cover
Contact Name
HENGKI TAMANDO SIHOTANG
Contact Email
hengki_tamando@yahoo.com
Phone
-
Journal Mail Official
editor.mantik@iocscience.org
Editorial Address
Perumahan Romeby Lestari Blok C, No C14 Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mantik
ISSN : -     EISSN : 26854236     DOI : -
Jurnal Mantik (Manajemen, Teknologi Informatika dan Komunikasi) is a scientific journal in information systems/informati containing the scientific literature on studies of pure and applied research in information systems/information technology,Comptuer Science and management science and public review of the development of theory, method and applied sciences related to the subject. Jurnal Mantik Penusa is published by Institute of Computer Science (IOCS). Editors invite researchers, practitioners, and students to write scientific developments in fields related to information systems/information technology,Comptuer Science and management science). Jurnal Mantik is issued 4 (FOUR) times a year.
Arjuna Subject : -
Articles 2,151 Documents
Digital Preservation of Real World Objects Using Photogrametry from Digital Image Moch Fachri; Nur Hikmah
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.968.pp1616-1621

Abstract

One form of objects preservation is by converting real world objects into digital form. This allows historical information from these relics to be preserved even if due to some reason, the physical objects have disappeared. This research develops a digital image processing technology called photogrammetry to create three-dimensional models of real world objects. The use of photogrammetry is intended for digital preservation of real world objects which is formed in a 3D Reality Capture. The results we show that the digital information of real world objects can be presented in a virtual world and the data can be stored for preservation and future use.
UML Modeling and Black Box Testing Methods in the School Payment Information System Ibnu Rasyid Munthe; Bhakti Helvi Rambe; Rahmadani Pane; Deci Irmayani; Marnis Nasution
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.969.pp1634-1640

Abstract

The payment information system enables the entry of cash transaction data to SMA Teluk Panji through administrative staff (TU). The TU maintains the money payment reports that the students pay. This approach is useful and allows students to know more about the money they have to spend. This approach gives students complete knowledge in paper form. Useful reports to discover how much they charged and students who did not pay. Model UML is a visual language for modeling and designing information systems or applications. As support for the development of this information system, UML uses diagrams and text. Any significant modeling influences the design of useful applications. The system must meet its specifications and be capable of converting data into usable and efficient users. The black box evaluation method serves as a software assessment. The method operates from inside the unknown. When the system testers test this system as designed and focused on the school payment information system, the information system software is appropriately controlled by the external control mechanism. The prototyping method aims to summarise the application developed during these phases.
Online Disposition Data Based Management System Septian Rheno Widianto; Maria Magdalena
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.971.pp1641-1648

Abstract

The development of technology nowadays is so fast, technology has become part of the people's lifestyle. The presence of technology in human life can facilitate and accelerate all activities carried out so as to increase work effectiveness. Including services via smartphones and the internet. This has prompted many companies to develop their network and technological facilities. To be able to continue to develop in this increasingly rapid technological era, a company needs to present a data management system, namely a database system that provides computerized services and facilities. The main principle of a database system is to organize a set of interrelated data, while the main purpose of a database is the ease and speed of retrieving data to solve problems in systems that use a file-based approach. The result of this research is to observe the online disposition system data management.
Application of the Forward Chaining Method to Evaluate Lecturer Performance in Learning at the Kuantan Singingi Islamic University Helpi Nopriandi; Nofri Wandi Al-Hafiz
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.972.pp1649-1657

Abstract

Kuantan Singingi Islamic University Is a combination of three high schools in Kuantan Singingi Regency, Riau Province, has 4 Faculties with 13 Study Programs and 97 permanent lecturers and 3 non-permanent lecturers, whose main tasks are: transforming, developing, and disseminating science, technology. , and arts through education, research, and community service. Application of the Forward Chaining Method in which the inferencing engine uses user-defined information to move to AND and OR logic until an object is determined. All rules must be met so that one object will be achieved. This method is used for the process of evaluating the performance of lecturers in learning at the Kuantan Singingi Islamic University. This system will later be created using the web-based programming languages PHP and MySQL and converted into android which will be used by students in assessing lecturers who have carried out learning each semester. This system also makes it easier for LPMP to make decisions about the learning process that has been carried out by the lecturers.
Analysis of Mobile Based Software Development Model: Systematic Review Septian Rheno Widianto; Felicia Alhelga S.B.K; Asto Purwanto
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.973.pp1705-1713

Abstract

Software development has various methods, so the choice of software software method for a developer is very important in order to produce quality software according to standards. Based on this description, the importance of knowledge for a developer in choosing a development method, the authors will conduct a literature review in mobile software development methods. The choice of mobile software development method itself is due to the current mass shift among software providers from desktop and web to mobile. This systematic review aims to analyze a mobile-based software development model. In the compilation of this systematic review we use the new PRISMA (Preferred Reporting Items for Systematic Review and Meta-Analysis). This review shows the predominant method used in the development of mobile-based male devices. The conclusion of this systematic review is that the most commonly used software development models in mobile software.
Security Analysis of Wireless Local Area Network (WLAN) Network with the Penetration Testing Method Fikriyadi Fikriyadi; Ritzkal Ritzkal; Bayu Adhi Prakosa
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.974.pp1658-1662

Abstract

Wireless Local Area Network (WLAN) is an alternative in overcoming cabling problems in a local network. Often wireless network security that is installed still uses vendor default settings such as SSID, IP Address, remote management, DHCP enabled, frequency channels, without encryption, even user or password for wireless administration. How does a strong WLAN security system work? The most common security system applied to wireless networks at this time is starting from securing access points by applying the MAC Filtering concept, using WPA / WPA2-PSK security keys, and RADIUS server authentication. To see the quality of wireless LAN network security, how do you analyze the test of the existing security system in the network. The method that can be used in evaluating wireless networks is by testing the system by simulating forms of attacks on wireless networks with the Penetration Testing method. By carrying out 4 stages of research using the penetration testing method (i) the planning stage, (ii) the discovery stage, (iii) the attack stage and (iv) the report stage, from the attack stage (Cracking The Encryption, Bypassing MAC Address, Attacking The Infrastructure and MITM ) using Kali Linux got the results of four types of attacks carried out, only one of which was failed, namely the cracking attack type of the encryption on the RADIUS server due to using captive portal authentication
Implementation of Duck Egg Hatcher System and Web-Based Monitoring Dhimas Bagus Adi Saputro; Ritzkal Ritzkal; Bayu Adhi Prakosa
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.975.pp1701-1704

Abstract

Writing this research aims for Web-based egg incubators are tools or machines used to hatch poultry eggs such as ducks and the like, with temperature regulation using NodeMCU ESP 8266 as the control center, DHT11 sensor as temperature sensor, LCD as its appearance, lights and fans. NodeMCU ESP 8266 has an input in the form of a temperature sensor, this sensor will detect 2 temperatures in the incubator and display it on the LCD. This egg incubator uses a fan that functions as a cooler by removing heat in the incubator space and a lamp that functions as a heater, so the incubator will work automatically. How to design and implement a web-based set of duck egg hatching tools and how to display the egg incubator temperature and humidity information on a web connected to an egg incubator suite. By conducting 4 stages of research (i) Analysis of How the System Works and Analysis of Needs (ii) Design Hardware Design, Schematic Design, Database Design, WEB Design, Network Design (iii) Hardware Implementation and Software Implementation (iv) Testing. The results of this research are in the form of designing a duck egg incubator system and web-based monitoring including (i) DHT 11 Sensor Function Testing, Relay Function Testing, WEB Testing. Sensor and WEB testing are in accordance with their functions. The next test is to use the Blackbox on the implementation of the Duck Egg Performance system and Web-Based Monitoring. In this test it is in accordance with its function.
Comparative Analysis of Five Modulus an Pictorial Block Algorithms For Data Hiding in Digital Images Syandi Nainggolan; Yennimar Yennimar
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.976.pp1663-1670

Abstract

Steganography is an art and science that studies invisible communication from confidential data on a multimedia carrier such as image, audio and video files. The most popular steganography method is the LSB (Least Significant Bit) method. However, the LSB method is very vulnerable to attack by using basic image processing operations. In 2013, Jassim applied the Five Modulus method in the steganography process. Five Modulus method will solve a digital image into a set of image sub-blocks called windows with size n x n. A secret message will be inserted in that window. According to Jassim, the smaller the window size, the more secret messages that can be inserted into the image. Meanwhile, in the Pictorial Block steganography algorithm, the secret information will be stored in a grayscale digital image file and converted to ASCII values ??and the length of the information will be calculated. After that, the digital image will be divided into 2n x 2n blocks using the block truncation coding (BTC) algorithm. Then, the block will be converted to binary format and incorporate the original information on its decomposition matrix. The pictorial block steganography algorithm uses the BTC algorithm to convert the grayscale input image block into a binary image block so that the secret information bit insertion operation can be performed. The resulting steganography software can hide confidential data into a digital image. The secret data stored in the stego image can be extracted out in the extraction process.
The Influence of Service Quality, Promotion and Price on the Decision to Purchase Seafood Products at PT Jaya Hasil Laut Medan Adam Afiezan; Denny Wijaya; Vivi Cresia; Hendri Hendri
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.977.pp1671-1677

Abstract

This research was conducted at PT Jaya Seafood. The purpose of this study was to examine the effect of Service Quality, Promotion and Marine Product Decisions on PT Jaya Hasil Laut. The approach in this study is a quantitative approach. The expected population is 194 customers and the sample in this study is 131 customers. The research method used is multiple linear regression analysis. Service Quality, Promotion and Prices simultaneously and partially have a positive and significant effect on the Marine Product Purchase Decision at PT Jaya Hasil Laut
Analysis of T-Code Compression Methods to Increase Capacity of SSCE Method Marzuki Leo; Charles Halim; Iola Iola; Jeremy Valtino; Insidini Fawwaz
Jurnal Mantik Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/mantik.Vol4.2020.978.pp1678-1689

Abstract

The process of hiding classified information can take advantage of the steganography method. However, media such as images, audio or video is not efficient, due to the large size of the media, making text media a great solution for hiding confidential information. In 2011, a new steganographic method was introduced that uses special code generation based on the use of unlimited articles or on conjunctions with nouns that are not specific or specific to English. A new code representation method Secret Steganography Code for Embedding (SSCE) was also used to increase security. However, there is a problem with the application of this text steganography method, namely that the secret message has not been compressed, where if the cover text is smaller than the secret message, the secret message cannot be inserted into the cover text. To solve this problem, a text compression method can be applied. One of the compression methods that can be applied is the T-Code text compression method. The T-Code method uses the concept of iterative code construction and self-synchronization to compress and decompress text. From the testing process, information was obtained that every change of letter or word in the position where the secret message bit is attached will cause the secret message that is extracted to become chaotic and the T-Code compression method can increase the capacity of the cover document by 10.61%.

Page 36 of 216 | Total Record : 2151


Filter by Year

2019 2026


Filter By Issues
All Issue Vol. 9 No. 4 (2026): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 3 (2025): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 2 (2025): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 1 (2025): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 4 (2025): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 3 (2024): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 2 (2024): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 1 (2024): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 4 (2024): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 3 (2023): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 2 (2023): Agustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 1 (2023): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 4 (2023): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 3 (2022): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 2 (2022): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 1 (2022): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 3 (2021): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 1 (2021): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 4 (2021): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 3 (2019): November: Manajemen, Teknologi Informatika dan Komunikasi (ManTIK) Vol. 3 No. 2 (2019): Augustus: Manajemen, Teknologi Informatiak dan Komunikasi (Mantik) Vol. 3 No. 1 (2019): May: Manajemen dan Informatika More Issue