cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 17 Documents
Search results for , issue "Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020" : 17 Documents clear
Aplikasi Optimalisasi Penjadwalan Proyek dengan Metode Harmony Search (Studi Kasus: AKSDAI) Yusida Widana
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Scheduling is one of the important stages in the industrial world, especially in terms of building a building. Usually in handling a development project, resources are available in a limited amount of resources. The purpose of project scheduling is to optimize project scheduling with the Harmony Search method. Harmony Search method is a method that adopts the process of finding a blend of tones in order to obtain beautiful musical harmony. Similarly, the optimization process that looks for optimal or perfect solutions based on functions and objectives. Harmony Search (HS) was first introduced by Zong Woo Geem in 2001. The basic idea of ​​Harmony Search is to mimic the process of improving the harmony of music undertaken by music choir groups. When a music choir makes improvements to the harmony of the music being played, there will be three possible choices, including playing well-known harmony music based on their memories, playing harmony music that is similar to well-known harmony music but there is little adjustment, or making harmony music that is new.
Penerapan Algoritma Rice Codes dan Algoritma Rivest Shamir Adleman (RSA) Untuk Kompresi dan Pengamanan Teks Pada Aplikasi Chatting Vify Ernanda; Surya Darma Nasution; Fince Tinus Waruwu
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the development of information in this day and age chat plays an important role in all aspects of human life. Where chat as a communication tool that can help communicate without any time restrictions and is free from obstacles. But in communicating through chat applications can not be free or as free in communicating as usual. Where chat has a predetermined number of bits, so that in sending text messages the chat application cannot be at once or in one delivery but in multiple transmissions. Therefore the chat application requires a compression where the text messages to be sent through the chat application do not take a long time and do not send several times. It is enough to send only one text message to those addressed. But sometimes text messaging is not only a problem in many or few text messages to be sent there are other obstacles in sending text messages that must be overcome. Text messages that have been sent to those intended, sometimes the text messages have changed not at its disposal or not the same as what was sent. Therefore the chat application is in need of security on the chat application which can secure text messages to be sent to the intended destination without changing one bit. Chat applications provide solutions to communication problems because they are hampered by distance and time. Chat application provides convenience in communicating chat to several people who have great distances by applying the Rice Codes and Rivest Shamir Adleman (RSA) algorithm to chat applications that are designed using Miscrosoft Visual Basic 2008 programming language as a means of compressing and securing text messages.
Penerapan Teknologi Augmented Reality Dengan Metode Marker Based Tracking Untuk Media Promosi Objek Wisata Kabupaten Aceh Singkil Berbasis Android Syamsuwardin Syamsuwardin
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aceh Singkil is one of the districts in Aceh Province. As one of the regencies that has beautiful tourism objects, Aceh Singkil Regency prioritizes the tourism sector as one of its regional income. Promotions that are used to introduce existing tourism objects in the district of Aceh Singkil through conventional print media such as the usual brochures without involving increasingly developing technology are currently considered less attractive. Conventional promotional media such as brochures require innovation so that they are more interesting, by combining augmented reality technology to introduce tourism objects in the district of Aceh Singkil. Attractions introduced in the form of 3D and based on Android. Based on the above problems will be solved by providing innovation to the promotional media used such as brochures using the Augmented reality Marker Based Tracking method. That is expected to be more interesting and increase tourist visits to attractions in the district of Aceh Singkil.
Implementasi Algoritma Camellia Pada Penyandian Record Database Neti Rusri Yanti; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a database record by encoding it based on the Camellia algorithm, so that it produces a text record database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records.
Implementasi Metode Bilateral Filter Perbaikan Kualitas Citra RGB Nurega Harahap
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the process of capturing images using a camera or other sensors often experience problems and deterioration in quality, such as capture results that are not as expected. This can happen because of the possibility of a camera lens that is not focused, the lighting settings are not perfect, the presence of dust or other dirt on the camera lens. Improving the quality of an image is necessary so that someone can observe the image clearly and in detail without any disturbance bilateral filter method is a filter that functions to replace The value of a pixel with the convolution calculation results in the area covered by the filter, this convolution operation is often involved in neighboring pixel operations. Which then produces software applications that are able to reduce the effects of disturbing noise on digital images with the bilateral filter method. With this method, it is expected to be able to solve the problem of image quality improvement in image improvement applications. This study discusses that the process undertaken to implement image improvement based on the bilateral filter method, then an application is built using MATLAB 2013 as an editor to edit programs.
Jaringan Syaraf Tiruan Pengaruh Infuse Pada Berat Badan Pria dengan Menggunakan Metode Backpropagation Nurina Sianturi
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Artificial Neural Network or in short ANN, is a computational system where architecture and operations are inspired by knowledge of biological nerve cells in the brain, which is one of the artificial representations of the human brain that always tries to stimulate the learning process in the human brain. Infusion or also called intravenous infusion is a fluid that works to increase body fluids. Infusion fluid also functions to maintain normal body functions and provide adequate calorie intake, especially for male patients who are recovering and after surgery. In this study, implementing a backpropagation neural network method to study existing data in order to prove the presence or absence of the influence of the infusion on male body weight. The input used is an effect that occurs after the use of infusion, then represented by using the backpropagation algorithm
Penerapan Algoritma Ternary Comma Code Pada Aplikasi Kompresi File Gambar Nurma Ningsih; Surya Darma Nasution; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the discovery of a tool to capture an image (image) in the form of a camera making technological developments not only focus on the tools but also must focus on where the data is stored. The need for storage media is something that is needed in every communication tool. Data and information communication systems are not only in the form of text but can also be in the form of images, videos and audio. Image file size that is relatively larger compared to text files is one of the causes of the amount of memory used for storing image files. The size of the image file can also cause the length of time to send the image file. Image file compression process is one way that can be done to overcome the problem of image file size. Image compression is an attempt to minimize the file size or bytes of a graphic file without reducing the quality of existing images. A certain amount of storage, such as disk space or memory, makes it possible to reduce the image file size. Many algorithms that can be used to compress image file sizes include the ternary comma code algorithm that can help reduce image file sizes. The ternary comma code algorithm has a faster time space compared to other algorithms.
Penerapan Algoritma Rice Codes Pada Aplikasi Kompresi File Gambar Putri Fitria
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Along with the development of technology that is increasingly sophisticated as it is now, the more information is needed, various kinds of information needed such as image files. Image files are files that have a lot of characters so that they always cause memory storage problems. high storage activity can cause a problem where a large storage space is needed. Increasing data size can result in a waste of storage space to overcome one of these problems, namely by compressing using the rice codes algorithm method with the existence of these methods, it can store more information. The expected result is an application that can perform the compression process from large size to smaller size and can be decompressed to restore files that have been compressed into original files or original files.
Implementasi Steganografi dengan Metode Ranked Positional Weight Untuk File Mp3 Desman Siregar
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract Protecting information including multimedia documents is a major requirement in the era of information disclosure as it is currently. One way to overcome the above situation is to use steganography techniques. Steganography is the science and art of inserting secret messages in other messages so that the existence of the secret message cannot be known. To implement steganography using the Randked Positional Weight method by modifying the least significant bit or the last bit in one byte of data by using MP3 files as a storage medium. The results showed that the application was 100% successful in inserting and recalling messages that had been inserted. The result of message extraction has a message character compatibility level of 100% to the original message content. The size of the Mp3 after inserting a message is 100% the same as the size of the original Mp3. Mp3 files from steganography have very good quality above 50dB. However, steganography with the RPW method is not resistant to compression attacks that will cause the contents of the message in the Mp3 file to be lost.
Analisa Kinerja Guru Sekolah di Dinas Pendidikan Dengan Menggunakan Metode Rought Set (Studi Kasus: Dinas Pendidikan Provinsi Sumatera Utara) DTM Agus Rezki
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The teacher is an important resource in supporting the teaching and learning process. The quality of the teacher needs attention because it determines the quality of the teaching and learning process. Data mining has grown rapidly and added value to the information stored in the database. One fairly simple data mining algorithm is Rough Set. Teacher performance measurement can be done using the rough set method. Aspects or attributes assessed using the rough set method consist of: the process of teaching and learning, guidance and consultation, research and community service, and other tasks outside the main task. The research on teacher performance was conducted at the North Sumatra Provincial Education Office. The rough set method can be used to produce an output in the form of a Teacher's achievement. The purpose of applying this rough set method is to help the management in knowing the possibility of teacher achievement based on teacher data that has been stored so far. The benefit gained is that it can be determined early on that the prospective teacher's achievement is based on the knowledge gained through the rough set method. Tanagra is a data mining software in which several data mining methods are provided ranging from exploring data analysis, machine learning, and databases. Tanagra is an "open source project" because each researcher can access to the source code, and add his own algorithm, as long as he agrees and complies with the software distribution license.

Page 1 of 2 | Total Record : 17