Jurnal Sisfokom (Sistem Informasi dan Komputer)
ISSN / EISSN : 2301-7988 / 2581-0588
Current Publisher: LPPM STMIK Atma Luhur (10.32736)
Total articles ≅ 204
Latest articles in this journal
Published: 20 October 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 380-386; doi:10.32736/sisfokom.v9i3.992
Currently, the sales system is overgrowing. The concept of selling that was done manually (which is still less than optimal) becomes electronic (e-commerce). System development requires a digital platform. This platform must be able to carry out all activities that were carried out before (manually), such as collecting documents, recording transactions, and reporting. Besides, the e-commerce platform can provide support and increased performance in the sales process, both in checking stock items, transaction reports, and services. Besides, this optimization can provide services precisely and quickly to consumers. A management information system concept is needed to carry out e-commerce and services with integrated data and be stored in its development database. This prototype concept requires a method for website development. The method used is a waterfall. Website design uses the Hypertext PreProcessor (PHP) programming language and MySQL database. The design model uses two concepts: entity-relationship diagrams (ERD) and data flow diagrams (DFD). The result is a website and e-commerce services that can be accepted by users and e-commerce organizers with tests that have been carried out. System testing uses Blackbox and Whitebox testing, each of which results can be used to implement e-commerce sites and services. The website can assist officers in service and e-commerce and make it easier for officers to determine the target and service status.
Published: 12 October 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 373-379; doi:10.32736/sisfokom.v9i3.945
DDoS attack (Distribute Denial of Service) is one of the weapons of choice from hackers because it’s proven it has become threat on the internet worlds. The frequent of DDoS attacks creates a threat to internet users or servers, so that requires the introduction of several new methods that occur, one of which can use the IDS (Intrusion Detection System) method. This study took advantage of Neural Network ability to detect DDoS attack or normal based on traffic log processed statistically using Fixed Moving Window. The DDOS attack scheme uses a network topology that has been designed based on the needs and objectives that are found in monitoring network traffic. In each DDoS data and normal consist of 27 traffic log with total numbers of dataset as much as 54 data along with each testing data as much as 10 DDoS data and normal. Data collection was performed using LOIC, HOIC, and DoSHTTP with 300 seconds of traffic monitoring. The result of the Fixed Moving Window processing is the extraction value that will be put in the Neural Networks have 6 input values, one hidden layer with 300 neurons and 2 outputs which consist of a normal dataset and a DDoS dataset. The results of this study showed that Neural Network can detect DDoS and Normal in a good way with accuracy value as much as 95%.
Published: 29 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9; doi:10.32736/sisfokom.v9i3.931
Every company engaged in IT Consulting is in need of an application that can help management control the projects they work on. This study examines the problems that occur when a company works on a project, aimed at analyzing the effectiveness of the application of project management applications in order to assist the company in presenting information about the project being undertaken or information officers and clients. The study used case studies at PT. Seatech Infosys Considering systems that still use simple data processing tools such as Microsoft Excel, ranging from data logging, data storage to report generation. Thus, it is possible to have errors in recording and less accurate reports are made. The development of the system with the method used is waterfall method. The result of this analysis is to declare that this application is one solution to overcome existing problems, to achieve an effective and efficient activities in supporting the project activities.
Published: 24 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 357-364; doi:10.32736/sisfokom.v9i3.980
Hadith is the second source of law for Muslims after the Qur'an which comes from various forms of the words, actions and stipulations of the Prophet Muhammad or referred to as his sunnah. In order to make it easier for Muslims to apply the teachings of the hadiths, a classification system is needed that can categorize a hadith into a class or a combination of two of the three classes which called a multi-label classification. In building a text classification system, there are various classification techniques, one of which is k-Nearest Neighbor (KNN). KNN is a simple and effective classification method for text classification, but has a weakness in processing data with high vector dimensions so that the computation time is higher and the efficiency of text classification is very low. Mutual Information (MI) is used as a feature selection method to reduce vector dimensions because it has the ability to show how strong a feature is in making a correct prediction of a class. In this study Problem Transformation Method with the Binary Relevance (BR) approach is used so that the multi label classification process can be accomplished. The optimum results obtained in this study shows the value of hamming loss is 0.0886 or about 91.14% of data were correctly classified and computational time for 595 seconds by using MI as a feature selection, but without stemming.
Published: 14 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 350-356; doi:10.32736/sisfokom.v9i3.879
The lecture schedule is a problem that belongs to the NP-Hard problem and multi-objective problem because it has several variables that affect the preparation of the schedule and has limitations that must be met. One solution that has been found is using a Genetic Algorithm (GA). GA has been proven to be able to provide a schedule that can meet limitations in scheduling. Besides, it also found a new concept of thought from GA, namely the Fluid Genetic Algorithm (FGA). The most visible difference between FGA and GA is that there is no mutation process in each iteration. FGA has a new stage, namely individual born and new constants, namely global learning rate, individual learning rate, and diversity rate. This concept of thinking was tested in previous studies and found that FGA is superior to GA for the problem of finding the optimum value of a predetermined function, but this function is not included in the multi-objective problem. In this study, the testing and comparison of FGA and GA were conducted for the problem of scheduling lectures at STMIK XYZ. Based on the results obtained, FGA can produce a schedule without any hard constraint violations. FGA can be used to solve multi-objective problems. FGA has a smaller number of generations than GA. However, overall GA is superior in producing schedules without any problems.
Published: 10 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 339-349; doi:10.32736/sisfokom.v9i3.978
Cancer is one of the deadliest diseases in the world that needs to be handled as early as possible. One of the methods to detect the presence of cancer cells early on is by using microarray data. Microarray data can store human gene expression and use it to classify cancer cells. But one of the challenges of using microarray is its vast number of features, not proportional to its small number of samples. To resolve that problem, dimensionality reduction is needed to reduce the number of features stored in microarray data. Binary Particle Swarm Optimization (BPSO) is one of the methods to reduce dimensionality of microarray data that can increase classification performance. Although when combined with Backpropagation, BPSO still shows a relatively low performance. In this research, Modified Backpropagation with Conjugate Gradient is used to classify data that has been reduced with BPSO. The average accuracy result of BPSO+CGBP is 86.1%, giving it an improvement compared to BPSO+BP which averaged to 80.8%.
Published: 10 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 332-338; doi:10.32736/sisfokom.v9i3.884
The clinic is one of the public services engaged in the health sector which is inseparable from the development of information technology. Smart Medica Clinic in data processing is still done manually where information about the Smart Medica clinic is difficult to obtain, such as information about the doctor and also the doctor's schedule on duty while the Smart Medica clinic is one of the largest clinics in Sekayu Regency and also already famous and has many patients. With this situation, web-based information systems are built so that services to the community can be comprehensive and the Smart Medica Clinic can provide information that is needed by patients up to date and also patient satisfaction is fulfilled. This information system was built using the WaterFall method, using the PHP programming language and the My Sql database.
Published: 7 September 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 323-331; doi:10.32736/sisfokom.v9i3.789
Student Activity Unit (UKM) is a place where students gather who have the same interests and interests in a college. STMIK PalComTech is a private tertiary institution in the city of Palembang which has 5 UKM. When registering prospective SME members, they visited the UKM booths that were opened by the UKM management, besides that there were several other obstacles such as UKM STMIK PalComTech activities recorded manually only from the side PalComTech STMIK Student Affairs, which contains the name of the PIC, date of activity, number, name of UKM, place, start, finish, number of attendance, meetings to, information, there is also data material that is not neatly organized, and monthly report collection. In order to support the recording of activities in terms of attendance, members and material taught up to UKM member registration, the researchers created a web-based SME information system using the Rational Unified Process method and in this study using black box testing. RUP is a method that uses the concept of object oriented, and has activities that focus on the development of the model by using the Unified Modeling Language (UML). The results of this study are an information system that can be used, UKM members, and STMIK PalComTech student affairs that make it easy to collect attendance information, member data, activity data, material and announcements.
Published: 30 August 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 317-322; doi:10.32736/sisfokom.v9i3.935
Al-Qur'an has a lot of content, so the system of searching for verses of the Al-Qur’an is needed because if it is done manually it will be difficult. One of the search systems for the verses of the Al-Qur'an in accordance with Indonesia’s pronunciation is Lafzi. The Lafzi system can search for verse fragments using keywords in Latin characters. Lafzi has been developed into Lafzi +, wherein the Lafzi + system can be used to search verses of the Al-Qur’an with different sounds on stop signs. However, the Lafzi+ can only overcome the difference in the sound of the stop sign and cannot be applied throughout Al-Qur’an. Based on these problems, the system needs to be developed to overcome the differences in sound in the middle of the verse and can be applied throughout the Al-Qur’an. The method used in the process of searching for the verse is the N-gram method. The N-gram used in this research is trigram. The process flow of this system is first normalized in the phonetic coding process after normalized then tokenization of trigrams and then trigrams are matched between the query and the corpus and entered into the ranking process to get an output candidate. In the making process, the LIS (Longest Increasing Subsequence) method is used to get an orderly and strict trigram sequence. The highest order score will be the top output. The results of this study obtained a recall value of 100% and MAP of 87%.
Published: 25 August 2020
Jurnal Sisfokom (Sistem Informasi dan Komputer), Volume 9, pp 296-301; doi:10.32736/sisfokom.v9i3.779
The development of company's business area will have implications for the development of computer network infrastructure as a means of exchanging data and information between regions. As a company that continues to develop its business area, PT. Timur Raya Lestari requires a computer network infrastructure that is adaptive to the development of the number of branch offices. The company's computer network currently uses the Static Routing method in determining the interconnection path between Routers connecting the head office and branch offices. The development of a dynamic company must be accompanied by the development of a dynamic network infrastructure as well. Development of a network infrastructure that continues to develop requires Dynamic Routing Protocol. In this study, it was simulated the use of EIGRP as Dynamic Routing Protocol for PT. Timur Raya Lestari. From the simulation results using Cisco Packet Tracer software, it can be seen that there is a stable interconnection, both for existing networks plan and planning for adding networks on new branch offices.