cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
jsaktiamiktunasbangsa@gmail.com
Editorial Address
Sekretariat J-SAKTI (Jurnal Sains Komputer dan Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : http://dx.doi.org/10.30645/j-sakti
J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelegence, Digital Signal Processing, Human Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge Based Management System, Game Technology.
Articles 499 Documents
Rancang Bangun Aplikasi Pendeteksi Tingkat Kepekatan Asap Hasil Pembakaran Berbasis Internet of Things Somantri, S; Kharisma, Ivana Lucia; Angelina, Nadila
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.680

Abstract

The objective of this study is to develop and construct an Internet of Things (IoT) system(Internet of Things) application for detecting the concentration level of smoke resulting from combustion. The current advancement in technology has had a significant Significant influence across a range of domains, encompassing the realm of Internet of Things (IoT). The IoT network allows devices to interact and exchange information automatically, enhancing efficiency and security in various sectors. Early detection of smoke is crucial for preventing further damage and protecting human health. Therefore, this research utilizes MQ-135 and TGS 2600 sensors as smoke detection sensors. Through IoT, real-time measurement of smoke concentration can be achieved, enabling immediate actions in response to significant changes. The data collected through IoT can to enhance effectiveness, the information can be stored within a database and efficient research. By implementing this application, it is expected to provide a better solution for automatic detection and monitoring of smoke resulting from combustion, reducing air pollution risks, and enhancing human safety.
Perancangan UI/UX Design Aplikasi Pemesanan Sayur Berbasis Mobile Menggunakan Design Thinking Cantika, Berliana Nala; Susetyo, Yeremia Alfa
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.671

Abstract

One of the most common problems is how to save time without going to the market. In addition, it is difficult to search for vegetables by type, quality, price and other factors. Therefore, this application is designed to provide solutions that bring convenience and meet the needs of users. The purpose of this study is to apply the design thinking method in making UI/UX design for mobile-based vegetable ordering applications. Design Thinking is a method that focuses on innovation and consumers, in addition to paying attention to user needs and combining them with appropriate technological features so that they become good products due to their feasibility. Empathize, define, ideate, prototype, and testing are the 5 stages of the design thinking method. Next, use the System Usability Scale as a testing stage. Based on the test results on the aspect of satisfaction obtained a score of 91 with the assessment of adjective ratings is “Excellent“, while the grade scale gives the results of”A".
Integrasi Desain Inklusif pada Perancangan Aplikasi Mobile Reminder Pengolahan Makanan bagi Ibu Menyusui Erkamim, Moh.; Fitriyadi, Farid; Yulius, Rina
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.662

Abstract

This study discusses the development of a mobile application called LactoMeal, which is specifically designed to assist breastfeeding mothers in organizing and processing food materials to meet the nutritional needs of both the mother and baby. The application was built using an inclusive design that adheres to WCAG accessibility standards. The SDLC prototype development model was chosen for use in this application because it allows for quick and flexible changes during the development process. To evaluate the usability of the application, this study used the System Usability Scale (SUS) with the participation of 51 users. The evaluation results showed an average SUS score of 71.127, indicating that the LactoMeal application is acceptable and has the potential to help breastfeeding mothers in organizing food materials. However, improvements are still needed in some aspects to enhance the quality of the application's usability.
Penerapan Metode Dempster Shafer Pada Aplikasi Gangguan Kecemasan Sosial Berbasis Android Putri, Dini Ridha Dwiki; Fahlevi, Muhammad Reza; Nisa, Hairun
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.701

Abstract

Social anxiety disorder is a mental health disorder characterized by a fear of being watched, judged, or embarrassed by others. Anyone can actually experience fear or anxiety when interacting with other people. But for sufferers, this fear is experienced excessively and gradually over time. As a result, this condition affects interaction with other people, productivity at work, or achievement at school. For this reason, we need a system that can carry out psychological tests for social anxiety disorder, which are dominated by sufferers with an age range of 10-17 years and even more, sufferers who have anxiety and are afraid to tell what they are experiencing can use this application before deciding to consult a psychologist. . The application of the Dempster Shafer Method in this application provides accurate results on the percentage level of confidence in social anxiety disorder by transferring expert (psychological) knowledge into an Android-based application, the system will be said to be successful if it shows the same or close percentage. Implemented into Android-based software and the application is dynamically displayed and user friendly.
Pengembangan Aplikasi Mobile Phone Kosakata Bahasa Inggris Untuk Siswa SD Di Papua Sampebua, Mingsep Rante; Tanjung, Rosye H. R; Sampebua, Abigael
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.685

Abstract

The low level of student interest and the ability of Papua Abepura Adventist elementary school students in understanding and memorizing English vocabulary requires innovative learning media. The purpose of this research is to develop mobile phone-based English vocabulary learning media applications. English vocabulary learning applications can improve English vocabulary mastery for elementary school students, increase student motivation and interest in learning vocabulary, student-centered learning, trigger student creativity, effectiveness, build student independence in learning vocabulary, and the learning process can be done whenever and wherever students want to learn. This is expected to change the mindset and culture of using mobile phones for elementary school students in Papua so that they can be used properly and efficiently for learning English vocabulary. The application development method uses the waterfall which includes five stages, namely identification of user needs for learning English vocabulary, analysis, design, implementation, and testing
Analisis Manajemen Risiko Keamanan Sistem Pengolahan Data Accurate Menggunakan Metode OCTAVE-S Butar, Fajar Rido Butar; Saputra, Eki; Marsal, Arif; Hamzah, Muhammad Luthfi; Fronita, Mona
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.676

Abstract

PT.XYZ is a palm oil company currently implementing the Accurate data processing system to manage data at its factory. This system is utilized for weighing incoming palm fruit, processing palm fruit within the factory, and generating various reports. However, during the implementation process, the system has encountered several threats that have had an impact on the company. These threats include connection errors, human errors, and server downtime. To address these issues, a threat risk analysis is necessary to minimize the likelihood of similar problems occurring in the future. In this study, the OCTAVE-S method is employed as it offers solutions for managing other threats. The risk analysis results indicate that there are six security practices that pose a high risk to the company's system security. These practices are IT Security Monitoring and Audit, Authorization and Authentication, Vulnerability Management, Encryption, Security Planning and Architecture, and Incident Management. Based on these findings, it is recommended that the company conducts a review of its security practices to prevent the emergence of new risks that may affect its business processes.
Pengembangan Aplikasi E-Commerce berbasis Android sebagai Sarana Jual Beli Barang Bekas menggunakan Metode Waterfall Mayestika, Anastasia Kezia Beatrix; Sediyono, Eko
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.667

Abstract

People often find it difficult to cope with the accumulation of household waste that includes furniture, clothes and other items. This accumulation of household waste does not only affect one house but also affects neighboring houses. Piles of unused items continue to accumulate in homes and other places, resulting in problems caused by inconvenience due to the large number of new items. With these problems, an application for buying and selling used goods was developed for people who want to sell or buy used goods. This research uses the Waterfall method as a software development method. This application is made by integrating the responsibilities of sellers and buyers simultaneously, resulting in one account that can buy and sell at the same time. With this application, it is hoped that the community can be helped in finding used products or goods that are still suitable for use.
Sistem Rekomendasi Collaborative Filtering Sebagai Upaya Peningkatan Perekonomian di Pasar Tradisional Tambunan, Herbert A.; Sitorus, Jimmi Hendrik Pangihutan
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.706

Abstract

Traditional markets face significant challenges from the growth of modern markets and e-commerce, which can lead to reduced attractiveness, loss of competitiveness and decreased sales. Traditional markets have a key role in economic, social and cultural sustainability. Therefore, the preservation and transformation of this market is very important to support the economy, promote local products and maintain cultural heritage. This research aims to improve the economy of traditional markets by implementing collaborative filtering technology, which makes it easier for consumers to find the desired products. The Horas Market in Pematang Siantar City is the object of research. Collaborative filtering is a technique that uses user data to recommend products based on similarities to other users. The dataset includes the opinions of 2,114 consumers who purchased products from 10 kiosks, totalling 97 products and 5,948 product ratings. Test results using the RSME metric with 100 epochs show a value of 0.1832 on the training data and 0.1908 on the test data. These results show the suitability of the Matrix Factorization-based collaborative filtering method as an application recommendation system at the Horas Market. In the context of traditional markets, this technology can increase sales by recommending relevant products to customers, encouraging the economic growth of traditional markets. However, it is necessary to understand the long-term implications for local communities and the economy as the next step in this research.
Implementasi dan Analisis Attack Tree pada Aplikasi DVWA Berdasar Metrik Time dan Skill Level Nugraha, Yadi; Widjajarto, Adityas; Fathinuddin, Muhammad
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.690

Abstract

Attack trees can be formulated based on the steps of exploitation that occur in web applications. The aim of this research is to understand the relationship between attack trees and exploitation characteristics based on time and skill level metrics. The platform for exploitation testing uses DVWA and is organized into an attack tree. The attack tree is structured with both protected and unprotected WAF conditions. The attack tree is organized based on five vulnerabilities: SQL Injection, XSS (Reflected), Command injection, CSRF, and Brute force. The analysis results with the unprotected WAF condition conclude that the XSS (Reflected) attack tree ranks first with a score of 131.92. The SQL Injection attack tree ranks last with a score of 1727.56. Meanwhile, with the WAF, the SQL Injection attack tree ranks first with a score of 54. The Brute force attack tree ranks last with a score of 319.51. Thus, this relationship can be used for ranking attack trees based on time and skill level metrics. Further research can involve detailing the steps of exploitation using CVSS scores as a skill level calculation and measuring parameters using IDS as one of the firewall features.
Rekayasa Arsitektur Buku Tamu Digital Purwatiningtyas, P; Rani, R.P.S.; Listiyono, Hersatoto; Mulyani, Sri
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.697

Abstract

The guest book is a means that can be used to find out how many guests have come to a place or other uses that require data from visitors to find out about service activities in an institution. Currently there are still many office agencies that use manual or handwritten methods. into the book to record the guest list before entering the office area. Then the book will be stored in the guard post. This is of course considered less effective because it will pose various risks. To anticipate the risks that will occur, a web-based digital guest book is created that can change the use of paper guest books. This guest book was created using the programming language HTML, PHP and the Bootstrap framework and created using the Waterfall method. Guest data will be saved automatically into the database that has been provided and can be processed by the admin. The final result of this research is a digital guest book that can make it easier for officers to store archives, process data, and print data when needed.