cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 5 Documents
Search results for , issue "Vol 3 No 2 (2022): Februari 2022" : 5 Documents clear
Penerapan Metode Certainty Factor Dalam Diagnosis Gangguan Depresi Septian Rico Hernawan; Hanung Adi Nugroho; Indriana Hidayah
Journal of Computer System and Informatics (JoSYC) Vol 3 No 2 (2022): Februari 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v3i2.643

Abstract

Globalization can cause several problems and pressures of mind for both individuals and groups. Various kinds of problems can certainly lead to psychological disorders, one of which is depression. Indonesia itself is one of the countries with a high number of people with depressive disorders. Depressive disorder itself can have many consequences ranging from lack of enthusiasm to even death. Facing these serious problems, the government should be able to address the mental disorder that is currently happening. However, the reality is still far from this. Inadequate infrastructure, equality problems for each region, and shortages of experts are the main problems at this time. The expert system is considered to be a solution in solving these problems. Web-based expert systems can replace the role of experts in the process of initial diagnosis of depressive disorders, patients can also access them easily. The calculation method implemented is the Certainty Factor method. This method is considered suitable in the diagnosis of depression. The implementation of the CF method in the diagnosis of depression can provide a confidence level of up to 94.9%. The expert system is expected to be able to eliminate human errors, speed up the diagnostic process, make it easier for health workers, and provide standards for related parties in handling mental disorders
Analisis Modifikasi Pembangkitan Kunci Rivest Code 2 Dengan Metode Belum-Micali Generator (BM-G) Untuk Meningkatkan Nilai Confusion Terhadap Record Data Login Pada Database Chairun Nisa Lubis
Journal of Computer System and Informatics (JoSYC) Vol 3 No 2 (2022): Februari 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v3i2.953

Abstract

The login data record in the database is a table that stores a number of data related to the username and password. The information contained in the username and password data certainly cannot be accessed arbitrarily by others, because the data is confidential. The discussion that will be carried out in this research is to conduct an analysis of the Rivest Code 2 key generation which is then modified by combining the method of generating the Not-Micali Generator (BM-G) key. The results of the modification process for Rivest Code 2 key generation, then testing the Rivest Code 2 algorithm for activities to increase the value of confusion for data records in the database
Perancangan Aplikasi Deteksi Orisinalitas File Dokumen Menerapkan Algoritma Ripe-MD 128 Samsir Samsir
Journal of Computer System and Informatics (JoSYC) Vol 3 No 2 (2022): Februari 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v3i2.954

Abstract

Detection of the originality of this document file is carried out on text documents to find out changes in the contents of the text in the document and avoid plagiarism or plagiarism of the text. Plagiarism or plagiarism means imitating or imitating or stealing other people's writings and works which are later recognized as one's own writing with or without the permission of the author. Plagiarism of this document file is often applied by academics both at the school and university levels. To overcome the problem, a solution is needed to detect the authenticity of the document file. The process of detecting the originality of this document file uses the Ripe-MD 120 method, where the output is a set of hash values ​​obtained through that method. RIPE-MD was developed for the European Community RIPE project. This improvement and development was carried out because many cryptanalytic efforts had been carried out on RIPE MD-128 and based on the information obtained, RIPE MD-160 was created. RIPE MD-128, the resulting hash value only has a length of 128 bits which is able to detect the authenticity of an image document file.
Penerapan Metode MOORA dalam Penentuan Karyawan Terbaik Fitry AF Togatorop; Mesran Mesran
Journal of Computer System and Informatics (JoSYC) Vol 3 No 2 (2022): Februari 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v3i2.1282

Abstract

MOORA in the decision support system for determining the best employees performs a ranking with several stages. These stages are always carried out in the same way even though it is known that there are different input values. However, for the same input value, it will be difficult to get results in determining the ranking. The selected results will of course be carried out in an alternative order. From the research results, it is expected to determine the best employees by applying the MOORA method
Penerapan Algoritma Transformasi Walsh-Hadamard dalam Pemampatan File BMP Ainun Mardiah; Berto Nadeak
Journal of Computer System and Informatics (JoSYC) Vol 3 No 2 (2022): Februari 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v3i2.1283

Abstract

The size of the image file in the bmp format is relatively large, where the better the quality of the resulting image, the larger the pixel size required to record the image, the compression process is one of the alternatives that is needed to reduce the capacity of an image file, so that it is not too wasteful in using space storage. With the size of a data that has been reduced or bit reduced to an image file, when moving or sending an image file that has been bit done, the process of moving the file will be easier and faster. because the storage space media has enough space to store an image file that has scattered bits or the compression process of a file that has been moved. The compression technique in the application uses the Walsh Hadamard Transformation algorithm to produce a compressed image and change the initial size, image character content, and parameters for compression of Cr (Compression Ratio) in reducing file size.

Page 1 of 1 | Total Record : 5