cover
Contact Name
Andree E. Widjaja
Contact Email
andree.widjaja@uph.edu
Phone
+6261-80511117
Journal Mail Official
ji.uphmedan@uph.edu
Editorial Address
Lippo Plaza Medan 5th - 7th Floors, Jl. Imam Bonjol No. 6 Medan - 20112, North Sumatra, Indonesia
Location
Kota tangerang,
Banten
INDONESIA
Journal Information System Development
ISSN : 2477863X     EISSN : 25285114     DOI : https://dx.doi.org/10.19166/isd
Jurnal Information System Development (ISD) hadir sebagai wadah bagi para Akademisi, Developer, Peneliti, dan Ilmuwan yang hendak menyumbangkan karya ilmiahnya bagi dunia ilmu pengetahuan di bidang Sistem Informasi. Jurnal yang diterbitkan oleh Prodi Sistem Informasi Universitas Pelita Harapan ini menerima publikasi hasil pengembangan atau penelitian terbaru di bidang Sistem Informasi. Topik-topik meliputi pengembangan software desktop, web, mobile, database system, artificial intelligence, data warehouse, data mining, UI/UX programming, IT infrastructure, Internet of Things, Game Development, Cyber Security, dan topik-topik lainnya. Setiap tahunnya, Jurnal ISD terbit dalam dua (2) periode yaitu pada Bulan Januari dan Juli
Articles 227 Documents
Penerapan Algoritma Genetika Pada Pengenalan Paragraf Erwin Saragih, Rejoice Iboy; Nababan, Darsono
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (736.964 KB)

Abstract

Paragraph consists of sentences which has main idea. In this research, it applied the genetic algorithm to recognize a paragraph. It has several steps to do it, firstly on the alphabet forms word, then sentence, and finally paragraph. The process start from typing the paragraph and then the genetic algorithm will identify the paragraph accordingly by stages which are initial population, selection, crossover and mutation. Genetic algorithm is heuristic searching algorithm which based on nature selection of mechanism and nature genetics. Paragraph is a set of words or other characters with one or more languages are written especially if arranged in a customary order. The final result of this research is that showing the exact paragraph that is targeted.
Analisa Alokasi Memori dan Kecepatan Kriptograpi Simetris Dalam Enkripsi dan Dekripsi Perangin-angin, Resianta; Jaya, Indra Kelana; Rumahorbo, Benget; Marpaung, Berlian Juni R
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (601.236 KB)

Abstract

Currently the focus of cryptography is on the security and speed of data transmission. Cryptography is the study of how to secure information. This security is done by encrypting the information with a special key. This information before being encrypted is called plaintext. After being encrypted with a key called ciphertext. At present, AES (Advanced Encryption Standard) is a cryptographic algorithm that is safe enough to protect confidential data or information. In 2001, AES was used as the latest cryptographic algorithm standard published by NIST (National Institute of Standard and Technology) in lieu of the DES (Data Encryption Standard) algorithm that has expired. The AES algorithm is a cryptographic algorithm that can encrypt and decrypt data with varying key lengths, namely 128 bits, 192 bits, and 256 bits. From the results of tests carried out for speed and classification memory, it can be concluded that the AES cryptographic algorithm is superior or faster if the size or size of the plaint text is not so large, because for the smaller AES algorithm the speed ratio in terms of encryption will become more fast, it becomes very different for the Blowfish algorithm itself where for large sizes plaint text can be encrypted faster than AES but for smaller sizes Blowfish is certainly slower in that case, for memory allocation in this case from the tests performed it can be concluded that AES requires more storage space or larger memory allocation compared to the blowfish algorithm
Metode Pengacakan Algoritma Fisher Yates Pada Game Edukasi Pengenalan Kosakata Bahasa Inggris Damanik, Romanus
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (496.873 KB)

Abstract

English is a universal language that is important and has a big role in the world of gaming. Therefore, in order to make children learn English in activities they like. An educational game was made, educational games were built aiming to improve children's ability in terms of English. This game is also designed based on Android so that it makes it easier for players to access games without the need for an internet network to play. In programming, this game implements Fisher Yates algorithm to do the randomization process in the game. The Fisher Yates algorithm is an algorithm for generating a random permutation from a finite set, in other words to randomize a set. This game is played by a player, to complete each level of the game, with the higher level of the game will also increase the level of difficulty. Using a database with SQLite to store player names, questions and levels that have been achieved.
Pengamanan Citra Digital Menggunakan Algoritma Pohlig Hellman ginting, wasit
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (405.677 KB)

Abstract

Image encryption is a technique to protect the confidentiality of images from illegal access. With image encryption, people who do not know how the image is hidden will not know how to open it. Encryption is needed because in today's digital era digital images are easily stored or transmitted through public channels such as the internet. Image transmission through public channels is prone to tapping and storing images in storage media prone to access by parties without authority. For this reason, it is necessary to do a cryptographic method to secure confidential images from parties who do not have the authority to understand the actual image. This study presents an image encryption algorithm using Pohlig Hellman's Algorithm. The Pohlig Hellman algorithm is an algorithm used to compute discrete logarithms in a multiplicative group whose rank is not a safe prime number.Cryptography, Image, Pohlig-Hellman
PENGEMBANGAN GIS HYDRANT KOTA BATAM (BATAM WEB-GISH) sitohang, sunarsan
Journal Information System Development (ISD) Vol 4, No 2 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (2004.408 KB)

Abstract

The development of information technology is currently very rapid, thus it is possible to be used for positive things such as helping human work. One of human's jobs is as firefighting personnel. Fire disasters often occur in places, cities, and countries. Batam City is one of the most densely populated cities where residents live in housing, lots and illegal houses (RULI) and their land contains bauxite. This condition is one of the factors causing the fire disaster. The Batam City Government has provided several hydrant facilities as a source of water for fire disaster management. Hydrants in Batam City are very adequate, but the management has not utilized information technology, so that if a fire occurs in one location, firefighters must manually search for the hydrant location. Based on this problem, researchers are interested in building a web Geographic information system hydrant (web-GISH) so that hydrants managed by the Batam city government are mapped on the web-GISH. The development of this website will be done by collecting hydrant location data in the form of latitude and longitude data, designing website interfaces, building a hydrant database and building web-based applications by utilizing google maps service as a provider of hydrant location information. With the existence of a special map of hydrant locations in the city of Batam, it indirectly helps firefighting personnel in handling fire disasters.
PERANCANGAN APLIKASI PENGENALAN HARDWARE KOMPUTER BERBASIS AUGMENTED REALITY PADA ANDROID Saragih, Jepronel; Nixon, Nixon
Journal Information System Development (ISD) Vol 4, No 2 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (515.309 KB)

Abstract

Peningkatan teknologi yang pesat khususnya pada smartphone berbasis android meningkatkan tingkat penggunaan smartphone pada orang awam. Penggunaan smartphone yang ada tidak hanya dapat digunakan untuk refreshing tetapi juga dapat digunakan untuk melakukan pembelajaran. Oleh karena itu penulis memutuskan untuk merancang sebuah aplikasi berbasis android dengan menggunakan teknologi augmented reality untuk mempelajri hardware komputer untuk lebih mendukung pengetahuan orang awam mengenai komponen dan kegunaan dari masing-masing hardware komputer. Penelitian dilakukan dengan menggunakan metode Waterfall yang diawali dengan pembuatan diagram UML yang berisis use case, use case narrative, activity diagram dan class diagram. Dari hasil aplikasi yang dirancang penulis akan melakukan pengujian blackbox. Penulis melakukan survey secara langsung kepada orang awam untuk melakukan pengujian aplikasi dan mengisi form survey yang disediakan untuk mengetahui respon dari pengguna. Dari hasil yang didapat maka penulis akan mengambil kesimpulan tentang kelebihan dan kekurangan pada aplikasi tersebut.
METODE K-MEANS UNTUK PENGELOMPOKAN MASYARAKAT MISKIN DENGAN MENGGUNAKAN JARAK KEDEKATAN MANHATTAN CITY DAN EUCLIDEAN (STUDI KASUS KOTA BINJAI) Pardede, Akim Manaor Hara
Journal Information System Development (ISD) Vol 4, No 2 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (537.187 KB)

Abstract

The occurrence of poverty in the community is caused by the inability of the family head economically to meet the primary needs of family members, namely clothing, food, shelter, health, and education needs. The poor are almost present in every country, city, and region, this becomes a common problem. The current poverty data obtained from the Binjai City Central Bureau of Statistics is from 2012, and the number of poor people has increased in 2016 by 17,800 people with a poverty line (Rp. /Cap/month) of Rp. 343,078 and the latest data obtained in 2017 were 18,230 people with Poverty Lines (Rp. / Kap / Bulan) Rp. 371,387. In the database of the Binjai City Central Bureau of Statistics there are very diverse data on the poor, with this data, researchers try to explore data from the poor city of Binjai to obtain new information by grouping poverty data using the k-means clustering data mining method using distance the closeness of Manhattan City and Euclidean, so that groups of variables that are very influential in the community of poverty can be identified. The observed variables such as the level of education of the household head, education level of housewives, employment, number of family members, and other observed variables affect poverty. And the results of the k-means method for grouping poor people using proximity to Manhattan city and euclidean that can provide additional information in optimizing poverty alleviation in the city of Binjai.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN PERSEDIAAN BERAS PADA KILANG PADI DT. AA DENGAN METODE FORECASTING Jusin, Jusin; Wardani, Sri
Journal Information System Development (ISD) Vol 4, No 2 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (228.752 KB)

Abstract

The DT.AA rice refinery company is a rice supply company. The company has difficulty in predicting the supply of rice that must be provided to meet customer needs, because the system used by the company is still traditional, namely by recording in books. To help the company in making predictions of rice supply, a decision support system was created to determine the amount of rice that the company must provide in meeting customer needs. In determining the rice supply, there are predetermined criteria: sales last 3 days to the last 7 days. So that the process of determining the supply of rice can run, we need a decision support system using the moving average method. Moving average methods are often known as moving averages. The system development method used in this research is the Rapid Application Development (RAD) method, system modeling using Unified Modeling Language (UML), HTML and PHP used as the programming language with the mySQL database system. With this decision support system that uses the forecasting method, can help companies in determining the rice supply that must be provided in meeting customer needs.
Perbandingan Data Mining Mengidentifikasi Pola Keterkaitan Variabel Kecelakaan Lalu Lintas Di Polresta Kota Medan Saragih, Rusmin; Sitompul, Juliana Naftali
Journal Information System Development (ISD) Vol 4, No 1 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (534.157 KB)

Abstract

This research was conducted to analyze the results of data mining processing on a priori method and the method of k-means clustering in analyzing the comparison of the two methods to factors related to the incidence of traffic accidents that occurred in the POLRESTA Medan area. Analysis of the pattern of the causes of traffic accidents conducted in this study using Apriori data mining methods and k-means clustering. Apriori method is a data mining method that produces association patterns or linkages between variables or itemset based on frequent or frequent itemset. While the k-means clustering method is a method that groups data into different groups so that data with certain patterns will form their respective groups. By using a priori and k-means clustering, a comparative analysis can be obtained between the two methods. This research was carried out by collecting data on traffic accidents obtained from POLRESTA Medan followed by the development of a data mining software that implements the Apriori method and k-means clustering to produce the association and clustering patterns contained in the accident data. The results of the comparison between the two methods can then be information and references to the performance of the two methods in processing traffic accident data in POLRESTA Medan. Keywords: Accidents, Traffic, POLRESTA Medan, data mining, a priori, k-means.
PERANCANGAN DAN PEMBANGUNAN SISTEM INFORMASI PEREKRUTAN UNTUK PEKERJAAN PARUH WAKTU BERBASIS WEB DENGAN MENGGUNAKAN METODE RAD Dhamma, Mulia; Wijaya, Albert
Journal Information System Development (ISD) Vol 4, No 2 (2019): Journal Information System Development (ISD)
Publisher : UNIVERSITAS PELITA HARAPAN

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (645.853 KB)

Abstract

Peningkatan pesat penggunaan internet khususnya dengan platform web dan kebutuhan akan informasi lowongan pekerjaan paruh waktu yang menjadi tren di beberapa kalangan seperti mahasiswa, dari dua hal tersebut mendorong penulis untuk melakukan penelitian mengenai sebuah aplikasi pencarian lowongan pekerjaan paruh waktu yang dapat memberikan akses secara cepat dan akurat kepada para pencari kerja, dengan membangun aplikasi yang menggunakan akses interne, para pencari kerja akan dimudahkan dalam melihat detail dari pekerjaan hanya dengan melalui website dan mendaftar pekerjaan tersebut hanya dengan beberapa langkah. Penelitian diawali dengan pengkajian penelitian terdahulu sehingga akan memudahkan penulis dalam mengembangkan aplikasi ini. Setelah tahap pengkajian dilaksanakan penulis membuat beberapa diagram UML yaitu use case diagram, sequence diagram dan activity diagram. Dari hasil pembangunan aplikasi yang didasarkan atas metode rapid application development (RAD) tersebut penulis melakukan pengujian blackbox testing dengan metode use case testing, yang melakukan uji aplikasi berdasarkan test case yang ada. Hasil pengujian dari blackbox testing hanya memberikan hasil pengujian dari sisi pengguna secara fungsional. Dari perancangan dan pembangunan yang telah dilakukan diambil kesimpulan bahwa aplikasi dapat dibangun menggunakan metode RAD, use case, activity diagram, sequence diagram, dan antarmuka, yang didasarkan atas hasil pengujian yang memberikan hasil positif.

Page 5 of 23 | Total Record : 227