cover
Contact Name
HENGKI TAMANDO SIHOTANG
Contact Email
hengki_tamando@yahoo.com
Phone
-
Journal Mail Official
editor.mantik@iocscience.org
Editorial Address
Perumahan Romeby Lestari Blok C, No C14 Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Mantik
ISSN : -     EISSN : 26854236     DOI : -
Jurnal Mantik (Manajemen, Teknologi Informatika dan Komunikasi) is a scientific journal in information systems/informati containing the scientific literature on studies of pure and applied research in information systems/information technology,Comptuer Science and management science and public review of the development of theory, method and applied sciences related to the subject. Jurnal Mantik Penusa is published by Institute of Computer Science (IOCS). Editors invite researchers, practitioners, and students to write scientific developments in fields related to information systems/information technology,Comptuer Science and management science). Jurnal Mantik is issued 4 (FOUR) times a year.
Arjuna Subject : -
Articles 2,151 Documents
Indigenous Law on Land: How Does the Government Build Constitutional Protection Against Indigenous People Sisca Ferawati Burhanuddin
Jurnal Mantik Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol3.2020.1438.pp799-804

Abstract

Indonesia has a lot of cultural diversity and abundant natural resources, one of which is found in the customary law system as one of the traditional laws that has existed for a long time as one of the most influential laws for some Indonesian people. This study uses a descriptive method with a qualitative approach and data triangulation analysis, the results of the study explain that basically customary law does not only regulate the community government system, customary law also always plays a role in the ownership of customary land rights, where land rights are starting to experience many disturbances. as well as obstacles in its management and sustainability, to build a customary law that synergizes with state law, customary law begins to adapt and adapt to modern human civilization, basically the Indonesian government has recognized and guaranteed every continuity of the customary law, as contained in the Law and political law in Indonesia.
Implementation Parallel Computation for Automatic Clustering Bayu Dwiyan Satria; Ali Ridho Barakbah; Amang Sudarsono
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1439.pp994-1005

Abstract

Developments in the industrial world, especially in the field of computer technology, demand solutions to needs ranging from computing resources, storage media, and communication speeds. This was followed by many new studies in this field, including those related to clustering. Clustering is an exploratory data analysis tool that deals with the task of grouping objects that are similar to each other [1], [2]. Clustering requires computers with high resources, usually the price for computers with high resources, while computers with not too high specifications will be less reliable in handling such large data. Clustering that runs on a single-core processor takes a long time to execute tasks, so parallel computing is needed to speed up computing performance especially at Automatic Clustering. This research will produce faster performance in grouping large data by utilizing parallel computing and automatic clustering methods as methods for grouping data. This technology allows data processing to be carried out in parallel and distributed in hundreds or even thousands of computers, so this technology is very appropriate for processing very large amounts of data)
Effect of Attitude on Mobile Banking Acceptance Using Extended UTAUT Model Angelia Angelia; Erwin Setiawan Panjaitan; Roni Yunis
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1440.pp1006-1013

Abstract

This research aims to evaluate the effect of attitude on mobile banking acceptance using the extended UTAUT Model. Specifically, surveying the Medan city area covered 392 mobile banking users from several banks. By using Structural Equation Modeling (SEM) and SmartPLS software. This research’s man contribution is introducing attitude variables in the combination of UTAUT models, task technology fit, and trust, which have a significant effect on behavior intention. Based on this study results, it shows that social influence and attitude are a significant effect on behavior intention,facilitating condition, and behavior intention is a significant effect use behavior of mobile banking users from several banks. While performance expectancy, effort expectancy, task technology fit, and trust didn’t significantly effect on the behavior intention of mobile banking users from several banks. This Research implies two important policymakers’ findings. First, Banking Management needs to ensure that it always makes necessary improvements in simplifying technology to understand it easily. Second, need to ensure that we regularly evaluate the performance of mobile banking users from several banks to mae benefits of using M-Banking technology to support financial transactions needs.
The Effect of Compensation and Work Environment on Employee Work Motivation during the Covid 19 Pandemic at PT. Asoka Arians Properti - Medan Fajar Rezeki Ananda Lubis
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1441.pp1014-1018

Abstract

This study aims to determine the effect of compensation and work environment on employee work motivation during the Covid-19 pandemic. This research was conducted at PT. Asoka Arians Properti - Medan which is located at Taman Asoka Asri Complex Jalan Plamboyan Medan was conducted in March 2021. The samples taken in this study were employees of PT. Asoka Arians Property - Medan. Determination of the number of samples in this study using the Slovin formula with a total sample of 31 respondents. Data analysis using multiple linear regression test. The results showed that simultaneously and partially compensation and the work environment had a significant effect on employee work motivation during the Covid-19 pandemic.
Fire Alarm Application with Short Message Service (SMS) and Arduino FOR Reminder Information Display System in Puri Permai Tbk Housing M. Subchan; Aza Azhari
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1444.pp1030-1033

Abstract

Security disturbances do not only come from people who will do bad things but from other factors as well, for example the occurrence of fires which is a threat to us. Fire disasters can occur at any time regardless of time or place. The fire disaster will definitely cause damage, loss, maybe even casualties. If this happens in a government agency / office, then the loss incurred is the loss of important / valuable documents, thus affecting the implementation of daily tasks. So fire prevention and control is important. This prototyping method will produce a system prototype as an intermediary for developers and users in order to interact in the process of information system development activities. In order for the prototype making process to be successful, it is by defining the rules at an early stage, namely the developer and the user must have an understanding that the prototype was built to define initial requirements. When mQ2 detects smoke and the flame sensor detects a fire, then the buzzer turns on. Sim800l successfully sends a message when mQ2 detects smoke and the flame sensor detects a fire.
The Implementation of Augmented Reality and First Person Method of Promotional Media in Kemang Pratama Housing Bekasi Muhammad Atthalariq; Didik Setiyadi
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1445.pp1056-1064

Abstract

The promotional media used in the Kemang Pratama Bekasi housing complex uses brochures with 2D images, causing a lack of promotion of the housing. And if you want to see the condition or appearance of the house, you have to come to the location of the house in the Kemang Pratama Bekasi housing complex as a clear picture. But by using the implementation model of Augmented Reality and First Person Mode as a media for promoting housing in Kemang Pratama, Bekasi, it makes it easier for buyers to see the condition and appearance of the house in terms of home specifications, because it can display a 3D-shaped house using a smartphone camera as an initial image before seeing the house to the location. So with this technology it becomes more effective and efficient in terms of time. Augmented Reality is used to view the exterior with a brochure (as a marker) which is scanned using a camera and First person mode to see the interior of the house.
Zero Knowledge Authentication Modification for Drone and Server Communication Security Choirun Nisa; Amang Sudarsono; Mike Yuliana
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1446.pp1019-1029

Abstract

Drones are now being used in various fields. One of the uses of drones is for delivery service. When delivering goods, the drone needs to report its condition while traveling to the server so that the server can monitor the drone and the server can give some commands to the drone. However, when the drone receives data from the server, there are many vulnerabilities it has against the attacker that can take control of the drone device. Taking control of the drone can occur if the attacker manages to send a script that can take over control of the drone. If the attacker can take control over the drone device, the attacker can steal the drone both physically or data of the drone. For this reason, in this study, we propose an authentication algorithm that can filter out who is allowed to send data to the system. The algorithm used is Zero-Knowledge Authentication. To improve the performance of the Zero-Knowledge Authentication algorithm in terms of authentication speed, we try to combine it with the secret key generated from the Secret Key Generation process. From the results of authentication testing, the effectiveness of the proposed algorithm after a Brute Force attack experiment is 100% for single attacker scenarios and for multiple attackers the effectiveness is 100% in LOS and NLOS conditions. Because drones have limited resources, the authentication time experiment is also performed and the result is that in all scenarios the time required to authenticate is in microseconds so that the proposed algorithm can be implemented on drones with limited resources.
Database System Development Life Cycle (DSDLC) on System Libraries for Data Manipulation Language (DML) Using SQL Server 2008: - Didik Setiyadi
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35335/jurnalmantik.Vol5.2021.1448.pp1065-1071

Abstract

Database System Development Life Cycle (DSDCL) is a method in database development. While the database language used to modify and retrieve data in a database is Data Manilation Language (DML). The DML that is often used is Structured Query Language (SQL) which is used to search and manipulate data in relational databases. SQL consists of simple syntax in the form of commands to manipulate data, these commands are called queries. The query language is used in implementing the Library System database using SQL Server 2008 RDBMS. The first step before performing DML using the query editor, must have a database and data that has been implemented with SQL Server 2008. In this discussion, only 4 (four) DML statements are explained. namely select, insert, update and delete by using the Library System database with SQL Server 2008 RDBMS. The select statement is used to display data from a table (1 or more) in the database. Update is used to make changes to data in tables in the database. Insert is used to fill in data and delete is used to delete data in tables in the database.
Implementation Of Mobile Bimx System On Uma Kabuong Limo House Virtual Restoration Muhd Arief Al Husaini
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Indonesia has many potential heritage buildings, one of which is Uma Kabuong Limo in the Kampar district. The Uma Kabuong Limo building was damaged and restoration measures were needed. Conventional methods give rise to the potential availability of mobility of building data. This study aims to use BIMx mobile technology system as a restoration method that produces virtual simulations. This research is qualitative descriptive research with simulation and modeling research method, which utilizes technology in producing models and can simulate the building environment to be restored. The object of the research was the Nurdin family's Uma Kabuong Limo in Belimbing Island Village, Kampar Regency, Riau Province. The result of this study is to successfully build the Uma Kabuong Limo model and can be simulated in the BIMx application. The use of BIMx provides ease of the process and avoids mistakes in the decision-making of the restoration of the Uma Kabuong Limo building.
IMPLEMENTATION OF AMBIENT CONDITION, SPATIAL LAYOUT AND FUNCTIONALITY AND SIGN SYMBOLS AND ARTIFACTS IN IMPROVING CUSTOMER SATISFACTION AND CUSTOMER LOYALTY JANJI JIWA & JIWA TOAST Ahmad Azmi
Jurnal Mantik Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik)
Publisher : Institute of Computer Science (IOCS)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In the current era of globalization, it encourages intense competition in all areas of business, especially coffee shops which are growing rapidly. The development of trends in a coffee shop with certain characteristics triggers intense competition among operators of coffee shops. In terms of creating a competitive advantage, coffee shops must also focus on customer satisfaction. With the new habits, people are currently changing old habits to meet their needs, one of which is the demand for food tends to fast-food restaurants, cafes, or coffee shops. This research is a survey of Serious Janji Jiwa & Jiwa Toast consumers in Medan. The sampling technique uses accidental sampling of 180 people. Data analysis use path analysis. The data were processed using Smart PLS, The results of this study indicate that the ambient condition, spatial layout and functionality, and sign of symbols and artifacts have a significant on customer satisfaction and customer loyalty

Page 65 of 216 | Total Record : 2151


Filter by Year

2019 2026


Filter By Issues
All Issue Vol. 9 No. 4 (2026): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 3 (2025): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 2 (2025): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 9 No. 1 (2025): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 4 (2025): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 3 (2024): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 2 (2024): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 8 No. 1 (2024): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 4 (2024): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 3 (2023): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 2 (2023): Agustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 7 No. 1 (2023): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 4 (2023): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 3 (2022): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 2 (2022): August: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 6 No. 1 (2022): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 4 (2022): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 3 (2021): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 2 (2021): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 5 No. 1 (2021): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 4 (2021): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 3 (2020): November: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 2 (2020): Augustus: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 4 No. 1 (2020): May: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 4 (2020): February: Manajemen, Teknologi Informatika dan Komunikasi (Mantik) Vol. 3 No. 3 (2019): November: Manajemen, Teknologi Informatika dan Komunikasi (ManTIK) Vol. 3 No. 2 (2019): Augustus: Manajemen, Teknologi Informatiak dan Komunikasi (Mantik) Vol. 3 No. 1 (2019): May: Manajemen dan Informatika More Issue