Cryptographic techniques are needed in video security. Caesar Cipher algorithm can help users in securing the video file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store in a storage media. This algorithm will make the file structure simpler so that it can be displayed and saved. By applying the Base64 algorithm and Caesar Cipher on video files, the security and confidentiality of the files will be guaranteed
Implementation of a priori algorithm for book lending at state high school library I Silima Pungaga-Punga Parongil Ningsih, Andini Yulistia; Volvo Sihombing; Sitorus, Sahat Parulian
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11257

Abstract

The library plays a role in helping students to enjoy reading books. The availability of books in various fields motivates students to come to visit the library, students / i can read or borrow library books. For this reason, the purpose of this research was carried out including helping library officials apply the rules of how to visit the libraries. In carrying out research methods, including conducting direct observations, conducting interviews to collect the necessary data. The pattern that will be analyzed is the pattern of borrowing what books are often borrowed so that library officials know the information of books that are often borrowed. The result obtained is with the application of a priori algorithms, book data is processed to produce a pattern of borrowing books. After all high frequency patterns are found, then the association rules are sought that meet the minimum requirement for associative confidence A→B minimum confidence = 25%. The final association rules are ordered based on minimum support and minimum confidence, if borrowing IPA, then borrowing MTK Support = 15%, Confidence = 42.8%.
Implementation of C5.0 Algorithm for Prediction of Student Learning Graduation in Computer System Architecture Subjects Tanjung, Nurfadillah; Deci Irmayani; Volvo Sihombing
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11259

Abstract

Computer system architecture is one of the subjects that must be taken in the informatics engineering study program. In the study program the graduation of each student in the course is one of the important aspects that must be evaluated every semester. Graduation for each student / I in the course is an illustration that the learning process delivered is going well and also the material presented by the lecturer in charge of the course can be digested by students. Graduation of each student in the course can be predicted based on the habit pattern of the students. Data mining is an alternative process that can be done to find out habit patterns based on the data that has been collected. Data mining itself is an extraction process on a collection of data that produces valuable information for companies, agencies or organizations that can be used in the decision-making process. Prediction of graduation with data mining can be solved by classifying the data set. The C5.0 algorithm is an improvement algorithm from the C4.5 algorithm where the process is almost the same, only the C5.0 algorithm has advantages over the previous algorithm. The results of the C5.0 algorithm are in the form of a decision tree or a rule that is formed based on the entropy or gain value. The prediction process is carried out based on the C5.0 algorithm classification using the attributes of Attendance Value, Assignment Value, UTS Value and UAS Value. The final result of the C5.0 algorithm classification process is a decision tree with rules in it.
Application of Analytical Hierarchy Process Method in Asset Management System as Asset Tracing Optimization Sinulingga, Yuda Agatha; Sihombing, Volvo; Irmayani, Deci
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11260

Abstract

Assets are one of the supporting equipment for business processes in a higher education organization. Asset management requires a system that is organized systematically so that the tracing process becomes more effective and efficient. In this case, asset management can be implemented in a web-based information system. The development of a web-based asset management information system is carried out using the waterfall method, and for decision making in asset procurement priorities using the Analytical Hierarchy Process (AHP) method. The system development process uses the Codeigniter framework based on PHP and MySQL. The result of this development is a web-based asset management information system that is used to optimize asset tracking which is implemented at ITS NU Pekalongan
Student Graduation Predictions Using Comparison of C5.0 Algorithm With Linear Regression Ariska, Fevi; Sihombing, Volvo; Irmayani, Irmayani
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11261

Abstract

Technological advances supported by human knowledge have a very good influence on data and information storage technology, including in predicting student graduation (Graduation Prediction) on time, by applying several existing algorithms. In this study, researchers used the C5.0 Algorithm and Linear Regression. The concept of the research is to compare two algorithms, namely C5.0 and Linear Regression to the case of graduating students on time. Based on the length of study, students who graduated correctly amounted to 651 (91%) with a male gender of 427 students and a female gender of 224 students while those who did not pass (late) correctly amounted to 64 (9%) with a male gender totaling 53 students and female gender totaling 11 students from 2017-2020. Comparison results The R2 score from the C5.0 algorithm reached 96.85% (training) and 93.
Development of E-Commerce for Selling Honey Bees in the COVID-19 Era Indriani; Dar, Muhammad Halmi; Irmayanti, Irmayanti
Sinkron : jurnal dan penelitian teknik informatika Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v7i1.11263

Abstract

During the Covid-19 pandemic, which has not yet ended, the business of selling honey is a type of business that is able to survive and even increase its market. The trend of selling honey in the era of the Covid-19 pandemic is quite stable and has the potential to be a good source of income because honey can be used as medicine and can increase the body's immunity. Fitorajo Bee Farm is a UMKM engaged in bee cultivation which is located in Pinang City, South Labuhanbatu Regency, North Sumatra Province with original honey bee products packaged in plastic bottle containers. The marketing system carried out by Fitorajo Bee Farm is carried out through word of mouth, Facebook social media, or through the WhatsApp application. Seeing the promising potential of the honey business in the Covid-19 pandemic era, and in order to reach a wider market, Fitorajo Bee Farm should improve and innovate by adopting e-commerce technology. Conventional marketing, which so far only reaches consumers on a limited scale, must be changed with a marketing system that can reach consumers from any corner. The purpose of this research is to build a marketing media for Fitorajo Bee Farm honey bees by implementing web-based e-commerce. The system development method used is the waterfall model, while the programming language used is PHP framework codeigniter with MySQL DBMS. The results showed that the codeigniter framework and MySQL DBMS can be applied to build e-commerce web-based honey bee marketing media.

Page 31 of 120 | Total Record : 1196


Filter by Year

2016 2025


Filter By Issues
All Issue Vol. 9 No. 4 (2025): Articles Research October 2025 Vol. 9 No. 3 (2025): Article Research July 2025 Vol. 9 No. 2 (2025): Research Articles April 2025 Vol. 9 No. 1 (2025): Research Article, January 2025 Vol. 8 No. 4 (2024): Article Research Volume 8 Issue 4, October 2024 Vol. 8 No. 3 (2024): Research Artikel Volume 8 Issue 3, July 2024 Vol. 8 No. 2 (2024): Article Research Volume 8 Issue 2, April 2024 Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024 Vol. 7 No. 4 (2023): Article Research Volume 7 Issue 4, October 2023 Vol. 7 No. 3 (2023): Article Research Volume 7 Issue 3, July 2023 Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023 Vol. 7 No. 1 (2023): Articles Research Volume 7 Issue 1, 2023 Vol. 6 No. 4 (2022): Article Research: Volume 6 Number 4, October 2022 Vol. 6 No. 3 (2022): Article Research Volume 6 Number 3, July 2022 Vol. 6 No. 2 (2022): Articles Research Volume 6 Issue 2, April 2022 Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021 Vol. 5 No. 2 (2021): Article Research Volume 5 Number 2, April 2021 Vol. 5 No. 2B (2021): Article Research October 2021 Vol 4 No 2 (2020): SinkrOn Volume 4 Number 2, April 2020 Vol. 5 No. 1 (2020): Article Research, October 2020 Vol. 4 No. 1 (2019): SinkrOn Volume 4 Number 1, October 2019 Vol 3 No 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol. 3 No. 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol. 3 No. 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol 3 No 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol. 2 No. 2 (2018): SinkrOn Volume 2 Nomor 2 April 2018 Vol. 2 No. 1 (2017): SinkrOn Volume 2 Nomor 1 Oktober 2017 Vol. 1 No. 2 (2017): SinkrOn Volume 1 Nomor 2 April 2017 Vol. 1 No. 1 (2016): SinkrOn Oktober Volume 1 Edisi 1 Tahun 2016 More Issue