cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
mib.stmikbd@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
JURNAL MEDIA INFORMATIKA BUDIDARMA
ISSN : 26145278     EISSN : 25488368     DOI : http://dx.doi.org/10.30865/mib.v3i1.1060
Decission Support System, Expert System, Informatics tecnique, Information System, Cryptography, Networking, Security, Computer Science, Image Processing, Artificial Inteligence, Steganography etc (related to informatics and computer science)
Articles 52 Documents
Search results for , issue "Vol 5, No 3 (2021): Juli 2021" : 52 Documents clear
Analisa Penentuan Saham Terbaik Menggunakan Metode Analytic Hierarchy Process (AHP) Romindo Romindo
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.2978

Abstract

The number of stock investors has increased from the past to the present. Likewise, the number of companies listed on the Indonesia Stock Exchange (IDX). What makes investors confused about choosing the best stock from the hundreds of stocks that are regulated on the IDX. The method used for the best stock is the Analytic Hierarchy Process (AHP) method. Investors will enter criteria that take into account the specified criteria and criteria. The criteria used to determine stocks are C1 = PER, C2 = PBV, C3 = DER, C4 = ROE and C5 = ROA. The results of research conducted in the second rank show that alternative A1 = CPIN is in the first rank with a Priority Vector of 0.6536, alternative A2 = JFPA is in the second rank with a Priority Vector of 0.2013 and alternative A3 = UTAMA is in the second rank. second rank. second rank. second rank. ranked third with a Priority Vector of 0.1452.
Penerapan Metode Technique for Orders Preference by Similarity to Ideal Solution (TOPSIS) dan Rank Order Centroid (ROC) Dalam Pemberian Beasiswa Kartu Indonesia Pintar (KIP) Ita Arfyanti
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3048

Abstract

The provision of KIP scholarships, which are aid scholarships given when a person is still in high school/vocational school, or assistance for high school/vocational high school graduates to continue their education. This assistance is given to students who have good academic potential and have economic limitations. When searching for and determining recipients of scholarship assistance for KIP scholarship recipients by implementing a decision support system using the Technique for Orders Preference by Similarity to Ideal Solution (TOPSIS) method approach where the selection criteria have been determined previously, the criteria are given or weighted using the ROC method ( Rank Order Centroid), so that the election data process will get more optimal results using the TOPSIS method, the results obtained are 0.66061 which is the highest value of all alternative data and in this study shows the data is more shaped to the selection of potential alternatives. get a KIP scholarship with a more accurate weight and ranking process.
Data Mining Menggunakan Algoritma K-Nearest Neighbor Dalam Menentukan Kredit Macet Barang Elektronik Silvilestari Silvilestari
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3100

Abstract

Business is an activity that is routinely carried out by many people, one of the promising businesses is a business that provides the needs of electronic goods to meet the needs of daily life, high demand causes business people to be more careful and selective in seeing the pattern of customers who want perform transactions in order to avoid business risks appropriately. Business people use a credit system to increase sales for a long time, but the obstacle that often occurs is that many customers who use credit services often delay payments to make the company's finances unstable so someone needs to predict someone who has the potential to do bad credit for electronic goods. using a system that helps business owners to make it easier to process data and predict patterns of bad credit for electronic goods that have been formed from previous data using the KNN algorithm approach, so that the results show the closeness of the value to the data of old customers, both those who pay properly and those who make payments in default and it can be obtained that the processing process accelerates data processing with precise results in the problem solving process
Penerapan Algoritma C5.0 Untuk Prediksi Kelulusan Pembelajaran Mahasiswa Pada Matakuliah Arsitektur Sistem Komputer Muchamad Sobri Sungkar; M Taufik Qurohman
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3116

Abstract

Computer system architecture is one of the subjects that must be taken in the informatics engineering study program. In the study program the graduation of each student in the course is one of the important aspects that must be evaluated every semester. Graduation for each student / I in the course is an illustration that the learning process delivered is going well and also the material presented by the lecturer in charge of the course can be digested by students. Graduation of each student in the course can be predicted based on the habit pattern of the students. Data mining is an alternative process that can be done to find out habit patterns based on the data that has been collected. Data mining itself is an extraction process on a collection of data that produces valuable information for companies, agencies or organizations that can be used in the decision-making process. Prediction of graduation with data mining can be solved by classifying the data set. The C5.0 algorithm is an improvement algorithm from the C4.5 algorithm where the process is almost the same, only the C5.0 algorithm has advantages over the previous algorithm. The results of the C5.0 algorithm are in the form of a decision tree or a rule that is formed based on the entropy or gain value. The prediction process is carried out based on the classification of the C5.0 algorithm by using the attributes of Attendance Value, Assignment Value, UTS Value and UAS Value. The final result of the C5.0 algorithm classification process is a decision tree with rules in it. The performance of the C5.0 algorithm gets a high accuracy rate of 93.33%
Penerapan Algoritma A-star dan Brute Force pada Aplikasi Jakvel (Jakarta Travel) Berbasis Android Septi Andryana; Andrianingsih Andrianingsih; Naif Farhan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3089

Abstract

The city of Jakarta has several main tourist attractions that are interesting to visit. As the Capital of the State of Indonesia, it will certainly be ogled and visited by local and foreign tourists. However, there is limited information, tourists from outside the Jakarta area lack complete information on tourism in the city of Jakarta and the roads that must be taken to tourist sites, due to the number of roads and heavy traffic, this makes it a problem when you want to vacation in the city of Jakarta. Therefore, the author designed an application called Jakvel based on Android, this application provides information and looks for the shortest path to tourist sites for tourists who want to vacation in Jakarta. In this study using the A-star and Brute Force algorithms. The A-star algorithm will be applied to find the shortest path to tourist sites and the brute force algorithm is used to search for words (strings) in selecting tours. With this application, it is hoped that it will make it easier for tourists outside the Jakarta area to find out tourist information and help find the shortest path to locations in the city of Jakarta. After testing of 10 tourist sites to determine the shortest path by comparing the A-star algorithm with Google Maps based on Android, with a 70% success rate in finding the shortest path using the A-star algorithm and the results of string search testing using the Brute Force algorithm have a percentage of 100% accurate
Analisis Sentimen Movie Review menggunakan Word2Vec dan metode LSTM Deep Learning Widi Widayat
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3111

Abstract

The increasing number of internet users is directly in line with the increasing number of data on the internet that is available for analysis, especially data in text form. The availability of this text data encourages a lot of sentiment analysis research. However, it turns out that the availability of abundant text data is also one of the challenges in sentiment analysis research. Datasets that consist of long and complex text documents require a different approach. In this study, LSTM was chosen to be used as a sentiment classification method. This research uses a movie review dataset that consists of 25,000 review documents, with an average length per review is 233 words. The research uses CBOW and Skip-Gram methods on word2vec to form a vector representation of each word (word vector) in the corpus data. Several dimensions of the word vector was used in this research, there are 50, 60, 100, 150, 200, and 500, this tuning parameter is used to determine their effect on the resulting accuracy. The best accuracy around 88.17% is obtained at the word vector 100 dimension and the lowest accuracy is 85.86% at the word vector 500 dimension.
Penerapan RFID Dalam Pendataan Kehadiran Pegawai Negeri Sipil Berbasis Arduino Andreas Aman Tokan; Iskandar Fitri; Rini Nuraini
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3056

Abstract

In today's modern era, the development of technology and informatics is not something foreign to the public. As currently, RFID and Microsoft Excel technology can be used to overcome problems in everyday life such as student attendance or employees in private and government-owned agencies, security systems, parking systems, and can be used to monitor various reports on inventory that can be known in real time. time either by online or by synchronizing data, so the development of RFID technology cannot be doubted. However, the development of technology in Indonesia itself has not been fully evenly distributed where there are some areas that still do not apply this technology as a tool for daily activities, there are still a lot of regions that collect employee attendance still use the para or signature method, this of course can lead to fraud committed by unscrupulous employees for personal gain. The purpose of this study is to optimize and reduce attendance manipulation of sub-district office employees, because there are still a lot of government agencies, especially local government agencies that still perform attendance manually, such as the Witihama sub-district office. Witihama District is one of the sub-districts in eastern Indonesia, precisely in East Flores Regency, East Nusa Tenggara which still uses the employee initials method, so a technology such as RFID is needed to support the work of employees because this technology is very effective. The function of using RFID is to validate attendance and the function of Microsoft Excel itself is a media of information and attendance monitoring system directly and accurately by the disciplinary commission of the sub-district office.
Sistem Informasi Bimbingan Skripsi Menggunakan Metode Rapid Application Development Berbasis User Centered Design Mochammad Alif Kurniawan; Iskandar Fitri; Deny Hidayatullah
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3068

Abstract

Thesis is the result of a scientific research paper written and adapted to the scientific rules that apply in writing and the process of working on a thesis, usually students are guided by two supervisors. Because during the pandemic and the difficulty of consulting with supervisors and the establishment of health protocols to avoid the impact of the spread of the COVID-19 virus, the author intends to build a Thesis Guidance Information System application that can be accessed online and based on a website and facilitates the thesis implementation process. Features contained in the system include students who can submit ideas and thesis titles and can see notifications of ideas and thesis titles being rejected or not. Students who carry out theses can be ensured that they are supervised by their supervisors, therefore supervisors can guide their students using the application and can carry out online sessions and seminars. The thesis guidance information system is designed using the Model View Controller architecture which separates the user interface, data and control. This object-oriented system development model uses the Unified Modeling Language model which aims to analyze and model applications designed using Model View Controller-based architecture. The software development method used in the development of this system is Rapid Application Development because it has relatively simple features. The User Centered Design approach is that users in every stage of system development are also involved, so that the system formed can be used according to system needs.
Sistem Ujian Online Essay Kolektif Berbasis Gambar Studi Kasus Kampus PTKI Medan Abdul Azis Rahmansyah; Poltak Evencus Hutajulu
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.3029

Abstract

The Covid-19 pandemic is a disaster for all of us, Vocational Education is also affected by the Covid-19 pandemic which forces online lectures, one of which is at the Industrial Chemical Technology Polytechnic (PTKI), in the implementation of the exam at PTKI Medan carried out collectively with questions exam in the form of an essay. There have been many studies on online essay exams but the scope of the discussion is for automatic correction or similarity based on text input. In vocational education, especially PTKI Medan, which has a test that is not limited to text input but there are calculations. Another weakness of text input is that the answers can be more easily copied and pasted by students. This research was carried out for 1 year starting from Odd semester 2020 to Even 2020. The method in developing information systems uses the waterfall model with the stages of needs analysis, system design, coding, implementation and the last stage of system maintenance. From the results of the research in the odd semester of 2020, the researchers used a text-based online essay exam model, but many weaknesses were found, one of which was the ease of students in using answers from the internet which were directly entered into the answer column. At the maintenance stage, the researcher updates the system by changing the image-based exam model, so students must write their answers on paper and then upload the answers to the website. The file upload system can overload the server if it is not controlled, one of the techniques used is to compress image files uploaded by students to the system and the maximum size can be compressed up to 78.48% from 1329 Kb to 286 Kb for this type. png data. In addition, to make it easier for lecturers to check answers, use the ezoom.js feature as a means to view answers in the form of images that are useful for zooming in, zooming out, rotating the answer images. Ezoom.js is a javascript that can be installed on php-based websites
Analisa dan Implementasi Sistem Keamanan Router Mikrotik dari Serangan Winbox Exploitation, Brute-Force, DoS Haeruddin Haeruddin
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 5, No 3 (2021): Juli 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v5i3.2979

Abstract

The advancement of technology development makes it easier to find and share any information using computer networks. Computer networks have been widely applied in homes and offices. The ease of exchanging data on the network makes the availability of computer networks and information security are vulnerable to attacks by threats. On a computer network, the device which has the vulnerability is a router. A router is the outermost device that connects the Local Area Network (LAN) to the internet so that it can be easily attacked by irresponsible parties. The Mikrotik router is a product that is widely used as a gateway router that connects LANs and the Internet. There are so many tools that can be used to carry out attacks on Mikrotik routers such as Hping3 (DoS), Hydra (Brute-Force), and Exploitation Script (Winbox Exploitation). To find out the security loop in Mikrotik routers, this study uses penetration testing methods and attack techniques such as Winbox Exploit, Brute-force, and DoS. After knowing the security gap, the next step is to provide and implementation recommendations so that similar attacks do not occur any more in the future.