cover
Contact Name
Irpan Adiputra pardosi
Contact Email
irpan@mikroskil.ac.id
Phone
+6282251583783
Journal Mail Official
sinkron@polgan.ac.id
Editorial Address
Jl. Veteran No. 194 Pasar VI Manunggal,
Location
Kota medan,
Sumatera utara
INDONESIA
Sinkron : Jurnal dan Penelitian Teknik Informatika
ISSN : 2541044X     EISSN : 25412019     DOI : 10.33395/sinkron.v8i3.12656
Core Subject : Science,
Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial Neural Network 14. Fuzzy Logic 15. Robotic
Articles 1,196 Documents
Application of the K-Means Clustering Agorithm to Group Train Passengers in Labuhanbatu Indah, Indri Cahaya; Sari, Mila Nirmala; Dar, Muhammad Halmi
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12260

Abstract

Transportation is an activity of moving things such as humans, animals, plants and goods from one place to another. To be able to implement transportation, we need a means of transportation that suits our needs. For in Indonesia, people are more inclined to land transportation. That's because land transportation already has a lot of vehicles. Land transportation already has many vehicles that can be used, both for private and for the public. Each vehicle has its uses and risks as well. Therefore we will do a data cluster from the trains. We chose the train, because the risk from using the train is very small, meaning that there is a lot of public interest in trains. So we want to do a cluster on rail passengers. The cluster that we do is to group passenger data based on the similarity of passenger data. We will do the cluster using the K-Means method. The K-Means method is very suitable when used to perform a cluster. K-Means will process widgets that are made according to the needs of the research. So after we enter the method in the widget pattern, the widget will process it to output the results from the cluster that we created. The cluster process using the K-Means method will be applied using the orange application. After we apply it, the data will later be clustered, we will cluster data as many as 3 clusters. Then the incoming data will appear in clusters 1, 2 and 3, both from business and executive classes
Analysis of the SVM Method to Determine the Level of Online Shopping Satisfaction in the Community Mawaddah, Arini; Dar, Muhammad Halmi; Yanris, Gomal Juni
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12261

Abstract

Online shopping is an activity of buying goods done online (virtual). This online shopping process is done because it doesn't waste a lot of time. With online shopping, it is very easy for people. Just need open mobile phone view and select the desired item and then order goods and goods will be delivered to the house. But online shopping sometimes also has drawbacks which are one of the reasons people don't want to shop online, such as long shipping times, expensive shipping costs. Therefore a study was made about the level of public satisfaction in online shopping. Researchers will make a data classification about the level of public satisfaction in online shopping using the SVM method. This study aims to see the level of public satisfaction with online shopping, many or nope satisfied people when shopping online. The first step is to collect data that will be used in the data mining process. After that, data preprocessing will be carried out planning the design of the SVM method and finally the prediction process to get Classification results. Then the classification results obtained using the SVM method in data mining show that 34 people are satisfied with online shopping (for a representation result of 59.65%), 23 people are dissatisfied with online shopping (for a representation result of 40.35%). These results state that there are still many people who are satisfied with shopping online and there are some people who are dissatisfied with online shopping
Modeling Digital Image Segmentation with Canny Method Ptr, Agus Fahmi Limas; Rosnelly, Rika; Junaidi, Junaidi; Amrullah, Amrullah
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12263

Abstract

In general, the segmentation process is divided into three parts. classification, by edge, and by area. The digital image segmentation process divides an object whose surface or background maintains the RGB value of all pixels of a digital image so that the object can be processed for other purposes. This system aims to execute drawing objects using intelligent methods. In the Canny method, the process begins with taking digital images and continues with the grayscale process. In addition, technique selection starts with performing a complex operator or Laplacian edge detection and finally unlocks it. Successful segmentation results using edge detection with intelligent operators to separate objects. This system uses the Matlab 2017 application.
Analyzing Image Malware with OSINTs after Steganography using Symmetric Key Algorithm Fauziyyah, Anni Karimatul; Adrian, Ronald; Alam, Sahirul
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12266

Abstract

Steganography is the practice of hiding a message or information within another file, such as an image (Singh & Singla, 2022). OSINT (Open Source Intelligence) involves using publicly available information for intelligence gathering purposes. In this research, the asymmetric key algorithm will be applied to the steganography method, using 10 images with different sizes and dimensions. Images tested for steganography are in tiff, gif, png, jpg, and bmp format. A combination of steganography and OSINT could involve analyzing and decoding images found on publicly available platforms, such as social media, to uncover hidden messages. On the other hand, steganography within OSINT can also be used to protect sensitive information from prying eyes. Overall, the combination of Symmetric Key Algorithm steganography and OSINT can be a powerful tool for both intelligence gathering and secure communication. Here in this work, malware is developed, and using that malware the victim’s machine is exploited. Later, an analysis is done via freely available OSINTs to find out which is the best OSINT that gives the best results. OSINTs have been very helpful in identifying whether the URLs and files are malicious or not. But how binding an image with the malware makes it difficult for OSINTs to identify they are malicious or not is being analyzed in this work. The analysis shows that the best OSINT is VirusTotal which has a greater number of engines that could detect the malware whereas others don’t have a variety of engines to detect the malware. Also, when it comes to malware afore binding it with an image is easier to detect whereas for an OSINT it was difficult to identify and detect the malware after binding with an image
Users Experience Analysis of the Zoom Meeting Application Wijaya Laksana, Gusti Bagus; Candiasa, I Made; Dantes, Gede Rasben
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12273

Abstract

This research aimed to analyze the User Experience analysis of the Zoom Meeting application according to the perspectives of lecturers and students during online learning in the new normal era because the Zoom application is considered to have numerous outstanding features. The population in this research were 2 lecturers and 123 students of the Bachelor of Elementary School Teacher Education Study Program in the 2021/2022 academic year in Bali. The purposive sampling technique was used along with the questionnaire and in-depth interview. As a result, the attractiveness, clarity, efficiency, and stimulation aspects scale got the average positive result from the questionnaire because the value obtained was more than 0.8. Furthermore, the average questionnaire scale was neutral for the accuracy and novelty aspects because the values obtained were from -0.8 to 0.8. Therefore, the accuracy aspect has the lowest value compared to other aspects. It was also verified from the data obtained from the in-depth interview results, which showed various problems and obstacles experienced by users in terms of the accuracy of the Zoom Meeting application when used as an online learning medium, i.e., difficulties in conducting disciplinary assessments and conducting lectures that required practical skills. Although Zoom has many benefits for online learning, it still has several limitations that must be addressed by lecturers, students, and Zoom developers.
The Black Box Testing of the "Hybrid Engine" Application Using Boundary Value Analysis Technique: - Megawati, Citra Dewi; Miwa, Nina Deskartika; Palevi, Bima Romadhon Parada Dian
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12278

Abstract

The "Hybrid Engine" application is an introduction to a hybrid engine that is packaged attractively and can be accessed online, this application is very important for conveying information about hybrid engines, if an error occurs in the functional application there can be misunderstandings about the information conveyed. Therefore it is necessary to test to ensure the quality of the application that has been produced. Testing is an evaluation process of assessing the functional quality of software to check whether the software meets the expected process or not. Functional processes that have not been maximized can cause inequalities in the data information to be displayed. Applications that have been designed must go through the testing stages to ensure the level of functional quality. Of the several types of black box testing methods, one of them is Boundary Value Analysis. The method tests the maximum and minimum number of digits to produce a valid value and is easy enough to test "hybrid engine" applications. The first stage carried out in this research is to identify the functionality to be processed and ensure that the maximum and minimum number of digits matches the predetermined system arrangement. The result of applying the method used is that the quality of the application is under its function, and can be utilized properly by the user. The results of the Boundary Value Analysis test show that the application is following the expected system and instructions with a success percentage of  78.245615%.
Application of the Naïve Bayes Algorithm in Determining Sales Of The Month Supendar, Hendra; Rusdiansyah , Rusdiansyah; Suharyanti, Nining; Tuslaela
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12293

Abstract

One important factor for creating a healthy and growing company is the existence of sales rewards for employees to achieve sales targets every month. Assessing employees is not an easy thing when there are so many employees. This will make the assessment team have to look at the criteria carefully and carefully. Data manipulation can occur because it is difficult to make decisions with such large criteria and data without automated data mining. As a result, the company will not get competitive human resources. Sales targets are one of the keys to sales success because with sales targets, the sales prediction value can be used as a guide as a reference in determining product sales. One way to make better sales predictions is by utilizing data mining processing using the Naive Bayes algorithm. The Naive Bayes algorithm calculates the probability value of each of the attributes examined including attendance, sales targets and sales returns. Research with employee absence criteria, monthly sales and monthly sales invoice returns. From the results of the research that has been done, it can be concluded that the application of the Naive Bayes classifier method to the target data set for sales of goods achieves an optimization level of 95.78%, with attendance criteria greatly affecting employee performance so that product sales targets each month can be achieved
Application of Enterprise Architecture in Digital Transformation of Insurance Companies Prawira, Khairul Thamrin; Hindarto, Djarot; Indrajit, Eko
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12302

Abstract

Implementation of enterprise architecture is a major requirement for companies that want to develop business processes according to their needs. Business architecture is the company's initial plan to support the company's operations. An insurance company is a company that provides insurance services. Insurance is a form of contract in which the guaranteed party pays a premium to the insurance company. Insurance companies provide payment guarantees in the event of certain risks that are guaranteed in the insurance contract. Therefore, this company must think about operational forms to provide the best service for its customers. Structuring business processes starting from the sales process, administrative processes, claims processes, to financial processes which are the most vital processes. Insurance companies are different from other financial services companies, such as banking companies, fintech companies and others. The insurance company's unique process is to provide guarantees to its customers in carrying out risk protection. Before starting to implement enterprise architecture, the company already has a business architecture blueprint which is the enterprise architecture of a company. The design begins with running architectural business processes, architectural applications, architectural databases and architectural technology. Enterprise architecture implementation certainly cannot be separated from project management. Because project management is a process that manages the project so that the project becomes more organized in its implementation
Sentiment Analysis of Beauty Product Applications using the Naïve Bayes Method Rambe, Tiara Syavitri; Hasibuan, Mila Nirmala Sari; Dar, Muhammad Halmi
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12303

Abstract

The number of beauty products that appear on the market makes every producer compete in attracting consumers. One of the facilities provided by manufacturers to make it easier for consumers to shop is an online shopping application that can be accessed via gadgets. Where the feature of the application is the availability of user review services User reviews are often used as a recommendation for the product to be purchased. The more positive the reviews that appear, the greater the consumer's confidence to buy the product; conversely, the more negative the reviews that appear, the more reluctant consumers are to buy. This study aims to find out how much accuracy the Naïve Bayes algorithm has in conducting sentiment analysis on user reviews of beauty product applications with different combinations of training and test data. Furthermore, it is also important to know the frequency of words that often appear in the review. The sentiment class used is divided into three, namely, positive, negative, and neutral. This research method includes a number of stages, namely: data collection, data labeling, text pre-processing, data visualization, TF-IDF, sentiment analysis, etc., until the results are obtained. This research has produced the highest accuracy rate of 90.08% in the Naïve Bayes algorithm, with a composition of 90% training data and 10% test data. While the word that often appears in user reviews is "application," with a frequency of 446 occurrences, it is followed by the word "product," 444 times, and the word "price," 312 times. The greater the amount of training data used, the higher the level of accuracy resulting from the Naïve Bayes algorithm. Meanwhile, the greater the amount of test data used, the lower the resulting accuracy value.
Smartphone Application for Support Library Operations in the Internet of Things Era Hadianto, Eko; Hindarto, Djarot; Santoso, Handri
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12306

Abstract

The library can be referred to as a storage place for books and other references. The reference can be in the form of digital storage media. Libraries if not managed properly will cause chaos in the library organization. Many books were lost due to the entry and exit of books that were out of control. Currently, the library is not only a place to store books but can be maximized by managing and adding other digital devices. The use of Radio Frequency Identification (RFID) in libraries adds sophistication to the management of books and library items. In addition, currently many libraries have taken advantage of Internet of Things Technology, by adding various sensors and integrating with cloud-based storage devices. It provides a service that makes it easy for library members to find and track the current whereabouts of books. This research does not only create a library by providing hardware in the form of sensors to be installed in the library. This paper also proposes the use of smartphones as an alternative in replacing sensor hardware. This study uses a QR Code sensor to match the book you are looking for and simulates dancing a book in blocks and bookcases. with augmented reality. The purpose of this research is to make a smart library prototype to make it easier for library members to find books or other references. The results of the experiment to find books and DVDs that have been carried out achieve an accuracy of 83.33%.

Page 59 of 120 | Total Record : 1196


Filter by Year

2016 2025


Filter By Issues
All Issue Vol. 9 No. 4 (2025): Articles Research October 2025 Vol. 9 No. 3 (2025): Article Research July 2025 Vol. 9 No. 2 (2025): Research Articles April 2025 Vol. 9 No. 1 (2025): Research Article, January 2025 Vol. 8 No. 4 (2024): Article Research Volume 8 Issue 4, October 2024 Vol. 8 No. 3 (2024): Research Artikel Volume 8 Issue 3, July 2024 Vol. 8 No. 2 (2024): Article Research Volume 8 Issue 2, April 2024 Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024 Vol. 7 No. 4 (2023): Article Research Volume 7 Issue 4, October 2023 Vol. 7 No. 3 (2023): Article Research Volume 7 Issue 3, July 2023 Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023 Vol. 7 No. 1 (2023): Articles Research Volume 7 Issue 1, 2023 Vol. 6 No. 4 (2022): Article Research: Volume 6 Number 4, October 2022 Vol. 6 No. 3 (2022): Article Research Volume 6 Number 3, July 2022 Vol. 6 No. 2 (2022): Articles Research Volume 6 Issue 2, April 2022 Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021 Vol. 5 No. 2 (2021): Article Research Volume 5 Number 2, April 2021 Vol. 5 No. 2B (2021): Article Research October 2021 Vol 4 No 2 (2020): SinkrOn Volume 4 Number 2, April 2020 Vol. 5 No. 1 (2020): Article Research, October 2020 Vol. 4 No. 1 (2019): SinkrOn Volume 4 Number 1, October 2019 Vol 3 No 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol. 3 No. 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol 3 No 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol. 3 No. 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol. 2 No. 2 (2018): SinkrOn Volume 2 Nomor 2 April 2018 Vol. 2 No. 1 (2017): SinkrOn Volume 2 Nomor 1 Oktober 2017 Vol. 1 No. 2 (2017): SinkrOn Volume 1 Nomor 2 April 2017 Vol. 1 No. 1 (2016): SinkrOn Oktober Volume 1 Edisi 1 Tahun 2016 More Issue