Journal Information System Development
Jurnal Information System Development (ISD) hadir sebagai wadah bagi para Akademisi, Developer, Peneliti, dan Ilmuwan yang hendak menyumbangkan karya ilmiahnya bagi dunia ilmu pengetahuan di bidang Sistem Informasi. Jurnal yang diterbitkan oleh Prodi Sistem Informasi Universitas Pelita Harapan ini menerima publikasi hasil pengembangan atau penelitian terbaru di bidang Sistem Informasi. Topik-topik meliputi pengembangan software desktop, web, mobile, database system, artificial intelligence, data warehouse, data mining, UI/UX programming, IT infrastructure, Internet of Things, Game Development, Cyber Security, dan topik-topik lainnya. Setiap tahunnya, Jurnal ISD terbit dalam dua (2) periode yaitu pada Bulan Januari dan Juli
Articles
18 Documents
Search results for
, issue
"Vol 2, No 1 (2017): Journal Information System Development (ISD)"
:
18 Documents
clear
PERANGKAT LUNAK KRIPTOGRAFI FILE TEKS MENJADI BENTUK CITRA DIGITAL MENGGUNAKAN METODE KERBEROS
Damanik, Romanus
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Rapid development of current computer technology often lead to abuse of the technology in a criminal action. One of the most common is the theft of the Password (password), personal accounts until confidential documents. To that end, the perceived need for a form of safeguard against the things above in order to comfort the user in using computer technology. Encryption is one method to randomize the words so that it cannot be read and understood by anyone else except by users who use them and those who were given the right to use it. The Kerberos method is a method of encryption that originally applied to secure a computer network. Kerberos authentication works by comparing input data with the given keywords. Based on the workings of the Kerberos method, be designed a device for data security in the form of a text message is converted into the form of a digital image. Through the processing of Binary value from the message text inputed. will be generated a digital image is the result of a binary-binary encryption of text messages through the Kerberos method. This type of data security is more secure than cryptography that produce the same output with the Plaintext, such as cryptographic text messages that generate output in the form of a digital berbedayaitucitra denganbentuk message.Keywords: Â Cryptography, Kerberos, Conversion, Digital Image
SISTEM PENGONTROLAN PERSEDIAAN BARANG DENGAN METODE ECONOMIC ORDER QUANTITY (EOQ) MENGGUNAKAN ALGORITMA GENETIKA (Studi Kasus Gundaling Farm)
Nababan, Darsono
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
The problem of emphasis on the cost of spending on the need for ordering within a company is very complex where the company demands a very optimal achievement that will lead to a huge profit for the company. Gundaling Farm is a company engaged in the business of producing and selling cow's milk is always trying as much as possible to meet customer demand. In this research used Economic Order Quantity (EOQ) method with a genetic algorithm to solve supply problem on Pt.Gundaling Farm. This research is expected to help PT.Gundaling Farm to consider and determine the policy in inventory control activities in order to run more effectively and efficiently. EOQ is the quantity of goods that can be obtained with a minimal cost, or often said to be the optimal amount of purchases. So by applying EOQ method, PT.Gundaling Farm will know how many order (quantity order) goods and when PT.Gundaling Farm should re-order goods during the period 2015. Thus PT.Gundaling Farm can optimize the cost of inventory to be spent on goods.Keywords: inventory, goods, Economic Order Quantity (EOQ).algorithm, genetic
IMPLEMENTASI ANT-BASED ROUTING ALGORITHM PADA MOBILE AD HOC NETWORK (MANET)
Safriadi, Rahmadani
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
MANET is a network model cordless (wireless) from mobile devices that can be setup dynamically from anywhere and at anytime without using a fixed network infrastructure. Ease of use and it is without a fixed infrastructure (less infrastructure) makes this model very suitable for use in critical situations, such as in the aftermath of disaster, isolated areas and areas with minimal communications network resources. To maximize the utilization and use of MANET network system, especially on the determination and selection of the best route to a node can connect and transmit the packet from the source node to the destination node to be optimized. This study was done to improve the performance of packet delivery by creating a node that functioned as a gateway and client using routing protocols Ant-Based Routing Algorithm (ABRA) so as to reduce the processing time (overhead) that often occurs in MANET network. Testing is done with a number of different nodes of 10, 20, and 30 nodes, with a bandwidth of 5 Mbps, 5 Mbps and the packet area of 10x10 m. The test results demonstrate the value of performance metrics on throughput and delay have optimal performance and low overhead so that the process of communication in the area of MANET network can take place with the stable. Keywords: Manet, ant-based routing algorithm, networking
PENILAIAN KINERJA DOSEN DENGAN MENGGUNAKAN METODE SUGENO
Simajuntak, Magdalena
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Penelitian ini bertujuan untuk menganalisis Metode sugeno untuk mendapatkan nilai optimasi fungsi dengan cepat dengan menggunakan algoritma PSO (Particle Swarm Optimization) dan MAPE (Mean Absolute Percentage Error). Input terdiri dari 3 (tiga) variabel yaitu : Variabel Materi, Variabel Disiplin dan Variabel Sikap. Hasil yang diperoleh dalam penelitian ini nilai fungsi yang telah teroptimasi dimana terjadi perbaikan error pada Sugeno-PSO sebesar 3,3 %.Kata kunci : Sugeno, Error, Optimasi
JARINGAN SYARAF TIRUAN UNTUK PREDIKSI PENJUALAN JAMUR MENGGUNAKAN ALGORITMA BACKROPAGATION
Lestari, Yuyun Dwi
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
This study predicts sales of Jamur by applying Artificial Neural Network. Aplication using Backpropagation algorithm where input data is the amount sold, income and expenditure. Then the formed Neural Network to determine theunit of each layer. After network was formed conducted training of the data has been grouped. Experiments were performed with a network architecture that consists of input units, hidden unit, unit output and network architecture 3-3-1. Testing is done using software Matlab.  Keywords : predict, Neural Network, sale, backpropagation
ANALISIS PERBANDINGAN APLIKASI PANDORA RECOVERY DAN RECUVA TERHADAP PENGEMBALIAN DATA WINDOWS
Simajuntak, Pastima
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In completing a job, the use of computers has become absolutely necessary because at the time of this computerization has not only the function of the computer used to calculate. Processing data in the form of text, images or videos can be easily and quickly using a computer. But in reality, there are only events where the work, in the form of computer files, can be lost either so files that are needed are missing from the storage media in the computer. Because it returns the data that has been lost is essential to the work that has been done someone not in vain. In restore lost files, a lot of software that can be used, such as Pandora Recovery and Recuva. In the writing of this time will be discussed on the comparison between the two software. In the research that has been testing the test. It can be seen that the time left Recuva as Software better than Pandora Recovery. The possibility that an important factor why Recuva has been chosen by its users is way better than Pandora Recovery. Keywords: Pandora Recovery, Recuva, and Windows Data Recovery.
INTEGRASI METODE RESAMPLING DAN K-NEAREST NEIGHBOR PADA PREDIKSI CACAT SOFTWAR APLIKASI ANDROID
Siringo-ringo, Rimbun
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Efects are actual errors that can be found in the software. The existence of defects can make the software does not work optimally even crashes. The existence of defect is something that must be eliminated in order to produce high-quality software. Testing Techniques conventional software is cracking failure is flawed searches on a case by case basis. This technique is done by flawed search case by case basis. To ensure the quality of the software, we need models and effectively defect testing methods.Method of k-Nearest Neighbor (k-NN) is one of the popular classification method that is widely applied to build predictive models. K-NN method is very susceptible to errors caused by the imbalance of the class., because it results in a low level of accuracy. class imbalance produces a low level of accuracy. To address the class imbalance, resampling methods applied at the pre-processing stage. Experiments done by comparing the results that obtained with and without resampling method. To validate the superiority of the model, the experimen results compared to other classification methods, namely J48 and decision table. The results showed that the use of resampling methods produce significant performance improvements to the k-NN. The proposed model is better than the method J48 and decision table.Keywords : k-Nearest Neighbor, resampling, software defects, android aplicationÂ
IMPLEMENTASI ANT-BASED ROUTING ALGORITHM PADA MOBILE AD HOC NETWORK (MANET)
Rahmadani, Safriadi
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
MANET is a network model cordless (wireless) from mobile devices that can be setup dynamically from anywhere and at anytime without using a fixed network infrastructure. Ease of use and it is without a fixed infrastructure (less infrastructure) makes this model very suitable for use in critical situations, such as in the aftermath of disaster, isolated areas and areas with minimal communications network resources. To maximize the utilization and use of MANET network system, especially on the determination and selection of the best route to a node can connect and transmit the packet from the source node to the destination node to be optimized. This study was done to improve the performance of packet delivery by creating a node that functioned as a gateway and client using routing protocols Ant-Based Routing Algorithm (ABRA) so as to reduce the processing time (overhead) that often occurs in MANET network. Testing is done with a number of different nodes of 10, 20, and 30 nodes, with a bandwidth of 5 Mbps, 5 Mbps and the packet area of 10x10 m. The test results demonstrate the value of performance metrics on throughput and delay have optimal performance and low overhead so that the process of communication in the area of MANET network can take place with the stable.Keywords: Manet, ant-based routing algorithm, networking
PENYUSUNAN ALFABET MEMBENTUK KATA MENGGUNAKAN ALGORITMA GENETIKA
Saragih, Rijois Iboy Erwin
Journal Information System Development (ISD) Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Genetic algorithm is heuristic searching algorithm which based on nature selection of mechanism and nature genetic. The basic concept that inspires the genetic algorithm is that evolution theory. The word is consisted of the alphabet. Alphabet is a set of letters or other characters with which one or more languages are written especially if arranged in a customary order. In this research will use genetic algorithm to form a word based on the typing word. The final result of this research is that showing the exact word that is typed.
PERANGKAT LUNAK KRIPTOGRAFI FILE TEKS MENJADI BENTUK CITRA DIGITAL MENGGUNAKAN METODE KERBEROS
Romanus Damanik
Journal Information System Development Vol 2, No 1 (2017): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
Rapid development of current computer technology often lead to abuse of the technology in a criminal action. One of the most common is the theft of the Password (password), personal accounts until confidential documents. To that end, the perceived need for a form of safeguard against the things above in order to comfort the user in using computer technology. Encryption is one method to randomize the words so that it cannot be read and understood by anyone else except by users who use them and those who were given the right to use it. The Kerberos method is a method of encryption that originally applied to secure a computer network. Kerberos authentication works by comparing input data with the given keywords. Based on the workings of the Kerberos method, be designed a device for data security in the form of a text message is converted into the form of a digital image. Through the processing of Binary value from the message text inputed. will be generated a digital image is the result of a binary-binary encryption of text messages through the Kerberos method. This type of data security is more secure than cryptography that produce the same output with the Plaintext, such as cryptographic text messages that generate output in the form of a digital berbedayaitucitra denganbentuk message.Keywords: Cryptography, Kerberos, Conversion, Digital Image