cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.json@gmail.com
Editorial Address
STMIK Budi Darma Jln. Sisingamangaraja No. 338 Telp 061-7875998
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Sistem Komputer dan Informatika (JSON)
ISSN : -     EISSN : 2685998X     DOI : https://dx.doi.org/10.30865/json.v1i3.2092
The Jurnal Sistem Komputer dan Informatika (JSON) is a journal to managed of STMIK Budi Darma, for aims to serve as a medium of information and exchange of scientific articles between practitioners and observers of science in computer. Focus and Scope Jurnal Sistem Komputer dan Informatika (JSON) journal: Embedded System Microcontroller Artificial Neural Networks Decision Support System Computer System Informatics Computer Science Artificial Intelligence Expert System Information System, Management Informatics Data Mining Cryptography Model and Simulation Computer Network Computation Image Processing etc (related to informatics and computer science)
Articles 492 Documents
Analisis Vulnerability Management Pada Container Docker Menggunakan Opensource Scanner Berdasarkan Standar Cyber Resilience Review (CRR) Milenia Oktaviana; Adityas Widjajarto; Ahmad Almaarif
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4787

Abstract

One of the most widely used container technologies to provide IT services is Docker. The vulnerability in container technology, namely Docker, requires special management. Management of this vulnerability can be done technically with a software vulnerability scanner and standard Cyber Resilience Review (CRR) guidelines. Experiments were carried out with Aquasec and Anchore scanners that performed vulnerability scanning on two Docker Images systems. The two vulnerable systems have different versions, namely version – 1 and version – 2. The software elements in version – 2 have a higher versioning level than version – 1. Experimental data in the form of vulnerability reports are analyzed based on Cyber Resilience Review (CRR) which focuses on four stages namely Define a Strategy, Develop a Plan, Implement the Capability, Assess and Improve the Capability. So that the results of Category Vulnerability are obtained, namely 30 Closed Vulnerability, 10 Open Vulnerability, and 13 Newly Vulnerability. Continuation of this research can use aspects of Patch Management with more varied software tools.
Implementasi Metode Perbandingan Eksponensial (MPE) Pada Sistem Pendukung Keputusuan Pemilihan Internet Protocol Camera Umbar Riyanto; Nurdiana Handayani; Mohammad Imam Shalahudin
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4875

Abstract

The development of video surveillance has given rise to various types of surveillance cameras, one of which is the Internet Protocol Camera (IP Camera). The number of IP Camera brands in the market, makes people who want to buy IP Cameras have to find their own information about the specifications and capabilities of the IP Camera to be purchased. It takes time and effort to choose an IP Camera, because you have to learn one by one which IP Camera to buy. This study aims to build a decision support system for choosing an IP Camera with a website-based Exponential Comparison Method (MPE) to make it easier to determine the right IP Camera. MPE can sort the priority of decision alternatives on existing criteria and is able to distinguish the value of each alternative in contrast. Based on the case study, the best alternative is Xiaomi Mi 360 with a value of 386, followed by Yi Home Camera 3 getting a value of 369, Ezviz C6N getting a value of 350, Imilab EC4 getting a value of 343 and Cleverdog Egg Cam getting a value of 110. The results of the MPE calculation generated by the system shows the same value as the manual calculation, then the MPE calculation on the system is declared valid. In addition, the test results with black-box testing show that the system can run well.
Development of Android-Based Network Service Technology Learning Media for Vocational Middle School Students Helmiza Helmiza; Dedy Irfan; Asrul Huda
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4384

Abstract

Information and communication technology have developed along with globalization so that interaction and information delivery will quickly. One of the problems in education that is a priority to immediately find a solution is the problem of the quality of education, especially the quality of learning. From various existing conditions and potentials, efforts that can be made regarding quality improvement in schools are to develop a student-oriented learning system (children center) and facilitate students' needs for learning needs that are challenging, active, creative, innovative, practical, and fun with developing and implementing Information and Communication Technology-based learning This research is a Research and Development research with the media development model used referring to the type of Four-D development consisting of 4 stages, namely Define (defining), Design (design), Develop (development) and Disseminate (dissemination) which is carried out in Vocational High School class XI Computer and Network Engineering. The test subjects in this study were students of class XI Computer and Network Engineering SMK. The results of the three validators' overall assessment of the validator test assessment of Android-Based Learning Media is 94.28%, so the level of validity can be interpreted as Very Valid for use. Overall, the practicality assessment of Android-Based Learning Media as a learning resource is 88.46%, so the practicality level can be interpreted as Very Practical to use. As well as the assessment of the effectiveness of the Android-Based Learning Media of 90.86%, so that the level of effectiveness can be interpreted as very good for use.
Implementasi Klasifikasi Data Mining Untuk Penentuan Kelayakan Pemberian Kredit dengan Menggunakan Algoritma Naïve Bayes Agung Triayudi; Sumiati Sumiati
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4653

Abstract

Credit today is very widely used in the transaction process. At first, lending was only done by banks, but with the development of time and also the increasing needs and purchases from the public, lending is not only done by banks. The granting of credit for financing goods by the company to the buyer is not done haphazardly, but must go through several selection processes. The process of granting credit must be carried out through detailed and strict stages. This causes the process to be lengthy and also lengthens the work of the selection team. Data mining is a data processing technique that is useful for obtaining important patterns from data sets. The Naïve Bayes algorithm is part of the data mining classification process. The process of the Naïve Bayes algorithm is based on the concept of the Bayes theorem. The result of the research is that the new alternative data is ACCEPTABLE for credit applications, it can be seen that the probability value of ACCEPTED is greater than the probability value of REJECTED, which is 0.011108
Sistem Pendeteksi Keamanan Ruangan “Smart Security” Dengan Metode Fuzzy Logic Menggunakan Sensor PIR Berbasis Internet of Things (IoT) Rima Tamara Aldisa; Sechan Alfarisi
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4862

Abstract

The system is an attempt to assist in detection using sensors, an effort made for a room or house if people come or enter. A tool is designed that can be easy, affordable and can be used to prevent the danger of unknown people from entering the room or even into our homes. The author designed a "Smart Security" Room Security Detection System Using the Fuzzy Logic Method Using Internet of Things (IoT)-Based PIR Sensors. sending messages if someone enters the room or house so that the owner knows if someone is unknown. The author wants to design and make this tool that can be very helpful for use inside or at home in order to minimize the danger of people who cannot be recognized entering, room security detectors here with a distance of 1 cm to 2 meters the sensor can still be detected, if it exceeds 2 meter then the sensor will not read if anyone comes.
Pembangunan Smart Detection Absensi Berbasis Kartu RFID dan ESP 32 Fikri Fajar Asshiddiqi; Agung Triayudi; Rima Tamara Aldisa
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4912

Abstract

In today's era with the rapid development of technology and the development of semiconductor technology, it is possible to create integrated circuits on an increasingly large scale and can integrate many different systems. One of the benefits of current technological developments in the attendance recording tool, whose data is integrated into the learning information system to replace the manual recording model. This tool is designed by integrating the work of a radio frequency identification (RFID) microcontroller into one system. The extracted data as a unique number from the RFID tag is used as student data. After the card is attached to the assessment device, student data will automatically be entered into the attendance database. By making this tool, it can facilitate the work and activities of students and lecturers in conducting lecture activities and also as learning for all in this period of rapid technological development
Vulnerability Management Pada Vulnerable Docker Menggunakan Clair Scanner Dan Joomscan Berdasarkan Standar GSA CIO-IT Security-17-80 Ryan Supriadi Ramadhan; Adityas Widjajarto; Ahmad Almaarif
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4789

Abstract

Vulnerabilities in Docker need to be managed considering that this vulnerability is one of the potentials for exploitation, this can happen because Docker is a container related to application and system security. This study analyzes the vulnerability management process in Docker Images and Docker Images Applications using the GSA CIO-IT Security-17-80 standard. This vulnerability search uses two scanning tools, namely Clair Scanner and JoomScan. Vulnerabilities in Docker Images and Docker Images application version - 1, were overcome by creating a new system, namely version - 2 which upgrades the Docker Images software and Docker Images application. The test scenario is run by scanning for vulnerabilities in two versions of the trial system, in the form of a vulnerability report. The data was analyzed using the GSA CIO-IT Security Standard-17-80 which was limited to the stages of Scanning Capabilities, Vulnerability Scanning Process, Vulnerability Scan Reports, Remediation Verification, and Re-Classification of Known Vulnerabilities. The result is the fastest scanning time is in version - 2, the results of the comparison of vulnerabilities obtained are 44.45% on Docker Images and 77.78% on Joomla. So that the contribution that can be given is to provide an overview of the use of the GSA CIO-IT Security-17-80 standard as a guide for managing the security of an IT asset based on the stages carried out. Continuation of research can be in the form of using the 6 stages of GSA with the support of adequate vulnerability data from the right scanner software.
Seleksi Fitur untuk Prediksi Hasil Produksi Agrikultur pada Algoritma K-Nearest Neighbor (KNN) Delvi Nur Aini; Bella Oktavianti; Muhammad Jalal Husain; Dian Ayu Sabillah; Said Thaufik Rizaldi; Mustakim Mustakim
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4813

Abstract

Agriculture is one of the largest economic driving sectors in Indonesia. The Central Statistics Agency (BPS) in 2021 recorded that 37.02% of Indonesia's population worked in the agricultural sector. The problem faced by farmers today is the decline in yields, both in quantity and quality due to unpredictable weather, making it difficult for farmers to choose the types of plants that are suitable for planting. The application of data mining techniques has problems related to the complexity of weather parameters and natural conditions that support agricultural production, so it is very important to do feature selection, namely to form the most relevant features. This study conducted an experiment to determine the effect of implementing the Principal Component Analysis (PCA) selection feature on the performance of the K-Nearest Neighbor (KNN) algorithm which produces the highest accuracy of 99.64% in this study.
Implementasi Algoritma K-Nearest Neighbors Pada Penentuan Jurusan Siswa M. Daffa Alkhussayid; Ferdiansyah Ferdiansyah
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4759

Abstract

SMA Negeri 8 Palembang has two majors, namely science and social studies. Determination of majors is done when in class X to determine the majors of the student. This research was conducted because the teacher had difficulty in determining the majors at SMA Negeri 8 Palembang. In the research case, the researcher uses the classification with the k-Nearest Neighbors algorithm, and the Euclidean distance measurement method to predict the students in determining the majors that will be taken by students. The source of the data for this research is the report card scores for the X grade students of SMA Negeri 8 Palembang, and the data for this research are 335 data on the grade X students of SMA Negeri 8 Palembang. The data collection was taken from the grade X class report cards, namely mathematics, physics, biology, English, Indonesian, history, geography, economics, and psychological test scores. In determining the majors, students in science and social studies get the average score of all subjects and the psychological test scores produced by these students to enter the science department with an average score of 80, math score 78, physics 78, biology 78, and psychological test 80. If students get an average score below 80, it will be predicted to enter social studies, to enter the social studies department with a minimum score of 70 geography subjects, 70 economics, 70 history, and 70 psychological test scores. The results obtained in this study used the K method. -Nearest Neighbors based on training data obtained from 335 student data, 101 classified social studies class according to predictions, 10 data predicted social studies, but data declared natural science, 2 science prediction data and, 222 data according to natural science predictions, and the accuracy got 96% and the results of observations using the Website using K-NN show the same data results obtained through an accuracy of 96%.
Implementasi Algoritma Frequent Growth (FP-Growth) Menentukan Asosiasi Antar Produk Rangga Yogasuwara; Ferdiansyah Ferdiansyah
Jurnal Sistem Komputer dan Informatika (JSON) Vol 4, No 1 (2022): September 2022
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v4i1.4894

Abstract

Data accumulation is caused by the amount of transaction data stored. By utilizing the sales transaction data in the database, the data can be further processed into useful information for managers to make decisions. With the existence of data mining, it is hoped that it can help the Leaning Shop to find the information contained in the transaction data into new knowledge. Association Rule, which is a procedure in Market Basket Analysis to find relationships between items in a data set or it can be said that this association rule aims to find a collection of items that often appear at the same time and display them in the form of consumer habits in shopping. The FP-Growth algorithm is an algorithm that can be used to determine the data set that appears most often (frequent itemset) in a data, in the search for frequent itemset in a data set by generating a prefix-tree structure or often called the FP-Tree. From the test results it can be concluded that the application of data mining using the FP-Growth Algorithm can be used to analyze consumer spending patterns.