JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI <p>Jurnal Komputer dan Informatika merupakan media informasi dan sarana untuk mempublikasikan artikel ilmiah yang berasal dari hasil penelitian, kajian atau makalah ilmiah dari para peneliti maupun dosen pada bidang Informatika. Artikel ilmiah yang dikirim pada redaksi harus merupakan naskah asli dan tidak pernah di publikasi di tempat lain. Artikel ilmiah dalam setiap penerbitan merupakan tanggung jawab penulis. Jurnal akan diterbitkan secara berkala dua kali dalam satu tahun, yaitu bulan Mei dan Nopember. Hasil Plagiarisme dan smilarity Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : Sistem Informasi Manajemen dan Audit Sistem Informasi Aplikasi Dekstop Web dan Mobile Sistem Pendukung Keputusan Sistem Pakar Pembelajaran berbasis Komputer Kriptografy Bidang Ilmu Koputer yang lainnya.</p> en-US tonni.budidarma@gmail.com (Tonni Limbong) alexrikisinaga@gmail.com (Alex Rikki) Thu, 02 Jun 2022 00:00:00 +0700 OJS 3.3.0.4 http://blogs.law.harvard.edu/tech/rss 60 Simulasi Antrian Kantor Pos Binjai Menggunakan Distribusi Pelayanan Weibull https://ioinformatic.org/index.php/JUKI/article/view/99 <p><em>Queues occur when an arrival cannot be matched by existing services, resulting in delays in service facilities. The waiting situation is also part of the circumstances that occur in a series of random or irregular operational activities in service facilities. The queuing system sometimes has problems, problems arise because of the large number of queues served. Queue simulation is a model that imitates a real system without having to experience the real situation and can determine the effectiveness of a system based on existing simulations. In this study, the inter-arrival time using exponential distribution and service distribution using Weibull, resulted in the average waiting time in the queue (Wq), the average waiting time for the system (Ws), the average number of customers in the queue (Lq), the average number of customers in the system(Ls), probability Server is busy(ρ)</em></p> Wisnu Satriyo Jati, Akim M.H Pardede, Novriyenni Novriyenni Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/99 Thu, 02 Jun 2022 00:00:00 +0700 Sistem Pendukung Keputusan Pemilihan Paket Indihome Terbaik Bagi Calon Pelanggan Menggunakan Metode Topsis (Studi Kasus PT. Telkom Indonesia Kandatel Binjai) https://ioinformatic.org/index.php/JUKI/article/view/100 <p><em>PT. Telkom Indonesia Kandatel Binjai provides various services (multi service) for its customers, namely voice (telephone), data (internet) and picture (IP-TV) services called indihome. Indihome products provide convenience in accessing the internet with different speeds, costs, quotas and needs. Prospective customers of PT. Telkom Indonesia Kandatel Binjai has problems in choosing the indihome service package package that its prospective customers want. Currently, prospective customers are faced with various choices of internet packages from indihome. With these various package options, prospective customers are required to be effective in choosing an internet package that suits their needs and purchasing power. To overcome this problem, a decision support system will be made using the TOPSIS (Technique For Others Reference by Similarity to Ideal Solution) method which is expected to assist users in determining the choice of indihome packages that suit their needs. The criteria used are speed, number of devices, Fair Usage Policy (FUP), price, and type of service. Based on the test results using the TOPSIS method with 15 alternative data, the results obtained are the alternative A4 Regular Package Indihome 2P Internet 50 mbps + Telephone is an alternative that has the highest value compared to other alternatives</em></p> Riski Giofani, Marto Sihombing, Indah Ambarita Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/100 Thu, 02 Jun 2022 00:00:00 +0700 Prediksi Jumlah Customer Di Bengkel H. Tomo Service Menggunakan Metode Backpropagation https://ioinformatic.org/index.php/JUKI/article/view/101 <p><em>A workshop is a building that provides space and equipment for carrying out construction or manufacturing, and repairing objects. The accumulation of customers at Bengkel H. Tomo Service is caused by the lack of workers in the repair process. This is based on not every day customers who come in excessive numbers, but at one time the situation is not crowded enough. Due to this condition, the number of repair workers is reduced so that the workshop owner can adjust between the customer and the worker. From these conditions, the H. Tomo Service Workshop needs to create a system that can predict the number of customers who will come in the following days or months. The prediction results can be used to anticipate the needs of repair workers in the workshop. The process of predicting the number of customers who make vehicle repairs at the workshop can be done with a computerized system, one of the processes that can be done is the application of an Artificial Neural Network (ANN) using the Backpropagation method. The system is designed with the MATLAB R2014a programming application, after carrying out the data training process and data testing on 2016 to 2020 data, the learning rate is 0.2; the maximun epoch is 10000 and the target error is 0.001, the result is that in 2021 the predicted number of customers is 13758 customers who make repairs at the H. Tomo Service workshop.</em></p> Yusuf Afani, Magdalena Simanjuntak, Rusmin Saragih Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/101 Thu, 02 Jun 2022 00:00:00 +0700 Uji Kir Kelayakan Kendaraan Bermotor Menggunakan Metode Certainty Factor https://ioinformatic.org/index.php/JUKI/article/view/102 <p><em>M</em><em>otor vehicle testing is a series of activities to test and inspect parts on motorized vehicles. Vehicle testing that still uses a manual system makes the testing service process take a long time and there are often delays in vehicle testing. Therefore, a system is needed to simplify and speed up the vehicle testing process. Based on this, this research is intended to create a motor vehicle testing information system that can assist officers in carrying out vehicle testing services. From the results of the research conducted, it greatly increases knowledge and insight, by collecting data relating to the motor vehicle feasibility test. The PHP programming language and MySQL database can be built into a system for testing the feasibility of motorized vehicles using the Certainty Factor method. Based on the data on the motor vehicle assessment criteria, it can be tested for the feasibility of motorized vehicles using the Certainty method. From the results of calculations using the Certainty Factor method and based on the weight of each criterion, it can be analyzed from the calculations that have been carried out with the results of the motor vehicle test passing with a confidence level of 97.10%, conditional passing with a confidence level of 95.84%, and not passing with a level of confidence. confidence 94.75%. Thus, the above vehicle is declared to have passed the kir test with a confidence level of 97.10%.</em></p> Angger Kurniawan, Budi Serasi Ginting, Imeldawaty Gultom Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/102 Thu, 02 Jun 2022 00:00:00 +0700 Penerapan Metode Vigenere Chiper untuk Mengamankan Data Text https://ioinformatic.org/index.php/JUKI/article/view/103 <p><em>The development of technology in security systems to ensure the confidentiality of data information has grown rapidly. In maintaining the confidentiality of data information, there are sciences in development such as steganography and cryptography. Data and information security is very important in the current reform era. Generally, every institution has important and confidential documents that can only be accessed by certain people. The issue of data security and confidentiality is one of the important aspects of an information delivery system. In this case, it is closely related to how important the information is sent and received by interested people. Information will no longer be useful if in the middle of the delivery process, the information is intercepted or hijacked by unauthorized people. Computer crime is the illegal act of using knowledge of computer technology to commit a crime. Theft of hardware and software (hardware and software), manipulation of data, illegal access to computer systems by telephone, and changing programs</em></p> Dicky Arfandy, Magdalena Simanjuntak, Tio Pasaribu Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/103 Thu, 02 Jun 2022 00:00:00 +0700 Penerapan Enkripsi Menggunakan Metode Elgamal guna Meningkatkan Keamanan Data https://ioinformatic.org/index.php/JUKI/article/view/104 <p><em>Data security is very important in maintaining the confidentiality of information, especially those containing sensitive information whose contents should only be known by the entitled people.</em> <em>especially if the transmission is done through a public network, if the data is not secured beforehand, it will be very easy to be intercepted and the contents of the information known by irresponsible people.</em> <em>One of the methods used to secure data is to use a cryptographic system, namely by providing the information content (plaintext) into content that is not understood through the encryption process, and to retrieve the original information, a description process is carried out, accompanied by using the correct key.</em> <em>Therefore, the author recommends the Elgamal algorithm to be able to provide security for text data. The reason the author uses the ElGamal algorithm is that the ElGamal algorithm is part of asymmetric cryptography where the formation of one of the keys uses prime numbers and focuses on the strength of the key in solving discrete logarithm problems.</em></p> Fahri Husaini, Akim M.H Pardede, Imeldawaty Gultom Copyright (c) 2022 JUKI : Jurnal Komputer dan Informatika https://ioinformatic.org/index.php/JUKI/article/view/104 Thu, 02 Jun 2022 00:00:00 +0700