cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
jurnal.josyc@gmail.com
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Computer System and Informatics (JoSYC)
ISSN : 27147150     EISSN : 27148912     DOI : -
Journal of Computer System and Informatics (JoSYC) covers the whole spectrum of Artificial Inteligent, Computer System, Informatics Technique which includes, but is not limited to: Soft Computing, Distributed Intelligent Systems, Database Management and Information Retrieval, Evolutionary computation and DNA/cellular/molecular computing, Fault detection, Green and Renewable Energy Systems, Human Interface, Human-Computer Interaction, Human Information Processing Hybrid and Distributed Algorithms, High Performance Computing, Information storage, Security, integrity, privacy and trust, Image and Speech Signal Processing, Knowledge Based Systems, Knowledge Networks, Multimedia and Applications, Networked Control Systems, Natural Language Processing Pattern Classification, Speech recognition and synthesis, Robotic Intelligence, Robustness Analysis, Social Intelligence, Ubiquitous, Grid and high performance computing, Virtual Reality in Engineering Applications Web and mobile Intelligence, Big Data
Articles 8 Documents
Search results for , issue "Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020" : 8 Documents clear
Analisa Keamanan Data Teks Dengan Menerapkan Kriptografi RSA Dan Steganografi LSB Lindia Ali Fitriani
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (381.659 KB)

Abstract

For various reasons, security and confidentiality are needed in data communication. There have been several attempts to deal with the issue of security of confidential data sent over the Internet, including using cryptographic and steganographic techniques. Cryptography is the science and art of maintaining the confidentiality of a message by encoding it in a form that cannot be understood anymore. Cryptographic techniques can arouse suspicion of third parties who are not entitled to receive information because the message is disguised by changing the original message as if it were unreadable. Furthermore, the third party will have the desire to find out the contents of the secret message and try to solve the real information. Whereas steganography further reduces suspicion because a message disguised is hidden in other messages. Steganography can disguise messages into a media without other people realizing that the media has inserted a message. This is because the output of steganography is data that has the same form of perception as the original data when viewed using human senses in cryptography can be seen and realized directly by the human senses. In steganography, confidential data is inserted into other data called cover-objects and produce stego-objects (the results of steganography). To secure messages using steganography techniques LSB steganography is used and uses the RSA method. Keywords: Cryptography, Steganography, RSA and LSB Methods.
Penerapan Algoritma Unary Coding Pada Aplikasi Kompresi Short Message Service (SMS) Mesiria Sitorus
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (422.949 KB)

Abstract

Communication is an effort between human messages, the form of information delivered in various ways, namely with the form of sound, and text digitally. Therefore, the more information obtained digitally, it will require a very large text storage media. Short Message Service (SMS) is a facility of GSM (Global System for Mobile) technology to send and receive short messages in the form of text through mobile devices. The sender and recipient of the SMS need not be connected to each other when exchanging SMS messages. Text SMS compression can be done by several methods such as Unary Coding. Unary Coding is a type of lossless compression, and Unary Coding has been widely used data compression and is widely used with a combination of several modification techniques. In Unary Coding, compression is done by knowing the frequency of each symbol on a string. Then the frequency will be sorted by descending order. The acquisition of n for each symbol obtained from the descending order numbering is then encoded with n-1 bit 1 followed by one bit 0.
Modifikasi Platform Kunci Algoritma Playfair Untuk Meningkatkan Nilai Confusion Pada Ciphertext Rivalri Kristianto Hondro
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.105 KB)

Abstract

Cryptography is the science of "original manuscript" encoding techniques, called plaintext terms, the arrangement of which is encrypted using a key so that it becomes "random text that is difficult to read" or referred to as ciphertext. By doing this process, someone who does not have a decryption key cannot read the original data. The cryptographic application technique is often also called the Algorithm or Cipher, one of the cryptographic algorithms discussed in this article is the Playfair Algorithm. Modifications are made to the key table that is owned by the Playfair Algorithm so that there are additional characters besides letters, there are numbers and symbols. The result to be achieved is from the modification of the Playfair algorithm that can be applied to the encryption process so as to produce a ciphertext that has a confusion value. but it can also be applied to the decryption process so as to produce an understandable plaintext
Penerapan Algoritma Ant Colony Optimization Pada Aplikasi Pemandu Wisata Provinsi Sumatera Utara Berbasis Android Zakarial Anshory
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (435.376 KB)

Abstract

North Sumatra Province is a province that is rich in tourism. Lots of interesting tourism spots are scattered throughout the Province. But tourists tend to only know famous tourist areas in North Sumatra Province, such as Lake Toba and Samosir Island. In everyday life people are more familiar with the term guide than a tour guide or tour guide. A tour guide is basically someone who accompanies, provides information and guidance as well as advice to tourists in conducting their tour activities. The problem that often arises when tour guides carry out tourism activities, the tour guides must be on time to arrive at the destination, as well as share the schedule for tourists to do tourism activities, whereas not all tourists are on time before carrying out their tourism activities, and most tour guides only know the usual places and routes but not the closest route from the starting point, This can slow down tourism activities. The method to be used in determining these tourist attractions is the Ant Colony Optimization Algorithm, Ant Colony Optimization (ACO) adopted from the behavior of ant colonies that known as the ant system
Pembangunan Aplikasi E-Commerce Pemasaran Batik pada Toko Batik Rifqi Angger Wibowo; Aziz Setyawan Hidayat; Eva Rahmawati
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (685.433 KB)

Abstract

The use of the internet in the business world serves as a business strategy application, such as: marketing, sales, and customer service. This is evidenced by the many large companies that have used or used the internet for business development, for example, online stores. In doing business, entrepreneurs are faced with challenges as to how they can serve and provide the required information to customers quickly, without being limited by place, distance and time. it happens because of influential factors such as company location, limited operating hours, lack of product information can reduce the number of transactions and can even cause customers to switch to other companies better. The system development method used is SDLC (System Development Life Cycle), namely software requirements analysis, design, code generation, testing, support, or maintenance. MySQL as a database for PHP applications. With this e-commerce website, it is expected to make it easier for buyers to be able to buy batik that is sold in stores easily via the internet. With this website the seller can easily promote a wider range of people
Penerapan Algoritma AES 128-Bit dalam Pengamanan Data Kependudukan pada Dinas Dukcapil Kota Pematangsiantar Imelda Asih Rohani Simbolon; Indra Gunawan; Ika Okta Kirana; Rafiqa Dewi; S Solikhun
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (629.64 KB)

Abstract

Population data is information about the existence of someone in a country. The data can be accepted as validity through management in one of the government agencies. The issue of security and confidentiality of the data is something that is very important because it concerns the identity of a person, in order to avoid theft and manipulation of data it is necessary to apply a data security system. Cryptography is the study of mathematical techniques related to aspects of data and information security such as data validity, integrity, and data authentication. The Advanced Encryption Standard (AES) is one method used in data / information safeguards. The implementation of the AES algorithm in securing population data of the Population and Civil Registration Service shows that the method can produce messages that cannot be read or understood by humans (encryption) and produce the same message as the initial plaintext that was imputed (decryption)
Penentuan Masyarakat Penerima Bantuan Perbaikan Rumah di Kecamatan Siantar Barat Menggunakan Metode ELECTRE Roulina Simarmata; Rahmat W Sembiring; Rafiqa Dewi; Anjar Wanto; Eva Desiana
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (493.084 KB)

Abstract

Home improvement assistance is a government program for disadvantaged people. Home improvement assistance program is one of the government's efforts as a form of concern related to the condition of the homes of underprivileged communities. Therefore the purpose of this study is to determine the recipient of housing improvement assistance in the West Siantar Subdistrict as a reference material for the Office of Spatial Planning and Settlements (Tarukim) of Pematangsiantar city in providing housing repair assistance to be on target. The DSS method used in this study is the Elimination Et Choix Traduisant La Realita (ELECTRE) method. The alternative data samples used were 5, which were obtained from the Pematangsiantar Tarukim Office. This study also uses 5 criteria, including: roof material conditions, floor conditions, wall conditions, Work and Bathroom ownership. Based on calculations, Alternative 2 (A002) on behalf of Mr. Wariman was chosen as the best. Therefore, Mr. Wariman's family home is a community that is entitled to receive housing repair assistance in the West Siantar sub-district
Efesiensi Fisik Komputer Server dengan Menerapkan Proxmox Virtual Environment Saidi Ramadan Siregar
Journal of Computer System and Informatics (JoSYC) Vol 1 No 2 (2020): Journal of Computer System and Informatics (JoSYC) - Februari 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (478.788 KB)

Abstract

Along with the development of desktop and non desktop application software, the provision of services to accommodate requests from client computers is increasing too, which can be seen in terms of usage environment whether in local or public network coverage. for example an information system program created using the Microsoft visual studio.Net application by using database access, the server computer even though it uses a Windows operating system, and vice versa if the information system program that is built using a web programming language (opensource) is mostly among programmers choosing to use a web server with linux operating system. To do this, the network manager creates a solution so that the information system that is built from any programming language can be run on one physical computer server with a virtualization system by applying the Proxmox virtual environment as a virtual machine container that will accommodate several types of operating systems.

Page 1 of 1 | Total Record : 8