cover
Contact Name
ibnu surya
Contact Email
ibnu@pcr.ac.id
Phone
+6285272673321
Journal Mail Official
jurnalkomputerterapan@pcr.ac.id
Editorial Address
Jurnal Komputer Terapan (JKT) Badan Penelitian dan Pengabdian kepada Masyarakat (BP2M) Politeknik Caltex Riau Jl. UmbanSari No. 1 Rumbai - Pekanbaru 28265
Location
Kota pekanbaru,
Riau
INDONESIA
Jurnal Komputer Terapan
Published by Politeknik Caltex Riau
ISSN : 24434159     EISSN : 24605255     DOI : https://doi.org/10.35143/jkt
Core Subject : Science,
Applied Computer Journal Articles from various fields in Informatics, Information Systems and Computer science. Topics included, 1. Informatics 1.1 Software Engineering 1.2 Multimedia 2. Information Systems 2.1 Soft Computing 2.2 Business Analyst 2.3 Data Engineering 3. Computer science 3.1 Operating System 3.2 Computer Network
Articles 223 Documents
Pengembangan Sistem Informasi Pengajuan ISBN di Perpustakaan Politeknik Caltex Riau dini hidayatul qudsi; Mutia Sari Zulvi
Jurnal Komputer Terapan Vol. 9 No. 2 (2023): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v9i2.6199

Abstract

The ISBN (International Standard Book Number) application is one of the facilities provided by the Riau Caltex Polytechnic Library (PCR) to the academic community to assist the academic community to get ISBNs from the National Library. Until now, the ISBN application process for the Caltex Riau Polytechnic Publisher (PCR) has taken quite a long time. The author communicates via email sent to library staff, causing the author and staff have difficulty seeing the progress status of the ISBN application. Therefore, a library system was built to manage the ISBN management process for the Caltex Polytechnic Publisher. The system development uses Rapid Application Development (RAD) methodology. The development of the website using the RAD methodology requires a strong commitment between developers and users, so that the system can be completed within the specified time. The resulting system has been tested using the Black Box testing method and states that the system features are 100% running as expected.
Pengujian Kualitas Coding Pada Aplikasi Bank Sampah DLHK Kota Pekanbaru Menggunakan Code Smell Tools fadhli, mardhiah; Yuli Fitrisia; Nurmalasari, Dini
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6211

Abstract

Kualitas dari kode program akan mempengaruhi kemampuan perangkat lunak untuk dapat mudah dimodifikasi dan dikembangkan serta dipelihara. Code smells merupakan suatu karakteristik dari perangkat lunak yang mengindikasikan permasalahan pada kode dan desain perangkat lunak yang mengakibatkan perangkat lunak sulit untuk dikembangkan dan dilakukan pemeliharaan. Deteksi code smell perlu dilakukan agar dalam pengembangan kedepannya aplikasi dapat lebih mudah dimodifikasi dan dikembangkan. Deteksi code smell dalam sebuah aplikasi dapat membantu programmer untuk mengidentifikasi adanya rancangan kode program yang dapat menyulitkan kedepannya untuk dilakukan modifikasi dan pengembangan. Pendeteksian Code Smell pada aplikasi Bank Sampah DLHK Kota Pekanbaru dilakukan karena adanya permintaan kebutuhan untuk perbaikan dan penambahan fitur dari Bank Sampah DLHK Kota Pekanbaru. Permintaan perbaikan dan penambahan fitur pada aplikasi Bank Sampah DLHK Kota Pekanbaru dilakukan berdasarkan hasil evaluasi aplikasi sebelumnya yang dilakukan oleh pihak DLHK Kota Pekanbaru kepada 10 Bank Sampah Unit dan 25 Nasabah. Berdasarkan hasil evaluasi dan uji coba aplikasi, maka perlu dilakukan penyesuaian karena adanya ketidaksinkronisasian proses dengan mekanisme yang sedang berjalan dimasyarakat terhadap fitur pada aplikasi tersebut. Untuk memudahkan proses modifikasi program maka pendeteksian code smell pada aplikasi yang sudah ada perlu dilakukan, agar programmer dapat menjaga kualitas kode program menjadi lebih mudah untuk dikembangkan. Deteksi Code Smell dilakukan dengan menggunakan tool SonarQube. Hasil dari pengukuran dari dua aplikasi Bank Sampah adalah, pada aplikasi Basada berbasis mobile terdapat 126 Code smells dengan estimasi waktu perbaikan sekitar 2 jam 34 menit. Sedangkan pada aplikasi Basada berbasis website terdeteksi 25 Code smells dengan estimasi waktu perbaikan sekitar 25 menit.
Penerapan Disaster Recovery Plan Pada Database MySQL Menggunakan Metode Master to Master Replication Berbasis Docker Suhatman, Rahmat; Fadhly Rida, Muhammad Arif; Surya, Ibnu; Tasya, Raudatul
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6226

Abstract

Data stored in the database must have protection against attacks and interference. Attacks and disruptions have been experienced by the Caltex Riau Polytechnic (PCR), which only has one database. A database that experiences an attack or disruption results in the information system being inaccessible to users. Currently, PCR does not have an information system recovery plan so that information system recovery will take a long time so that it can be accessed again by users. Therefore, PCR requires a recovery plan if the database experiences an attack or disruption. Based on these problems, this research will create a recovery plan so that the information system can be accessed more quickly when the database experiences an attack or disruption. In this research, database replication was carried out using a Disaster Recovery Plan (DRP) to respond to emergencies, provide backup operations during disruptions, and manage recovery and rescue processes afterwards. The method used is Master to Master MySQL Replication. This method uses 2 servers as master 1 and master 2. If the database on master 1 experiences changes, it will be copied to master 2 in real time. By applying the Master to Master Replication method to the DRP, the PCR information system can provide a directly updated backup for the database, when it experiences an attack or damage
Rancang Bangun Sistem Informasi Bank Mini Syariah pada Program Studi Perbankan Syariah Universitas Muhammadiyah Riau Alif Budiman, M. Puja Alif Budiman; Diansyah, Risnal; Ananda, Ananda
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6244

Abstract

Bank Mini Syariah, sebagai fasilitas pendidikan di Program Studi Perbankan Syariah Universitas Muhammadiyah Riau, menghadapi tantangan akibat tidak dapat menggunakan sistem informasi yang sudah usang dan tidak terawat. Keberlanjutan kegiatan dilakukan secara manual, membutuhkan solusi berupa Sistem Informasi Bank Mini Syariah (SIBMS). Tujuan kerja praktek ini adalah membangun SIBMS untuk memenuhi kebutuhan praktikum mahasiswa, khususnya dalam konteks perbankan syariah. Proses pengembangan sistem melibatkan analisis dan perancangan yang sistematis, memastikan kehandalan SIBMS di Bank Mini Syariah. Terdapat tiga modul utama dalam sistem ini, melibatkan pengelolaan pengguna, data nasabah, dan data transaksi. Pembangunan SIBMS diharapkan dapat memberikan kontribusi positif dan mendukung kegiatan operasional Bank Mini Syariah, sekaligus membantu mencetak lulusan yang kompeten dalam prinsip-prinsip perbankan syariah dan keuangan Islam.
Kecerdasan Buatan untuk Security Orchestration, Automation and Response: Tinjauan Cakupan Gustina DM, Venny; Ananda, Ananda
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6247

Abstract

The integration of artificial intelligence (AI) in Security Orchestration, Automation, and Response (SOAR) promises to revolutionise cybersecurity operations. The adoption of AI-powered SOAR technologies can help organisations improve their resilience to cyberattacks. Some research proposes the use of SOAR engines that can deploy customised honeypots and identify attacks, whereas others integrate artificial intelligence to improve situational understanding and response to security threats. The use of AI/ML technologies in cybersecurity can improve the effectiveness of SOC analysts in detecting, preventing, and responding to security attacks in ways such as better threat detection, automation of routine tasks, faster and more accurate data analysis, improved response to attacks, and reduced workload. Detection capabilities on the SOAR engine include HTTP IDS, Botnet, and DDoS detection, using machine learning models trained on various types of data. The SOAR engine is also equipped with other security threat detection capabilities, such as behavioural analysis, log analysis, malware analysis and threat intelligence analysis. SOAR systems equipped with artificial neural network-based machine learning are capable of analysing data in real-time and performing threat detection quickly. Thus, the use of AI technology and real-time analysis helps to reduce the workload of security professionals and increase efficiency in dealing with cyberattacks.
Optimasi Model CNN untuk Identifikasi Jenis Bunga Berdasarkan spektrum Warna nengsih, warnia; Yulina, Syefrida
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6274

Abstract

This research takes the form of Flower Species Recognition using Convolutional Neural Network (CNN) to optimize the identification of flower types based on color spectrum. The color spectrum of flowers can vary significantly between species and even within a single species. This can pose a challenge in developing a model capable of identifying flower types with high accuracy amidst a wide spectrum of color variations. Selecting an appropriate CNN architecture and optimizing model hyperparameters to achieve optimal performance is a complex process. Careful exploration of various architectures and optimization techniques is necessary to improve the accuracy of flower type identification. The dataset used is collected from various repository sources, comprising images of flowers captured under different lighting conditions, representing diverse color spectra. In this study, data preprocessing stages include color spectrum normalization, feature extraction, and data augmentation to enhance dataset diversity. The CNN model in this research is optimized through network architecture optimization. Model evaluation is performed using standard performance evaluation metrics such as accuracy, precision, and recall. It is expected that this research will yield a CNN model capable of identifying flower types with good accuracy levels, despite facing a wide range of color spectrum variations. This will facilitate the identification and grouping of flower types based on their visual characteristics..
Analisi Data Eksploratori Kritis untuk Dataset Prediksi Stroke Ariful Furqon, Muhammad Arif; Najwa, Nina Fadilah; Zarkasi, Mohamad; Pandunata, Priza; Fajariyanto, Gama Wisnu
Jurnal Komputer Terapan Vol 10 No 1 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i1.6307

Abstract

Stroke is a significant global health concern, requiring an in-depth understanding of the complex factors contributing to its occurrence. Age, body mass index (BMI), and average glucose levels are critical factors in stroke etiology. This study employed exploratory data analysis techniques to investigate the relationships between variables in a stroke prediction dataset. The research methodology included (1) dataset description, (2) data preprocessing, (3) exploratory data analysis, and (4) interpretation. Descriptive statistical analysis provided insights into the dataset's composition and variability, while data preprocessing techniques handled missing values and facilitated feature extraction. Based on exploratory data analysis, significant relationships were found between age, hypertension, heart disease, average glucose levels, and stroke. However, BMI showed a less significant role in stroke. These findings contribute to a better understanding of the factors contributing to stroke risk and may aid in developing more effective prevention strategies.
Animasi 3D Menggunakan Augmented Reality Sebagai Media Pengenalan Warisan Budaya Provinsi Riau Dewi, Meilany; Liana Putri, Vania Ozva
Jurnal Komputer Terapan Vol 10 No 2 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i2.6196

Abstract

The city of Riau Province is a historic city that has cultural heritage in the form of old buildings. Tangible culture can be called Malay Intangible Heritage, which is still found today even though it has undergone development from the original, in the form of Gurindam 12, Malay clothes, Malay specialties, customs. Whereas currently tangible heritage such as Malay villages, traditional Malay houses, mosques, surau and others that are full of history and these values have almost disappeared due to modernization and globalization. So because of these problems, another alternative is needed to introduce the cultural heritage of Riau Province. In this study, an augmented reality application was built as a medium to recognize the cultural heritage of Riau Province. The method used is SDLC waterfall where the development is carried out systematically and sequentially. The results of system testing using Black box and Questionnaire show that the functionality is running well. In addition, the results of Content Validity testing on experts obtained an overall score of 95% which indicates that the application is very good. In addition, the pre test and post test also obtained the results of a large difference before and after using the application and it was proven that responders who had used the application became more knowledgeable about the cultural heritage of Riau Province.
Oversampling Menggunakan Pendekatan Latin Hypercube Sampling Dan K-Nearest Neighbors Untuk Meningkatkan Kinerja Klasifikasi Sapriadi, Sapriadi; Nasution, Mardiah
Jurnal Komputer Terapan Vol 10 No 2 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Class imbalance in datasets is a significant challenge in machine learning, often leading to a decline in model performance. This issue is frequently encountered in real-world data, where the proportion between majority and minority classes is highly imbalanced. One common approach to address this problem is oversampling, which aims to balance class distribution by adding synthetic data to the minority class. The most popular oversampling technique is the Synthetic Minority Oversampling Technique (SMOTE), although this method has drawbacks such as producing less diverse data and the potential generation of outliers. As an alternative solution, this study proposes the use of the Latin Hypercube Sampling (LHS) method combined with k-Nearest Neighbor (k-NN) to enhance classification performance on imbalanced datasets. The combination of LHS and k-NN is expected to produce higher quality synthetic data, thereby improving the performance of classification models measured using the confusion matrix. The data used in this study is sourced from various online repositories such as KEEL, Kaggle, UCI, as well as the student specialization of vocational high school (SMK) students in Pekanbaru
ANALISA FORENSIK CYBER ATTACK TERHADAP WEB SECURITY Fitrisia, Yuli; Saragih, Jenri Pujianto
Jurnal Komputer Terapan Vol 10 No 2 (2024): Jurnal Komputer Terapan
Publisher : Politeknik Caltex Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35143/jkt.v10i2.6402

Abstract

Teknologi menjadi kebutuhan sehari-hari bagi banyak orang. Penggunaan teknologi yang tidak tepat dapat menimbulkan dampak negatif baik bagi individu maupun organisasi seperti mendapatkan informasi-informasi yang bersifat illegal. Hal ini dapat dilakukan dengan memanfaatkan teknologi komputer sehingga menimbulkan kejahatan siber seperti eksploitasi website dengan serangan cross-site scripting. Untuk mengungkap kasus tersebut dibutuhkan bukti digital untuk membantu dalam mengungkap kasus tindak kejahatan siber seperti disk image yang berisikan file system, file temp (log), dan partisi disk lain didalamnya. Upaya dalam memperoleh dan menganalisis barang bukti digital tersebut dilakukan dengan teknik static forensic dengan menerapkan metode NIST. Teknik static forensic, memperoleh bukti digital dengan melakukan ekstraksi dan analisis setelah terjadi insiden ataupun setelah sistem tidak beroperasi. Penelitian ini menghasilkan artifak-artifak barang bukti digital (evidence) berupa disk image, file access.log yang mencatat seluruh permintaan yang dilakukan pelaku terkait serangan reflected cross-site scripting dan stored cross-site scripting yang tercatat pada log server, dan IP Address pelaku. Sedangkan pada file error.log tidak ada indikasi terjadinya serangan cross-site scripting dan tidak menghasilkan bukti apapun indikasi serangan. Barang bukti tersebut, diolah dan disajikan sebagai laporan hasil investigasi digital forensic untuk memperkuat kasus hukum terhadap pelaku serangan.