cover
Contact Name
Handoko Prasetya
Contact Email
sisfokomtek.jumin@gmail.com
Phone
+6281260905769
Journal Mail Official
sisfokomtek.jumin@gmail.com
Editorial Address
Jl. Sisingamangaraja, Medan, Provinsi Sumatera Utara
Location
Unknown,
Unknown
INDONESIA
Jurnal Media Informatika
ISSN : -     EISSN : 2808005X     DOI : -
Core Subject : Science,
1. IT Infrastructure and Security (ITIS): Information Security and Privacy Digital Forensics Network Security Cryptography Cloud and Virtualization Emerging Technologies Computer Vision and Image Ethics in Information Systems Human Computer Interaction Wireless Sensor Networks Medical Image Analysis Internet of Things Mobile and Pervasive Computing Real-time Systems and Embedded Systems Parallel and Distributed Systems 2. Data Engineering and Business Intelligence (DEBI): Information Security and Privacy Business Intelligence Data Mining Intelligent Systems Artificial Intelligence Autonomous Agents Intelligent Agents Multi-Agent Systems Expert Systems Pattern Recognition Machine Learning Soft Computing Optimization Forecasting Meta-Heuristics Computational Intelligence Decision Support Systems 3. Data Acquisition and Information Dissemination (DAID): Open Data Social Media Knowledge Management Social Networks Big Data Web Services Database Management Systems Semantics Web and Linked Data Visualization Information Social Information Systems Social Informatics Spatial Informatics Systems Geographical Information Systems
Articles 5 Documents
Search results for , issue "Vol. 4 No. 2 (2023): Jurnal Media Informatika" : 5 Documents clear
Penerapan Algoritma Apriori Dalam Menentukan Merek Pakaian Yang Paling Diminati Pada Darma Utama Muhammad Hartono; Fricles A Sianturi
Jurnal Media Informatika Vol. 4 No. 2 (2023): Jurnal Media Informatika
Publisher : Jurnal Media Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v3i1 Desember.216

Abstract

Current technological developments in Indonesia are very modern. Currently, in the field of sales, computerized technology is used, one of which is the preparation of goods according to the conditions in which the goods are often sought after by consumers. By utilizing current technology, it will be very easy to spend the stock of goods being sold. The Darma Utama clothing store (DM Fashion) is a sales area that is currently developing, in early 2019 this store was just established and already has its own employees. Various types of clothing, such as dresses, robes, or shirts, are sold under various brands so that they can be in demand by many consumers. However, the impact of sales is competition, where many other shops sell clothes with various types and brands as well as discounts or warehouse cleaning with a price range that is far from the selling price which results in fewer consumers. Data Mining is a combination of data analysis techniques and finding important patterns in the data. In simple terms, it can be defined as the process of selecting, exploring and modeling large amounts of data to find patterns or trends that are usually not recognized. One of the methods in Data Mining is the Apriori Algorithm which searches for frequent itemsets using the Association Rule technique. The a priori algorithm is a type of association rule in data mining. The rules that state the association between several attributes are called affinity analysis or market basket analysis. Association analysis or association rule mining is a data mining technique to find the rules of a combination of items
Kriptografi dan Penerapannya Dalam Sistem Keamanan Data Nanda Amalya Nanda; Santa Maria Sopiana Silalahi; Della Fatricia Nasution; Melia Sari; Indra Gunawan
Jurnal Media Informatika Vol. 4 No. 2 (2023): Jurnal Media Informatika
Publisher : Jurnal Media Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v4i2.428

Abstract

An understanding of what cryptography is, to understand cryptography and how it is applied in data security, so that data will be safer and more protected from spamming or illegal hacking of information. Observations of cryptography and its application to data security are carried out using the Approach of Literary Studies. Library Studies is a data collection technique by studying various reference books and the results of previous similar research, which is useful for obtaining a theoretical foundation on the problem to be studied. Cryptography is a technique of conveying messages in a hidden manner by utilizing data encryption features, which serve to secure data, whether transferred through a computer network or not, which is very useful for protecting, privacy, data integrity, authentication, and non-repudiation. Nowadays the use of cryptography has begun to be widely used in everyday life. Use cryptographic systems for the security of your data when accessing information.
Analisis Keamanan Data Dengan Menggunakan Kriptografi Modern Algoritma Advance Encryption Standar (AES) Selli Oktaviani; Fahrizal Rizky; Indra Gunawan
Jurnal Media Informatika Vol. 4 No. 2 (2023): Jurnal Media Informatika
Publisher : Jurnal Media Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v4i2.435

Abstract

Perkembangan teknologi informasi dan komunikasi yang sangat pesat menyebabkan munculnya kemajuan. Teknologi informasi memegang peranan penting dalam berbagai bidang kehidupan, baik secara langsung maupun tidak langsung. Teknologi informasi tidak dapat dipisahkan dari berbagai aspek kehidupan manusia. Memungkinkan komunikasi dan pertukaran informasi atau data. Dengan kemajuan teknologi informasi, sangat diperlukan untuk melindungi data terhadap kerahasiaan informasi yang dipertukarkan. Kriptografi adalah studi tentang cara untuk melindungi informasi. Keamanan ini disediakan dengan mengenkripsi informasi dengan kunci khusus. Informasi ini sebelum enkripsi disebut plaintext. Setelah dienkripsi dengan kunci yang disebut ciphertext. Sangat penting untuk memastikan keamanan informasi Anda agar tidak disalahgunakan atau jatuh ke tangan yang tidak berhak. Informasi ini dapat berupa kata sandi, nomor kartu kredit, atau informasi pribadi lainnya. Perkembangan teknologi informasi dan komunikasi yang sangat pesat menyebabkan munculnya kemajuan. Teknologi informasi memegang peranan penting dalam berbagai bidang kehidupan, baik secara langsung maupun tidak langsung. Teknologi informasi tidak dapat dipisahkan dari berbagai aspek kehidupan manusia. Memungkinkan komunikasi dan pertukaran informasi atau data. Dengan kemajuan teknologi informasi, sangat diperlukan untuk melindungi data terhadap kerahasiaan informasi yang dipertukarkan. Kriptografi adalah studi tentang cara untuk melindungi informasi. Keamanan ini disediakan dengan mengenkripsi informasi dengan kunci khusus. Informasi ini sebelum enkripsi disebut plaintext. Setelah dienkripsi dengan kunci yang disebut ciphertext. Sangat penting untuk memastikan keamanan informasi Anda agar tidak disalahgunakan atau jatuh ke tangan yang tidak berhak. Informasi ini dapat berupa kata sandi, nomor kartu kredit, atau informasi pribadi lainnya.
Peningkatan Pengamanan Data File Menggunakan Algoritma Kriptografi AES Dari Serangan Brute Force Indra Gunawan Indra
Jurnal Media Informatika Vol. 4 No. 2 (2023): Jurnal Media Informatika
Publisher : Jurnal Media Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.55338/jumin.v4i2.496

Abstract

Abstract− Data is a component that can be collected into a single unit and managed, so that it can be used as useful information. Any information that has been collected will later be stored in digital form in the form of files that can then be managed in such a way before the file is published. By using information into the form of files, it can save more than the use of paper types. However, along with the times, the use of digital files has a level of security that is starting to be risky because there are often data breaches from parties who do not have the right to use data. Some of the methods used for data breaches are to use brute force methods. So to be able to anticipate the data breach, several methods are needed that can be used to secure data, including using cryptography with the AES (Advanced Encryption Standard) method. With the use of this method, it is hoped that at least it can increase the security of file data used and stored in digital archives.
Pengaruh Wedang Jahe Dan Peppermint Terhadap Penurunan Mual Muntah Pada Ibu Hamil Trimester 1 Diana Mufidati; Desi Pertiwi
Jurnal Media Informatika Vol. 4 No. 2 (2023): Jurnal Media Informatika
Publisher : Jurnal Media Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Latar belakang masalah: Mual dan muntah (nausea and vomiting of pregnancy/NVP) merupakan kondisi umum yang dialami oleh ibu hamil, terutama pada trimester pertama. Kondisi ini dapat mempengaruhi kualitas hidup dan kesehatan ibu hamil. Penggunaan obat-obatan untuk mengatasi NVP sering kali tidak dianjurkan karena risiko efek samping pada janin. Oleh karena itu, diperlukan alternatif alami yang aman dan efektif, seperti wedang jahe dan peppermint. Penelitian ini bertujuan untuk mengevaluasi pengaruh konsumsi wedang jahe dan peppermint terhadap penurunan mual muntah pada ibu hamil trimester pertama. Metode penelitian yang digunakan desain quasi-eksperimental dengan metode pretest-posttest control group. Sampel penelitian terdiri dari 60 ibu hamil trimester pertama yang mengalami NVP, yang dibagi menjadi dua kelompok perlakuan (wedang jahe dan peppermint) dan satu kelompok kontrol. Pengukuran intensitas mual dan muntah dilakukan menggunakan skala Rhodes Index of Nausea, Vomiting, and Retching (RINVR) sebelum dan sesudah intervensi selama 7 hari. Hasil penelitian: Hasil menunjukkan bahwa baik wedang jahe maupun peppermint secara signifikan mengurangi intensitas mual dan muntah pada ibu hamil trimester pertama dibandingkan dengan kelompok kontrol. Wedang jahe menunjukkan pengaruh yang lebih besar dibandingkan peppermint dalam menurunkan gejala NVP. Kesimpulan: Konsumsi wedang jahe dan peppermint efektif dalam menurunkan mual dan muntah pada ibu hamil trimester pertama. Wedang jahe memiliki efek yang lebih kuat dibandingkan peppermint. Penggunaan kedua herbal ini dapat menjadi alternatif alami yang aman untuk mengatasi NVP pada ibu hamil.

Page 1 of 1 | Total Record : 5