cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : -
Core Subject : Science,
JSAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Manajemen Informatika. JSAKTI (Jurnal Sains Komputer dan Informatika) adalah wadah informasi berupa hasil penelitian, studi kepustakaan, gagasan, aplikasi teori dan kajian analisis kritis dibidang Ilmu Komputer terbit 2 kali setahun.
Arjuna Subject : -
Articles 50 Documents
Search results for , issue "Vol 4, No 2 (2020): EDISI SEPTEMBER" : 50 Documents clear
Penerapan Complex Proportional Assessment (COPRAS) Dalam Penentuan Kepolisian Sektor Terbaik Ginting, Garuda; Alvita, Suha; Mesran, M; Karim, Abdul; Syahrizal, Muhammad; Daulay, Nelly Khairani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.254

Abstract

In determining the best Sector Police, many criteria must be had by every Sector Police to be the best. Some of the criteria used to determine the best Sector Police are Polsek services, completion of the crime, number of personnel, cleanliness of the Sectoral Police, and number of criminal acts. Determination of the best Sector Police to improve the performance of personnel so that they are encouraged to be better at doing their jobs than before. To avoid mistakes and be precise in determining the best Police Sector, a decision support system is needed. In this study, a case will be raised, namely finding the best alternative based on the existing criteria using the Complex Proportional Assessment (COPRAS) method. The COPRAS method is used to analyze different alternatives and estimate alternatives according to the level of utility where the values of the attributes are expressed in intervals to increase efficiency and increase accuracy in the decision-making process.
Faktor-Faktor yang Mempengaruhi Keberhasilan UKM di Kabupaten Sleman berdasarkan Formal Concept Analysis Muslim, Rudi; Pratama, Ahmad Raf’ie; Hidayat, Taufiq
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.222

Abstract

Small Medium Enterprises (SME) play an important role in the economic growth of Indonesia, and it was no exception in Sleman Regency, D.I. Yogyakarta province. This study aims to investigate and to recommend factors driving SME success by using formal concept analysis (FCA). Eleven factors and 36 subfactors were found based on the literature study to be further tested against a dataset based on interviews of 14 SMEs from seven different business sectors. With 95 attribute values from the attribute scaling process, the FCA results showed 641 concepts and concept lattice visualizations. Using a support threshold of 64%, seven intents were found to be more important, while other intents not included in the iceberg concept lattices were considered to be less important. The findings show that five factors (i.e., customers, products, human resources, networks, and external influences) play more important roles in driving SME success in Sleman Regency than the other six factors (i.e., characteristics, finance, competitors, market, technology, and government policy).
Pemilihan Aplikasi Meeting Online Untuk Mendukung Work From Home Menggunakan Metode AHP Danang, Deodatus; Mustika, Wida Prima; Merdekawati, Agustiena
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.245

Abstract

The Indonesia government has started to prepare the strategies by setting the new policies regarding the spread of the coronavirus (Covid-19) since the first case was found on March, 2nd 2020. One of those policies is appealing to all government staffs/State C3il Apparatus and pr3ate employees to apply the system of remote working (Work from Home). To support the act3ity of remote working, the employees have been using some applications for online meetings to communicate with colleagues, superiors, and business partners in resolving the workloads without direct physical contacts. These applications needed are Zoom, Google Meet, Skype, and Webex. The writer conducted a study using the Analytical Hierarchy Process (AHP) method to determine the selection of the appropriate application for online meetings according to the priority criteria required by the employees who work at home. AHP method can provide the best order that will produce criteria and alternat3es with the highest values. The research was conducted based on the criteria for application features, ease of use, number of participants, duration of time, bandwidth requirements, and application security. The result for alternat3es with priority results was the Zoom application with the highest value of 0.341 (34.1%), followed by Google Meet with a value of 0.319 (31.9%), Skype with a value of 0.187 (18.7%), and Webex. With a value of 0.153 (15.3%) as the lowest order.
Identifikasi Jenis-Jenis Burung Lovebird Menggunakan Pengolahan Citra Digital Dengan Metode K-Means Clustering Misdiyanto, M; T, Yustina Suhandini; Aprilia, Ira
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.236

Abstract

Identification process type of bird lovebird, usually determined by parameters characteristic feather color of birds lovebird. Parameters to define the type of bird lovebird usually done manually by using the sense of sight. This way has a weakness that is, it takes a long time and results in an invalid identification. Based on that weakness, the researcher designed an identification system type of lovebird birds by using the Matlab programming language. Identify the type of lovebird bird conducted by researchers, namely color analysis of lovebird bird feathers. Image data were taken in the form of bird samples, lovebird josan, albino, and lutino by using a DSLR camera and identification algorithm K-means Clustering. The system is divided into two stages, namely the training stage and the testing phase. The training stage uses 30 bird images recognized according to type resulting in an accuracy level of 100%. While The testing phase uses 24 bird images, 22 images of lovebird birds identified according to their type, and two recognizable lovebirds images but not according to its kind resulting in an accuracy level of 91,67%.
Three Pass Protocol untuk Keamanan Kunci Berbasis Base64 pada XOR Cipher Sulaiman, Oris Krianto; Nasution, Khairuddin; Siambaton, Mhd. Zulfansyuri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.338

Abstract

XOR cipher is a message randomization algorithm by performing XOR logical operations for plaintext and key so that it becomes a ciphertext. The problem lies in the predictable use of XOR. Therefore, it uses key security using the Three Pass Protocol. This protocol secures communication for each party. The key used for Three Pass Protocol communication is Base64. The Three Pass Protocol scheme for XOR Cipher key security using Base64 has a weakness because it is due to the Base64 encoding process which by default is easy for others to know. So that this research can be developed again to replace Base64 into a better algorithm in terms of security.
Clustering Koridor Transjakarta Berdasarkan Jumlah Penumpang Dengan Algoritma K-Means Supriyatna, Adi; Carolina, Irmawati; Janti, Suhar; Haidir, Ali
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.259

Abstract

Transportation is one of the facilities that make it easy for humans to carry out activities to move places using vehicles that are driven by humans or machines. Based on data obtained from data.jakarta.go.id, the number of Transjakarta bus passengers in corridors 1 to 13 of 2017 amounted to 114,239,960, and in 2018 there were 121,918,964 passengers. The algorithm used in this research is K-Means Cluster, which is implemented using Microsoft Excel and Rapidminer Studio. The purpose of this study is to cluster Transjakarta corridors based on the number of passengers divided into 3 clusters: high, medium, and low. The results of data processing show that the Transjakarta corridor data cluster is based on the number of passengers using the K-Means cluster algorithm using Microsoft Excel and Rapidminer Studio to produce 3 clusters, namely cluster 1 with the highest number of passengers, one corridor, cluster 2 with the number of passengers being nine corridors and cluster 3 or 0 with a low number of passengers there are three corridors. The highest number of passengers is corridor one which serves the Blok M - Kota route, indicating that the Blok M - Kota route is the most used by Transjakarta passengers.
Prediksi Mahasiswa Berpotensi Berhenti Kuliah Secara Sepihak Menggunakan Data Mining Algoritma C4.5 Sudarsono, Bernadus Gunawan; Bani, Alexius Ulan
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.227

Abstract

Students are a call to a student who has sat in college; there are many reasons why students decide to stop taking one-sidedly lectures which result in many losses that will be experienced by the campus, starting from reduced campus quantities and campus quality, adding to the accumulation of unclear student data and will cause and slow down the campus reporting performance. Hence, it is necessary to predict students who have the potential to stop studying unilaterally by looking at several criteria and digging up information on potential student data by applying data mining science and approaching one of the classification approach algorithms, namely the C4.5 algorithm; the results obtained from the study can see the predictive rule of students who have the potential to unilaterally quit college.
Audit Keamanan Sistem Informasi Pada Data Center Menggunakan Standar SNI-ISO 27001 Syafrinal, S; Agusrijar, A
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.250

Abstract

Information system security management is very important for Aceh Government institutions in managing information assets that refer to a standard. This will have a negative impact on the sustainability of information services, especially e-mail services managed by the Aceh Communication, Information, and Encryption Service. So the need for good management governance according to national and international standards to create good management of electronic mail information system services by conducting an internal audit process on its management in terms of physical and environmental security where the electronic mail service information system is managed. This study discusses the "Information System Security Audit on Data Centers Using SNI-ISO 27001 Standards (Case Study: Aceh Government)". The results showed the need for data and documentation of the final evaluation of the maturity level of the audit process to reduce the risk of threats to the information system generated so that problems can be overcome by making efforts to minimize the possible risks that have been caused. The auditing stages have been carried out on the information system in the data center using the SNI-ISO 27001 standard resulting in a level of maturity still at the "repeatable but intuitive" level that still requires further supervision in the management of the security side.
Analisis Jejaring Sosial Smartfren Pada Sosial Media Twitter Dengan Metode Text Network Analysis (TNA) Tyas, Delia Hayyuning; Suganda, Grishelda Amelia; Putri, Hanifah Hindra; Nurtikasary, Meyke; A.R, Sakina Ulfa
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.218

Abstract

The study aims to determine and analyze the responses of consumers who have used smartfren through comments on social media twitter regarding the network, price, and quality of smartfren in Indonesia. Useful to find out what consumer complaints are often submitted by smartfren users. With smartfren's superior services, smartfren 4G LTE advanced, VoLTE to enable customers to enjoy calls with HD quality, international services, smart world, smart U, and super4G smartfren. Smartfren also provides unlimited services 24 hours a month. With this Text Network Analysis method, the author wants to find out whether there are negative comments about this smartfren service so that the company will finally be able to find out what problems often arise and can be fixed so that they can make the company even better.
Perancangan Sistem Informasi Pemesanan Spectrum Party Planner Dengan Menggunakan Metode AHP Desi, Efani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.241

Abstract

Wedding Organizer is a service that works personally to help the bride and groom in planning and supervision of the implementation of the wedding party by schedule and budget that have been set. Wedding organizer information system created using web-based information technology to expand the area of promotion and sale of wedding packages and simplify the ordering process. System Design Information Ordering Wedding Organizer is UML modeling visualization (Unified Modeling Language), and this application applies the method Analytical Hierarchy Process (AHP), namely by weighting the criteria and vendors. The programming language used is the PHP programming language (PHP Hypertext Preprocessor) with MySQL as the Database Management System (DBMS), and Atom as an editor. A wedding organizer information system is very helpful for people who do not want to bother with their wedding planning issues. With the development of technology today, the wedding Organizer has begun to move from the manual process into the online process of the wedding information system-based organizer web.