cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282161108110
Journal Mail Official
tin.journal@fkpt.org
Editorial Address
Jalan Sisingamangaraja No. 338, Medan, Sumatera Utara
Location
Kota medan,
Sumatera utara
INDONESIA
TIN: TERAPAN INFORMATIKA NUSANTARA
ISSN : -     EISSN : 27227987     DOI : -
Jurnal TIN: TERAPAN INFORMATIKA NUSANTARA memuat tentang Kajian Bunga Rampai dari berbagai ide dan hasil penelitian para peneliti, mahasiswa, dan dosen yang berkompeten di bidangnya dari berbagai disiplin ilmu seperti: Komputer, Informatika, Industri, Elektro, Telekomunikasi, Kesehatan, Agama, Pertanian, Pembelajaran, Pendidikan, Teknologi Pendidikan, Ekonomi dan Bisnis, Manajemen, Akuntansi, dan Hukum
Arjuna Subject : Umum - Umum
Articles 5 Documents
Search results for , issue "Vol 3 No 1 (2022): June 2022" : 5 Documents clear
Modifikasi Metode One-Time Pad Dan Chaostic Function Untuk Mengamankan Pesan Nyata Manalu
TIN: Terapan Informatika Nusantara Vol 3 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v3i1.1699

Abstract

Information is a collection of data in the form of unified text that is public or confidential. Confidential data is data that contains something or not to be published, because the data is important data. For that, the data needs to be secured. One way to secure the data is to use cryptography. Cryptography is a science that plays an important role in the field of information security. Cryptography has mathematical techniques related to information security aspects, such as data confidentiality and integrity, and authentication. Algorithms in cryptography are divided into two, namely symmetric key algorithms and asymmetric key algorithms. One that is included in the symmetric key algorithm is the one time pad. One Time Pad is a symmetric key algorithm that uses alphabetic substitution by using these letters as plaintext and key letters that have comparable positions. However, along with the development of human science, the weaknesses of the one time pad were found. One way to overcome the weaknesses of the one time pad above is to generate a more random key This study describes how the procedure is carried out to modify the key generation used in the one time pad algorithm. Key generation is done based on the Blum Blum Shub key generator, meaning that the key used in the encryption and decryption process is the key generated based on the chaostic function key generator. can be more optimal in securing data.
Perancang Aplikasi Game Cangkulan (Kartu Remi) Denganmenerapkan Kombinasi Algoritme Fisher Yatesshuffle Danlinear Congruent Method Hari Setiawan Asri
TIN: Terapan Informatika Nusantara Vol 3 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v3i1.1700

Abstract

Games are a type of entertainment that is liked by everyone from the age of children, adults and the elderly. Besides being used to relieve fatigue in activities, a game can also function to train a person's mindset to find solutions to solve a problem that exists in a game. In the past, games were played traditionally such as card games, chess, snakes and ladders, hide and seek, and others. Along with the development of technology, the game was developed into more modern technology, such as computers (PCs) or smartphones. Playing cards or hoe is a game with big cards that play two or four people, a player lowers from the same group of pictures, the winner is considered finished if one of them spends his cards. Randomization in hoop games is very important, because randomization is what makes the game interesting to complete. This could be avoided if the Fisher Yates shuffle (named after its inventors Ronald Fisher and Frank Yates) was used to change the order of randomly assigned entries. The permutations generated by this algorithm appear with the same probability. This algorithm is declared biased because the permutations generated by this algorithm appear with the same probability. This is evidenced by the experiment of randomizing a set of cards that is repeated
Kombinasi Metode SAW dan WASPAS Dalam Pemilihan Seleksi Penerimaan Tenaga Kerja Baru Sohan Fafarihna; Dinda Afwani; Soeb Aripin
TIN: Terapan Informatika Nusantara Vol 3 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v3i1.1701

Abstract

The company can run and develop forward with the presence of employees or workers who are capable of according to the company's needs. CV Turbo Mandiri Perkasa is a company that requires many employees who are employed in various fields within the company. The process of accepting new workers with various criteria and the desired quality, Assessing the ability of prospective employees so that highly superior employees are obtained. For the determination of labor acceptance so far it is still done manually, the lack of a supporting system that causes the quality of employees to be accepted so far has been complied with. The assessment process carried out manually takes a long time and creates opportunities for fraud in the assessment process. To overcome this, a fast and computerized system is needed, which is able to facilitate the determination of the selection of new workers based on the criteria determined by CV. Turbo Mandiri mighty. In this study, researchers used two combined methods, namely the Simple Additive Weighting (SAW) method and the Weighted Aggregated Sum Product Assessment (WASPAS) method. These methods were chosen because the techniques used in them can determine the best weight value from several predetermined criteria. So that each attribute can be selected from the best alternative results. This study resulted in 1 prospective worker who was entitled to graduate as an employee, namely an applicant named Edianto Simanihuruk from Alternative A3.
Model Prediksi Algoritma ANN Pada Jumlah Ekspor Barang Perhiasan Dan Berharga Menurut Negara Tujuan Arifah Hanum; Tri Welanda; Anjar Wanto; Agus Perdana Windarto
TIN: Terapan Informatika Nusantara Vol 3 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v3i1.1773

Abstract

Currently Indonesia is one of the exporting countries to industrialized and developing countries. The methods carried out in the research of the prediction of the export of jewelry and valuables from this main destination country use the ANN (Artificial Neural Network) method. The research data used comes from the official website of the government, the Indonesian Central Statistics Agency. In this study, the data used is data from 2013 to 2020 consisting of 8 destination countries, namely Switzerland, Singapore, Hong Kong, United Arab Emirates, South Africa, Taiwan, the United States, and India. Based on this data can be determined network architecture model, namely 3 - 4 - 1, 3 - 8 - 1, 3 - 12 - 1, 3 - 16 - 1 and 3 - 20 - 1. After training and testing of the 5 models, it can be obtained that the best architectural model is on the 3-12-1 model with an MSE value of 0.033777975 on the ANN method
Penyisipan Gambar Pada File Video Menerapkan Metode Two Sided Side Match Ledi Firman Zendrato
TIN: Terapan Informatika Nusantara Vol 3 No 1 (2022): June 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/tin.v3i1.3543

Abstract

When entering a message into the message container it often leaks the message. Like the insertion of images in video files, there are often leaks of inserted image messages caused by irresponsible parties or intentionally leaking the messages contained. As a result, the message to be sent will change or the message to be sent cannot be sent because these people deliberately leaked the contents of the message sent. Insertion using the Two Sided Side Match method allows the secret message to be sent to be more secure, because this method uses two neighboring pixel values ​​to be able to predict how many messages will be inserted in a pixel. So that the insertion can be done in such a way and the image files that are inserted in the video cannot be hacked by irresponsible people. This research can produce security applications and image insertion data can be secured without containing suspicion so that data leaks do not occur

Page 1 of 1 | Total Record : 5


Filter by Year

2022 2022


Filter By Issues
All Issue Vol 6 No 9 (2026): February 2026 Vol 6 No 8 (2026): January 2026 Vol 5 No 12 (2025): May 2025 Vol 5 No 11 (2025): April 2025 Vol 5 No 10 (2025): March 2025 Vol 6 No 7 (2025): December 2025 Vol 6 No 6 (2025): November 2025 Vol 6 No 5 (2025): October 2025 Vol 6 No 4 (2025): September 2025 Vol 6 No 3 (2025): August 2025 Vol 6 No 2 (2025): July 2025 Vol 6 No 1 (2025): June 2025 Vol 5 No 9 (2025): February 2025 Vol 5 No 8 (2025): January 2025 Vol 4 No 12 (2024): May 2024 Vol 4 No 11 (2024): April 2024 Vol 4 No 10 (2024): March 2024 Vol 5 No 7 (2024): December 2024 Vol 5 No 6 (2024): November 2024 Vol 5 No 5 (2024): October 2024 Vol 5 No 4 (2024): September 2024 Vol 5 No 3 (2024): August 2024 Vol 5 No 2 (2024): July 2024 Vol 5 No 1 (2024): June 2024 Vol 4 No 9 (2024): February 2024 Vol 4 No 8 (2024): January 2023 Vol 3 No 12 (2023): May 2023 Vol 3 No 11 (2023): April 2023 Vol 3 No 10 (2023): March 2023 Vol 4 No 7 (2023): December 2023 Vol 4 No 6 (2023): November 2023 Vol 4 No 5 (2023): October 2023 Vol 4 No 4 (2023): September 2023 Vol 4 No 3 (2023): August 2023 Vol 4 No 2 (2023): July 2023 Vol 4 No 1 (2023): June 2023 Vol 3 No 9 (2023): February 2023 Vol 3 No 8 (2023): January 2023 Vol 2 No 10 (2022): Maret 2022 Vol 3 No 7 (2022): December 2022 Vol 3 No 6 (2022): November 2022 Vol 3 No 5 (2022): October 2022 Vol 3 No 4 (2022): September 2022 Vol 3 No 3 (2022): August 2022 Vol 3 No 2 (2022): July 2022 Vol 3 No 1 (2022): June 2022 Vol 2 No 9 (2022): Februari 2022 Vol 2 No 8 (2022): Januari 2022 Vol 1 No 12 (2021): Mei 2021 Vol 1 No 11 (2021): April 2021 Vol 1 No 10 (2021): Maret 2021 Vol 2 No 7 (2021): Desember 2021 Vol 2 No 6 (2021): November 2021 Vol 2 No 5 (2021): Oktober 2021 Vol 2 No 4 (2021): September 2021 Vol 2 No 3 (2021): Agustus 2021 (in press) Vol 2 No 3 (2021): Agustus 2021 Vol 2 No 2 (2021): Juli 2021 Vol 2 No 1 (2021): Juni 2021 Vol 1 No 9 (2021): Februari 2021 Vol 1 No 8 (2020): Januari 2021 Vol 1 No 7 (2020): Desember 2020 Vol 1 No 6 (2020): November 2020 Vol 1 No 5 (2020): Oktober 2020 Vol 1 No 4 (2020): TIN: September 2020 Vol 1 No 3 (2020): TIN: Agustus 2020 Vol 1 No 2 (2020): TIN: Juli 2020 Vol 1 No 1 (2020): Juni 2020 More Issue