METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi
JURNAL METHODIKA diterbitkan oleh Program Studi Teknik Informatika dan Program Studi Sistem Informasi Fakultas Ilmu Komputer Universitas Methodist Indonesia Medan sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan Akademisi, Peneliti dan Praktisi bidang Teknik Informatika dan Sistem Informasi. Jurnal ini mempublikasikan artikel yang berhubungan dengan bidang ilmu komputer, teknik informatika dan sistem informasi.
Articles
212 Documents
ANALISA METODE PENCARIAN HASH
Imelda Sri Duma Yanti
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.20
Hash Methods Search efficiency use of a better place. Search relative (Hash Search) is divided into two kinds, namely Hash Closed (Closed Hashing) and Hash Open (Open Hashing). On Closed Hash there is the possibility of more than one data has a value the same function, causing a collision (collision). The way to overcome this collision can be done with some strategies such as, Resolution Linear (Linear Resolution), and Double Hashing Overflow. Each - each strategy has its advantages and disadvantages
COMBINATION OF AES ALGORITHM WITH BLOWFISH ALGORITHM FOR FILE ATTACHMENT AT E-MAIL SENDING
Yongki Iswo;
Poltak Sihombing
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.21
Data security in the delivery of online file becomes very important in the world of information itself. One way that can be done for the security of the data is to perform encryption before the data is sent. Cryptographic message encoding divided into two symmetric and asymmetric. Kriptogarfi AES (Advanced Encryption Standard) is a symmetric cryptographic algorithms means that the key used in the encryption process is the same as the key to the decryption process. The analysis concludes theory, AES encryption process is designed to make the process of encoding in secret with no security level of complexity linear with time as efficiently as possible through the use of processes of transformation of light in the implementation. Aside from the AES algorithm, Blowfish algorithm is also a symmetric cryptographic algorithm. Theory analysis shows that Blowfih a cryptographic algorithm that uses a key with variable length provided that no more than 448-bit. Blowfish also combine non-reverse function f, keydependent S-Box, dun Feistel network. The process of encryption and decryption using the ECB and CBC operation has the same worst case is O (n). In this study the authors combine these two algorithms in the security of a file attachment in an email that is expected to increase the security file.
KONSEP DAN TANTANGAN PENGGUNAAN TEKNOLOGI E-MONEY SEBAGAI ALAT PEMBAYARAN ALTERNATIF DI INDONESIA
Lalu Delsi Samsumar
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.22
The use of electronic money (e-money) in the next few years in Indonesia will grow significantly. With e-money, will facilitate public transactions without the need to use cash. E-money is a non-cash payment instruments, these products save some money value stored in the electronic equipment. Nominal money stored electronically done by exchanging a sum of money or by debiting a bank account which is then stored in electronic equipment. Implementation of e-money in Indonesia, including late if compared to countries such as Hong Kong and Singapore. E-money introduced since 2007, while in Hong Kong in 1997 and Singapore in 2000. With the condition of the infrastructure in Indonesia, it takes a long time to peopleaccustomed to using e-money. Cultural society accustomed to transact in cash will be a challenge. To increase public confidence, Bank Indonesia has issued a regulation with e-money transactions. The use of e-money will also facilitate the public, because no longer need to carry cash. Transact using e-money is safe, because it uses technology that attention to standardization such as the use of chips.
PERANCANGAN APLIKASI KEAMANAN UNTUK MEMBATASI HAK AKSES USER BERBASIS WINDOWS
Mendarissan Aritonang
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.23
Windows operating system security system was needed to the things that are not expected, like perubahan configurations and settings on the Windows operating system that can automatically change the windows registry values can be fatal in windows operating system. Security applications for Microsoft Windows designed to make it easier for administrators to lock the windows and some functions of the executable file. This application can hide the drives are seen as critical data storage Microsoft windows security applications for this tool is designed by using Borland Delphi Programming
PEMANFAATAN APLIKASI DATA ANALYSIS DALAM MENGETAHUI TINGKAT KEPUASAN MAHASISWA TERHADAP LAYANAN AKADEMIK PADA STMIKAKADEMI BINA INSANI BEKASI
Petrus Dwi Ananto P;
Helenia Touana
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.24
In activities based on services, the customer satisfaction becomes very important thing to be noted. It is similarly with education. The student’s satisfaction towards academic services could be something that needs to be noted by the college. The measurement of student’s satisfaction level was done by using TERRA attributes (tangible, empathy, reliability, responsiveness, and assurance). The measurement of attributes on student’s satisfaction for tangible attributes are lecture equipment, teaching media, and educational facilities; for empathy attributes is the understanding of the students interest; for reliability attributes are the reliability of lecturers and academic staff; for responsiveness attribute is responsive attitude; and for assurance attribute is the treatment on the students. From all the attributes measured, STMIK-Akademi Bina Insaniagreed of all attributes included in the indicators of satisfaction. This statement proves that the students satisfied with the academic services in STMIK-Akademi Bina Insani. By the total sample is 278 students of STMIK-Akademi Bina Insaniwhich obtained information that the level of academic services at STMIK-Akademi Bina Insani is GOOD.
PENGENDALIAN MUTATION RATE PADA ALGORITMA GENETIKA
Rijois Iboy Erwin Saragih
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.25
Genetic algorithm is heuristic searching algorithm which based on nature selection of mechanism and nature genetic. The basic concept that inspires the genetic algorithm is that evolution theory. In the process of searching the best solution on classic genetic algorithm often occurs optimum local. Optimum local is a common problem which is often occurs in genetic algorithm, and one of the reasons is that because of the population diversity. If population diversity is too low is led to optimum local, and if it is too high caused more times to look for the best solution. Mutation operator plays an important role in the process of genetic algorithm to manage that population diversity and an important element of mutation operator is mutation rate. On classic genetic algorithm that mutation rate is set in the beginning while the process of genetic algorithm depends on how many generations are. Therefore is needed to control mutation rate in generation. Controlling mutation operator, especially mutation rate based on Fuzzy Logic Controller (FLC) to manage population diversity, not too high or too low, in order to get optimal result. Evaluation is done 10 times execution by comparing the performance of standard genetic algorithm (GA), IAG and genetic algorithm based on Fuzzy Logic Controller (FLC) and experimental results show that there is an improvement on genetic algorithm performance based on FLC.
ANALISIS PSNR PADA STEGANOGRAFI LEAST SIGNIFICANT BIT DENGAN PESAN TERENKRIPSI ADVANCED ENCRIPTION SYSTEM
Rimbun Siringoringo
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.26
Steganography is the art of hiding data on a medium other. Today, steganography is used to secure data by hiding it in other media so that the existence of the message is unintelligible. LSB steagnografi is the simplest method among other methods. LSB steganographic techniques susceptible to steganalisis. In this study the authors combine this with the LSB steganography method by cryptographic techniques. Cryptographic algorithm used is AES. Messages will be inserted first encrypted using the AES method. There are five image dataset being tested. Overall proficiency level datasets have different capacities. There are five types of hidden text with a capacity of 1K, 5K, 10K, 15K and 20K. Testing the quality of the imagebefore and after the embedding process was conducted by PSNR and MD. From the test is known that embedding the message affects the pixel values at specific coordinates on the cover image, the more the characters are pasted on the cover image PSNR value of its smaller, it indicates that the image quality is getting lower and berdanding PSNR value proportionalto the value of MD image.
SIMULASI ANTRIAN DENGAN MODEL M[X]/EM/C
Roni Jhonson Simamora
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.27
Queue associated with all aspects of a situation where customers have to wait for a given service, such as the queue with the arrival of customers in groups providing mass broadly in the real world, for example, the elevator in the buildings, visitors to the amusement park, air cargo shipments, and bus transporting. As a result of inaccuracy determine the number of servers in a queue can result in the number of customers who are not served. Queues models discussed in this study is the queue with the arrival of customers in groups.follows a Poisson process. The number of subscribers in each group is a random variable (X) and the time between the arrival of a customer using exponential distribution. The service time using Erlang distribution with parameter m (Em), the processing served by many server (C). This study uses simulation to analyze the average customer wait time in the queue, the average waiting time of customers in the system, the average number of customers in the queue, the average number of customers in the system and the probability of a busy server. The purpose of this research is to create a queue simulation model M [X] / Em / C so it can find the queue characteristics derived from the settlement with the simulation
SISTEM PAKAR KONSULTASI DAN KONSELING MAHASISWA BERMASALAH DARI PRESPEKTIF KRISTIANI
Benget Rumahorbo;
Darwis Robinson Manalu
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.28
In general, students are more tightly when faced with personal problems, financial problems, family and moral issues. So often there is a failure as a result of the issue unresolved. So expect the need for an application or system for media consulting experts to find a solution in accordance with their respective problems. So that problems can be detected early, it can use an application that has been designed based on the data of experts that has been incorporated into the database of knowledge. These types of problems and solutions are dynamic based on user needs and new knowledge experts found. Categories are often problematic issues of personality, economics and finance, family, education and other social issues. Data experts will first be incorporated as early knowledge that has been given by the experts. Sources of data obtained from the experience of experts encountered during counseling in college. Then the inference engine will draw final conclusions based on searches that have been determined on the basis of the rules. The goal is student can perform expert counseling through applications designed. The method used in the search is a method Best First Search and search by the method of backward chaining. Results from this study is a useful application for counseling for troubled students
ANALISIS RULE INFERENSI SUGENO DALAM SISTEM PENDUKUNG PENGAMBILAN KEPUTUSAN
Khairul Saleh
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 2 No. 1 (2016): Maret 2016
Publisher : Universitas Methodist Indonesia
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.46880/mtk.v2i1.29
The issue of decision-making, is essentially a form of selection of various alternative actions that may be selected which process a particular mechanism, with the hope of producing a best decision. Fuzzy logic can be used to describe a chaotic dynamic system, and fuzzy logic can be useful for systems that are complex dynamic in which the completion of the general mathematical model that can not work properly. Sugeno fuzzy method to compute efficiently and work well with the optimization and adaptive techniques, which makes it very well in a control problem, especially for non-linear dynamic systems.