cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : -
Core Subject : Science,
JSAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Manajemen Informatika. JSAKTI (Jurnal Sains Komputer dan Informatika) adalah wadah informasi berupa hasil penelitian, studi kepustakaan, gagasan, aplikasi teori dan kajian analisis kritis dibidang Ilmu Komputer terbit 2 kali setahun.
Arjuna Subject : -
Articles 499 Documents
Analisis Web Performance Load Test Pada Situs Web PT Neptus Teknologi Indonesia Jakarta Setelah Menggunakan Cloud Web Application Firewall (WAF) Sukmana, Sulaeman Hadi; Saputra, Deri; Puspitasari, Diah; Azizah, Qudsiah Nur; Sikumbang, Erma Delima; Ramanda, Kresna
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.762

Abstract

Advances in information technology are increasing over time, the use of the internet has become a daily thing that is often done. All kinds of activities that take place every day some use an internet connection for the process. PT Neptus Teknologi Indonesia currently needs protection for the company's website to improve performance and avoid hacker attacks. Website security protection using Cloud Web Application Firewall (WAF) at PT Neptus Teknologi Indonesia is used to improve website performance which is not currently implemented. Currently, the performance of the company's website still gets insufficient marks in the criteria for a good website in testing using Pingdom Tools and GTMetrix and is not yet protected for security. The stages carried out start from making observations, preparing tools and materials, determining testing tools, installing and configuring the Cloud Web Application Firewall WAF and carrying out testing and data analysis. The results of the analysis that has been carried out show that the use of Cloud Web Application Firewall (WAF) for the performance of the neptus.co.id website is very beneficial because implementing cloud WAF can change the performance load and prevent attacks from hackers
Comparative Analysis of Machine Learning Models for Enhanced Chemical Detection in Sensor Array Data Airlangga, Gregorius
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.785

Abstract

The objective of this study was to compare the efficacy of various machine learning models for classifying chemical substances using sensor array data from a wind tunnel facility. Six widely recognized machine learning algorithms were assessed: Random Forest, Gradient Boosting, Logistic Regression, Support Vector Machine (SVM), Decision Tree, and K-Nearest Neighbors (KNN). The dataset, consisting of 288 sensor array features, was preprocessed and utilized to evaluate the models based on accuracy, precision, recall, and F1 score through a 5-fold cross-validation method. The results indicated that ensemble methods, particularly Random Forest and Gradient Boosting, outperformed other models, achieving an accuracy and F1 score of over 99%. KNN also demonstrated high efficacy with similar performance metrics. In contrast, Logistic Regression showed modest results in comparison. The study's outcomes suggest that ensemble machine learning models are highly suitable for chemical detection tasks, potentially contributing to advancements in environmental monitoring and public safety. The findings also highlight the importance of quality data preprocessing in achieving optimal model performance. Future research directions include exploring hybrid models, deep learning techniques, and assessing model robustness against environmental variabilities. This research underscores the transformative potential of machine learning in chemical detection and paves the way for developing more sophisticated and reliable detection systems.
Klasifikasi Desa Wisata di Provinsi Jawa Tengah Menggunakan Algoritma C4.5 Leniawati, Nimas; Wijayanto, Sena
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.776

Abstract

Central Java is part of a province on the island of Java that develops the tourism industry. Based on Central Java provincial regulation No. 2 of 2019, regarding the empowerment of tourism villages in Central Java Province, it is stated that tourism villages play an important role in advancing public welfare, equitable distribution of trade and employment, optimization of economic potential and regional characteristics, as well as promoting and protecting cultural, religious, and national values and natural preservation. This relates to the importance of identifying tourist villages that can be developed as tourist destinations. For this reason, classification in data mining can be done using the C4.5 algorithm. The C4.5 algorithm can be used in obtaining a decision tree that is easy to understand in classifying tourist villages. This research aims to classify tourist villages by implementing the decision tree classifier C4.5 algorithm. The research data was obtained from the Central Java Province data portal dataset in 2019 and the problem solving in this study raised the Knowledge Discovery Database process. The results of this study are in the form of testing the C4.5 algorithm using confusion matrix and obtaining accuracy of 86%, recall of 88% and precision of 86%.
Evaluasi Keamanan Informasi Menggunakan ISO/IEC 27001: Studi Kasus PT XYZ Fatih, Dayyan; Aji, Rizal Fathoni
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.767

Abstract

PT XYZ is one of the government-owned enterprises of the Republic of Indonesia that engaged in agribusiness. PT XYZ already has an information security management system (ISMS), but there are still several obstacles that are found, such as low personnel attention to information security, the need to remain compliant with government regulations, to technical constraints that arise, so PT XYZ wants to improve its information security-related capabilities. This study aims to determine the current condition of the existing ISMSĀ  at PT XYZ and provide recommendations for improving the ISMS. This research uses information security controls based on the ISO/IEC 27001: 2022 standard to get the information security condition gap, then divides the information technology (IT) assets owned by the IT division of PT XYZ into several categories using the ISO/IEC 27005: 2018 standard, and conducts a risk assessment using the gap result data, namely the selected information security controls. Then recommendations were made based on the ISO/IEC 27002:2022 standard. The findings of this study were the discovery of 17 ISO/IEC 27001:2022 control activities whose value results were not maximised. These 17 controls are then divided into 3 categories of recommendations based on the urgency, from the results of the risk assessment.
Optimasi Media Transmisi Nirkabel Pada Controlling Alat Elektronik Smart Home dengan Xbee Module Berbasis Arduino Uno Lase, Kristian Juri Damai; Setyawan, Gogor C.; Masoino, Stevie
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.781

Abstract

Smarthome is a smart home system that connects communication networks with electronic equipment so that it can be controlled, monitored or accessed remotely. Smarthome can also increase efficiency, comfort and security by using technology automatically. This study aims to determine the use of Xbee Module as a wireless transmission medium for controlling smart home electronic devices. The method used in this research is literature study, analysis and design, implementation and testing, the author designs a local network with a basic configuration using wireless media to create a local network to be connected to each other both Xbee Transmitter and Xbee Receiver so that both can be connected and can communicate in the same frequency channel or network. Based on the test results, it is found that the use of Xbee Module as a wireless transmission medium to control smart home electronic devices works well at a maximum distance of 80 meters.
Pengujian Dan Penjaminan Kualitas Software Point Of Sale Toko Elektronik Dengan Metode Black Box Funsional Dan Integrasi Handono, Bagus Tri; Gunawan, G; Hartono, Rudi; Khotimah, Nur; Zy, Ahmad Turmudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.772

Abstract

This Electronic Retail Point of Sale (POS) Software discusses testing and quality assurance methods for the POS application. This application is crucial in the context of managing sales and purchases in electronic stores. The goal of this documentation is to ensure that the application functions properly, meets user needs, and maintains the security of transaction data. The selected method for testing and quality assurance is the BlackBox method, with a particular focus on functional and integration testing. Functional testing includes steps such as opening the application, logging in with valid and invalid data, and testing the main features of the application. Meanwhile, integration testing focuses on the interaction between the key components of the application, such as master data, transaction data, and reporting. The importance of security in the POS application is emphasized through security testing, especially concerning logout mechanisms and post-logout access security. This is done to safeguard sensitive transaction data and customer information.
Analisis Hyperparameter Pada Klasifikasi Jenis Daging Menggunakan Algoritma Convolutional Neural Network Dinata, I Made Anom Mahartha; Gunadi, I Gede Aris; Sunarya, I Made Gede
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.763

Abstract

In the context of food and economy, meat plays a vital role in fulfilling the nutritional needs of society and serves as a strategic economic commodity. However, the difficulty in distinguishing between beef and pork often leads to fraud by meat traders. Particularly in Indonesia, where the consumption of beef and pork is high, this confusion raises significant concerns, especially since pork is prohibited in the Islamic religion. This research aims to address this issue by applying Artificial Intelligence technology, specifically the Convolutional Neural Network (CNN) deep learning method in classifying images of beef, pork, and mixed meat. The study utilizes a dataset of 410 samples, with 70% used for training and 30% for testing. Testing is conducted using a basic CNN model with hyperparameter analysis such as image size, number of epochs, and batch size. Additionally, the dataset is tested using a comparative architecture, namely the ResNet-50 architecture. The best accuracy rate of the CNN model is 82.20%, achieved with an image size of 75 x 75 pixels, 100 epochs, and a batch size of 64. Testing with the ResNet-50 architecture yields the highest accuracy of 76.14%. Evaluation is performed using a confusion matrix with four categories: Accuracy, Precision, Recall, and F1 Score.
Implementasi Algoritma Beale-Powell Restarts untuk Prediksi Perkembangan Ekspor Migas-NonMigas di Indonesia GS, Achmad Daengs; Lubis, Mhd. Dicky Syahputra; Mahjudin, M
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.786

Abstract

This research aims to implement the Beale-Powell Restarts algorithm in predicting the development of oil and non-oil exports in Indonesia. With the increasing importance of international trade for the economic growth of a country, accurate understanding of export trends becomes crucial for decision-making at the policy level. The data used in this study originates from the value of oil and non-oil exports (in Million US$) in Indonesia obtained from the customs documents of the Directorate General of Customs and Excise (PEB and PIB). The implementation method of the Beale-Powell Restarts algorithm is focused on analyzing and forecasting export development trends. This algorithm is known for its ability to address convergence issues commonly encountered in nonlinear optimization. By applying this algorithm, the research aims to improve the accuracy and precision of predictions, providing valuable insights for economic planning and trade strategy development in Indonesia. The study also includes a comparison of the performance of several different models in prediction, with various models such as 8-5-1, 8-10-1, 8-15-1, 8-20-1, and 8-25-1 being evaluated. The research findings indicate that the best model is 8-5-1, which has the lowest testing Mean Squared Error (MSE) value of 0.00735820154, affirming that the use of the Beale-Powell Restarts algorithm yields better results in predicting the development of oil and non-oil exports in Indonesia compared to other models. It is hoped that the implementation of the Beale-Powell Restarts algorithm will make a significant contribution in assisting stakeholders in formulating more effective and sustainable trade policies to advance the Indonesian economy.
Tinjauan Digital Leadership Dan Digital Transformation Berdasarkan Scoping Review Alawiah, Enok Tuti; Tukiran, Martinus
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.777

Abstract

This article aims to conduct a review using Scoping Review in the journal The International Journal of Management Education which is a Q1 Scopus journal. The journals observed were 16 articles. The aim was to determine research trends related to Digital Leadership and Digital Transformation. The Scoping Review method uses PRISMA with steps, namely identifying the problem, searching for literature sources, selecting literature, compiling and producing results, and determining the article. The observation result is that much of the research was carried out in developed countries. Different patterns were found in 2020, 2021, 2022 and 2023 regarding Digital Leadership and Digital Transformation. The research focus is also diverse and reveals many facts about Digital Leadership and Digital Transformation