Claim Missing Document
Check
Articles

Found 18 Documents
Search

Pengujian Aplikasi Invoice Untuk Freelancer Small Business Berbasis Web Dengan Metode Blackbox Shintania, Mira; Ananda, Angga Thifal; Perdana, Anggi; Fadlurrohman, Muhammad Shiddiq; Zy, Ahmad Turmudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.778

Abstract

Freelancers and small businesses often require invoices for their business operations, whether it be for collaboration with larger companies or for recording transactions and invoicing clients. Testing is conducted using the Black Box Testing method with the Equivalence Partitions technique. The goal is to determine whether the system functions as intended, ensuring that users do not encounter any issues. The results of this testing reveal no functional errors, and it can be concluded that the system is operating smoothly and ready for use.
Pengujian Dan Penjaminan Kualitas Software Point Of Sale Penjualan Motor PT. XZY Dengan Metode Black Box Simanjuntak, Antonius; Wijaya, Kurnia Difa; Permatasari, Antini; Astuti, Asri Liya; Zy, Ahmad Turmudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.770

Abstract

The sale of motorcycles at PT.XYZ requires a reliable and high-quality Point of Sale (POS) system to enhance efficiency and customer satisfaction. This research aims to conduct testing and quality assurance of POS software using the Black Box method. This method focuses on testing external functionality without considering the internal system implementation. In this research, testing steps involve identifying the core functionalities of the POS, creating test cases, conducting tests, and analyzing results. Quality assurance will be implemented to ensure that the software meets the specified functional and non-functional requirements
Pengujian Dan Penjaminan Kualitas Software Point Of Sale Toko Elektronik Dengan Metode Black Box Funsional Dan Integrasi Handono, Bagus Tri; Gunawan, G; Hartono, Rudi; Khotimah, Nur; Zy, Ahmad Turmudi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 8, No 1 (2024): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v8i1.772

Abstract

This Electronic Retail Point of Sale (POS) Software discusses testing and quality assurance methods for the POS application. This application is crucial in the context of managing sales and purchases in electronic stores. The goal of this documentation is to ensure that the application functions properly, meets user needs, and maintains the security of transaction data. The selected method for testing and quality assurance is the BlackBox method, with a particular focus on functional and integration testing. Functional testing includes steps such as opening the application, logging in with valid and invalid data, and testing the main features of the application. Meanwhile, integration testing focuses on the interaction between the key components of the application, such as master data, transaction data, and reporting. The importance of security in the POS application is emphasized through security testing, especially concerning logout mechanisms and post-logout access security. This is done to safeguard sensitive transaction data and customer information.
The Use of K-Means Algorithm Clustering in Grouping Life Expectancy (Case Study: Provinces in Indonesia) Nugraha, Dimas Reza; Zy, Ahmad Turmudi; Sunge, Aswan Supriyadi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4171

Abstract

Life expectancy is defined as information that illustrates the age of the death of a population. Life expectancy is a general picture of the state of a region. If the infant mortality rate is high, then the life expectancy in the area is low. And vice versa, if the infant mortality rate is low, the life expectancy in the region is high. Life expectancy is also a benchmark for government actions in improving the welfare of society and the human development index. For this reason, it is necessary to group life expectancy data to make it easier to determine the provinces with high, middle, and low life expectancy. The results of cluster testing using the silhouette score method showed that two subjects had a low silhouette score level, which caused the cluster value to be less than optimal, namely East Java  & Gorontalo. The clustering results found that the cluster was divided into 3, namely cluster 1, with a high level of life expectancy consisting of 10 provinces, namely East Java, Riau, North Sulawesi, Bali, North Kalimantan, DKI Jakarta, West Java, Central Java, East Kalimantan and Special Region of Yogyakarta. Cluster 2 has a level of middle-life expectancy consisting of 18 provinces, namely Gorontalo, North Maluku, Central Sulawesi, South Kalimantan, North Sumatra, Bengkulu, West Sumatra, Central Kalimantan, Aceh, South Sumatra, Banten, Kep. Riau, South Sulawesi, Kep. Bangka Belitung, Lampung, West Kalimantan, Southeast Sulawesi and Jambi. Cluster 3, with a low level of life expectancy, consists of 6 provinces, namely West Sulawesi, Papua, Maluku, West Papua, West Nusa Tenggara, and East Nusa Tenggara.
Analysis of Manual and Automated Methods Effectiveness in Website Penetration Testing for Identifying SQL Injection Vulnerabilities Anaoval, Abdul Aziz; Zy, Ahmad Turmudi; S, Suherman
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4249

Abstract

This research aims to identify vulnerabilities to SQL Injection attacks on websites through penetration testing using quantitative and descriptive methods. In the current digital era, data and information security has become a crucial aspect. One of the frequent threats is SQL Injection attacks, where attackers insert malicious SQL commands into queries executed by web applications. This study utilizes tools such as Burp Suite to identify and exploit vulnerabilities in a login form created by the researchers. The research process begins with the Pre-Engagement Interactions phase, which includes information gathering and setting the testing scope. Subsequently, Vulnerability Testing is conducted to evaluate existing weaknesses. The exploitation of vulnerabilities is performed using the 'OR'1'='1 technique, which successfully demonstrates that the website is vulnerable to SQL Injection attacks. The results of this study indicate that the login form on the website is susceptible to SQL Injection due to insufficient input validation and the use of dynamic SQL queries without prepared statements. Implementing stricter input validation techniques and using prepared statements has proven effective in enhancing website security. This research makes a significant contribution to the field of information system security, particularly in the prevention of SQL Injection attacks. The results of this study can serve as a practical guide for web developers in improving the security of their applications and provide a deeper understanding of the threats and mitigation techniques for SQL Injection.
The Analysis of Product Sales in the Application of Data Mining with Naive Bayes Classification Zahri, M. Hannata; Sunge, Aswan S.; Zy, Ahmad Turmudi
Journal of Computer Networks, Architecture and High Performance Computing Vol. 6 No. 3 (2024): Articles Research Volume 6 Issue 3, July 2024
Publisher : Information Technology and Science (ITScience)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47709/cnahpc.v6i3.4255

Abstract

H&F Shoe Store is a privately owned Micro, Small, and Medium Enterprises retail store that sells merchandise. The owner serves customers directly and also acts as a cashier. In this store, the business owner is less aware of what types or categories of products are most in demand by customers, making sales operations less than optimal. Because of this, special expertise is needed to handle the problems in the retail store, namely data mining or Data Mining with the aim of digging up information related to sales problems, in this case the author will use the Classification method with the Naive Bayes algorithm. In this study, the author uses secondary data obtained from sales notebooks and re-collected into Microsoft Excel according to research needs. The data that has been collected on the software is 121 data which have 10 attributes, namely “Nama Produk”, “Size Produk”, “Kategori Produk”, “Jenis Produk”, “Gender Produk”, “Merek Produk”, “Stok Awal”, “Stok Terjual”, “Stok Sisa”, and “Penjualan”. The Naive Bayes Classifier method has successfully produced good results in classifying sales on a type or category of marketed products, the results obtained are in the form of product sales analysis and Naive Bayes model evaluation values. The results of the model evaluation values on the Confusion Matrix obtained are accuracy of 86.11%, recall of 84.62% and precision of 84.62%.
Analisis Sentimen Media Sosial Twitter Terhadap Calon Presiden RI Tahun 2024 Menggunakan Klasifikasi Algoritma Naïve Bayes Effendi, Muhammad Makmun; Zy, Ahmad Turmudi; Arwan, Asep
Journal of Computer System and Informatics (JoSYC) Vol 5 No 3 (2024): May 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/josyc.v5i3.5210

Abstract

The progress of social media is currently being felt by many Indonesian people, one of the social media that is often used is Twitter, which is a media for posting information. Currently the viral post is the election of Presidential Candidates (capres) of the Republic of Indonesia which will be held in 2024, in line with this, the General Election Commission (KPU) is holding a presidential candidate debate which will be held on various television media in Indonesia and from the results of this debate the Indonesian people usually give opinions or comments on the debate from the positive and negative sides of the presidential candidates who appeared at that time, namely Anis, Prabowo and Ganjar Pranowo. To find out the results of sentiment towards the presidential candidates, the researchers carried out an analysis using a classification of tweets containing public sentiment towards the 2024 presidential candidacy, namely Anis, Prabowo and Ganjar with the classification method used in this research is Naive Bayes Classification (NBC). Anies Baswedan dataset 61.35% of Twitter users have negative comments and 39.65% of Twitter users have positive comments, Ganjar Pranowo dataset 59.12% of Twitter users have negative comments and 41.88% of Twitter users have positive comments, Ganjar Prabowo Subianto dataset 49.25% Twitter users commented negatively and 51.75% of Twitter users commented positively. Comparing the results of the three presidential candidates, Anies Baswedan's accuracy value is smaller than the other two candidates because Anies Baswedan has more negative comments than the other two candidates. Anies Baswedan got an accuracy value of 67.23%, Prabowo Subianto 83.42% and Ganjar Pranowo 88.15%. The amount of data affects the results of sentiment analysis, the more data the better the accuracy value obtained.
Implementing Internet Of Things (IOT) Technology For Real-Time Detection And Monitoring Of LPG Gas Leaks Effendi, M Makmun; Zy, Ahmad Turmudi; Sanudin, Sanudin
Jurnal Info Sains : Informatika dan Sains Vol. 14 No. 03 (2024): Informatika dan Sains , Edition July - September 2024
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Currently, LPG (Liquefied Petroleum Gas) is a vital resource for many households in Indonesia, as highlighted by the government's initiative to convert from kerosene to gas as a cooking fuel. The widespread adoption of LPG is attributed to its affordability and efficiency. However, the flammable nature of LPG poses significant risks, particularly in the event of leaks, which can lead to explosions and fires. This research aims to develop a system that monitors and detects gas leaks in real-time to prevent such hazardous incidents. The proposed system utilizes Internet of Things (IoT) technology, incorporating MQ-6 gas sensors and Raspberry Pi to detect LPG leaks. The MQ-6 sensors are capable of identifying the presence of gas, while the Raspberry Pi processes the data and sends notifications in the event of a leak. The methodology includes literature reviews, user interviews, and data analysis to design an effective monitoring system. The results indicate that the system can accurately detect gas leaks and provide real-time alerts via SMS or a mobile application. In conclusion, this study demonstrates that an IoT-based monitoring and detection system for LPG leaks can significantly enhance safety by enabling prompt responses to gas leaks. This system not only benefits users by facilitating quicker leak management but also contributes to broader safety measures in residential and commercial environments.