cover
Contact Name
Paska Marto Hasugian
Contact Email
siskahhasugian@gmail.com
Phone
+6281264451404
Journal Mail Official
editorjournal@seaninstitute.or.id
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Info Sains : Informatika dan Sains
Published by SEAN INSTITUTE
ISSN : 20893329     EISSN : 27977889     DOI : -
Core Subject : Science,
urnal Info Sains : Informatika dan Sains (JIS) discusses science in the field of Informatics and Science, as a forum for expressing results both conceptually and technically related to informatics science. The main topics developed include: Cryptography Steganography Artificial Intelligence Artificial Neural Networks Decision Support System Fuzzy Logic Data Mining Data Science
Articles 5 Documents
Search results for , issue "Vol. 10 No. 1 (2020): March, Informatics and Science" : 5 Documents clear
Learning Support System With Computer Assisted Instruction Method Mamed Rofendi Rofendi; Amran Manalu
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (711.43 KB) | DOI: 10.54209/infosains.v10i1.25

Abstract

Physics is a branch of science or natural science that has an important role in advancing human thinking and thinking. Physics is the science of nature, which studies the basic elements that make up the universe, the forces acting in it, and their consequences covering a wide range from the subatomic particles that make up all matter to the behavior of the universe as a single cosmos. Science or Natural Sciences (IPA) is concerned with finding out about nature systematically, so that Science is not only the mastery of a collection of knowledge in the form of facts, concepts, or principles but also as a process of discovery. Through the high school level physical science learning application using the Computer Assisted Instruction (CAI) method, it is hoped that it can increase the user knowledge in understanding straight motion kinematics material
Application of the Certainty Factor Method to Diagnose Escherichia Coli Bacteria in Refilled Drinking Water Agustina Simangunsong; Penda Sudarto Hasugian
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (691.262 KB) | DOI: 10.54209/infosains.v10i1.26

Abstract

An expert system is a software package or computer program package that is intended as a provider of advice and aids in solving problems in certain areas of specialization, such as problems in medicine, education, and so on.The development of expert system development in the field of bacteriology is one thing that is expected to improve the quality of human life. One of them is to apply an expert system using the Certainty Factor method to diagnose escherichia coli (e-coli) bacteria in refilled drinking water. This study aims to increase knowledge about how to make an inference engine to control the process of identifying solutions using the Certainty Factor method and to design an expert system application using the Certainty Factor method to diagnose Escherichia coli bacteria in refill drinking water.
Puzzle Game With a Combination of Forward Chaining and Backward Chaining Methods Jonson Manurung Manurung
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (750.999 KB) | DOI: 10.54209/infosains.v10i1.27

Abstract

This research discusses how to find a solution in the secret code puzzle game. Because the author sees a fairly difficult solution in the game, a solution is needed to get the answer. In this secret code puzzle game, the writer uses four methods to find a solution, namely: Forward Chaining and Backward Chaining. The purpose of this final project is to create software to find a secret code puzzle game solution that we usually play in IQ test games. Explain how the four methods used by the author to find a solution work and also compare the speed of the four methods used to find out which method is the fastest. The results achieved are the authors make software in order to determine which method is the fastest and which method is late in solving the questions provided so that the author can find out which method is suitable for finding solutions in the secret code puzzle game and also the author succeeded in making the game. The secret code puzzle becomes a computer game
Use of Electronic Code Book (Ecb) Algorithm in File Security Philipus Tarigan Tarigan
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (875.138 KB) | DOI: 10.54209/infosains.v10i1.28

Abstract

Electronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contentsElectronic communication such as sms, e-mail, chat, web, e-banking is a commonly used communication tool today. To prevent the misuse of such data by other parties, a good data security system is required. Cryptography is a way of securing data that aims to maintain the confidentiality of the information contained in the data, so that the data information can not be known by unauthorized parties. In maintaining the confidentiality of information, cryptography encodes plaintext data into an unrecognizable form of password data (chipertext), and although others later obtain the data, it cannot understand its contents
Brute Force Algorithm Implementation Of Dictionary Search Charles Baturu; Naufal abdi
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 1 (2020): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (805.149 KB) | DOI: 10.54209/infosains.v10i1.29

Abstract

In the manual dictionary the more words are accommodated, the heavier the dictionary. Dictionaries that are generally book-shaped are difficult to carry anywhere because they are thick and heavy. With this mobile-based computer dictionary application, users no longer need to carry heavy dictionaries and the search process will also be faster and easier. This mobile-based kmputer dictionary application is created using the java programming language with the NetBeans 7.0 editor and using an RMS (Record Management System) based database. So it can be installed on various types of mobile phones that already support Java. String Matching is one of the algorithms used to speed up the search process for the desired word. String matching algorithms have been used frequently before as examples in the process of matching strings based on the equation of text data namely Brute Force. Because this Brute Force algorithm can be used to perform string or text searches. Brute force algorithm is an algorithm to match a pattern with all text between 0 and n-m to find the presence of a pattern in text.

Page 1 of 1 | Total Record : 5