cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jimat.journal@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Informatics Management and Information Technology
ISSN : -     EISSN : 27744744     DOI : -
Core Subject : Science,
Journal of Informatics Management and Information Technology, memiliki kajian pada bidang: 1. Manajemen Informatika, 2. Sistem Informasi, dan 3. Teknologi Informasi
Articles 5 Documents
Search results for , issue "Vol. 1 No. 4 (2021): October 2021" : 5 Documents clear
Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital Sri Wahyuni; Surya Darma Nasution; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.128

Abstract

Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Penerapan Metode Gabor Wavelet Dalam Pengenalan Wajah Pada Rekaman CCTV Sofi Andianis Fau; Sinar Sinurat
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.129

Abstract

Human facial recognition is an important field of research, and there are many applications today that can apply it. Through the development of a technique such as the Gabor Wavelet, computers can now outpace the human brain in a variety of tasks in facial recognition, particularly those that require searching large facial databases. The face recognition system is used to compare an input face image with a face database and produce the face that best matches that image if detected. Meanwhile, face authentication is used to test the authenticity / similarity of a face with face data that has been stored in the previous database. Applications have advantages over conventional methods. In case it is not easily stolen or used by unauthorized users. The purpose of this final project is to create a facial recognition software from CCTV footage using Gabor Wavelet to reduce the dimensions of facial images as well as to determine the capabilities of the technique. In this final project, the software created uses a still image as input. To build this application using Matlab. The system test results show that the use of Gabor Wavelet for facial recognition on CCTV footage provides a fairly high level of accuracy. Test results The results obtained will then be entered into the Gabor Wavelet Method to determine the identity of the face owner. For facial images that were included in the exercise, it was possible to get 85.71% correct identification
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen Berliana Oktaviani Sinaga; Sinar Sinurat; Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.130

Abstract

Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
Optimalisasi Biaya Transportasi Pengiriman Barang dengan Menerapkan Metode Potensial M Abduh Al Hafidh
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.131

Abstract

Costs are expenses that often exist in a company where when expenses are not handled properly it will cause problems in a company. Optimizing costs in the process of sending costs is needed to minimize spending on a company so that expenses will be more focused and will not harm the company. Optimization is a step to reduce expenses on the company. The potential method is one method that is able to overcome the problem of minimizing transportation costs at PT. Bintang Mutiara Cemerlang.Optimization used in companies with potential methods is very effective
Penerapan Algoritma Golomb Coding Pada Aplikasi Kompresi Short Message Service (SMS) Linni Hairani Butar Butar
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v1i4.132

Abstract

The use of this android-based mobile phone is very easy to convey a message to the intended person. Like being able to send messages via WA, Telegram, Instagram and other applications. So in this way humans are faster in sending a message. Although it is not widely used, there are still people who send messages via SMS, and not everyone also has a mobile phone with an Android operating system. The problem in using this sms is that the more text that is sent, it will cost a lot, if it exceeds 160 characters, the content of the message will be sent into two sms. This problem can be solved by abbreviating the message sent, but another problem arises, namely a misunderstanding in reading the contents of the message because many do not understand the abbreviated message

Page 1 of 1 | Total Record : 5