cover
Contact Name
Agus Perdana Windarto
Contact Email
aguspw.amcs@gmail.com
Phone
+6282273233495
Journal Mail Official
agus.perdana@amiktunasbangsa.ac.id
Editorial Address
Sekretariat Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243 email : jurasikstbtunasbangsa@gmail.com
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika)
ISSN : 25275771     EISSN : 25497839     DOI : 10.30645
Core Subject : Science,
JURASIK adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Sistem Informasi dan Teknik Informatika. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) adalah jurnal ilmiah dalam ilmu komputer dan informasi yang mengandung literatur ilmiah pada studi murni dan penelitian terapan dalam ilmu komputer dan informasi dan ulasan publik pengembangan teori, metode dan ilmu terapan yang berkaitan dengan subjek. Jurnal ini pertama kali mendapat ISSN dengan nomor 2527-5771 pada tahun 2016 untuk terbitan cetak dan mulai 2017 beralih ke terbitan elektronik dengan nomor ISSN 2549-7839. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) adalah sebuah jurnal peer-review secara online yang diterbitkan bertujuan sebagai sebuah forum penerbitan tingkat nasional di Indonesia bagi para peneliti, profesionaldan praktisi dari industri dalam bidang Ilmu Kecerdasan Buatan. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) menerbitkan hasil karya asli dari penelitian terunggul dan termaju pada semua topik yang berkaitan dengan ilmu komputer. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) terbit 1 (satu) nomor dalam setahun. Artikel yang telah dinyatakan diterima akan diterbitkan dalam nomor In-Press sebelum nomor regular terbit. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) telah terindeks Google Scholar, Garuda, Crossref dan terus akan diupdate mengikuti perkembangan. Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) telah melakukan perubahan jumlah terbitan dari 1 x setahun (Juli) menjadi 2 x setahun (Februari dan Agustus) dan telah melakukan perubahan data administrasi pada laman LIPI dengan url: http://u.lipi.go.id/1480905139. Topik dari jurasik adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelligence, Digital Signal Processing, Human-Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge-Based Management System, Game Technology.
Articles 403 Documents
Rekayasa Ulang Proses Bisnis Pada Usaha Konveksi Fasco Di Kota Malang Nashrullah, Aditya; Suharso, Wildan
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.788

Abstract

Changes in the industrial world are developing very rapidly, with increasingly complex business competition and increasingly broad scope of company operations. Business Process Reengineering (BPR) is a concept that involves deep and drastic restructuring with the aim of achieving process improvements, cost reductions, and increased system speed. The Fasco Convection Business requires system reengineering by finding production management processes and reports that have inefficient processes and times and have never been reengineered for approximately 6 years. Managers must manage the production process by hiring employees directly in the field or by telephone. Managers must also record reports using conventional notebooks until the reports are distributed through report books. The method used in system reengineering is through Business Process Reengineering (BPR). In addition, this study uses the ASME (American Society of Mechanical Engineers) standard to evaluate throughput efficiency and process analysis. In this study, the production management process and reports were obtained which had an efficiency value of 93.24%, but when the reengineering was carried out, thirteen processes were eliminated, eight processes were automated, and four processes remained. In the end, it can reach 100% percentage with a more efficient time of 182 minutes than the previous process.
Penerapan Metode Simple Additive Weighting (SAW) Dalam Mengelompokkan Kualitas Kacang Kedelai Di Rumah Tempe A-Zaki Padang Nissa, Ika Ima; Yuhandri, Y; Nurcahyo, Gunadi Widi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 1 (2024): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i1.737

Abstract

Soybeans are a legume that has quite high protein levels. This Decision Support System uses the Simple Additive Weighting (SAW) method. This method has seven stages, namely determining the criteria and criteria weight values, determining the suitability rating of each alternative for each criterion, determining the normalization value and weight attribute, determining the decision matrix, determining the normalized matrix value, calculating the matrix by adding up the respective criteria matrices, alternatively do Ranking. The data processed in this research comes from Rumah Tempe A-Zaki Padang. The data consists of 4 alternatives, namely green soybeans, yellow soybeans, black soybeans, brown soybeans with 5 assessment criteria, namely color, texture, cost, aroma, taste which are used to apply the Simple Additive Weighting (SAW) method. The results of this research are that green soybeans have the highest value with a yield of 0.8525, yellow soybeans with a yield of 0.755, brown soybeans with a yield of 0.6345 and the lowest value with a yield of 0.6275. Therefore, the Decision Support System designed can help increase accuracy in determining the quality of soybeans using the Simple Additive Weighting (SAW) method and provide information for Rumah Tempe A-Zaki Padang in making decisions regarding the best quality of soybeans.
Klasifikasi Kesehatan Mental Mahasiswa dengan Algoritma J48 dan Hubungan Atribut Demografis serta Akademis Cahyani, Evril Fadrekha; Aeni, Alfina Nur; Wahyuni, Irmawati Tri; Tarwoto, T
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.812

Abstract

The college years are a period of significant development in various aspects, including physical, psychological, and intellectual growth. Students often face mental health issues such as depression, anxiety, and panic attacks, which frequently go untreated and can persist into adulthood. This study aims to analyze the mental health of college students using the J48 algorithm to classify the target attribute "Did you seek any specialist for treatment?". The dataset used was sourced from a public repository, consisting of 101 instances. Through the stages of data collection, preprocessing, classification with the J48 algorithm, attribute correlation analysis, and comorbidity identification, the study found that 6% of students required specialist treatment, while 94% did not. Further analysis revealed that mental health issues are more prevalent among women and first-year students. Depression affects 82.86% of women, anxiety affects 70.59% of women, and panic attacks affect 75.76% of women. The study also identified comorbidities where some students experienced more than one mental health issue. The findings highlight the importance of social support and a conducive learning environment to improve students' mental well-being. These findings can be used to develop more effective interventions to support students' mental health and academic success.
Penerapan Algoritma Naive Bayes dan KNN pada Klasifikasi Gizi Ibu Hamil di Puskesmas Cicurug Insany, Gina Purnama; Somantri, S; Maulina, Siti Farda
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.802

Abstract

Nutrition is a very important factor for the human body, especially for pregnant women. Based on data from the 2018 Basic Health Survey (Riskades), 48.9% of pregnant women, 17.3% of whom suffer from Chronic Energy Deficiency (KEK), and 28% of pregnant women are at risk of experiencing birth complications that can cause death. Even though this figure shows a decline every year, the problem of malnutrition among pregnant women is still a major concern. In data analysis, the classification technique with the best performance was used to classify the nutritional status of pregnant women. Classification of the nutritional status of pregnant women using the supervised learning method with the Naïve Bayes and K-nearest neighbor (K-NN) algorithms. The data set used was 850 pregnant women which included the variables age, upper arm circumference (LiLA), Body Mass Index (BMI), and Hemoglobin. The research results show that the Naive Bayes algorithm has an accuracy value of 79.18% with an error value of (0.6802) with the K-NN model k=3, k=5, and k=7. Meanwhile, the K-NN k=3 and k=5 algorithms have the most optimal accuracy of 94.92% with an error value of (0.1878), while the K-NN k=7 model has an accuracy value of 93.90% with an error value of (0.2284).
Optimalisasi Layanan Informasi Pulau Buru Melalui Chatbot Berbasis NLP dan NLU Thahir, Sirya Sabina Bin; Amin, Imam Husni Al
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 1 (2024): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i1.728

Abstract

Buru Island is one of the prominent islands in the Maluku Archipelago, and the limited understanding of the local community about Buru Island has prompted the development of a Chatbot as an innovative information source. This Chatbot is designed utilizing Natural Language Processing (NLP) and Natural Language Understanding (NLU) through the RASA Framework. Its primary objective is to provide comprehensive information about Buru Island, encompassing tourist destinations, cultural heritage, traditions, culinary aspects, and various other public information. The testing process involved 96 diverse questions, and the results indicated an intent classification accuracy of 99.61%. Evaluation metrics such as micro average, macro average, and weighted average produced positive outcomes, with precision, recall, and f1-score reaching optimal values, ensuring the Chatbot's optimal accuracy level. The Chatbot technology not only enhances efficiency and speed in delivering information to users but also has the potential to operate without administrative supervision, significantly reducing operational costs. Consequently, this Chatbot serves as an effective solution to improve public understanding of Buru Island.  The main advantage of this Chatbot lies in its ability to provide comprehensive information, supporting the potential of tourism and culture on Buru Island. Thus, this information service can enhance public understanding, promote tourist destinations, and contribute positively to the overall development of Buru Island
Penyimpanan Audit Log Dengan Menggunakan Apache Kafka Ardiansyah, Achmad
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.835

Abstract

Recently, there are many computer programs that being use for many purposes, so computer program will be entering complex programing era. If a system or a program become complex, it will need a new method to audit logs from the systems for an assurance if something is happening. For Example Error or Output that should not be happening  but found after it release. This experiment will be using Apache kafka as a tool to make sure the system is making an audit logs without interrupting the main process. After some experiment using some of test case scenario, the result is audit logs using kafka is simple to use and reliable, also this method will not interrupt the main process of the program
Audit Web E-Government Dengan Acunetix Web Vulnerability Guna Menganalisis Dan Perbaikan Celah Keamanan Website Khairani, Maisan Dewi Puspa; Yuhandri, Y; Sumijan, S
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 1 (2024): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i1.751

Abstract

The use of the internet in government to encourage the realization of e-Government can provide benefits in increasing the power of society by increasing access to information, improving government services to the community, strengthening interaction between government and the private sector in related industries, and increasing the ease and openness of government management. One tool used to identify vulnerabilities in web applications is Acunetix Web Vulnerability. This tool is a security scanner that can automatically detect common vulnerabilities in web applications, including SQL injection attacks, Cross-Site Scripting (XSS), and others. The purpose of this research is to conduct an e-Government web audit, steps for e-Government security analysis and provide recommendations for improvements from the results of security analysis using Acunetix web vulnerabilities on the Padang City DPMPTSP website. Data was obtained using the Acunetix web Vulnerability tool to obtain a report from the penetration test process which contains information about security vulnerabilities found on the SINOPEN website https://nonperizinan.web.dpmptsp.padang.go.id/sinopen. The vulnerability findings of 148 data were at a high level, 107 data were at a medium level, 16 data were at a low level. Some of the attacks found were 11 attacks, namely Blind SQL injection, Cross site scripting (XSS), SQL injection, Application error message, HTML form without CSRF protection, Clickjacking: X-Frame-Option Header Missing, Cookie Without Secure Flag Set, File Upload, Login Page Password Guessing Attack, Broken Link, Password Type Input With AutoComplete Enabled. The Acunetix web vulnerability tool is used as a basis for analyzing improvements made after scanning the website. The results after an e-gov security audit was carried out to analyze and improve the level of vulnerabilities found on the SINOPEN website were at a low level, thereby increasing the level of security from attacks and the status of the website can be said to be safe from attack vulnerabilities.
Deteksi Tunneling Domain Name System dengan Fitur Cache Property Abdilah, Zalfa Hilmi; Rahman, Atep Aulia
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 1 (2024): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i1.719

Abstract

Many companies and agencies are being attacked with data exfiltration. The attack was carried out through malware from the target by exploiting secret channels and abusing the domain system. (DNS). By creating a virus by an attacker that can infect the target malware, it will generate a client tunelling, so that the attacker can enter through the communication channels he has created to the target Malware. Attackers can control malware remotely and steal data that leaks data from targets, which will affect the profitability of companies and agencies. Therefore, the author prioritizes the traces left behind of DNS tuneling that cannot be hidden by proposing the property cache feature as a method of detecting DNS tuning
Penerapan ISO 31000:2018 untuk Analisis Manajemen Risiko pada Sistem Informasi Smart Operation di PT. XYZ Jericho, J; Haryani, Endang
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.826

Abstract

This study objectives to analyze risk management on the Information System of Smart Operation at PT. XYZ, through identifying risks, describing the impact of these risks, and recommending risk treatment. This system manages sales transactions, from sales orders to financial reporting. This study is driven by the importance of information technology investment to improve a company’s efficiency. However, this investment has uncertainties about the values that can be attained and the risks that may occur. The research applied a qualitative method and ISO 31000:2018 as the referred framework. The analysis identified 12 risks in the 5 sectors. The research found that there is no high-level risk, 8 medium-level risks and 4 low-level risks. Based on these findings, the study concludes that related to the implementation of the information system, there are no risks that endanger and harm the company. Based on the risk impact, the recommended risk treatment is to mitigate or reduce risks. There are 4 medium risks that have the greatest score of 6, among others are order recording errors, number of goods decrease, accidental loss of goods/theft, and wrong goods selection. Actions to reduce the risk are regular log checking, training on the use of applications, regular stock-opname, placing goods within CCTV range and rechecking documents with goods sent. Meanwhile, the risk of counterfeit money has the least score of 1, because the company has an accurate detection device
Sistem Informasi Penjualan Handmade Kerajinan Rotan Berbasis Web Menggunakan Metode Waterfall Muqorrobin, Dawam; Astutik, Ika Ratna Indra; Azizah, Nuril Lutvi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 9, No 2 (2024): Edisi Agustus
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v9i2.793

Abstract

Alfatihah shop is one of the umkm that provides various crafts made from rattan. The products they produce are various, such as chairs, sketches, wall decorations, etc. In this era of industry 5.0, the development of information technology is very rapid and fast, the competition that occurs in society is very fierce in the technological era that uses cyberspace as a sales medium. Many conventional shop sellers are starting to venture into the digital world to further increase their sales reach and with digital it makes the process of recording and organizing shop management easier. One of the media used is website media, website media has several advantages such as reaching a wider range of users, increasing company credibility and so on. To keep up with advances in information technology, the author built an Alfatihah store information system using the waterfall development method. The waterfall method is a method that is easy to use in scheduling the system development work process. The conclusion obtained from this research is that the system makes it easier for consumers to order goods using non-cash transactions, making it easier to carry out payment transactions.