cover
Contact Name
Fristi Riandari
Contact Email
hengkitamando26@gmail.com
Phone
+6281381251442
Journal Mail Official
hengkitamando26@gmail.com
Editorial Address
Romeby Lestari Housing Complex Blok C Number C14, North Sumatra, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mandiri IT
ISSN : 23018984     EISSN : 28091884     DOI : https://doi.org/10.35335/mandiri
Core Subject : Science, Education,
The Jurnal Mandiri IT is intended as a publication media to publish articles reporting the results of Computer Science and related research.
Articles 217 Documents
Performance information system and student governance Politeknik Negeri Medan Kholil, Ahmad; Hutagalung, Gabriel Ardi; Zuardi, Muhammad
Jurnal Mandiri IT Vol. 13 No. 3 (2025): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i3.365

Abstract

Structured and effective student governance is one of the keys to success in creating a dynamic and productive academic environment at the Politeknik Negeri Medan. In an effort to increase transparency and efficiency in the management of student activities, especially related to activities, competitions and scholarships, it is necessary to implement an integrated Student Performance and Governance Information System. This system will cover various student activities, from organizations, social activities, to self-development, as well as three main competition categories: Sports and Arts Competitions, and Academic Competency Competitions. Scholarship management is also the main focus to provide financial support to students who excel or need assistance. With this integration, Politeknik Negeri Medan can improve data management efficiency, strengthen supervision, and provide easier and faster access to all parties involved, thereby creating a learning environment that is more structured and oriented towards achieving academic and non-academic achievements.
Information system and business governance in the Politeknik Negeri Medan business unit Fachrizal, Ferry; Kamil, Idham; Ginting, Jasa; Hutagalung, Gabriel Ardi
Jurnal Mandiri IT Vol. 13 No. 3 (2025): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i3.366

Abstract

Politeknik Negeri Medan (Polmed) has various business units that support academic and non-academic activities. However, performance management and business governance of these units face various challenges, especially due to the use of manual and non-integrated systems. The main problems faced include inaccurate data, information delays, difficulties in monitoring and evaluation, and inefficient document management. This research aims to develop an integrated Performance and Business Governance Information System to collect data, manage and present business reports in the Polmed business unit. This system is expected to increase the accuracy and speed of data processing, facilitate access and presentation of information for management, and increase efficiency in monitoring and evaluating business unit performance. Apart from that, this system is also expected to optimize the management of business documents and reports. Through a research and development (R&D) approach, this system was designed and implemented by utilizing the latest information technology. The research results show that the implementation of this information system is able to overcome various existing problems, as well as support improved performance and governance of the Polmed business unit. Thus, this research makes a significant contribution in supporting the vision and mission of Polmed as a superior educational institution.
Implementation of api chat messenger in the integrated presence system at Nur Azizi Tanjung Morawa private high school Hutagalung, Gabriel Ardi; Sembiring, Zakaria; Safitri, Habibi Ramdani; Aswani, Aprilza; Khairani, Ade Irma
Jurnal Mandiri IT Vol. 13 No. 3 (2025): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i3.368

Abstract

Development of an Integrated Attendance System at the Private Senior High School (SMA) Nur Azizi Tanjung Morawa: Messenger API Integration to Improve Parent-Guardian Communication and Monitor Student Attendance in Real-Time. Advances in information and communication technology have influenced various aspects of life, including education. One technology implementation that is increasingly common is a Radio Frequency Identification (RFID) based attendance system. However, although this system provides the advantage of automatically recording student attendance, delays in providing information to parents regarding student attendance is a major obstacle. To overcome this problem, this research aims to develop and implement a messenger API in the attendance system at Nur Azizi Tanjung Morawa Private High School. This integration is expected to strengthen communication between schools and parents and monitor student attendance in real-time.
Complaint information system and legal education related to violence againts children and women Roy, Andi; Arridha, Riyadh
Jurnal Mandiri IT Vol. 13 No. 3 (2025): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i3.370

Abstract

Violence against children and women remains a significant societal issue in Indonesia, impacting victims physically, mentally, and economically. Challenges in addressing this include low legal awareness, limited access to reporting mechanisms, and insufficient information about victims' rights. This research aimed to develop an information system to mitigate these challenges by providing a platform for easy complaint filing and accessible legal education. The system, developed using the Waterfall Method and tested with Blackbox testing, incorporates key features such as login, account registration, a homepage, legal education modules, complaint filing, complaint status tracking, and user account management. The successful testing of these features demonstrates the system's potential to improve access to justice, enhance public understanding of legal rights, and ultimately contribute to more effective handling of violence against children and women in Fakfak.
Hand washing system based on internet of things Lastin, Diokta Redho; Banowosari, Lintang Yuniar
Jurnal Mandiri IT Vol. 13 No. 3 (2025): January: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i3.381

Abstract

In December 2019, the first case of mysterious pneumonia was reported in Wuhan, Hubei Province. The source of transmission of this case is still unknown, but the first case was linked to a fish market in Wuhan. According to Packham in his research entitled Hand Hygiene for Infection Prevention Against COVID-19, there are two main approaches to hand decontamination, the first is to remove the virus, and the second is to inactivate the virus so that even if the virus is transferred it will not cause harm. Water is a vital resource for life. Water is used for activities such as drinking, bathing, cooking, and washing. Therefore, the availability of sufficient water is highly prioritized in both urban and rural areas. This research aims to create a handwashing warning system based on the Internet of Things (IoT) as a preventive measure against the spread of COVID-19 which is controlled and monitored for use through an Android device.
Implementation of e-crm (electronic customer relationship management) in improving the quality of service at 3 Saudara motorcycle wash Amran, Ali; Muawanah, Siti; Wati, Mala Ayu Setia; Nisa, Yustia Fitrotul; Aprilia, Wahyu Nur
Jurnal Mandiri IT Vol. 13 No. 4 (2025): April: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i4.374

Abstract

The purpose of this research effort is to critically examine the application of electronic customer relationship management (E-CRM) practices in improving service quality in Micro, Small, and Medium Enterprises (MSMEs). The methodological approach of this research is qualitative, using data collection techniques such as observation, interviews, and data collection. shows that the implementation of E-CRM can improve service quality through features such as online reservations, customer data management, and feedback systems. Key findings show that E-CRM facilitates queue management, speeds up service processes, and increases customer loyalty. The implications of this study highlight the importance of technology-based customer relationship management for SMEs to increase competitiveness and customer satisfaction.
Classification of mushroom types based on digital image processing using convolutional neural network Sari, Ira Puspita; Elvitaria, Luluk
Jurnal Mandiri IT Vol. 13 No. 4 (2025): April: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i4.387

Abstract

In this research, a classification of mushroom types based on digital image processing using a Convolutional Neural Network (CNN) is conducted. The method employs the EfficientNet-B4 architecture as the base model utilizing transfer learning and fine-tuning processes. The dataset consists of 3000 types of mushrooms, each categorized into 10 classes with 300 images per class. The CNN model is implemented using the Python programming language on Google Colab editor. Performance evaluation is carried out using accuracy, precision, recall, and F1-Score metrics to measure the model's performance. A comparison is made between all models with various training parameters, including identical and different settings. Additionally, the ratio of data splits, whether identical or different, is considered. Model 1, which utilizes a custom freeze layer and a data split ratio of 80% for training, 10% validation, and 10% testing, achieved the highest accuracy (90.00%), precision (90.09%), recall (89.63%), and F1-Score (89.59%) compared to other models. Therefore the implementation of a custom freeze layer to reduce the$ number of trainable parameters significantly impacts the accuracy level of the trained and tested model. Moreover, the determination of the data split ratio also slightly influences the accuracy level of the trained and tested model.
Integration of artificial intelligence in cyber security systems to counter quantum computing threats Ekowati, Maria Atik Sunarti; Poernomo, Moyo Hady; Nindyatama, Zefanya Permata
Jurnal Mandiri IT Vol. 13 No. 4 (2025): April: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i4.388

Abstract

With the rapid advancement in quantum computing, threats to cybersecurity systems are increasingly complex, especially in terms of encryption and data protection. The integration of artificial intelligence (AI) into cybersecurity systems is essential to address these challenges. This study aims to examine the potential of AI in improving the detection and mitigation capabilities of threats arising from the quantum computing revolution. The urgency of this research is driven by the prediction that existing cryptographic algorithms will be easily cracked by quantum computers, raising the need for more adaptive and dynamic security systems. The method used in this study is a simulation approach using machine learning algorithms to model and identify cyber threat patterns specific to quantum computing. The results show that AI-based systems can detect attacks faster and with higher accuracy compared to conventional systems. The output of this research is the development of a security system prototype that combines artificial intelligence and post-quantum security technologies, which can be implemented in various cyber applications to ensure more effective data protection in the quantum computing era.
Comparison of decision tree and naive bayes methods in glioma classification based on clinical and molecular factors Dewi, Ni Wayan Emmy Rosiana; Putra, I Made Suwija; Simanungkalit, Erwinsyah; Manoppo, Franky Gerald Cliford
Jurnal Mandiri IT Vol. 13 No. 4 (2025): April: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i4.389

Abstract

This study compares the performance of Decision Tree and Naive Bayes classifiers in classifying gliomas based on clinical and molecular factors. The dataset consists of 839 patient records with features including Grade, Gender, Age, Race, and gene mutation status. The evaluation showed that the Decision Tree classifier achieved 98% accuracy on the training data and 76% on the test data, while the Naive Bayes classifier obtained 74% and 71% accuracy, respectively. Both models demonstrated strong predictive ability, with feature importance analysis highlighting the IDH1 gene mutation as a significant factor in glioma classification. This study aims to identify the most effective method for supporting clinical decision-making in glioma diagnosis. It contributes to the development of medical decision support systems and provides insight into the application of machine learning models, particularly in utilizing molecular markers such as IDH1.
Facial image protection with visual cryptography and random least significant bit (LSB) steganography Karo Karo, Panser; Simarmata , Simon; Faizah, Novianti Madhona; Fabrianto, Luky
Jurnal Mandiri IT Vol. 13 No. 4 (2025): April: Computer Science and Field.
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mandiri.v13i4.392

Abstract

The confidentiality of sensitive data—such as personal information of individuals who may pose security threats to client assets—must be strictly maintained. This data includes personal details such as name, ID number, address, date of birth, occupation, and photographs (images). The data protection process involves combining textual data (ID number, name, date of birth) with a photo into a single image, which is then processed using visual cryptography. The visual cryptography technique applied is the (k, n) scheme with a 2-out-of-k configuration. To enhance data security and confidentiality through dual-layer protection, the output from the visual cryptography process is further secured using steganography with the random LSB (Least Significant Bit) method, applied to one of the shares obtained from the previous step. The best result achieved during testing was a PSNR of 71.9977 and an MSE of 0.0041. It is expected that the combination of visual cryptography and steganography methods will significantly enhance the security of data storage to protecting it from unauthorized access.