cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jimat.journal@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Informatics Management and Information Technology
ISSN : -     EISSN : 27744744     DOI : -
Core Subject : Science,
Journal of Informatics Management and Information Technology, memiliki kajian pada bidang: 1. Manajemen Informatika, 2. Sistem Informasi, dan 3. Teknologi Informasi
Articles 55 Documents
Penerapan Algoritma Zhutakaoka Pada Aplikasi Pengenalan Rambu K3 Evi Ramadani
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.84

Abstract

Abstract?K3 signs are very important signs in work to avoid work accidents and there are many kinds of K3 signs such as pictures and symbols so that these K3 signs are very useful for workers both in buildings and in projects. So that workers avoid work accidents both in the work environment or outside the work environment. For that we need an application that contains the search for K3 signs. Where workers can learn these signs. This K3 sign application is used by workers by searching from an existing application in the application that has been made. And it can be understood if the worker succeeds in looking for the K3 signs that have been determined according to the existing pattern, still searching for solutions in the application. Search for K3 signs is designed using the String matching method, application development uses the UML design method and is built on the Android platform.
Pemilihan Pengangkatan Karyawan Tetap Menerapkan Metode Multi-Attributive Border Approximation Area Comparison Fitri Laila; Nelly Astuti Hasibuan
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.85

Abstract

The selection procedure determines permanent employees at PT Siantar Top, Tbk, starting with employees who volunteer and want to work as permanent employees at PT Siantar Top, Tbk. Next, fill in the personal data form, then a selection will be carried out with an assessment of several aspects such as GPA, Age, Basic Ability, Psychological Test, and Work Experience. The problem that occurs in this case is that PT Siantar Top, Tbk is difficult to make decisions in determining permanent employees. In this study, to resolve these problems the authors designed a decision support system for determining permanent employees at PT Siantar Top, Tbk. by applying the Multi-Attributive Border Approximation Area Comparison (MABAC) Method. The design of this system is made using the Visual Basic Net 2008 programming language and the MySQL database as a storage place for data entered into the system. Decision support systems designed using Visual Basic Net 2008 in this study can be operated properly on computers and facilitate the decision-making process in determining permanent employees at PT Siantar Top, Tbk.
Penyembunyian Pesan Teks Tersandi dengan Algoritma Massey Omura Pada Gambar Berdasarkan Metode Stegano F5 Herianata Barasa
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.86

Abstract

In the current era of computerization, securing data is a very important thing to do, especially on confidential data. Because if there was data breach, for example in messages containing secret text, it would be detrimental to those concerned. Therefore we need a system that can secure these text messages. The tighter the data security is, the less likely it is to be compromised. In this study the authors will combine two methods in securing text messages. Namely the Massey Omura method and the Stegano F5 method. The author will use the Massey Omura method to encode messages which are then hidden in the image using the Stegano F5 method. The Massey Omura algorithm is an algorithm that works with the concept of asymmetric keys and is developed based on the concept of a three-pass protocol. The three-pass protocol works with the concept that each party (recipient and sender of the message) uses their own key to encrypt and decrypt messages. One of the advantages of the Massey Omura algorithm is the difficulty of calculating discrete logarithmic which is similar to other public key algorithms such as RSA, and others. And Stegano F5 is a very early version for embedding files into native color BMP, GIF, or JPEG images. The combination of the Massey Omura algorithm with the Stegano F5 method, will make it very unlikely that other parties can break into confidential messages.
Analisa Metode SHA-512 Untuk Tanda Tangan Digital Pada File Video Mhd Ipdal
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.87

Abstract

Cryptography is the science of maintaining data security. Cryptography is a data security method that can be used to maintain data authenticity, data confidentiality, and data transmission authenticity. SHA-512 is a one-way hash function designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST) as the Federal Information Processing Standard (FIPS) in 1993 and referred to as SHA-0, two years later. published next generation SHA 1 which is an improvement of the SHA-0 algorithm. In 2002 four other variations were published, namely SHA-224, SHA-256, SHA-384, and SHA-512, four of which were referred to as SHA-2. The SHA-512 hash function is a function that produces a message digest of 512 bits in size and 1024 bits in length. There are 80 loops in this function. This research will use the SHA-512 Method to secure the authenticity, confidentiality, integrity, and authentication of digital signatures on video files. This study describes the security process to detect the authenticity of digital signatures on video files using the SHA-512 method in the form of detecting digital signatures on confidential video files sent via public telecommunications that cannot be changed or modified by unauthorized persons or persons who not concerned. This is done as an effort to minimize fraudulent acts, forgery, hoaxes, or misuse of digital signatures on video files.
Penerapan Chain Code Algorithm Untuk Ektraksi Fitur Objek Citra Plat Kendaraan Irawanda Irawanda
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.88

Abstract

Number plate is one of the identities of a motorized vehicle. The number plate consists of letters and numbers which inform the provincial code and area code where the motorized vehicle is registered. Because the number plates are unique, they are often used for recording purposes such as in parking areas. To make it easier to record vehicle number plates, identification of vehicle number plate characters is made automatically using input in the form of a number plate image. The vehicle number plate image is used as a sample in the calculation analysis process. To facilitate the calculation process using the chain code algorithm, cutting or selecting the object image of the vehicle number plate image is carried out in order to obtain a new, selected sample image, the image with the number "1"
Penerapan Metode Error Level Analysis dan Laplacian of Gausian Untuk Deteksi Tepi Citra CT Scan Paru-Paru Eferoni Ndruru; Murdani Murdani
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.95

Abstract

Edge detection of an image is one way to determine the authenticity of the data, at this time many scans are inefficient due to poor quality and unclear image colors. One of the problems that is often found is in the ct scan results to find out the truth of a disease. In this study, the problems that will be detected are the CT scan results of the lungs using the Error Level Analysis and Laplacian of Gausian method. The identification system can be seen from the results of a good file extraction. Extraction can be done by taking one part of the CT image. scan, and the part that is easiest to find is the edge of the image. The process of applying the Error Level Analysis and Laplacian of gausian method is by combining the Error Level Analysis method and the Lapciaan of gausian method. Method (ELA) a method is a modified image detection technique by restoring a new image, in the sense that it has been compressed after performing the calculation process on changing the compression level of the image. Meanwhile, the Laplacian of gausian method is a technique for detecting the edges of an image, so that the problem solving process is carried out by detecting the modified image and then proceeding to detect the edges of the image to determine the authenticity of the image. The results obtained from this study are the edge detection process of CT-Scan results obtained from the mean value of the Mean Square Error pixel
Aplikasi Penentuan Jenis Ikan Koi Berdasarkan Pembacaan Komposisi Warna Berbasis Android Yasir Hasan
Journal of Informatics Management and Information Technology Vol. 1 No. 1 (2021): January 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i1.96

Abstract

Purchasing koi fish can be done online and buyers will be satisfied because they can find out information on koi fish while surfing for information on koi fish that are sold online, but it is different from buying koi fish directly from the seller. Limited knowledge about the types of koi fish can make buyers confused and buy wrong. Buyers may ask directly to the seller, but the seller will not necessarily be fully served. The existence of an android application that can identify types of koi fish can help direct buyers and equip buyers to interact with sellers in koi fish transactions. Koi fish identification by android application is carried out by two determining factors. The first determining factor reads the color value by comparing the color value of the camera captured image with the values ??available in the database. The second determining factor is based on the texture motif found on the koi fish's body. The second determining factor is done if the first determining factor does not support determining the type of koi fish, such as the color composition is very complex to be compared.
Implementasi Digital Signature Pada File Audio Menerapkan Metode SHA-256 Endelina Endelina
Journal of Informatics Management and Information Technology Vol. 1 No. 2 (2021): April 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In an era of information technology that is growing very rapidly, the use of signatures has been implemented digitally through digital signatures. Digital signatures develop along with the emergence of the need to authenticate data or files that are used digitally. Its use also aims to avoid forgery or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, and file delivery. The use of digital signatures on audio files can be accomplished by using encryption of messages sent with a key to use a combination of hash functions with public-key cryptography. This method can be used temporarily. The use of a digital signature in the form of an encrypted writing or a hash function will produce a signature document that is clearly visible because it is written in a visible code. This can lead to potential interference by removing the signature so that the document received is deemed not equipped with a digital signature.
Penerapan Metode COPRAS dan ENTROPY dalam Pemilihan Anggota Badan Pengawas Pemilihan Umum (BAWASLU) Saidah Rizki Tanjung; Mesran Mesran; Sarwandi Sarwandi; Meryance V Siagian
Journal of Informatics Management and Information Technology Vol. 1 No. 2 (2021): April 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The General Election Supervisory Agency (BAWASLU) is an election management institution that is tasked with overseeing the implementation of elections throughout the territory of the Unitary State of the Republic of Indonesia. Members of the General Election Supervisory Agency (BAWASLU) are those who have the ability to supervise and are not members of political parties. It is hoped that an effective recruitment process can attract BAWASLU members who really meet their needs. BAWASLU often faces difficulties in selection because it still uses a manual system. Therefore, it is necessary to make a decision support system so that the Chairperson of BAWASLU can give an assessment to each new BAWASLU member. The research carried out is to create a system that can provide consideration in making decisions about the selection of Bawaslu members. By using the Entropy method used to calculate the weighting of the criteria, and produce the reject rate as the main criterion, the Entropy method investigates the harmony in discrimination between a set of alternative value data on certain criteria described in the Decision Matrix (DM). While the COPRAS method is used for ranking, the effect of maximizing and minimizing the criteria on the evaluation results is considered separately. The selection of the best alternative is based on considering the ideal and anti-ideal solutions
Mendeteksi Orisinalitas Hasil Scan Citra Ijazah Menerapkan Metode Blake Robert Laia
Journal of Informatics Management and Information Technology Vol. 1 No. 3 (2021): July 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i3.101

Abstract

The rapid development of technology now causes frequent abuse of computer performance systems which are widely used as one of the crimes of manipulating document files that harm others. it can be known whether the file is original or not if the results are the same then the file is said to be original, and if the results are not the same then the file is said to be not original. original and non-original files