cover
Contact Name
Zekson Arizona Matondang
Contact Email
zekson.arizona@yahoo.com
Phone
+6282276025678
Journal Mail Official
jurnalpitin@gmail.com
Editorial Address
http://jurnalnya.stmikneumann.ac.id/index.php/pitin/about/editorialTeam
Location
Kota medan,
Sumatera utara
INDONESIA
PITIN
ISSN : 25485997     EISSN : 26851768     DOI : -
Core Subject : Science,
Jurnal di STMIK KRISTEN NEUMANN INDONESIA setiap Jurnal Terbit Setiap Bulan Januari s/d Juni dan Juli s/d Desember setiap Tahunnya. Jurnal ini Media publikasi untuk bidang Ilmu Komputer seperti Fuzzy Logic, Teknologi dan Jaringan, Robotika, Komputasi, Mikrokontroller, Arsitektur Komputer, Sistem Cerdas, Rekayasa Web dan Mobile, Sistem Terdistribusi, Sistem Kontrol, Data Spasial, Cloud Computing, Pengolahan Citra, Komputer Grafik, Kriptografy dan bidang Ilmu Komputer sejenis.
Articles 16 Documents
Search results for , issue "Volume 3 Nomor 1 Tahun 2018" : 16 Documents clear
ANALISIS PERANCANGAN PROTOTYPE INTERNET of THINGS (IoT) PADA STMIK NEUMANN Andreas Paniroy Girsang; Bersama Sinuraya
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The use of computers in the future can dominate human work and defeat human computing such as controlling electronic equipment remotely using internet media, Internet of Things (IoT) allows users to manage and optimize electronics and electrical equipment using the internet. This makes these machineswork alone and humans can enjoy the work of these machines without having to bother managing them. The workings of the Internet of Things (IoT) are quite easy. Every object must have an IP Address. After an object has an IP address and is connected to the internet, the sensor is also installed. Currently atSTMIK NEUMANN has complete facilities for each classroom and lab room where air conditioners, lamps and other electronic devices are still manually controlled so that staff sometimes forget to turn off air conditioners, lights and other electronic devices. Therefore, by utilizing the internet network atSTMIK NEUMANN the author tries to make a simulation of the Internet of Things (IoT) to make it easier for staff to control electronic devices in STMIK NEUMANN.
SISTEM INFORMASI AKADEMIK SMA NEGERI 1 SIMPANG EMPAT KABUPATEN KARO Devi Oliviani Br Sitepu; Parasian Silitonga
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In current technological developments, fast and easy information is needed as a means of information that can manage academic information systems quickly and accurately. The design and manufacture of this website aims to facilitate the processing of academic data and can be a medium of information for all students, parents and teachers who have difficulty in obtaining data about the academic system. The facilities contained in this application in the form of providing data such as the homepage, profiles, contacts, news, student data, teacher data, classes, student guardians, subjects that are useful for the continuity of student learning. In the process of making a web consisting of apache server, PHP and MySQL, PHP, Apache as a web server, MySQL as a database.
IMPLEMENTASI VERNAM CIPHER UNTUK PENGAMANAN FILE TEKS Jeita Parulian Pinem; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the security processes that can be applied in the process file storage is to do the cryptographic process. The cryptographic process is carried out by randomizing the data, so that the original file is not easy to read by unauthorized parties. . The Vernam Cipher method is a symmetric key type algorithm, which is a key used to encrypt and decrypt using the same key. In the encryption process, the Vernam Cipher algorithm uses a stream cipher where the cipher is derived from the XOR results between the plaintext bit and the bit key. This research will discuss the cryptographic process of a text file. The cryptographic process consisting of encryption and decryption will use the Vernam Cipher method.
SISTEM INFORMASI PEMESANAN PAPAN BUNGA PADA VICTORIA FLORIST MEDAN BERBASIS WEB Sedarmin Sebayang; Bersama Sinuraya
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Flower board is one tool to express the good feeling of gratitude, sorrow. Diera development of information technology today it turns out there are still many upper and middle class companies do not follow the development of technology, where technology is increasingly rapid in the current era of globalization. All this time, flower board ordering at CV Victoria Florist has not been able to develop, either marketing or ordering each month because consumers need fast service and there is no need to choose a flower board at the location of the order. therefore to anticipate as well as to cope with service and ordering problems, we need a system that is able to overcome these problems to make consumers feel comfortable and timely in ordering flower boards.
MODIFIKASI ALGORITMA VIGENERE CIPHER UNTUK PENGAMANAN PESAN RAHASIA Jesmon Simangunsong; zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The confidentiality of messages or data owned by someone is important in sending messages sothat the message can only be given by certain people who can access the information. Cryptography isthe study of how to safeguard data or messages with the aim of preventing others from wanting to knowtheir contents, by using certain codes and rules and other methods so that only authorized people canfind out the true contents of the message. In the Vigenere Cipher algorithm the message security usesonly a single key and the alphabet as an encoding key to replace or substitution the character of themessage which makes the strength in the message transmission limited only to the use of the alphabet.In this research, the Vegenere Cipher algorithm was modified with 3 keys used and the vegenere ciphertable modified by adding numbers and 10 symbols so that the characters of the table are 46 charactersfrom the previous 26 characters. The results of this algorithm are able to encrypt secret messages anddecrypt them back into their original messages.
SISTEM PEMINJAMAN BUKU PADA PERPUSTAKAAN STMIK KRISTEN NEUMANN INDONESIA MENGGUNAKAN QR CODE Monica F Sebayang; Eliasta Ketaren
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The process of borrowing books at the STMIK Christian Neumann Indonesia library, always experiences problems or problems, namely the process of borrowing books is still done manually and not yet using a system on a computer. For that, we need a system that makes it easy to process book data and the process of borrowing books will be a fast, accurate, and precise system using QR Code as a tool for storing book data and for scanning book data using laptop cameras. So in this case, the authors designed a system with the programming language Visual Basic 2010 and Microsoft Office Access as the database. The results of this study indicate that the use of a book lending system using QR Code helps library staff in the process of borrowing and returning books.
SISTEM PAKAR DIAGNOSIS HAMA DAN PENYAKIT TANAMAN JERUK LEMON DENGAN TEKNIK INFERENSI FORWARD CHAINING Geri Reonaldo Sitepu; Murni Marbun
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is a research on expert systems that can detect or diagnose diseases in lemon plants. Forward chaining inference technique is one of the methods found in the expert system that can search for the type of disease with the most symptoms in the input, so as to produce conclusions in the form ofdiseases of each disease. This system is built with Visual Basic 2010 and MySql applications as the database. The expert system that is built is able to diagnose the types of diseases found in lemon plants. Diseases that can be diagnosed include CPVD, tristeza, woody gall, blend, powdery mildew, scabies, fruit rot, and premature decay. The purpose of this application is to make it easier for farmers to get lemon juice to consult about lemon plants. The diagnosis of lemon juice is a type of disease, as well as a solution offered by an expert system. This expert system is built by applying or applying forward chaining inference techniques to the process.
SISTEM PENDUKUNG KEPUTUSAN KELAYAKAN PEMBERIAN KREDIT PADA PT. BPR PIJER PODI KEKELENGEN DENGAN METODE (WEIGHTED PRODUCT ) WP Jesika Br Sinulingga; Jenny Veronika Ginting
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Credit is a financial facility that allows a person or business entity to borrow money to buy a product and repay it within a specified period. The provision of credit is the main activity of banks and finance companies (multi) which contain risks that can affect the health and business continuity of the bank. In giving credit to the right customers, because it has not been done computerized. To anticipate that there will be no difficulties, a Decision Support System is needed. One method that can be used for Decision Support Systems is to use a WP (Weighted Product). The research was conducted to find the weight value for each attribute, then carried out a ranking process that would determine the optimal alternative. The results of this study are more precise than the manual system used so far for creditworthiness
IMPLEMENTASI KRIPTOGRAFI MODERN DENGAN METODE RSA PADA DATA CITRA DIGITAL Zeyan Zico Deskiva; Zekson Arizona Matondang
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The development of technology at this time has greatly helped humans in various fields, especially in the field of communication, which only requires a short time in exchanging information. The information is stored in digital format, such as text, images, video, audio and other multimedia. Especially with regard to digital images, there are many applications to change images easily. This study aims to create an application that can be used to secure these images, especially in digital images, and one of the methods that can be used is cryptography. Cryptography is an art in maintaining the confidentiality of data. To maintain the confidentiality of the data cryptography changes the data that has meaning (plaintext) into a form whose meaning is unknown (ciphertext). This ciphertext will be sent to the recipient. The method used in this case is the asymmetric method with the Rivest Shamir Adleman (RSA) algorithm. The difficulty in factoring numbers into prime factors is the security location of the RSA algorithm, which aims to obtain public and private keys.
SISTEM PENDUKUNG KEPUTUSAN PENENTUAN DOSEN TERBAIK PADA STMIK KRISTEN NEUMANN INDONESIA DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) Elviani Br Tarigan; Ertina Sabarita Barus
PUBLIKASI ILMIAH TEKNOLOGI INFORMASI NEUMANN (PITIN) Volume 3 Nomor 1 Tahun 2018
Publisher : UPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

ecision support system aims to help managers or leaders to determine the best lecturers by considering several aspects as well as by giving importance to each aspect assessed. Based on this to determine the best lecturer, the method is used. The method used is Simple Additive Weighting (SAW). The study was conductedby finding the weight value of each criterion, and then normalizing the decision matrix to a scale that can be compared with all existing alternative ratings. The results of the calculation of this method are the results of ranking.

Page 1 of 2 | Total Record : 16