Journal of Computer System and Informatics (JoSYC)
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles
443 Documents
Implementasi Metode MAUT Dalam Menentukan Prioritas Produk Unggulan Daerah Dengan Menerapkan Pembobotan ROC
Agung Triayudi;
Jumpa Dorisman Rajagukguk;
Mesran Mesran
Journal of Computer System and Informatics (JoSYC) Vol 3 No 4 (2022): August 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v3i4.2216
As the industry grows, the competition for superior products in this region is getting tougher. This competition will force all industries to pay more attention to policy making. Decision making to prioritize the best regional products according to needs and capabilities requires accurate and effective decisions to make the right choice and minimize losses in both cost and time. With the problems mentioned above, local governments (PEMDAs) are bothered with determining the priority of regional superior products quickly and precisely. Therefore, to determine the priority of regional superior products, a decision support system is needed to facilitate work and avoid errors in calculating system data quickly and more accurately. The Rank Order Centroid (ROC) and Multi Attribute Utility Theory (MAUT) methods are a combination of methods that support in determining the priority criteria for regional superior products. The results of the application of the combination according to the formulas and methods used to obtain the highest value alternative are Coffee products with the first rank, namely 0.00653.
Penerapan Algoritma K-Means Pada Pemetaan Kemampuan Penggunaan Teknologi Informasi Remaja dan Dewasa di Indonesia
Ronal Watrianthos;
Reti Handayani;
Ade Fitrah Putra Akhir;
Ambiyar Ambiyar;
Unung Verawardina
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2264
In modern-day Indonesia, having access to various forms of technology is regarded as crucial. This is because the IT skills gap will only grow worse if the government does not act swiftly to make technology more accessible to the general public. PISA suggests that schools may gain much more from incorporating IT into their curriculum if they did so. The goal of this research is to establish whether or not there are notable variations in the level of knowledge in information technology across the different provinces in Indonesia. Official data from the Central Statistics Agency for 2019-2021, including information on the number of adolescents and adults aged 15-59 with abilities in the field of ICT at the provincial level, is used in the clustering calculation. The K-means algorithm is one unsupervised learning technique for clustering data into collections with other instances that share similar properties. The results showed that the seventh cluster had the lowest DBI value of the three examined, coming in at -0.357. Cluster 0 has the lowest average percentage of the population with IT skills, at 29.32%. Only in Papua Province will you find this particular zero cluster.
Topologi Redundansi Link Untuk Keamanan Serta Mitigasi Ketersediaan Jaringan Komputer Menggunakan Rapid Spanning Tree Protocol
Mohammad Taufan Asri Zaen;
Ahmad Tantoni
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2336
The frequent occurrence of natural disasters requires telecommunications companies to require a backup internet backbone line if the telecommunications infrastructure is damaged/disconnected due to natural disasters. Reporting from inet.detik.com APJII revealed that the Jakarta-Singapore fiber optic network had broken, which had an impact on internet services in Indonesia. Fiber optic repair can take up to 2-3 weeks requiring network backup, the main solution for network backup with satellite, but problems will arise when configuration for satellite lines takes 1-2 days. Problems arise again when combined between fiber optic internet lines and satellite internet lines which cause the looping network to create network disturbances, to maintain interference, a spanning tree protocol method is needed to backup lines automatically and create link redundancy if one of the lines is problematic or disconnected. The purpose of this study is to design a link redundancy topology for security and mitigation of network availability using the rapid spanning tree protocol (RSTP) with router rb750gr3, switch rb260gs and switch dgs-108. In the RSTP network topology, it is designed with 3 redundant lines connected between the rb260gs switch and the dgs-108 switch, with an on-stick router rb750gr3 and is designed with 6 access mode vlan lines. In testing the inter-vlan network, RSTP terminates the redundancy link and then uses the ping command at the command prompt to determine how many minutes to backup the link. The NDLC method is used in determining how many seconds to backup this redundancy link using. The results of testing the link termination ether2-switch-mikrotik and ether1-switch-dlink using the "ping" command for 20 seconds in determining how many seconds to backup the link get the result that Request Time Out does not occur and the average time for each pc in determining the backup path for the pc-vlan20 22.9ms, pc-vlan30 35ms, pc-vlan70 23.5ms. The results of link termination testing ether3-switch-mikrotik and ether2-switch-dlink using the "ping" command for 20 seconds in determining how many seconds to backup the link get the result that there is no Request Time Out and the average time for each pc in determining the backup path for the pc-vlan20 23ms, pc-vlan30 24ms, pc-vlan70 43.7ms.
Klasifikasi Jenis Mangga Berdasarkan Tekstur Tulang Daun Menggunakan Metode Learning Vector Quantization (LVQ)
Valian Yoga Pudya Ardhana;
Joni Saputra;
M Afriansyah
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2420
Mango is a fruit plants that has the potential to be developed because it has a high level of genetic diversity. Mangoes vary in shape, size and color of the fruit, indicating a fairly wide genetic diversity. Of the many genetic diversity and types of society, there are still many who cannot distinguish them. This study builds an application to distinguish mango species based on the leaf bone structure where the feature extraction process uses the Learning Vector Quantization (LVQ) method. Then do the merging to produce a specific feature vector, then the classification calculation is carried out using the Euclidean Distance method to identify the type of mango fruit. The results of the study with the amount of training data as many as 6 images and testing data as much as 15 obtained system accuracy, with the calculation results, the remaining clusters are cluster 3 with a centroid value of R = 151.67 G = 145 and B = 153.33. From the test results with 2 scenarios, the mango golek type has low values, namely 50 and 60 because the mango golek type has less brightness than the other 2 types of mango.
Sistem Pendukung Keputusan Menentukan Kelayakan Lahan Pembibitan Menggunakan Metode Multi Attribute Utility Theory
Juniar Hutagalung;
Asyahri Nasyuha;
Titin Pradita
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2429
Determining the location of plantation land is a very important role to support the development of oil palm plantations and also factors that support plantations to produce oil palm fruit with good quality. To help companies produce palm oil with the best quality fruit, it is necessary to have the appropriateness of the land used for oil palm planting from the seedling process. PT. Fajar Agung experienced several difficulties in making a decision to choose suitable land for oil palm seedlings, so making a decision took a long time. In determining the feasibility of oil palm nurseries, a decision support system is needed by applying the Multi Attribute Utility Theory (MAUT) method. The purpose of this study is to implement a decision support system in determining the feasibility of oil palm nurseries using the Multi Attribute Utility Theory (MAUT) method to be more effective and efficient for the leadership in making a decision so that the company does not suffer losses. From the calculation results to be used as an oil palm nursery with an assessment that is more than 0.500 which is declared feasible there are 6 alternatives, namely A5 (Block 5), A6 (Block 6), A7 (Block 7), A8 (Block 8), A11 (Block 7A ) and A1 (Block 1) with the highest score of 0.838. MAUT method can be used as an alternative method to perform calculations based on predetermined criteria so as to facilitate decision making.
Penerapan Metode Naive Bayes Dalam Rekomendasi Strategi Penerimaan Peserta Didik Baru
Afan Hafara Sani;
Agus Setiawan;
Ardhin Primadewi
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2438
New Student Admission (PPDB) is a school spearheading activity in getting students, especially for private schools. SMK Muhammadiyah 1 Borobudur as one of the private vocational schools in Magelang Regency. SMK Muhammadiyah 1 Borobudur has problems related to the PPDB promotion strategy. The PPDB promotion that has been carried out has not fully shown a significant promotion growth to increase the number of students registering each year and PPDB information has not yet reached remote areas of Magelang Regency. In determining the promotion media for PPDB SMK Muhammadiyah 1 Borobudur, this study uses the Naïve Bayes algorithm. Naïve Bayes is a classification method using probability and statistics to predict future opportunities based on the past. By using the nave Bayes algorithm which is applied with a ratio of 70:30 for train data and test data, it is able to produce an accuracy of 72%. To maximize the results of data accuracy, this study used the k-fold cross-validation method with k=10 times resulting in an accuracy of 75%. In addition, it can be seen that 3 PPDB information is recommended for promotional media, namely student partners, alumni and Instagram.
Penerapan Metode Posenet untuk Deteksi Ketepatan Pose Yoga
Raynaldi Ahmad Asshidiqy;
Agus Setiawan;
Dimas Sasongko
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2444
When someone does yoga activities, usually, someone follows yoga guidelines in the form of yoga classes and yoga self-guidance, which is usually in the form of images, videos, and audio. But along with the rapid development of technology, now there are many yoga guides and easy to get. Yoga activities can now be done independently without approaching a yoga instructor. The purpose of this study is to help yogis to be able to do yoga correctly and to follow yoga guidelines with the correct poses with a system that contains yoga poses and also as the main feature of correcting yoga poses that yogis do to get yoga poses correctly. The resulting system will capture yoga poses and detect whether the pose is correct according to the yoga pose guidelines. Based on the verification of the distance between the device or the device that has a camera, it is placed at a distance of 200cm – 250cm between the device and the yogis. The device's height is placed in a place that has a height half the size of the yogi's whole body or at the height of 85cm. The test results using the BlackBox method get no errors. Besides that, the system can run well in a room with 7-watt LED lights, and no objects block the yogis, so the camera catches the whole body.
Penerapan Algoritma Advanced Encryption Standard (AES) Untuk Keamanan Data Transaksi Pada Sistem E-Marketplace
Muhammad Riyan Andriyanto;
Pristi Sukmasetya
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2451
Sriwedari Village known as a producer of superior plant seeds and fruits in the Salaman District area. The Sriwedari Seed Shop is a form of business from the village government that sells various kinds of plant seeds and fruits from nurseries by the local community. However, in its application the sales and transaction system still uses a fairly conventional method. By opening an offline store and marketing products through social media networks, the Sriwedari Seed Shop has less regular customers. Not to mention the risk of fraud from customers who order seeds through social media is a concern for sellers Therefore, this research was conducted with the intention of answering the problems above by creating an e-marketplace system in the form of an online store that will be integrated with a payment gateway that has various online payment methods. In addition, data security will also be applied to the payment system using the Advanced Encryption Standard (AES) cryptographic algorithm which functions to encrypt payment transaction data so that data records stored in the database are not easy to read and prevent misuse of data by parties who do not have access rights. The method used in developing this system is Rapid Application Development (RAD). This method is very suitable to be applied in software development with minimal resources so that it can speed up the iteration process at each stage of development while still paying attention to input from potential system users. The results of this research are an integrated e-marketplace system with payment gateway services that have various payment methods with transaction data security using the AES cryptographic algorithm.
Penerapan Metode Certainty Factor Pada Sistem Pakar Diagnosa Penyakit Diabetes Melitus
Ahlan Ismono
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2465
Diabetes Mellitus is a disease that occurs in metabolism at a chronic level. Diabetes Mellitus has always been a frightening disease for the community, this is because diabetes mellitus is a disease that causes death with a fairly high risk of death. Early diagnosis of diabetes mellitus or the community to find out diabetes mellitus is very important. Early diagnosis that is carried out causes early problems, especially for the community. This is because to carry out an examination of diabetes mellitus, laboratory tests must be carried out in hospitals, carry out an overall body examination and the costs are quite high. In addition, there is also limited information by the public on the signs or symptoms that allow a person to be indicated for diabetes mellitus. Therefore, it is necessary to solve these problems to assist in the early diagnosis process by the community. An expert system is a system that is already part of computerization. Computerized expert systems can diagnose certain diseases based on the knowledge stored in the expert system. The certainty factor method is one method that can be used in the process of solving the expert system. The certain factor method can produce an accurate value based on the symptom weight value that has been selected by the patient. The results of the study found that the accuracy value obtained from the process of diagnosing diabetes mellitus was 94,78%.
Implementasi Algoritma K-Nearest Neighbor Dalam Mendiagnosis Kurap Pada Kucing
Marsono Marsono;
Asyahri Hadi Nasyuha;
Saiful Nur Arif;
Muhammad Zunaidi;
Nur Yanti Lumban Gaol
Journal of Computer System and Informatics (JoSYC) Vol 4 No 1 (2022): November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/josyc.v4i1.2479
Ringworm is an infectious disease caused by keratinophilic fungi on the surface of the skin or other parts of tissues that contain keratin (fur, nails, hair, and horns) in animals and humans. Some fungal species are zoonotic because infected animals can be a source of transmission to humans and vice versa. This disease is often found in domesticated animals and is the oldest mycotic disease in the world. This skin disease is called ringworm because it is thought to be caused by worms and because the symptoms begin with inflammation of the skin's surface which if left unchecked will enlarge to form a ring like circle. The K-Nearest Neighbor (KNN) algorithm is a method for classifying new objects. KNN is a supervised learning algorithm, where the results of new query instances are classified according to the majority of categories in KKN. The class that appears the most is the class resulting from the classification. Nearest Neighbor is an approach to calculate the proximity between the new case and the old case, which is based on matching the weights of a number of existing features. This study aims to make it easier for patients to know the health condition of their pet cat.