cover
Contact Name
Paska Hasugian
Contact Email
infokum@seaninstitute.org
Phone
+6281264451404
Journal Mail Official
infokum@seaninstitute.org
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
INFOKUM
Published by SEAN INSTITUTE
ISSN : 23029706     EISSN : 27224635     DOI : -
Core Subject : Science,
The INFOKUM a scientific journal of Decision support sistem , expert system and artificial inteligens which includes scholarly writings on pure research and applied research in the field of information systems and information technology as well as a review-general review of the development of the theory, methods, and related applied sciences. Software Engineering. Image Processing Datamining Artificial Neural Networks
Articles 202 Documents
Search results for , issue "Vol. 10 No. 5 (2022): December, Computer and Communication" : 202 Documents clear
Application of the AES Cryptographic Algorithm for E-mail Encryption and Description Atep Hidayat
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The problem of sending email data or messages has become an important problem in the era of information technology as it is today. Sometimes this data must be confidential so that it is not publicly known. If the data is known, then the data can be misused for crimes by other people. Cryptography is one of the security tools used to hide a message. Cryptography is already used in all areas of security. For this reason, security is needed by encrypting and decrypting email data using cryptographic algorithms. One of the most popular cryptographic algorithms is the RSA algorithm. This research will discuss the implementation of the RSA cryptographic algorithm for email encryption and decryption. For testing, a java-based email client program was created with message encryption and message decryption features. This application uses the Java programming language and Netbeans 7.4 as an editor. The mail server used is Google Mail. The initial step of this research is to download email from Google servers and encrypt the message. The second step is to decrypt the message to verify if the message is still the same as the original message before encryption. The results of this study are applications that can encrypt and decrypt messages using the RSA cryptographic algorithm. With this application, it is hoped that mail delivery will be much safer. Because encrypted email will generate a random decimal number whose value is unknown.
Fuzzy Mamdani Forecasting of Blood Bag Supply at Indonesian Red Cross Blood at Deli Serdang Regency Unit Ika Silvia Ramadani; Rina Filia Sari; Hendra Cipta
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

An increase in population will cause an increase in the amount of processed blood reserves. Therefore, it is necessary to forecast the amount of production within a certain period of time to see the number of blood bags that may be needed in order to meet demand correctly and in the appropriate amount. The method used is Mamdani fuzzy with data sourced from the Indonesian Red Cross Blood Unit Deli Serdang Regency from January 2019 to January 2020. This study shows that the Mamdani District fuzzy method can be implemented for forecasting the production of blood bags in January and February 2020.
Management A Legal Protection Women's Involvement In Narcotics Distribution With A Criminological Perspective Suci Ramadani
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

One of the modus operandi in drug trafficking is to make women drug dealers. The narcotics business is getting out of control because manufacturers and big dealers use women as dealers. In almost all countries, The main cause of women's involvement in the global chain of drug trafficking is poverty. Poverty not only marginalizes women from various walks of life but also increasingly drags women into crime. The problem in this research is how to regulate narcotics dealers according to Indonesian law, what factors cause women to be involved in narcotics trafficking in terms of criminology and what efforts and obstacles need to be made to overcome women's involvement in narcotics trafficking. The purpose of this research is to examine the problems discussed. The type of research used is empirical research, namely in answering are problems, a legal perspective is used based on applicable legal regulations, to be further linked to the reality on the ground relating to the issues to be discussed. carried out field data collection techniques for the Langkat Police by conducting interviews with investigators and suspects in cases of women's involvement in drug trafficking.. Efforts and obstacles need to be made to overcome the involvement of women in drug trafficking that most women who are involved in drug trafficking are those who are divorced from their husbands or do not have a job, so to make ends meet they sell narcotics. Efforts have been made to increase the skills of housewives, especially those with single-parent status.
A Legal Protection Of Children To Adults As Victims Parental Divorce According To The Marriage Law Number 16 Of 2019 Concerning Marriage Hasdiana Juwita Bintang
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Divorce often has a negative impact on post-divorce children. Not only disrupting growth but also disturbing the child's psychology and character. Protection in all aspects must be realized for the good of the child in the future with the guarantee of the legal rules that apply in Indonesia. The research in this writing uses normative research methods with the nature of descriptive research, while the type of data used is a literature review whose data collection materials are primary, secondary and tertiary legal materials. Legal arrangements regarding marriage in Indonesia are regulated in Law Number 16 of 2019 concerning Marriage, which explains the conditions for entering into a marriage based on the provisions stipulated in the law. Marriage is required to be notified and recorded at the Civil Registration Office. The existence of marriage will give rise to the rights and obligations of husband and wife with the aim of creating a harmonious and happy family. Divorce will occur if a husband or wife makes a mistake, namely adultery, commits domestic violence, or the husband is not willing to support and runs away from responsibilities which results in strife, bickering or debate that ends in divorce. Divorce will have an impact on the relationship between husband and wife, children and property. The importance of protecting children after a parent's divorce is something that must be guaranteed by law, both in the marriage law and the child protection law. Children as victims of parental divorce are entitled to maintenance.
AN INCREASING KNOWLEDGE ABOUT THE IMPORTANCE OF OCCUPATIONAL SAFETY AND HEALTH (K3) IN HOUSEKEEPING LABOR HOTELS Budhi Santri Kusuma; Abdurrozzaq Hasibuan; Suhela Putri Nasution; Arvina Putri Utami; Azila Rahimah Dalimunthe
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Occupational Safety and Health (K3) is defined as science and its application technically and technologically to prevent work accidents and occupational diseases from occurring in any work performed. From a legal perspective, OSH can be defined as an effort to protect every workforce and other people who enter the workplace are always in a healthy and safe condition and the resources of the production process can be carried out safely, efficiently and productively. The main objective in implementing K3 based on Law no. 1 of 1970 concerning Occupational Safety, namely protecting and guaranteeing the safety of every worker and other people in the workplace, guaranteeing that every source of production can be used safely and efficiently, and increasing national welfare and productivity. The method used in this article is a qualitative method, namely data that is narrative in nature, not numbers, where this data source comes from various journal references to strengthen reading results. therefore the hotel implements the K3 System in order to maintain the safety and health of the workforce and maintain the quality of the hotel. The method used in this article is a qualitative method, namely data that is narrative in nature, not numbers, where this data source comes from various journal references to strengthen reading results. therefore the hotel implements the K3 System in order to maintain the safety and health of the workforce and maintain the quality of the hotel. The method used in this article is a qualitative method, namely data that is narrative in nature, not numbers, where this data source comes from various journal references to strengthen reading results.
A Semiotic Analysis On “Covid-19 Vaccine: Bringing Us Together” Youtube Video Dwi Pebrina Sinaga
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research is an analysis of non-verbal semiotic symbol found in a youtube video entitled “Covid-19 Vaccines: Bringing Us Together”. This research is to find out the kinds of signs dominantly found in “Covid-19 Vaccines: Bringing Us Together” video and how the meanings of the signs are realized in “Covid-19 Vaccines: Bringing Us Together” video. To answer the problem, the researcher used the theories of semiotics proposed by Peirce (1965) supported by Danesi (2010) and Wierzbicka (1996). The kinds of sign were analysed by the triadic semiotic theory of Peirce, the meaning of signs were analysed by the non-verbal theory of Danesi and the color meaning was analysed by color theory of Wierzbicka. The research method is descriptive qualitative approach. It is descriptive qualitative because the researcher used interpretive analysis to analyse the sign on covid-19 video. Interpretation in qualitative research is a symbolic interaction between researchers and human experiences, objects, people, situations, and events. The researcher found that there are 24 data that have signs related to covid-19. The kinds of signs appeared in “Covid-19 Vaccines: Bringing Us Together” video are icon, qualisign, symbol, sinsign, rheme, argument, and legisign. Icon occured the most of all with 11 occurences, followed by qualisign with 10 occurences, symbol with 8 occurences, signsign, rheme, and argument with 4 occurences for each, and the last is legisign with 2 occurences. On the other hand, there are 2 kinds of sign cannot be found in this data which are decisign and index.
A Design Of Conservation Tourism Area In North Sumatera Using A Behavioral Architectural Benny Iskandar
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The design of tourism Sumatran Conservation Area in Tangkahan is a form of effort for the protection and preservation of Sumatran Elephant species. This design accommodates activities related to Sumatran Elephant species daily which includes conservation and tourism facilities. Conservation facilities are provided in the form of an elephant holding pens, elephant isolation pens, elephant socialization pens, elephant clinics, management offices, elephant handler (mahout) housing, and feed warehouses. Tourist facilities are in the form of recreational areas, namely visitors center, amphitheater, elephant riding area, elephant bathing area, and food court. The methodology used is to design the building through a descriptive qualitative behavioral architecture approach. The results of this research are in the form of design and design of the Elephant Conservation Area. The output produced is in the form of concepts and design drawings in schematic form.
Design of Information System for Satisfaction Level of Airline On Line Ticket Sales with Importance-Performance Analysis Method Bonie Empy Giri
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Demand for aviation services continues to increase each year, it can be seen from the increasing competition among airlines to increase ticket sales on-line. Marketing is one component in the science of Customer Relationship Management. Variety of extra services to entrepreneurs airlines can be seen from a variety of bonus or reward or ease of access in the process of buying and selling tickets so more encouraging entrepreneurs to spur travel or airline ticket sales increase. Under conditions of intense competition, the main thing that should be prioritized by the airline company is the satisfaction of customers or passengers to survive, compete and mengusai market share. which is why the need to do research level user satisfaction tickets on-line services targeting entrepreneurs in accessing the website travel airline with the Importance and Performance Analysis (IPA).
DESIGN OF WEST JAVA CULTURE LEARNING MEDIA BASED ON INTERACTIVE MULTIMEDIA FOR CILANDAK BARAT 08 SDN Yasin Efendi; Sodikin Sodikin; Rizky Ramadhan
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Science is developing rapidly enough to produce an innovation and new changes. Technology in the form of interactive multimedia is one of the impacts of current technological developments. Interactive multimedia is a communication method in which the output of the media comes from the input and participation of the user. Media still serves the same purpose but user input adds interaction and brings interesting features of the system for better enjoyment. In the form of an interface between the end user/audience and the media can be considered interactive. Interactive multimedia is not limited to electronic media or digital media. Board games, pop-up books, game books, flip books and constellation wheels are examples of printable interactive multimedia
Implementation of Question Bank Applications for Website-Based Students Pandi Barita Nauli Simangunsong; Satria Yudha Prayogi; Sony Bahagia Sinaga
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Every tertiary institution, both private and public, has students with high and low scores. This also happened at the Catholic University of Santo Thomas, a private university in Medan, North Sumatra. So a solution is needed that can help students improve their grades, and one way is to make the previous year's questions a reference for student learning. So, a service or application is also needed that accommodates all the questions that exist at a university such as a question bank that can be accessed easily. The Waterfall method is used for the process of developing system engineering and software in an orderly and systematic manner. This method is taken with a systematic approach starting from needs analysis, system and software design, implementation, unit testing and development. In this application, users can upload questions they have, look for questions as references, mark questions that are considered important and download questions that are needed. Where is the purpose of making this application, students no longer have to bother looking for material references through the questions that were tested before. Where is the purpose of making this application, students no longer have to bother looking for material references through the questions that were tested before. The Waterfall method is used for the process of developing system engineering and software in an orderly and systematic manner. This method is taken with a systematic approach starting from needs analysis, system and software design, implementation, unit testing and development. In this application, users can upload questions they have, look for questions as references, mark questions that are considered important and download questions that are needed. Where is the purpose of making this application, students no longer have to bother looking for material references through the questions that were tested before. In this application, users can upload questions they have, look for questions as references, mark questions that are considered important and download questions that are needed. Where is the purpose of making this application, students no longer have to bother looking for material references through the questions that were tested before. In this application, users can upload questions they have, look for questions as references, mark questions that are considered important and download questions that are needed. Where is the purpose of making this application, students no longer have to bother looking for material references through the questions that were tested before.

Page 7 of 21 | Total Record : 202


Filter by Year

2022 2022


Filter By Issues
All Issue Vol. 14 No. 02 (2026): Infokum, March-April 2026 Vol. 14 No. 01 (2026): Infokum, January - February 2026 Vol. 13 No. 06 (2025): Infokum Vol. 13 No. 05 (2025): Infokum Vol. 13 No. 04 (2025): Infokum Vol. 13 No. 03 (2025): Infokum Vol. 13 No. 02 (2025): Infokum Vol. 13 No. 01 (2025): Infokum Vol. 12 No. 04 (2024): Engineering, Computer and Communication, November 2024 Vol. 12 No. 01 (2024): Engineering, Computer and Communication, Edition January 2024 Vol. 11 No. 05 (2023): Engineering, Computer and Communication Vol. 11 No. 04 (2023): Agustus : Engineering, Computer and Communication Vol. 11 No. 03 (2023): Juni : Engineering, Computer and Communication Vol. 11 No. 02 (2023): April, Engineering, Computer and Communication Vol. 10 No. 03 (2022): August, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 02 (2022): Juni, Data Mining, Image Processing, and artificial intelligence Vol. 10 No. 5 (2022): December, Computer and Communication Vol. 10 No. 4 (2022): October, computer, information and engineering Vol. 10 No. 1 (2021): Desember, Data Mining, Image Processing, and artificial intelligence Vol. 9 No. 2, June (2021): Data Mining, Image Processing and artificial intelligence Vol. 9 No. 1,Desember (2020): Data Mining, Image Processing,artificial intelligence, networking Vol. 8 No. 2, Juni (2020): Data Mining, Image Processing and artificial intelligence Vol. 8 No. 1, Desembe (2019): Data Mining,Image Processing and artificial intelligence Vol. 7 No. 2, Juni (2019): Data Mining And Image Processing Vol. 7 No. 1, Desembe (2018): Data Mining And Image Processing More Issue