cover
Contact Name
Karona Cahya Susena
Contact Email
admbengkulu5758@gmail.com
Phone
+6281541234500
Journal Mail Official
admbengkulu5758@gmail.com
Editorial Address
JL. Ratu Agung No. 4A, Anggut Bawah, Ratu Samban, Kota Bengkulu
Location
Kab. bantul,
Daerah istimewa yogyakarta
INDONESIA
Jurnal Komputer, Informasi dan Teknologi
ISSN : 2807256     EISSN : 28072588     DOI : https://doi.org/10.53697/jkomitek.v1i2
KOMITEK Journal (Computer, Information and Technology) journal was founded in 2021. It is an interesting and useful national journal for all parties with an interest in research in various fields of, or closely related to, the disciplines of Computer, Information and Technology. KOMITEK Journal aims to provide a highly readable and valuable addition to the literature that will serve as an indispensable reference tool for years to come. The scope of the journal includes all new theoretical and experimental findings in the field of Computers, Information and Technology or any closely related field. The journal also encourages submission of critical review articles covering advances in the latest research in the field of Computers, Information and Technology.
Articles 377 Documents
Comparative Analysis of the Blowfish Algorithm and the Des Algorithm in the Document File Encryption and Decryption Process Saputra, Ronaldo Praja; Wahyudi , Jusuf; Jumadi , Juju
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1041

Abstract

Security issues are one of the most important aspects in the world of information technology, such as document security. Most of the documents are created through the Microsoft Office application package, because it is easy to use. There are several applications available in Microsoft Office, namely Microsoft Word, Microsoft Excel, Microsoft Access, Microsoft Powerpoint, and others that are used to process words and numbers according to user needs. Comparative analysis of the Blowfish algorithm and the DES algorithm in the encryption process is carried out based on 3 comparison aspects, namely processing time, file size and memory used. Comparisons were made with 40 test data in the form of document files, each consisting of 10 test data with extension formats *.docx, *.xlsx, *.pdf, and *.pptx, where these formats are familiar in data processing using Microsoft Office. Based on the tests that have been carried out, it can be concluded that in the encryption process, the DES Algorithm has a faster time than the Blowfish Algorithm with a percentage of the DES Algorithm's encryption processing time of 3.7975%. In the decryption process, the DES Algorithm has a faster time compared to the Blowfish Algorithm with a percentage of the DES Algorithm's encryption processing time of 3.595%. In the encryption process, the file size in the DES Algorithm increases bytes less than the file size in the Blowfish Algorithm. In the decryption process, the file size in the DES Algorithm and the Blowfish Algorithm does not change, because the file size returns to the original file size. In the encryption process, the DES Algorithm uses less memory compared to the Blowfish Algorithm with the percentage of memory used by the DES Algorithm being 49.655%. In the decryption process, the Blowfish Algorithm uses less memory compared to the DES Algorithm with the percentage of memory used by the Blowfish Algorithm 49.5925%
Network-Based Text Message Security System Using the Data Encryption Standard (DES) Algorithm Simanjuntak, Horas Aryanto; Aspriyono , Hari; Rohmawan , Eko Prasetiyo
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1042

Abstract

UPT. Puskom as practicum manager has the responsibility to provide facilities including applications needed for each course. In this research, the development of a network-based text security system was carried out by implementing one of the cryptographic algorithms that had been packaged into an application so that students could find out the encryption and decryption processes of the Cryptographic algorithm, namely the Data Encryption Standard (DES) Algorithm. A network-based text message security system using the Data Encryption Standard (DES) Algorithm was built using the Visual Basic .Net Programming Language and SQL Server database. The security system built can help keep messages sent secret from the sender to the recipient of the message through the DES algorithm. The encryption process can be carried out by the user who will send a text message to the intended user, who can open the encryption form and select the intended user, the encrypted message will be stored in the database. Meanwhile, decryption can be done by users who receive text messages by opening the decryption form and displaying the messages sent by the message sender. Based on the tests that have been carried out, it can be concluded that the application is capable of encrypting and decrypting text messages using the DES algorithm.
Application of the Multiple Linear Regression Method in Forecasting the Amount of Drug Supply at the Health Center Ternando, Riki; Wahyudi , Jusuf; Suranti , Dewi
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1043

Abstract

Sukamerindu Health Center is one of the health centers in the city of Bengkulu. Drug management at the puskesmas has utilized an office application package, namely excel, but this utilization has not been fully implemented, because there is still a manual process where drug data collection is filled in through the books that have been provided, then only recapitulated at the end of the month. This sometimes makes it difficult for the puskesmas to manage the availability of drugs at the puskesmas. The application for forecasting the amount of drug supply at the UPTD Sukamerindu Health Center in Bengkulu City was made using the Visual Basic .Net programming language by applying the Multiple Linear Regression Method for the forecasting process. In determining the results of the forecast for the following month and year, there are 3 supporting variables used, namely demand, use, and supply of drugs in the previous month and year. Based on data on the 500 mg Amoxicillin Capsule, where there were 36 data analyzed from January 2019 to December 2021, the prediction results for the number of drug supplies in January 2022 using the Multiple Linear Regression Method were 13066, with a prediction error rate of 7.10%. . Based on testing the application for forecasting the amount of drug inventory at the UPTD Puskesmas Sukamerindu, Bengkulu City, it was found that the functionality of the application ran according to expectations .
Implementation of a Computer Network Monitoring System Using Icinga Linux-Based Ubuntu Server at SMA N 1 Bengkulu Tengah Junaidi, Iwan; Wahyudi , Jusuf; Rohmawan , Eko Prasetiyo
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1047

Abstract

One of the network monitoring applications is using Icinga with the Linux Ubuntu server operating system. Icinga is a Linux application or tool that can be used to monitor computer networks. Monitoring computer networks using Icinga can monitor data traffic, network traffic and errors that occur on the network. Monitoring traffic and traffic on the network is displayed in graphical form, making it easier to do the analysis. Meanwhile, in monitoring the errors that occur on the network, they are grouped based on the client and service, so it is easy to see which error occurred from the client and what service was used. In operating the network monitoring system with Icinga using the Linux Ubuntu server operating system, the use of computer resources is very small, which is less than 20%.
Clustering Sales Patterns of Best Selling and Less Selling Products at El Jhon Bengkulu Stores Using the K-Medoid Method Ridwan, Agung Laksono; Siswanto, Siswanto; Alinse , Rizka Tri
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1048

Abstract

The clustering application of the best-selling and less-selling product sales patterns at the El Jhon Bengkulu Store can provide information on the best-selling and less-selling product sales patterns as a basis for consideration in product inventory management at the El John Store. Based on 40 total product sales and inventory data in April 2022, the results obtained that 9 data entered cluster C1 (22.5% best selling products) and 31 data entered C2 cluster (77.25% less selling products). Based on the results of the tests that have been carried out, the functionality of the product inventory is running well as expected, and can provide information on the results of product data clustering into 2 groups, namely Best Selling and Less Selling
Disease Diagnosis Expert System In Palm Oil Plants Using Forward Chaining Method Android Based firnando, Rezaldi; Asnawati, Asnawati; Fredicka, Jhoanne
Jurnal Komputer, Informasi dan Teknologi Vol. 2 No. 2 (2022): Desember
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v2i2.1125

Abstract

Oil palm is one of the plantation types in Indonesia that occupies a position and is growing rapidly, whether it is owned by individuals or owned by companies. Along with the advancement of the times from time to time, where every time technology is always developing rapidly in the digital era. The purpose of this study is to provide information on oil palm plant diseases and appropriate and accurate countermeasures in maximizing the productivity of oil palm plants. The application of the forward chaining method to diagnose diseases of oil palm plants based on problems that arise in oil palm plants. Disease research in oil palm needs an expert system in analyzing diseases that arise in oil palm, therefore that productivity in oil palm plants can be fulfilled properly and get satisfactory results. The application built is online and can only be used by farmers who use smartphones.
Implementation Of The Dempster Shafer Method For The Diagnosis Of Sepsis Aprilinda, Tara; Siswanto, Siswanto; Yupianti, Yupianti
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 1 (2023): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i1.1161

Abstract

Sepsis is a disease that starts from infection. When an infection occurs, the body's organ systems will be damaged because when the blood flow is filled with chemical compounds produced by the body with the aim of fighting infection and triggering an inflammatory response that is damaged in the function of the body's organs, causing important organs to fail in working so that it leads to death. People often do not realize that the disease they suffer has reached the sepsis stage. Since sepsis is a rare disease and difficult to find an expert, a tool is designed to use an expert system to diagnose sepsis early from the symptoms felt by the user. This expert system was designed using the PHP Programming Language and MySQL database by implementing the Demster Shafer Method. The expert system created can make it easy for users to consult about Sepsis online..
Design and Build an Academic E-Reminder Application Using Mobile-Based Push Notification Technology Elyza, Lora
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 1 (2023): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i1.1166

Abstract

One of the activities carried out in tertiary institutions is academic activity. Academic activities are arranged in an academic calendar that is used to schedule academic activities both in the short and long term. Information on the academic calendar is usually announced on bulletin boards, social media and even distributed through online student groups. Even though academic activities are routines that are often carried out by students, with so many academic activities, it is not uncommon for some important things to be forgotten. To overcome the problems above, we need an application that can help remind these students wherever and whenever they are. One way is to take advantage of the sophistication of an Android smartphone that is equipped with a push notification feature. The results of the study show that the application can run well on an Android smartphone and notifications appear automatically according to the data entered by the application user.
Analysis of Mineral Water Distribution Using Apriori Algorithm Method Reswan, Yuza; Abdullah, Dedy; Sonita, Anisya; Anggraini, Laura
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 1 (2023): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i1.1173

Abstract

Normalization is a process used to prepare data so that it can be used to meet user needs and support subsequent processes to get better results. The image normalization application system with Resizing Image is implemented using the matlab programming language. The mechanism for making an application starts from making a GUI (Graphic User Interface) to making coding. This thesis presents a system model of image normalization using k-space transformation to get the result in the form of an image normalization display using image resizing. The creation of an image normalization system using k-space transformation was carried out using the Matlab programming language version 2021a. The results of the system functionality test show that the image normalization system using the built resizing image can be used properly.
Implementation Of The Codeigniter 3 Framework For The Payment Of "Cafe Tik Tok" Employees Web-Based Bengkulu Wibowo, Sastya H.; Witriyono, Harry; Hidayah, Agung Kharisma; Saputra, Regi
Jurnal Komputer, Informasi dan Teknologi Vol. 3 No. 1 (2023): Juni
Publisher : Penerbit Jurnal Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53697/jkomitek.v3i1.1174

Abstract

Cafe Tik tok is a franchise engaged in the restaurant sector. In this tick tok cafe, in processing employee salaries, they still use manual calculations and use the Ms.Excel program. This can cause errors in calculating employee salaries and the process of printing employee payslips that takes a long time. In solving this problem, the authors designed an employee payroll information system. In this design, the author uses the PHP programming language, with the database format using MySQL. The result of this design is to produce an application program that will be used to process web-based employee salaries at the tiktok cafe and it is hoped that the company will find it easy to input data and compile payroll reports to be fast and more efficient.