Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Computer Science, Information Technology and Telecommunication Engineering (JCoSITTE)

Development of EDUDA as a Media to Build Students 'Self-Resistance in Preventing Drugs Martiano Martiano
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 2, No 1 (2021)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v2i1.6956

Abstract

The use of drugs, especially in Sumatera Utara, Indonesia, has a fairly large increase and requires serious efforts. EDUDA is an application that can help students form their resilience assisted by counseling guidance teachers, parents, and peers in forming good character. The educational application has self-defense materials and direct assessment of students' self-resistance which can be seen by the counseling teacher as an evaluation material for improving the quality of student development. based on the results of the implementation of educational media in schools, namely in phase 1 the increase was 7.3 with an average of 84.55, in phase 2 the increase was 3.24 with an average of 87.73. whereas in phase 3 the increase was 3.27 with an average of 91.06. the increase in phase 3 has been proven in building students' self-resistance in preventing drugs
Cryptography Generator for Prevention SQL Injection Attack In Big Data Martiano Martiano; Yoshida Sary
Journal of Computer Science, Information Technology and Telecommunication Engineering Vol 3, No 2 (2022)
Publisher : Universitas Muhammadiyah Sumatera Utara, Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30596/jcositte.v3i2.11566

Abstract

Currently, especially in Indonesia, data leaks occur in domestic agencies and private e-commerce. From these problems, cryptographic researchers are needed to make the data difficult to read, this research forms cryptography through a substitution method which will determine the number of keys that have been used and generated back in the dictionary, in its implementation the researcher uses the Devops design method, this method uses 4 stages, namely 1. ) continues development, 2) continues testing, 3) continues integration, 4) continues development. The results obtained by the text can be encrypted and described perfectly and successfully as much as 15864 data, and consumes low resources