cover
Contact Name
ibnu surya
Contact Email
ibnu@pcr.ac.id
Phone
+6285272673321
Journal Mail Official
jurnalkomputerterapan@pcr.ac.id
Editorial Address
Jurnal Komputer Terapan (JKT) Badan Penelitian dan Pengabdian kepada Masyarakat (BP2M) Politeknik Caltex Riau Jl. UmbanSari No. 1 Rumbai - Pekanbaru 28265
Location
Kota pekanbaru,
Riau
INDONESIA
Jurnal Komputer Terapan
Published by Politeknik Caltex Riau
ISSN : 24434159     EISSN : 24605255     DOI : https://doi.org/10.35143/jkt
Core Subject : Science,
Applied Computer Journal Articles from various fields in Informatics, Information Systems and Computer science. Topics included, 1. Informatics 1.1 Software Engineering 1.2 Multimedia 2. Information Systems 2.1 Soft Computing 2.2 Business Analyst 2.3 Data Engineering 3. Computer science 3.1 Operating System 3.2 Computer Network
Articles 9 Documents
Search results for , issue "Vol 10 No 1 (2024): Jurnal Komputer Terapan" : 9 Documents clear
Application of Decision Support System for Selection of Residential Criteria using the fuzzy Method in Majene Regency Irianti, Arnita; Quraisy, Muh. Imam; Sulfayanti, Sulfayanti; Nur, Nahya; Ardi, Rahmawati
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.5870

Abstract

In this digital era, information technology is growing rapidly so that it is used to market various things, including homes. There is a lot of information technology about houses being marketed, but it takes a long time to collect information and compare one house to another. However, some of the housing marketed no longer prioritizes comfort, but rather cheap or economical prices. Due to the fact that sometimes unclear data is needed to solve problems, the fuzzy method is a decision-making approach that uses standard relationships but applies fuzzy set theory to the database. Decision making regarding the selection of comfortable housing criteria according to consumers is carried out using the fuzzy Tahani model approach. The fuzzy holdi technique uses house data that has been processed to produce output in the form of house data that is recommended for customers.
Implementation of Scrum Method in the Learning Activity Monitoring Feature Outside the Study Program -, Atik Nurmasani; Ilham, Muhammad Rohmadi; Anggit Dwi Hartanto
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.5972

Abstract

Learning activities outside the study program can be participated by active students in the current semester through the credit recognition mechanism according to the study program policy. These activities are monitored by Field Supervisors (DPL) through certain communication media. The obstacles that arise such as students not contacting DPL or communicating with DPL, not reporting activities regularly, only asking for a signature on the final report, and only asking DPL to fill out an activity assessment. The activity recording information system that available only has features for submitting proposals, recording activities and reporting activities for study program admin users. So that it is necessary to develop a feature for monitoring learning activities outside the study program to make it easier for DPL to monitor student activities in certain semesters. The information system was created using the MySQL database and the Codeigniter 3 framework. Feature development was created using the Scrum method with a focus on determining priority features, working on priority features and reviewing the results of feature work. This can help to get information system output quickly according to development needs
Optimasi Chatbot dengan Pemanfaatan Natural Language Processing Salamun, Salamun; Aldi Aprialdo; Sukri
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6181

Abstract

The use of chatbot applications has grown rapidly in areas ranging from customer service to interactive assistance on multiple platforms. In order to improve the quality and responsiveness of chatbots, this research focuses on utilising natural language processing (NLP) as the main method. NLP is a technology that allows for more natural communication between humans and computers and thus allows chatbots to understand and respond to user requests more accurately. The study includes the development of chatbot applications that incorporate the latest NLP techniques, including natural language processing, sentiment analysis, and context understanding. The results show significant improvements in chatbot performance, improved user interaction with the app, and increased user satisfaction levels. The purpose of this study is to ease the work of administrative staff in providing information and make it easier for students and prospective students to get information that exists today. So that providing and getting information becomes easier and more efficient. Data collection is in the form of literature studies, interviews, and observations. Quantitative methods are used in this research process to conduct testing. The system was tested using black box testing successfully and carried out the User Acceptance Test (UAT) by obtaining an average score of 88.6% of student responses with the predicate "strongly agree," which means users are satisfied with this chatbot application. The results of this study prove that chatbot applications using the NLP method can be used to make it easier for students and prospective students to get the information they want.
Pengujian Kualitas Coding Pada Aplikasi Bank Sampah DLHK Kota Pekanbaru Menggunakan Code Smell Tools fadhli, mardhiah; Yuli Fitrisia; Nurmalasari, Dini
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6211

Abstract

Kualitas dari kode program akan mempengaruhi kemampuan perangkat lunak untuk dapat mudah dimodifikasi dan dikembangkan serta dipelihara. Code smells merupakan suatu karakteristik dari perangkat lunak yang mengindikasikan permasalahan pada kode dan desain perangkat lunak yang mengakibatkan perangkat lunak sulit untuk dikembangkan dan dilakukan pemeliharaan. Deteksi code smell perlu dilakukan agar dalam pengembangan kedepannya aplikasi dapat lebih mudah dimodifikasi dan dikembangkan. Deteksi code smell dalam sebuah aplikasi dapat membantu programmer untuk mengidentifikasi adanya rancangan kode program yang dapat menyulitkan kedepannya untuk dilakukan modifikasi dan pengembangan. Pendeteksian Code Smell pada aplikasi Bank Sampah DLHK Kota Pekanbaru dilakukan karena adanya permintaan kebutuhan untuk perbaikan dan penambahan fitur dari Bank Sampah DLHK Kota Pekanbaru. Permintaan perbaikan dan penambahan fitur pada aplikasi Bank Sampah DLHK Kota Pekanbaru dilakukan berdasarkan hasil evaluasi aplikasi sebelumnya yang dilakukan oleh pihak DLHK Kota Pekanbaru kepada 10 Bank Sampah Unit dan 25 Nasabah. Berdasarkan hasil evaluasi dan uji coba aplikasi, maka perlu dilakukan penyesuaian karena adanya ketidaksinkronisasian proses dengan mekanisme yang sedang berjalan dimasyarakat terhadap fitur pada aplikasi tersebut. Untuk memudahkan proses modifikasi program maka pendeteksian code smell pada aplikasi yang sudah ada perlu dilakukan, agar programmer dapat menjaga kualitas kode program menjadi lebih mudah untuk dikembangkan. Deteksi Code Smell dilakukan dengan menggunakan tool SonarQube. Hasil dari pengukuran dari dua aplikasi Bank Sampah adalah, pada aplikasi Basada berbasis mobile terdapat 126 Code smells dengan estimasi waktu perbaikan sekitar 2 jam 34 menit. Sedangkan pada aplikasi Basada berbasis website terdeteksi 25 Code smells dengan estimasi waktu perbaikan sekitar 25 menit.
Penerapan Disaster Recovery Plan Pada Database MySQL Menggunakan Metode Master to Master Replication Berbasis Docker Suhatman, Rahmat; Fadhly Rida, Muhammad Arif; Surya, Ibnu; Tasya, Raudatul
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6226

Abstract

Data stored in the database must have protection against attacks and interference. Attacks and disruptions have been experienced by the Caltex Riau Polytechnic (PCR), which only has one database. A database that experiences an attack or disruption results in the information system being inaccessible to users. Currently, PCR does not have an information system recovery plan so that information system recovery will take a long time so that it can be accessed again by users. Therefore, PCR requires a recovery plan if the database experiences an attack or disruption. Based on these problems, this research will create a recovery plan so that the information system can be accessed more quickly when the database experiences an attack or disruption. In this research, database replication was carried out using a Disaster Recovery Plan (DRP) to respond to emergencies, provide backup operations during disruptions, and manage recovery and rescue processes afterwards. The method used is Master to Master MySQL Replication. This method uses 2 servers as master 1 and master 2. If the database on master 1 experiences changes, it will be copied to master 2 in real time. By applying the Master to Master Replication method to the DRP, the PCR information system can provide a directly updated backup for the database, when it experiences an attack or damage
Rancang Bangun Sistem Informasi Bank Mini Syariah pada Program Studi Perbankan Syariah Universitas Muhammadiyah Riau Alif Budiman, M. Puja Alif Budiman; Diansyah, Risnal; Ananda, Ananda
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6244

Abstract

Bank Mini Syariah, sebagai fasilitas pendidikan di Program Studi Perbankan Syariah Universitas Muhammadiyah Riau, menghadapi tantangan akibat tidak dapat menggunakan sistem informasi yang sudah usang dan tidak terawat. Keberlanjutan kegiatan dilakukan secara manual, membutuhkan solusi berupa Sistem Informasi Bank Mini Syariah (SIBMS). Tujuan kerja praktek ini adalah membangun SIBMS untuk memenuhi kebutuhan praktikum mahasiswa, khususnya dalam konteks perbankan syariah. Proses pengembangan sistem melibatkan analisis dan perancangan yang sistematis, memastikan kehandalan SIBMS di Bank Mini Syariah. Terdapat tiga modul utama dalam sistem ini, melibatkan pengelolaan pengguna, data nasabah, dan data transaksi. Pembangunan SIBMS diharapkan dapat memberikan kontribusi positif dan mendukung kegiatan operasional Bank Mini Syariah, sekaligus membantu mencetak lulusan yang kompeten dalam prinsip-prinsip perbankan syariah dan keuangan Islam.
Kecerdasan Buatan untuk Security Orchestration, Automation and Response: Tinjauan Cakupan Gustina DM, Venny; Ananda, Ananda
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6247

Abstract

The integration of artificial intelligence (AI) in Security Orchestration, Automation, and Response (SOAR) promises to revolutionise cybersecurity operations. The adoption of AI-powered SOAR technologies can help organisations improve their resilience to cyberattacks. Some research proposes the use of SOAR engines that can deploy customised honeypots and identify attacks, whereas others integrate artificial intelligence to improve situational understanding and response to security threats. The use of AI/ML technologies in cybersecurity can improve the effectiveness of SOC analysts in detecting, preventing, and responding to security attacks in ways such as better threat detection, automation of routine tasks, faster and more accurate data analysis, improved response to attacks, and reduced workload. Detection capabilities on the SOAR engine include HTTP IDS, Botnet, and DDoS detection, using machine learning models trained on various types of data. The SOAR engine is also equipped with other security threat detection capabilities, such as behavioural analysis, log analysis, malware analysis and threat intelligence analysis. SOAR systems equipped with artificial neural network-based machine learning are capable of analysing data in real-time and performing threat detection quickly. Thus, the use of AI technology and real-time analysis helps to reduce the workload of security professionals and increase efficiency in dealing with cyberattacks.
Optimasi Model CNN untuk Identifikasi Jenis Bunga Berdasarkan spektrum Warna nengsih, warnia; Yulina, Syefrida
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6274

Abstract

This research takes the form of Flower Species Recognition using Convolutional Neural Network (CNN) to optimize the identification of flower types based on color spectrum. The color spectrum of flowers can vary significantly between species and even within a single species. This can pose a challenge in developing a model capable of identifying flower types with high accuracy amidst a wide spectrum of color variations. Selecting an appropriate CNN architecture and optimizing model hyperparameters to achieve optimal performance is a complex process. Careful exploration of various architectures and optimization techniques is necessary to improve the accuracy of flower type identification. The dataset used is collected from various repository sources, comprising images of flowers captured under different lighting conditions, representing diverse color spectra. In this study, data preprocessing stages include color spectrum normalization, feature extraction, and data augmentation to enhance dataset diversity. The CNN model in this research is optimized through network architecture optimization. Model evaluation is performed using standard performance evaluation metrics such as accuracy, precision, and recall. It is expected that this research will yield a CNN model capable of identifying flower types with good accuracy levels, despite facing a wide range of color spectrum variations. This will facilitate the identification and grouping of flower types based on their visual characteristics..
Analisi Data Eksploratori Kritis untuk Dataset Prediksi Stroke Ariful Furqon, Muhammad Arif; Najwa, Nina Fadilah; Zarkasi, Mohamad; Pandunata, Priza; Fajariyanto, Gama Wisnu
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6307

Abstract

Stroke is a significant global health concern, requiring an in-depth understanding of the complex factors contributing to its occurrence. Age, body mass index (BMI), and average glucose levels are critical factors in stroke etiology. This study employed exploratory data analysis techniques to investigate the relationships between variables in a stroke prediction dataset. The research methodology included (1) dataset description, (2) data preprocessing, (3) exploratory data analysis, and (4) interpretation. Descriptive statistical analysis provided insights into the dataset's composition and variability, while data preprocessing techniques handled missing values and facilitated feature extraction. Based on exploratory data analysis, significant relationships were found between age, hypertension, heart disease, average glucose levels, and stroke. However, BMI showed a less significant role in stroke. These findings contribute to a better understanding of the factors contributing to stroke risk and may aid in developing more effective prevention strategies.

Page 1 of 1 | Total Record : 9