cover
Contact Name
Paska Marto Hasugian
Contact Email
siskahhasugian@gmail.com
Phone
+6281264451404
Journal Mail Official
editorjournal@seaninstitute.or.id
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Info Sains : Informatika dan Sains
Published by SEAN INSTITUTE
ISSN : 20893329     EISSN : 27977889     DOI : -
Core Subject : Science,
urnal Info Sains : Informatika dan Sains (JIS) discusses science in the field of Informatics and Science, as a forum for expressing results both conceptually and technically related to informatics science. The main topics developed include: Cryptography Steganography Artificial Intelligence Artificial Neural Networks Decision Support System Fuzzy Logic Data Mining Data Science
Articles 107 Documents
Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security Doni El Rezen Purba; Desinta Purba
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (720.125 KB) | DOI: 10.54209/infosains.v11i1.18

Abstract

For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
Learning Support System With Computer Assisted Instruction Method Mamed Rofendi Rofendi; Amran Manalu
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (711.43 KB) | DOI: 10.54209/infosains.v10i1.25

Abstract

Physics is a branch of science or natural science that has an important role in advancing human thinking and thinking. Physics is the science of nature, which studies the basic elements that make up the universe, the forces acting in it, and their consequences covering a wide range from the subatomic particles that make up all matter to the behavior of the universe as a single cosmos. Science or Natural Sciences (IPA) is concerned with finding out about nature systematically, so that Science is not only the mastery of a collection of knowledge in the form of facts, concepts, or principles but also as a process of discovery. Through the high school level physical science learning application using the Computer Assisted Instruction (CAI) method, it is hoped that it can increase the user knowledge in understanding straight motion kinematics material
Application of the Certainty Factor Method to Diagnose Escherichia Coli Bacteria in Refilled Drinking Water Agustina Simangunsong; Penda Sudarto Hasugian
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (691.262 KB) | DOI: 10.54209/infosains.v10i1.26

Abstract

An expert system is a software package or computer program package that is intended as a provider of advice and aids in solving problems in certain areas of specialization, such as problems in medicine, education, and so on.The development of expert system development in the field of bacteriology is one thing that is expected to improve the quality of human life. One of them is to apply an expert system using the Certainty Factor method to diagnose escherichia coli (e-coli) bacteria in refilled drinking water. This study aims to increase knowledge about how to make an inference engine to control the process of identifying solutions using the Certainty Factor method and to design an expert system application using the Certainty Factor method to diagnose Escherichia coli bacteria in refill drinking water.
Puzzle Game With a Combination of Forward Chaining and Backward Chaining Methods Jonson Manurung Manurung
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.999 KB) | DOI: 10.54209/infosains.v10i1.27

Abstract

This research discusses how to find a solution in the secret code puzzle game. Because the author sees a fairly difficult solution in the game, a solution is needed to get the answer. In this secret code puzzle game, the writer uses four methods to find a solution, namely: Forward Chaining and Backward Chaining. The purpose of this final project is to create software to find a secret code puzzle game solution that we usually play in IQ test games. Explain how the four methods used by the author to find a solution work and also compare the speed of the four methods used to find out which method is the fastest. The results achieved are the authors make software in order to determine which method is the fastest and which method is late in solving the questions provided so that the author can find out which method is suitable for finding solutions in the secret code puzzle game and also the author succeeded in making the game. The secret code puzzle becomes a computer game
Use of Electronic Code Book (Ecb) Algorithm in File Security Philipus Tarigan Tarigan
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (875.138 KB) | DOI: 10.54209/infosains.v10i1.28

Abstract

Electronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contentsElectronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contents
Brute Force Algorithm Implementation Of Dictionary Search Charles Baturu; Naufal abdi
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (805.149 KB) | DOI: 10.54209/infosains.v10i1.29

Abstract

In the manual dictionary the more words are accommodated, the heavier the dictionary. Dictionaries that are generally book-shaped are difficult to carry anywhere because they are thick and heavy. With this mobile-based computer dictionary application, users no longer need to carry heavy dictionaries and the search process will also be faster and easier. This mobile-based kmputer dictionary application is created using the java programming language with the NetBeans 7.0 editor and using an RMS (Record Management System) based database. So it can be installed on various types of mobile phones that already support Java. String Matching is one of the algorithms used to speed up the search process for the desired word. String matching algorithms have been used frequently before as examples in the process of matching strings based on the equation of text data namely Brute Force. Because this Brute Force algorithm can be used to perform string or text searches. Brute force algorithm is an algorithm to match a pattern with all text between 0 and n-m to find the presence of a pattern in text.
Analysis Of Shortest Path Determination By Utilizing Breadth First Search Algorithm Jonhariono Sihotang
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (592.99 KB) | DOI: 10.54209/infosains.v10i2.30

Abstract

The rapid development of science requires the public to keep up with the development of such technology. The use of computers as one of the tools used to facilitate work and improve the efficiency and effectiveness of work is also high, this we can see from the development of such technology. Artificial Intelligence (AI) is one part of computer science that learns about how to make computers can do the job as humans do. At the beginning of its creation, the computer was only functioned as a counting tool. But along with the development of the times, the role of computers increasingly dominates the life of mankind. Computers are no longer only used as a calculation tool, more than that, computers are expected to be empowered to do everything that can be done by humans. People can be good at solving all problems in this world because people have knowledge andexperience. Knowledge is gained from learning. The more knowledge possessed by a person is certainly expected to be more able to solve problems. But the provision of knowledge alone is not enough, people are also given the sense to reason, draw conclusions based on their knowledge andexperience.
Implementation Of Least Significant Bit (LSB) Algorithm For Data Security In Digital Imagery Penda Sudarto Hasugian Hasugian; Agustina Simangunsong
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (845.158 KB) | DOI: 10.54209/infosains.v10i2.31

Abstract

In this study, a software was built that can insert text messages into image files (steganography) and steganalisis or detect the presence or absence of secret messages in an image. Imagery is the most commonly used medium for inserting secret messages, as it can hide messages very well and is widely available. The built software implements steganalisis with the Least Significant Bit (LSB) algorithm which is the most widely used message insertion algorithm. Steganlysis software is built using LSB algorithms to perform insertion and extract insertion messages on image files. The LSB algorithm in this study used the microsoft Visual Basic 6.0 programming language tools. Based on the software tests conducted, it can be seen that the software can run well on insertion and detect the presence or absence of secret messages on image files.
Compression of Color Image Using Quantization Method Denni Rajagukguk Rajagukguk; Iqbal Panjaitan
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (670.995 KB) | DOI: 10.54209/infosains.v10i2.32

Abstract

The development of large-capacity storage media causes people to no longer have problems if they have large files. More so if the file we have is an image file. Nevertheless, sometimes the large file size feels annoying if we have to manage the storage media that we have for various data, thepurpose of this study is to compress color imagery. By using quantization method can be taken, By using data compression then the data capacity will be minimized, Utilization of quantization method will facilitate data compression (image), Image compression with kunatization method in RGB Image can reduce thesize of the compressed file, so as to save storage space(Storage).
Analysis and Implementation of PlayFair Chipper Algorithm in Text Data Encoding Process Pristiwanto Pristiwanto; Heri Sunandar; Berto Nadeak
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (829.358 KB) | DOI: 10.54209/infosains.v10i2.33

Abstract

This research discusses the implementation of Playfair Cipher to encode text data. Playfair Cipher is one of the classic cryptographic algorithms that use symmetry keys. Originally invented by Sir Charles Wheatstone and Baron Lyon Playfair, the algorithm used a 5x5 keyboard to encrypt and decrypt. The process of encryption and decryption is done by grouping the letters in a bigram. By using a 5x5 keyboard, we can encrypt plaintext (original text data to be encrypted) and decrypt the ciphertext (encrypted text data) by grouping it by removing the letter J from plaintext. The keypad is generated randomly by the software so that each encoding process (encryption and decryption) can use different keys. The software is also used to prove the correctness of the encryption and decryption results of the Playfair Cipher with cube keyboards. Cipher Playfair software is developed using the C++ language and is console-based in a Windows development environment.

Page 1 of 11 | Total Record : 107