Zekson Arizona Matondang
STMIK Kristen Neumann Indonesia

Published : 8 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 8 Documents
Search

Pengujian Metode Kuantitasi Untuk Melakukan Kompresi Citra RGB Pilipus Tarigan; Zekson Arizona Matondang
JUKI : Jurnal Komputer dan Informatika Vol. 1 No. 2 (2019): JUKI : Jurnal Komputer dan Informatika, Edisi November 2019
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53842/juki.v1i2.20

Abstract

At present the use of RGB images is a necessity in various fields. However, its use is constrained by a large file capacity, but it is possible to compress the image that is owned as needed. With the quantization method, the R matrix, the G matrix and the B matrix will be reduced, so that the number of bits used to represent the image will be reduced. Because the number of bits is reduced, the file size becomes smaller. The quantization method is included in the Lossy Compression category, so the compressed image cannot be decompressed again because there is information missing.
Perancangan Aplikasi Media Informasi Lembaga Kursus Berbasis Web Muhammad Iqbal Panjaitan; Zekson Arizona Matondang
JUKI : Jurnal Komputer dan Informatika Vol. 1 No. 2 (2019): JUKI : Jurnal Komputer dan Informatika, Edisi November 2019
Publisher : Yayasan Kita Menulis

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53842/juki.v1i2.21

Abstract

Abstract-Website can be interpreted as a collection of pages that are used to publish information in the form of text, images and other multimedia programs in the form of animation (motion pictures, motion writings), sound, and or a combination of all of them both static and dynamic that form one a series of interrelated buildings between one page and another page. In this paper the design of applications that can be used as part of the dissemination of information to course institutions to increase the introduction of these agencies, to the design through the DFD design, database relation design and form design will be used as a reference in making websites.
PENGEMBANGAN E-COMMERCE SISTEM PEMASARAN BUKU ROHANI PADA TB.ABDI KARYA DENGAN METODE USER CENTERED DESIGN Jenni Veronika Ginting; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 4 Nomor 1 Tahun 2019
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

User Centered Design is a design philosophy that places users as the center of a system development process. The difficulty of users so far in reading and translating documents in each development can be helped by using the UCD method. User Centered Design can be applied in the development of a system, in this study applied in a system of spiritual book insertion in the book store Abdi Karya. The UCD approach has been supported by various techniques, methods, tools, procedures and processes that help design interactive systems that are more user-centered. In the UCD method the user is in the level of design sophistication of all the graphical interfaces used and the content of the admin information. When interacting with admin information users must get the same comfort in accordance with their experience using other systems.
IMPLEMENTASI VERNAM CIPHER UNTUK PENGAMANAN FILE TEKS Jeita Parulian Pinem; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the security processes that can be applied in the process file storage is to do the cryptographic process. The cryptographic process is carried out by randomizing the data, so that the original file is not easy to read by unauthorized parties. . The Vernam Cipher method is a symmetric key type algorithm, which is a key used to encrypt and decrypt using the same key. In the encryption process, the Vernam Cipher algorithm uses a stream cipher where the cipher is derived from the XOR results between the plaintext bit and the bit key. This research will discuss the cryptographic process of a text file. The cryptographic process consisting of encryption and decryption will use the Vernam Cipher method.
MODIFIKASI ALGORITMA VIGENERE CIPHER UNTUK PENGAMANAN PESAN RAHASIA Jesmon Simangunsong; zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The confidentiality of messages or data owned by someone is important in sending messages sothat the message can only be given by certain people who can access the information. Cryptography isthe study of how to safeguard data or messages with the aim of preventing others from wanting to knowtheir contents, by using certain codes and rules and other methods so that only authorized people canfind out the true contents of the message. In the Vigenere Cipher algorithm the message security usesonly a single key and the alphabet as an encoding key to replace or substitution the character of themessage which makes the strength in the message transmission limited only to the use of the alphabet.In this research, the Vegenere Cipher algorithm was modified with 3 keys used and the vegenere ciphertable modified by adding numbers and 10 symbols so that the characters of the table are 46 charactersfrom the previous 26 characters. The results of this algorithm are able to encrypt secret messages anddecrypt them back into their original messages.
IMPLEMENTASI KRIPTOGRAFI MODERN DENGAN METODE RSA PADA DATA CITRA DIGITAL Zeyan Zico Deskiva; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of technology at this time has greatly helped humans in various fields, especially in the field of communication, which only requires a short time in exchanging information. The information is stored in digital format, such as text, images, video, audio and other multimedia. Especially with regard to digital images, there are many applications to change images easily. This study aims to create an application that can be used to secure these images, especially in digital images, and one of the methods that can be used is cryptography. Cryptography is an art in maintaining the confidentiality of data. To maintain the confidentiality of the data cryptography changes the data that has meaning (plaintext) into a form whose meaning is unknown (ciphertext). This ciphertext will be sent to the recipient. The method used in this case is the asymmetric method with the Rivest Shamir Adleman (RSA) algorithm. The difficulty in factoring numbers into prime factors is the security location of the RSA algorithm, which aims to obtain public and private keys.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN TEMPAT WISATA TERFAVORIT DI NIAS SELATAN DENGAN METODE WEIGHTED PRODUCT (WP) Erni Agus Giawa; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Decision support system for determining the location of the favorite tourism object is an application that was intentionally built to facilitate the work of employees at the Department of Tourism in determining the place of favorite tourism objects, problems that occur in the process of determining the most favorite tourist objects such as subjective assessment and irrelevant actually so that it cannot be used as a basis for decision making. If this decision-making process is assisted by a computerized decision support system, it is expected that subjectivity in decision making can be reduced. Therefore, it is necessary to design a Decision Support System application using the Weighted Product method, so that later it will be able to produce an effective and efficient analysis.
IMPLEMENTASI JSON VOLLEY PADA LOGIN PAGE UNTUK AUTENTIKASI USER PADA APLIKASI MOBILE Zekson Arizona Matondang; Andy Syahputra Bukit
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 5 Nomor 2 Tahun 2020
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of mobile at this time has experienced developments in various circles, especially in Indonesia. This research focuses on how to make an application for user authentication on the login page on an Android Smartphone, by retrieving user data that has been registered in the database, using HTTP Connection and JSON Volley methods. Creating applications using the Java programming language with the help of the Eclipse IDE and MySQL for database server tools. In this study, the Application Program Interface (API) is a collection of PHP source code, the contents of which are a query to retrieve data from the database and will be coded into the JSON Form.