cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.json@gmail.com
Editorial Address
STMIK Budi Darma Jln. Sisingamangaraja No. 338 Telp 061-7875998
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Sistem Komputer dan Informatika (JSON)
ISSN : -     EISSN : 2685998X     DOI : https://dx.doi.org/10.30865/json.v1i3.2092
The Jurnal Sistem Komputer dan Informatika (JSON) is a journal to managed of STMIK Budi Darma, for aims to serve as a medium of information and exchange of scientific articles between practitioners and observers of science in computer. Focus and Scope Jurnal Sistem Komputer dan Informatika (JSON) journal: Embedded System Microcontroller Artificial Neural Networks Decision Support System Computer System Informatics Computer Science Artificial Intelligence Expert System Information System, Management Informatics Data Mining Cryptography Model and Simulation Computer Network Computation Image Processing etc (related to informatics and computer science)
Articles 755 Documents
Pengamanan Data File Teks (Word) Menggunakan Algoritma RC4 Dedy Ronald Saragi; Janter Manuel Gultom; Jose Andreas Tampubolon; Indra Gunawan
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1745

Abstract

Data security on computers can provide a protection for our data. Cryptographic techniques are very important techniques in securing data. Cryptography is the science of encryption techniques where the "original text" (plaintext) is encrypted using an encryption key into "random text that is difficult to read" (ciphertext) by someone who does not have a decryption key, one of the modern cryptographic methods developed is the RC4 algorithm. RC4 algorithm (Ron’s Code / Rivest’s Cipher) is one algorithm that can be used to encrypt data so that the original data can only be read by someone who has the encryption key.
Hasil Analisis Teknik Data Mining dengan Metode Naive Bayes untuk Mendiagnosa Penyakit Kanker Payudara Elma Tiana; Sri Wahyuni
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1766

Abstract

Breast cancer or Mammae Carsinoma is an uncontrolled cell growth in the milk-producing glands (lobular), the gland tract from the lobular to the Breast nipple (ductus), and the breast support tissues that surround the lobular, ductus, vessels Blood and limfe vessels, but does not include breast skin. Research begins by conducting a preprocessing stage, to eliminate missing values. After that the process is imputasi to remove missing values. It then performed a feature selection to see which attribute had a major impact on the data. The last stage is classification with two methods, namely Naïve Bayes. At the end of the study, the method is best to classify the recurrence data of breast cancer patients.
Klasifikasi Gambar Gigitan Ular Menggunakan Regionprops dan Algoritma Decision Tree Yoga Widi Pamungkas; Adiwijaya Adiwijaya; Dody Qori Utama
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1789

Abstract

Indonesia has a high biodiversity of snakes. Snake species that exist throughout Indonesia, consisting of venomous and non-venomous snakes. One of the dangers that can be posed by snakes is the bite of several types of deadly snakes. Snake bite cases recorded in Indonesia are quite high with not a few fatalities. Most of the deaths caused by snakebite occur due to errors in the handling procedure for the bite wound. This problem can be overcome one of them if we know how to classify snake bite wounds, whether venomous or non-venomous. In this study, a classification system for snake bite wound image was built using Regionprops feature extraction and Decision Tree algorithm. Snake bite images are classified as either venomous or non-venomous without knowing the kind of the snake. In Regionprops several features are used to help the process of feature extraction, including the number of centroids, area, distance, and eccentricity. Evaluation of the model that was built was found that the parameters of the number of centroids and the distance between centroids had the most significant influence in helping the classification of images of snakebite wounds with an accuracy of 97.14%, precision 92.85%, recall 91.42%, and F1 score 92.06%.
Perancangan Program Administrasi Pembayaran SPP, UTS dan UAS Pada MA Al-Marzukiyah Jakarta Yamin Nuryamin; Eko Setia Budi
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1852

Abstract

MA. Al-Marzukiyah is an Islamic high school parallel to senior high school. In the process of payment contributions education development, middle exam and final exam, a lot of data involved where all the data still be constructed manually. The research duty end of this is to make a design of the program payment administration based visual basic to be applied to MA. Al-Marzukiyah as a means of data processing and change manual system to a computerized system, where an instrument used to design application named ERD (Entity Relationship Diagram), LRS (Logical Relation Diagram) and Flowchart. This application made by using several software that is Microsoft Visual Basic 6.0 as software editor, Microsoft Access 2013 as a database and IcoFx 2 as symbol editor. Based program visual basic made this a strength in speed and the accuracy of in the process of data processing payment transaction, to simplify officers in data processing. This program also simplify performance in the process of reporting transaction data.
Implementasi Keamanan Jaringan Komputer Local Area Network Menggunakan Access Control List pada Perusahaan X Agung Tri Laksono; M. Alvian Habib Nasution
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1920

Abstract

In Company X, the use of the internet is a demand for workers. Therefore, an internet network is very much needed in a Company X. The absence of restrictions in the use of the internet network can interfere with the security and misuse of the internet network, for this reason the arrangements in the internet network are designed. One method used is the Virtual Local Area Network (VLAN) Access Control List (ACL) method that is applied to Company X. The Vlan Access Control List method is one of the techniques for requesting an internet network access or data communication and sending a number of data packets from one computer to another. The author resets the results proving that the Vlan Access Control List with the filtering and sharing method of internet connection users can filter and identify users who have restricted access to access other users or to servers in Company X to improve data security.
Evaluasi Keamanan Informasi Pada SMA N 1 Sentolo Berdasarkan Indeks Keamanan Informasi (KAMI) ISO/IEC 27001:2013 Wenceslaus Candraditya Pamungkas; Fahmy Trimuti Saputra
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1924

Abstract

Pada era modern seperti saat ini teknologi menjadi sangat penting, dimana aktifitas sehari-hari sering tergantung dengan alat elektronik, begitu pula dunia pendidikan juga menjadi salah satu unsur yang terdampak langsung perkembangan teknologi saat ini, dimana sekolah-sekolah mulai menerapkan sistem elektronik yang bertujuan untuk mempermudah proses integrasi satu dengan yang lain. Hal ini menjadi salah satu celah guna melakukan tindakan kejahatan di dunia cyberspace dengan mencuri data informasi yang tidak dilindungi dengan baik dan benar. Maka dari itu dengan adanya penelitian ini diharapkan SMA N 1 Sentolo yang merupakan salah satu sekolah percobaan K13 di Kabupaten Kulon Progo menjadi pilar yang menekankan pentingnya perlindungan data dan informasi yang ada di instansi terkait, supaya instansi terkait dapat menentukan alur terkait tata kelola keamanan sistem informasi yang ada pada organisasinya.
Aplikasi Passing Grade Program Studi Perguruan Tinggi Negeri di Indonesia dengan Menerapkan Algoritma Zhu Takaoka Ahmadin Sahri
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1938

Abstract

Passing Grades are often used as a benchmark for opportunities or considerations of graduation to college. And from the passing grade, we can also see the level of graduation to the state higher education study program, because if the passing grade is higher then the graduation level of the study program is lower and vice versa, if the passing grade is getting lower then the higher the level of graduation to the study program . The problem that occurs is the knowledge of the passing grade, because every student does not know about the passing grade of each major at a state tertiary institution in Indonesia. Which will make students / i will be hesitant and hesitant to choose majors and colleges that have the opportunity and ability of students to achieve majors and colleges that students want. Based on the above problems will be solved using the string maching algorithm, the zhu takaoka algorithm. Which will do the character or criteria matching and will bring up output that has the same or matching. In addition this research is based on Android, which will enable its use to be faster, easier and efficient.
Implementasi Algoritma Naive Bayes Untuk Menentukan Lokasi Strategis Dalam Membuka Usaha Menengah Ke Bawah di Kota Medan (Studi Kasus: Disperindag Kota Medan) Samuel Suprianto
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1939

Abstract

The business can be influenced by the location of the location and the type of business that was built in the specified location and can develop over time but it is not impossible for bankruptcy to occur because the type of business is not in the right location and promising due to factors that do not support at that location, include that area where the population is not too dense and the land is not that large. For this reason, the authors conduct research on strategic locations to open a particular type of business depending on the location found by the Naive Bayes method. Where the method is used to predict accurately from the many locations that have been researched after that it is determined which is more appropriate area.
Sistem Pendukung Keputusan Pemilihan Tenaga Kerja Indonesia (TKI) Berdasarkan Kualitas Untuk Menentukan Tempat Kerja Menggunakan Metode Profile Matching (Studi Kasus: PT Adila Prezkifarindo Duta) Dasarius Gulo
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1940

Abstract

In the process of selecting Indonesian Workers (TKI) based on quality at PT. Adila Prezkifarindo Duta is classified as still manual, where there is not yet a system for selecting quality migrant workers so it requires a long time for its assessment and the selection process is less effective. To support decision making in the selection of qualified Indonesian Workers (TKI) to make it easier by using a decision support system. One method used in the selection of qualified Indonesian Workers is the Profile Matching method. The profile matching method is a decision-making mechanism by assuming that there is an ideal level of predictor variables that must be met by applicants, rather than the minimum level that must be met or passed. In the profile matching process a process will be compared between individual competencies into standard competencies so that different competencies can be identified (also called Gap). The smaller the gap produced, the greater the weight value. In matching this profile, the selected TKI candidates are Indonesian Workers who are closest to the ideal profile of a qualified TKI.
Penerapan Metode Ripple Down Rules Untuk Mendiagnosa Penyakit Burung Dahri Musnandar
Jurnal Sistem Komputer dan Informatika (JSON) Vol. 1 No. 2 (2020): Januari 2020
Publisher : Universitas Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v1i2.1941

Abstract

Birds or poultry are members of vertebrate animals that have feathers and wings. Diseased birds certainly look different from their normal condition and exhibit strange symptoms, if they are usually agile and active or often chirping, but when they are sick the bird looks limp, and chooses more silence. Of the symptoms that arise there are symptoms that can be seen by the eye or clinically and by looking at these symptoms can be known what diseases attack birds. To get a solution to the disease, a tool or system is needed to do it. The Ripple Down Rule (RDR) method is one method that has expert system inference / search capabilities and knowledge acquisition. By using the RDR method a system will be able to infer or identify several types of diseases suffered by birds as experts with clinical symptoms such as input. Recognized disease data adjusts rules (rules) that are made to be able to match the symptoms of bird disease stored in the system.

Filter by Year

2019 2026