cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Query : Jurnal Sistem Informasi
ISSN : -     EISSN : 25795341     DOI : -
Arjuna Subject : -
Articles 9 Documents
Search results for , issue "Volume: 01, Number: 02, October 2017" : 9 Documents clear
Penerapan Cloud Computing Pada Sistem Reservasi Homestay Dieng Berbasis Web Rusydi Umar, Alan Fajar Sudrajat
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (358.185 KB)

Abstract

Homestay is one of the places needed as lodging facilities in the tourist area. In recent years, lodging business is greatly increasing. Business lodging in Dieng is one of the promising venture business' due to the increasing number of the tourists who interested to visit the tourist  places in Dieng and they need the hotel services. However, there are some managers who are unable to promote their lodging through the internet. Therefore, this research will make a software as a service in a cloud computing, regarding the Homestay Reservation System service in order to make the managers able to promote their homestay to public through the internet and it will make customers able to make a reservation through the software. This software was made by following waterfall paradigm in software engineering, start from analysis, design, implementation and testing. Testing result showed that the application deserved to be used.Keywords: information, cloud computing, homestay, reservation
Pemanfaatan Telegram Sebagai Notifikasi Serangan untuk Keperluan Forensik Jaringan Jefree Fahana, Rusydi Umar, Faizin Ridho
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.909 KB)

Abstract

Cyber attacks are a serious threat to network security, especially in routers that result in termination of connections, missing configurations that affect all communications and transactions between networks become impeded by the loss of many parties. The first step to do is to design and build an attack detection system that is Intrusion Detection System (IDS). The use of snort is useful for recording Distributed Danial of Services (DDoS) attacks as well as traffic data stored on the router stored in the log and forwarded to the instant messaging telegram application as a notification to alert the administrator. A telegram can be used not only as a notification but can also be used as a network forensic stage to strengthen evidence of an attack as a process of data collection for the purposes of the trial. The results showed that by utilizing Instant Messaging Telegram by designing wake Application (App) notification using PHP programming language able to detect attacks by using existing rules on snort and can serve as the basis of evidence of an attack. Keywords: Telegram, Intrusion Detection System (IDS), Snort, Network Forensics, DDoS. 
Pengembangan Media Pembelajaran Technical English Berbasis Digital Dharmawati Dharmawati, Sumi Khairani, Diana Suita
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (361.806 KB)

Abstract

This research is conducted based on the problem in teaching learning process of technical English for civil engineering in STT Harapan Medan. The use of lecturer method, copied and printed teaching material make the students unmotivated to learn English. The solution for this problem, it is needed to develop learning media based on CAI  (Computer Aided Instruction). The objective of this research is developing digital English media designed for civil engineering students. This research conducted qualitative method using Development Research methodology, it is used Four D Model.  Case of this research in STT Harapan Medan. The result of this research is the application of digital teaching materials in learning technical English, especially in grammar in civil engineering class. The digital teaching materials for grammar was designed by using SOM application and the exercise was designed by using cartoon story maker. Keywords:  Computer Aided Instruction, Multimedia
Implementasi Algoritma Linear Congruentials Generator Untuk Menentukan Posisi Jabatan Kepanitiaan Suendri Suendri
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (77.858 KB)

Abstract

Determination of the committee position an event during this time has been determined by the authorities in an organization. However, the positioning sometimes falls to the same person with the same position. This is certainly a form of injustice in the positioning. Linear Congruential Generator or LCG is one of the methods of Random Number Generator. With this Algorithm the position can be randomized so that the same person does not occupy the same position for the second time so justice can be realized.Keywords:  Algorithm, Position, Organization, LCG, Justice.
Penggunaan Metode Fuzzy Logic untuk Pemantauan Sentimen Brand pada Media Sosial Beki Subaeki, Fatkhan Gunawan, Aldy Rialdy Atmadja
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (306.249 KB)

Abstract

The purpose of this research is to monitor the sentiments of a brand and classify it into positive,  negative or neutral sentiments. The steps of research have started from collecting data, indexing, searching and weighting process. Data are collected by crawling data from social media, such as Facebook and Twitter. After collecting data, then weighting process is done with a fuzzy logic method, where the fuzzy set is determined based on the highest number of positive and negative words in a sentence. Weighting process is calculated from TF (Term Frequency) which is the number of words that sought in the document. From the results, TF can be used to find the fuzzy set value and the number of positive or negative sentiments in a document. Mamdani method used to calculate the value of the final sentiment. From the calculation results, it can be shown that the average of sentiment analysis is 63.15%. Keywords:  Information, Sentiment analysis, brand, fuzzy logic, social media. 
Rancang Bangun Sistem Informasi Akademik Berbasis Web ( studi kasus: SMA Swasta Harapan I Medan ) Haida Dafitri, Marina Elsera
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (277.428 KB)

Abstract

Submission of academic information to students, parents / guardians conducted at private high school SMA Harapan I Medan are still very ineffective and efficient both in terms of delivery time and in terms of finance. This is because the academic delivery is still manual in oral, written or via phone or SMS one by one. The impact of the process is the slow process of delivering academic information and the amount of expenditure in the delivery of information. To overcome these problems, then the academic community wants to improve the delivery of academic information systems using computerized technology. The purpose of the change is by building a School of Academic Information System (SISFO) Web-based SCRUM model. The system is built to produce academic information such as value and achievement of students in web-based schools that can be utilized by the academic staff to make it easier in conveying academic information to students, parents / guardians. This system includes and through several aspects of functionality, reliability, efficiency, and usability. And the scrum model used in the design of this system has a framework for building, developing and managing an ever-changing product. Keywords: Information , Academic, Scrum Model, Web
Aplikasi Pemilihan Bibit Budidaya Ikan Air Tawar dengan Metode MOORA – Entropy Muhammad Ashari, Arini, Fitri Mintarsih
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (276.81 KB)

Abstract

At the beginning of the start of the business of breeding fish selection of freshwater fish cultivation becomes a difficult thing to do. The results of interviews with the Center for Research and Development of Freshwater Aquaculture said that there are 8 factors that influence the selection of freshwater fish cultivation seeds, namely temperature, water pH, location, elevation, dissolved oxygen, pond area, the ideal length of enlargement, feeding easier, fish. This research uses Decision Support System with Multi Objective Optimization By Ratio Analysis (MOORA) method as ranking and Entropy as weighting. The incorporation of the MOORA and Entropy methods gives the recommendation result by combining the objective system's subjective and subjective weights. It used priority criteria with temperature value 0,222, water pH 0,194, Eatability 0,111, community interest toward fish 0,055, dissolved oxygen 0,138, land height 0,167, ideal length of fish enlargement 0,027, and pool area 0,083 produce catfish as the best alternative of fish breeder water with value -0.1009.Keywords: Information, fish, DSS,  MOORA, Entropy
Pengenalan Multi Wajah Berdasarkan Klasifikasi Kohonen SOM Dioptimalkan dengan Algoritma Discriminant Analysis PCA Amir Mahmud Husein, Mawaddah Harahap
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (334.541 KB)

Abstract

Face recognition is a process of identification with the image has variations changeable can be recognized, needs a method of optimization to minimize computational time by not affecting the classification results. This research proposes a face recognition system are directly based on Kohonen SOM classification that optimized by the method of Discriminant Analysis based Principal Component Analysis (PCA). Evaluation of PCA’s extraction performance uses two approaches, first the LDA method to optimize PCA issues of the election of irrelevant features of the dataset and the second approach is to apply a kernel function on the LDA (KDA), the results of both approaches are applied on face image classification for Kohonen directly. The testing is two phases, the first stage is testing with a single image of a face and then multi face. Based on the results of testing one face image, both of the approached feature extraction that proposed is very accurately be applied to the classification of the Kohonen SOM with the accurate value of the second approach PCA-KDA is more accurate with 94.22% and the first approach 93.91%, however on the first approach is faster than the second approach with the accurate value of time 0.4 seconds for PCA-LDA and 0.5 seconds to PCA-KDA to one image of the face, but while testing of multi face more two images the result is not significant. Keywords: Face recognition, Feature extraction, Kohonen SOM.
The Development of Agent Information for Intrusion Detection Bambang Sugiantoro
Query: Journal of Information Systems Volume: 01, Number: 02, October 2017
Publisher : Program Studi Sistem Informasi

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (73.695 KB)

Abstract

As the challenges and problems surround intrusion rises rapidly, the intrusion detection system has been gradually developed. Agent-based approach for intrusion detection system has developed from single to multi agent, and later developed mobile agents in order to increase system's capability to face with a more complex challenge and change. A number of studies had been identified that mobile agent can reduce network traffic, however the study related to intrusion detection using static and mobile agent for finding intruder has not been fully achieved.Keywords:  Information, Intrusion, mobile, networks

Page 1 of 1 | Total Record : 9