cover
Contact Name
Darwis Robinson Manalu
Contact Email
manaludarwis@gmail.com
Phone
+628126496001
Journal Mail Official
manaludarwis@gmail.com
Editorial Address
Jalan Hang Tuah No 8 Medan, Sumatera Utara Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi
ISSN : 24427861     EISSN : 26143143     DOI : https://doi.org/10.46880/mtk
Core Subject : Science,
JURNAL METHODIKA diterbitkan oleh Program Studi Teknik Informatika dan Program Studi Sistem Informasi Fakultas Ilmu Komputer Universitas Methodist Indonesia Medan sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan Akademisi, Peneliti dan Praktisi bidang Teknik Informatika dan Sistem Informasi. Jurnal ini mempublikasikan artikel yang berhubungan dengan bidang ilmu komputer, teknik informatika dan sistem informasi.
Articles 121 Documents
OPTIMASI TURN ARROUND TIME PADA PENJADWALAN ROUND ROBIN DENGAN MENCARI QUANTUM TIME OPTIMAL MENGGUNAKAN ALGORITMA SIMULATED ANNEALING Asaziduhu Gea
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.8

Abstract

A number of processes that are queuing need has managed by the operating system so that all processes can be served without any process that is in decline or too long. The duration of the response time results in a number of subsequent process failed because it ran Burst Time which has been allocated to each process. One of the responsibilities of the operating system is managing the process by making scheduling and expected arround Turn Time is in getting smaller each time to execute a number of processes. Therefore, it is necessary to do the optimization of Turn arround Time. Round Robin algorithm uses fair scheduling method by evenly dividing the execution time (quantum time) for each process but continue to serve all these processes sequentially. Allocation quantum appropriate time greatly affect the average waiting time for the entire process of the Round Robin. Because it is necessary to do an effort to get a proper quantum time can give a little time to execute a number of processes by implementing Simulated Annealing algorithms. Simulated Annealing is a heuristic algorithm that is oriented to find a settlement solution of a problem with the minimal use of energy (time), but the results are quite large (number of processes that a lot). Tests carried out on the process by varying amounts. Every process has a different burst time and tested with the alpha value varies. Tests in each group showed that there was a decrease in the average waiting time is quite significant in the early iteration until the final iteration thus obtained Turn arround Time fewer, but the number of processes are executed more.
IMPLEMENTASI ACTIVE DIRECTORY PADA JARINGAN KOMPUTER PKMI 1 MEDAN Fati Gratianus Nafiri Larosa
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.9

Abstract

Computer Network can optimize using Client/Server model (Domain based). There are a lot of benefits if using that model especially for centralized management and security system. There is (a) Organizational Unit Management, (b) Group Management, (c) Domain User Management, (d) Home Folder Management, (e) Group Policy Management and so on. Users can do anything on their computer even though convenience decreases to make system more secure. Users do their work individually with high attention. The good circumstance achieved because Server using Microsoft Windows Server 2003, one of Operating System support Client/Server model. The feature inside is Active Directory. Client using Microsoft Windows XP and must join to domain. And the users can logon through Client as a domain user, not as local user anymore. Client/Server model should managed by Network Administrator more efficient and effective.
PERANCANGAN PERANGKAT LUNAK SISTEM ABSENSI DENGAN BARCODE CARD PADA FAKULTAS ILMU KOMPUTER UNIVERSITAS METHODIST INDONESIA Darwis Robinson Manalu; Harlen Gilbert Simanullang
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.10

Abstract

Faculty of Computer Science is one of the faculties at the University Methodist Indonesia. At this school there is a sistemabsensi faculty and students who are still running it manually, which dalampenerapan attendance system, there are some things that become obstacles, which include the effectiveness and efficiency of time and prosespengabsenan. With the above reasons, the authors try to memberikanalternatif solving problems by creating a software absensiyang system will record data and a list of faculty and student attendance, number and recapitulation presence of faculty and students, which will be made in a systematic and computerized WITH barcode, which will eliminate the process attendance of lecturers and students who have been running it manually in the Faculty of Computer Science. Barcode will method of reducing levels of fraud at the time of charging absent students, and to improve discipline in attendance. At this writing will also be explained stages of processing, mulaidari process of analysis, planning, design by using VB.Net and MySQL for its database, to manufacture DFD (Data Flow Diagram) as an indication of the current procedure that akanditerapkan data on the system, and the analysis of inputs and output, to know anything what the data will be input and output.
KAJIAN CRC32 UNTUK MENDETEKSI PERUBAHAN ISI FILE DOCUMENT Indra M. Sarkis
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.11

Abstract

Cyclic redundancy check 32 Bit or known by CRC32 is a technique used in data communication to check thedamage information sent or received between the sender and receiver are working at the data link layer on layer of the Open Systems Interconnection (OSI) by comparing the checksum value frames are sent to the framereceived during transmission takes place. CRC32 techniques applied attempted to detect changes in a file that may occur due to human vandal through virus attack. In this study CRC 32 is applied with the same technique, namely by comparing the checksum of a file obtained from the registry system with the hash function of the value of the checksum file to be compared. From the comparison of the checksums will be known whether a file is changed or not, by trying to apply it to prove results on microsoft office document file and pdf
PEMANFAATAN TEKNOLOGI INFORMASI DALAM MENINGKATKAN KINERJA KEUANGAN PERUSAHAAN Mahdianto Pandia
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.12

Abstract

This paper aims to determine how the use of information technology in improving the company's financial performance. Writing papers using literature review (library research). In relation to the financial performance of companies, information technology (IT) provides easiness in processing, managing and presenting financial information, with the support of an information system, so as to achieve a competitive advantage for the company and expected aorganisasi or aligned with business strategy. Accounting Information Systems (AIS), which is an information system can be said to be the oldest or an application is also the first major computer system to process accounting data
SISTEM PENGAMBILAN KEPUTUSAN KREDIT RUMAH DENGAN METODE FUZZY SIMPLE ADDITIVE WEIGHTING Marganda Simarmata
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.13

Abstract

Housing Loan Approval (HLA) by the customer at a bank is often hampered and longer because the approval process is done by hand because it must be done carefully in accordance with specified criteria. The weakness of this manual be reasons for Decision Making System for approving HLA approvals at one bank as a guarantor loan repayment funds. In this research, a system built using Fuzzy Simple Additive Weighting Multiple Attribute Decission Making. The design of this application program created using Visual Studio 6.0 programming language and database design by using Microsoft Accses 2007 and Seagate Crystal Reports 8.5 for report generation or the required output. Results obtained from the system designed can help the head of the bank or management decision makers to decide prospective HLA customers quickly, easily and accurately
PENDAYAGUNAAN ILMU TEKNOLOGI KOMPUTER DITINJAU DARI SUDUT IMAN KRISTEN Benget Rumahorbo
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.14

Abstract

The advancement of of computer science has changed the world from wide to tight;long to short;uneasy to easy. Computer technology has made the world unlimited. By finding the formulations of computer new capacity like it has been able to replace the position of human's brain in any knowledge and activities. In other words, the progress of computer science which has been reached till now has been truely avowed by world. Computer gives facilities and pleasure in life. In the reality computer has given the contribution to human's culture and prosperity. However human can't resist the reality that computer science has also given damage and misery to people. The reality from the life now is computer technology is able to reveal the secret of nature and life, but it is not the same as the truth. In other words computer is just able to give the reality. Meanwhile the truth is not humane. The humane truth is not only that but it must be objective which cover the justice. Computer technology doesn't know the solution of human's moral, so human mostly use the computer technology for amoral things and influences human's attitude in the real life. Based on the reality, recently computer has been used for criminal behavior, so it must be behaved from the truth of Allah saying. So people do not abuse computer to negative things but for the positive things.
IMPLEMENTASI ALGORITMA ADAPTIVE WATERMARKING PADA PELABELAN IDENTITAS FILE CITRA DIGITAL Darwis Robinson Manalu
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 1 No. 1 (2015): Maret 2015
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v1i1.17

Abstract

Watermarking is now well known and popular as one of the solutions to protect files and digital media by entering information such as digital signs into the core of the multimedia objects with an invisible state and reliably in conditions that exploit the contents of the digital media. The information included in the image can be text, logos or audio. Labelling is done with adaptive watermarking techniques to calculate phases of the pixel values of the logo file (watermark), calculate the DCT coefficients (Discrete Cosine Transform) digital images, digital image modifying DCT coefficients according to bit files logo, reconstruct a digital image by performing inverse DCT, extracting files logo of the image that has been watermarked. The extracted watermark data is then compared with the original watermark data by calculating the Bit Error Rate (BER), which is the ratio between the number of bits that one of the bits as a whole. From the results of the testing that has been done on the application that is designed may inserting a message in the form of the image into a digital image file, inserting a message in the form of text into image files, the extraction process penyisip of file watermarking and can do the comparison value BER (Bit Error Rate).
ENKRIPSI CITRA WARNA MENGGUNAKAN RUBIK’S CUBE DAN THREE CHAOTIC LOGISTIC MAP Ronsen Purba; Frans Agus Purba; Sari Fatmawati
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v2i1.18

Abstract

An image encryption is a technique to protect the image secrecy from illegal accessing. One of the encryption algorithm that are used is Rubik's Cube where this algorithm used to permute the pixel in the color image. However, the key used in the Rubik's Cube is not random so the security of image is still weak. To further improve the security of the image, then used the chaotic systems for generating random keys. Excess of chaos is the sensitivity to initial conditions, behave randomly and do not have a recurring period. One of the chaos function used is Three Chaotic Logistic Maps where necessary keys generated are used in encryption and decryption proceses. The test results show that the algorithm Rubik's Cube and Three Chaotic Logistic Maps on the encryption and decryption processes do not cause an error in the original image and the result image. Neighboring pixels have a low coefficient indicating that the quality of the results encryption is good and resistant toward to attack by adding noise. The nature of chaotic sensitivity cause cipher image will not be recovered if the keys used in decryption are slightly diffrent from the encryption keys. that the decrypted image does not revert to plain image so the image obtained more secure.
PEMANFAATAN VIRTUAL BOX DALAM PRAKTIKUM ADMINISTRASI SERVER MENGGUNAKAN TEKNIK DHCP PADA MIKROTIK ROUTER OS Fati Gratianus Nafiri Larosa
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v2i1.19

Abstract

Today, Server Administration is very important to optimize some services given by Server to all users. DHCP (Dynamic Host Control Protocol) is one of the services provided by Server. In this paper, DHCP is configured on Mikrotik RouterOS 5.25 as a Router to keep Clients connected in Network. Beside, DNS was configured both in Microsoft Linux Fedora 12 and Windows Server 2008. The client machines using Microsoft Windows XP that were installed on Virtual Environment provided by Oracle VM Virtual Box, connected (got IP Addresses) automatically.

Page 1 of 13 | Total Record : 121