Articles
131 Documents
Penerapan Algoritma Gost Dan Mode Output Feedback Untuk Tingkat Keamanan Citra Digital
Sri Wahyuni;
Surya Darma Nasution;
Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v1i4.128
Digital images that are private and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if it is distributed over the internet such as chat-based applications, WhatsApp and e-mail media. The image that is sent is sometimes an image that is confidential and must be protected. In order to maintain the security of digital images, cryptographic techniques can be used. Cryptographic techniques can secure digital images by changing the pixel values ??of the digital image so that it produces a different pixel value from the original image to be secured. In this study, the algorithm used is the GOST algorithm by adding the OFB technique to optimize the GOST key, and the encryption results can be sent via an application that will be designed with a client-server model. Creating a client-server-based encryption and decryption software application, aimed at transferring digital data in the form of a plain image that has been encrypted using the GOST algorithm, and can be distributed locally using an IP address connected to the same network on the sending and receiving computers (client-server)
Penerapan Metode Gabor Wavelet Dalam Pengenalan Wajah Pada Rekaman CCTV
Sofi Andianis Fau;
Sinar Sinurat
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v1i4.129
Human facial recognition is an important field of research, and there are many applications today that can apply it. Through the development of a technique such as the Gabor Wavelet, computers can now outpace the human brain in a variety of tasks in facial recognition, particularly those that require searching large facial databases. The face recognition system is used to compare an input face image with a face database and produce the face that best matches that image if detected. Meanwhile, face authentication is used to test the authenticity / similarity of a face with face data that has been stored in the previous database. Applications have advantages over conventional methods. In case it is not easily stolen or used by unauthorized users. The purpose of this final project is to create a facial recognition software from CCTV footage using Gabor Wavelet to reduce the dimensions of facial images as well as to determine the capabilities of the technique. In this final project, the software created uses a still image as input. To build this application using Matlab. The system test results show that the use of Gabor Wavelet for facial recognition on CCTV footage provides a fairly high level of accuracy. Test results The results obtained will then be entered into the Gabor Wavelet Method to determine the identity of the face owner. For facial images that were included in the exercise, it was possible to get 85.71% correct identification
Modifikasi Algoritma XTEA dengan Pembangkitan Kunci Menggunakan Metode Linear Congruential Untuk Pengamanan File Dokumen
Berliana Oktaviani Sinaga;
Sinar Sinurat;
Taronisokhi Zebua
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v1i4.130
Confidential document files must have security both when the file process is sent or stored in the stroge media. This is done so that the confidential document file is not known by someone who does not have authority over the file, or to avoid loss if the file falls into the wrong hands. In order to achieve this, a document file security technique is needed that can convert document file data into unrecognized data. One of the techniques that can be used is cryptography. Cryptography makes use of algorithms to encode document files with an encryption process, and restore document files with a decryption process. One of the algorithms that can be used is the XTEA algorithm. XTEA divides the document file string into 2 parts, namely AL 32 bit and BL 32 bit. The weakness of the XTEA algorithm when carrying out the encryption or decryption process with repeated key scheduling so that it is not effective in optimizing the security of encrypted document files, therefore in this study the Linear Congruential Generator (LCG) method is added to generate XTEA keys. LCG has values ??a, c, m and X0 which triggers to get the XTEA key. So that in the process of distributing encrypted document files, the key sent is the LCG trigger value in the form of a, c, m and X0, if the value is known by the attacker, the encrypted document file cannot be returned. So that the results of the XTEA encryption algorithm with key optimizer based on the LCG method produce a document file cipher that is more optimal in security
Optimalisasi Biaya Transportasi Pengiriman Barang dengan Menerapkan Metode Potensial
M Abduh Al Hafidh
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v1i4.131
Costs are expenses that often exist in a company where when expenses are not handled properly it will cause problems in a company. Optimizing costs in the process of sending costs is needed to minimize spending on a company so that expenses will be more focused and will not harm the company. Optimization is a step to reduce expenses on the company. The potential method is one method that is able to overcome the problem of minimizing transportation costs at PT. Bintang Mutiara Cemerlang.Optimization used in companies with potential methods is very effective
Penerapan Algoritma Golomb Coding Pada Aplikasi Kompresi Short Message Service (SMS)
Linni Hairani Butar Butar
Journal of Informatics Management and Information Technology Vol. 1 No. 4 (2021): October 2021
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v1i4.132
The use of this android-based mobile phone is very easy to convey a message to the intended person. Like being able to send messages via WA, Telegram, Instagram and other applications. So in this way humans are faster in sending a message. Although it is not widely used, there are still people who send messages via SMS, and not everyone also has a mobile phone with an Android operating system. The problem in using this sms is that the more text that is sent, it will cost a lot, if it exceeds 160 characters, the content of the message will be sent into two sms. This problem can be solved by abbreviating the message sent, but another problem arises, namely a misunderstanding in reading the contents of the message because many do not understand the abbreviated message
Penerapan Algoritma Rabin-Karp Pada Pencarian Sinonim Kata
Mega Oktaviani Pohan;
Mesran;
Ronda Deli Sianturi
Journal of Informatics Management and Information Technology Vol. 2 No. 1 (2022): January 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v2i1.141
Synonym is a word that has a different form but has the same or similar meaning or understanding. Synonyms are also known as word equations or word equivalents. Synonyms are used to express the sameness of meaning. In daily communication activities, language users still often make mistakes in using synonymous words. Often different linguistic forms are simply considered synonyms. Therefore, the correct mastery of synonyms must be possessed by language users for daily communication activities (both oral and written). The problem that has been faced so far is the lack of flexible means to facilitate the search for synonyms for these words. To overcome this problem, we need a simple application that is operated on an Android-based smartphone that is useful for helping us find synonyms for words. Users only need to enter the word they want to find synonyms for. This application will use a string matching algorithm or also known as String matching or is a method used to find an accuracy or result from one or several text patterns given. The expected results in this application are to help speed up the process of finding synonyms for Indonesian words, increase knowledge and vocabulary mastery of Indonesian users, especially synonyms
Impelementasi Metode N-Hash Untuk Mendeteksi Keaslian File Audio
Udiyani
Journal of Informatics Management and Information Technology Vol. 2 No. 1 (2022): January 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v2i1.145
Audio file is a means of information from one person to another or from a group to another. The development of computerized technology has greatly increased. Audio files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of audio files, it can be done by using cryptographic techniques. Cryptography is a collection of techniques that are useful for securing information. Apart from securing information, it also maintains the confidentiality and integrity of the information. Cryptography is used for important communications such as communications among the military, diplomats, and spies. But nowadays cryptography is more non-repudiation.N-Hash is a family of encryption algorithms designed to have an efficient and simple software implementation on 128-bit microprocessors. The original member of this family is called N-hash which has 8 rounds
Implementasi Algoritma A* Dalam Menentukan Tarif Minimum Berdasarkan Jarak Terpendek Rute Armada Taksi Bandara
Dinda Luthfita;
Pristiwanto;
Soeb Aripin
Journal of Informatics Management and Information Technology Vol. 2 No. 1 (2022): January 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v2i1.147
The use of the shortest path on the taxi route to the destination point can certainly reduce the cost of travel fares. This can provide benefits for taxi customers as well as for the progress of the taxi company. Airport Taxi Angkasa Pura II Kualanamu International Airport applies taxi orders through the call center. Prospective passengers who have ordered a taxi through the operator will be picked up by the taxi driver immediately. Taxis that are closer and there are no passengers will answer the call center to pick up passengers. Due to the limited information on road data, it makes taxi drivers need time to find out the shortest path to be taken in order to determine a more efficient fare. For this reason, a geographic information system to find the shortest path to determine the minimum fare to make it easier for passengers to find out the cost of travel fares. From the results of the application of data in the field, it can be seen that the A Star algorithm has succeeded in finding the shortest path to determine the minimum travel fare
Implementasi Metode K-Means Dalam Klasifikasi Desa/Kelurahan Menurut Jenis Industri Kecil Mikro
Muhammad Arifullah;
Jaya Tata Hardinata;
Yuegilion Pranayama Purba
Journal of Informatics Management and Information Technology Vol. 2 No. 1 (2022): January 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v2i1.152
The Ministry of Industry noted that the number of small and medium industries in Indonesia reached 44 million. But unfortunately 99% of all small industries have problems and difficulties in developing their businesses. The problem that is often faced in Indonesia is the limited ability of digital marketing. Unstable production and others. In order to help/support small and micro businesses, a grouping is carried out in the Pematangsiantar sub-district that has small/micro businesses according to the type of business using the K-Means method. The research data used were obtained from BPS and grouped into 2 high and low groups. By implementing the k-means method in the rapidminer application, it is possible to produce a decision tree based on the previous learning data set of small and micro-medium industries using criteria intended to produce relevant and accurate results of small and medium-sized industrial business classification
Penerapan Metode Adaptie Neuro Fuzzy Inference dalam Memprediksi Penjualan Buku
Zulfia Darma;
Agus Perdana Windarto;
Dedi Suhendro
Journal of Informatics Management and Information Technology Vol. 2 No. 1 (2022): January 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.47065/jimat.v2i1.153
The increase in sales of items or product componies continues to increase based on the needs of the community. With the increase in sales will greatly affect the income of a company. So a mature sales strategy is needed. The number of visitors has a great influence on sales transactions. The more visitors, the more likely the transaction can be predicted. The number of visitors every day is different and has an unequal percentage in making sales transactions. One way to increase sales revenue is to predict sales based on the average number of stock so that sales strategy planning can be right on target. Related to this, the author conducts research to predict the number of book sales based on the pattern that occurs from the number of book stock at PT. Tiga Serangkai Pustaka Mandiri Pematangsiantar. By applying the Adaptive Neuro Fuzzy Inference System (ANFIS) method in predicting book sales in 2018-2020. The amount of data used is 36 data, divided into training data (23 data) and testing (13 data) using 2 input variables namely orders and stock, 1 input variable is sales. In testing with matlab software, the training process uses mf trimf with 9 rules which produces the smallest error value of 1.045 at epoch 36, with an accuracy rate of 57%