cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
+6282370070808
Journal Mail Official
jimat.journal@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal of Informatics Management and Information Technology
ISSN : -     EISSN : 27744744     DOI : -
Core Subject : Science,
Journal of Informatics Management and Information Technology, memiliki kajian pada bidang: 1. Manajemen Informatika, 2. Sistem Informasi, dan 3. Teknologi Informasi
Articles 5 Documents
Search results for , issue "Vol. 2 No. 2 (2022): April 2022" : 5 Documents clear
Implementasi Metode Regionprops Untuk Mendeteksi Objek Image Fraktur Tulang Nadilla Sarah Sinaga
Journal of Informatics Management and Information Technology Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v2i2.142

Abstract

Bone is one of the most important parts of the human body. The function of the bone itself is as a framework, a support for the human body and a place for muscles to attach, so that the body can move optimally. Not only that, some parts of the bones also have a function to protect other organs in the body. Such as the skull that serves to protect the brain from various kinds of impact from the outside, the arrangement of the ribs which serves to protect the lungs and so on. Regionprops method is a method used to measure a set of properties - properties of each region that has been labeled in the label matrix. A positive integer that is an element of the matrix corresponding to the corresponding region. This study uses the Regionprops method to detect an object of damage that is on a bone invoice. The application for detection of bone invoice object image results from Regionprops shows that the resolution produced by the detected image is different. The speed of the application to perform the image detection process depends on the pixel resolution and also depends on the specifications of the computer running the image detection application
Implementasi Algoritma Noekeon Untuk Mengamankan File Audio Tita Azwinar Sarumaha
Journal of Informatics Management and Information Technology Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v2i2.143

Abstract

Along with the development of an increasingly advanced era, and supported by the development of very rapid information technology, especially in producing audio files, it can now be done with smartphone devices. With the application on smartphones with devices to make audio both for private and public. Audio files need to be secured with better security, in order to anticipate if the account is far from being in the hands of unauthorized people, one way to secure audio files is by using cryptographic techniques, with this technique, unauthorized people cannot see the information contained in the audio. the. One of the algorithms that can be used to secure audio files is the NOEKEON algorithm, Noekeon is a repeating block cipher with a block length and key length of 128 bits each, which consists of a simple round transformation application that repeats itself, followed by an output transformation. Noekeon has 16 rounds (Nr) iterations in each round four transformations are carried out, namely, Theta, shift offset consisting of two transformations Pi1 and Pi2 and gamma The advantages of the Noekeon algorithm do not limit the keys used or use these keys to exploit into cipher text and avalanche effects obtained meet the strict Avalanche criterion. If there is an error in one block cipher it cannot affect the other blocks
Rancang Bangun Aplikasi Duplicate Docx Scanner Menerapkan Metode SHA-256 Adelina
Journal of Informatics Management and Information Technology Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v2i2.150

Abstract

Hard drives are one of the core components of a computer in various types and sizes. Large hard disks can become full, even though they don't feel like storing large files. The possibility of saving the same file in the directory is very difficult and will take a long time. The Duplicate Docx Scanner application is able to solve this problem. The Duplicate Docx Scanner application is able to find out the same file is located in a different directory by determining the directory on the hard disk and other storage media. This application can calculate the hash value so that it can find the same file. The Duplicate Docx Scanner application uses the SHA-256 hash method. SHA-256 is used to perform file integrity checks in a variety of situations. This Duplicate Docx Scanner application is designed to use the Microsoft Visual Basic.Net 2008 programming language
Analisis Kepuasan Pelanggan Menggunakan Algoritma C5.0 Dandi Junandi Purba; Muhammad Ridwan Lubis; Zulia Almaida Siregar
Journal of Informatics Management and Information Technology Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v2i2.160

Abstract

Water is one of the necessities that are needed by living things, especially humans. In everyday life, humans cannot be separated from the need for air. PDAM is a regional-owned business unit, which is engaged in the distribution of clean water for the general public. However, along the way, along with receiving complaints from the public or customers, public complaints about the increasing difficulty of getting clean water are still an obstacle that can be completely overcome, for example in the North Sumatra area, precisely in Gunung Malela District. On the one hand, public demand will increase, but the quality of services provided is not comparable to meeting the demands of the community. Therefore, this study was conducted to determine customer satisfaction with PDAM Tirta Lihou in Gunung Malela District. Many branches of computer science study various algorithms, one of which is data mining methods, DSS, ANN, and others. This study uses a data mining method with the C5.0 algorithm to solve the problem of factors that affect customer satisfaction with PDAM Tirta Lihou, Gunung Malela District
Analisis Pola Penjualan Produk Makanan dan Minuman Menggunakan Algoritma Apriori Boby; Solikhun; Zulia Almaida Siregar
Journal of Informatics Management and Information Technology Vol. 2 No. 2 (2022): April 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jimat.v2i2.161

Abstract

Sales are seen as a unit of business parameters that are very vital and valuable for business people to manage the business they are running, especially in the cafe business.  Cafe Aksara as one of the business actors in the culinary world has a lot of demand in the sale and supply of goods on certain days due to the dynamic nature of visitor patterns and makes business people have to be wiser in setting strategies for the combination pattern of sales of food and beverage products found in Indonesia. Aksara cafe to attract customers.  In a process of determining the sales pattern strategy at Cafe Aksara, customers or buyers greatly influence the sales transaction data recorded by the Aksara Cafe business person.  However, from the results of these recordings, sales transaction data tend not to be used in a process of determining sales pattern strategies to attract customers and are only used as useless archives for Aksara Cafe business people.  From these problems, there are many branches of computer science that can be used as reference points in overcoming sales problems, one of which is the branch of computer science Data Mining.  Data Mining is a method that is quite categorical to be recommended in solving problems with the sale of food and beverage products, especially the Apriori Algorithm. The output of the Apriori Algorithm can help Cafe Aksara business people determine sales patterns on the sales data of their products

Page 1 of 1 | Total Record : 5