cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 344 Documents
Penerapan Metode Transformasi Brovey Pada Pembesaran Citra Ultrasonografi (USG) Aslinawati Nasution
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (285.181 KB)

Abstract

In the process of taking an ultrasound image or the results of long-distance imaging with a telescope or the results of medical recordings including x-rays, ultrasound or scans, there are often disturbances in the form of light distortion, noise or other disturbances that cause objects in the image to be unclear or blurry. Medical ultrasonography (sonography ) is an imaging diagnostic technique using ultra sound that is used to image internal organs and muscles, their size, structure, and wound pathology, making this technique useful for examining organs. Obstetric sonography is commonly used during pregnancy. Image processing applications are increasingly widespread as in the medical world, image processing has a very large role in everyday life. In the field of ultrasound medicine or better known by the abbreviation USG is widely used in medical. Enlargement or zooming is a process carried out to enlarge an image. The enlargement process certainly has blur in the image so that the image will look like boxes. And there is a change in the size of the image This happens because in the enlargement process, the resolution that compiles the image becomes smaller to reduce it. Image enlargement is one of the fields in digital image processing that is getting enough attention because of the large need to obtain a better view or view of an image as for the method used is the brovey transformation method. Brovey transformation method is an easy method for combining data from different sensors. In this thesis will be discussed on how to create an image enlargement application using the brovey transformation method. This application was built with Matlab 2013 as an editor for editing programs
Perancangan Aplikasi Messanger Dengan Menerapkan Caesar Shift Berbasis Secret Sharing Bayu Syahputra
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (233.779 KB)

Abstract

The impact of chatting may not be realized at all. In addition to facilitating communication as a positive impact that humans get, there are also negative impacts that humans get as a result of using this chat. Confidentiality and security when exchanging data is very important in data communication, both for shared security purposes, and for individual privacy. the progress of the communication so many people who want to tap communication between one person and another that causes a lot of information or conversation is tapped without the knowledge of the owner of the information. There are several ways to secure data through an internet data channel, one of which is cryptography. Highly confidential data will be disguised in such a way that even if the data can be read it cannot be understood by unauthorized parties. Data to be sent and not yet encoded, then this plaintext will change to ciphertext. One of the algorithms that can secure the data discussed by the author is the Caesar Shift Algorithm.
Sistem Pakar Mendiagnosa Penyakit Polio Menerapkan Metode Hybrid Case Based Chintami Febri Idris
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (237.278 KB)

Abstract

Expert system of a computer system designed to be able to do reasoning like an expert or expert in a particular field. It should be noted, however, that this expert system is not a substitute for an expert or physician but is only for limited equipment, since this expert system is consultative and also has no such properties as a physician who is able to identify in detail the illness experienced by the patient with his or her thoughts . This expert system is made using Hybrid Case Based method. This method is a combination of the system that is Rule Based Reasoning (RBR) and Case Based Reasoning (CBR), this method has a better accuracy than the method running alone. This method will process a symptom so that can be detected disease suffered by the patient.
Pendeteksian Plagiarisme Skripsi Menggunakan Algoritma Levenshtein Distance Berbasis Web Ckristian Hutagalung
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Plagiarism is a violation that often occurs and deserves attention. Because the act of plagiarism is the act of plagiarizing other people's work and acknowledging it as a personal work. Therefore, the detection of plagiarism needs to be done to reduce plagiarism of the work of others. This study aims to detect the similarity of the title of the thesis text using the Levenshtein Distance algorithm so that it can be used to help determine plagiarism. The stages in the system are preprocessing which consists of case folding, tokenizing, filtering, stemming, sorting. After the preprocessing process, the next step is to calculate using the Levenshtein Distance method by measuring the similarity value so that it gets a similarity percentage value between the two titles. In this thesis, the author uses the Levenshtein Distance method is a string matrix used to measure the difference or distance between two strings
Optimalisasi Pelaksanaan Proyek Dengan Critical Path Method Studi Kasus PT. MNC Play Media Medan Daniel Pakpahan
Journal of Computer System and Informatics (JoSYC) Vol 1 No 1 (2019): Journal of Computer System and Informatics (JoSYC) - November 2019
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (238.398 KB)

Abstract

The process of optimizing planning to project control during the implementation of development is an important activity of a project, the success and failure of a project can be caused by inefficient planning so that it will cause delays. The critical path method (CPM) method can be used to measure project completion times more efficiently and effectively, so as to reduce the impact of delays and swelling on costs. This can be proposed by the project crashing process with three control alternatives: (i) adding labor, (ii) overtime work, (iii) adding subcontracts. With these results the expected results will be faster than project estimates at PT. MNC PLAY MEDIA MEDAN.
Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA Dan Steganografi LSB Lindia Ali Fitriani
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.659 KB)

Abstract

For various reasons, security and confidentiality are needed in data communication. There have been several attempts to deal with the issue of security of confidential data sent over the Internet, including using cryptographic and steganographic techniques. Cryptography is the science and art of maintaining the confidentiality of a message by encoding it in a form that cannot be understood anymore. Cryptographic techniques can arouse suspicion of third parties who are not entitled to receive information because the message is disguised by changing the original message as if it were unreadable. Furthermore, the third party will have the desire to find out the contents of the secret message and try to solve the real information. Whereas steganography further reduces suspicion because a message disguised is hidden in other messages. Steganography can disguise messages into a media without other people realizing that the media has inserted a message. This is because the output of steganography is data that has the same form of perception as the original data when viewed using human senses in cryptography can be seen and realized directly by the human senses. In steganography, confidential data is inserted into other data called cover-objects and produce stego-objects (the results of steganography). To secure messages using steganography techniques LSB steganography is used and uses the RSA method. Keywords: Cryptography, Steganography, RSA and LSB Methods.
Penerapan Algoritma Unary Coding Pada Aplikasi Kompresi Short Message Service (SMS) Mesiria Sitorus
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.949 KB)

Abstract

Communication is an effort between human messages, the form of information delivered in various ways, namely with the form of sound, and text digitally. Therefore, the more information obtained digitally, it will require a very large text storage media. Short Message Service (SMS) is a facility of GSM (Global System for Mobile) technology to send and receive short messages in the form of text through mobile devices. The sender and recipient of the SMS need not be connected to each other when exchanging SMS messages. Text SMS compression can be done by several methods such as Unary Coding. Unary Coding is a type of lossless compression, and Unary Coding has been widely used data compression and is widely used with a combination of several modification techniques. In Unary Coding, compression is done by knowing the frequency of each symbol on a string. Then the frequency will be sorted by descending order. The acquisition of n for each symbol obtained from the descending order numbering is then encoded with n-1 bit 1 followed by one bit 0.
Modifikasi Platform Kunci Algoritma Playfair Untuk Meningkatkan Nilai Confusion Pada Ciphertext Rivalri Kristianto Hondro
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.105 KB)

Abstract

Cryptography is the science of "original manuscript" encoding techniques, called plaintext terms, the arrangement of which is encrypted using a key so that it becomes "random text that is difficult to read" or referred to as ciphertext. By doing this process, someone who does not have a decryption key cannot read the original data. The cryptographic application technique is often also called the Algorithm or Cipher, one of the cryptographic algorithms discussed in this article is the Playfair Algorithm. Modifications are made to the key table that is owned by the Playfair Algorithm so that there are additional characters besides letters, there are numbers and symbols. The result to be achieved is from the modification of the Playfair algorithm that can be applied to the encryption process so as to produce a ciphertext that has a confusion value. but it can also be applied to the decryption process so as to produce an understandable plaintext
Penerapan Algoritma Ant Colony Optimization Pada Aplikasi Pemandu Wisata Provinsi Sumatera Utara Berbasis Android Zakarial Anshory
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.376 KB)

Abstract

North Sumatra Province is a province that is rich in tourism. Lots of interesting tourism spots are scattered throughout the Province. But tourists tend to only know famous tourist areas in North Sumatra Province, such as Lake Toba and Samosir Island. In everyday life people are more familiar with the term guide than a tour guide or tour guide. A tour guide is basically someone who accompanies, provides information and guidance as well as advice to tourists in conducting their tour activities. The problem that often arises when tour guides carry out tourism activities, the tour guides must be on time to arrive at the destination, as well as share the schedule for tourists to do tourism activities, whereas not all tourists are on time before carrying out their tourism activities, and most tour guides only know the usual places and routes but not the closest route from the starting point, This can slow down tourism activities. The method to be used in determining these tourist attractions is the Ant Colony Optimization Algorithm, Ant Colony Optimization (ACO) adopted from the behavior of ant colonies that known as the ant system
Pembangunan Aplikasi E-Commerce Pemasaran Batik pada Toko Batik Rifqi Angger Wibowo; Aziz Setyawan Hidayat; Eva Rahmawati
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (685.433 KB)

Abstract

The use of the internet in the business world serves as a business strategy application, such as: marketing, sales, and customer service. This is evidenced by the many large companies that have used or used the internet for business development, for example, online stores. In doing business, entrepreneurs are faced with challenges as to how they can serve and provide the required information to customers quickly, without being limited by place, distance and time. it happens because of influential factors such as company location, limited operating hours, lack of product information can reduce the number of transactions and can even cause customers to switch to other companies better. The system development method used is SDLC (System Development Life Cycle), namely software requirements analysis, design, code generation, testing, support, or maintenance. MySQL as a database for PHP applications. With this e-commerce website, it is expected to make it easier for buyers to be able to buy batik that is sold in stores easily via the internet. With this website the seller can easily promote a wider range of people

Page 1 of 35 | Total Record : 344