cover
Contact Name
Irpan Adiputra pardosi
Contact Email
irpan@mikroskil.ac.id
Phone
+6282251583783
Journal Mail Official
sinkron@polgan.ac.id
Editorial Address
Jl. Veteran No. 194 Pasar VI Manunggal,
Location
Kota medan,
Sumatera utara
INDONESIA
Sinkron : Jurnal dan Penelitian Teknik Informatika
ISSN : 2541044X     EISSN : 25412019     DOI : 10.33395/sinkron.v8i3.12656
Core Subject : Science,
Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial Neural Network 14. Fuzzy Logic 15. Robotic
Articles 1,196 Documents
Safe Security System Using Face Recognition Based on IoT Putra, Ondra Eka; Devita, Retno; Wahyudi, Niko
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12231

Abstract

Face recognition is widely used in various applications, especially in the field of surveillance and security systems. This study aims to design and build a safe security system using face recognition via camera based on internet of things. This system uses the Raspberry Pi 3B and the OpenCV library as face recognition data processing which produces output on the Selenoid to open and close the safe, LCD 16x2 to display system status, IoT-based email delivery when smugglers occur. This study performs face recognition through the face detection stage using the Viola Jones method, feature extraction using the PCA (Principal Component Analysis) method and face recognition, then matched with the existing profile data in the directory. The results of this study indicate that the safe is open when a face is detected and will send a face capture to the e-mail address of the owner’s safe if the detected face is not recognized. Tests carried out on the safe security system using face recognition based on IoT build reach validity 90,25%.
Application Of The A-Star Algorithm On The Mapping Of Sports Team In The City Of Pematang Siantar Based On Android Gunawan, Gunawan; Suendri, Suendri
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12255

Abstract

Geographic information system is a system that has the function to build, store, manage, and display information related to geography. This geographic information system is very helpful for human work in any case. This Android-based GIS application design produces complete information and can be accessed online or can download the application on our cellphones. Currently the city of Pematang Siantar is developing, especially in the field of technology. This research designs a technology that can help people to find a shortest route solution in searching for information on sports teams and their training locations in the city of Pematang Siantar using the A-Star algorithm. The A-Star algorithm is very helpful because the time to find the nearest route is faster and the routes found can be different but at the same cost, making it easier for designers to code in worksheets. The results of this study are in the form of an android application that is connected to the internet network so that it makes it easier for people to find information about sports teams and the closest location to where the user is using only a mobile phone and anywhere that is reachable by the internet network. This android application displays detailed information about sports teams, training locations, and training schedules controlled by the admin who is responsible for adding and changing sports team data so that the application runs properly.
Android-Based RCSM Application for Implementation of Preventive Maintenance on CNC Production Machine Fauzi, Mohammad; Erdani, Yuliadi; Sambas, Achmad
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12290

Abstract

Preventive maintenance (PM) implementation at POLMAN Bandung is scheduled to follow the lecture schedule so that the implementation of activities does not interfere with the lecture process. Even though the scheduling of preventive maintenance activities at POLMAN Bandung has been made quite well, there are problems in its implementation, including some activities that were not detected in the previous PM implementation, both in the form of activity reports and machine history updates. This can confuse subsequent pm implementers, as it can result in mishandling. As for the cause of the problem, there are two possibilities, namely the implementation of preventive maintenance is not carried out or the implementation of preventive maintenance has been carried out, but reports on the implementation of activities are not prepared and stored by procedures (human error). To overcome this, the researchers developed an Android-based application that functions as a reminder, recorder, and controller, for the pm process, named Reminder & Control System Management (RCSM). RCSM will remind, the implementers, to be on schedule, carry out a remind mechanisms, and information broadcast and validation until the completion of preventive maintenance activities is acceptable to the relevant authorities. Likewise, for reporting and recording engine history a system will be created with a similar mechanism. The results that have been achieved are the application software prototype reaching 100% and several field trials have been carried out. This application can direct pm implementers to avoid misuse of pm implementation procedures so that preventive maintenance implementation data can be recapitulated.
Analysis of the Neural Network Method to Determine Interest in Buying Pertamax Fuel Sari, Mayang; Yanris, Gomal Juni; Hasibuan, Mila Nirmala Sari
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12292

Abstract

Fuel is one of the needs that is used by the community as a material to be used on motorcycles or cars. Fuel has become an important need for society, because when there is no fuel, a motorbike or car that is owned by someone cannot be used. Each vehicle has its own fuel, for motorbikes the fuel is pertalite, Pertamax, Pertamax Turbo and for cars the fuel is diesel and dexlite. For the fuel used in motorbikes, there are some people who are interested in Pertalite fuel and there are not many people who are interested in Pertamax fuel. So researchers will make a study of public interest in Pertamax fuel. This research will be made using the neural network method by classifying community data in data mining. This study aims to see the public's interest in purchasing Pertamax fuel. The research process was carried out with the initial stages of collecting and selecting data to be used, then preprocessing, then designing the neural network method and finally the testing process to obtain classification results using the neural network method. The results obtained from data classification using the neural network method state that there are 23 people who are interested in Pertamax fuel and 18 people who are not interested in Pertamax fuel. It turns out that many people are interested in Pertamax fuel.
DSS Using MABAC,MOORA For Selection of Majors According to Students' Interests Sari, Ayulita Purnama; Oktavia, Tanty
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12335

Abstract

In the current digital era, individual abilities are needed to be more creative and innovative in various fields, so that vocational students must better prepare their competencies. In this case the competence is related to the major they choose. On average, students take the wrong major about 35%, follow friends around 50%, for students who really choose the right major 15%. For this, the MABAC and MOORA decision support system methods are needed in terms of determining majors according to student interests and talents. System development uses the Waterfall method. The purpose of this study is to design a decision support system that can be used for selecting majors according to student interests by utilizing the results of a comparison of the MABAC and MOORA methods. The results of this study illustrate the MOORA calculation for major selection, so prospective students get the decision to choose the Multimedia major because it has the highest score. From the MABAC calculations for the selection of majors, prospective students get the decision to choose the Accounting major because it has the highest score. The comparison of the mabac and moora methods is where mabac has the highest decision outcome value compared to the decision outcome value of the moora method so that the mabac method is used to assist decision making in selecting majors according to interests.
Implementation of IPv6 using 6RD Method on Power Line Communication Network Siregar, Yasir Al-Farizi; Suhatman, Rahmat
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12341

Abstract

The development of computer network technology is rapidly advancing in response to society's increasing demand for network services. Currently, the most widely used network protocol is IPv4, but it has some limitations. To address these limitations, a new network protocol, IPv6, has been developed. More and more new network devices are using IPv6 as their IP address, while many existing technologies and internet devices still use IPv4. Therefore, a mechanism is required to transition from IPv4 to IPv6. The 6RD tunneling method is used in Power Line Communication networks to connect two or more network devices using electrical wiring as a data transmission medium. The Power Line is equipped with a charger for a laptop and a drill, creating a load to test the performance of the Quality of Service(QoS) with the throughput parameter. The measured Rerate throughput upload was 11800 Kbit/s without any additional electrical load, 9377.8 Kbit/s with a laptop charger as an additional load, and 6082.2 Kbit/s with a drill as an additional load. The Rerate throughput download was 8098.8 Kbit/s without any additional electrical load, 7782.8 Kbit/s with a laptop charger as an additional load, and 5996 Kbit/s with a laptop charger and a drill as additional loads. With this transition mechanism, IPv4 can communicate with IPv6, allowing for more efficient network communication.
Implementation of the Naïve Bayes Method to determine the Level of Consumer Satisfaction Hasibuan, Fitri Febriyani; Dar, Muhammad Halmi; Yanris, Gomal Juni
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12349

Abstract

Satisfaction is a feeling of pleasure at something you like, you get it from goods and services. Satisfaction becomes an important assessment when someone sells goods or services. This is because satisfaction will be an assessment of the goods purchased by consumers or services that will be received by consumers. Therefore the authors make research about the level of consumer satisfaction in shopping. This research was made using the Naïve Bayes method and used consumer data as sample data which used 49 consumer data. By using the Naïve Bayes method, this study aims to see the level of consumer shopping satisfaction, it is made to see the results of a consumer's satisfaction, sometimes there are some consumers who are dissatisfied with the reason the product is not good and some are satisfied with the reason the product is still new and good. Therefore this research was made. This research was conducted using the naïve Bayes method with the first stage being data analysis, then data preprocessing, then naïve Bayes algorithm and finally system testing. After system testing is carried out, classification results will be obtained using the naïve Bayes method. Classification results stated that as many as 47 consumers were satisfied shopping and as many as 2 consumers were not satisfied shopping. The conclusion is that a lot of consumers are satisfied with shopping, meaning that the place is very good and liked by many consumers.
Implementation of Cyber-Security Enterprise Architecture Food Industry in Society 5.0 Era Sari, Ratih Titi Komala; Hindarto, Djarot
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12377

Abstract

The application of Enterprise Architecture is an important topic in the development of the food industry in the Society 5.0 Era. Enterprise Architecture is used to integrate and optimize corporate information systems so as to generate higher business value. This study aims to evaluate the effectiveness of Enterprise Architecture implementation in improving the performance of the food industry in Era Society 5.0 and implementing Cyber-Security as a defense against the system to be implemented. This study uses a case study method by collecting data from several companies in the food industry. The data collected includes information about the implementation of Enterprise Architecture, business performance, and factors that influence the successful implementation of Enterprise Architecture. The results of the study show that the implementation of Enterprise Architecture has helped companies improve their business performance, especially in terms of operational efficiency, better decision making, and the ability to adapt to changes in the business environment. Factors that influence the successful implementation of Enterprise Architecture include management support, involvement of business users, and availability of resources. In conclusion, the application of Enterprise Architecture can help the food industry in Era Society 5.0 improve its business performance. However, the implementation of Enterprise Architecture must be accompanied by strong management support, greater involvement of business users, availability of adequate resources and adequate Cyber-Security. The novelty of this research is implementing Cyber-Security as protection in implementing Enterprise Architecture.
Implementation of ResNet-50 on End-to-End Object Detection (DETR) on Objects Suherman, Endang; Rahman, Ben; Hindarto, Djarot; Santoso, Handri
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12378

Abstract

Object recognition in images is one of the problems that continues to be faced in the world of computer vision. Various approaches have been developed to address this problem, and end-to-end object detection is one relatively new approach. End-to-end object detection involves using the CNN and Transformer architectures to learn object information directly from the image and can produce very good results in object detection. In this research, we implemented ResNet-50 in an End-to-End Object Detection system to improve object detection performance in images. ResNet-50 is a CNN architecture that is well-known for its effectiveness in image recognition tasks, while DETR utilizes Transformers to study object representations directly from images. We tested our system performance on the COCO dataset and demonstrated that ResNet-50 + DETR achieves a better level of accuracy than DETR models that do not use ResNet-50. In addition, we also show that ResNet-50 + DETR can detect objects more quickly than similar traditional CNN models. The results of our research show that the use of ResNet-50 in the DETR system can improve object detection performance in images by about 90%. We also show that using ResNet-50 in DETR systems can improve object detection speed, which is a huge advantage in real-time applications. We hope that the results of this research can contribute to the development of object detection technology in images in the world of computer vision.
Drowsy Detection in the Eye Area using the Convolutional Neural Network Wedha, Alessandro Benito Putra Bayu; Rahman, Ben; Hindarto, Djarot; Wedha, Bayu Yasa
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i2.12386

Abstract

Detection of a drowsy driver is an important aspect of driving safety. For this reason, it is necessary to have technology to carry out early detection before fatigue occurs. Mainly focused on driver fatigue that occurs at night. Analysis can be done quickly and accurately. These conditions can be sent via data so that they can be monitored and analyzed in real time. The results of the analysis can be sent by communication via the internet network. In addition, it functions as an early warning and can be used as logging or records that can be stored. This research does not discuss data communication but makes a prototype for detecting sleepy drivers. Prototype created using the Convolutional Neural Network Algorithm. The detection area is in the eye and testing is carried out with the brightness level of the light. In this study, building a prototype to detect signs of driver fatigue using the Convolutional Neural Network algorithm. The detection area used is in the eye, by testing at different light brightness levels. The dataset used in this study consists of a series of eye images, which are divided into two classes, namely open eyes, and closed eyes. After conducting the training process on Convolutional Neural Network, we get results of detection accuracy reaching 90%.

Page 60 of 120 | Total Record : 1196


Filter by Year

2016 2025


Filter By Issues
All Issue Vol. 9 No. 4 (2025): Articles Research October 2025 Vol. 9 No. 3 (2025): Article Research July 2025 Vol. 9 No. 2 (2025): Research Articles April 2025 Vol. 9 No. 1 (2025): Research Article, January 2025 Vol. 8 No. 4 (2024): Article Research Volume 8 Issue 4, October 2024 Vol. 8 No. 3 (2024): Research Artikel Volume 8 Issue 3, July 2024 Vol. 8 No. 2 (2024): Article Research Volume 8 Issue 2, April 2024 Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024 Vol. 7 No. 4 (2023): Article Research Volume 7 Issue 4, October 2023 Vol. 7 No. 3 (2023): Article Research Volume 7 Issue 3, July 2023 Vol. 7 No. 2 (2023): Research Article, Volume 7 Issue 2 April, 2023 Vol. 7 No. 1 (2023): Articles Research Volume 7 Issue 1, 2023 Vol. 6 No. 4 (2022): Article Research: Volume 6 Number 4, October 2022 Vol. 6 No. 3 (2022): Article Research Volume 6 Number 3, July 2022 Vol. 6 No. 2 (2022): Articles Research Volume 6 Issue 2, April 2022 Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021 Vol. 5 No. 2 (2021): Article Research Volume 5 Number 2, April 2021 Vol. 5 No. 2B (2021): Article Research October 2021 Vol 4 No 2 (2020): SinkrOn Volume 4 Number 2, April 2020 Vol. 5 No. 1 (2020): Article Research, October 2020 Vol. 4 No. 1 (2019): SinkrOn Volume 4 Number 1, October 2019 Vol. 3 No. 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol 3 No 2 (2019): SinkrOn Volume 3 Number 2, April 2019 Vol. 3 No. 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol 3 No 1 (2018): SinkrOn Volume 3 Nomor 1, Periode Oktober 2018 Vol. 2 No. 2 (2018): SinkrOn Volume 2 Nomor 2 April 2018 Vol. 2 No. 1 (2017): SinkrOn Volume 2 Nomor 1 Oktober 2017 Vol. 1 No. 2 (2017): SinkrOn Volume 1 Nomor 2 April 2017 Vol. 1 No. 1 (2016): SinkrOn Oktober Volume 1 Edisi 1 Tahun 2016 More Issue