cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 276 Documents
Penerapan Algoritma AES 128-Bit dalam Pengamanan Data Kependudukan pada Dinas Dukcapil Kota Pematangsiantar Imelda Asih Rohani Simbolon; Indra Gunawan; Ika Okta Kirana; Rafiqa Dewi; S Solikhun
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (629.64 KB)

Abstract

Population data is information about the existence of someone in a country. The data can be accepted as validity through management in one of the government agencies. The issue of security and confidentiality of the data is something that is very important because it concerns the identity of a person, in order to avoid theft and manipulation of data it is necessary to apply a data security system. Cryptography is the study of mathematical techniques related to aspects of data and information security such as data validity, integrity, and data authentication. The Advanced Encryption Standard (AES) is one method used in data / information safeguards. The implementation of the AES algorithm in securing population data of the Population and Civil Registration Service shows that the method can produce messages that cannot be read or understood by humans (encryption) and produce the same message as the initial plaintext that was imputed (decryption)
Penentuan Masyarakat Penerima Bantuan Perbaikan Rumah di Kecamatan Siantar Barat Menggunakan Metode ELECTRE Roulina Simarmata; Rahmat W Sembiring; Rafiqa Dewi; Anjar Wanto; Eva Desiana
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (493.084 KB)

Abstract

Home improvement assistance is a government program for disadvantaged people. Home improvement assistance program is one of the government's efforts as a form of concern related to the condition of the homes of underprivileged communities. Therefore the purpose of this study is to determine the recipient of housing improvement assistance in the West Siantar Subdistrict as a reference material for the Office of Spatial Planning and Settlements (Tarukim) of Pematangsiantar city in providing housing repair assistance to be on target. The DSS method used in this study is the Elimination Et Choix Traduisant La Realita (ELECTRE) method. The alternative data samples used were 5, which were obtained from the Pematangsiantar Tarukim Office. This study also uses 5 criteria, including: roof material conditions, floor conditions, wall conditions, Work and Bathroom ownership. Based on calculations, Alternative 2 (A002) on behalf of Mr. Wariman was chosen as the best. Therefore, Mr. Wariman's family home is a community that is entitled to receive housing repair assistance in the West Siantar sub-district
Efesiensi Fisik Komputer Server dengan Menerapkan Proxmox Virtual Environment Saidi Ramadan Siregar
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.788 KB)

Abstract

Along with the development of desktop and non desktop application software, the provision of services to accommodate requests from client computers is increasing too, which can be seen in terms of usage environment whether in local or public network coverage. for example an information system program created using the Microsoft visual studio.Net application by using database access, the server computer even though it uses a Windows operating system, and vice versa if the information system program that is built using a web programming language (opensource) is mostly among programmers choosing to use a web server with linux operating system. To do this, the network manager creates a solution so that the information system that is built from any programming language can be run on one physical computer server with a virtualization system by applying the Proxmox virtual environment as a virtual machine container that will accommodate several types of operating systems.
Aplikasi Optimalisasi Penjadwalan Proyek dengan Metode Harmony Search (Studi Kasus: AKSDAI) Yusida Widana
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Scheduling is one of the important stages in the industrial world, especially in terms of building a building. Usually in handling a development project, resources are available in a limited amount of resources. The purpose of project scheduling is to optimize project scheduling with the Harmony Search method. Harmony Search method is a method that adopts the process of finding a blend of tones in order to obtain beautiful musical harmony. Similarly, the optimization process that looks for optimal or perfect solutions based on functions and objectives. Harmony Search (HS) was first introduced by Zong Woo Geem in 2001. The basic idea of ​​Harmony Search is to mimic the process of improving the harmony of music undertaken by music choir groups. When a music choir makes improvements to the harmony of the music being played, there will be three possible choices, including playing well-known harmony music based on their memories, playing harmony music that is similar to well-known harmony music but there is little adjustment, or making harmony music that is new.
Penerapan Algoritma Rice Codes dan Algoritma Rivest Shamir Adleman (RSA) Untuk Kompresi dan Pengamanan Teks Pada Aplikasi Chatting Vify Ernanda; Surya Darma Nasution; Fince Tinus Waruwu
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

With the development of information in this day and age chat plays an important role in all aspects of human life. Where chat as a communication tool that can help communicate without any time restrictions and is free from obstacles. But in communicating through chat applications can not be free or as free in communicating as usual. Where chat has a predetermined number of bits, so that in sending text messages the chat application cannot be at once or in one delivery but in multiple transmissions. Therefore the chat application requires a compression where the text messages to be sent through the chat application do not take a long time and do not send several times. It is enough to send only one text message to those addressed. But sometimes text messaging is not only a problem in many or few text messages to be sent there are other obstacles in sending text messages that must be overcome. Text messages that have been sent to those intended, sometimes the text messages have changed not at its disposal or not the same as what was sent. Therefore the chat application is in need of security on the chat application which can secure text messages to be sent to the intended destination without changing one bit. Chat applications provide solutions to communication problems because they are hampered by distance and time. Chat application provides convenience in communicating chat to several people who have great distances by applying the Rice Codes and Rivest Shamir Adleman (RSA) algorithm to chat applications that are designed using Miscrosoft Visual Basic 2008 programming language as a means of compressing and securing text messages.
Penerapan Teknologi Augmented Reality Dengan Metode Marker Based Tracking Untuk Media Promosi Objek Wisata Kabupaten Aceh Singkil Berbasis Android Syamsuwardin Syamsuwardin
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Aceh Singkil is one of the districts in Aceh Province. As one of the regencies that has beautiful tourism objects, Aceh Singkil Regency prioritizes the tourism sector as one of its regional income. Promotions that are used to introduce existing tourism objects in the district of Aceh Singkil through conventional print media such as the usual brochures without involving increasingly developing technology are currently considered less attractive. Conventional promotional media such as brochures require innovation so that they are more interesting, by combining augmented reality technology to introduce tourism objects in the district of Aceh Singkil. Attractions introduced in the form of 3D and based on Android. Based on the above problems will be solved by providing innovation to the promotional media used such as brochures using the Augmented reality Marker Based Tracking method. That is expected to be more interesting and increase tourist visits to attractions in the district of Aceh Singkil.
Implementasi Algoritma Camellia Pada Penyandian Record Database Neti Rusri Yanti; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Database records in the form of text are very widely used, so it is very vulnerable to data theft by unauthorized parties. In order to maintain the security of database records, it can be done by using cryptographic techniques. Cryptographic techniques can encode database records by encrypting them in the form of passwords that are not understood. The Camellia algorithm is one algorithm that can be relied upon to realize cryptographic techniques. This symmetry algorithm will produce a higher level of security against the database record because it can encode it into a password with a fairly complex process that will make it difficult for cryptanalysts to access the database. This research will use the 128 bit Camellia algorithm for the encryption and decryption process, so that in the process it is necessary to go through several long steps in order to produce the final cipher. This algorithm requires 18 rounds where every six rounds must enter Function F and Function FL-1 and also require as many as 26 subkeys, namely kw, k and kl. This study describes the process of securing a database record by encoding it based on the Camellia algorithm, so that it produces a text record database in the form of a password that is difficult for others to understand and understand. This is done in an effort to minimize acts of misuse of database records.
Implementasi Metode Bilateral Filter Perbaikan Kualitas Citra RGB Nurega Harahap
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the process of capturing images using a camera or other sensors often experience problems and deterioration in quality, such as capture results that are not as expected. This can happen because of the possibility of a camera lens that is not focused, the lighting settings are not perfect, the presence of dust or other dirt on the camera lens. Improving the quality of an image is necessary so that someone can observe the image clearly and in detail without any disturbance bilateral filter method is a filter that functions to replace The value of a pixel with the convolution calculation results in the area covered by the filter, this convolution operation is often involved in neighboring pixel operations. Which then produces software applications that are able to reduce the effects of disturbing noise on digital images with the bilateral filter method. With this method, it is expected to be able to solve the problem of image quality improvement in image improvement applications. This study discusses that the process undertaken to implement image improvement based on the bilateral filter method, then an application is built using MATLAB 2013 as an editor to edit programs.
Jaringan Syaraf Tiruan Pengaruh Infuse Pada Berat Badan Pria dengan Menggunakan Metode Backpropagation Nurina Sianturi
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Artificial Neural Network or in short ANN, is a computational system where architecture and operations are inspired by knowledge of biological nerve cells in the brain, which is one of the artificial representations of the human brain that always tries to stimulate the learning process in the human brain. Infusion or also called intravenous infusion is a fluid that works to increase body fluids. Infusion fluid also functions to maintain normal body functions and provide adequate calorie intake, especially for male patients who are recovering and after surgery. In this study, implementing a backpropagation neural network method to study existing data in order to prove the presence or absence of the influence of the infusion on male body weight. The input used is an effect that occurs after the use of infusion, then represented by using the backpropagation algorithm
Penerapan Algoritma Ternary Comma Code Pada Aplikasi Kompresi File Gambar Nurma Ningsih; Surya Darma Nasution; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the discovery of a tool to capture an image (image) in the form of a camera making technological developments not only focus on the tools but also must focus on where the data is stored. The need for storage media is something that is needed in every communication tool. Data and information communication systems are not only in the form of text but can also be in the form of images, videos and audio. Image file size that is relatively larger compared to text files is one of the causes of the amount of memory used for storing image files. The size of the image file can also cause the length of time to send the image file. Image file compression process is one way that can be done to overcome the problem of image file size. Image compression is an attempt to minimize the file size or bytes of a graphic file without reducing the quality of existing images. A certain amount of storage, such as disk space or memory, makes it possible to reduce the image file size. Many algorithms that can be used to compress image file sizes include the ternary comma code algorithm that can help reduce image file sizes. The ternary comma code algorithm has a faster time space compared to other algorithms.

Page 2 of 28 | Total Record : 276