cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
jsaktiamiktunasbangsa@gmail.com
Editorial Address
Sekretariat J-SAKTI (Jurnal Sains Komputer dan Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : http://dx.doi.org/10.30645/j-sakti
J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelegence, Digital Signal Processing, Human Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge Based Management System, Game Technology.
Articles 48 Documents
Search results for , issue "Vol 7, No 2 (2023): EDISI SEPTEMBER" : 48 Documents clear
Evaluasi dan Peningkatan Keamanan Pada Sistem Informasi Akademik Universitas XYZ Palembang Aldo Fajarino; Yesi Novaria Kunang; Hendra Marta Yudha; Edi Surya Negara; Nita Rosa Damayanti
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.702

Abstract

As one of the universities in Palembang City, XYZ University has its own web server that functions as an information system in the academic and financial activities of its users. Testing of security systems on information systems needs to be done, web server security is very important to avoid destruction, data theft, data manipulation, and so on. In this study, the OWASP framework and the ISSAF framework were used and then the two methods were compared. The results of this study found several security holes that have been recommended to developers and successfully repaired. There needs to be a comprehensive improvement starting from server configuration, sanitization improvement of character input filters from users, installation of Intrusion Detection System and Intrusion Prevention System.
Analisis Perbandingan Manajemen Bandwidth Quality of Service Dengan Menggunakan Metode Simple Queue Dan Queue Tree Pada Telkom University Landmark Tower Ilham Auliya Rahman; MT. Kurniawan; Rd. Rohmat Saedudin
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.686

Abstract

The advancement of the internet impacts the flow of information circulating among internet users, which increases yearly. Telkom University has a TULT building that provides internet access services to all internet users in that building. However, the internet service in that building still needs to be improved as internet users still experience internet problems such as sudden disconnection, slow connection, and unstable connection. Therefore, bandwidth management is needed to improve the quality of internet services in the building. There are several methods to perform bandwidth management, but this study uses Simple Queue and Queue Tree methods. The selection of the Simple Queue and Queue Tree methods in this study is due to the difference in configuration between the two. Bandwidth management simulation uses 4 Mikrotik routers and six laptops as clients. The simulation is conducted for 1 hour via video streaming and online meetings with each client. During the simulation, traffic data is also captured using the Wireshark application. Then, from that Wireshark capture, Throughput, Packet Loss, Delay, and Jitter from the Simple Queue and Queue Tree methods, are analyzed. This research concludes that using the Queue Tree method is more appropriate because it has a packet loss value below 1% with the internet network characteristics of the TULT building, which has a packet loss value above 7.80%. Besides that, the working method of the Queue Tree will be beneficial when the TULT building internet network is experiencing peak traffic.
Implementasi Algoritma K-Means Untuk Klasterisasi Data Obat Puskesmas Kotabaru Muhamad Dicky Kurniawan; Bayu Priyatna; Fitria Nurapriani
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.693

Abstract

Drug management is one of the things needed to manage drug supplies. Proper planning of drug needs makes drug procurement efficient and effective so that drugs are available in sufficient types and quantities as needed and easily obtained when needed. The purpose of this study was to classify drug data at the Kotabaru Health Center which can be used as a reference in making decisions in planning and controlling drug needs at the Health Center. The data used in this study are the Kotabaru Health Center annual report data from 2019 to 2021. Data processing in this study uses the K-means clustering method with rapidminer tools which is a data grouping technique by dividing the existing data into one or two forms. more clusters. The results of this study divide the drug data into 4 clusters, namely the first cluster (C0) with very low usage consisting of 27 drugs, the second cluster (C2) with low usage consisting of 6 drugs, the third cluster (C3) with high usage consisting of 1 drug, and the fourth (C2) with the highest usage consisting of 1 drug.
Penggunaan Factory Method Design Pattern Pada Framework Flask di Dalam Aplikasi Dashboard Devin William Sumbaluwu; Ramos Somya
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.677

Abstract

Problems related to the use of an object of Flask for various environments are often caused by application designs that are less effective and efficient. An object of Flask is used to run a Flask application based on the states or application environments. Each state or environment has different configuration requirements. The factory method design pattern solves the design problem by separating functions that return an object of Flask based on another object of the configuration class. The implementation of the factory method design pattern will be realized in a dashboard website. It will be used on the backend so that there will be a unit test code to prove the app can be run in a different state or environment
Analisis Perbandingan Algoritma Supervised Learning untuk Prediksi Kasus Covid-19 di Jakarta Angeline Septhiani; H Hendry
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.668

Abstract

Coronavirus disease or called COVID-19 is a pandemic according to World Health Organization (WHO) in February. The virus gives several symptoms, such as cough, asthma, and fever. The data and information are the important part of making a good decision. Those data need to be processed and analyzed to be useful information. In this research, the data will be used to predict the COVID-19 issue in Jakarta, using several supervised learning algorithm models, such as K-Nearest Neighbors, Neural Network, Linear Regression, Support Vector Machine, and Random Forest. Using 10 Fold Cross Validation in model testing and T-Test to get the model with the best accuracy. According to this research, the algorithm that has the best accuracy is K-Nearest Neighbors with the lowest RMSE, 1096.188 +/- 365.077 (micro average: 1149.601 +/- 0.000).
Pemodelan Arsitektur Sistem Informasi Manajemen Aset Menggunakan Kerangka Kerja Zachman di Kantor Kelurahan Pada Eweta Getrida Loba Anakoda; Yulius Nahak Tetik; Lidia Lali Momo
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.707

Abstract

Management of assets in government or private institutions becomes an obligation that needs to be implemented well and correctly starting from planning, Submission, The purchase, use, maintenance and removal of assets.The office of kelurahan on eweta which in the process of asset inventory is still done conventionally especially in its labeling has a problem that often occurs because it cannot be distinguished between fixed assets or moving assets so it is necessary to design a system model that can later be made as a reference in the development of asset management information system. Zachman's framework with the enterprising approach of the architecture planning is a very systematic phase because it has very comprehensive coverage where in the initial stages it needs to be planned for the architecture design to match the function and needs in the eweta office..In this architectural process, it produced a modeling business that was proposed., data architecture, application architecture, and a model of conceptual information technology that needs to be applied so it can sustain information systems that will be developed based on architectural instructions that have been designed. With an enterprise architecture approach can produce architectural models that correspond to the needs in the office of deployment on the eva, therefore, in the next phase it is necessary to draw a roadmap of implementation plan so that it can be used as a guideline or form for the development of management information systems in supporting the process of asset data management.
Pemodelan Gedung Kampus Universitas Muhammadiyah Sidoarjo dengan Metode Augmented Reality Sebagai Media Informasi Bagas Riski Utama; Mochamad Alfan Rosid; Hindarto Hindarto
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.691

Abstract

The purpose of making the UMSIDA Augmented Reality application is as an information medium as well as a promotional medium for prospective new students to introduce the campus during the promotion. The Augmented Reality visualization of the campus 1, campus 2 and campus 3 buildings at Muhammadiyah University of Sidoarjo can combine real and virtual objects in the form of 3-dimensional buildings in real time using the Marker Based Tracking method. This method produces an application that can display the building's visuals in 3 dimensions by scanning the markers on the brochure by directing the Android smartphone camera from various angles.
Penyusunan Manajemen Risiko TI Berdasarkan Cobit 2019 I&T Risk Focus Area Untuk Digitalisasi Fintechco Abdul Azis; Rahmat Mulyana; Rokhman Fauzi
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.698

Abstract

The rapid embrace of digital technology is visible in the Fintech industry as a born-digital company. Previous research identified the influence of IT governance (ITG) on organizational performance (OP), mediated by digital transformation (DT). However, more research is needed to understand how IT risk management works in Fintech's digitalization. This study uses Design Science Research (DSR) following ISACA's COBIT 2019 I&T Risk Focus Area. It looks at a case study in FintechCo, using interviews data and document triangulation. Solutions and plans are created based on the gaps found in seven components within FintechCo's three priorities: EDM03 Ensured Risk Optimization, APO12 Managed Risk, and MEA03 Managed Compliance with External Requirements resulting estimated capability improvement 0,8 (34,8%). This study helps us understand how to manage IT-related risks in organizational digitalization and offers practical insights for FintechCo's digitalization journey.
Analisis Penerimaan Teknologi Aplikasi Pemesanan Makanan Gofood dengan Technology Acceptance Model dan Pearson Correlation Aliyatul Munna; Kristiawan Nugroho; Kristophorus Hadiono
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.682

Abstract

Technology has proven itself as a powerful tool to ease human work in many ways, including food ordering technology. GoFood is a popular and innovative food ordering application that has brought convenience and comfort to users in Indonesia. This research aims to analyze the technology acceptance of the Gofood food ordering application using the Technology Acceptance Model (TAM). TAM is a framework used to understand the factors that influence the acceptance and use of technology. In the context of food ordering apps, user acceptance of the app is critical to the success and growth of the business. This research method involves collecting data through online surveys among Gofood application users. Respondents were asked to assess relevant factors in the TAM, including perceived usefulness, perceived ease of use, as well as attitudes toward use and behavioral intention to use. ), and test the correlation between constructs using Pearson correlation. The results of the analysis show that these findings indicate that perceived usefulness and perceived ease of use of the GoFood application contribute to attitudes toward use and interest in utilizing and using the application. .
Analisa Segmentasi Customer Pada Perusahaan Bisnis Properties Menggunakan Model RFM (Kasus PT. Pollux Aditama Kencana) Gama Arseta; Hindriyanto Dwi Purnomo
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 7, No 2 (2023): EDISI SEPTEMBER
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v7i2.673

Abstract

The current business development in the property industry is promising, leading to a highly competitive market. As a result, PT. Pollux Aditama Kencana, which operates in the property business, must have strategies in every market competition, especially in gaining customer loyalty. This study uses the Recency, Frequency, and Monetary (RFM) model combined with K-Means. The RFM model is used for customer data clustering based on the number of transaction activities, transaction amount, and transaction time. Meanwhile, K-Means can describe the level of customer loyalty. The data used in this study were taken from sales reports from November 28, 2014 to September 19, 2022, involving 1966 customers in property purchases. The results show that the proposed use of the RFM and K-Means models is superior compared to using only the RFM model. Cluster 1 has 936 customers, indicating customers with high loyalty to the company, while Cluster 2 has 250 customers, indicating customers with low loyalty, and Cluster 3 has 780 customers, indicating customers with medium loyalty. The RFM and K-Means models used successfully produced several loyalty attributes that affect customer evaluations, with 4% in the top customer category, 12% in the high-value customer category, 34% in the medium-value customer category, 31% in the low-value customer category, and 19% in the lost customer category.