cover
Contact Name
-
Contact Email
-
Phone
-
Journal Mail Official
-
Editorial Address
-
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika)
ISSN : 25275771     EISSN : 25497839     DOI : -
Core Subject : Science,
JURASIK adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa Pematangsiantar yang bertujuan untuk mewadahi penelitian di bidang Sistem Informasi dan Teknik Informatika. JURASIK (Jurnal Riset Sistem Informasi dan Teknik Informatika) adalah jurnal ilmiah dalam ilmu komputer dan informasi yang mengandung literatur ilmiah pada studi murni dan penelitian terapan dalam ilmu komputer dan informasi dan ulasan publik pengembangan teori, metode dan ilmu terapan yang berkaitan dengan subjek.
Arjuna Subject : -
Articles 204 Documents
Klasifikasi Kualitas Wortel Menggunakan Metode K-Nearest Neighbor Berbasis Android Farich Al Azami; Aditya Akbar Riadi; E Evanita
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.413

Abstract

In several studies, many have produced various programs or applications specifically designed to identify plants, fruits, leaves or others based on the specified characteristics. Of the various kinds of fruits and vegetables, carrots are vegetables that have many benefits and are liked by the majority of people. So it is necessary to choose good quality fruit to produce quality products as well. However, so far, the selection of quality carrots is still using the manual method with the human sense of sight to determine good and bad quality carrots. . Image processing in this application uses the K-Nearest Neighbor (KNN) algorithm which is a method that classifies objects based on the learning data that is closest to the object. In the development of the carrot quality classification application, it is hoped that it can help farmers, industry, or the general public in sorting out good and efficient carrot quality. On the results of the classification using this classification system got a percentage of 74.19%
Sistem Informasi Perjalanan Dinas Berbasis Elektronik Pada Dinas Pertanian Kabupaten Pati Ahmad Fikri Salahuddin; Rizky Sari Meimaharani; Mukhamad Nurkamid
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.418

Abstract

The development of technology, especially computers at this time has a very important role in life in society. Technology that develops according to the demands of the times is expected to be a supporting tool to deal with problems that arise in managing and solving problems in the company or organization. Similarly, the Office of The Agriculture Office of Pati Regency is expected to provide accurate and accurate information in making a travel warrant. Pati District Agriculture Office does not currently have an application to make a letter, the office is currently making letters still manually. This Information System is designed using the PHP programming language. This Information System is designed in such a way as to facilitate the creation of faster and more accurate and complete letters. This Information System is important because it makes it easier to create a travel warrant because it can shorten the time.
Penerapan Snort Sebagai Sistem Pendeteksi Serangan Keamanan Jaringan Rahmat Novrianda Dasmen; Cendri Ariyanto; Muhammad Haris Surya; Hafiizh Ramadhan
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.409

Abstract

Network security is very important in an effort to prevent abuse on a network.Our research aims to detect networks using snort where this application has sensor that can indentify abuse on the network besides snort also funcitions to detect intrusions. Detection is carried out according to the rules contained in the configuration file,snort can perform analysis on rule based systems,adaptive system.Snort can operate sniffer mode, packet logger mode and intrusion detection mode
Penerapan Data Mining Untuk Menganalisis Kepuasan Pegawai Terhadap Pelayanan Bidang SDM dengan Algoritma C4.5 Putrama Alkhairi; Zakarias Situmorang
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.414

Abstract

Employee satisfaction includes the difference between the level of importance and perceived performance or results, and is an alternative evaluation that exceeds employee expectations. There are 5 dimensions to measure service quality based on expectations and perceived performance by employees, namely career development, leadership in HR, policy and law enforcement, building a work atmosphere and providing salaries and rewards. Five dimensions are very influential in the progress of STIKOM Tunas Bangsa, using data mining methods can be found important trends for campuses. Employee satisfaction assessment is based on a questionnaire filled out by the employee. The results of the questionnaire were processed using the c4.5 algorithm. The c4.5 algorithm is a classification method and produces a decision tree. C4.5 turns large facts into decision trees that represent rules. Rules are easy to understand in natural language. Based on the results of the research that has been done, the use of the C4.5 algorithm can help the campus in improving services according to the results of the questionnaire. The results of the calculation, there are two variables satisfied employee questionnaire. Meanwhile, the employee questionnaire was not satisfied with the three variables. The highest gain value is the variable to build a work atmosphere with a value of 0.20619372. The indicator of the variable of building a work atmosphere that has the highest entropy value is a fairly good indicator with a value of 1. The total of questionnaires filled in are 65 questionnaires, 44 people stated they were satisfied and only 21 people said they were not satisfied.
Aplikasi Pengolahan Citra Digital Menentukan Bobot Sapi Dengan Metode Titik Berat Berbasis Android Vicki Yuda Mahendra; Aditya Akbar Riadi; E Evanita
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.419

Abstract

Cattle is a consumption animal that is in great demand by Indonesians, its soft meat and delicious taste make beef one of the most expensive meats at the moment, cattle breeders are now starting to modernize and continue to develop their farms to make it easier to maintain and sell cattle, in this modern era there are many things that are facilitated by technology that makes it easier for people to do things, one of which is calculating the weight of a cow with an android application by entering an image of a cow that will be processed and will produce a value for the size and weight of the cow. The weight of the cow can be calculated using the Schoorl formula and the Modified/ Lambourne formula which requires variables of body length and chest circumference for calculation. To get bodyweight, it is necessary to measure chest circumference and body length which are measured manually. However, the reality in the field shows that to get the values for chest circumference and body length, manual measurements need to be carried out, and this is not easy to do because cows are difficult to condition. In the field itself, there is no practical and accurate tool to calculate chest circumference, body length, and weight of cows. Starting from this problem, gave rise to the idea of making a tool that can measure accurately and easily.
Penerapan Data Mining pada Tata Letak Buku Di Perpustakaan Sintong Bingei Pematangsiantar dengan Metode Apriori Yulia Andini; Jaya Tata Hardinata; Yuegilion Pranayama Purba
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.410

Abstract

The library is a place that has a large collection of knowledge books, magazines and other media that are arranged or arranged in a certain way so that it is easy for users to use properly and well. In placing books in the library, books are placed according to the book category given the numbering. However, the placement of books has not been regulated by looking at the level of books that are often borrowed and many visitors find it difficult to find books that are often borrowed. So it is necessary to create a system using a priori data mining method to determine the pattern of book layout arrangement in the library, this system can help to make it easier to determine the layout of the book as needed. Based on the results of the implementation of RapidMiner, the highest combination pattern of library book layout is Pure Science and Social Sciences with 50% support and 86% confidence. General Works and Pure Science were obtained with 41% support and 83% confidence. Furthermore, Public Works and Social Sciences with 41% support and 83% confidence.
Implementasi Keamanan Citra Menggunakan Algoritma AES-128 Dengan Aplikasi Client-Server A Azanuddin; Suardi Yakub; Jaka Prayudha
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.415

Abstract

Digital images that are private and confidential are very vulnerable to eavesdropping by irresponsible parties. Especially when distributed over the internet, such as chat-based applications such as Facebook, WhatsApp and e-mail media. Image sent via the internet. Because digital images are still recognizable images and can be used by eavesdroppers for personal gain, to the detriment of those who have access to image data. The act of tapping the image data can be minimized by the application of cryptographic encryption techniques. This research will secure digital images with 128 bit AES method for encryption and decryption of digital images in client-server based applications. The results of the AES algorithm encryption produce a cipherimage with pixel values that are much different from the plainimage pixel values.
Sistem Pengunci Pintu Dengan Sidik Jari Menggunakan Arduino S Sahril; Rinto Suppa; Muhlis Muhallim
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.411

Abstract

The purpose of this research is to create and implement a door lock system with fingerprints using Arduino in the hardware laboratory at the engineering faculty of the informatics engineering study program, Andi Djemma Palopo University. Lab users, in this case the lab head and assistant head of the lab, can put their finger on the sensor if they want to open the door. The door will open if the fingerprint that is pasted is the same as the fingerprint data of the lab user, and with a display on the 16x2 LCD which states that the fingerprint that is attached is suitable / not. The research method in this thesis includes analysis, system design, mechanical manufacturing, prototype simulation and implementation. In designing the Fingerprint Door locking system using Arduino, the At-mega 328 microcontroller is used to control selenoid as a door lock and several components needed in the design of security, including: arduio uno at-mega 328, fingerprint sensor, 16x2 LCD, adapter , solenoid, relay, push button, and breadboard. Based on the tests that have been carried out, it can be concluded as follows: this equipment has been tested and can be used to help the security system at the lab door by using a fingerprint. The fingerprint used to open the solenoid is a fingerprint that has a valid fingerprint pattern that has been registered previously. The results of usability testing are 89.8% of the tests carried out on students who use this locking system, so that it can be said to meet usability standards
Implemetnasi Metode Fuzzy Associative Memory Dalam Menentukan Tingkat Kepuasan Pelayanan Di Perpustakaan Suardi Yakub; A Azanuddin; Jaka Prayudha
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 7, No 1 (2022): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v7i1.416

Abstract

Creating satisfaction with the library is certainly not easy, librarians must be able to provide quality services, both directly and indirectly to students, good service can certainly be of more value than librarians to students. less friendly in serving users who need information. For this reason, a Decision Support System that applies Fuzzy Associate Memory was developed to determine the level of satisfaction of library services at STMIK Triguna Dharma. In general, Decision Support Systems are computer-based information systems, including knowledge-based systems that can be used in making decisions in organizations or companies. The level of user satisfaction makes it easy for STMIK Triguna Dharma in evaluating the extent to which the quality they provide in the library is related to data on library facilities, services, and convenience. is quite satisfying.
Analisis Perbandingan Tingkat Performa Algoritma SVM, Random Forest, dan Naïve Bayes untuk Klasifikasi Cyberbullying pada Media Sosial Mohammad Farid Naufal; Theofilus Arifin; Hans Wirjawan
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 8, No 1 (2023): Edisi Februari
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v8i1.544

Abstract

In January 2022, the number of Internet users in the world has reached 4,95 billion with an average of activity of 135 to 193 minutes per day. Technological advances in information gathering and communication are not in line with the improvements in people's behavior on social media. It is recorded that most of cyberbullying incidents in 2017 originate from social media. Social media are media technologies that facilitate interaction between people on the Internet. The most used social media in the world are Youtube, Instagram, Snapchat, Whatsapp, dan Twitter. There is a static data indicating that 54% of participants in The Annual Bullying Survey have experienced cyberbullying. For this research, a sentiment analysis was performed on a collection of texts from several social media platforms around the world. There are about 46000 different texts with an approximately 8000 text for each category, namely age cyberbullying, ethnicity cyberbullying, gender cyberbullying, religion cyberbullying, other type of cyberbullying and not cyberbullying and approximately 1000 text consist word “fuck”. Sentiment analysis is the process of classifying sentiments in text, whether or not the text contains cyberbullying emotions. This research classifies the type of cyberbullying using the TF-IDF (Term Inversion Frequency Document) function and 3 models namely SVM (Support Vector Machine), RF (Random Forest) and Naive Bayes. Result highlight that SVM and Random Forest performed the best and achieved a precision 82%, recall 83%, accuracy 83% and precision 83%, recall 82%, accuracy 82% using evaluation matrix.