cover
Contact Name
JTIK (Jurnal Teknik Informatika Komputer)
Contact Email
jtik.kaputama@gmail.com
Phone
+6285360005202
Journal Mail Official
jtik.kaputama@gmail.com
Editorial Address
-
Location
Kota binjai,
Sumatera utara
INDONESIA
JTIK (Jurnal Teknik Informatika Kaputama)
Published by STMIK Kaputama Binjai
ISSN : 25489704     EISSN : 26860880     DOI : https://doi.org/10.1234/jtik.v4i1
Core Subject : Science,
JTIK (Jurnal Teknik Informatika Kaputama) diterbitkan oleh Program Studi Teknik Informatika Kaputama sebagai media untuk menyalurkan pemahaman tentang aspek-aspek sistem informasi berupa hasil penelitian lapangan, laboratorium dan studi pustaka. Jurnal ini Terbit 2x setahun yaitu bulan januari dan bulan juli, pada JTIK fokus dan mempunyai ruang lingkup pada bidang Teknik Informatika. Seperti Data mining, Keamanan Jaringan dll.
Articles 561 Documents
PERGESERAN BENTUK PADA BUKU BILINGUAL SCIENCE BIOLOGY FOR JUNIOR HIGH SCHOOL GRADE IX SUPRIADI, SUPRIADI
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 4 No. 1 (2020): Volume 4, Nomor 1, Januari 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v4i1.634

Abstract

Transposition has a very important role in the translation because the structure of the source language is often different from that the target language. By applying the transposition, then the translator can customize the translation in the target language with a more flexible and easier to read and understand. Without applying the transposition, a translation will be stiff and could even have no meaning because the structure is not adapted to the target language, and it may be very confusing for readers. This study aims at 1) describe the types of transposition that occur in a book translation Bilingual Science Biology for Junior High School Grade IX.
PEMODELAN SISTEM INFORMASI PENILAIAN PRESTASI KERJA PEGAWAI KANTOR DINAS KOMUNIKASI DAN INFORMATIKA (DISKOMINFO) KOTA PONTIANAK Pratama, Eri Bayu; Kadarusman, Kadarusman
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 4 No. 1 (2020): Volume 4, Nomor 1, Januari 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v4i1.635

Abstract

Employee performance appraisal is a way of evaluating employee work performance with a set of objective benchmarks that are directly related to one's duties and are carried out regularly. Employee performance appraisal is carried out by the Pontianak City Office of Communication and Information with conventional techniques so that the presentation of employee performance reports is not timely, inaccurate and less than optimal. The author intends to conduct research to solve the problems experienced by the Office of Communication and Information Pontianak by designing employee performance appraisal information systems using UML (Unified Modeling Language) modeling consisting of diagrams use cases, class diagrams and sequence diagrams. Data collection techniques are done using descriptive methods to collect data, analyze and interpret it. As well as having a user (actor) who acts as access to manage the information system that will be used, the user (actor) consists of Employees, Section Heads (KASI) and Heads of Offices. Employees can fill in the attendance list every working day. Section Head can process employee data, work target data, integrity and quality data as well as work performance data. The Head of Service can process user data and access employee performance reports.
PEMODELAN DIAGRAM UML SISTEM PEMBAYARAN TUNAI PADA TRANSAKSI E-COMMERCE Syarif, Muhamad; Nugraha, Wahyu
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 4 No. 1 (2020): Volume 4, Nomor 1, Januari 2020
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v4i1.636

Abstract

The use of technology in the business world can help make work easier. Technology makes data stored more standardized and processing data into information faster. Sales transactions and payment transactions are business activities that need attention, both of these transactions need to be monitored so that business processes can run well and as desired. This research designs sales and payment information systems, payment transactions can be made in cash on e-commerce sales systems. The system is designed using UML diagram modeling to illustrate the needs and what content can be done by the system. Payment system modeling is expected to be a tool that can help transaction processing become more standardized and produce reports quickly.
KOMPARASI ALGORITMA KLASIFIKASI DATA MINING UNTUK MEMPREDIKSI TINGKAT KEMATIAN DINI KANKER DENGAN DATASET EARLY DEATH CANCER Rahayuningsih, Panny Agustia
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.637

Abstract

Cancer is something big in the world. Cancer is a malignant disease that is difficult to cure if the spread is too wide. However, detecting cancer cells as early as possible can reduce the risk of death. This study aims to predict the level of early detection of disasters in European countries using 5 classification algorithms, namely: Desecion Tree, Naïve Bayes, k-Nearset Neighbor, Random Forest and Neural Network of which algorithm is the best for this study. Tests carried out with several stages of research include: dataset (data contains), initial data processing, proposed method, credit method using 10 times cross validation, test results and t-test different tests. The alpha value is 0.05. if the probability is> 0.05 then H0 is accepted. If the probability is <0.05 then Ho is rejected. The results of the research that obtained performance with an accuracy value of 98.35% were the Neural Network algorithm. Whereas, the results of the research using the algirtic t-test with the best models are: Random Forest algorithm and Neural Network, the relatively good Naïve Bayes algorithm, the Desecion Tree algorithm is quite good and the poor algorithm is the K-Nearset Neighbor (K-NN) algorithm.
PERANCANGAN APLIKASI KEAMANAN PESAN TEKS DENGAN MENGGUNAKAN ALGORITMA TRIPLE DES Siregar, Nurmarlina
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.638

Abstract

Triple DES (Triple Data Encryption Standard) is one of the symmetrical algorithms on cryptography that is used to secure data in the form of text messages by encoding text messages. The process carried out in encoding the data, namely the encryption process and the decryption process. The triple DES algorithm is an algorithm for the development of the DES (Data Encryption Standard) algorithm. The difference between DES and triple DES lies in the length of the key used. In DES it uses one key that is 56-bit long, while triple DES uses three keys that are 168-bits in length (each of which is 56 bits long). In triple DES, the three keys used can be mutually independent (K1, K2 and K3) or only two keys are mutually independent and one other key is the same as the first key (K1, K2 and K3 = K1). Because the level of confidentiality of the DES algorithm lies in the length of the key used, the use of the triple DES algorithm is considered safer than the DES algorithm. To facilitate the use of the triple DES algorithm, a triple DES algorithm program was created with computer software tools, namely Microsoft Visual Studio 2008 which can encrypt and decrypt text messages.
PERANCANGAN APLIKASI PEMBELAJARAN KRIPTOGRAFI PADA ALGORITMA DATA ENCRYPTION SYSTEM (DES) MENGGUNAKAN METODE COMPUTER ASSISTED INTRUCTION OKTARIA, RISKA
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.639

Abstract

Learning is the process of interaction of students with educators and learning resources in a learning environment. Learning is assistance provided by educators so that an agreed process of knowledge and knowledge can occur, mastery of proficiency and character, and formation of attitudes and beliefs in students. In other words, learning is a process to help students learn well. Cryptography is a study of mathematical techniques related to aspects of information security, such as confidentiality data, validity data, integrity data, and authentication data. All information about information security can be regulated by cryptography. Cryptography can be interpreted as a science or senior for securing messages. Computer Assisted Instruction (CAI) is a system for delivering microprocessor-based subject matter that is designed and programmed into the system. Computer Assisted Instruction (CAI) defines as the use of computers in completing agreed materials with students actively and allows feedback
RANCANG BANGUN APLIKASI KRIPTOGRAFI PADA TEKS MENGGUNAKAN METODE REVERSE CHIPER DAN RSA BERBASIS ANDROID Yusfrizal, Yusfrizal
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.640

Abstract

Quick progress also occurs in the field of cellular communication networks with the concept of open systems, making it easier for someone to enter into the network. This can cause the process of sending data to be unsafe because it can be used by other parties who are not responsible for taking data and information in the middle of the road. To achieve the goal of maintaining confidentiality, various kinds of security techniques have been developed. To protect and maintain the confidentiality of data to avoid people who are not entitled to obtain this information, namely using cryptographic methods. In terms of data security techniques, many cryptographic methods can be used. Cryptographic methods have their own techniques and methods. One of the cryptographic methods that can be used is the Reverse Cipher method. But if you only use the Reverse Cipher method, text data security is very weak. So to achieve a higher level of security this method is combined with the RSA method which uses a public key and has high security because the difficulty of factoring large numbers becomes prime factors in the RSA algorithm.
APLIKASI PEMBELAJARAN KRIPTOGRAFI HILL CHIPER DENGAN MENGGUNAKAN METODE COMPUTER BASED INSTRUCTION SIANTURI, PENNY SEPTIANI
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.641

Abstract

Application of Information Technology in the current era of globalization is very important. Especially in our developing country, it is in dire need of various information and technology that can be applied to the progress of this nation. But to carry out this task, there are still many obstacles that must be faced both from the cultural conditions, the condition of the country and its human resources. This learning objective serves to facilitate the user in learning the material on Hill Chiper Cryptography and is an alternative in overcoming several problems such as limited time, and several other factors and can reduce the tedious learning atmosphere. Cryptography Hill Chiper Learning Application by using CBI Method (Computer Based Instruction) is a method developed with computer media, where the teaching method is directly to the user through how to interact in learning topics that have been packaged in a software application.
KAJIAN COIL STANDART DAN RACING TERHADAP KOMSUMSI BAHAN BAKAR PADA MESIN 125 CC PASARIBU, SABAR
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.642

Abstract

This study aims to determine the effect of coil voltage on fuel consumption in supra x 125. Coil is used as a modifier of low voltage current into high voltage to produce sparks on spark plugs. and is expected to get various benefits, including the use of fuel so as not to be wasteful. In this study, experimental research methods were used. The research tools of multitester, measuring cup, gasoline material results in carrying out this research are the average amount of fuel for coil racing 1.50 ml / minute for standard coil 1.64 ml / minute shows higher the coil racing voltage is a lot of fuel that is hugged to process in the combustion chamber compared to standard coil does not require the amount of fuel for the process in the combustion chamber use standard coil voltage so that the use of fuel is not wasteful.
Implementasi Algoritma DES (Data Encryption Standard) Pada Enkripsi Dan Deskripsi SMS Berbasis Android Adhar, Deny
JTIK (Jurnal Teknik Informatika Kaputama) Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019
Publisher : STMIK KAPUTAMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59697/jtik.v3i2.643

Abstract

The development of technology makes the birth of a tool that is the forerunner to the formation of Short Messaging Service (SMS), namely pagers. However, with the community's need to send messages quickly, accurately and safely make technology experts create a device that is a cellphone. Cellphone or mobile was first created already equipped with SMS feature. When a message or data becomes important and is privacy, it is necessary to protect the data. Therefore experts created an algorithm method to secure data. This method is called the encryption and decryption method to secure highly confidential messages or information from irresponsible and unauthorized people. There are various kinds of encryption algorithms with each characteristic that can be used, one of which is the DES (Data Enryption Standard) algorithm. DES is a symmetric encryption algorithm, where the process of encrypting and decrypting messages uses the same key. So even though a cryptografe understands the algorithm used to encode the message, but if you don't know the key used, it won't be able to decrypt the message so that the SMS message is really safe.

Filter by Year

2017 2026


Filter By Issues
All Issue Vol. 10 No. 1 (2026): Volume 10, Nomor 1, Januari 2026 Vol. 9 No. 2 (2025): Volume 9, Nomor 2, Juli 2025 Vol. 9 No. 1 (2025): Volume 9, Nomor 1, Januari 2025 Vol. 8 No. 2 (2024): Volume 8, Nomor 2, Juli 2024 Vol. 8 No. 1 (2024): Volume 8, Nomor 1, Januari 2024 Vol. 7 No. 2 (2023): Volume 7, Nomor 2, Juli 2023 Vol. 7 No. 1 (2023): Volume 7, Nomor 1, Januari 2023 Vol 7, No 1 (2023): Volume 7, Nomor 1 Januari 2023 Vol 6, No 2 (2022): Volume 6, Nomor 2 Juli 2022 Vol. 6 No. 2 (2022): Volume 6, Nomor 2, Juli 2022 Vol. 6 No. 1 (2022): Volume 6, Nomor 1, Januari 2022 Vol 6, No 1 (2022): Volume 6, Nomor 1 Januari 2022 Vol 5, No 2 (2021): Volume 5, Nomor 2 Juli 2021 Vol. 5 No. 2 (2021): Volume 5, Nomor 2, Juli 2021 Vol. 5 No. 1 (2021): Volume 5, Nomor 1, Januari 2021 Vol 5, No 1 (2021): Volume 5, Nomor 1 Januari 2021 Vol. 4 No. 2 (2020): Volume 4, Nomor 2, Juli 2020 Vol 4, No 2 (2020): Edisi Juli Nomor. 4 Volume. 2 Tahun 2020 Vol 4, No 1 (2020): VOLUME 4 NOMOR 1, EDISI JANUARI 2020 Vol. 4 No. 1 (2020): Volume 4, Nomor 1, Januari 2020 Vol 3, No 2 (2019): VOLUME 3 NOMOR 2, EDISI JULI 2019 Vol. 3 No. 2 (2019): Volume 3, Nomor 2, Juli 2019 Vol. 3 No. 1 (2019): Volume 3, Nomor 1, Januari 2019 Vol 3, No 1 (2019): Edisi Januari 2019 Vol. 2 No. 2 (2018): Volume 2, Nomor 2, Juli 2018 Vol. 2 No. 1 (2018): Volume 2, Nomor 1, Januari 2018 Vol 2, No 2 (2018): EDISI JULI 2018 Vol 2, No 1 (2018): Edisi Januari 2018 Vol 1, No 2 (2017) Vol 1, No 1 (2017) Vol. 1 No. 2 (2017): Volume 1, Nomor 2, Juli 2017 Vol. 1 No. 1 (2017): Volume 1, Nomor 1, Januari 2017 More Issue