cover
Contact Name
Dedy Yusman
Contact Email
dedy.yusman@stmikplk.ac.id
Phone
-
Journal Mail Official
jurnalsaintekom@stmikplk.ac.id
Editorial Address
Jl. George Obos No. 114, Kel. Menteng, Kec. Jekan Raya, Palangka Raya, 73112
Location
Kota palangkaraya,
Kalimantan tengah
INDONESIA
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen
Published by STMIK Palangka Raya
ISSN : 20881770     EISSN : 25033247     DOI : 10.33020
Core Subject : Science,
Jurnal Saintekom adalah singkatan dari Sains, Teknologi, Komputer dan Manajemen, merupakan jurnal ilmiah yang berfungsi sebagai media mengkomunikasikan ide, gagasan dan pemikiran seputar kajian aktual tentang sains, teknologi, komputer dan manajemen antarkademisi dan peneliti.
Articles 161 Documents
Implementasi Metode Random Forest untuk Peningkatan Efisiensi Penilaian Status Uji Kelayakan Kendaraan Bermotor di Kota Malang Maharani, Hamidah Lutfiyanti; Zaman, Syahiduz
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 1 (2025): Maret 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i1.751

Abstract

The growth of vehicle volume in Malang City presents challenges in the form of increased accident risks, especially if the technical condition of the vehicles does not meet standards. As a preventive measure, the Motor Vehicle Feasibility Testing (KIR Test) is conducted to ensure that vehicles comply with safety standards. However, manual assessments in this process are prone to human error, necessitating a more efficient and accurate system. This study implements the Random Forest method to classify the eligibility status of motor vehicles, focusing on two main categories: public and private vehicles. This implementation is expected to improve the efficiency and accuracy of the KIR test process. Among the data split ratios tested, a 60% training data and 40% test data ratio yielded the best results with an accuracy of 86.94% and an OOB error rate of 13.03%, indicating the model's error rate on data not used during training. These results indicate that the Random Forest method effectively identifies the eligibility status of motor vehicles with an optimal data configuration.
Optimasi Proses Deployment dengan Blue-Green Deployment Berbasis Containerization untuk Mencapai Zero Downtime Ramadhan, Restu Bumi Ryan; Hadi, Abdul; Maryamah, Siti
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.926

Abstract

Downtime during deployment remains a major challenge that can disrupt service availability and reduce user trust in websites. This study aims to implement and evaluate the effectiveness of a blue-green deployment strategy based on containerization to achieve zero downtime. The implementation utilizes Docker and Traefik on an infrastructure of separate Virtual Private Servers for frontend and backend services, automated through a CI/CD pipeline using GitHub Actions. The evaluation compares non-Blue-Green and Blue-Green deployment scenarios based on operational indicators such as downtime duration, service stability, and rollback capability in case of failures. The results show that the Blue-Green strategy successfully reduces downtime from an average of 80 seconds in the non-Blue-Green scenario to zero seconds, accelerates rollback processes, and improves system scalability. Although the configuration becomes more complex, this approach proves to be safe, reliable, and effective in supporting continuous deployment in modern DevOps practices that demand uninterrupted services
Etika Teknologi Informasi dalam Dunia Pendidikan: Tinjauan Literatur atas Penggunaan AI dan Isu Plagiarisme Akademik Khalida, Rahma; Rahmandri, Ananda; Matilda Magren, Sahira Ayla; Nurmiati, Evy
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.928

Abstract

The advancement of artificial intelligence (AI) has had a significant impact on higher education, particularly regarding plagiarism ethics. This study employs a Systematic Literature Review (SLR) of nine articles published between 2021 and 2025 to analyze the influence of ChatGPT on student behavior, academic integrity, and institutional policies. Findings reveal that students are more permissive toward AI-based plagiarism compared to copying from human work. A cross-cultural survey reported that 61% of students in collectivist countries considered ChatGPT acceptable as a learning assistant, compared to only 37% in individualistic countries. From the detection perspective, integrating Natural Language Processing (NLP) improved system accuracy from 72% (conventional) to 89% (AI-based). Another study reported AI effectiveness with 85% recall and 81% precision, higher than the traditional system’s 65% recall. Additionally, 74% of higher education institutions in developing countries were found to lack explicit guidelines on AI use. These findings highlight that AI challenges are not only technical but also ethical, requiring digital literacy programs and comprehensive policies to safeguard academic integrity.
Sistem Informasi Manajemen Penelitian dan Pengabdian kepada Masyarakat di LPPM Universitas Timor Berbasis Web Risald, Risald; Baso, Budiman
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.930

Abstract

This study discusses the development of the Research and Community Service Management Information System (Simpeka) at the Institute for Research and Community Service (LPPM) of the University of Timor to optimize the submission process for research and community service proposals. This web-based system was developed using PHP 5.6, MySQL 5.7, HTML5, CSS3, and JavaScript ES6. Testing involved the LPPM and relevant stakeholders to ensure the system met user requirements. The implementation results show an increase in the number of proposals from 150 in 2023 to 169 in the current year (an increase of 12.67%), a reduction in the average review time from 14 days to 7 days (50% efficiency), and a decrease in funding validation time from 7 days to 2 days (71.4% efficiency). The percentage of proposals validated according to the budget increased from 80% to 95% (an accuracy improvement of 18.75%). Technically, the Simpeka dashboard has an average load time of 1.8 seconds and a database query response time of 0.35 seconds. These improvements demonstrate that Simpeka can accelerate administrative processes, enhance transparency, and strengthen accountability in the management of research and community service at the University of Timor
Evaluasi Efektivitas HRIS dengan Metode TAM 3 untuk Mendukung Kinerja Administrasi Kepegawaian PT Minarta Dutahutama Reyhan, Andre; Achyani, Yuni Eka
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.934

Abstract

PT Minarta Dutahutama is a national-scale company engaged in architectural and construction services. Since 2022, the company has implemented a web-based Human Resource Information System (HRIS) that integrates essential modules, including employee data, attendance, leave, performance evaluation, and HR reports. This study aims to evaluate the effectiveness of the HRIS in supporting personnel administration performance at PT Minarta Dutahutama using the Technology Acceptance Model 3 (TAM 3) framework. The system is expected to enhance operational efficiency, ensure accuracy in data management, and accelerate decision-making. The research applies a descriptive qualitative approach, with data collected through questionnaires, semi-structured interviews, and direct observation. The sample involved five active HRIS users selected by total sampling due to the small population. Evaluation was carried out on six constructs of TAM 3: perceived usefulness, perceived ease of use, output quality, subjective norm, computer anxiety, and behavioral intention to use. The findings indicate that HRIS is highly useful, easy to operate, produces good output quality, and is supported by a positive work environment. The study concludes that HRIS is effective in strengthening personnel administration processes, with recommendations for improved training and continuous system development to optimize user adaptation.
Penerapan Laravel untuk Mengatasi Kelemahan Keamanan WordPress pada Website Badan Layanan Umum Daerah Sholeh, Muhammad; Iman Saputra, Tegar Satria; Suraya, Suraya
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.938

Abstract

The BLUD.co.id website was previously developed using the Content Management System (CMS) WordPress, but it encountered security issues in the form of URL redirect attacks that directed users to untrusted sites. This study aims to redesign the information system using the Laravel framework to enhance security and flexibility. The system was developed locally by applying the Model-View-Controller (MVC) architectural pattern and a relational database structure designed independently. The research employed a Research and Development (R&D) approach through the stages of design, implementation, and security testing. Tests were conducted on several scenarios, including SQL Injection, Cross-Site Request Forgery (CSRF), and login bypass. The results indicate that the Laravel-based system was able to reduce the risk of attacks by 80–82% compared to WordPress, while also demonstrating greater stability when handling invalid inputs. These findings highlight that Laravel can provide a significant contribution to delivering a more secure digital information platform for government services, while also opening opportunities for further research to evaluate its application in similar organizational contexts.
Implementasi Wazuh-ELK-Suricata untuk Deteksi Privilege Escalation di Ubuntu Server Nuswantoro, Setio ardy; Ziaurrahman, M.; Miftahurrizqi, Miftahurrizqi; Achiril Haq, Muhammad; Rashid, Reza Athallah
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.941

Abstract

Privilege escalation is one of the most critical cyberattacks because it enables adversaries with limited rights to gain full system control. Such attacks often act as gateways to larger data breaches, as seen in the 2016 Uber incident that exposed 57 million users’ personal data. This study implements and evaluates an open-source integrated intrusion detection system by combining Wazuh (HIDS), Suricata (NIDS), and the ELK Stack (Elasticsearch, Logstash, Kibana) on Ubuntu Server.Experiments were conducted through privilege escalation attack simulations using Metasploit, covering kernel exploits, misconfigurations, and software vulnerabilities. Findings reveal that the integrated system delivers broader detection compared to the default Wazuh configuration, capturing both host-level activities and network traffic. Quantitatively, a major difference was observed in response time: the integrated system detected and blocked malicious actions within 1–2 seconds, whereas the standalone system required 2–5 minutes and lacked automated blocking capabilities.Additionally, integration with the Kibana dashboard provided real-time, interactive visualization of threats, enabling administrators to trace attack patterns and respond swiftly. Overall, this research demonstrates that an integrative approach enhances detection accuracy, shortens response time, and significantly improves the quality of cybersecurity monitoring
Implementasi Support Vector Machine dalam Analisis Sentimen Ulasan Aplikasi IndiHome TV di Google Play Store Riany, Agus Fajar; Purwani, Fenny; Dwi Jaya, Irfan
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.954

Abstract

Sentiment analysis is used to determine the responses or opinions of a group or individual regarding a topic of discussion in the context of the entire document. The Indihome TV application is currently widely used by the public, so that reviews of the Indihome TV application on the Google Play Store are very numerous. The exact number of reviews given by users is not yet known based on their sentiment class. Therefore, a method is needed to facilitate the analysis of these user reviews. The purpose of this study is to determine the polarity of sentiment towards the Indihome TV application and to determine the performance and accuracy resulting from the application of the Support Vector Machine algorithm. The method used to convert unstructured reviews into structured reviews uses the Text Mining method. The results of this study indicate that using the SVM algorithm in sentiment analysis of the Indihome TV application data produces the highest accuracy value at a ratio of 90:10 at 94%. Furthermore, from the results of data visualization, the most frequently appearing words are applications, watch, channel, open, please, good, login, indihome, complete and so on.
Penerapan Metode ARAS dan ROC dalam Menentukan Destinasi Wisata Syar’i di Kabupaten Langkat Sari, Anggy Permata; Irawan, Muhammad Dedi
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.965

Abstract

The growing interest in Islamic tourism has prompted the need for a system capable of accurately recommending sharia-compliant tourism destinations. Langkat Regency boasts a variety of attractive destinations, but tourists often struggle to make informed choices due to limited information, while the Tourism Office faces challenges in prioritizing destinations. This study integrates the Rank Order Centroid and Additive Ratio Assessment methods into a decision support system. ROC was used to weight eight assessment criteria based on priority, while ARAS was applied to calculate utility values and rank ten alternative destinations. The analysis showed that Taman Wisata Syariah obtained the highest utility value of 1. Thus, Taman Wisata Syariah is recommended as a prime sharia-compliant tourism destination in Langkat Regency. The integration of the ROC and ARAS methods proved effective in producing consistent, measurable evaluations, and was able to account for variations in weighting between criteria. The developed system not only improves the efficiency of the decision-making process but also provides practical contributions to the management and development of sustainable sharia tourism in Langkat Regency.
Analisis Trafik Jaringan menggunakan Wireshark untuk Deteksi Serangan Deauthentication pada Perangkat Kamera Wi-Fi Putri, Anisa Febriyana; Hadi, Abdul; Rusdiana, Lili
Jurnal Saintekom : Sains, Teknologi, Komputer dan Manajemen Vol 15 No 2 (2025): September 2025
Publisher : STMIK Palangkaraya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33020/saintekom.v15i2.967

Abstract

The widespread adoption of wireless networks has increased the popularity of Wi-Fi-based cameras due to their ease of installation and flexibility. However, Wi-Fi devices are highly vulnerable to deauthentication attacks, a type of denial-of-service (DoS) attack that repeatedly disconnects devices from the network without user awareness. This study presents a controlled experiment simulating deauthentication attacks on Wi-Fi cameras and detecting them using Wireshark. The findings demonstrate that these attacks consistently disrupt camera connectivity, causing interruptions of 50 seconds to 1 minute and 18 seconds across two scenarios. In the first scenario, the camera connection temporarily recovered between disruptions, while in the second, it remained in a reconnecting state without restoration. All attacks were successfully identified through captured deauthentication packets. This work provides experimental validation of a widely used deauthentication attack technique leveraging the Kali Linux operating system, emphasizing its significant impact on Wi-Fi cameras. Furthermore, it highlights the importance of developing mitigation strategies to address this threat in real-world environments.