cover
Contact Name
Tonni Limbong
Contact Email
tonni.budidarma@gmail.com
Phone
+6281267058001
Journal Mail Official
juki.kitamenulis@gmail.com
Editorial Address
Jl. Bunga Terompet Komplek Cipta Pesona 2 No.D.25, Simpang Selayang Kec. Medan Tuntungan, Kota Medan, Sumatera Utara 20131
Location
Unknown,
Unknown
INDONESIA
JUKI : Jurnal Komputer dan Informatika
Published by Yayasan Kita Menulis
ISSN : -     EISSN : 27224368     DOI : -
Core Subject : Science,
JUKI: Jurnal Komputer dan Informatika (e-ISSN: 2722-4368) berfokus pada keilmuan yang ada tentang Komputer dan Informatika, yaitu Sistem Informasi, Rekayasa Perangkat Lunak, Jaringan & Multimedia, Teknologi Web & Mobile, serta kecerdasan Buatan & game. Akan tetapi JUKI juga tidak membatasi terhadap kajian-kajian di lingkup informatika lainnya. Ruang lingkup dari JUKI dimulai dari Volume 1 (2019) adalah sebagai berikut : Information Systems Management Information Systems Knowledge Management Systems Project Management Systems Geographic Information System Supply Chain Management Customer Relationship Management Artificial Intelligence Machine Learning Game Decision Support Systems Business Intelligence & Data Visualitation Business Process Modelling Software Engineering & Software Re-Engineering Data Management Data Mining User Interface (UI) & User Experience (UX) Mobile & Web Technology Multimedia & Computer Network Security Cloud Computing Internet Of Things
Articles 30 Documents
Aplikasi Penyandian Record Menggunakan Metode Twofish Asmawi
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 2 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi November 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Technological developments are increasingly progressing, for example for data security. Data security is very important in maintaining the confidentiality of information, especially sensitive information, which only authorized parties can know, moreover data storage is done on a computer, if the data is not secured in advance then the data will be known by the parties who are entitled to it. is not entitled to the security of data on the record, the data on the computer is not easily seen and cannot be changed by irresponsible parties so that the data will be safe and cannot be contested by any party One of the data safeguards is by using a cryptographic system, which is the encryption of the contents of the information (plaintext) into incomprehensible content through an encryption process (encoding) and to retrieve the original information, a description process (deschiper) is carried out accompanied by using the correct key. Data encryption or cryptography is the study of hiding letters or writings so that they cannot be read by unauthorized people. Cryptography has been used since the time of Julius Caesar, who sent messages to the commander but did not have a courier to carry the message. Cryptography has 2 (two) important parts, namely encryption and description. Encryption is the process of encrypting the original message into a message that cannot be interpreted as the original. Description is to change a message that has been interpreted to be the original message, usually called plaintext, while the message that has been interpreted is called ciphertext.
Implementasi Metode Technique For Order Preference by Similarity To Ideal Solution (Topsis) untuk Keputusan Pemberian Kredit pada Calon Nasabah (Studi Kasus : PT. SS Finance) Yustinus Zai
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 2 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi November 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The existence of credit activities at a bank / company is certainly one of the advantages for the bank / company, including for customers. In credit, it is necessary to have an assessment in credit as a matter of consideration for a prospective customer before the Company makes a decision to accept or reject a request from a prospective customer, this is done considering the risk of being uncollectible is quite large. So far, several decision-making mechanisms for lending have used a computerized system, but the authors see that the application of information technology is still not comprehensive, especially in decision making for lending to prospective customers who still use books as a tool to record data of potential customers who have met the criteria for obtaining credit. In this study, a case will be appointed that is looking for the best alternative based on predetermined criteria using the TOPSIS method to perform calculations in that case. This method was chosen because it is able to select the best alternative from a number of alternatives, in this case the intended alternative, namely those who are entitled to receive loans based on determined criteria. The research was conducted by looking for the weight value for each attribute, then a ranking process was carried out which would determine the optimal alternative, namely the best prospective customer.
Mendeteksi Tepi Citra Penyakit Hemokromatosis Dengan Menggunakan Metode Log (Laplacian Of Gaussian) Resdiana Hutagalung
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Hemochromatosis is a genetic or hereditary disease. Abnormalities of iron metabolism characterized by excessive deposition of iron in the tissues. Derivative conditions that cause the body to absorb too much iron from the food eaten. Excess iron is stored in organs such as the liver, heart and pancreas. Excess iron can cause toxicity to these organs, and is life threatening because it can cause diseases such as cancer, cardiac arrhythmias, and cirrhosis. LOG method (Laplacian of Gaussian) is a second-order edge detection operator or has a derivative filter whose function can detect areas that have rapid changes (rapit change) such as edges (edges) in the image. But this laplacian is very sensitive or low to the presence of noise. For that, the image will be smoothed first by using Gaussian. Thus a new derivative function is known, namely LoG or Laplacian of Gaussian. Many methods are used in solving edge detection problems, including Prewitt Operators, Sobel Operators, Canny Operators, but among all these methods, the Laplacian of Gaussian method is the method most often used in detecting edges. For this reason, it is hoped that the LoG (Laplacian of Gaussian) method can help to detect hemochromatosis. Can help how severe the disease has developed, and what symptoms can later be caused, so that it can help in the healing process.
Perancangan Aplikasi Penyandian Pesan Teks dengan Menggunakan Algoritma Digraph Cipher Yhopi Suhelna
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Humans interact with fellow humans using communication. Not everything that is communicated contains a message so that it can be known by many people, sometimes the communication is confidential so that only certain people can know it. The occurrence of data tapping submitted is certainly a problem if the data is confidential, therefore a data security system is needed so that the data cannot be stolen or changed by tappers or crackers. One solution to secure data is to use cryptography. Cryptography is the science and art of maintaining message security when messages are sent from one media to another without experiencing interference from third parties. Through cryptographic techniques, data can be changed into passwords that are not understood and return them back to the original, this process is called data encryption and decryption. This data security process uses the Digraph Cipher method. Some facilities in the Digraph Cipher method are the keys used in the encryption and decryption process are the same (symmetrical) and the decryption process is the opposite of the encryption process.
Sistem Pendukung Keputusan Penyeleksian Colour Guard Pada Marching Band Ginada Dengan Menggunakan Metode Vikor Dan Borda Nurjannah; Dito Putro Utomo
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Decision support system for selecting color guard with VIKOR and Borda methods. It has been made as a tool to select color guard at the Sei Rampah High School. The criteria used in the decision support system for color guard selection are: height, weight, agility, stamina, and body language. Color guard selection activities are a routine activity every year, so GINADA marching band coach Sei Rampah hereby selects to select permanent members in the marching band. Decision Support System in an organization can be seen as important in supporting the smooth running of activities and achieving an organizational goal. SPK can come in various forms, ranging from simple forms of data processing to complex application forms, and can also be used to accelerate and improve the quality of the decision-making process in the organization.
Pengembangan Media Pembelajaran Statistika Berbasis Multimedia Devi Silvia Panjaitan
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In this era of rapid technological development, the use of technology in various aspects is greatly enhanced. It is also inseparable in the world of education which must adapt itself to technology and bridge the technology and education world by implementing technology-based systems. Among them can be applied using multimedia-based learning media. The role of instructional media in the teaching and learning process is very important to be carried out by educators today, because the role of instructional media can be used to channel the sender's message to the recipient and through learning media and can also help students to explain something conveyed by the educator. Therefore, educators must be able to present good learning media for students in the current era.
Penerapan Algoritma CAST-128 pada Proses Enkripsi dan Dekripsi Teks Yessi Sriani Barus; Abdul Sani Sembiring
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Encoding was first made using a classic algorithm. This algorithm builds its security on the confidentiality of the algorithm used. However, this algorithm is inefficient when used to communicate with many people because the algorithm is still very simple and still very easy to solve, so important information or data that you want to keep secret can be easily discovered by other people or people who are not responsible. CAST-128 is a cryptographic algorithm that is said to be similar to the DES algorithm which uses 16 rounds of feistel network as one of its strengths. Where in the process of encryption and decryption of text CAST-128 uses a 64-bit block length and key lengths of up to 128 bits. For information, the CAST-128 algorithm is referred to as one of the strong cryptographic algorithms against various types of cryptanalysis, including differential and linear attacks. With the application of the CAST-128 algorithm in the process of encrypting and decrypting text, it will be more difficult to decode text encoded by people who do not know the key so as to create more security than the encoded text. So when the text wants to be sent or transferred to the flashdisk will be more confidential.
Identifikasi Kesegaran Ikan Nila menggunakan Teknik Citra Digital Juli Elprida Hutagalung; Mhd Ihsan Pohan; Yuli Happy Marpaung
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Fish contain many nutrients that are very beneficial for the body, but often fish are traded in a state of death as well as being alive. To observe the freshness of tilapia is done by the introduction of color changes that appear on digital images using the least squares method. The purpose of this research is to build an image management application system to detect the freshness of tilapia. The data used are 10 samples of tilapia images which are photographed every 1 hour for 15 hours and obtained 150 image data and then processed and analyzed using the least squares method. The first process begins with image processing by cropping at the edge of the eye of the original image and then proceed with resizing to 1000 x 1000 pixels and changing the image format to *. Png. After the image has been processed then the average value is calculated rata grayscale uses the 'rata_rata Gambar' application system and an equation is stored which is stored as training data on the application system. After the image has been processed then the image is input into the system, the image will be converted into grayscale form and displayed at a predetermined place together with the rgb and grayscale histograms and then calculated using the least squares method. The last process we do is matching the test image with the image stored as training data and we conclude whether the image is (very fresh, fresh, fresh enough, not fresh, or very not fresh), the percentage of freshness of the anchor fish, and the length of time the anchor fish dies. This study used 150 samples of fish images from fresh fish that were still very fresh until the fish were not very fresh (rotten).
Perancangan Aplikasi Media Informasi Lembaga Kursus Berbasis Web Muhammad Iqbal Panjaitan; Zekson Arizona Matondang
JUKI : Jurnal Komputer dan Informatika Vol. 1 No. 2 (2019): JUKI : Jurnal Komputer dan Informatika, Edisi November 2019
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstract-Website can be interpreted as a collection of pages that are used to publish information in the form of text, images and other multimedia programs in the form of animation (motion pictures, motion writings), sound, and or a combination of all of them both static and dynamic that form one a series of interrelated buildings between one page and another page. In this paper the design of applications that can be used as part of the dissemination of information to course institutions to increase the introduction of these agencies, to the design through the DFD design, database relation design and form design will be used as a reference in making websites.
Rancang Bangun Aplikasi Manajemen Peralatan Pada Jurusan Pendidikan Teknik Elektro Berbasis Desktop Dimas Vio Karim
JUKI : Jurnal Komputer dan Informatika Vol. 2 No. 1 (2020): JUKI : Jurnal Komputer dan Informatika, Edisi Mei 2020
Publisher : JUKI : Jurnal Komputer dan Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The Department of Electrical Engineering Education is one of the majors at Universitas Negeri Medan. Universitas Negeri Medan has many tools to support its activities. At present, the Department of Electrical Engineering Education has an internal information system to control its equipment. The absence of equipment management applications will certainly experience difficulties in tracking down data tools. Solutions to overcome existing problems, of course, require equipment management information systems that can run equipment management to be more efficient and structured, and facilitate data collection tools. the method used in developing the system is a waterfall. This model consists of requirements analysis, system and software design, system and unit implementation, system testing, operation, and maintenance. With the application of equipment management, it will provide convenience in managing tool management in the Department of Electrical Engineering Education.

Page 1 of 3 | Total Record : 30