cover
Contact Name
Darwis Robinson Manalu
Contact Email
manaludarwis@gmail.com
Phone
+628126496001
Journal Mail Official
manaludarwis@gmail.com
Editorial Address
Jalan Hang Tuah No 8 Medan, Sumatera Utara Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi
ISSN : 24427861     EISSN : 26143143     DOI : https://doi.org/10.46880/mtk
Core Subject : Science,
JURNAL METHODIKA diterbitkan oleh Program Studi Teknik Informatika dan Program Studi Sistem Informasi Fakultas Ilmu Komputer Universitas Methodist Indonesia Medan sebagai media untuk mempublikasikan hasil penelitian dan pemikiran kalangan Akademisi, Peneliti dan Praktisi bidang Teknik Informatika dan Sistem Informasi. Jurnal ini mempublikasikan artikel yang berhubungan dengan bidang ilmu komputer, teknik informatika dan sistem informasi.
Articles 212 Documents
OPTIMASI KETAHANAN WATERMARKING AUDIO DIGITAL MENGGUNAKAN ALGORITMA RSA DAN MSB Rumahorbo, Benget; Perangin-angin, Resianta
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 7 No. 1 (2021): Maret 2021
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v7i1.409

Abstract

Copyright is a serious problem in the digital world, the process of sending and distributing digital media is so easy nowadays, copyright in the digital world is very detrimental to those who feel that their digital rights are copied and pasted or taken without the consent of the creator. Therefore we need a way where when a digital file can be identified as original as a product, one of the right ways is to use a watermark technique. But often this watermark process can be lost or cannot be extracted because the digital file has gone through a compression process, duplicate, or something else. So in this study, it will be tried to increase the durability of a watermark in digital audio as a solution for identifying copyrighted digital works. Where the watermark process will use the RSA and MSB algorithms to enter information into a digital audio file, later this information can be extracted to view copyright ownership information from the digital audio. And it is hoped that this watermarking is resistant to various digital audio processes such as compression, duplication, and editing carried out on the file. the information that is inserted into is maintained without compromising the quality of the digital audio.
PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA Ndruru, Eferoni; Zebua, Taronisokhi
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.410

Abstract

A credit card application is a financial facility that allows a person or business entity to borrow money to buy a product and pay it back within a specified time. Credit card manufacture often experiences risk in providing credit, both moderate, good and very good risk, due to lack of data analysis and lack of attention. So the purpose of this study is to analyze the risks that often occur in making credit cards. And provide efficient solutions. In solving this problem, it is necessary to apply the method. The method used in this study is Nearest Neighbor. The Nearest Neighbor algorithm is an approach to finding cases by calculating the proximity between new cases (testing data) and old cases (training data), which is based on matching the weights of a number of existing features. Therefore, it can be applied in analyzing old customer data with data new so that comparisons can be made whether or not it is eligible to receive credit. The results obtained in this study are the results of testing systems and methods by producing a level of risk.
RANCANG BANGUN SISTEM PAKAR MENDIAGNOSA PENYAKIT OBSESSIVE COMPULSIVE DISORDER DENGAN METODE DEMPSTER SHAFER Nidia Enjelita; Adawiyah, Robiatul
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.412

Abstract

Anxiety is a normal reaction to stress and can be beneficial in some situations. It can alert us to dangers and help us prepare and pay attention. Anxiety disorders differ from normal feelings of nervousness or anxiousness and involve excessive fear or anxiety. Anxiety disorders can cause people to try to avoid situations that trigger or worsen their symptoms. There are several types of anxiety disorders, including Obsessive-Compulsive Disorder. Obsessive-Compulsive Disorder (OCD) is a disorder in which people have recurring, unwanted thoughts, ideas, or sensations (obsessions) that make them feel driven to do something repetitively (compulsions). Repetitive behaviors, such as hand washing, checking on things, or cleaning, can significantly interfere with a person’s daily activities and social interactions. This Expert system which implements Dempster Shafer Method can help anyone to make sure that they have OCD and need psychologist help to prevent this distress from becoming worst.
PENYIRAMAN TANAMAN SECARA OTOMATIS MENGGUNAKAN SENSOR SUHU DAN KELEMBABAN BERBASIS MICROCONTROLER Sitepu, Surianto
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.413

Abstract

Has designed a tool that serves to maintain the plant to grow well. Plants that grow well in need of treatment were quite good, especially in maintaining soil moisture. So that the land remains under inert conditions in accordance with the standard requirements necessary plants enough water. For that need attention regularly for watering plants. The automatic Plant Watering prototype uses temperature sensors and inertial-based Microcontroller Arduino Uno can be used in the treatment plant without the need to set watering schedules. In order for watering is not carried out during the day or during the scorching sun, the temperature sensor is used. Arduino microcontroller pin which has 14 digital input/output, which serves as the center of the brain process or the automatic sprinklers. The system was designed using a motor driver to drive the motor to pump water watering. Watering can prototype uses temperature sensors and inertial-based microcontroller Arduino Uno to move in automation tools for soil moisture has not been reached. If the soil moisture has been reached then the pump will stop watering the plants.
PENGGUNAAN METODE MULTILAYER PERCEPTRON PADA PREDIKSI INDEKS SAHAM LQ45 Pangaribuan, AB; A. Octa; B Hananto
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Forecasting stock prices is an analytical action that is needed as a first step to make decisions in determining the right moment to make buying and selling transactions on the stock exchange floor The amount of data used is 511 days in the period 31 May 2018 – 29 May 2020. This study aims to estimate three stock prices on a daily basis, namely PT. Telekomunikasi Indonesia (Persero) Tbk, PT.Astra International Tbk and PT. Kalbe Farma Tbk uses an artificial neural network model, namely Multilayer Perceptron (MLP)
OPTIMASI MESIN PENCARI BUKU FIKSI BERDASARKAN PADA SEMANTIK IMPRESI Bimantara, Varidh; Rengga Asmara; Nur Rasyid Mubtada’i
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.415

Abstract

Fiction books are one of the most popular books in Indonesia. There are five most popular genres in fiction books, namely fantasy, mystery, romance, sci-fi, and thriller. Each genre gives a different impression and its own fans for the reader. It is common practice when people choose fiction books based on the title, author, or publisher of the book. However, this does not provide precise search results. In this final project, an application system was developed to find out fiction books based on the semantic impressions contained on the cover of the fiction book. The impression on each book cover is obtained through a survey of fiction book lovers in Indonesia. To get the results of the proximity between the user search and the impression survey data obtained through text mining, as well as the cosine similarity algorithm to calculate the most precise proximity value to the impression expected by the user. The results of this system display fiction books that have the most precise proximity value to the impression expected by the user.
WATERMARKING PADA CITRA DIGITAL MENGGUNAKAN KOMBINASI PIXEL VALUE INDICATOR DAN METODE MOST SIGNIFICANT BIT Lumbanraja, Posma
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.416

Abstract

One way to protect the copyright and authenticity of a digital image is to affix a watermark in the form of writing or a sign on the image. If the affixed watermark is visible, then its presence can interfere with the appearance of the image and it is possible that the watermark will be cut, discarded, or cropped by parties who are not entitled to do so. In this paper, an application is designed to affix a watermark in the form of an invisible message, or an invisible watermark by using a combination of pixel value indicator and the Most Significant Bit (MSB) method on the image, so that it is not detected visually and the visual appearance of the image is not disturbed. The message is scrambled using a key, then the scrambled bits are hidden in the 5th bit MSB and the 6th bit of the green channel or blue channel, depending on the number of bits 1 owned by the red channel which serves as an indicator. The process of hiding the watermark is carried out in the middle area of ​​the image, so it is difficult to cut to remove it. Applications designed can be used to affix an invisible watermark in the form of messages that are not easily removed on digital images, so that they can protect the copyright of a digital image.
ANALISIS DAN IMPLEMENTASI JARINGAN THIN CLIENT MENGGUNAKAN LINUX TERMINAL SERVER PROJECT PADA JARINGAN LAN Hasibuan, Doli; Larosa, Fati Gratianus Nafiri; Simanjuntak, Rico VA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.417

Abstract

The development of computer technology both in software and hardware is very fast. These two aspects are interrelated with each other and cannot be separated. LTSP, Linux Terminal Server Project is a project started by James A McQuillan as a diskless networking project based on the GNU/Linux operating system. Called a diskless network, because the client is not equipped with a hard disk. All application software and operating systems needed by the client computer are served and managed by the server computer. In this design, a laptop with an Intel processor is used as a server and a PC as a client. LTSP will be integrated into the Linux operating system ubuntu 16.04, and as a provider of diskless thin client service platforms is LTSP (Linux Terminal Server Project). With LTSP, the construction of a diskless network is expected to be more efficient. Diskless network technology is one solution that can be applied in dealing with the problem of investing in computer technology hardware with predetermined specifications.
PERANCANGAN SISTEM INFORMASI PENGELOLAAN BARANG DI GUDANG RPX DOMESTIC STUDI KASUS : PT. ANTAREJA PRIMA ANTARAN Zahrah Nurlaila; Febri Diandari; Supono
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.419

Abstract

At this time PT. Antareja Prima Antaran or RPX often experience problems in warehousing such as calculating the time span of stored goods. It takes control of the activity of moving goods and documents to increase the efficiency of warehouse use so that the number and time span of goods are stored at a minimum value or according to the plan. In addition, based on the above problems, a warehouse checking system is made, the Early Warning feature to overcome overload in the warehouse, which is expected by customers not to need to be afraid and worried about the goods in the warehouse that will be sent through the RPX freight forwarder because there will be a checking facility for the goods arriving at the warehouse and the goods to be sent starting from the time the goods are entered and then processed to the place. Business Process Modeling Notation (BPMN) is a technique that enables all parties involved in the process to communicate clearly, correctly, and efficiently. In this way, BPMN defines the semantic notation of the Business Process Diagram (DPB). DPB is a chart based on the 'Flowchart' technique
IMPLEMENTASI INTRUSION DETECTION SYSTEM MENGGUNAKAN ALGORITMA BLOWFISH Studi Kasus DI DOTA CAFE Hasibuan, Doli; Naibaho, Jimmy Febrinus; Simanjuntak, Christian P
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 2 (2019): September 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i2.420

Abstract

Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. In everyday life, fraud is often found in important data, one of which is cashier system data. To prevent and overcome this, the concept of network security with the Blowfish Algorithm will be applied. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Unexpected things often occur such as foreign parties who want to enter the system by repeatedly trying the possible username and password, or foreign parties changing the data in the cash register at Dota Café. This system will function to monitor system activity, in this case if the system feels a threat or system disturbance is found.

Page 8 of 22 | Total Record : 212