cover
Contact Name
Miftahul Huda
Contact Email
hudablue11@gmail.com
Phone
+6282273233495
Journal Mail Official
aguspw.amcs@gmail.com
Editorial Address
Sekretariat KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen)
ISSN : -     EISSN : 2720992X     DOI : 10.30645
KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) adalah sebuah jurnal peer-review secara online yang diterbitkan bertujuan sebagai sebuah forum penerbitan tingkat nasional di Indonesia bagi para peneliti, profesional, Mahasiswa dan praktisi dari industri dalam bidang Ilmu Kecerdasan Buatan. KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) menerbitkan hasil karya asli dari penelitian terunggul dan termaju pada semua topik yang berkaitan dengan sistem informasi. KESATRIA: Jurnal Penerapan Sistem Informasi (Komputer & Manajemen) terbit 4 (empat) nomor dalam setahun. Artikel yang telah dinyatakan diterima akan diterbitkan dalam nomor In-Press sebelum nomor regular terbit.
Articles 419 Documents
Analisis Sentimen Berbasis Aspek Terhadap Ulasan Pengguna Aplikasi Pegadaian Digital Dengan Multiclass Multioutput Menggunakan Algoritma Support Vector Machine Vina Fadillah; Faqih Hamami; Rachmadita Andreswari
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 4 (2023): Edisi Oktober
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i4.248

Abstract

Badan Usaha Milik Negara (BUMN) are one of the three main economic players in the country, alongside cooperatives and private enterprises, aiming to realize a prosperous society in various fields. One of the BUMN, PT Pegadaian, operates in the financial sector. According to the directorate regulation of PT Pegadaian Number 122 of 2020, to enhance the quality and maturity level of information technology (IT), evaluation and monitoring mechanisms based on the international standard ISO/IEC 25010:2011 for System Software Quality Models are required in managing IT quality. Therefore, PT Pegadaian is currently undergoing a transformation process to expand its business model that was originally only feasible through offline means, making it possible to be done online. To support this Pegadaian transformation process, an application named "Pegadaian Digital" has been developed, containing PT Pegadaian's core businesses, such as buying and selling gold savings, pawn booking, and gold price reviews. To assist digital transformation process, sentiment analysis research is conducted based on various aspects to identify aspects in the application that need to be improved and maintained. The study focuses on user reviews from Google Play Store, utilizing the KDD process and Support vector machine algorithm. The aspects used in this research are Learnability, Efficiency, Errors, and Satisfaction, each aspect labelled as positive, negatif, and neutral (not exist). The testing in this research is divided into two scenarios, focusing on the model with default parameter and parameter with hyperparameter tuning. Subsequently, the model is evaluated with accuracy, precision, recall, F1-score, and K-Fold Cross Validation. The evaluation results show that the scenario with a split data ratio of 80:20 using SVM with basic or default parameters gets the best performance results based on an accuracy value of 86%, recall 80%, f1-score 82%, precision 84%, and model did not overfitting
Software Development for Education Infrastructure Management: Extreme Programming-Based Approach Denny Jean Cross Sihombing
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 1 (2024): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i1.291

Abstract

Education infrastructure in Indonesia faces significant challenges and inequity between urban and rural areas. Differences in education facilities, teacher qualifications, and access to technology are key issues in improving the quality of education across the country. In this context, an efficient education infrastructure system and the software applications that support it are crucial to achieving educational equity. This study adopted the Extreme Programming (XP) software development method to develop an education infrastructure application focusing on school data management. The results of this study show that the education infrastructure application based on the XP method successfully identified the initial requirements strongly and focused on the most essential features. User Acceptance Testing (UAT) provided valuable feedback, highlighting the strengths and weaknesses of the application; the user satisfaction rate was 82%. It was found that the app has the potential to fulfil user needs, although some improvements are needed, especially in certain features such as the Inventory module. Future research could focus on the continued development of the education infrastructure app, taking into account user suggestions and feedback. Further research involves more stakeholders, including parents and students, in testing and improving the app. This research highlights the importance of developing software applications that support equitable and efficient education infrastructure in Indonesia.
Manajemen Pencegahan Serangan Jaringan Wireless Dari Serangan Man In The Middle Attack Tengku Mohd Diansyah; Ilham Faisal; Dodi Siregar
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 1 (2023): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i1.134

Abstract

Currently, wireless networks are very widely used to communicate because wireless networks are very fast and communicate without using cables, by using this wireless it turns out that there are weaknesses or security gaps due to irresponsible people illegally such as looking for backdoor gaps to infiltrate and attack aspects of authenticity. If a crime occurs, how to prevent the crime or attack. In this article, the possibility of an attack with the type of attack carried out is a man in the middle attack from this attack experiment will be carried out 5 times the attack experiment in this experiment the calculation of QoS (Quality of Service) is carried out, namely calculating how much packet loss and the results obtained in this attack experiment with the calculation of packet loss as much as 0.291% loss, attack 1 model 2 with packet loss 0.173%, attack 2 model 2 with packet loss which means this attack successfully attacks wireless communication. To prevent this attack activity, first know the technique of how the attack runs on a wireless network, using ettercap on linux times.
Penerapan Metode SAW Dalam Penentuan Penerima Beasiswa Yayasan Sundari Retno Andani; S Sumarlin; Romulo P. Aritonang
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 1 (2024): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i1.345

Abstract

One very effective way to avoid dropping out of school is by providing scholarships. In increasing the quantity of human resources in Indonesia, scholarships can be used as a solution. A university can also participate in improving human resources in Indonesia, namely through providing foundation scholarships. Foundation scholarships are scholarships whose funding comes from a university foundation. Foundation scholarships are given to students who excel and are economically disadvantaged. In determining foundation scholarship recipients, a decision support system (SPK) is needed to obtain more objective results based on the criteria used. The Simple Additive Weighting (SAW) method is one of the methods used in the decision making process. The SAW method is also called the weighted sum method, because the SAW method seeks a weighted sum of the performance ratings for each alternative for all attributes. The criteria used in this research are the Grade Point Average (GPA), parental income and number of dependents. Calculations using the SAW method will produce weight values, criteria, alternatives and the final result is a ranking of scholarship recipients as a recommendation for decision making.
Optimalisasi Pengambilan Keputusan Melalui Analisis Trend Penjualan pada Bisnis Retail Menggunakan Metode Least Square S Suhardjono
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 3 (2023): Edisi Juli
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i3.202

Abstract

The right business decisions are crucial in the business world to ensure business continuity and increase profitability. One important factor in making business decisions is sales sales. Businesses need accurate trading trade orders to fill inventory, improve sales performance, and maximize profits. This research case study focuses on the medical device retail business of CV. Independent Lakshmi. The company faces problems in replenishing inventory due to variable demand. The research objective is to analyze sales trends and customer buying interest using the least square method. The results showed that forecasting calculations yielded a MAPE value of 1% and there were sales trend analysis results, namely a total trend increase of 29.04% for karcher goods so that sales trend analysis could be contributed to the research site. Based on the results of system testing using Blackbox Testing, the results show that the system functionality is appropriate and valid.
Analisa Penjualan Produk Oli Dengan Metode Data Mining Asosiasi Algoritma Apriori Pada PT. Mitra Petra Sejahtera Putri Septiani Azura; M. Safii; Fitri Rizki
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 2, No 1 (2021): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v2i1.52

Abstract

Competition in the business world makes business people have to think harder in developing strategies to deal with such competition. Marketing strategy requires a reference so that promotion is right on target, for example by looking for similarities between product items. This research was conducted by applying the association rule a priori algorithm method to the sales transaction dataset, to form a candidate combination between product items. The sales transaction dataset was taken in January to December 2019. In this study, a minimum support value of 25% and a minimum confidence value of 60% were determined with data processing using Microsoft Excel and RapidMiner software. A priori algorithm can produce association rules as a reference in product promotion and decision support in providing product recommendations to consumers based on the specified minimum support and confidence values.
Implementing a Web-enabled Security Management Information System: Opportunities and Challenges David Jumpa Malem Sembiring; Devita Permata Sari Br Ginting; Sinek Mehuli Br Perangin-angin; Asprina Br Surbakti
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v5i2.377

Abstract

Information systems are computer applications that support an organization's operations. They include the installation and maintenance of computers, software, and data. Management Information Systems focus on financial and personnel management. Sales Information Systems are designed to generate, analyze, disseminate, and retrieve information to support sales-related decisions. The collection, preparation, storage, and distribution of information to facilitate decision-making and monitoring in an enterprise. There are two types of information systems: manual information systems and computer-based information systems (CBIS). CBIS, or computerized web-based security service management information system, is a type of information system used in service companies. This system provides possibilities and opportunities for managing security services.
Penerapan Teknik Super Enkripsi Untuk Keamanan File Teks Menggunakan Gabungan Algoritma Beaufort Cipher dan Algoritma RSA Yusuf Ramadhan Nasution; Abdul Halim Hasugian; M Mahyudi
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 4 (2023): Edisi Oktober
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i4.238

Abstract

Cryptography is an alternative solution that can be applied to protect and increase data security. This research will implement a combination of the Beaufort Cipher symmetric cryptographic algorithm and the RSA asymmetric cryptographic algorithm in a super encryption scheme to increase data security in text files. The combination of the two cryptographic algorithms is done by first encrypting the message contained in the text file using the Beaufort Cipher algorithm key, then re-encrypting it with the public key of the RSA algorithm to create an encrypted text file. The combination method between the two algorithms aims to obtain superior encryption (ciphertext) results so that they are not easy to crack, and also to handle the use of a single ciphertext which is comparatively weak because it only uses one cryptographic algorithm. This research produces a web-based application that can be used to secure text files using a combination of the Beaufort Cipher algorithm and the RSA algorithm in the super encryption technique.
Aplikasi Media Pembelajaran Pendidikan Agama Kristen Untuk Anak - Anak Sekolah Minggu Berbasis Android (Studi Kasus Gereja Toraja Jemaat Ora Et Labora Lagia) Delvi Vebriyanti; Rinto Suppa; Solmin Paembonan
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 3, No 1 (2022): Edisi Januari
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v3i1.94

Abstract

This review intends to plan and fabricate an Android-based Christian Strict Instruction Learning Media Application at the Ora Et Labora Lagia Toraja Church. The exploration strategy utilized is a subjective strategy with information assortment methods utilizing perception, meetings, and writing studies. This learning media application was created utilizing the Cascade Framework improvement technique. The product utilized in the plan and execution of the framework involves Adobe Streak Proficient CS6 as the framework plan. Christian strict training learning media applications incorporate Sunday school materials, tests, and youngsters' profound melodies. The application that has been assembled has been tried on clients so an application that runs well is acquired
Efektivitas Arduino Sebagai Penerima Data Melalui Level Shifter Digital Caliper Guna Rancang Bangun Alat Ukur Ketebalan Ban Yoshio Sudewa; Andi Widiyanto; Setiya Nugroho
Kesatria : Jurnal Penerapan Sistem Informasi (Komputer dan Manajemen) Vol 4, No 4 (2023): Edisi Oktober
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/kesatria.v4i4.262

Abstract

This research was carried out by modifying a tool for measuring thickness so that the data received can be displayed on a serial monitor. In this case, the researcher modified the digital caliper or existing tool to integrate with the Arduino by means of a level shifter to increase the voltage current of the digital caliper so that the Arduino could read the data received according to its compatibility. The value obtained with the Arduino utilizes the data pin and clock pin on the digital caliper which have been connected to the pins available in the level shifter. After the data is processed by the Arduino, the data will then be sent to the microcontroller, then the value will be displayed in the serial monitor. The experimental method used is to send data to the Arduino according to the values in the LCD display available in the measuring instrument or tire depth. The treatment consists of providing tire depth variation values on a millimeter scale from 00.00 millimeters to 18.00 millimeters. Experimental results on measurements show that the values obtained by Arduino and measuring instruments are not much different.