cover
Contact Name
Agus Perdana Windarto
Contact Email
aguspw.amcs@gmail.com
Phone
+6282273233495
Journal Mail Official
agus.perdana@amiktunasbangsa.ac.id
Editorial Address
Sekretariat Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243 email : jurasikstbtunasbangsa@gmail.com
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika)
ISSN : 25275771     EISSN : 25497839     DOI : 10.30645
Core Subject : Science,
JURASIK adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Sistem Informasi dan Teknik Informatika. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) adalah jurnal ilmiah dalam ilmu komputer dan informasi yang mengandung literatur ilmiah pada studi murni dan penelitian terapan dalam ilmu komputer dan informasi dan ulasan publik pengembangan teori, metode dan ilmu terapan yang berkaitan dengan subjek. Jurnal ini pertama kali mendapat ISSN dengan nomor 2527-5771 pada tahun 2016 untuk terbitan cetak dan mulai 2017 beralih ke terbitan elektronik dengan nomor ISSN 2549-7839. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) adalah sebuah jurnal peer-review secara online yang diterbitkan bertujuan sebagai sebuah forum penerbitan tingkat nasional di Indonesia bagi para peneliti, profesionaldan praktisi dari industri dalam bidang Ilmu Kecerdasan Buatan. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) menerbitkan hasil karya asli dari penelitian terunggul dan termaju pada semua topik yang berkaitan dengan ilmu komputer. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) terbit 1 (satu) nomor dalam setahun. Artikel yang telah dinyatakan diterima akan diterbitkan dalam nomor In-Press sebelum nomor regular terbit. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) telah terindeks Google Scholar, Garuda, Crossref dan terus akan diupdate mengikuti perkembangan. Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) telah melakukan perubahan jumlah terbitan dari 1 x setahun (Juli) menjadi 2 x setahun (Februari dan Agustus) dan telah melakukan perubahan data administrasi pada laman LIPI dengan url: http://u.lipi.go.id/1480905139. Topik dari jurasik adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelligence, Digital Signal Processing, Human-Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge-Based Management System, Game Technology.
Articles 403 Documents
Forensic Analysis Of Dana Applications Using The ACPO Framework Ermin, E; Setyawan, Muhammad Rizki; Tella, Fitriyani
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.535

Abstract

The DANA application is a digital wallet platform designed to make all transactions easier, faster and safer, both online and offline. However, apart from the benefits provided, digital wallet applications can also cause harm to their users, namely negative use which can lead to cybercrime cases. Digital forensics is a branch of forensic science that focuses on investigating and finding digital evidence in cybercrime cases. This study aims to conduct a forensic analysis of the DANA application to identify artifacts that have the potential to be used as digital evidence of cybercrime by using the ACPO framework with the assistance of forensic tools such as the Belkasoft Evidence Center and MobilEdit Forensic Express Pro. Based on the research that has been done, it can be concluded that the use of the ACPO Framework to find out the artifacts obtained can be used properly and forensic analysis of the results obtained using two forensic tools, namely the Belkasoft Evidence Center failed to find artifacts that can be used as digital evidence, while the MobilEdit Forensic tool Express Pro only managed to find artifacts in the form of user photos and screenshots of transactions made..
Identifikasi Jenis Rempah-Rempah Menggunakan Metode CNN Berbasis Android Hajriansyah, H
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.558

Abstract

In Indonesia, spices are one of the products of natural wealth that is owned and has been recognized by the world. Spices are parts of plants that have many benefits not only as a complement to spices in cooking, but are also used to boost the immune system. Because there are many types of spices in Indonesia, a system is needed to help people, especially millennials or generation Z, know the various types of spices precisely and clearly. The process of identifying spices is done by using the accuracy calculation on the system using a dataset in the form of images totaling 2700 images and 18 types of spices. The process of identifying spices is generated using the Convolutional Neural Network (CNN) method with the tensorflow module which is used for the training process and data testing. The results of the accuracy experiment on spices produce an accuracy value of recognizing the type of spices by 75%
Metode Naive Bayes Mendeteksi Penyakit Citrus Vein Phloem Degeneration Santoso, Apira Nurul Putri; Santi, Rina Candra Noor
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.549

Abstract

On domestic and international markets, oranges are the largest commodity in the category of fruit imports and exports. In Indonesia alone, almost all regions of Indonesia grow citrus fruits, but these plants can be affected by a variety of other diseases, one of which is Citrus Vein Phloem Degeneration in citrus leaf veins. The disease is characterized by symptoms of yellow spots around the leaves, but Indonesia itself does not have a system that can detect the severity of the disease and farmers must be able to detect it manually based on experience. This system is expected to help farmers identify the severity of the disease from leaf images. The processing steps used include trimming, resizing, preprocessing with RGB to grayscale conversion, edge detection with Sobel, feature extraction with GLCM, and naive Bayes classification. In addition, the accuracy obtained from the test results is 67.58%.
Perancangan Sistem Informasi Penjualan Frozen Food Berbasis Web Pada Toko Mentari Store Jakarta Timur Hartati, H; Santoso, Tri
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.540

Abstract

In this era of globalization and modern information technology, it has positive and negative impacts, with information technology being able to support business processes so that it can provide added value to the business being carried out. Point Of Sales (POS) is a system consisting of hardware and software that is designed according to requirements and can be integrated with several supporting tools to help speed up the transaction process. The use of a sales system, in this case an internet-based Point Of Sales, is made so that shop owners can access sales data without having to go to the shop. Toko Mentarie Store is a store engaged in selling frozen food, snacks and desserts. Toko Mentarie Store has a vision to develop and expand the business that is being run so that it can build new branches in different areas. The sales information system that is currently running has many problems such as managing data which is still manual by recording in books takes a long time and invoices for incoming and outgoing goods are still messy, causing files to be lost or tucked in. From the description of the problem above, we need a Point Of Sales system design. In designing this Point Of Sales system, the authors used data collection methods of observation, interviews, literature study and the programming language used was PHP, MySQL database, sublime text as a text editor and XAMPP for database connection with the system. Using the Point Of Sales system at the Mentari Store can help store performance, especially in the sales transaction process, make it easier for owners to control from anywhere, can minimize fraud and data is more organized.
Prediction of Telkomsel Product Inventory and Sales Using the Fuzzy Time Series (FTS) Method at PT. Graha Informatika Nusantara (GRATIKA) Kisaran Santoso, Heri; Fakhriza, M.; Manurung, Haidar Azra
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.563

Abstract

PT. Graha Informatika Nusantara (GRATIKA) is a company engaged in the infocom sector covering the business of Development and Development of Telecommunication Devices and Systems including its support system. Business activities at PT. GRATIKA Coverage includes sales transactions, purchases, and product stock inventory. However, in inventory sales and purchase transactions at PT Graha Informatika Nusantara (GRATIKA) Kisaran, it is difficult to determine how much product inventory to optimize product stock in inventory management and product sales, because there is no prediction system to prevent errors in determining the amount of inventory and product sales. in the future, because the prediction system that is carried out still uses a manual system so it is classified as old and inaccurate. For this reason, a system is needed to predict the inventory and sales of Telkomsel products using the Fuzzy Time Series (FTS) method to facilitate the prediction process so that there are not many errors in the prediction process. This method was chosen because it tends to get a small error value and the process does not require a complex and dynamic learning system of language variables whose linguistic values are fuzzy sets, with the aim of getting maximum profit with the right business strategy plans and techniques. Method This system was developed with the PHP programming language. The results of this study are the application of the FTS method to the system with the Fuzzy calculation process, which results in the prediction of inventory and product sales.
Analisis Penerimaan Crypto Aset di Kalangan Mahasiswa di Batam Suwarno, S; Saputra, Indra
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.554

Abstract

Cryptocurrency is defined as a digital currency that uses cryptography that is used for investing or buying and selling assets. Every transaction made with cryptocurrencies will be stored in blockchain technology. Knowing that cryptocurrency users are relatively very large, this shows a very high interest in crypto asset investment, it's just that there is a lack of research on the factors that influence the acceptance of crypto asset investment among students, especially University at Batam. This research aims to be able to provide information regarding the factors that influence students in Batam who accept the use of crypto asset investments. This study uses a multi method, namely quantitative and qualitative methods which will be used as a comparison of study results at the end of the study. The model used in this research is the TAM (Technology Acceptance Model). The population of this study included students from 5 tertiary institutions with a total of 7.226 students and the number of samples used was 100 students in Batam for quantitative method and 10 students for qualitative method. Data from questionnaires and interviews obtained were then analyzed separately and a comparison was made of the factors that influence acceptance of crypto assets among students in Batam. The results showed that based on the results of the two studies, the attitude variable had a significant effect on the behavioral intention variable, the perceived usefulness variable had a significant effect and the perceived ease of use had an insignificant effect on the attitude variable.
Analisis Performa dari Algoritma Kriptografi RSA dan ElGamal dalam Enkripsi dan Dekripsi Pesan Fajrin, Ahmad Miftah; Benedict, Jeremy Richard; Kusuma, Henri Jayanata
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.545

Abstract

Cryptography is one of the most important things in computer science because it is related to data security or message security. Cryptographic algorithms are used to secure a message, the most popular of which are the Rivest-Shamir-Adleman (RSA) and ElGamal algorithms. ElGamal employs a prime number modulo while RSA employs the factorial of two large integer numbers. The workings of these two algorithms are distinct, and each has distinct advantages. Even though the two algorithms use different processes, they can both encrypt and decrypt a message. There are speed factors of execution time and peak memory when running the encryption and decryption process. One of these two factors is hardware, which determines the environment that will be used. According to the findings of this study, the RSA algorithm has a faster execution time than ElGamal. In terms of peak memory, both algorithms get the result similarly, with the same peak memory results shown..
Perancangan Sistem Informasi Registrasi KK Dan KTP Berbasis Web Di Kecamatan Kiaracondong Bandung Emalia, Lilis; Yanuar, Yudhi; Maryam, M
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.536

Abstract

This research is aimed to find out the design of registrative information system KK and KTP using PHP and MySql in Kecamatan Kiaracondong, Bandung, which is intended for facilitating the process of registration services to the population. In data collection, the author used method of observation, interviews, and literature study, and for research the author used the method of qualitative and for software development method was used Waterfall method. The current system is still using manual system, therefore some problems arise such as difficult to find data and loss of data at any time in the registrative process. The use of information systems facilitates the completion of each job, hence this information system can be useful in the agency in handling its duties and in handling the registrative activities of population services.
Penerapan Game Tic-Tac-Toe dengan Metode Artificial Neural Network dalam Pengambilan Keputusan untuk Meraih Kemenangan Faqih, Ahmad Abdullah; Fitrani, Arif Senja
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.559

Abstract

Tic-Tac-Toe is a game played by only 2 players using a 3x3 board. The player must alternately fill in the empty places so that they can form a straight line horizontally, vertically or diagonally so that it can be said to have won. The purpose of this study is to reintroduce traditional games to the community and also to conduct computer training to provide intelligence to the tic-tac-toe game and have learning at each different level of difficulty. The methodology used in this research is using the Artificial Neural Network Method which is an attempt to imitate the function of the human brain. The human brain is thought to consist of millions of tiny processing units called neurons that work in parallel. The data used in the application of the Tic-Tac-Toe game using the Artificial Neural Network Method in Decision Making to Achieve Web-based Victory is taken from the Tic-Tac-Toe game which includes game rules, game components and game strategy. In the Tic-Tac-Toe game in making decisions to win, it has an accuracy value of 80% for easy difficulty, 40% for medium difficulty, and 30% for hard difficulty, this shows that for the computer to win the game is quite easy on the hard difficulty level and on the easy difficulty level, the computer is very easy to beat by the user.
Analisis Enkripsi Kriptografi Asimetris Algoritma RSA Berbasis Pemrograman Batch pada Media Flashdisk Putra, Nathanael Berliano Novanka; Raihana, Fikra Amalia; Mondong, Willem Michael Albert; Kardian, Aqwam Rosadi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.550

Abstract

Flashdisk is an external data storage device that is connected to a USB port. Data security is necessary considering that flash drives can be accessed by anyone physically. Therefore, we need a program or application that can act as a secure intermediary for document transfer encryption where users can use flash drives not only to exchange information but also to secure that information. Asymmetric Cryptography is a type of cryptography that utilizes 2 types of keys, namely public keys and private keys. In this study, the RSA Algorithm was chosen to perform encryption because of its better level of security than other asymmetric algorithms, and it can still keep up with technological developments, especially in the security aspect. In this research, an experiment will be carried out to apply asymmetric cryptography using the RSA algorithm in the OpenSSL program to encrypt documents on flash media. The results of the study stated that asymmetric cryptography with the RSA algorithm could perform good encryption on documents contained in flash drives that had used the caraka.bat program.