cover
Contact Name
Ainul Hizriadi, S.Kom., M.Sc.
Contact Email
ainul.hizriadi@usu.ac.id
Phone
-
Journal Mail Official
jocai@usu.ac.id
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
Data Science: Journal of Computing and Applied Informatics
ISSN : 25806769     EISSN : 2580829X     DOI : -
Core Subject : Science,
Data Science: Journal of Computing and Applied Informatics (JoCAI) is a peer-reviewed biannual journal (January and July) published by TALENTA Publisher and organized by Faculty of Computer Science and Information Technology, Universitas Sumatera Utara (USU) as an open access journal. It welcomes full research articles in the field of Computing and Applied Informatics related to Data Science from the following subject area: Analytics, Artificial Intelligence, Bioinformatics, Big Data, Computational Linguistics, Cryptography, Data Mining, Data Warehouse, E-Commerce, E-Government, E-Health, Internet of Things, Information Theory, Information Security, Machine Learning, Multimedia & Image Processing, Software Engineering, Socio Informatics, and Wireless & Mobile Computing. ISSN (Print) : 2580-6769 ISSN (Online) : 2580-829X Each publication will contain 5 (five) manuscripts published online and printed. JoCAI strives to be a means of periodic, accredited, national scientific publications or reputable international publications through printed and online publications.
Arjuna Subject : -
Articles 5 Documents
Search results for , issue "Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)" : 5 Documents clear
The Cluster Analysis of Online Shop Product Reviews Using K-Means Clustering Nainggolan, Rena; Eviyanti Purba
Data Science: Journal of Computing and Applied Informatics Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v4.i2-2855

Abstract

Technological developments have made changes in people's lifestyles, namely changes in the behavior of people who had shopped directly or offline to online. Many benefits are obtained from shopping online, namely the many conveniences offered by shopping online, besides that there are also many disadvantages of shopping online, namely the many risks in using e-commerce facilities, namely the problem of product or service quality, safety in payments, fraud. This research aims to mine review data on one of the e-commerce sites which ultimately produces clusters using the K-Means Clustering algorithm that can help potential customers to make a decision before deciding to buy a product or service
Analysis of Knowledge Management in Information Systems Faculty of Da'wah and Communication Studies UIN Syarif Hidayatullah Jakarta based on Usability Evaluation Hardi, Tomi
Data Science: Journal of Computing and Applied Informatics Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v4.i2-3969

Abstract

Information systems are media used to channel information. each campus has a medium for channeling information. One of them is the UIN Syarif Hidayatullah Jakarta campus. One of the information systems owned by Uin Syarif Hidayatullah Jakrta is the information system at the Faculty of Da'wah and Communication Studies. In this system there are several parts, namely the homepage, accreditation, academic, student affairs, library and others. The purpose of this study is to evaluate Usability to improve user satisfaction in using this information system. The research method used is literature study, field studies and SUMI (Software Usability Measurement Inventory) questionnaire. The questionnaire was conducted on 20 respondents namely 10 lecturers and 10 students of the da'wah and communication faculty. The questionnaire was carried out in 3 categories, namely effectiveness, efficiency and satisfaction with the linker agreed, disagreed and did not know. The results of the SUMI questionnaire calculation of the information system are 80, 75,75,70,70,87.5. The usability evaluation results are above average, meaning that usability in the Da'wah and Communication faculty information system has been going well.
Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish Haryono, Wasis
Data Science: Journal of Computing and Applied Informatics Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v4.i2-4004

Abstract

Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.
A Hybrid Cryptosystem Using Vigenère Cipher and Rabin-p Algorithm in Securing BMP Files Budiman, Mohammad Andri; Muhammad Yogi Saputra; Handrizal
Data Science: Journal of Computing and Applied Informatics Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v4.i2-4173

Abstract

Vigenère cipher is a classical cryptography algorithm and similar to other classical algorithms, it produces smaller but less secure ciphertexts than a public key cryptography algorithm. Meanwhile, Rabin-p is a public key cryptography algorithm with a stronger encryption than Vigenère cipher. Nevertheless, as a public key algorithm, Rabin-p is inefficient to encrypt vast amounts of messages such as BMP image files, since the size of the cipherimages will increase manyfold and this would lead to a problem in storing and sending the cipherimages. To overcome these problems, in this study, we combined the Vigenère cipher and the Rabin-p algorithm in a hybrid cryptosystem scheme. In the experiment, the Vigenère cipher was used to encrypt the BMP files and the Rabin-p algorithm was used to encrypt the Vigenère keys. The result showed that the size of the cipherimages did not increase and the decryption procedure could recover the original BMP files while maintaining their integrity.
Impact of Cloud-based Infrastructure on Telecom Managed Services Models Anicho, Ogbonnaya; Tariq Abdullah
Data Science: Journal of Computing and Applied Informatics Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI)
Publisher : Talenta Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.32734/jocai.v4.i2-4339

Abstract

This paper examines how cloud-based infrastructure is impacting classical implementations of telecom Managed Services (MS) models with focus on network operations and maintenance (O&M). The migration of legacy network assets to the ‘cloud’ has altered traditional telecom network configuration. This work explores how cloud-based network infrastructure may alter MS models in the telecom network domain. It is expected that the unique offerings of cloud-based solutions will impact existing MS models and may require redesigning or adjusting operation and maintenance processes and frameworks. As network infrastructure migrates to the cloud, telecom MS delivery models must evolve as well to satisfy new requirements. This paper lays out essential aspects of traditional MS models that may be impacted as a result of cloud-based infrastructure. It further proposes a framework, and conceptual software design for systematically analysing the gaps in current MS models in order to identify requirements for improved MS delivery in the cloud era.

Page 1 of 1 | Total Record : 5


Filter by Year

2020 2020


Filter By Issues
All Issue Vol. 10 No. 1 (2026): (In Press) Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 9 No. 2 (2025): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 9 No. 1 (2025): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 8 No. 2 (2024): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 8 No. 1 (2024): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 7 No. 2 (2023): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 7 No. 1 (2023): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 6 No. 2 (2022): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 6 No. 1 (2022): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 5 No. 2 (2021): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 5 No. 1 (2021): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 4 No. 2 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 4 No. 1 (2020): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 3 No. 2 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 3 No. 1 (2019): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 2 No. 2 (2018): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 2 No. 1 (2018): Data Science: Journal of Computing and Applied Informatics (JoCAI) Vol. 1 No. 1 (2017): Data Science: Journal of Computing and Applied Informatics (JoCAI) More Issue