Jurnal Sistem Komputer Dan Informatika (json)

Journal Information
EISSN: 2685998X
Published by: STMIK Budi Darma
Total articles ≅ 162

Latest articles in this journal

Fajar Alif Chalifatullah, , Ilmiatul Masfufiah
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 156-164; https://doi.org/10.30865/json.v4i1.4899

Abstract:
Regular maintenance is one step to keep your car looking good, but many people still underestimate the importance of regular maintenance. A tool called Wireless Odometer has been created which can notify vehicle owners through the application if the vehicle mileage has entered the recommended criteria for periodic servicing. Based on previous research, Wireless Odometer still has weaknesses. sensor readings on this tool still have an error of 13.2% so it is still less accurate if applied to measure mileage on vehicles. It is necessary to have a digital filter that must be added to the sensor readings so that the sensor is resistant to noise that occurs due to mechanical or electrical. In this research, we implement the Moving Average Filter and Kalman Filter methods for sensor readings on the Wireless Odometer. After several tests were carried out, it was found that the percentage of reading errors when filtered reached 0.80% using the Kalman filter method and 1.81% using the Moving Average Filter method. It can be concluded that the filter that is suitable for use on this Wireless Odometer is the kalman filter.
, AdityaS Widjajarto, Ahmad Almaarif
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 77-84; https://doi.org/10.30865/json.v4i1.4787

Abstract:
One of the most widely used container technologies to provide IT services is Docker. The vulnerability in container technology, namely Docker, requires special management. Management of this vulnerability can be done technically with a software vulnerability scanner and standard Cyber Resilience Review (CRR) guidelines. Experiments were carried out with Aquasec and Anchore scanners that performed vulnerability scanning on two Docker Images systems. The two vulnerable systems have different versions, namely version – 1 and version – 2. The software elements in version – 2 have a higher versioning level than version – 1. Experimental data in the form of vulnerability reports are analyzed based on Cyber Resilience Review (CRR) which focuses on four stages namely Define a Strategy, Develop a Plan, Implement the Capability, Assess and Improve the Capability. So that the results of Category Vulnerability are obtained, namely 30 Closed Vulnerability, 10 Open Vulnerability, and 13 Newly Vulnerability. Continuation of this research can use aspects of Patch Management with more varied software tools.
, Dedy Irfan, Asrul Huda
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 1-11; https://doi.org/10.30865/json.v4i1.4384

Abstract:
Information and communication technology have developed along with globalization so that interaction and information delivery will quickly. One of the problems in education that is a priority to immediately find a solution is the problem of the quality of education, especially the quality of learning. From various existing conditions and potentials, efforts that can be made regarding quality improvement in schools are to develop a student-oriented learning system (children center) and facilitate students' needs for learning needs that are challenging, active, creative, innovative, practical, and fun with developing and implementing Information and Communication Technology-based learning This research is a Research and Development research with the media development model used referring to the type of Four-D development consisting of 4 stages, namely Define (defining), Design (design), Develop (development) and Disseminate (dissemination) which is carried out in Vocational High School class XI Computer and Network Engineering. The test subjects in this study were students of class XI Computer and Network Engineering SMK. The results of the three validators' overall assessment of the validator test assessment of Android-Based Learning Media is 94.28%, so the level of validity can be interpreted as Very Valid for use. Overall, the practicality assessment of Android-Based Learning Media as a learning resource is 88.46%, so the practicality level can be interpreted as Very Practical to use. As well as the assessment of the effectiveness of the Android-Based Learning Media of 90.86%, so that the level of effectiveness can be interpreted as very good for use.
, AdityaS Widjajarto, Ahmad Almaarif
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 85-93; https://doi.org/10.30865/json.v4i1.4789

Abstract:
Vulnerabilities in Docker need to be managed considering that this vulnerability is one of the potentials for exploitation, this can happen because Docker is a container related to application and system security. This study analyzes the vulnerability management process in Docker Images and Docker Images Applications using the GSA CIO-IT Security-17-80 standard. This vulnerability search uses two scanning tools, namely Clair Scanner and JoomScan. Vulnerabilities in Docker Images and Docker Images application version - 1, were overcome by creating a new system, namely version - 2 which upgrades the Docker Images software and Docker Images application. The test scenario is run by scanning for vulnerabilities in two versions of the trial system, in the form of a vulnerability report. The data was analyzed using the GSA CIO-IT Security Standard-17-80 which was limited to the stages of Scanning Capabilities, Vulnerability Scanning Process, Vulnerability Scan Reports, Remediation Verification, and Re-Classification of Known Vulnerabilities. The result is the fastest scanning time is in version - 2, the results of the comparison of vulnerabilities obtained are 44.45% on Docker Images and 77.78% on Joomla. So that the contribution that can be given is to provide an overview of the use of the GSA CIO-IT Security-17-80 standard as a guide for managing the security of an IT asset based on the stages carried out. Continuation of research can be in the form of using the 6 stages of GSA with the support of adequate vulnerability data from the right scanner software.
, Naila Alfatari, Dhani Ratna Sari
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 64-71; https://doi.org/10.30865/json.v4i1.4740

Abstract:
The increased consumption of beauty products as a lifestyle has increased public opinion on the beauty products used. Generally, reviews are given through posts on social media. This study discusses the classification of sentiment analysis on the use of serum beauty products on Twitter using the Naïve Bayes Multinomial algorithm. Sentiment analysis of serum beauty products is carried out to provide information and preferences to the public regarding the quality of a product. The results of the information and preferences become a reference for consideration in choosing the appropriate serum beauty product. The data used in this study were 27,587 tweets using three keywords, namely "serum," "face serum", and "beauty serum". Tweet data is divided into training data and test data with the number of training data as much as 22,070 tweets and test data as much as 5,518 tweets. The data is categorized using the lexicon senticnet 7 dictionary based on polarity values. The results of the analysis of positive sentiment are 35%, negative sentiment is 63.8%, and neutral sentiment is 1.2%. The classification results using Naïve Bayes Multinomial obtain the highest accuracy value of 80%. The Confusion Matrix results get the highest precision value of 88%, the highest recall of 81%, and the highest f1-Score of 86%.
, Lukman Bachtiar
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 37-49; https://doi.org/10.30865/json.v4i1.4421

Abstract:
Employees at the Regional Secretariat office of East Kotawaringin Regency are divided into 2, namely Permanent Employees (Civil Employees) and Contract Employees (Contract Workers). Contract workers are employees who have non-permanent employment status, so it is necessary to evaluate the quality of their performance to determine the sustainability of the contract extension. There are 6 assessment criteria that are used as a reference for assessing the performance of contract workers, namely Individual Performance Targets, Service Orientation, Integrity, Commitment, Discipline, and Cooperation. The performance appraisal of contract workers at SETDA Kotim has been computerized, but there is still no method applied to the performance appraisal of contract workers, causing the performance appraisal of contract workers to be unstructured. From these problems, a decision support system is needed to be able to assist the process of assessing the performance of contract workers. The researcher conducted a comparative analysis between the SAW method and the WP method, which is expected to determine the right method to be applied in the performance appraisal of contract workers, and can assist the personnel department in processing the performance appraisal of contract workers. Based on the final calculation results, the SAW method and the WP method can be applied in assessing the performance of contract workers and produce the same ranking order, namely the alternative contract worker named A2 = Akmad Rosidi as the best alternative, followed by the other best alternatives A5, A1, A3, and A4. From the comparison results using the MSE (Mean Squared Error) method, the Weighted Product (WP) method produces a higher deviation value than the Simple Addative Weighting (SAW) method, with a comparison of the deviation values, namely the WP method = 228679.4811, while the SAW method = 227926, 7694. So, the Weighted Product (WP) method can be recommended in assessing the performance of contract workers at the Regional Secretariat of East Kotawaringin Regency.
, Deva Nita Mulya, Yashinta Putri D Astuti, Ignatius Bias Galih Prasadhya
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 50-55; https://doi.org/10.30865/json.v4i1.4783

Abstract:
Products and customers have a close relationship, therefore UMKM need to build good relationships with customers. The most common way that companies or UMKM do is to look at the reviews given, this is called customer feedback. The results of customer feedback to companies or UMKM can improve service and product quality. The problem that arises is how to process the many reviews given, especially reviews from marketplaces like Tokopedia. Therefore, a method is needed to see user reviews of the products being sold, whether positive or negative. The method that will be used is sentiment analysis. Sentiment analysis is the process of understanding and extracting and automatically processing text data and can produce sentiments that are displayed in a sentence. The steps taken were taking House of Smith customer review data at Tokopedia, manual labeling to get positive and negative data reviews, data preprocessing, TF-IDF weighting and classification using the Naïve Bayes algorithm. The results of sentiment testing using the Naïve Bayes algorithm with TF-IDF weighting quality accuracy of 83% with visualization of the distribution of words that appear the most are the words 'good', 'comfortable' and 'use' for positive reviews. The most frequent negative reviews were 'material' and 'thin' which indicated that some buyers felt that the product had a thin material.
, Selviana Yunita
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 12-24; https://doi.org/10.30865/json.v4i1.4593

Abstract:
Technology is currently developing quite widely, information technology is not only technology that functions to work and store data, but also information technology to send or disseminate data. in the selection of scholarships at SDN 4 Mentawa Baru Hulu Sampit in determining the PIP scholarships still using the manual method so that it can cause inefficiencies in the management of scholarship data, as well as errors in determining scholarship recipients. Data management is also done manually, this also causes the process of identifying scholarship decisions to be slow. From these problems, we need a scholarship decision support system that can use data management and also determine scholarship decisions. The author builds a scholarship acceptance decision support system by comparing the WP and SAW methods. it is hoped that this method can determine the right method to be applied in determining scholarships, and can assist school principals and school operators in processing scholarship assessments. Based on the final calculation results, the SAW method and the WP method can produce different scholarship ratings. Based on the WP = Nanang Sujana method as the best alternative and followed by other best alternatives A3, A4, A1, and A2, then the SAW method was obtained by Radhiyatul Maulida as the best alternative and followed by other alternatives A2, A3, A4, and A5. From the comparison results with the MSE (Mean Squared Error) method, the Weighted Product (WP) method produces a higher deviation value than the Simple Addative Weighting (SAW), with a comparison of the deviation value, namely the WP method = 4363,47509 while the SAW method is obtained = 4259 , 71350. Therefore, the Weighted Product (WP) method can be recommended in making scholarship selection decisions at SDN 4 Mentawa Baru Hulu Sampit.
Umbar Riyanto, Nurdiana Handayani, Mohammad Imam Shalahudin
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 123-131; https://doi.org/10.30865/json.v4i1.4875

Abstract:
The development of video surveillance has given rise to various types of surveillance cameras, one of which is the Internet Protocol Camera (IP Camera). The number of IP Camera brands in the market, makes people who want to buy IP Cameras have to find their own information about the specifications and capabilities of the IP Camera to be purchased. It takes time and effort to choose an IP Camera, because you have to learn one by one which IP Camera to buy. This study aims to build a decision support system for choosing an IP Camera with a website-based Exponential Comparison Method (MPE) to make it easier to determine the right IP Camera. MPE can sort the priority of decision alternatives on existing criteria and is able to distinguish the value of each alternative in contrast. Based on the case study, the best alternative is Xiaomi Mi 360 with a value of 386, followed by Yi Home Camera 3 getting a value of 369, Ezviz C6N getting a value of 350, Imilab EC4 getting a value of 343 and Cleverdog Egg Cam getting a value of 110. The results of the MPE calculation generated by the system shows the same value as the manual calculation, then the MPE calculation on the system is declared valid. In addition, the test results with black-box testing show that the system can run well.
, Sechan Alfarisi
Published: 30 September 2022
Jurnal Sistem Komputer dan Informatika (JSON), Volume 4, pp 176-183; https://doi.org/10.30865/json.v4i1.4862

Abstract:
The system is an attempt to assist in detection using sensors, an effort made for a room or house if people come or enter. A tool is designed that can be easy, affordable and can be used to prevent the danger of unknown people from entering the room or even into our homes. The author designed a "Smart Security" Room Security Detection System Using the Fuzzy Logic Method Using Internet of Things (IoT)-Based PIR Sensors. sending messages if someone enters the room or house so that the owner knows if someone is unknown. The author wants to design and make this tool that can be very helpful for use inside or at home in order to minimize the danger of people who cannot be recognized entering, room security detectors here with a distance of 1 cm to 2 meters the sensor can still be detected, if it exceeds 2 meter then the sensor will not read if anyone comes.
Back to Top Top