cover
Contact Name
Agus Perdana Windarto
Contact Email
agus.perdana@amiktunasbangsa.ac.id
Phone
+6282273233495
Journal Mail Official
jsaktiamiktunasbangsa@gmail.com
Editorial Address
Sekretariat J-SAKTI (Jurnal Sains Komputer dan Informatika) Jln. Jendral Sudirman Blok A No. 1/2/3 Kota Pematang Siantar, Sumatera Utara 21127 Telepon: (0622) 2243
Location
Kota pematangsiantar,
Sumatera utara
INDONESIA
J-SAKTI (Jurnal Sains Komputer dan Informatika)
ISSN : 25489771     EISSN : 25497200     DOI : http://dx.doi.org/10.30645/j-sakti
J-SAKTI adalah jurnal yang diterbitkan oleh LPPM STIKOM Tunas Bangsa yang berfokus di bidang Manajemen Informatika. Pengiriman artikel tidak dipungut biaya, kemudian artikel yang diterima akan diterbitkan secara online dan dapat diakses secara gratis. Topik dari J-SAKTI adalah sebagai berikut (namun tidak terbatas pada topik berikut) : Artificial Intelegence, Digital Signal Processing, Human Computer Interaction, IT Governance, Networking Technology, Optical Communication Technology, New Media Technology, Information Search Engine, Multimedia, Computer Vision, Information System, Business Intelligence, Information Retrieval, Intelligent System, Distributed Computing System, Mobile Processing, Computer Network Security, Natural Language Processing, Business Process, Cognitive Systems, Software Engineering, Programming Methodology and Paradigm, Data Engineering, Information Management, Knowledge Based Management System, Game Technology.
Articles 10 Documents
Search results for , issue "Vol 2, No 1 (2018): EDISI MARET" : 10 Documents clear
Analisa Pembangunan Aplikasi Pengolahan Data Akademik Berbasis Web Anisya Anisya; Bayu Febriadi; Wahyu Hidayat
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1596.264 KB) | DOI: 10.30645/j-sakti.v2i1.58

Abstract

Vocational High School (SMK) is one form of a formal education unit that provides vocational education as a continuation of (Junior High School) SMP / MTs and equal. One of them is SMK N 1 Koto Baru. In the processing of academic data using Microsoft Excel and Microsoft Word applications, the number of students approximately 550 students are divided into 9 departments so it takes a long time in the processing of academic data. This study aims to analyze the development of SMK N 1 Koto Baru to process academic data such as attendance, assessment of daily exams, duties, and final exams. The development of this system uses PHP programming language and MySQL database. The results obtained from this study in the form of student report cards per academic year.
Kombinasi Mode Cipher Block Chaining Dengan Algoritma Triangle Chain Cipher Pada Penyandian Login Website Dafirius Lombu; Siska Dame Tarihoran; Irwan Gulo
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (842.623 KB) | DOI: 10.30645/j-sakti.v2i1.51

Abstract

Generally, the database access of a website lies in the user login. When the login data is not accompanied by security techniques, it is very easily accessible by other parties. One effort that can be done to solve the problem is to encode the login data of website users based on cryptographic technique algorithm. Triangle Chain Cipher (TCC) is one of the classic cryptographic algorithms that encode data doubly and generate keys randomly along the plain. The process of encryption and decryption are interdependent to be one of the advantages of this algorithm. This algorithm will be more effective when combined with the Cipher Block Chaining (CBC) operation mode that is widely used in modern cryptographic algorithms today. The feedback mechanism between the blocks in this mode of operation is the operating advantage. This study describes how to combine the mode of operation of block chaining cipher with triangle chain cipher algorithm so that cipher data login website generated more random and difficult to find its original meaning.
Penggunaan Algoritma Kriptografi Steganografi Least Significant Bit Untuk Pengamanan Pesan Teks dan Data Video Indra Gunawan
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (825.107 KB) | DOI: 10.30645/j-sakti.v2i1.48

Abstract

Some areas that are still discussed from a computer science research for a data security is the use of LSB steganography (Least Significant Bit) cryptography algorithm. Delivery of text and video data without being equipped with a security system from the LSB steganography algorithm can eliminate messages to be inserted into the video. The use of the LSB steganography algorithm can improve the security of messages to be sliced and sent to the recipients of messages. This analysis aims to improve text and video security by inserting text into video, then shuffling video so that the video can not be seen.
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Mia Diana; Taronisokhi Zebua
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Aplikasi Monitoring Proses Distribusi Makanan Beku Untuk Informasi Secara Realtime Susliansyah Susliansyah; Frisma Handayanna
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.49

Abstract

The control of frozen food distribution process done by the logistic part in obtaining the data is still manual, using the form and excel, causing the admin difficulty in monitoring and controlling the distribution process or the delivery of frozen food to store or outlet. Problem solving is made an application using data collection method and RAD method, where the model of Rapid Application Development (RAD) has business modeling stage using kebutuah application admin and user, data modeling that explains the use of ERD and LRS from the database side, about usecase diagrams and activity diagrams from the application process side, application generation evolves about programming languages in application creation while testing and turnover describes the use of white box testing. The purpose of the application is made to facilitate the related division in processing the data distribution process, monitor and control the distribution process and obtain information distribution process in realtime.
Implementasi Algoritma Data Encryption Standard Pada Penyandian Record Database Neti Rusri Yanti; Alimah Alimah; Desi Afrida Ritonga
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.53

Abstract

Record databases are generally still often displayed in text form as information for users, so it can facilitate cryptanalyst to access and provide opportunities to do the leak, distribute or modify the database records. One of the cryptographic algorithms used to secure data is using the DES algorithm to encrypt the data to be stored or sent. The DES algorithm belongs to a cryptographic system of symmetry and is a type of block cipher. DES operates on a 64-bit block size. DES describes 64 bits of plaintext to 64 bits of ciphertext using 56 bits of internal key (internal key) or up-key (subkey). The internal key is generated from an external key 64-bit length. This research describes the process of securing database records by encrypting it based on DES algorithm, resulting in text record databases in the form of passwords that are difficult to understand and understand by others. This is done in an attempt to minimize the misuse of database records.
Sistem Pembuatan Jaminan Tender Pada Perusahaan Jasa Pembuatan Asuransi Linda Sari Dewi; Ester Arisawati; Erene Gernaria Sihombing; Linda Maulida
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.56

Abstract

A loss-making service company does not yet have a website on the information of making a Tender Guarantee as a prospective principal registration medium that will use our services for the manufacture of warranties. From the system that will be made to facilitate the making of guarantee which is certificate of Bank Guarantee. The purpose of this study to produce a system of information creation and website-based registration and registration. Online information is an important part of the development of technology in the internet world. The use of website media is very profitable for many parties, for the principal or the party of the company making the loss insurance services. The design of information systems making of this guarantee is made to assist and simplify the entire process of making the existing collateral in the company.
Penerapan Algoritma Skipjack Untuk Menyandikan Short Message Service Nurainun Sinaga; Syarifah Aini; Bezatulo Gulo
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.54

Abstract

The security and confidentiality of Short Message Service (SMS) is very important for senders and recipients of messages. Generally, SMS is displayed in plain text form which can make it easy for the cryptanalyst to skipjack the message to be distributed. SMS security can be done by encrypting it based on one of the cryptographic algorithms in order to maintain the authenticity and security of messages and can make it difficult for others to know the original meaning of the SMS. Skipjack algorithm is one of cryptography algorithm that can be used for SMS encoding. The Skipjack algorithm is an electronic 64-bit codebook algorithm that converts 64-bit blocks into 64-bit blocks of output. The parameter used for encryption is 80-bit key and has 32 rounds of the encryption process and description. This study describes how SMS text encoding based on skipjack algorithm with the purpose of distributed SMS can be guaranteed to be safe and avoid misuse.
Analitycal Hierarchy Process Untuk Menganalisa Faktor Pemilihan Web Browser Pada Desktop Wida Prima Mustika; Mardian Mardian; Rinawati Rinawati
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.57

Abstract

Convenience in using the internet is strongly influenced by the web browser used. Web browser is an application to be able to surf the internet, which serves to display and interact with the server. The development of the internet and the increasing number of website are there, make the internet as the primary source of information. With options and advantages possessed by each web browser, internet users often do not make the most of the features provided. It is that makes the background of how to apply the research methods Analytical Hierarchy Process (AHP) for choosing a web browser on the desktop. This research aims to create a decision support system for internet users in selecting the appropriate web browser criteria and requirements.
Penyandian File Word Berdasarkan Algoritma Rivest Code 5 (RC5) Widodo Arif Prabowo; Annisa Fitri Harahap; Ridha Ismadiah
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.55

Abstract

Nowadays, important data in the form of word files have been widely used. But there are still few who apply security techniques to the important files. Files that are confidential or important, if they fall into the hands of others may be misused or manipulated for certain purposes. The existence of document security applications built on cryptographic algorithms is one solution to solve the above problems. Cryptographic techniques secure a data or important files by encoding the data into a cipher that is difficult to understand again by others. The RC5 algorithm is one of the cryptographic technique algorithms that can be used to encode text from word files based on the RC5 algorithm so that it can improve the expression of important and confidential word files.

Page 1 of 1 | Total Record : 10