cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.json@gmail.com
Editorial Address
STMIK Budi Darma Jln. Sisingamangaraja No. 338 Telp 061-7875998
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Sistem Komputer dan Informatika (JSON)
ISSN : -     EISSN : 2685998X     DOI : https://dx.doi.org/10.30865/json.v1i3.2092
The Jurnal Sistem Komputer dan Informatika (JSON) is a journal to managed of STMIK Budi Darma, for aims to serve as a medium of information and exchange of scientific articles between practitioners and observers of science in computer. Focus and Scope Jurnal Sistem Komputer dan Informatika (JSON) journal: Embedded System Microcontroller Artificial Neural Networks Decision Support System Computer System Informatics Computer Science Artificial Intelligence Expert System Information System, Management Informatics Data Mining Cryptography Model and Simulation Computer Network Computation Image Processing etc (related to informatics and computer science)
Articles 492 Documents
Pengamanan Backup dan Restore Basis Data dengan Penambahan Enkripsi Advanced Encryption Standard (Studi Kasus: Analisis Jabatan Bagian Organisasi Kabupaten Balangan) Bambang Abdi Setiawan; Nur Hamid Sutanto; Gusti F Rahman; Ema Utami; M Syukri Mustafa
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 3 (2021): Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i3.2940

Abstract

Job analysis is needed to analyze and design what work to do, how to do it, and why the work should be done. Job analysis will provide information about job descriptions, job specifications, and job evaluations and can even predict job enrichment or expansion and job simplification in the future. This study aims to implement database security management procedures as a measure to prevent damage (error), loss and theft of data through backup and restore methods accompanied by encryption in the Job Analysis System application of the Balangan Regency Organization Division (Simanja). The backup process by adding Advanced Encryption Standard (AES) encryption which is stored to remote cloud hosting as a backup server using SSH Transfer Protocol (SFTP) provides adequate and efficient security.
Penerapan Metode Multi Factor Evaluation Process (MFEP) Pada Penilaian Kinerja Kolektor Dalam Pengumpulan Dana Kredit Sepeda Motor Ikwal Fazri
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 2 (2021): Januari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i2.2449

Abstract

In the decision support system there are several methods used, one of which is the Multi Factor Evaluation Process (MFEP) method. The MFEP method is the method of choice in the performance appraisal decision support system at PT. Capella Multi Dana. The main tool for MFEP is to use weights or values. We must make the right judgment in assessing the performance of collectors using a collective approach to the decision-making process. The criteria in determining the collector's performance in collecting motorcycle credit funds using the MFEP method is to determine the weight of the performance factor of each collector in collecting consumer credit funds. Then each collector is evaluated and given a weight for the assessment of which collector collects more credit funds from each consumer. Then the next stage is determined the total evaluation evaluation for each collector regarding their respective performance
Penerapan Data Mining Dalam Meningkatkan Mutu Perawatan dan Perbaikan Perlengkapan Alat-Alat Kapal Laut Menerapkan Metode K-Means Clustering Yulifa Esfana Putri Sinaga; Garuda Ginting; Melda Panjaitan
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 3 (2021): Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i3.2626

Abstract

This study aims to propose in carrying out sailing activities on the KN. Arcturus ship every week, so that maintenance and maintenance activities need to be carried out properly and scheduled so as not to interfere with ongoing production activities. The current machine breakdown is still relatively high and requires a long repair time, what is proposed is preventive maintenance using the Clustering technique. The method used is K-Means Clustering. By using this method, the data that has been obtained can be grouped into several clusters, based on the similarity of these data, so that data that has the same characteristics are grouped into one cluster and those that have different characteristics are grouped into another cluster. We can use the abundance of data to find hidden information from these data. In order to find out the hidden information from these data, it is necessary to process the data. The data processing process is also known as data mining. With this grouping it will know the results of the analyzed data.
Sistem Pendukung Keputusan Pemilihan Sales Marketing Terbaik di PT. Alfa Scorph Menggunakan Metode COPRAS Siregar, Alwali Daini Udda; Hasibuan, Nelly Astuti; Fadlina, Fadlina
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 1 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i1.2455

Abstract

Of the various functions that exist in a company engaged in the business world, the function of marketing or marketing functions is a very vital and strategic function for the company concerned. The rapid development of the business world, accompanied by increasingly intense business competition, has actually strengthened the position of the marketing aspect of this vital and strategic position, Sales are the jobs most needed by the company, these 10 specialties, total vacancies for sales are 19%, followed by financial default by 18%, while IT / communication amounts to 13%. Job vacancies as sales are widely available, but lack of interest, therefore companies find it difficult to find employees in the sales department The COPRAS method assumes a direct and proportional dependence on the level of significance and utility of the alternatives in the presence of conflicting criteria. This takes into account the performance of alternatives with respect to different criteria and also the weight of the appropriate criteria. This method chooses the best decision considering the ideal and ideal solution - worst. The COPRAS method used here for decision making in the manufacturing environment adopts a six-stage procedure ranking and evaluates alternatives in terms of their level of importance and usefulness. The COPRAS method has the ability to take into account positive (favorable) and negative (unfavorable) criteria, which can be assessed separately in the evaluation process. The most important feature that makes the COPRAS method superior to other methods is that it can be used to calculate the level of alternative utility that shows the extent to which alternatives are taken for comparison
Penerapan Metode Waspas Untuk Efektifitas Pengambilan Keputusan Pemutusan Hubungan Kerja Daulay, Nelly Khairani
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 2 (2021): Januari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i2.2773

Abstract

Layoffs are the most feared thing for every employee.  There are many reasons behind a termination.  For example, the company is experiencing a decline in terms of revenue so it feels necessary for a reduction in employees.  Then the mistakes made by the employee itself such as criminal acts or mistakes in the work, or perhaps the personal desire of the employee himself due to personal reasons. But in the event of termination of employment, the leadership should be wise so as not to happen things that can interfere with the sustainability of the company. Because often the assessment given to employees is not subjective so it harms the employee itself. To overcome this, a decision support system is needed that can help the leadership to be able to take good policies. This decision-making system (SPK) requires a method in the process of completion. There are many methods that can be used one of them is the WASPAS method. The purpose of this research is to give an overview to the leadership in order to make good decisions so as not to harm employees. The results obtained by Karywan with the smallest value will be laid off. The smallest value is obtained by employee no. 4 with a value of 0.75
Sistem Pendukung Keputusan Rekomendasi Emiten Saham Menggunakan Metode Simple Additive Weighting Renny Puspita Sari; Muhamad Rabil Maulana
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 3 (2021): Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i3.3037

Abstract

In the current era, stock investing is an instrument that is currently popular with Indonesian youth, stock investing is one of the many investment options that are increasingly in demand by various groups. Investing in stocks is an activity to refrain from enjoying the present for more enjoyment in the future, this investment often brings someone to be wiser in managing their finances, choosing good stocks is not an easy thing for some investors it takes many factors and ratios - financial ratios to choose stocks that can provide financing by the initial investment objectives. Therefore we need a system to help these problems. The system is a decision support system that can assist in making decisions from the available options. This Stock Issuer Recommendation Decision Support System Using the Simple Additive Weighting Method is here to assist decision-makers to choose good issuers or stocks to collect so that they can provide good profits in the future. The results of the calculation on the system using the Simple Additive Weighting method will show the best suitable stock recommendations for the user based on the data they enter.
Perancangan Aplikasi Kumpulan Komik Berbasis Android Menggunakan Algoritma Crochemore Perrin Siregar, Abdul Haris; Hasibuan, Nelly Astuti
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 1 (2020): September 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i1.2454

Abstract

Comic is a work of art that is designed using a collection of still images and is complemented by a text or story. Comics are a reading book needed by children and teenagers alike. In comics, apart from the interesting content of the stories, there are also moral messages embedded in each story. However, with the development of technology, there are many comics whose stories do not educate teenagers' characters, starting from pictures and no more educational moral messages embedded in the stories. The solution drawn from this problem is by designing an Android-based comic application that can be easily accessed and understood by the public, especially teenagers. However, due to the limitations of smartphone applications to present comic episodes, string matching is needed to search for comic titles. The string matching algorithm is a string matching algorithm that looks for a string consisting of several patterns (characters) in a large amount of text. For android-based comic applications, it is designed using the Crochemore-perrin algorithm
Perbandingan Klasifikasi Website Secara Otomatis Menggunakan Metode Multilayer Perceptron dan Naive Bayes Purnama, I Nyoman
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 2 (2021): Januari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i2.2703

Abstract

World wide web has become a big repository that contains lot of information. As the number of websites continuous growth exponentialy, the need of website classification gains attractions. The human ability to perform manual classifications is increasingly difficult. Website Classification using machine learning technique become more important to do, because the classification process is done automatically.  The classification system begins with the process of collecting information from the home page of the web site(parsing). Home page of a web site is a distinguished page and it acts as an entry point by providing links to the rest of the web site. For each parsing result of the homepage there are process of removing the stop word, stemming and feature selection with tf-idf. The result of this process is a feature that becomes input of machine learning algorithm. In this algorithm there are learning process of input pattern and making of the weight. This weight will be used in the classification process. In this research, the learning process is developed by using multi layer perceptron and naive bayes algorithm. The classification results of each method will be compared. Based on the results obtained, naive bayes have a better accuracy rate than multilayer perceptron. With accuracy of 89% Naive Bayes and MLP has 80% accuracy
Analisis Forensik Digital Memori Volatile untuk Mendapatkan Kunci Enkripsi Aplikasi Dm-Crypt Vipkas Al Hadid Firdaus; Dodit Suprianto; Rini Agustina
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 3 (2021): Mei 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i3.2998

Abstract

Disk encryption technology is something very useful in securing data. On the other hand, disk encryption can be used by criminals to hide the digital evidence. The information in the disk will be very useful for the investigation, but if the disk on the computer evidence encrypted then it will hamper the investigation process. The conditions will certainly be a challenge for investigator cybercrime to be able to find the disk encryption key, especially if the perpetrator did not cooperate in the investigation process. The analysis of the image memory to get the encryption key will be helpful in the investigation. In the overall memory activity on the computer evidence will be recorded, using a live image memory dump on the computer evidence, the decryption keys can be recovered. This paper will discuss about forensic analysis to getting the disk encryption key on the dm-crypt is used to encrypt the disk on Linux operating system and prove that through forensic image memory on a live memory dump, key dm-crypt disk encryption can be found with a success percentage of 80%. On this paper the research will be focused on the Linux operating system with dm-crypt function to full disk encryption.
Perancangan Kriptografi Block Cipher Menggunakan Pola Logo Media Sosial Bulamey, Thea Thiranadya Mardita; Hendry, Hendry
Jurnal Sistem Komputer dan Informatika (JSON) Vol 2, No 2 (2021): Januari 2021
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/json.v2i2.2535

Abstract

In this research, 64-bit Block Cipher Cryptography was designed based on the Social Media Logo Pattern, this design aims to produce a new cryptographic system, and aims to secure data or information in the form of text. In designing cryptography using Social Media Patterns, correlation tests have been carried out 24 times so as to produce the best pattern sequence with an average correlation value of 0.014425413 with a 1-2-4-3 sequence pattern. After finding the best pattern, 10 rounds are carried out where in each cycle there are 4 processes consisting of 4 patterns for the plaintext process and 4 patterns for the key process, and accompanied by S-Box substitution in each process so that the avalanche effect has a significant increase. In this research, the avalanche effect test was also carried out. In each avalanche effect test, it shows that the S-Box has an effect on the encryption process because in each cycle it has an avalanche effect that reaches 50%. So it can be said that the ciphertext generated by block cipher cryptography based on the social media logo pattern has random output results so that it can be used to secure data or information in the form of text

Page 6 of 50 | Total Record : 492