cover
Contact Name
Tonni Limbong
Contact Email
jurnal.means@gmail.com
Phone
+6281267058001
Journal Mail Official
tonni.budidarma@gmail.com
Editorial Address
http://ejournal.ust.ac.id/index.php/Jurnal_Means/about/editorialTeam
Location
Kota medan,
Sumatera utara
INDONESIA
MEANS (Media Informasi Analisa dan Sistem)
ISSN : 25486985     EISSN : 25993089     DOI : -
Core Subject : Science,
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles 14 Documents
Search results for , issue "Volume 2 Nomor 1" : 14 Documents clear
Sistem Informasi Reservasi Hotel Pada GM. Marsaringar Balige Berbasis Android S. Artaulina Sitorus; Emerson Porman Malau
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (584.431 KB) | DOI: 10.54367/means.v2i1.24

Abstract

GM Hotels. Marsaringar Balige is a company engaged in hospitality services. During this time the reservation system at GM Hotels. Marsaringar Balige is still manual, such as booking rooms, recording guest data, and data from each part not yet integrated such as restaurant data, ballroom, karaoke, and making reports still using Microsoft Excel office applications. One effort to improve the quality of hospitality services at GMs. Marsaringar Balige is by utilizing information technology, namely by designing an Android-based Hotel Reservation Information System. Is the right solution to overcome the problems of hotel managerial data processing needs that are dynamic and can be accessed through websites or mobile devices. Mobile devices integrated with the web are one of the right choices for processing hotel information systems. A user / guest can get information by making a request from an application that was previously installed on an android smartphone to the database. All data exchange processes are stored on the web server. And the HotelGM Reservation Information System. Android-based Marsaringar Balige is built using the PHP programming language, Eclipse is supporting software for Android mobile, and Phpmyadmin as a tool for managing Mysql database, and Text editor using Macromedia Dreamweaver8.
Perancangan Kios Buku Online Dengan Menerapkan Algoritma MD5 Dalam Pengamanan Record Login Amin Setiawan Lahagu; Harvei Desmon Hutahaean
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (444.808 KB) | DOI: 10.54367/means.v2i1.19

Abstract

Online book stall is one form of e-commerce in cyberspace, all the time the sale and purchase transactions of books can be done at any time, but along with the development of online transactions, data controls should also be improved. To avoid data from damage caused by irresponsible people, it is necessary to secure data by applying cryptography to the data. In modern times there are many methods or algorithms that can be used to protect and control data from various attacks, but each of these algorithms certainly has its own weaknesses and strengths. The need for long-distance transactions and the importance of data security caused developers to continue to develop cryptography. MD5 algorithm is a one-way hash function that is often used in cryptography, especially in web-based transactions. The MD5 algorithm encodes data in a constant form of 32 bits. All processes from sales and purchase transactions in online bookstores will be safe and durable when the bookstore database is designed in such a way. The book stall database records are encoded with the MD5 algorithm, especially for logging records as a gateway for hackers or hackers to infiltrate. All transactions in the online book kiosk system are detected by the database, the resilience of the database from all attacks is the control of the system from all kinds of damage.
Penerapan Metode Best First Search Pada Permainan Tic Tac Toe Harvei Desmon Hutahaean
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (368.893 KB) | DOI: 10.54367/means.v2i1.14

Abstract

Search is the process of finding solutions in a problem until a solution or goal is found, or a movement in the state-space to search for trajectories from initial-state to goal-state. In a TIC TAC Toe game the process of finding a space situation is not enough to automate problem-solving behavior, in each of these situations there are only a limited number of choices that a player can make. The problems that will be faced can be solved by searching from the choices available, supported by the usual way of resolving. Best First Search works by searching for a directed graph which each node represents a point in a problem space.
Aplikasi Pengacak Soal Ujian Untuk Type Soal Berbasis Microsoft Word Menggunakan Metode Linear Congruent Method (LCM) Tonni Limbong; Insan Taufik
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (991.349 KB) | DOI: 10.54367/means.v2i1.25

Abstract

Exam questions made by lecturers in general in an educational institution around 99% are made from Microsoft Word applications. This happens because of the ability or skill of the question maker and the facilities of the institution. The exam questions that have been made seem like a consumable model, even though the material from these questions still has a relationship with the subject. With this condition the existing questions are not necessary and do not have to be destroyed, it should be stored and made into a question bank. So on the next examination the test questions stored in the bank questions to be randomized again to make new questions as many as the number of questions needed so that the exam questions are presented far from static and color and each test for each participant will never be the same as previous questions. and also the implementation of semi-computerized exams do not need to require a computer laboratory. This application is equipped with a randomization method, namely Linear Congruent Method (LCM), so that the questions that appear will never be the same each time printing a question in the form of executable (EXE), making it easier for study programs to make exam questions in multiple choices and in accordance with existing material in the syllabus and GBPP that apply from several lecturers who teach the same subject.
Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone Amir Mahmud Hasibuan
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.32 KB) | DOI: 10.54367/means.v2i1.20

Abstract

Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text.
Perancangan Sistem Informasi Perpustakaan AMIK STIEKOM Sumatera Utara Berbasis Teknologi Radio Frekuensi Identification (RFID) Sony Bahagia Sinaga; Paska Marto Hasugian
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1007.939 KB) | DOI: 10.54367/means.v2i1.15

Abstract

This study describes the data structure in designing and building an AMIK STIEKOM North Sumatra library information system using Radio Frequency Identification (RFID) based on client servers. The author hopes that readers will better understand the problem solving of parking that is more integrated and well-documented and efficient in its operations. The data structure that has been designed is able to identify the number of participants who have been equipped with Radio Frequency Identification (RFID) library system technology. Students who borrow or return books are selected through application technology in accordance with student data I recorded in the database. Only data on students / I who are registered in the database can borrow and return books to the AMIK STIEKOM North Sumatra library. The process of selecting data in the library system with RFID technology is carried out in three stages, namely the logical design stage, the physical design stage, and the interface design stage.
Aplikasi Pengamanan Data Gambar Dengan Menerapkan Algoritma Vigenere Chiper Ayu Wandira Simatupang
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (420.141 KB) | DOI: 10.54367/means.v2i1.26

Abstract

The security and confidentiality of data is very important considering the rapid development of technology at this time which allows the emergence of new techniques that are misused by certain parties that can threaten security from data that are considered insignificant. Cryptography is a field of science to maintain image security. Cryptography has been implemented in many ways. The way it works is to change the original data that can be understood / read by humans (plaintext) to other forms that cannot be understood / read by humans (ciphertext). The process of transforming plaintext into chiperteks is termed encryption. While the process of returning a chipertext message to plaintext is termed decryption. Vigenere Cipher is an asymmetric cryptographic algorithm, where the key used to encrypt is different from the one used to decrypt. Vigenere Cipher is a cryptographic algorithm that uses letters and numeric values. Vigenere Cipher requires three steps in the process, namely key generation, encryption, and decryption. The process of encryption and decryption is almost the same process.
Perancangan Aplikasi Pembelajaran Steganografi Algoritma Least Signification Bit Dengan Metode Computer Assisted Intruction Aperius Frediks Gulo
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (838.669 KB) | DOI: 10.54367/means.v2i1.21

Abstract

Steganography which is an art and technique that can be used to do digital data security or the process of hiding secret messages in the form of text in other forms so that it is not easily known by others. Least Significant Bit (LSB) is one of the steganography methods that is used to insert or hide messages by replacing rows of rear bits. From the classroom observations it was revealed that generally pay attention when the teacher explains the subject matter and gives practice questions. But communication in the classroom generally occurs in one direction which is dominated by the teacher or tutor. This theory learning often makes students bored when compared to practical activities that are directly carried out at the computer or with other technological tools. By applying the Computer Assisted Intruction (CAI) learning model, it uses strategic learning methods by providing material, training and games that greatly assist the process of delivering material by the instructor. Mobile-based Least Significant Bit (LSB) Algorithm Learning Application using adobe flash CS6, can be an alternative learning method. To overcome these problems and see the ownership of smartphones in Indonesia is almost evenly shared by students and the community. Then this application can support these learning activities
Perancangan Sistem Informasi Penjualan Timbangan Berbasis Web Pada PT. Altraman Y. Rainhard Siregar; Sorang Pakpahan
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (291.497 KB) | DOI: 10.54367/means.v2i1.16

Abstract

The development of the internet world is highly expected for the present because more and more private companies, agencies take part in enlarging these developments in carrying out their business activities. So to support this, PT. Altraman is a company engaged in the sale of digital scales that offer quality products at competitive prices and provide convenience for stake holders. In this final project, an information system for the sale of web-based scales was designed at PT. Altraman which aims to process the data of stock procurement, sales and shipping and to market the scales products well through the built website media, so that it can facilitate the sale of products, and can increase sales volume. With the existence of this system it is expected that it will be easier, both for companies and customers in carrying out the sales and purchase process.
Implementasi Algoritma Rot Dan Subtitusional Block Cipher Dalam Mengamankan Data Ayu Pratiwi
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (887.47 KB) | DOI: 10.54367/means.v2i1.27

Abstract

The security and confidentiality of data is one of the most important aspects in the information system at this time. Caused by the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of information systems. In general, the data are categorized into two, namely confidential data and data that is not confidential. Data that is not confidential is usually not too much attention. What really needs to be considered is confidential data, where every information contained in it will be very valuable for those who need it because the data can be easily duplicated. The ROT-n algorithm is one simple encryption algorithm that uses alphabetical shifts as much as n to convert plain text into cipher text, whereas Block ciphers work by processing data in blocks, where several characters / data are combined into one block. Each one block process produces one block output as well.

Page 1 of 2 | Total Record : 14