cover
Contact Name
Khairul Muttaqin
Contact Email
khairulmuttaqin@unsam.ac.id
Phone
+6282276119180
Journal Mail Official
teknikinformatika@unsam.ac.id
Editorial Address
Jalan Prof.Dr. Syarief Thayeb, Meurandeh, Langsa - Aceh
Location
Kota langsa,
Aceh
INDONESIA
Jurnal Informatika dan Teknologi Komputer ( J-ICOM)
Published by Universitas Samudra
ISSN : 27752089     EISSN : 27747115     DOI : https://doi.org/10.33059/j-icom.v2i1.3417
Core Subject :
Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) dimaksudkan sebagai media kajian ilmiah hasil penelitian, pemikiran dan kajian analisis-kritis mengenai penelitian Rekayasa Sistem, Teknik Informatika/Teknologi Informasi, Manajemen Informatika dan Sistem Informasi. Sebagai bagian dari semangat menyebarluaskan ilmu pengetahuan hasil dari penelitian dan pemikiran untuk pengabdian pada Masyarakat luas dan sebagai sumber referensi akademisi di bidang Teknologi dan Informasi. Jurnal J-ICOM (Jurnal Informatika dan Teknologi Komputer) menerima artikel ilmiah dengan lingkup penelitian pada: Rekayasa Sistem Sistem Pakar Sistem Penunjang Keputusan Data Mining Kecerdasan Buatan Jaringan Komputer Teknik Komputer Pengolahan Citra Algoritma Genetik Perancangan Sistem Informasi Business Intelligence and Knowledge Management Database System Big Data Enterprise Computing Cloud Computing Technology Management Topik kajian lainnya yang relevan Dengan artikel yang memiliki sitasi primer dan tidak pernah dipublikasikan secara online atau versi cetak sebelumnya.
Articles 105 Documents
Sistem Informasi Pengingat Jadwal Imunisasi Pada Anak Usia Dini Menggunakan Metode Scrum Berbasis Android Di Bidan Hana Suroyyah, Am.Keb Vika Vitaloka Pramansah
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 3 No 1 (2022): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v3i1.4948

Abstract

Immunization is an effort by the Indonesian government to achieve the Millennium Development Goals (MDGs) which are the focus of reducing the volume of child mortality. The mortality index in children under five is the main parameter to determine the health status of the community, especially children under five. For this reason, the health service program in Indonesia focuses on reducing infant mortality through immunization. However, sometimes parents forget the schedule for the implementation of immunization in the following month so that it is very detrimental to parents, especially the health of toddlers. This study aims to build an information system on the application as a reminder of the immunization schedule for the midwife Hana Suroyyah, Android-based Am.Keb. This research was conducted by going through several stages, namely identifying existing problems, literature study with previous journals, collecting the required data, and developing an immunization schedule reminder information system with SMS Gateway using the scrum method. The information generated in this application is an Immunization Schedule which is equipped with a notification as a reminder of the Immunization schedule before D-1 using an SMS Gateway.
Analisis Perbandingan Algoritma SVM Dan KNN Untuk Klasifikasi Anime Bergenre Drama Vika Vitaloka Pramansah
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 3 No 1 (2022): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v3i1.4950

Abstract

There are many genres of anime such as drama, action, romance, comedy, and so on. However, because there are so many anime genres, it is quite difficult for viewers to find anime whose genre they like, such as the drama genre which tells about everyday human life which is quite light in nature. From these problems, a classification method is needed to classify anime that belongs to the drama genre. Classification is a common method in data mining, an object whose class/label is unknown can go through the classification method so that its class can be estimated [7]. Classification has several algorithms including Support Vector Machine (SVM) and K-Nearest Neighbors (KNN). SVM and KNN algorithms have been widely used and have a good level of accuracy. In this study, a comparative analysis will be carried out between the two algorithms, the dataset used is 12,294 data and 2 genre classes, namely drama and non-drama, the attribute of the anime dataset is 7. The results obtained in this study indicate that the K-Nearest Neighbors Algorithm (KNN) ) get a training accuracy value of 100% and a test accuracy value of 84%. And also the Support Vector Machine (SVM) algorithm gets a training accuracy value of 83% and a test accuracy value of 82%. The results of the accuracy values ​​of the two algorithms indicate that the K-Nearest Neighbors (KNN) algorithm has a better testing accuracy than the Support Vector Machine (SVM) with a fairly thin difference between the two algorithms.
Implementasi Metode Rivest Shamir Adleman untuk Enkripsi dan Dekripsi Text Fatonah; Dadang Iskandar Mulyana
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 3 No 1 (2022): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v3i1.4990

Abstract

Abstract Until now information technology is developing rapidly, resulting in a lot of information that is easily stolen because of increasingly sophisticated technology. For this reason, a program is needed to secure the confidentiality of information so that it is not easily read. Cryptography is one of the solutions developed to maintain the confidentiality of the information. In cryptography, there is a process where the information sent will be encoded which can be called encryption, then returned to the original information called decryption. Many techniques are owned by cryptography, one of which is a technique that has security that is difficult to solve, namely the RSA algorithm. In its application, the RSA cryptography method will create a program that can encrypt and decrypt text, and it is necessary to pay attention to the selection of prime numbers and the key generation process so that there is no attack on the RSA cryptography algorithm. The purpose of this is to ensure that the information sent reaches the recipient safely. Other people will find it difficult to read the information sent because it uses a code that is difficult to crack. Keywords: RSA, Cryptography, Encryption, Decryption, Text
Implementasi Algoritma One Time menggunakan Algoritma Chiper Transposition Sebagai pengaman Rahasisa Pesan Rail Fence Cipher Dan Route Cipher Untuk Keamanan File Lintang Purnama; Dadang Iskandar Mulyana; Aji; Eka Okta Putri Sulaiman
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 3 No 1 (2022): Jurnal Informatika dan Teknologi Komputer ( JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v3i1.4997

Abstract

Abstrak− Keamanan data merupakan aspek yang sangat penting dalam pengiriman pesan terutama untuk pesan yang bersifat rahasia. Hal tersebut dapat kita ketahui dari aktivitas sehari-hari contohnya penggunaan internet untuk mengirimkan e-mail, sosial media, jual beli secara online, dan lain-lain. Untuk itu diperlukan suatu kode agar pesan tersebut masih bersifat rahasia, karena rahasia dan keamanan data yang dioperasionalkan pada jaringan publik rentan terhadap serangan oleh apapun. kriptografi adalah “ secretwriting ” (rahasia tulisan). Terdapat definisi kriptografi yg sudah diungkapkan pada aneka macam literatur. Definisi kriptografi yg dipakai pada kitab - kitab yg telah usang yaitu sebelum tahun 1980-an, mengemukakan bahwa kriptografi adalah seni & ilmu yg dipakai buat mengklaim kerahasiaan sebuah pesan menggunakan memakai cara melakukan penyandian pesan tadi ke pada bentuk yg tidak bisa dipahami lagi maknanya sang orang lain. Pada saat ini membuat setiap pengelola & pemilik system informasi wajib & harus memikirkan bagaimana cara supaya bisa melindungi keamanan sistem keterangan yg dimilikinya supaya terhindar berbagai macam resiko yg mampu saja bisa mengakibatkan kerugian. Pada teknik cipher transposisi, huruf-huruf yang ada didalam plaintext dan ciphertext tetap sama, tetapi urutannya diubah. Dengan kata lain, Teknik ini melakukan transpose terhadap rangkaian karakter yang ada didalam suatu teks. Algoritma One Time Pad (OTP) merupakan stream cipher yg melakukan enkripsi & dekripsi satu karakter setiap kali. Algoritma One Time Pad memiliki kriteria panjang teks sama dengan panjang key jika tidak sama maka karakter pesan pada key akan melakukan iterasi pesan dan panjang pesan sama dengan panjang key. .
IMPLEMENTASI METODE HUNGARIAN UNTUK OPTIMASI BIAYA SERVIS BERBASIS WEB Azhar; yunita
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 1 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The matrix is the composition of a mathematical system that can assist all forms of calculations and is directly related to numbers or exact values that are large or small. The effectiveness of solving matrix problems that occur in everyday life can affect the profit side of a company, the Hungarian method is one way to solve this problem. The implementation of the Hungarian method is related to the matrix which is usually used for the case of placing an object or subject in a company. The assignment case that occurred at Bengkel Buyung Tambon-baroh relates to cost optimization for workers with their respective abilities and skills. The problem of cost optimization is very necessary considering the work schedule and the income of the workers depending on the circumstances of the institution or company concerned. Matrix calculation application using web-based Hungarian method can produce values that are considered effective for solving the problem. Based on the test results, the application produces a final value in the form of optimal costs for workers at the Buyung Tambon Baroh Workshop with their respective abilities and skills.
SISTEM INFORMASI TINDAK PIDANA KHUSUS PADA KEJAKSAAN NEGERI LHOKSEUMAWE BERBASIS WEB Azhar; Rizki Balia
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 2 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33059/j-icom.v1i2.5684

Abstract

Kejaksaan adalah bagian integral dari sistem ketatanegaraan (sistem hukum), sebagai aparatur yang mempunyai tugas dan tanggung jawab dibidang penegakkan hukum di Indonesia. Bagian tindak pidana khusus merupakan bagian yang melaksanakan dan mengendalikan penanganan perkara tindak pidana khusus yang meliputi prapenuntutan, pemeriksaan, penuntutan, penetapan hakim dan putusan pengadilan, pengawasan terhadap pelaksanaan pidana bersyarat, dan pengawasan terhadap pelaksanaan putusan lepas bersyarat dan tindakan hukum lainnya. Dosir adalah sekumpulan dokumen mengenai suatu perkara. Proses kerja manajemen berkas masih sangat manual, seperti bagian staff pidana khusus, saat mencari berkas-berkas perkara harus secara manual pada lemari dosir untuk dapat menyelesaikan permasalahan dari setiap data terdakwa, sehingga petugas pidana khusus banyak membuang. Tujuan dari penelitian ini adalah membuat sistem berbasis web untuk membantu petugas menginput, menyimpan, dan mencari dokumen. Hasil dari sistem akan memberikan sebuah QR Code, QR Code tersebut akan menunjukan letak surat yang diperlukan petugas dan mengeluarkan data yang berkaitan dengan isi surat tersebut.Kata kunci: kata kunci dituliskan dalam 5 kata yang sebaiknya merupakan subset dari judul makalah, ditulis dengan menggunakan huruf kecil kecuali untuk singkatan, dan dipisahkan dengan tanda baca koma untuk antar kata.
ANALISIS PRESTASI AKADEMIK PADA SEKOLAH DASAR NEGERI 20 KOTA LHOKSEUMAWE Hendrawaty; Nailus Sakdah; Azhar
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 1 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

SDN 20 Banda Sakti Pusong Baru is one of 81 elementary education institutions in the city of lhokseumawe. This school has administrative data, namely 531 students, 30 teachers, and 18 classes. Each student has value data, where the data is processed and stored in the Excel application. This is a problem because the Excel application is offline. When inputting data, sometimes data redundancy occurs between the Excel files that are processed, saving the Excel file is sometimes at risk of being lost or exposed to a virus. Teachers do not understand how to analyze data in the excel application so that schools cannot evaluate teacher and student performance. From these problems, a Data warehouse system was built at SDN 20 Banda Sakti Pusong Baru. The data warehouse is useful for managing administrative data and analyzing value data at the school. The data warehouse was built using the Nine Step Design Method. Analysis of the data warehouse built in graphical form. Data analysis for teacher and student evaluations based on PPDB online includes science, mathematics and Indonesian language subjects. The results of the graph analysis show that the decline in value that occurred in the odd semester 2019-2020 with a decrease in value of 79 for Science subjects, 80.3 for Mathematics subjects, and 80.8 for Indonesian subjects in class VI A so that schools can conduct an evaluation of teacher performance in that year.
APLIKASI KLASIFIKASI GENRE MUSIK MENGGUNAKAN METODE NAIVE BAYES BERBASIS DESKTOP Hendrawaty; Dimas Rama Nugraa; Azhar
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 2 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Voice recognition is a part of sound processing that can be used to recognize music. The use of music based on the genres contained in it has been used in everyday life. However, analyzing the genre of a music on a computer is a difficult thing to do. This study describes the results of the study of the genre classification system on a song. This research is to create a system that can detect the genres contained in the music. Literature study was carried out on each part of the system, then the approach that was considered the best in this design was formulated. This study used the Discreat Transform Fourier method. As a signal processing process, it is useful to find the features of the sound. For the classification process using the Naive Bayes method. Results of all tested genres that are recognizable 66%.
IDENTIFIKASI GOLONGAN DARAH SISTEM ABO MENGGUNAKAN K-NEAREST NEIGHBORS Mulyadi
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 1 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Identification of blood groups by looking at blood clots that have been given reagents is mostly done manually based on direct visual observations on blood that has been dripped with reagents and then determines blood groups based on the clotting of each reagent, where the level of saturation of the eye can affect the results of observations made and the community the general public also does not respect the resemblance. To overcome this problem, an application is made to find blood types using the K-nearest Neighbors method which can work automatically. KNN is a method that classifies new objects based on the training data that is closest to the object, where the distance calculation uses Euclidean Distance. This system is used to identify blood groups A, B, AB and 0. In this study, the system was tested using 80 training data for blood group images which were divided into 20 images for each group A, B, AB and blood group 0. test as many as 40 images consisting of 10 test data for each blood group A, B, AB and blood group 0. The test results for the accuracy of the test on each blood group is A 70%, blood group B 80%, blood type AB 100% and blood group 0 100%. So it can increase the success of the system by 85%.
PENGENALAN WAJAH DENGAN BANYAK POSISI (MANY POSITIONS) MENGGUNAKAN ALGORITMA FISHER LINEAR DISCRIMINANT (FLD) Mulyadi
Jurnal Informatika dan Teknologi Komputer (J-ICOM) Vol 1 No 2 (2020): Jurnal Informatika dan Teknologi Komputer (JICOM)
Publisher : E-Jurnal Universitas Samudra

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The face is one of the characteristics that can determine a person's identity, because each individual has a different face. Face recognition technology is highly developed today, which has been widely used systems based on face recognition. The main issue that arises is change in the position where it will affect the system in detecting the presence of a face which will also affect the system at the next stage of face recognition. Based on this background, it created a system that is able to recognize a person's identity in the form of a face name is entered with a variety of positions. In this research method used is Fisher Linear Discriminant (FLD). FLD can be used to recognize faces with a variety of positions. This study was able to detect and recognize faces with five different positions. The position of the recognized ie perpendicular to the position of 0 °, 1-25 ° turn to the right, looked left 1-25 °, 1-25 ° 1-25 ° looked up and down with the distances are 50 cm, 60 cm, 70 cm, 80 cm, 90 cm and 100 cm. In this test, the face image is tested by 300 overall face to face data 254 works and 46 face data were not successful. From these data, then get the success percentage of 84.67%.

Page 4 of 11 | Total Record : 105