cover
Contact Name
Tonni Limbong
Contact Email
jurnal.means@gmail.com
Phone
+6281267058001
Journal Mail Official
tonni.budidarma@gmail.com
Editorial Address
http://ejournal.ust.ac.id/index.php/Jurnal_Means/about/editorialTeam
Location
Kota medan,
Sumatera utara
INDONESIA
MEANS (Media Informasi Analisa dan Sistem)
ISSN : 25486985     EISSN : 25993089     DOI : -
Core Subject : Science,
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles 299 Documents
Rancang Bangun Aplikasi Keamanan Data Menggunakan Metode AES Pada Smartphone Hasibuan, Amir Mahmud
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.32 KB) | DOI: 10.54367/means.v2i1.20

Abstract

Cryptography is one technique used to improve the security aspects of information. Cryptography is the study of science and art to maintain a message or data information so that the data is safe. Cryptography supports the needs of two aspects of information security, namely secrecy (protection of the confidentiality of information data) and authenticity (protection against counterfeiting and changing unwanted information). Along with the development of computer technology, the world of information technology requires a stronger and safer cryptographic algorithm. Currently the Advanced Encryption Standard (AES) is used as the latest standard cryptographic algorithm. For this reason, it is necessary to prepare an application that can secure a data and maintain its confidentiality so that it is not known by unauthorized parties. One alternative that can be used in making a data security application is by applying the Advanced Encryption Standard (AES) algorithm. hence the design of a data security application on a smartphone by designing the application of encryption and description of text data using the AES method. This method does a round of 10 rounds to get the results of encryption and decryption in the text.
Sistem Informasi Catholic Center Medan Berbasis Web Panjaitan, Mei Yanti; Damanik, Romanus
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (737.94 KB) | DOI: 10.54367/means.v2i2.150

Abstract

At present, many people use technology as a material to simplify work, the technology used is technology based online and offline. Nowadays technology is also used as a medium for the wider community to get information and communicate with each other wherever and whenever. Catholic Center "Christosophia" Medan Archdiocese, is engaged in an integrated service center that aims to improve services for all Catholics and other religious institutions. Catholic Center Archdiocese of Medan also provides various places such as: meeting room, lodging, hall and prayer room data. The resulting web display can provide convenience in terms of leasing in a web-based terrain catholic center, the advantage of this system is that there is a member and non-member system that is to improve the quality of building leases made by customers, and if the customer is a member then the customer can get discounted place price with the stipulated conditions. And with the system of members and non-members, it will make customers satisfied with the service and excellence available at the Catholic Center, and can help leaders maintain their customers and find new customers.
Potensi Tindak Pidana Kriminal oleh Anak Remaja ditinjau dari Faktor Umur dan Pendidikan dengan Metode Multi Factor Evaluation Process (MFEP) Limbong, Riswan; Siregar, Kristian
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (950.318 KB) | DOI: 10.54367/means.v3i1.229

Abstract

According to statistics in 2013 there were 535 cases and in 2014 there were 723 cases, and based on the data there was an increase of ± 1.35%. The cause of this crime is caused by many factors, but if the factors that cause this crime are known to be earlier by the parents (community), perhaps parents can educate their children and can reduce the number of juvenile perpetrators of physical criminal offenses. The physical crimes referred to in this study are: Robbery, Public order theft and murder. Multifactor Evaluation Process (MFEP) is a quantitative method that uses a "weighting system". In multifactorial decision making, decision makers are subjectively and intuitively weighing various factors that have an important influence on their alternative choices. For decisions that have a strategic influence, it is advisable to use a quantitative approach such as MFEP. In MFEP, all criteria are first, which are important factors in making consideration given appropriate weighting. The same steps are also taken for the alternatives to be chosen, which can then be evaluated in relation to these consideration factors. The MFEP method determines that the alternative with the highest value is the best solution based on the selected criteria.
Sistem Pendukung Keputusan Seleksi Penerimaan Asisten Praktikum menggunakan Metode Fuzzy Tsukamoto Ompusunggu, Abed Nego; Sitorus, Lamhot
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (599.974 KB) | DOI: 10.54367/means.v3i2.290

Abstract

Practicum is one of the academic activities carried out by students in the laboratory. This activity was carried out to develop student motor competencies in several courses that have practicum. So that understanding the theory can be practiced in this activity. In this practical activity involves a practicum assistant, where the practicum assistant is the students selected through a selection to carry out the task of guiding the practitioner in practical activities. Generally, this selection process requires a predetermined assessment. However, in the faculty of computer science the choice of practicum assistant is still done manually so that it is less effective in carrying out the results of the calculations. Suggestion for consideration for the lab to choose a practicum assistant so that it can speed up the process and can produce the best decisions about who the assistants receive. Tsukamoto method is one method in terms of multi-criteria decision making that can be used for these problems.
Aplikasi Tracer Study Alumni Universitas Katolik Santo Thomas Pakpahan, Sorang
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (562.144 KB) | DOI: 10.54367/means.v4i1.499

Abstract

ABSTRACT Catholic University of Saint Thomas is one of the private universities in North Sumatra that was founded in 1984. Currently Unika Saint Thomas has 8 faculties with 16 study programs that have produced many undergraduate graduates. Graduates' data have not been properly stored in each unit so that they will find it difficult to record the alumni. To evaluate a tertiary institution, a number of information systems are needed to support the data storage of the alumni, data on graduation years, place of work, work suitability and waiting time to get a job. To meet the obstacles in obtaining data from alumni, an information system for tracer study is needed. The tracer study application is used as a medium in obtaining information from graduates on the learning process during college studies needed in the world of work. This application is built based online with the Hypertext Preprocessor (PHP) programming language, MySQL database server which makes it easy for alumni to fill out questionnaires and profiles from the websites provided.
Klasifikasi Berbagai Jenis Jamur Layak Konsumsi dengan Metode Backpropagation Hanseliani, Ruth; Adi, Cyprianus Kuntoro
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (464.803 KB) | DOI: 10.54367/means.v4i2.589

Abstract

Mushrooms are a potential source of vegetable food around us. But there are difficulties in recognizing different types of mushrooms worthy of consumption because they have similarities when viewed visually. This study aims to determine the accuracy of the backpropagation method in classifying various types of mushrooms suitable for consumption automatically. The steps taken begin with data capture, initial processing, feature extraction and classification. The data used are images of six types of mushrooms worthy of consumption including button mushrooms, ears, straws, portabella, shitake, and ash oysters. Total data used 222 mushroom data, each type consists of 37 image data. The data sharing is 216 data as training data and testing data, and 6 data are used for single data test. The initial processing stages are grayscalling, adjustment, binaryization, noise reduction and resizing. Feature extraction is done to obtain color characteristics (RGB and HSI) and texture characteristics (texture statistics and gray level co-occurrence matrices). The test results obtained an accuracy of 97%.
Penentuan Calon Sub-Kontraktor menggunakan Metode Analytical Hierarchy Process (AHP) dan Simple Additive Weighting (SAW) Zikri, Arif; Cristanto, Adam Syahputra; Imelda, Imelda
MEANS (Media Informasi Analisa dan Sistem) Volume 5 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (830.21 KB) | DOI: 10.54367/means.v5i1.740

Abstract

One factor in the durability of a contractor company is its sub-contractor. The management of sub-contractors for companies engaged in construction services is one aspect of the company's durability to be able to complete the project that the selection is doing manually by viewing one single file That is sent by the company who wants to be a sub-contactor, it is of course besides very troublesome also inefficient and time consuming quite a while. In determining the winner of the Procurement Committee is still having difficulty to determine the standard of the company that will become a sub-contractor, not to mention the assessment is subjective so that the elected candidate is not the best candidate. The methods used in this research use Analytical Hierarchy Process (AHP) for weighting of criteria and for calculation of value using Simple Additive Weighting (SAW) of the results of the research obtained from the SAW method used Obtained by the best sub-contractor of PT. 4Cipta with a total of 0.962 from 5 alternatives listed
Perancangan Sistem Informasi Perpustakaan AMIK STIEKOM Sumatera Utara Berbasis Teknologi Radio Frekuensi Identification (RFID) Sinaga, Sony Bahagia; Hasugian, Paska Marto
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1007.939 KB) | DOI: 10.54367/means.v2i1.15

Abstract

This study describes the data structure in designing and building an AMIK STIEKOM North Sumatra library information system using Radio Frequency Identification (RFID) based on client servers. The author hopes that readers will better understand the problem solving of parking that is more integrated and well-documented and efficient in its operations. The data structure that has been designed is able to identify the number of participants who have been equipped with Radio Frequency Identification (RFID) library system technology. Students who borrow or return books are selected through application technology in accordance with student data I recorded in the database. Only data on students / I who are registered in the database can borrow and return books to the AMIK STIEKOM North Sumatra library. The process of selecting data in the library system with RFID technology is carried out in three stages, namely the logical design stage, the physical design stage, and the interface design stage.
Analisa Pengamanan Data Teks Menggunakan Algoritma ADFGVX Purnama, Chandra
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (365.501 KB) | DOI: 10.54367/means.v2i2.145

Abstract

This study discusses the implementation of ADFGVX to encode text data. ADFGVX is one of the classic cryptographic methods that uses symmetry keys. this method uses a 6x6 key board for encryption and decryption. The process of encryption and decryption is done by grouping letters in bigram. By using a 6x6 key board, we can encrypt plainteks (original text data to be encrypted) and decrypt ciphertext (encrypted text data) by grouping it. Keyboards are generated randomly by software so that each encryption process (encryption and decryption) can use different keys. This software is also used to verify the results of ADFGVX encryption and decryption with the cube keyboard. ADFGVX software is developed using Visual Basic and graphically based languages in the Windows development environment.
Aplikasi Pembelajaran Algoritma Affine Cipher Dan Vigenere Cipher Menggunakan Metode Computer Assisted Instruction Togiana, Eveline
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (505.127 KB) | DOI: 10.54367/means.v3i1.224

Abstract

Learning is a process of communication between teachers and students. Cryptographic learning is very important for computer students to know the ways to secure data. Then learning is needed about data security, namely using cryptographic methods with the Affine Cipher algorithm and vigenere cipher. The Affine Cipher algorithm is a form of classical cryptography that uses the nature of substitution in the process of encoding data where the process is done by multiplying each plaintext value by a value and adding it with a shift. Vigenere Cipher algorithm is one form of classical cryptography with substitution techniques. Computer Assisted Instruction (CAI) is a computer for presenting learning material that aims to make students more active in learning material in the use of computer media. In its development Computer Assisted Instruction (CAI) has five learning system models namely tutorial models, practice models and exercises, problem solving models, simulation models, and game models, the advantages of Computer Assisted Instruction (CAI) in education can increase student motivation in learning, improve student understanding in the material presented.

Page 4 of 30 | Total Record : 299