cover
Contact Name
Darwis Robinson Manalu
Contact Email
manaludarwis@gmail.com
Phone
+628126496001
Journal Mail Official
manaludarwis@gmail.com
Editorial Address
Jalan Hang Tuah No 8 Medan, Sumatera Utara Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi
ISSN : 24427861     EISSN : 26143143     DOI : https://doi.org/10.46880/mtk
Core Subject : Science,
JURNAL METHODIKA diterbitkan oleh Program Studi Teknik Informatika dan Program Studi Sistem Informasi Fakultas Ilmu Komputer Universitas Methodist Indonesia Medan sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan Akademisi, Peneliti dan Praktisi bidang Teknik Informatika dan Sistem Informasi. Jurnal ini mempublikasikan artikel yang berhubungan dengan bidang ilmu komputer, teknik informatika dan sistem informasi.
Articles 5 Documents
Search results for , issue "Vol. 5 No. 2 (2019): September 2019" : 5 Documents clear
PERANCANGAN SISTEM INFORMASI PENGELOLAAN BARANG DI GUDANG RPX DOMESTIC STUDI KASUS : PT. ANTAREJA PRIMA ANTARAN Zahrah Nurlaila; Febri Diandari; Supono
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.419

Abstract

At this time PT. Antareja Prima Antaran or RPX often experience problems in warehousing such as calculating the time span of stored goods. It takes control of the activity of moving goods and documents to increase the efficiency of warehouse use so that the number and time span of goods are stored at a minimum value or according to the plan. In addition, based on the above problems, a warehouse checking system is made, the Early Warning feature to overcome overload in the warehouse, which is expected by customers not to need to be afraid and worried about the goods in the warehouse that will be sent through the RPX freight forwarder because there will be a checking facility for the goods arriving at the warehouse and the goods to be sent starting from the time the goods are entered and then processed to the place. Business Process Modeling Notation (BPMN) is a technique that enables all parties involved in the process to communicate clearly, correctly, and efficiently. In this way, BPMN defines the semantic notation of the Business Process Diagram (DPB). DPB is a chart based on the 'Flowchart' technique
IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE Hasibuan, Doli; Naibaho, Jimmy Febrinus; Simanjuntak, Christian P
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.420

Abstract

Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.
PENGAMANAN DATA DALAM JARINGAN LAN DENGAN MENGGUNAKAN ALGORITMA CHIPER TRANSPOSISI Simanullang, Sanco
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.421

Abstract

Data security is important in the implementation of information technology, especially in the field of computers, which allows thousands of people and computers around the world to be connected in a virtual world known as cyberspace or the internet. This can create new challenges and demands for the availability of a data security system that is as sophisticated as the advances in computer technology itself. In cryptography, data sent over the network will be disguised in such a way that even if the data can be read by third parties, it should not be understood by unauthorized parties. Data to be sent and has not been encrypted which produces ChipperTtext. The implementation of the transposition algorithm for securing data flowing in the Local Area Network (LAN), the transposition process changes the arrangement of letters from the source text (plaintext), with a column transposition cipher, to obtain the words in a barred manner. In the transposition cipher, the plaintext is the same, but the sequence is changed. . This algorithm transposes a series of characters in the text. Another name for this method is permutation because transpose each character in the text is the same as permutating the characters so that this application generates encrypted data on the network stream and returns it to plaintext at the final destination. So that it can be ensured that the information and data sent to other parties are safe from unauthorized parties.
ANALISIS QUALITY OF SERVICE (QoS) LIVE STREAMING WIRELESS IP CAMERA XONZ BERBASIS SMARTPHONE ANDROID Larosa, Fati Gratianus Nafiri; Laia, Ofelius
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.422

Abstract

Quality of Service (QoS) on Live Streaming has the main parameters, namely bandwidth, jitter, loss and delay, which are measured on the implementation of Wireless IP Camera based on Android Smartphone. The test tools used iperf and ping software, to capture data packets. The network design in this study uses Xonz Wireless IP Camera, wifi router, Server/Laptop and Android Smartphone to monitor or access the services provided. Surveillance/reconnaissance or surveillance by accessing live streaming can be done from anywhere as long as there is still an intranet network. wifi router provides DHCP service, Server/Laptop provides a Virtual Machine using MS Windows Server 2003 Operating System. Web Server is not installed on Real Machine but on Virtual Machine. The smartphone used has the Android Operating System version 4.4.2. IP Camera Xonz model XZ-12Z-HR/W has one major drawback that it can only be accessed via Internet Explorer Browser which can only run on MS Windows Operating System. Some applications that are already available on Google Play and installed on Android Smartphones cannot detect the Wireless IP Camera. The outcome or impact of this research is the creation of a simple Live Streaming application that can be accessed by all browsers on all platforms including Android Smartphones. Measurements were made using iperf and ping. The results showed that the Xonz IP Camera can still be used for mobile room monitoring as far as a maximum of about 20 m from the wifi router and still meets the standard QoS values ​​set by TIPHON and ITU-T G.114.
IMPLEMENTASI ALGORITMA GENETIKA DALAM PENJADWALAN KERJA DAN PENGAJUAN CUTI PEGAWAI DI PT.MEDAN SUGAR INDUSTRI Simbolon, Yolanda Tua Parulian; Gea, Asaziduhu
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.423

Abstract

The key to success in achieving the company's vision and mission is not only determined by the availability of technology and the availability of materials owned by the company. However, the potential of human resources is one of the capital that plays an important role in achieving company goals. However, the productivity of human resources can decrease due to various influencing factors. In addition to individual factors that come from the employees themselves, the excessive workload is a factor that can cause a decrease in employee productivity. Therefore, employees need to get good treatment in terms of the division of working hours, so that employees can work more optimally. The division of work shifts is one solution that can be carried out by the company. The problem with the existing leave application system at PT. Medan Sugar Industry is still done manually. Checking the remaining leave, submitting leave, and leaving approval are carried out in stages and still relies on the left card contained in each employee file data. With the Scheduling and Submission System for employee leave using the Genetic Algorithm Method at PT. Medan Sugar Industry, the employee scheduling process can be computerized and more effective.

Page 1 of 1 | Total Record : 5