cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
jsaktiamiktunasbangsa@gmail.com
Editorial Address
Sekretariat J-SAKTI (Jurnal Sains Komputer dan Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : http://dx.doi.org/10.30645/j-sakti
J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelegence, Digital Signal Processing, Human Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge Based Management System, Game Technology.
Articles 499 Documents
Penerapan Metode Technometrik Untuk Penilaian Kapabilitas Teknologi Industri Galangan Kapal Dalam Menyongsong Era Industri 4.0 Utomo, Satrio; Setiastuti, Nugraheni
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 3, No 1 (2019): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v3i1.105

Abstract

The national shipyard industry is one of the strategic and competitive industries that deserve to be developed. The current developing era, namely the industrial 4.0, the growth of the national shipyard industry is expected to be able to active in the era of industry 4.0. In certain aspects and scales, the capabilities possessed are not inferior to world-class capabilities, but further development is still needed, referring to the fact that many domestik fleet needs and repairs are still dependent on foreign shipyards. So far, the domestic shipyard industry still facing a number of challenges, including financial support from the financial sector. Therefore measurement is needed toincrease rationalization towards labor productivity. The objective of reseach was first, identify and evaluate the operation of the current national shipyard industry by assessing the level of shipyard technology. Second, to know the strengths and weakness of technology so that management can know which technology development priorities must first be given attention andimprovement an effort to meet the industrial 4.0. The technology capability level can be determined based on the TCC (Technology Contribution Coefficient) which is a Technometrics method developed by UN-ESCAP. Based on the results of the assessment is the level of shipyard technology of PT. DOK Kodja Bahari based on Technoware, Humanware, Infoware, and Orgaware components is 0.519 which shows a good classification at the level of semi-modern technology.
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Diana, Mia; Zebua, Taronisokhi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Perancangan Sistem Informasi Pemesanan Spectrum Party Planner Dengan Menggunakan Metode AHP Desi, Efani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.241

Abstract

Wedding Organizer is a service that works personally to help the bride and groom in planning and supervision of the implementation of the wedding party by schedule and budget that have been set. Wedding organizer information system created using web-based information technology to expand the area of promotion and sale of wedding packages and simplify the ordering process. System Design Information Ordering Wedding Organizer is UML modeling visualization (Unified Modeling Language), and this application applies the method Analytical Hierarchy Process (AHP), namely by weighting the criteria and vendors. The programming language used is the PHP programming language (PHP Hypertext Preprocessor) with MySQL as the Database Management System (DBMS), and Atom as an editor. A wedding organizer information system is very helpful for people who do not want to bother with their wedding planning issues. With the development of technology today, the wedding Organizer has begun to move from the manual process into the online process of the wedding information system-based organizer web.
Naïve Bayes Klasifikasi untuk Rekomendasi Strategi Promosi Tindakan pada Aesthetic Dental Clinic Karawang Utami, Dwiarti Rahma; Kurniawan, Adi; Enri, Ultach
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.360

Abstract

Aesthetic Dental Clinic is one of clinic in Karawang. To keep old patients and attract new patients visiting Aesthetic Dental Clinic, it is necessary to develop a new marketing strategy in promotion. The metodh of data mining classification can be used to help determine promotional strategies to attract customers. The Naïve Bayes algorithm can be helpful to predict customer interest based on promos given by the ADC Clinic (Aesthetic Dental Clinic). The Naïve Bayes algorithm is a data mining classification algorithm that can be used to support an effective and efficient promotion strategy. The result of this research is the application of the data mining algorithm, namely Naïve Bayes, which can provide important information such as prediction results in an effort to attract customer interest. The data used in this study is customer data from October 2020 - November 2020. The accuracy value generated by Naïve Bayes using Rapid Miner was 31.74% and the result of kappa value was 0.183. With the accuracy value obtained, it is hoped that it can help to support promotional strategies that have an impact on the effectiveness and efficiency of promotions and can increase the number of new customers.
Akuisisi Bukti Digital Aplikasi Viber Menggunakan Metode National Institute of Standards Technology (NIST) Syahib, Muhammad Irwan; Riadi, Imam; Umar, Rusydi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 1 (2020): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i1.196

Abstract

The rapid development of mobile technology today is directly proportional to the development of mobile applications in it. Making it easier for people to choose and use the application as they want. This has resulted in misuse of negative things, ranging from human trafficking, drug trafficking, as well as online prostitution business. Viber is an Instant Messenger application that makes it easy for users. This application can be used to send messages, call, send photos, audio and video to others. This application has been used by 260 million people worldwide. This is the basis of research to acquire digital evidence in Viber applications. Data obtained after acquiring based on the work steps of NIST are the accounts of the perpetrators, contacts targeted by the perpetrators, call history, text messages, picture messages and videos.
Analisa Terhadap Perbandingan Algoritma Decision Tree Dengan Algoritma Random Tree Untuk Pre-Processing Data Saifullah, Saifullah; Zarlis, Muhammad; Zakaria, Zakaria; Sembiring, Rahmat Widia
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 1, No 2 (2017): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v1i2.41

Abstract

Preprocessing data is needed some methods to get better results. This research is intended to process employee dataset as preprocessing input. Furthermore, model decision algorithm is used, random tree and random forest. Decision trees are used to create a model of the rule selected in the decision process. With the results of the preprocessing approach and the model rules obtained, can be a reference for decision makers to decide which variables should be considered to support employee performance improvement
Deteksi Cyberbullying berdasarkan Unsur Perbuatan Pidana yang Dilanggar dengan Naive Bayes dan Support Vector Machine Manoppo, Tommy Nugraha; Fudholi, Dhomas Hatta
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 1 (2021): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i1.293

Abstract

Lack of understanding by Indonesian social media user about law impact inflicted to cyberbullying perpetrators makes many cyberbullying cases has not handled properly and ended up with nothing. Indonesia hasn’t yet law authority that govern cyberbullying in specific, causing no guideline regard the definition about cyberbullying itself. There is an extension about definition of violence which state that violence is not only physically deliver, but also psychologically, referred an inferences cyberbullying characteristics possibly qualify in element of criminal act. Therefore, the element of criminal act can be used as a basis for detecting potential of cyberbullying. In this research, literature review is used to determine the elements of criminal acts related to the characteristics of cyberbullying and also in finding a model classifier to detect cyberbullying messages. So there are 5 criminal acts related to cyberbullying characteristic which insult, accuse with defamation, hatred about ethnicity, religion, race and inter-group relations, threat of violence, and threat of telling secret. Total of 5000 tweets are collected as a dataset. Feature extraction, using the N-gram method with TF-IDF weighting is expected to obtain sentiment based on the use of words. The context of language becomes important in this study, so the dataset annotation process is carried out by linguist. The results on the application of the two model classfier were Naïve Bayes and SVM after applying resampling by over-sampling using SMOTE method, can correctly predict the potential for cyberbullying by their violated element of criminal act with the average performance measurement of 90%.
Implementasi Metode Analytical Hierarchy Process Dan Interpolasi Linier Dalam Penentuan Lokasi Wisata Di Kabupaten Karangasem Sudipa, I Gede Iwan; Wiguna, I Komang Arya Ganda; Putra, I Nyoman Tri Anindia; Hardiatama, Kadek
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.383

Abstract

Bali is known for its tourism sector, so it has always been one of the alternative tourist destinations for local and foreign tourists. Almost every district in Bali has interesting tourist attractions to visit for tourists. When traveling, tourists usually decide to visit interesting tourist destinations. The number of tourist destinations available, often makes tourists confused about choosing a destination according to their preferences. Therefore, this research is intended for tourists to be able to determine alternative priority tourist sites in Karangasem Regency. In this study, data were collected from 75 respondents to find out alternative tourist sites in Karangasem, and to determine the criteria to be considered for traveling. These criteria are rides provided at tourist sites (C1), price of admission to tourist sites (C2), distance from tourist sites to city center (C3) and facilities provided at tourist sites (C4). 4 alternative tourism data used in the calculation by producing alternative tourist sites at Taman Ujung as the best alternative. The method used is the Analytical Hierarchy Process (AHP) to produce the weighted criteria, scoring the ticket price and distance values using Linear Interpolation and calculating the final value using the Cost and Benefit normalization process. The results of this study can provide alternative tourist locations for domestic tourists who want to vacation in Karangasem Regency.
Perancangan Sistem Informasi Pemesanan Pallet Dengan Metode Waterfall Romli, Ikhsan; Rizki, Rafli Ardian; Antoni, Andi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 4, No 2 (2020): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v4i2.232

Abstract

The development of technology always rises and then affects many people, especially in the mindset of those who do not tend to use the highest technology. CVs that accept pallet orders require a program to order pallets that can assist in data processing so that they can simplify their work. Therefore, the author tries to do the final project regarding the ordering program for pallets on the CV. Redhead Mandiri now only uses the process with Microsoft Excel. CV. Redhead Mandiri is a trading company that now only concentrates on pallets and only accepts orders from Industri Mulia. Because data processing in this CV still uses Microsoft Excel, which makes it very possible that errors or errors occur when recording data and ordering transactions, and making reports are not too accurate and make the data slow. Many customers, meaning that many transactions will be processed so that the business owner is diverted to use the benefits of computers to meet the needs of data processing and then. The best solution to overcome this problem in CV Redhen Mandiri is a computer program that can be done. All movements are more effective and efficient in the activities of CV.
Implementasi Link State Routing Dengan Algoritma Dijkstra Pada Jaringan GM Purinet Kosambi Menggunakan Metode NDLC Firdiansyah, Adri; Carudin, C; Purnamasari, Intan
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 5, No 2 (2021): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v5i2.399

Abstract

The growth of Startup companies is soaring in this era of digital economy, not a few also use LAN within the scope of their company to conduct data transactions between divisions in the company. This study aims to analyze the performance of the Link State routing protocol with Dijkstra's Algorithm using qualitative method and the Network Development Life Cycle (NDLC) methodology. Qualitative method aims to test the quality of a system to assess its performance. The research object that will be selected is GM Purinet Kosambi for the reason it has all the requirement needed for this research to continue. Because the performance of Link State Routing is not yet known by many people if it is implemented and used as a superior routing protocol in a Startup business that uses a Computer Network in it, the author is interested in researching it. The results of this study indicate that the performance of Link State Routing is very good according to the parameter of Quality of Service (QOS) and can prevent and solve existing problems as well as preventable problems such as network disconnections and detection of disturbances that commonly occur in computer networks.

Page 9 of 50 | Total Record : 499