cover
Contact Name
Fera Damayanti
Contact Email
jurnaljikstra@gmail.com
Phone
+6285262785875
Journal Mail Official
jurnaljikstra@gmail.com
Editorial Address
Jalan Imam Bonjol No 35
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA)
ISSN : 2715887X     EISSN : 27472485     DOI : https://doi.org/10.35447/jikstra.v6i2
Core Subject : Science,
A journal managed by the Informatics Engineering and Information Systems study program at Universitas Harapan Medan (UNHAR), this journal discusses science in the field of Informatics and information systems, as a forum for expressing research results both conceptually and technically related to informatics. Jikstra is published twice a year, namely in April and October, the first issue in the April 2019 edition. JIkstra in the peer review process uses blind peer review.
Articles 68 Documents
E-Commerce Aksesories Komputer pada Toko UTC Komputer di Medan: Array Edi, Rahma
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 2 (2020): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i2.249

Abstract

UTC Computer Medan shop is one of the computer accessories sellers in Medan, UTC computer shop is still lacking in terms of marketing. So it still needs a more massive promotion stage. The proposed online store e-commerce system can handle both online and conventional sales with structured records. To describe the running system, UML (Unified Modeling Language) will be used, which consists of Use Case Diagrams and Activity Diagrams.The UTC Computer Medan shop is one of the sellers of computer accessories in Medan, this UTC computer shop is still lacking in terms of marketing and recording financial reports and sales reports, therefore it is necessary to trade using the internet or using the web as a medium to support business transactions with using E-commerce.The purpose of this research is to design a system and application to be used in the transaction process of selling goods at computer utc stores. The program that will be created is related to entering product data, processing, and displaying information from that data, the system will handle conventional sales transactions while the admin will manage the online store and conventional sales systems simultaneously. Online shop visitors can see products that have been marketed without having to log in, but when visitors want to make purchases of goods, online shop visitors must log in first.From the results of the analysis carried out, there is an ongoing system analysis that has been successfully carried out by interviewing, analyzing and recording user needs, in designing e-commerce online stores that have also been successfully carried out using several design tools and diagrams, and in testing online shops that have been designed successfully implemented.
Jaringan Syaraf Tiruan Memprediksi Kebutuhan Alat Suntik Medis di Rumah Sakit Menggunakan Metode Backpropagation: (Studi Kasus : RSU BATHESDA) ramli, Ramli; Nurhayati, Nurhayati; Saragih, Rusmin
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 3 No. 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.252

Abstract

The hospital is an integral part of a social and health organization with the function of providing services, disease healing and disease prevention to the community. Predicting the number of medical devices is essential for managing a hospital, managing human and financial resources, and for properly distributing material resources. If the number of medical devices can be predicted accurately, this will become the basis for planning and making decisions for hospital managers. Based on these reasons, an electronic tool is needed that can determine the number of medical device needs with a high degree of accuracy and the display of the results for easy reading and data collection. From system testing, the need for medical devices in the following month will decrease in providing some medical devices because they still have a lot of stock in the previous month. The Backpropagation Algorithm can carry out the prediction process, but whether or not the error value and the output is very much influenced by the determination of parameters such as the amount of learning rate and the number of neurons in the hidden layer.
Penerapan Logika Fuzzy Logic pada Enemy AI Game Horor 3D The Gate Of Nightmare Menggunakan Aplikasi Unity3d: Array Hafizh, Faisal; Maulita, Yani; Khair, Husnul
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 2 (2020): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i2.255

Abstract

Artificial Intelligence is a part of computer science that is made so that machines (computers) can do work as well as what humans do. The Unity 3D application is a game engine which is a software for processing images, graphics, sound, input, etc. which is intended to create a game, although not always for games. Nowadays, games have developed a lot according to traditions and times. Therefore, there are a lot of unattractive game designs because the AI is not responsive and feels stiff, and requires the Fuzzy Logic Method. Fuzzy Logic is a problemsolving control system methodology that is suitable for implementation in systems, ranging from simple systems, small systems, embedded systems, PC networks, multi-channel or workstation based data acquisition, and control systems.
Sistem Pakar Mendiagnosa Penyakit Anemia dengan Menggunakan Metode Teorema Bayes Berbasis Web: (Studi kasus : RSUD.Dr.RM Djoelham Binjai) Gea, Wisda Wati; Maulita, Yani; Naftali, Juliana
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 3 No. 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.257

Abstract

Expert systems are a branch of artificial intelligence that studies how to adopt an expert's way of thinking in solving a problem and making a decision to draw conclusions. In this case the expert system is used to diagnose anemia. What is discussed is how to determine the type of disease, how to overcome anemia in the community and designing expert systems using technology. nemia caused by a lack of red blood cells or malfunctioning red blood cells in the body. This causes reduced oxygen flow to the organs of the body. Vitamin B supplements can be used for low vitamin levels. The Bayes method is a method for producing parameter estimates by combining information from samples and other information that has been previously available. Bayes' theorem is used to calculate the probability of an event occurring based on the effects of these observations. From several studies that have been done, it is found a solution to prevent anemia. Anemia can cause weakness and dizziness due to lack of blood, which can lead to complications. The objective is to provide information to assist the general public in diagnosing anemia and getting a preciseand accurate diagnosis.
Jaringan Saraf Tiruan untuk Memprediksi Jumlah Pasien Rawat Jalan bagi Pengguna Narkoba Menggunakan Metode Backpropagation: (Studi Kasus : Kantor BNN Kota Binjai) Lestari, Devy Armaya; Ginting, Budi Serasi; Nurhayati, Nurhayati
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 2 (2020): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i2.258

Abstract

The National Narcotics Agency of Binjai City has the duty and function of preventing the abuse of narcotics, eradicating illicit narcotics trafficking, and rehabilitation of narcotics addicts in Binjai City. The National Narcotics Agency is also tasked with compiling and implementing national policies regarding the prevention and eradication of the abuse and illicit trafficking of psychotropic substances, precursors and other addictive substances except for tobacco and alcohol addicts. So we need an application that can predict the number of outpatient visits. Based on the analysis process that has been carried out under the artificial neural network system using the Backpropagation method, it can be implemented into an artificial neural network application and produces predictions of outpatient drug users with an average of 93 patients inex users, 78 patients of marijuana and 92 patients with crystal meth result 0.302960 equals 30.
Promosi Jasa Menjahit Berbasis Web dengan Fitur Live Chat (Studi Kasus Okta Tailor): Array Yani Siahaan, Clara Martha; Rahman Syahputra, Edy; Nurjamiyah, Nurjamiyah
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 2 (2020): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i2.272

Abstract

Live chat applications have become an attraction for smartphone users. Live chat application users can communicate with fellow users without any time and distance restrictions. So that it can make it easier for users to communicate between fellow users. The development method in building a Web-Based Sewing Service Promotion with the Live Chat Feature Okta Tailor Case Study is based on the agile method. The agile method consists of planning, namely the plan for making the system, requirements analysis, which is to analyze the making of the application content, design, namely to describe the appearance of the application, testing, namely for application testing, and documentation, namely to document the application results. The purpose of this research is to produce Web-Based Sewing Services Promotion with Live Chat Feature for Okta Tailor Case Studies, with the application of this system to expand the sewing service business on Okta Tailor.
Sistem Pakar Identifikasi Kerusakan pada Budidaya Lebah Madu (Apis Cerena) Menggunakan Metode Certainty Factor: Array Eka, Muhammad
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 2 No. 1 (2020): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v2i1.274

Abstract

Expert systems which are part of artificial intelligence and have an important role in the development of information technology in various fields, expert systems answer all the problems we have faced by providing the right solutions based on one's expertise in a field. The expert system for identifying damage to the management of Apis Cerana bee cultivation is a practical solution in treating and repairing damage caused by pests and diseases. Identification of damage to the management of Apis Cerana bee cultivation using a certainty factor method, which will be assessed for its accuracy level by an expert. The result of using certainty factor method is definite proof or not a fact or diagnosis of damage caused by pests and diseases in Apis Cerana bee cultivation. The percentage level of certainty of damage to the management of Apis Cerana beekeeping is obtained and determined by an expert and implemented into a Web-based system.
Rancang Bangun Tempat Sampah Pintar Berbasis Arduino Uno: Array Sirait, Ricoplyando; Lubis, Imran
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 3 No. 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.355

Abstract

The trash can is a container that can temporarily accommodate trash. Arduino uno-based smart trash can which includes an LCD sensor as a medium for displaying text in the trash. The PIR sensor functions as a motion detector for human presence, and the Green LED for notification of human presence in the trash, the Red LED for notification of full trash cans, and the Servo motor is used as a tool for opening and closing, and the ultrasonic sensor for detecting the volume of waste, and the buzzer as a tool for opening and closing. beep notification, if the pir sensor reads the presence of a person, if the volume of trash has entered 17cm distance that the Red LED will be High.
Perbandingan Kinerja Ipcop dengan Honeypot dalam Mengamankan Server Linux dari Serangan Hacker: Array Manik, Burju Manik; Lubis, Imran
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 3 No. 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.356

Abstract

Research to install IPCop and honeypot on server computers and implement IPCop by way of configuration to protect the server from unauthorized parties. The software used in this research is IPCop, Manjaro Linux, Shootpress, Windows 10, and Virtual Box. The results of this study indicate that the implementation of IPCop as a security system on the server can be done and can run well. IPCop is able to protect servers from hacker attacks very well, even using IPCop hackers are not able to ping the server, so hackers cannot find out information about the target server. Honeypot implementation as a security system on a linux server can be done and can run well. Honeypot is able to protect the server from hacker attacks well through its virtual server. So that hackers do not know where the original server is and the hacker will only attack the virtual server from the honeypot and think as if the server is the real server. In this case IPCop is better than the honeypot in the server security system
Implementasi Keamanan Jaringan Berbasis VPN dan Anti - DDoS dalam Melindungi Server Linux dari Serangan Hammer: Array Pangestu, Raka Nugraha; Yanti, Risma; Harahap, Herlina
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 3 No. 1 (2021): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v3i1.357

Abstract

Although there are many security methods that can be used to block DDoS attacks, for now these methods are arguably less effective, because many hackers have known bugs from the system or security methods. From the background of this problem, testing the security of Linux Mint servers, Linux Mint without VPN and Anti DDoS, implementing network security from hammer attacks on Linux Mint Linux servers with VPN and Anti-DDoS, and testing DDoS and VPN attacks have been successfully implemented. on linux mint. Anti-DDoS and VPN are able to prevent DDoS attacks on Linux servers by blocking unknown IPs from accessing the server and redirecting attacks to virtual IPs provided by the VPN.