Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : INFOKUM

Implementation Of Event Management Website Using CodeIgniter Framework Teo Rinaldi; Rahmad Budi Utomo; Rio Septian Hardinata
INFOKUM Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1373.979 KB)

Abstract

Event management is a part of organizing activities that are professionally, efficiently, effectively, and systematically. Event management includes concept planning, implementation of activities, and control over the expected organizers. The success of organizing events, it is necessary to have good event management. In order to have an information system that can assist in the implementation of the event. The event management information system that will be implemented utilizing web-based information technology, aims to facilitate the event organizing committee in processing event data, participant data, attendance data, and event activity reports. This event management information system uses the PHP programming language, MySQL as the database, and CodeIgniter as the framework. The method used in this research is the grounded method (grounded research), a prototype model uses for system development. The designed procedures include event publication procedures, registration, payment, and attendance. The result of this research is a web-based event management information system. The designed system, it is hoped that it can help the event committee solve problems that often occur and provide better procedures for participants and the organizing committee.
KEEPING FILE AUTHENTICITY WITH DIGITAL SIGNATURE TECHNIQUE USING A COMBINATION OF MD5 AND ELGAMAL ALGORITHM Dandi Herman Dinata; Nova Mayasari; Rio Septian Hardinata
INFOKUM Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (450.042 KB)

Abstract

This study aims to maintain the authenticity of the file to provide assurance to the recipient that the data is free from modifications made by other parties. If there is a modification to the file, then the recipient will know that the file is no longer authenticated, so that the recipient of the file avoids using the wrong data. To maintain the authenticity of the data, a digital signature technique is used using the MD5 algorithm as a hash function algorithm to generate a message digest, and the Elgamal algorithm as a public key algorithm that forms the digital signature of the message digest. The combination of the two algorithms will produce a digital signature for each file that can ensure the authenticity of the file.