cover
Contact Name
Tonni Limbong
Contact Email
jurnal.means@gmail.com
Phone
+6281267058001
Journal Mail Official
tonni.budidarma@gmail.com
Editorial Address
http://ejournal.ust.ac.id/index.php/Jurnal_Means/about/editorialTeam
Location
Kota medan,
Sumatera utara
INDONESIA
MEANS (Media Informasi Analisa dan Sistem)
ISSN : 25486985     EISSN : 25993089     DOI : -
Core Subject : Science,
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles 16 Documents
Search results for , issue "Volume 4 Nomor 1" : 16 Documents clear
Sistem Pendukung Keputusan Pemilihan Dosen Terbaik dengan menggunakan Metode TOPSIS (Studi Kasus: STMIK Pelita Nusantara Medan) Simanjorang, R. Mahdalena
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (518.3 KB) | DOI: 10.54367/means.v4i1.312

Abstract

The decision support system for the best lecturer selection has been made in this study so that it can be recommended to the foundation so that it is efficient compared to the use of the old system. In determining the lecturer at STMIK Pelita Nusantara, the method used is the TOPSIS method using criteria that will be determined by the Foundation. The selection of lecturers at STMIK Pelita Nusantara is determined by several criteria, namely, attendance, teaching, service, research and neatness. The Topsis method is very suitable because the concept is practical. The output in this system is the calculation value of lecturer selection using the TOPSIS method and the ranking of lecturers at STMIK Pelita Nusantara
Perancangan Game Edukasi Kulnas (Kuliner Nusantara) dalam Melestarikan Kekayaan Nusantara menggunakan Visual Basic Ono, Rosalia Sonia; Ismiati, Maria Bellaniar
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (627.949 KB) | DOI: 10.54367/means.v4i1.498

Abstract

Traditional food or culinary archipelago is an ethnic or country identity. In Indonesia traditional food can be found easily in every province. However, many Indonesian people do not know their traditional food and prefer western food or western food. They also have no knowledge of the ingredients used to make western food. One of the causes of this phenomenon is because nowadays Indonesian people tend to play cooking games from abroad or games that do not add to their insight. It cannot be denied that the number of games is quite a lot, on the other hand the number of local games to introduce traditional or culinary food of the Indonesian archipelago is very low and even rarely found. Therefore, this study made an educational game to introduce various traditional foods from all regions in Indonesia and what ingredients were used in making these foods. This game was developed using Visual Basic with the beginning of storyboarding (design) from the archipelago culinary education game, then the design and coding process of the national game. The game itself can be played on personal computers, by possessing various menus such as introducing 3 foods that are typical of 32 provinces which of course are rarely heard and what ingredients are used in making these foods. And quiz knowledge about the materials used to make typical foods in each province.
Implementasi Algoritma Merkle Hellman untuk Keamanan Database Simanjuntak, Magdalena; Pasaribu, Tioria; Rahmadilla, Semiati
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (339.35 KB) | DOI: 10.54367/means.v4i1.327

Abstract

The development of information technology today has a huge impact, namely the issue of security and confidentiality of data. One solution that can be used to guarantee the confidentiality and security of information is cryptography. By using cryptography, a data can be secured through the decryption and encryption process. Security issues and database confidentiality are the most important aspects of an information system. One mechanism to improve database security is to use asymmetric algorithms such as the Merkle Hellmen algorithm. Merkle Hellman is one of the crypto systems that uses the key type of asymmetry. In the Merkle Hellman system, the keys used are 2 different keys, namely the public key and the secret key. Encryption generates ciphertext and decryption produces a plaintext for securing databases that want to be kept confidential. The advantages of this Merkle Hellman algorithm is that there is no need for confidentiality in the key distribution process. From the results of experiments that have been done with this application, the encrypted database becomes a form of message that cannot be understood (ciphertext), but after the decryption process is done, the database is successfully returned to its original form (plaintext) that can be understood
Sistem Informasi Catatan Perkuliahan Mahasiswa pada STMIK Pelita Nusantara Medan Taufik, Insan
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (466.393 KB) | DOI: 10.54367/means.v4i1.313

Abstract

Notes are minutes of the results of a writing by the process of recording or writing ideas, lists, minutes or notations of a learning activity, research, meeting or other activities that are too many to remember with memory. The problem of note that happened to STMIK Pelita Nusantara students was the lack of enthusiasm to record the results of lectures, thus influencing the entire understanding of students towards the subject. The thing that affects the lack of enthusiasm of students to record the results of lectures is the lazy habit of carrying books and stationery. Then many lecturers do not instruct students to record the results of the subjects taught. However, even though students are lazy to carry stationery, students always carry a laptop or computer while the lecture is taking place and record the results of lectures on the laptop. The output of this study is a record information system in the form of a website that can influence the spirit of student records, because each lecturer can see and assess the results of student records.
Aplikasi Tracer Study Alumni Universitas Katolik Santo Thomas Pakpahan, Sorang
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (562.144 KB) | DOI: 10.54367/means.v4i1.499

Abstract

ABSTRACT Catholic University of Saint Thomas is one of the private universities in North Sumatra that was founded in 1984. Currently Unika Saint Thomas has 8 faculties with 16 study programs that have produced many undergraduate graduates. Graduates' data have not been properly stored in each unit so that they will find it difficult to record the alumni. To evaluate a tertiary institution, a number of information systems are needed to support the data storage of the alumni, data on graduation years, place of work, work suitability and waiting time to get a job. To meet the obstacles in obtaining data from alumni, an information system for tracer study is needed. The tracer study application is used as a medium in obtaining information from graduates on the learning process during college studies needed in the world of work. This application is built based online with the Hypertext Preprocessor (PHP) programming language, MySQL database server which makes it easy for alumni to fill out questionnaires and profiles from the websites provided.
Perancangan Aplikasi Penyisipan Pesan Teks dalam Audio dengan Menggunakan Metode Low Bit Coding Ramadani, Muhammad
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (426.835 KB) | DOI: 10.54367/means.v4i1.328

Abstract

The development of steganography began to penetrate into the digital world which in this study was devoted to mp3 audio files. The techniques for developing a steganography process are briefly discussed. This study also tried to present the steganography process in audio file comparisons based on the formulas in the existing literature. A software called MP3 Stego is used to assist in the process of observing problems and completing the steganography process. MP3 Stego is tried, observed, and hypothesized for future development suggestions. After looking more deeply at audio steganography, especially in MP3 audio files, it is quite prospective in the next development. Well studied from psychological and technical factors, it turns out that MP3 media is a very appropriate media to become a message hiding media. In addition, it turns out that steganography can also be used in more in-depth and broader targets such as campaign suggestions, notifications, organizational communication, and so on.
Aplikasi Enkripsi dan Dekripsi Teks Menggunakan Algoritma Merkle Hellman Purba, Lamrianto; Ginting, Guidio Leonarde
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (256.829 KB) | DOI: 10.54367/means.v4i1.314

Abstract

Cryptography is the science and art of keeping messages safe. In cryptography there are two main concepts, namely encryption and decryption. The encoding is first created using the clasic algorithm. this algorithm builds security on the confidentiality of the algorithm used. But this algorithm is not efficient when used to communicate with many people because the algorithm is still very simple and still very easy to solve, so that important information or data that can be easily kept secret can be recognized by other people or irresponsible people. Merkle Hellman algorithm is a cryptographic algorithm that generally encrypts twice or also called double, namely plainteks encrypted with cipher I, then the first encryption results are encrypted again with cipher II.
Aplikasi Pemantauan Lokasi Keluarga berbasis Android Malau, Emerson Porman; Sitanggang, Evita br
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (886.943 KB) | DOI: 10.54367/means.v4i1.519

Abstract

High mobility by family members, makes it difficult for parents to supervise children's activities. At present supervision of children is not enough just to see or supervise directly. This application is designed to be able to monitor the location of the child's presence when parents want to know the whereabouts of their children. This application is also able to see the history of the existence of children in the time interval specified to be searched. This application is used android-based mobile devices. This application is expected to be used by parents to indirectly supervise their children's activities.
Implementasi Metode Simple Additive Weighting dalam Penentuan Guru untuk diusulkan Sertifikasi Mahulae, Saut; Limbong, Tonni
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (425.253 KB) | DOI: 10.54367/means.v4i1.431

Abstract

Teacher certification is a government effort in improving teacher quality by increasing teacher welfare, so that it will improve the quality of learning and the quality of education in a sustainable manner. The implementation of teacher certification is carried out by a process and several stages. The Simple Additive Weighting (SAW) method is a decision making technique by carrying out the weighted sum of each performance rating on each alternative of all attributes and requiring the decision matrix normalization process. This method is one method that can carry out multiple criteria assessments and in detail uses a comprehensive thinking framework and hierarchical process considerations which then calculates the weight for each criterion in determining the effectiveness of teacher certification submission in accordance with the quota.
Perancangan Aplikasi Keamanan Pesan Teks dengan menggunakan Algoritma Triple Transposition Vigenere Cipher Fauzi, Muhammad Anas
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (431.154 KB) | DOI: 10.54367/means.v4i1.315

Abstract

Security is a very important aspect of information systems. Some information is generally only intended for a certain group of people, therefore security is needed to prevent the information from reaching other parties who are not interested so that the possibility of leakage or misuse of information can be avoided by designing a security system that serves to protect the information system . Information security issues that we often encounter include passive tapping, active tapping, fraud and so on. In addition there are two main problems of text message security that must be considered by the user, namely the problem of privacy (privacy) and authenticity (autenthication). To overcome the above problems, the writer tries to design an application that can be used to do the encryption and decryption process by applying the triple transposition vigenere cipher algorithm in encryption and decryption. This algorithm is a super encryption algorithm, because in the encryption process it uses two techniques, namely transposition technique and substitution technique. The substitution technique in this algorithm uses the vigenere cipher algorithm.

Page 1 of 2 | Total Record : 16