cover
Contact Name
M Rhifky Wayahdi
Contact Email
technolabsindonesia@gmail.com
Phone
+6281396692946
Journal Mail Official
technolabsindonesia@gmail.com
Editorial Address
Jl. Umar No. 26A, Kel. Glugur Darat 1, Kec. Medan Timur, Medan, Sumatera Utara.
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Technology and Computer (JOTECHCOM)
ISSN : -     EISSN : 30480477     DOI : -
Core Subject : Science,
The Journal of Technology and Computer (JOTECHCOM) brings together researchers, academics (faculty and students), and industry practitioners to develop the field, discuss new trends and opportunities, exchange ideas and practices, and promote cross-disciplinary and cross-domain collaboration. JOTECHCOM aims to integrate all scientific disciplines, such as computer science, information systems, informatics, information technology, data science, databases, artificial intelligence, data mining, decision support systems, expert systems, and other related disciplines. This journal is published by PT. Technology Laboratories Indonesia (TechnoLabs) Publisher division. Accepted papers will be available online (free open access).
Articles 73 Documents
Development of a Web-Based Decision Support System for Academic Program Selection Using the Weighted Product Method Ardiansyah, Fadlan; Maharani, Riska
Journal of Technology and Computer Vol. 2 No. 2 (2025): May 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the era of digital transformation, higher education institutions face increasing demands to provide effective, data-driven tools that support student decision-making. One critical decision for prospective students is selecting an academic program that aligns with their interests, academic abilities, and future career goals. This study presents the development of a web-based Decision Support System (DSS) that applies the Weighted Product (WP) method to recommend the most suitable academic program for new university applicants. The system allows users to input criteria such as academic performance, aptitude test scores, and personal interests. These inputs are then processed using the WP method, which calculates a weighted score for each available program option. The top-ranked programs are displayed as recommendations to the user. The system was evaluated through User Acceptance Testing (UAT) involving 30 participants, and the results showed a high level of user satisfaction in terms of ease of use, accuracy, and responsiveness. This solution not only reduces subjectivity and inefficiencies in manual selection processes but also encourages informed, data-based decision-making. The implementation of this DSS demonstrates how technology can enhance educational guidance services and improve student placement outcomes in higher education.
Information System for Drug Sales at Advent Hospital Medan Hutahaean, Mian Natanael; Singarimbun, Roy Nuary; Purwawijaya, Ellanda
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The management of drug sales data in hospitals plays a crucial role in ensuring operational efficiency and patient safety. However, the semi-manual process at Advent Hospital Pharmacy in Medan often leads to issues such as stock data inaccuracies and reporting delays, with a transaction error rate reaching 20%. This study aims to design and build a desktop-based drug sales information system using Microsoft Visual Basic.net to address these problems. The development method used is Research and Development (R&D) with a waterfall model, which includes the stages of requirements analysis, design, implementation, and testing. The system was evaluated through two approaches: a usability test with a questionnaire administered to 5 users and a black-box test with 13 functional scenarios. The results showed that the developed system achieved a usability score of 81%, which falls into the "Good" category. Meanwhile, the black-box test results indicated a system effectiveness rate of 85%, with 11 out of 13 test scenarios being successful. This system has been proven to improve data accuracy and sales process efficiency, although further improvements are needed for the input validation and report printing features.
Implementation of IPv6 Protocol in EIGRP Routing to Improve Data Transfer Efficiency in Wide Area Networks Dewantara, Yudhistira
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of network technology has encouraged the adoption of Internet Protocol version 6 (IPv6) as a solution to the limitations of IPv4, especially in terms of address space and network efficiency. Consequently, a routing protocol capable of optimally supporting the complexity of IPv6 networks is required. Enhanced Interior Gateway Routing Protocol (EIGRP) is a dynamic routing protocol that natively supports IPv6 and is known for its efficiency and scalability. This study aims to examine the implementation of EIGRP on IPv6 networks, specifically in improving data transfer efficiency on Wide Area Networks (WANs). Testing was conducted using Cisco Packet Tracer, with evaluations of device connections, latency performance, and routing paths. The test results showed good connectivity between devices, with an average latency value of 0.5 ms, as well as an optimal routing path based on the Diffusing Update Algorithm (DUAL) algorithm. Configuration adjustments such as the Autonomous System (AS) value and K-value were proven to affect routing efficiency. This study concludes that EIGRP on IPv6 is able to improve data delivery efficiency and is a reliable solution in modern network development. These results can be a reference for network developers in optimizing IPv6 routing configurations.
Implementation and Utilization of AI in Conceptualizing Educational Video Content on the Importance of Using Sunscreen in Daily Activities Aulia, Ratih; Rambe, Aripin; Nuary Singarimbun, Roy
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research explores the application of Artificial Intelligence (AI) in developing educational video concepts, specifically focusing on the daily importance of sunscreen use. Recognising AI's capacity to enhance human activities, this study leverages it as a tool for crafting engaging and informative video content. Sunscreen is vital for protecting skin from harmful ultraviolet radiation, necessitating effective public education—video being a key medium. Employing a qualitative, descriptive methodology, this study gathered data through observing and analysing educational videos on social media. The video concept creation primarily utilised ChatGPT, an AI platform, with final video production handled by InShot and CapCut. The findings reveal that AI significantly simplifies and accelerates the video concept generation process, drastically reducing production time. This also allows for the creation of a wide variety of video styles and themes, extending beyond just sunscreen education. The core benefits of integrating AI into this workflow include enhanced time efficiency, streamlined content creation, and remarkable flexibility in generating concepts tailored to specific educational goals. Ultimately, implementing AI in video production promises to empower both the public and content creators to disseminate information with greater effectiveness and creativity.
RASKIN Recipient Classification Model Using LibSVM Based on Particle Swarm Optimization Nuranisah, Nuranisah; Ginting, Subhan Hafiz Nanda
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Receiving subsidized rice assistance (RASKIN) is a government program to distribute basic food assistance to underprivileged families. The distribution is carried out once every three months in accordance with the predetermined allocation. However, in practice, there are still often inaccurate targets in determining beneficiaries. This research aims to assist the village government in determining the eligibility of prospective RASKIN beneficiaries objectively and on target. The classification model used is Support Vector Machine (SVM) with the Library for Support Vector Machine (LibSVM) approach, combined with the Knowledge Discovery in Database (KDD) method. To improve classification performance, model parameter optimization is performed using the Particle Swarm Optimization (PSO) algorithm. Radial Basis Function (RBF) kernel is used in this process. The evaluation results show that the LibSVM model optimized with PSO is able to achieve an accuracy rate of 92.21%. The proposed model is expected to be an effective decision support system in selecting recipients of government social assistance more fairly and efficiently.
Implementation of the Hill Cipher Algorithm with a Random Generator in Key Validation for File Security Azmi, Fauzul; Tommy, Tommy
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Digital file security plays a crucial role in the modern era of rapid information exchange and growing data threats. This study presents the development of a desktop-based file security system that utilizes a random key matrix approach for secure encryption and decryption. The core innovation lies in the validation of randomly generated key matrices to ensure they possess a valid inverse under modulo 256 arithmetic. This validation is critical, as it guarantees that encrypted data can be accurately decrypted using the same key. The system converts digital files into binary blocks, which are then encrypted through matrix multiplication with the validated key. Comprehensive testing was carried out using various file types and sizes to evaluate the system’s robustness, performance, and reliability. The results demonstrate that the application provides an effective method for safeguarding digital files, with improved security due to the randomness and strength of the key generation process. This research contributes significantly to the ongoing advancement of cryptography-based solutions for file protection in desktop environments.
Implementation of Secure Shell in Document Sharing Application with TCP/IP-Based Client Server Barus, Della Rizkynta Br
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The network laboratory module is being reviewed, in which the author conducted data exchange using a LAN cable system and the operating systems provided by Windows or Linux for document transfer and data transmission. The idea is to create software that will perform document transfer and data reception using a sharing medium. The aim is to simplify the process for computer users to send and receive transferred documents. The advantage of client-server software for uploading images and sharing images, documents, and data such as documents and other files is that a flash drive is no longer needed to transfer data, which could potentially contain viruses that could damage the data on the user's computer. Data security is enhanced through secure shell (SSH) connection settings for computers connected via a local area network (LAN). Document sharing security utilises SSH, a cryptographic network protocol designed to securely operate network services over insecure networks that could otherwise endanger data stored on the sender's or recipient's computer.
Implementation of a Smart Home Doorbell System for Guest Identification Using ESP32-CAM and IoT-Based Telegram Chatbot Integration Syavira, Raihan
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This study develops a SmartHome system integrated with a doorbell that automatically identifies visitors using ESP32-CAM and sends notifications to homeowners through a Telegram chatbot. The system enables remote visitor monitoring and voice-based responses via a speaker. It integrates ESP32-CAM, a wireless doorbell, DFPlayer Mini MP3, and a speaker. When the doorbell is pressed, the ESP32-CAM captures the visitor’s image and sends it to Telegram. The homeowner can then issue commands to play pre-recorded voice responses stored in a microSD card. Testing results demonstrate that the system functions effectively, providing enhanced home security and convenience. The integration between hardware, Arduino IDE software, and internet-based communication shows reliable performance. This system offers an innovative approach to SmartHome applications by combining IoT-based visitor detection with real-time communication.
Implementation of Modified MVC Model with Integrated Security in E-Procurement Application for Companies Pratiwi, Ade
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research discusses the implementation of a modified MVC (Model-View-Controller) model combined with advanced security features in an e-procurement application. The main objective of this study is to enhance both efficiency and security in the electronic procurement of goods and services. The proposed modification not only separates application logic, user interface, and database layers but also integrates critical security mechanisms, particularly in the areas of data validation, encryption, and user authentication. By applying these additional layers of protection, the system aims to minimise unauthorised access, prevent data breaches, and ensure the integrity of transactional information. The implementation results indicate that the developed e-procurement application is capable of accelerating transaction processes, maintaining data confidentiality, and significantly reducing the risk of system misuse or fraudulent activities. Furthermore, the approach supports compliance with best practices in secure software development. Therefore, the modified MVC model with integrated security features can be regarded as an effective and reliable solution to foster transparency, operational efficiency, and trustworthiness in modern electronic procurement systems.
Web-Based Batik Sales System Uses Locking Mechanism to Prevent Race Condition Wirayuda, Hassan; Usman, Ari
Journal of Technology and Computer Vol. 2 No. 3 (2025): August 2025 - Journal of Technology and Computer
Publisher : PT. Technology Laboratories Indonesia (TechnoLabs)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of information technology is driving digital transformation in various sectors, including trade. This research aims to design and build a web-based batik sales system equipped with a locking mechanism to address race conditions, which occur when multiple users access data simultaneously, which can lead to data inconsistencies. The system was developed using PHP and MySQL, focusing on online transaction management and real-time stock updates. The results show that the system is capable of handling concurrent transactions well. The application of the locking mechanism to critical processes successfully maintains data consistency and prevents conflicts due to simultaneous access. Black-box testing proves that all system functions operate as required. This research is expected to provide practical solutions for batik MSMEs and serve as an academic reference regarding concurrent transaction management and data integrity.