cover
Contact Name
Fera Damayanti
Contact Email
jurnaljikstra@gmail.com
Phone
+6285262785875
Journal Mail Official
jurnaljikstra@gmail.com
Editorial Address
Jalan Imam Bonjol No 35
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA)
ISSN : 2715887X     EISSN : 27472485     DOI : https://doi.org/10.35447/jikstra.v6i2
Core Subject : Science,
A journal managed by the Informatics Engineering and Information Systems study program at Universitas Harapan Medan (UNHAR), this journal discusses science in the field of Informatics and information systems, as a forum for expressing research results both conceptually and technically related to informatics. Jikstra is published twice a year, namely in April and October, the first issue in the April 2019 edition. JIkstra in the peer review process uses blind peer review.
Articles 68 Documents
Perancangan Animasi 3D Teknik Dasar Taekwondo Menggunakan Unity Mufti, Fachri; Khairunnisa, Khairunnisa
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 2 (2024): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i2.992

Abstract

Many criminal acts often happen to everyone, such as sexual violence, pickpocketing, and others. Therefore, everyone must also be able to protect themselves from violence that can occur anywhere and also protect themselves from cities affected by crime. In Indonesia, there are generally martial arts such as karate, pencak silat, and others. In this study, we will explain the basic techniques of taekwondo martial arts. This learning uses an animated video tutorial of one of the knowledge used as access to the learning process. In learning the animation of basic taekwondo martial techniques, everyone must have an animation video of the basic taekwondo techniques. This animated video uses Unity software.
Pemilihan Squad di Game E Football Mobile Menggunakan Metode Topsis Pratama, Ilham; Wulan, Nur
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 2 (2024): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i2.993

Abstract

In the 2024 mobile e-football game, gamers are challenged to build a strong team (squad) by selecting quality players. Most gamers rely on intuition or previous gaming experience in building their squad, which is often not optimal. The main obstacle in selecting the best squad is the number of variables and data that must be considered. Player statistics play an important role in determining a player's effectiveness on the field. The purpose of this research is to create a decision support system to use to form the best squad (team) in the 2024 mobile e-football game to assist gamers in determining players withmore systematic and data-based information to be included in the squad. This study uses the TOPSIS method which is one of the multi-criteria decision-making techniques used to select the best alternative from a set of existing alternatives. The results of the study show that the decision support system of the TOPSIS method can be used as an option to choose players in the 2024 mobile e-football game. From the results and testing of this decision support system, the players were allowed to be included in the squad based on the data input into the system, namely, the position of goalkeeper M. ter Stegen. Defender D. Alaba; Marquinhos; J. Kounde; and Eder Milirao. Midfielder J. Kimmich; J. Bellingham; and J. Musiala. Attacking player K. Benzema; H. Kane; and K. Mbappe.
Perancangan Sistem Pendukung Keputusan Pemilihan Smartphone Dengan Metode MABAC (Multi Objective Border Approximation Area Comparision) Tampubolon, Elfrans Arsendy; Damayanti, Fera
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 2 (2024): Edisi Oktober
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i2.1001

Abstract

Choosing the right smartphone is a challenge amidst the variety of options available in the market. To overcome this problem, a decision support system is needed that can help consumers in determining the best choice based on various criteria. This research aims to design a smartphone selection decision support system using the Multi-Objective Border Approximation Area Comparison (MABAC) method. The MABAC method was chosen because of its ability to handle various complex and conflicting criteria, such as price, features, camera quality, battery life, performance, and design. The system designed in this study integrates data from various trusted sources, such as user reviews, technical specifications, and product ratings from reputable technology sites. The collected data is then processed using the MABAC algorithm to give a final score to each available smartphone alternative. This process involves several stages, including data normalization, determination of criteria weights, and calculation of the final score for each alternative. The results of this system implementation show that the MABAC method can provide smartphone recommendations that match user preferences and needs more objectively and accurately. Users can enter their preferences regarding the weight of criteria that are considered important, and the system will provide the best smartphone recommendations based on these preferences. Thus, this decision support system is expected to help consumers make more effective and efficient decisions, and reduce uncertainty in the smartphone selection process.
Penerapan Augmented Reality dalam Pengenalan Budidaya Burung Walet Siregar, Yosua Arihta R. Sada; Tommy, Tommy; Budiman, Arief
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.906

Abstract

This is a new author guidelines and article template of information technology journal since year 2018 publication. Article should be started by Title of Article followed by Authors Name and Affiliation Address and abstract. This abstract section should be typed in Italic font and font size of 11 pt and number of words of 150-200. Special for the abstract section, please use normal margin. The single spacing should be used between lines in this article. If article is written in Indonesian, the abstract should be typed in Indonesian and English. Meanwhile, if article is written in English, the abstract should be typed in English only.The abstract should be typed as concise as possible and should be composed of: problem statement, method, scientific finding results, and short conclusion. The abstract should only be typed in one paragraph and one-column format. Keywords:author guidelines; infotmation technology; article template
Desain Profil Perusahaan Imigrasi Polonia Medan dengan Menggunakan Animasi Motion Graphics Suriati, Suriati; Tommy, Tommy; Dafitri, Haida
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1070

Abstract

Creating an animation for the Polonia Medan Immigration Company Profile Design Using Motion Graphics Animation is a design that aims to provide information about the Polonia Medan Immigration Office, so that it can be known by the wider public while making this animation a medium for finding out what the public doesn't know about the Polonia Medan Immigration Office . Multimedia is a combination of three elements, namely sound, images and text which can create dynamic and interactive presentations.
Implementasi Association Rules dengan Algoritma FP - Growth Annisah, Yessi Fitri; Sundari, Siti
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1071

Abstract

This research aims to help Ayaa Fashion Store improve its sales strategy by understanding consumer shopping patterns. This research was conducted by utilizing the FP-Growth algorithm to analyze consumer purchasing patterns based on sales transaction data at the Ayaa Fashion Store which operates in the sales of women's clothing, mukenas and headscarves. The data collection method is carried out through daily sales transaction information, with a total of 365 transactions recording goods purchased by consumers. The use of the FP-Growth Algorithm allows identifying events that frequently occur in the dataset, producing association rules that describe consumer shopping patterns. The analysis was carried out by paying attention to the support and confidence values, and using the lift ratio to assess the strength of the association rules. Data processing was carried out using RapidMiner software. The research results include 12 association rules and 20 itemsets of goods that consumers frequently buy. The results of this research evaluation show that the FP-Growth algorithm is effective in analyzing sales transaction data, providing valuable guidance for designing sales strategies, and optimizing the supply of goods for Ayaa Fashion Stores.
Keamanan AKun Web dengan Time Based One Time Password Khair, Ummul; Budiman, Arief; Chiuloto, Kalvin
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1072

Abstract

The rapid development of technology with the large number of people using the internet for daily needs makes it easier to interact and search for information more quickly and precisely. So that comfort is also felt by many parties making transactions, but it needs to be taken into account that when you increasingly want comfort, security also really needs to be considered. Because comfort is inversely proportional to security, the more users want comfort, the more users must pay attention to security. Using the internet in everyday life has become commonplace now, so using a password to secure an account has become a necessity. Several sites on the internet that are widely used use security in the form of passwords for accounts. Time-Based One-Time Password (TOTP) is one way to use passwords for web security. By using TOTP, it will be difficult to steal because the password will be sent in real time every time you enter a web page.
Pemanfaatan Stop Motion pada Desain Iklan UNHAR Khairunnisa, Khairunnisa; Khairani, Mufida
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1073

Abstract

The stopmotion method is an animation method that takes several images and converts the images into video form, creating an illusion so that the images appear to be moving. This method is used to make the University of Harapan Medan advertisement look attractive and unique so that it is accessible to all groups. It is hoped that this can help as a form of promotion and marketing from University of Harapan Medan
Pemodelan Gerakan Chess Knight dalam Masalah System Produksi Usman, Ari; Lestari, Yuyun Dwi
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1074

Abstract

Artificial Intelligence is a part of computer science that studies how to make computers able to do work like humans do. The horse checker on a chess board has a movement that resembles the letter L. This chess checker is one of the pieces that is very difficult to move and is often the most dangerous checker if you don't pay close attention to each movement. The simulation of this problem provides an n x n chessboard. The goal of this problem is to move a horse from a certain position on the chess board to the desired goal position by simulating all the shortest possible movement solutions to get to that goal position. This problem is also one of the classic problems in artificial intelligence (AI). Solving this problem can use the help of production systems and tracking trees
Pengembangan Sistem Keamanan Pusat Data dengan Memanfaatkan Group Policy Management Harahap, Herlina; Handoko, Divi
Jurnal Ilmu Komputer dan Sistem Komputer Terapan (JIKSTRA) Vol. 6 No. 1 (2024): Edisi April
Publisher : Universitas Harapan Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35447/jikstra.v6i1.1075

Abstract

The increasing development of data communications makes the aspect of data security and confidentiality increasingly important. Information technology is developing very rapidly in human life today, making the need for a centralized data storage system important for storing digital archives and documents. Along with this progress, the need for security on storage media is very necessary because technological progress is directly proportional to the crimes that exist on the internet itself. Therefore, how to build a Data Center security system on a LAN network using Group Policy Management on Windows Server 2012 with the aim of providing Data Center security based on user actions in moving data from client computers to other storage locations. By building this system, users will be able to prevent theft of data on clinet computers. To secure data, it is necessary to have tools that can be used to manage security and several other policies in the Microsoft Windows program. With Active Directory and Group Policy Management in Window Server 2012 it provides an easy and effective way to manage preferences and settings for computers and users. Group Policy Management provides a very simple way to see what's happening within a particular Group Policy Object (GPO). Based on the testing, it can be concluded that the existence of Group Policy Management can improve the data security system so that the data cannot be copied or duplicated and stored in other storage media.