MEANS (Media Informasi Analisa dan Sistem)
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles
14 Documents
Search results for
, issue
"Volume 3 Nomor 2"
:
14 Documents
clear
Audit Manajemen Keamanan Teknologi Informasi Menggunakan Standar ISO 27001 : 2005 Di PerguruanTinggi XYZ
Sidik, Muhammad;
Iriani, Ade;
Yulianto, Sri
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (455.242 KB)
|
DOI: 10.54367/means.v3i2.272
Management audit is very important for any colleges towards the examination and assesment of their information technology management to gain efficient and effective business running process. Information technology security as an effort of internal controlling for risk and threat security minimization, is mainly considered due to all learning and lecturing administration activities use information technology. To find out how secure technology information is, it is then recquiring an audit to make sure everything run based on procedure. Standard used is framework international standardization organization (ISO) 27001:2005. It ischosen because framework can be adjusted with instrument of the research used in the organization. It is then developed and focused on information security management system (SMKI). As a results, all have outcome JPA = PA1:PA10, NA=JPA/10 produces value average 65%. Last but not at least, it showspositive level, but still under expectation by college requirement that requires continuous evaluation and enhancement of recommended security control
Implementasi Metode Technique for Order Preference by Similarity to Ideal Solution dalam Pemilihan Jenis Kerang Konsumsi
Siregar, Kristian;
Siagian, Edward Robinson
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (344.724 KB)
|
DOI: 10.54367/means.v3i2.289
Shellfish is a type of seafood consumed by consumers. In selecting the right type of shellfish, it must be adjusted to the wishes of consumers. To get optimal results a system is needed that can help in determining the type of shellfish so that consumers feel satisfied. Technique for Order Preference by Similarity to Ideal Solution or TOPSIS is a method with the concept that each alternative is chosen and the best is not only to have the shortest distance of each positive ideal solution, but also to have the longest distance of any existing ideal negative solution . The criteria in this system vary, each tailored to the preferences of consumers or prospective buyers of shellfish provided by the producer. Based on the results of the sample selection shows that the calculation results using the same system with manual calculations. This system is able to provide an election for purchasing shellfish.
Sistem Informasi Potensi Kependudukan Desa Sukajulu Berbasis Web
Ginting, Monika;
Pakpahan, Sorang
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (382.421 KB)
|
DOI: 10.54367/means.v3i2.278
Village Potential is the whole of the resources owned or used by the village both human resources (HR), natural resources (SDA) and institutions or infrastructure and facilities to support the acceleration of community welfare. However, in notifying the potential possessed by Sukajulu village, it has not been able to be understood quickly because it does not yet have a village potential website. Where village officials still have difficulties in providing potential information to village communities and the wider community. So with the above problems, the writer wants to build a potential information system of Sukajulu Village that will facilitate village officials in inputting village potential data inputs and make it easier to publish Village data, especially in Sukajulu Village, by utilizing computer applications that have been created and can convey information quickly and accurately for both the village community and the wider community who need information about the potential of Sukajulu Village
Implementasi Data Mining Dalam Pengelompokan Jurusan yang Diminati Siswa SMK Negeri 1 Lolowa'u menggunakan Metode Clustering
Ndruru, Eferoni;
Limbong, Riswan
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (596.025 KB)
|
DOI: 10.54367/means.v3i2.273
Education is a very important thing and will continue to grow as time goes by, in Indonesia it is rather difficult to keep up with that development. In an effort to provide quality education in a school institution, it is necessary to attract students in choosing the best department in the school. The purpose of this student's specialization in the selection of majors is very important in supporting the knowledge of higher education and the enthusiasm of these students in developing knowledge in the chosen field, such as problems that have occurred in Lolowa'u N 1 Vocational School where students choose majors in accordance with people's encouragement others without any interest in the department, resulting in a decrease in enthusiasm for learning. Therefore, the grouping of students 'data in each department is done and grouped by value, because from this value can be seen the students' enthusiasm for learning. . Data mining is one way to convert data into useful information and can produce new knowledge. The method used is clustering, this clustering method is a method of grouping data. The results obtained in this study are the results of grouping data based on values and can be determined by interested students.
Sistem Pendukung Keputusan Seleksi Penerimaan Asisten Praktikum menggunakan Metode Fuzzy Tsukamoto
Ompusunggu, Abed Nego;
Sitorus, Lamhot
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (599.974 KB)
|
DOI: 10.54367/means.v3i2.290
Practicum is one of the academic activities carried out by students in the laboratory. This activity was carried out to develop student motor competencies in several courses that have practicum. So that understanding the theory can be practiced in this activity. In this practical activity involves a practicum assistant, where the practicum assistant is the students selected through a selection to carry out the task of guiding the practitioner in practical activities. Generally, this selection process requires a predetermined assessment. However, in the faculty of computer science the choice of practicum assistant is still done manually so that it is less effective in carrying out the results of the calculations. Suggestion for consideration for the lab to choose a practicum assistant so that it can speed up the process and can produce the best decisions about who the assistants receive. Tsukamoto method is one method in terms of multi-criteria decision making that can be used for these problems.
Teknik Pemilihan Alat Kontrasepsi bagi Pasangan Usia Subur dengan Metode Analytical Hierarchy Process
Sunandar, Hery;
Siregar, Kristian
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (478.299 KB)
|
DOI: 10.54367/means.v3i2.279
Contraception is an action to prevent pregnancy. Where currently there are enough tools, methods and types of contraceptives for men or women, implementation can be done in two ways, namely using contraceptive aids or without contraception. The problem that occurs in BKKBN and women's empowerment is the selection of good contraceptives used which still uses a simple computerized system that is using Microsoft Excel applications in the processing process. In solving this problem, the author uses the Analytical Hierarchy Process method to describe the weights that fit the criteria that are appropriate for the selection of family planning tools that are well used in BKKBN and women's empowerment. Analytical Hierarchy Process or often called AHP is a technique for decision making in determining the best choice from several alternatives. AHP is a mathematical model procedure that is well suited for the evaluation of qualitative attributes. These attributes are mathematically quantified in a set of comparisons in pairs. The advantages of the AHP method when compared to other decision-making methods is to have a hierarchical structure as an impact of the criteria taken, to the very detailed and detailed sub criteria
Aplikasi Penyembunyian Data Rahasia Ke Citra Digital dengan menggunakan Metode Rivest Shamir Adleman dan Least Significant Bit
Zalukhu, Feliso
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (534.066 KB)
|
DOI: 10.54367/means.v3i2.274
Steganography is the science of art and science to make hidden messages in a certain way so that other people besides the sender and recipient will realize there is a hidden message. Cryptography is science and art to learn about processing and securing messages safely. This study will discuss the combination of the Rivest Shamir Adleman (RSA) and Least Significant Bit (LSB) methods on how to hide a secret message in a digital image. A text message before being inserted into a digital image is first encrypted with the RSA Algorithm, the results of the encryption are inserted digital imagery with LSB Algorithm. The length of the text message depends on the size of the container media. Applications designed using Microsoft Visual Basic 2008 also provide interfaces for generating randomly needed keys. Applications can be used to hide secret messages in digital images where the color changes of input images with results are not clearly visible.
Pendeteksian Bit Error Dalam Transmisi Data Dengan Menerapkan Cyclic Redudancy Check
Sirait, Matias Julius Fika;
Sinaga, Sony Bahagia
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (361.342 KB)
|
DOI: 10.54367/means.v3i2.291
The communication path that will physically connect the two technologies conceptually works together such as cables. A special feature of a channel that resembles a cable is where the bits will be forwarded in the same order along with the bits sent. Data link layers have specific functions, this function includes starting from providing interfaces for services that are good for the network layer. Communication flows often make mistakes, sometimes having limited data rates and experiencing propagation delays other than zero between when bits are sent when the bit is received. This limitation is an implication of the importance of the efficiency of data transfer. Delivery of information in the telecommunications world will often occur errors in the data to be sent. This error is caused by a disturbance at the physical level, which is a disruption of the transmission line media, such as interference with electromagnetic radiation, cross communication, lightning or noise disturbance. This interference causes the information received does not match the information sent. The Cyclical Redundancy Check method, or CRC, is a method for handling error detection, this method uses binary numbers. The CRC data detection model is sent perframe consisting of a long row of bits for each frame.
Implementasi Metode Bit Plane Complexity Segmentation pada Citra Digital dalam Penyembunyian Pesan Rahasia
Z, Habibi
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (423.571 KB)
|
DOI: 10.54367/means.v3i2.286
Tapping secret message information often occurs in communication media. Safeguarding information or data distributed is very important to maintain confidentiality, integrity and authenticity. In steganography, there are several digital media that can be used as covers to hide the existence of a message, such as: Image, Audio, Text, and Video. The cover media research used in digital imagery is the Bit-Plane Complexity Segmentation Method. Bit-plane complexity segmentation (BPCS) is a steganography technique that has a large capacity, because it can hold confidential data with a relatively large capacity when compared to other steganography methods. It is expected that this research can minimize the leakage of important information that is very confidential and detrimental if it is known by others.
Implementasi Algoritma Modular Multiplication Based Block Cipher dalam mengamankan Data Teks
Anita, Feri
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (234.726 KB)
|
DOI: 10.54367/means.v3i2.275
Securing text data is very necessary to secure a data so that it is not stolen by irresponsible parties. Cryptography is one technique that can be used to secure data, namely by encoding the original data that is understood to be incomprehensible data. Cryptography is one way that is used to secure a data. Cryptography has several algorithms, one of which is a modular mulitiplication based block cipher algorithm which is one of the classic cryptographic algorithms that uses substitution in encoding data. Modular multiplication based block ciphers use 128-bit keys and an iterative algorithm consisting of linear steps (such as XOR and key applications) and parallel applications of four non-linear substitutions that can be reversed.