https://jurnal.umb.ac.id/index.php/JSAI/issue/feed JSAI (Journal Scientific and Applied Informatics) 2025-06-01T21:58:47+08:00 Erwin Dwika Putra, M.Kom erwindwikap@gmail.com Open Journal Systems <p class="p1">The JSAI journal (Journal Scientific and Applied Informatics) is intended as a medium for scientific studies of research results, thoughts and critical-analytic studies regarding research in the fields of Mobile, Animation, Computer Vision, Networking, Robotic along with research related to the implementation of methods and or algorithms. As part of the spirit of disseminating knowledge resulting from extensive research and as a reference source for academics in the field of Information and Technology. <br />The JSAI (Journal Scientific and Applied Informatics) journal accepts scientific articles with research scopes on:<br />1. Mobile Application<br />2. Animation<br />3. Computer Vision<br />4. Networking<br />5. Robotics<br />6. Information System</p> <p class="p1">Based on the issuance of the results of Periodic Accreditation of Scientific Journals Certificate Number: 230/E/KPT/2022; Title of Certificate: Scientific Journal Accreditation Rating for period IV of 2022; Date of Certificate: 30 Dec 2022, it is determined that the results of the JSAI Journal accreditation are Sinta Accredited 4</p> https://jurnal.umb.ac.id/index.php/JSAI/article/view/7811 Analysis of AI-Based Software Development (Gemini) Using ACM Code of Ethics Implementation 2025-02-05T09:41:04+08:00 Rexcy Elsan rexcykeju@gmail.com Andi Lala andilala@umb.ac.id RG. Guntur Alam datuak73@gmail.com <p><em>This research aims to analyze the application of the ACM Code of Ethics in the development of AI Gemini software by Google DeepMind. With the development of artificial intelligence (AI) technology, developers need to pay attention to ethical aspects in every stage of system development. This research uses a qualitative approach with a data triangulation method, which includes document analysis, interviews with AI experts, and a literature study. The results show that although Gemini AI has complied with some key ethical principles in the ACM Code of Ethics, such as data security and privacy (90%) and human well-being (85%), there are still challenges related to transparency (60%) and bias mitigation (70%). Lack of transparency in algorithms and training data as well as potential bias in results generated by AI are the main issues that need to be improved. Based on the results, overall the Gemini AI has shown fairly good ethical compliance with an average of 76.67% but still requires improvement in the aspects of transparency, bias mitigation, and usage regulation.</em></p> 2025-06-01T00:00:00+08:00 Copyright (c) 2025 Rexcy Elsan, Andi Lala, RG. Guntur Alam https://jurnal.umb.ac.id/index.php/JSAI/article/view/8165 Optimizing Network Management with Bandwidth Limitation and Blocking Certain Access at PT Laxo Global Access by Applying the NDLC Method 2025-05-01T17:57:49+08:00 Adiffanani Ramdansyah adiffanani3@gmail.com Hamzah Setiawan hamzah@umsida.ac.id Uce Indahyanti uceindahyanti@umsida.ac.id Ade Eviyanti adeeviyanti@umsida.ac.id <p>This research focuses on optimizing network management at PT Laxo Global Akses by implementing bandwidth restrictions and restricting access to non-work related websites and applications. Internet usage in the company was previously unrestricted, resulting in decreased productivity and unstable network performance, especially during peak hours. To address these issues, this research applies the Network Development Life Cycle (NDLC) methodology and utilizes MikroTik devices for configuration. Key features such as Queue Tree for bandwidth distribution, Firewall Filtering for access control, and Hotspot User Management for user authentication were implemented. The redesigned network topology allows for more structured traffic management and real-time monitoring. The test results show that all test scenarios have succeeded as expected, so it can be concluded that the network configuration and policies implemented in the NDLC process were 100% successful at the implementation and testing stages.</p> 2025-06-01T00:00:00+08:00 Copyright (c) 2025 Adiffanani Ramdansyah, Hamzah Setiawan, Uce Indahyanti, Ade Eviyanti https://jurnal.umb.ac.id/index.php/JSAI/article/view/8018 Analysis of Maturity Alignment of Business Strategy with Information Technology at SAMSAT Bengkulu City Using Strategic Alignment Maturity Model (SAMM) 2025-05-02T09:54:50+08:00 Kurnia Anggriani kurnia.anggriani@unib.ac.id Ferzha Putra Utama fputama@unib.ac.id Stern Imanuel Kristian radiant1722@gmail.com Arie Vatresia arie.vatresia@unib.ac.id Putra Bismantolo putrabismantolo@unib.ac.id <p>Motor vehicle tax payments represent a substantial portion of regional income. However, recurrent delays in motorbike tax payments, notably in the Kandang Limun sub-district of Bengkulu City, pose a significant threat to regional development. This research aims to address these delays by predicting and implementing effective strategies. Using the RapidMiner application and the Artificial Neural Network (<em>ANN</em>) method, a delay rate of 36.14% was predicted. The study incorporates interviews to propose several strategies, including enhancing websites, improving offline and online services, implementing Drivethru services, and using SMS Blast notifications to combat delays. To evaluate the feasibility of these strategies, the research employs the Strategy Alignment Maturity Model (SAMM). The assessment at BPKD reveals a maturity level of 4, signifying an ability to improve and manage processes effectively.The maturity assessment suggests that the proposed strategies for overcoming delays are well-aligned with BPKD's capabilities. They have demonstrated a robust alignment between IT and business strategies, leveraging IT to enhance performance, and conducting thorough business and IT evaluations.In addition to the maturity assessment, the research offers suggestions and evaluation strategies. These encompass the adoption of biometrics for authentication, implementation of chatbots, Samsat self-service kiosks, real-time vehicle monitoring, and the introduction of automatic tax programs.</p> 2025-06-01T00:00:00+08:00 Copyright (c) 2025 Kurnia Anggriani, Ferzha Putra Utama, Stern Imanuel Kristian, Arie Vatresia, Putra Bismantolo https://jurnal.umb.ac.id/index.php/JSAI/article/view/8212 Implementation of NLP Election News Classification Using LSTM Algorithm 2025-05-16T08:56:36+08:00 Harry Vadilan Sianturi harry.vadilansianturi@student.upj.ac.id Cahyono Budy Santoso cbsantoso2012@gmail.com <p><em>This study examined the application of a Long Short-Term Memory (LSTM)-based text classification method to categorize election news according to presidential and vice-presidential candidate entities. The core problem addressed was the lack of an automated classification system capable of identifying political affiliations directly within the vast volume of digital news content. In this research, news data were collected from open-access sources and automatically labeled based on the occurrence of candidate-related keywords. A supervised learning approach was implemented using the LSTM architecture to capture sequential patterns within the news text. The evaluation results demonstrated that the model achieved a validation accuracy of 95.44% and a macro-averaged F1-score of 0.95, indicating strong classification performance across all candidate categories. Furthermore, predictions on test data revealed the model’s consistency and stability in recognizing political entities. This study confirmed the effectiveness of the LSTM-based approach for entity-based election news classification and highlighted its potential for integration into automated media analytics and political discourse monitoring systems.</em></p> 2025-06-03T00:00:00+08:00 Copyright (c) 2025 Harry Vadilan Sianturi, Cahyono Budy Santoso https://jurnal.umb.ac.id/index.php/JSAI/article/view/8187 Implementation of Agile Scrum Method and Return On Investment (ROI) Analysis on Library Information System 2025-05-16T09:09:10+08:00 Muhammad Hafiz Ar Rahman mhafiz67238@gmail.com Muhammad Husni Rifqo mhrifqo@umb.ac.id <p><em>The library is one of the important institutions that provide and manage information to support learning, teaching, and research activities. In its development, the need for an integrated and efficient library information system is increasing, along with the demands of digitizing services and managing data quickly and accurately. This research aims to implement the Agile Scrum method in the development of Library Information Systems and conduct a return-on-investment (ROI) analysis to measure the effectiveness of the investment from a business and economic perspective. Based on the research problem raised and the results of the research that has been conducted, it shows that the Scrum method is proven to be effective in increasing flexibility and responsiveness to user needs. Key features are completed on time, and user feedback can be responded to in the next sprint. Active collaboration minimizes the risk of errors and maintains system quality. The first-year ROI is positive although small (4.65%), but the system is sustainable, so the ROI will increase significantly in years 2 and 3 because costs remain low while benefits continue to grow.</em></p> 2025-06-03T00:00:00+08:00 Copyright (c) 2025 Muhammad Hafiz Ar Rahman, Muhammad Husni Rifqo https://jurnal.umb.ac.id/index.php/JSAI/article/view/8269 Analysis of Archer.exe Malware to Identify Potential Threats on Operating Systems Using the Hybrid Analysis Method 2025-05-26T09:12:20+08:00 Juan Haniful Kahfi juan.hanifulkahfi@student.upj.ac.id Johannes Hamonangan Siregar johannes.siregar@upj.ac.id <p>Cybersecurity has become a primary concern in the digital era, particularly regarding malware attacks targeting the Windows operating system. This study aims to analyze a Remote Access Trojan (RAT)-type malware named archer.exe, obtained from the Any.run platform. The method used is hybrid analysis, a combination of static analysis and dynamic analysis, to provide a comprehensive understanding of the malware's structure and behavior. Static analysis results show that archer.exe is a Portable Executable (PE) file with a size of 829.35 KB and employs packing techniques to conceal its payload. Meanwhile, dynamic analysis reveals that the malware modifies system registry keys, spawns child processes such as rundll32.exe and cmd.exe, and establishes a network connection to a Command and Control (C2) server at IP address 192.169.69.26 via the domain dominoduck2101.duckdns.org. These findings indicate that archer.exe poses a high risk of remote system access, data theft, and malicious background activity without user awareness. This study demonstrates that the hybrid analysis method is effective in identifying hidden threats and malicious behavior of RAT-type malware on Windows 10 systems.</p> 2025-06-03T00:00:00+08:00 Copyright (c) 2025 Juan Haniful Kahfi, Johannes Hamonangan Siregar https://jurnal.umb.ac.id/index.php/JSAI/article/view/8214 Analysis of Canva and Gamma User Satisfaction Among Students Using the System Usability Scale (SUS) Method 2025-05-16T09:08:40+08:00 Helen Anggraini angrainihelen722@gmail.com RG. Guntur Alam datuak73@gmail.com Agung Kharisma Hidayah agungkharismahidayah@umb.ac.id <p>Canva and Gamma are web-based graphic design platforms widely used by students to create brochure, presentations, and social media content in a simple and efficient way. The purpose of this study is to evaluate user satisfaction. with both applications using the <em>System Usability Scale</em> (SUS) method. The study involved 100 students from Universitas Muhammadiyah Bengkulu who had used both platforms. The results indicate that Canva achieved a SUS score of 80.2, categorized as <em>Excellent</em>, while Gamma received an average score of 72.4, categorized as <em>OK</em>. These findings suggest that although both applications demonstrate good usability, Canva is perceived to be superior in terms of ease of use, feature integration, and learning curve. The outcomes of this study can serve as a reference for’s developers with educational institutions on selecting or developing design tools that are more responsive to user needs.</p> 2025-06-03T00:00:00+08:00 Copyright (c) 2025 Helen Anggraini, RG. Guntur Alam, Agung Kharisma Hidayah