cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 5 Documents
Search results for , issue "Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019" : 5 Documents clear
Penerapan Metode Transformasi Brovey Pada Pembesaran Citra Ultrasonografi (USG) Aslinawati Nasution
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (285.181 KB)

Abstract

In the process of taking an ultrasound image or the results of long-distance imaging with a telescope or the results of medical recordings including x-rays, ultrasound or scans, there are often disturbances in the form of light distortion, noise or other disturbances that cause objects in the image to be unclear or blurry. Medical ultrasonography (sonography ) is an imaging diagnostic technique using ultra sound that is used to image internal organs and muscles, their size, structure, and wound pathology, making this technique useful for examining organs. Obstetric sonography is commonly used during pregnancy. Image processing applications are increasingly widespread as in the medical world, image processing has a very large role in everyday life. In the field of ultrasound medicine or better known by the abbreviation USG is widely used in medical. Enlargement or zooming is a process carried out to enlarge an image. The enlargement process certainly has blur in the image so that the image will look like boxes. And there is a change in the size of the image This happens because in the enlargement process, the resolution that compiles the image becomes smaller to reduce it. Image enlargement is one of the fields in digital image processing that is getting enough attention because of the large need to obtain a better view or view of an image as for the method used is the brovey transformation method. Brovey transformation method is an easy method for combining data from different sensors. In this thesis will be discussed on how to create an image enlargement application using the brovey transformation method. This application was built with Matlab 2013 as an editor for editing programs
Perancangan Aplikasi Messanger Dengan Menerapkan Caesar Shift Berbasis Secret Sharing Bayu Syahputra
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (233.779 KB)

Abstract

The impact of chatting may not be realized at all. In addition to facilitating communication as a positive impact that humans get, there are also negative impacts that humans get as a result of using this chat. Confidentiality and security when exchanging data is very important in data communication, both for shared security purposes, and for individual privacy. the progress of the communication so many people who want to tap communication between one person and another that causes a lot of information or conversation is tapped without the knowledge of the owner of the information. There are several ways to secure data through an internet data channel, one of which is cryptography. Highly confidential data will be disguised in such a way that even if the data can be read it cannot be understood by unauthorized parties. Data to be sent and not yet encoded, then this plaintext will change to ciphertext. One of the algorithms that can secure the data discussed by the author is the Caesar Shift Algorithm.
Sistem Pakar Mendiagnosa Penyakit Polio Menerapkan Metode Hybrid Case Based Chintami Febri Idris
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.278 KB)

Abstract

Expert system of a computer system designed to be able to do reasoning like an expert or expert in a particular field. It should be noted, however, that this expert system is not a substitute for an expert or physician but is only for limited equipment, since this expert system is consultative and also has no such properties as a physician who is able to identify in detail the illness experienced by the patient with his or her thoughts . This expert system is made using Hybrid Case Based method. This method is a combination of the system that is Rule Based Reasoning (RBR) and Case Based Reasoning (CBR), this method has a better accuracy than the method running alone. This method will process a symptom so that can be detected disease suffered by the patient.
Pendeteksian Plagiarisme Skripsi Menggunakan Algoritma Levenshtein Distance Berbasis Web Ckristian Hutagalung
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Plagiarism is a violation that often occurs and deserves attention. Because the act of plagiarism is the act of plagiarizing other people's work and acknowledging it as a personal work. Therefore, the detection of plagiarism needs to be done to reduce plagiarism of the work of others. This study aims to detect the similarity of the title of the thesis text using the Levenshtein Distance algorithm so that it can be used to help determine plagiarism. The stages in the system are preprocessing which consists of case folding, tokenizing, filtering, stemming, sorting. After the preprocessing process, the next step is to calculate using the Levenshtein Distance method by measuring the similarity value so that it gets a similarity percentage value between the two titles. In this thesis, the author uses the Levenshtein Distance method is a string matrix used to measure the difference or distance between two strings
Optimalisasi Pelaksanaan Proyek Dengan Critical Path Method Studi Kasus PT. MNC Play Media Medan Daniel Pakpahan
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.398 KB)

Abstract

The process of optimizing planning to project control during the implementation of development is an important activity of a project, the success and failure of a project can be caused by inefficient planning so that it will cause delays. The critical path method (CPM) method can be used to measure project completion times more efficiently and effectively, so as to reduce the impact of delays and swelling on costs. This can be proposed by the project crashing process with three control alternatives: (i) adding labor, (ii) overtime work, (iii) adding subcontracts. With these results the expected results will be faster than project estimates at PT. MNC PLAY MEDIA MEDAN.

Page 1 of 1 | Total Record : 5