MEANS (Media Informasi Analisa dan Sistem)
Jurnal MEANS berdiri sejak Tahun 2016 dengan SK dari LIPI yaitu p-ISSN : 2548-6985 (Print) dan e-ISSN : 2599-3089 (Online) Terbit dua kali setiap Tahunnya yaitu Periode I Bulan Juni dan Periode II Bulan Desember Hasil Plagirisme Maksimal 25%, Lebih dari 25% Artikel Tidak Bisa Publish. Ruang lingkup publikasi ini adalah untuk bidang Ilmu Komputer seperti : 1. Sistem Informasi 2. Manajemen dan Audit Sistem Informasi 3. Aplikasi Dekstop 4. Web dan Mobile 5. Sistem Pendukung Keputusan 6. Sistem Pakar 7. Pembelajaran berbasis Komputer 8. Kriptografy 9. Bidang Ilmu Koputer yang lainnya.
Articles
299 Documents
Sistem Informasi Penjualan pada Karo Rumah Mode di Simalingkar berbasis Web
Sinaga, Mariani;
Malau, Emerson P.
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1106.996 KB)
|
DOI: 10.54367/means.v3i1.225
This study discusses the web-based sales information system at the Rumah Mode Karo store which has a collection of different men's and women's clothing products for sale. In addition to selling clothing collections, karo fashion houses also sell Tupperware. Karo Rumah Mode currently still sells directly and does not have a sales information system so that it causes problems such as recording the Karo Rumah Mode sales transaction data still manually, the store is difficult to control all products that have been sold and those that have not been sold, nor is the store know how much stock is still available for each type of product, who receives money on the sale of a product is also not well-documented and clear. Then from the problems that arise the proposed solution to overcome this problem is to build a sales information system that uses the PHP programming language and MYSQL as the database. The goal is a web-based information system that is built can make sales both online and directly in the store and facilitate users in sales transactions, report inventory and receipt of money against sales transactions are well-documented and clear. The method used in this study is literature study and interviews / case studies at fashion house karo stores.
Implementasi Metode Bit Plane Complexity Segmentation pada Citra Digital dalam Penyembunyian Pesan Rahasia
Z, Habibi
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (423.571 KB)
|
DOI: 10.54367/means.v3i2.286
Tapping secret message information often occurs in communication media. Safeguarding information or data distributed is very important to maintain confidentiality, integrity and authenticity. In steganography, there are several digital media that can be used as covers to hide the existence of a message, such as: Image, Audio, Text, and Video. The cover media research used in digital imagery is the Bit-Plane Complexity Segmentation Method. Bit-plane complexity segmentation (BPCS) is a steganography technique that has a large capacity, because it can hold confidential data with a relatively large capacity when compared to other steganography methods. It is expected that this research can minimize the leakage of important information that is very confidential and detrimental if it is known by others.
Implementasi Metode Simple Additive Weighting dalam Penentuan Guru untuk diusulkan Sertifikasi
Mahulae, Saut;
Limbong, Tonni
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (425.253 KB)
|
DOI: 10.54367/means.v4i1.431
Teacher certification is a government effort in improving teacher quality by increasing teacher welfare, so that it will improve the quality of learning and the quality of education in a sustainable manner. The implementation of teacher certification is carried out by a process and several stages. The Simple Additive Weighting (SAW) method is a decision making technique by carrying out the weighted sum of each performance rating on each alternative of all attributes and requiring the decision matrix normalization process. This method is one method that can carry out multiple criteria assessments and in detail uses a comprehensive thinking framework and hierarchical process considerations which then calculates the weight for each criterion in determining the effectiveness of teacher certification submission in accordance with the quota.
Implementasi Pembelajaran Kooperatif dalam Meningkatkan Hasil Belajar Matematika Dasar Menggunakan Aplikasi Minitab Versi 8
Qurniati, Nofi;
Elfianty, Lena
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (435.4 KB)
|
DOI: 10.54367/means.v4i2.568
The purpose of this study was to determine the effect of the cooperative Technique of sending question with computer media is Minitab Application in improving learning outcomes. This research method is a experimental method. This research was conducted in state Angkasa Junior High school of Padang at the event semester of the 2018/2019 academic year. The sample of this study was class VII1 and VII3 as the control class. The average value of student understanding of learning outcomes by cooperative Technique of sending question with computer media is 62,55, while the conventional learning model is 54,98, value thitung= 3,40 and t tabel = 1,67.
Perancangan Aplikasi Peminjaman Pada PT. BANK Perkreditan Rakyat (BPR) Pijer Podi Kekelengan Medan dengan Metode Secure Election Protocol
Matondang, Zekson Arizona;
Gulo, Mega Sastri Indah Lestari
MEANS (Media Informasi Analisa dan Sistem) Volume 5 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (804.383 KB)
|
DOI: 10.54367/means.v5i1.682
In the era of computerization of information that has developed rapidly there is a growing operating system including mobile phones and smartphones. Android is software for mobile devices that includes the Android operating system equipped with an Android SDK (Software Development Kit) that provides tools and supports the need for API (Application Programming Interface) needed to develop loan registration and simulation applications at PT BPR Pijer Podi Kekelengen Medan Secure Election Protocol Method. Pijer Rakyat Credit Bank Podi Kekelengen is a financial institution that functions to serve credit and savings for customers. Simulation is a calculation that gives an idea of the amount of installments in a financing. Loan registration and simulation applications can provide information to prospective customers about product.
Pengembangan Media Pembelajaran Interaktif Mata Pelajaran Ilmu Pengetahuan Alam Dengan Model Simulasi Tingkat Sekolah Dasar
Hasugian, Paska Marto
MEANS (Media Informasi Analisa dan Sistem) Volume 1 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (514.486 KB)
|
DOI: 10.54367/means.v1i2.11
ABSTRAK Penelitian dibuat untuk menciptakan suatu kreasi belajar IPA dengan memanfaatkan atau berbantuan Komputer. tehnik yang digunakan adalah CBI (Computer Base Instruction) dengan Model Simulasi. Sedangkan metode penelitian yang dilakukan sesuai dengan langkah kerja model simulasi adalah 1) menganalisa masalah yang terjadi dilapangan 2) Perencanaan Produksi 3) Proses produksi dan yang terakhir adalah Penutup (Closing) . Penelitian memanfaatkan teknologi Komputer dan sebagai salah satu sarana atau media yang yang sangat cocok sebagai alat bantu, dimana teknologi komputer tidak lagi hanya digunakan sebagai sarana komputasi dan pengolahan kata (word processor) tetapi juga sebagai sarana belajar multimedia yang memungkinkan dalam desain pembelajaran interaktif . Sajian multimedia berbasis komputer dapat diartikan sebagai teknologi yang mengoptimalkan peran komputer sebagai sarana untuk menampilkan dan merekayasa teks, grafik, dan suara dalam sebuah tampilan yang terintegrasi. Dengan tampilan yang dapat mengkombinasikan berbagai unsur penyampaian informasi dan pesan, komputer dapat dirancang dan digunakan sebagai media teknologi yang efektif untuk membantu proses pemahaman
Implementasi Algoritma Rot Dan Subtitusional Block Cipher Dalam Mengamankan Data
Pratiwi, Ayu
MEANS (Media Informasi Analisa dan Sistem) Volume 2 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (887.47 KB)
|
DOI: 10.54367/means.v2i1.27
The security and confidentiality of data is one of the most important aspects in the information system at this time. Caused by the rapid development of science and technology that allows the emergence of new techniques, which are misused by certain parties that threaten the security of information systems. In general, the data are categorized into two, namely confidential data and data that is not confidential. Data that is not confidential is usually not too much attention. What really needs to be considered is confidential data, where every information contained in it will be very valuable for those who need it because the data can be easily duplicated. The ROT-n algorithm is one simple encryption algorithm that uses alphabetical shifts as much as n to convert plain text into cipher text, whereas Block ciphers work by processing data in blocks, where several characters / data are combined into one block. Each one block process produces one block output as well.
Penerapan Algoritma Vertical Bit Rotation (VBR) Dalam Penyimpanan File Online
Citra, Ebiet Nico
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (559.262 KB)
|
DOI: 10.54367/means.v3i1.220
Many facilities offered, but in terms of security, there is no absolute security. One way to secure files is to encrypt the file with cryptographic algorithms, and in this study Vertical Bit Rotation (VBR) cryptographic algorithms will be used as cryptographic algorithms that are used to increase the level of security in terms of storing files online. This algorithm is as simple as the classic cryptographic algorithm but with the security as strong as modern cryptographic algorithms. For further development, the paper will include stages of encryption in more detail, use of keys, examples of encryption codes, and examples of usage
Implementasi Algoritma Modular Multiplication Based Block Cipher dalam mengamankan Data Teks
Anita, Feri
MEANS (Media Informasi Analisa dan Sistem) Volume 3 Nomor 2
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (234.726 KB)
|
DOI: 10.54367/means.v3i2.275
Securing text data is very necessary to secure a data so that it is not stolen by irresponsible parties. Cryptography is one technique that can be used to secure data, namely by encoding the original data that is understood to be incomprehensible data. Cryptography is one way that is used to secure a data. Cryptography has several algorithms, one of which is a modular mulitiplication based block cipher algorithm which is one of the classic cryptographic algorithms that uses substitution in encoding data. Modular multiplication based block ciphers use 128-bit keys and an iterative algorithm consisting of linear steps (such as XOR and key applications) and parallel applications of four non-linear substitutions that can be reversed.
Perancangan Aplikasi Keamanan Pesan Teks dengan menggunakan Algoritma Triple Transposition Vigenere Cipher
Fauzi, Muhammad Anas
MEANS (Media Informasi Analisa dan Sistem) Volume 4 Nomor 1
Publisher : LPPM UNIKA Santo Thomas Medan
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (431.154 KB)
|
DOI: 10.54367/means.v4i1.315
Security is a very important aspect of information systems. Some information is generally only intended for a certain group of people, therefore security is needed to prevent the information from reaching other parties who are not interested so that the possibility of leakage or misuse of information can be avoided by designing a security system that serves to protect the information system . Information security issues that we often encounter include passive tapping, active tapping, fraud and so on. In addition there are two main problems of text message security that must be considered by the user, namely the problem of privacy (privacy) and authenticity (autenthication). To overcome the above problems, the writer tries to design an application that can be used to do the encryption and decryption process by applying the triple transposition vigenere cipher algorithm in encryption and decryption. This algorithm is a super encryption algorithm, because in the encryption process it uses two techniques, namely transposition technique and substitution technique. The substitution technique in this algorithm uses the vigenere cipher algorithm.