cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
jsaktiamiktunasbangsa@gmail.com
Editorial Address
Sekretariat J-SAKTI (Jurnal Sains Komputer dan Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : http://dx.doi.org/10.30645/j-sakti
J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelegence, Digital Signal Processing, Human Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge Based Management System, Game Technology.
Articles 499 Documents
Rekonsiliasi Data Keuangan Pemerintah Pasca Penerapan Single Database Sakti Menggunakan Finite State Automata Khuluq, Anjahul; Gata, Windu; Putra, Jordy Lasmana; Novitasari, Hafifah Bella
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.440

Abstract

Reconciliation of government financial data is a process of pairing data between work unit data and State General Treasurer data to be able to produce accountable and credible central government financial reports. The current reconciliation process is carried out by uploading data by the work unit to the e-rekon application, which can be replaced by an automatic process when implementing the single SAKTI database. The use of Finite State Automata in providing validation when the reconciliation process is carried out has proven to be able to help make the Government Financial Data Reconciliation Process effective and efficient
Document Management System Menggunakan Kombinasi Algoritma ROT13 dan Algoritma String Matching Setiawan, Feri; Fauziah, F
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.431

Abstract

Technology for document management is really need because it can improve performance both in storage, search and document security. Document management in a manual way can waste time in finding required documents and requiring a lot of space for hardcopy document storage. This study uses a string matching algorithm combined with ROT13 algorithm. String matching algorithm is used to find a file name in database, the file name in database has been encrypted for example plaintext “Kabel Ladder” into chipertext “Xnory Ynqqre”. The steps of string matching algorithm combined with ROT13 algorithm in this study are, word pattern is encrypted and then matched with existing data in database and then a string search in performed using string matching algorithm and produces the data sought. In both algorithm, time and number of matches were tested between pattern and data to show performance of two algorithms using 200 data until 500 data. The result of testing 200 data for search word Tower takes 0.00513 sec and matches 65x, 300 data for search word Tower takes 0.00716 sec and matches 164x, 400 data for search word Tower takes 0.01372 sec and matches 262x and 500 data for search word Tower takes 0.02233 sec and matches 360x. From the test result in this study, the researchers concluded that string matching algorithm combined with ROT13 algoritm, the more data, more time it will take, even though it is still relatively small
Perancangan Website E-commerce Soemardjan Florist Menggunakan Framework Laravel Anggara, Richardus Sapta; Pakereng, Magdalena A. Ineke
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.422

Abstract

Soemardjan Florist is one of the biggest florists in Salatiga, Central Java. Nearly 70% of Soemardjan Florist customers come from outside Salatiga City. Frequent found case is that customers come outside Salatiga but they sent the wreaths to weddings which is located in the Salatiga area. This proves that Soemardjan Florist has the potential to expand the market outside Salatiga city. In this research, the Soemardjan Florist website was developed to expand the Soemardjan Florist business. The website is built in PHP programming language using Laravel 5.5 framework. User test results indicate that Soemardjan Florist website can useful as a promotional media and online store as it should.
Analisis Metode Weighted Aggregated Sum Product Assesment pada Pemilihan Merek Produk Air Mineral Bei, Fathurachman; Saepudin, Sudin
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.436

Abstract

Water is one of the sources of life in this world. The benefits of water are of course incalculable, if we relate it to the consumption of water, especially mineral water. Many companies see the business potential of mineral water as a very profitable potential for businessmen. But with the emergence of many brands of drinking water in containers creating very strong competition between companies, this makes it difficult for mineral water consumers to choose which brand to buy, it is necessary to review the mineral water brand that is sold and consumed the most. From these problems, it shows that the importance of a Decision Support System to help buyers of mineral water brand products in determining the choice of brand of goods that is in line with the criteria. The method used in this decision support system research is the WASPAS method. The ranking results of each alternative using the WASPAS method with the final result of the Aqua brand product occupying the first position with a value of 2,441 as a recommendation for the selection of bottled mineral water product brands, and the Club product brand having a value of 2,219 by placing the last of 7 alternative brands of bottled mineral water products. . From these results, it can be concluded that the mineral water brand AQUA is the best choice to increase its stock because it has the highest value of 2,441.
Pengaruh Stopword Removal dan Stemming Terhadap Performa Klasifikasi Teks Komentar Kebijakan New Normal Menggunakan Algoritma LSTM Santosa, Agil; Purnamasari, Intan; Mayasari, Rini
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.427

Abstract

The development of information technology has made the popularity of social media increase in recent years, one of which is Youtube. Youtube’s popularity make this platform a major source of sentiment where almost everyone tends to express their views in the form of comments. These commnent not only express people but also have more meaning about their experiences. Comments originating from social media are unstructured so that in sentiment analysis the preprocessing stage is an important task. There are many techniques used in preprocessing including stopwrod and stemming. However, several studies have shown that the use of stopword and stemming gives different result. Therefore, in this paper, the researcher further anlyzes the effect of applying stopword and stemming on Youtube video comment regarding the New Normal policy using Long Short Term-Memory. The result obtained we found that the use of stopword and stemming greatly affects the performance of the model, this is because a lot of information is lost after the stopword process and some words change meaning after stemming.
Perancangan Dan Pengembangan Video Latihan Listening Bahasa Inggris Dengan Menggunakan Teknik Voice Dubbing Pratama, Jimmy; Christhomas, Jacky
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.441

Abstract

Video is one of the developments in information technology that has a function as an introduction to information conveyed through audio-visual media. Ease of playing back videos, making videos as a medium that can improve and develop the ability to understand information presented in a structured manner such as learning English through video. One of the international communication standards is the ability to communicate in English. English language skills also play an important role in employment in the modern era like today. With research on developing English listening practice videos using voice dubbing techniques, this video can provide audiences with learning and practice about English. The method used for the development of this video is the MDLC method. The results of this study are expected to improve the audience's ability to speak English.
Analisis Modifikasi Algoritma Kriptografi Klasik Menggunakan Algoritma Blum-Micali Generator Aripin, Soeb; Syahrizal, Muhammad
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.432

Abstract

Classical cryptography is the science of securing secret messages (plaintext) into disguised messages (ciphertext) in which each character is changed. The process of converting plaintext into ciphertext is called encryption, while the reverse process is called decryption. However, this classical crypto algorithm can still be solved using the Kasiski method, due to the mathematically regular pattern of repeating keywords. Therefore, in order not to be easily solved, another method is needed, namely by modifying the Caesar Cipher and Vigenere Cipher cryptographic algorithms. Therefore, to strengthen the security of the classical cryptography algorithm, it is necessary to carry out a modification process using an algorithm that is able to change the complexity of the encoding by using a randomization algorithm. By including a randomization algorithm, it is considered that it can eliminate the possibility of attackers guessing the results by knowing the algorithm used. The randomization algorithm used is the Blum-Micali Generator algorithm. The purpose of using the Blum-Micali Generator algorithm is that the encryption process is randomized so that the encryption results obtained are more difficult to guess, making it difficult for cryptanalysts to read the message or information
Sistem Penunjang Keputusan Penerapan Metode Topsis Pada Peningkatan Kinerja Karyawan Alfaudzan, Adriansyah Muhamad; Gustian, Dudih
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.461

Abstract

In determining the success of the company's work is influenced by human resource management (HR), one of the strategies in improving the quality of human resources work is to appreciate employee performance. The method used in determining this promotion is the topsis method, it is hoped that the assessment will be more precise because it is based on predetermined criteria and weights so that it will get more accurate results. For this reason, researchers try to help the problems mentioned above by developing a decision support system using the application of the TOPSIS method for this system. In this study we will know which employee performance is more accurate according to the company's determination, the results are in accordance with this study there are 5 candidates, 3 candidates who have high scores were selected, namely the first rank in the highest employee performance, the 1st is p1 with a preference value of 0.568796348, the second p2 with a preference value of 0.568579031, and the third rank p3 with the same preference value as p2.
Sistem Informasi Persediaan Barang Operasional Hotel Berbasis Web Aldo, Dasril; Nengsih, Yeyi Gusla; Wijaya, Trisno
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.452

Abstract

Lovina Inn Hotel is a hotel that provides services to tourism guests in Batam City. At this time, in storing inventory data, it still uses a record book, so that when searching for inventory information, incoming and outgoing goods are still carried out in a recording form. The purpose of this study is to design an information system for operational goods inventory at the Lovina Inn hotel so that it makes it easier to manage data by not doing manual recording. With the application of a structured analysis model method for the creation of an Operational Inventory Information System, it can make it easier to build a system using the PHP language (Hypertext Preprocessor) and a database using MySQL. This application is designed to make it easier for the hotel to manage the incoming and outgoing stock of goods to the hotel operational inventory report
Analisis Digital Artifak Aplikasi Signal Messenger Pada Sistem Operasi Android dengan metode NIST Nafila, Feryan Lutfie; prayudi, Yudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 6, No 1 (2022): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v6i1.466

Abstract

Message applications have now become a part of today's society. Beside from features, security and privacy are important things for users. Security and privacy are important because some users of this application are worried if the message their send will misused by the company. This concern is heightened after a new rule issued by a popular instant messaging application company where data from the messaging application will be linked to other applications for business purposes, some popular messenger users are worried about their privacy choosing to switch to other messaging applications that are considered more secure and offers privacy. One of the applications of choice is Signal Messenger becouse this application is more secure in maintaining privacy. This is a concern if applications that offer more privacy become a means to commit crimes. Consider that, the research work will focused on conducting forensic testing and analysis of the Android-based Signal Messenger application. The test will carried out on SMA530F and RedmiNote 4 smartphone devices. The scenario that will applied is by installing the Signal Messenger application on each smartphone, then communication between the two smartphones is such as sending text messages, images, and videos. From these activities, the mobile forensics stage using the NIST method such as making acquisitions and then analysis to obtain digital evidence. The test results will be expect for a reference for the authorities and related parties if there is a case using the Signal Messenger application and it is hoped that this research can add to the literature in the field of digital forensics, especially mobile forensics