cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : -
Core Subject : Science,
JSAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Manajemen Informatika. JSAKTI (Jurnal Sains Komputer dan Informatika) adalah wadah informasi berupa hasil penelitian, studi kepustakaan, gagasan, aplikasi teori dan kajian analisis kritis dibidang Ilmu Komputer terbit 2 kali setahun.
Arjuna Subject : -
Articles 499 Documents
Segmentasi Kematangan Pisang Raja Berbasis Fitur Warna HSV Menggunakan Metode KNN Aliansa, Warham; Ifayatin, Hadijah Nisa; Saputra, Rizal Adi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.669

Abstract

Taxonomically, the banana tree belongs to the Family Musaceae and the Genus Musa. The most widely cultivated species or type of banana worldwide is the wild banana. The ripeness classification of Raja bananas can be obtained through two methods: destructive and non-destructive. Destructive classification is performed through chemical analysis, but it can only be done by destroying the banana. On the other hand, non-destructive classification for Raja bananas can be done by observing the texture and color of the banana peel, which is the outermost part of the fruit, without the need to taste the flesh or peel it, thus keeping the fruit intact. In the classification of king bananas into three ripeness stages: unripe, ripe, and overripe, 150 test data and 15 training data are used. The HSV color feature is employed using the K-Nearest Neighbors (KNN) classification method with the assistance of MATLAB R2021a software, achieving 100% accuracy
Analisis Algoritma Random Forest dan Kombinasi Indeks Spektral untuk Identifikasi Lahan Terbangun (Kasus Kota Surakarta) Rahmi, Ardia Tiara; Pratiwi, Kholis Hapsari; Deni, Delista Putri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.692

Abstract

In an effort to realize one of the objectives of the Sustainable Development Goals (SDGs) program goal 11 concerning Sustainable Cities and Settlements, controlling the intensity of urban built-up land in Indonesia really needs attention. One effort to monitor the condition of changes in built-up land that is easy, fast, cheap and efficient is to use the results of remote sensing data processing. Technological developments in the field of remote sensing are currently leading to processing based on Big Data and cloud computing, one of which is GEE (Google Earth Engine). Google Earth Engine. Identification of built-up land was carried out using the guided classification method of Machine Learning Random Forest and a combination of Spectral Index algorithms consisting of a combination of Urban Index (UI), Normalized Difference Vegetation Index (NDVI), and Modified Normalized Difference Water Index (MNDWI) algorithms. The object segmentation process on the results of the combined spectral index is carried out using the Otsu thresholding method. The results showed that the built-up area from the results of identification using the Random Forest algorithm and the spectral index combination algorithm in 2019 to 2023 has increased the area of land, which is shown in the 2019-2023 built-up land map. The accuracy test using the confusion matrix showed that the results of identification using a combination of spectral indices obtained OA and Kappa values which were included in the medium to high category, namely 98.69% and 0.969. So that this method can then continue to be used to monitor the pattern of development of built-up land in Surakarta City.
Metode Simple Additive Weighting (SAW) dalam Pemilihan Media Pembelajaran Bahasa Korea Ramanda, Kresna; Sundari, Wiwin; Rusman, Arief; Sikumbang, Erma Delima; Sukmana, Sulaeman Hadi; Azizah, Qudsiah Nur
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.660

Abstract

Almost all Asian countries experience the Korean Wave phenomenon. Asian countries such as Japan, China, Taiwan, Hong Kong, Thailand, Philippines, Singapore, Malaysia, Indonesia and others. With such a phenomenon, it can be observed that if someone likes something from abroad, most people are interested in learning the language. However, it is still difficult for them to find Korean language learning solutions. And one solution is to use appropriate learning media to support learning. The simple additive weight (SAW) method, also known as the weight sum method, will be applied in this study. The SAW method can select the best alternative from several available alternatives because it is ranked after determining the weight of each feature. The results showed that alternative or mobile learning at A2 is the best learning media for Korean and the simple additive weight (SAW) method can determine the best choice of Korean language learning environment. Keywords: Simple Additive Weighting, learning media, Korean language
Analisis Security Mitigation dengan Metode Vulnerability Assesment and Penetration Testing (VAPT) (Kasus Website Kerja Praktek dan Pengabdian Masyarakat) Fadillah, Muhammad Iqbal; Yanto, Umar Yunan Kurnia Sept; Fathinuddin, Muhammad
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.683

Abstract

The current development of technology is progressing rapidly in line with the ease of accessing information through various means, whether through mobile applications or websites. This convenience has had a significant impact on various industries, governments, and educational institutions that utilize websites as information support for learning and teaching activities, including at XYZ Faculty. The website is used to manage student activities in Internship and Community Service (ICS). In previous research, vulnerability assessment was conducted to identify vulnerabilities on the website; however, no mitigation was implemented for the vulnerabilities found. Therefore, security mitigation is needed to address the risks associated with these vulnerabilities. The method used in this process is Vulnerability Assessment and Penetration Testing (VAPT) with gray box testing techniques, as well as the tools Burp Suite, Acunetix, and Nessus. Vulnerability analysis was performed on the identified vulnerabilities on the website to determine a list of vulnerabilities for further exploitation. Through testing on this ICS website, nine vulnerabilities were found, including one high-level vulnerability, four medium-level vulnerabilities, and four low-level vulnerabilities. These vulnerabilities were then mitigated, and the results showed that four out of the nine vulnerabilities were successfully mitigated, improving the website's security compared to before.
Implementasi Fuzzy Logic Dalam Monitoring Infus Berbasis Internet of Things (IoT) Maulana, Moch Sigit Rizky; Rohana, Tatang; Mudzakir, Tohirin Al
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.699

Abstract

The main function of the infusion is to provide fluids to the patient, the availability of the patient's infusion fluids must always be considered periodically. The increasing number of patients and the limited number of medical personnel is causing uncontrollable delays in changing IV fluids. Blockage in the infusion line can cause air embolism in the blood vessels, which can result in death. By using an automatic infusion monitoring system, the risk of delays in replacing patient infusion fluids can be reduced. To calculate the ambiguity of sensor values, the fuzzy mamdani method was used in this study. Load Cell, HX711 and IR HC-89 are the sensors used. The value generated by the sensor is in the form of NodeMCU ESP32 input which is used by the mamdani method to determine the value in the form of output. The command to turn on the buzzer is the value of the output. Maximizing the effectiveness of the infusion monitoring system is designed with the Mamdani calculation method. The difference in value with an average weight of 5.9% infusion and 5.54 Vo drops is obtained from the results of a comparison of sensor testing with manual tools. Infusion monitoring obtains an accuracy rate of 92% from the test results on system performance.
Pembuatan Aplikasi Validasi Document Tagihan Pembelian Barang Secara Digital Menggunakan OCR dengan tool tesseract pada System Portal Perusahaan Septio, Pius Aldi; Prasetyo, Sri Yulianto Joko
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.674

Abstract

This journal reviews the Making of a Digital Invoices Document Validation Application Using OCR with the tesseract tool on the Company Portal System. This study aims to implement Optical Character Recognition (OCR) using the tesseract tool in the company portal to make it easier to validate invoices. The method used is a prototype with the aim of building a system model where the system is based on user needs where the user does not provide input and output details. The results of the application that was made were tested using Black Box testing with the results that all application functions can be used properly.
Segmentasi Citra Kupu-Kupu Menggunakan Metode Multilevel Thresholding Maftukhah, Ainin; Fadlil, Abdul; Sunardi, S
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.665

Abstract

Land conversion, pollution, logging, and the use of pesticides are the main causes of butterfly extinction. This used 50 types of butterflies using different RGB colors obtained from the Kaggle website. The goal is to separate the butterfly object from the background and produce the best accuracy from the segmentation proses. The method used is Multilevel Thresholding. The results of preprocessing on the image using Multilevel Thresholding segmentation are able to identify colors and butterfly objects. The first step is RGB image input, then the image is Segmented using Multilevel Thresholding. After that, the output is displaying the image, and using a threshold value of 0-255 with the results of image segmentation, the threshold value separates the object and the background. Multilevel Thresholding segmentation with color and shape identification obtains threshold values of 100 from the dataset train, 100, and 110 from the test dataset and 140, and 150 from the validation dataset. It was concluded that the results of threshold value of the Multilevel Thresholding segmentation obtained good results
Implementasi dan Analisis Attack Tree pada Aplikasi DVWA Berdasar Metrik Time dan Probability Irawan, Alfian Rifki; Widjajarto, Adityas; Fathinuddin, Muhammad
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.688

Abstract

The formulation of attack trees can be based on the exploitation stages in web-based applications. According to this formulation, this research aims to understand the relationship between attack trees and exploitation characteristics using time and probability metrics. The construction of attack trees is based on experimental platforms using the DVWA web-based application, both in protected and unprotected conditions by a Web Application Firewall (WAF). Exploitation is carried out on five vulnerabilities, namely SQL Injection, XSS (Reflected), Command Injection, CSRF, and Brute Force. The analysis results without a WAF show that the Cross-Site Request Forgery attack tree occupies the top position with a score of 18.19. On the other hand, the Brute Force attack tree ranks last with a score of 230.09. With the presence of a WAF, the Command Injection attack tree takes the first position with a score of 4.80, while the Brute Force attack tree remains in the last position with a score of 43.08. Further research in this study may involve a detailed examination of probability metrics and the calculation of vulnerability factors.
Application of the LSTM Algorithm in Predicting Urea Fertilizer Production at IIB Plant PT. Pupuk Sriwidjaja Palembang Awaludin, Aziz; Ferdiansyah, F; Andri, A; Oktarina, Tri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.704

Abstract

PT. Pupuk Sriwidjaja Palembang is a pioneer of fertilizer manufacturers in Indonesia. One of the plants at PT. Pupuk Sriwidjaja Palembang, namely the IIB urea plant, has been operating normally since 2017, thereby the data of production results has been collected for more than five years (time series data). The collected data can be used to make predictions of future production using the LSTM (Long Short Term Memory) model. LSTM is an artificial neural network architecture that is suitable for processing sequential data. The research objective to be achieved is to produce a production prediction model using LSTM modeling. Data collected over five years was divided into training data and testing data through data composition trials. The LSTM model training was carried out with a training data composition of 70% of the total data, batch size 64, and epoch 200. Then testing was carried out with data testing as much as 30% of the total data using RMSE and MAPE as model quality assessment parameters. Based on test results, the LSTM model is able to predict production with an RMSE of 11.08 and a MAPE of 6.39%.
Perancangan Sistem Informasi Penjualan dan Pembelian Merchandise Darjofans Berbasis Website Darmawan, Dikky Putra; Rahmawati, Yunianita; Rosid, Mochamad Alfan
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.679

Abstract

Darjofans Merchandise is a store that offers various Deltras and Deltamania attributes. The sales system at Darjofans Merchandise is still conventional so that customers are required to come to the store to make purchases and the marketing reach used by Darjofans Merchandise is lacking. To overcome these problems, this research will design an information system for selling and purchasing Darjofans merchandise based on a website so that customers who want to buy products only need internet access without having to go to the store and customers can receive up to date information and will use the waterfal method as software development methods. And data collection techniques used are observation, interviews, and literature study. And the results of the research that has been done is that the sales and purchase information system helps shop owners to make it easier for customers to know the products being sold and buy these products without having to visit the store. This information system will also be equipped with an online payment system that is integrated with Midtrans as a payment gateway service provider so that the transaction process becomes faster, easier and more practical