cover
Contact Name
Paska Marto Hasugian
Contact Email
siskahhasugian@gmail.com
Phone
+6281264451404
Journal Mail Official
editorjournal@seaninstitute.or.id
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Info Sains : Informatika dan Sains
Published by SEAN INSTITUTE
ISSN : 20893329     EISSN : 27977889     DOI : -
Core Subject : Science,
urnal Info Sains : Informatika dan Sains (JIS) discusses science in the field of Informatics and Science, as a forum for expressing results both conceptually and technically related to informatics science. The main topics developed include: Cryptography Steganography Artificial Intelligence Artificial Neural Networks Decision Support System Fuzzy Logic Data Mining Data Science
Articles 8 Documents
Search results for , issue "Vol. 11 No. 2 (2021): September, Informatics and Science" : 8 Documents clear
Design Simulation Queue Cake Shop With Lamport's Bakery Algorithm Roberth Ricki Manaha Manaha; Janeman Summah
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (749.991 KB) | DOI: 10.54209/infosains.v11i2.40

Abstract

Mutual exclusion is one of the mechanisms that can be used to solve concurrency problems in the operating system. In the operating system, there are resources that cannot be shared at the same time, such as printers. These kinds of resources are called critical resources. Programs that use critical resources are called entering critical regions/sections. Programmers cannot rely on the operating system to understand and enforce these limits. The mutual exclusion settlement process was submitted by several experts. One of them is Lamport with a method known as Lamport's Bakery Algorithm. The work process of Lamport's Bakery Algorithm starts from the buyer entering the store and receiving the sequence number. If there is a waiter who is idle (not being / will serve other buyers), then the buyer directly asks for service from the waiter. If not, then the buyer sits in the buyer's waiting area and waits until his turn. Shoppers who have finished being served out of the store and waiters who are idle serve the lowest numbered buyers who are waiting at the waiting place of the buyer
Use of Rc4 Method In Android-Based Sms Security Application Oktovantua Butarbutar
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (794.028 KB) | DOI: 10.54209/infosains.v11i2.41

Abstract

. In maintaining the confidentiality of SMS, it takes a way to secure information that is important or confidential, namely by encrypting the SMS text, the level of information security of the message can be increased. One way to use for data and or information security is to use cryptographic system, this application uses RC4 algorithm which has the advantage of having a high level of security and speed process. This makes RC4 the best choice for the encryption process required by the information world towards the next century. The purpose ofbya is to prevent the occurrence of information / data taker without being known by the owner.
Text Encoding Using Cipher Block Chaining Algorithm Santana Sinurat; Maranatha Pasaribu
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1149.095 KB) | DOI: 10.54209/infosains.v11i2.42

Abstract

. Data confidentiality and security are critical in data communication, both for the purpose of shared security, and for individual privacy. Computer users who want their data unknown to unauthorized parties are always trying to work out how to secure the information that will be communicated or that will be stored. Protection against data confidentiality is increasing, one way is by applying cryptographic science. Cipher Block Chaining (CBC), this mode is a feedback mechanism on a block, and in this case the result of the previous block encryption is feedback into the current block encryption. The trick is to block the current plaintext in XOR first with the ciphertext block of the previous encryption result, then the result of this XOR-ing goes into the encryption function. With CBC mode, each ciphertext block is calculated not only on its plaintext block but also on the entire previous plaintext block. The author tries to co-create a text encoding to secure the data with the Cipher Block Chaining (CBC) cryptographic method.
File Compression Application Design Using Half Byte Algorithm Paska Marto Hasugian; Rizki Manullang
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (513.682 KB) | DOI: 10.54209/infosains.v11i2.43

Abstract

The need for large data storage capacity seems increasingly important. This need is caused by the data that must be stored more and more. The storage is not allocated in one place only. But they will also store data or files elsewhere as data backups. How much storage capacity must be provided to hold all the data. Half Byte algorithm is one of the data compression algorithms. The Half Byte algorithm utilizes four left bits that are often the same sequentially especially text files. When the first four bits of the character are received in a row seven or more times, the algorithm compresses the data with marker bits, then the first character of the same four-bit series is followed by the last four-bit pair of the next series
Analysis Of Voice Data Security Security By Using The Rc4 Algorithm Rika Nurhidayati; Salauddin Muis
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (790.664 KB) | DOI: 10.54209/infosains.v11i2.44

Abstract

Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One of the fields of science that is used to secure data is cryptography. Cryptography is a science that uses mathematical equations to encrypt and decrypt data. Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) and decryption is the opposite of encryption, which changes ciphertext back into plaintext. In this study, the RC4 algorithm will be discussed to encrypt and decrypt mp3 files stored on the computer.
Global Power Dynamics: Geopolitical Change in the 21st Century Kunkunrat Kunkunrat
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

This research aims to understand the dynamics of changes in global power in the geopolitical context of the 21st century. Through a qualitative approach, this research uses case study methodology and cross-country analysis to collect and analyze secondary data from related literature, policy analysis, as well as interviews with geopolitical experts and related stakeholders. The results of this research highlight the shift in political and economic dominance to Asia in the 21st century. The economic revival of countries such as China, South Korea, India and Indonesia confirms that Asia is increasingly becoming the center of attention in global dynamics. The confrontation between the United States and China reflects tensions in efforts to maintain and achieve supremacy at the international level. The formation of the Quad alliance, as a response to China's influence in the Indo-Pacific Region, shows the United States' strategy in managing regional dynamics. The transformation of the roles of the United States and Europe indicates that world power is increasingly dispersed.
Control of Changes in the Function of Residential Houses to Business Buildings in Urban Areas Ernawati, Ernawati; Susetya Herawati; Budi Supriyatno
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

The limitation of land and its expensive cost in urban areas led to the invasion of commercial functions into the settlement area. The transformation of housing into business buildings is due to population growth within the city and increased activity, where land remains constant so that it cannot accommodate the needs of urban communities. Among these phenomena is the doubled use of housing – for housing and business – to secure additional income/economic boost for the family. As a result, space layout patterns are uncontrolled, and the functions set in the space plan are not achieved. This, in turn, has interfered with the activity and comfort of the environmental functions of the Hunian as a decent Huni. This research aims to produce a formula for the control of the movement of housing functions into business buildings, where the change of the housing function to business building has taken place since 2008 when Law No. 51 of 2008 on the Establishment of the City of Southern Tangerang as an Autonomous District. The method used is a qualitative and quantitative approach with overlay analysis, descriptive analysis, policy analysis and monitoring and control analysis relevant to the intensity of space utilization. (karakteristik nilai tanah, kelengkapan utilitas, aksesibilitas tanah, karakteristik pribadi pemilik tanah, aturan penggunaan tanah, inisiatif bangunan komersial). The uncontrolled change in the function of the residential house into the building of the business building caused a lack of spatial arrangement along the main street corridors in the housing area as a residential place in the urban area caused by the presence of the factors.
The Effect of Classical Music Therapy on Pain Intensity Pain in Post Appendicectomy Patients in Room Rose II General Hospital Bina Kasih Medan Arianus Zebua; Herianto Bangun
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Music therapy is the use of music for relaxation to accelerate the healing, improve mental function and create a sense of prosperity, music has a biological effect on human behavior by involving specific brain functions such as memory, learning, motivation, and emotion. Pain is an important sensation for the body. The sensation of vision, hearing, smell, taste, touch and pain is the result of sensory receptor stimuli. Pain management as part of the nurse's care of the patient's response will differ between patients, Appendectomy is the appendix uplifted by an endoscopic procedure or approach, Appendixitis is a bacterial infection. The trigger factor is the lumen blockage caused by fecalite, lymphoid hypertrophy, dry barium, seed or intestinal worms.This research is quasi experiment, which is done to know the influence of classical music therapy to the intensity of pain in post appendectomy patients with 32 respondents, the method of data collection by way of way and direct observation of respondents, The analysis technique used is t-test with 95% confidence level.The results of this study indicate that to determine the effect of classical music therapy on the intensity of pain in patients post apendiktomi very real and close. Before performing music therapy the mean value of 2.59 after music therapy the mean value of 1.44 suggest to health workers especially to nurses At Bina Kasih General Hospital Medan to provide (Penkes) Health education to patients who experience pain post Apendiktomi.

Page 1 of 1 | Total Record : 8