cover
Contact Name
Sularno
Contact Email
soelarno@unidha.ac.id
Phone
+6281377008616
Journal Mail Official
dio@unidha.ac.id
Editorial Address
padang
Location
Unknown,
Unknown
INDONESIA
Jurnal Sains dan Teknologi
Published by CV ITTC Indonesia
ISSN : -     EISSN : 28077393     DOI : 10.47233
Jurnal Sains Dan Teknologi (JSIT), merupakan Jurnal Penelitian dan Kajian Ilmiah yang diterbitkan CV.ITTC - INDONESIA dan dikelola langsung oleh Webinar.Gratis dan Even.Gratis yang terbit 3 (tiga) kali dalam setahun. Penyunting menerima kiriman naskah hasil kajian dan penelitian untuk bidang, Teknik Elektro, Teknik Sipil, Teknik Mesin, ,Teknologi Informasi.
Arjuna Subject : Umum - Umum
Articles 164 Documents
Pengembangan Multimedia Matematika Untuk Siswa Sekolah Dasar Hafizd, Daffa Al; Mulya, Indah Syafitri; Utama, Huzaefah; Aulia, Firda; Rifai, Ahmad; Ikhwan, Ali
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.489

Abstract

Penggunaan buku teks yang monoton membuat siswa sulit memahami materi pembelajaran. Penggunaan multimedia memudahkan siswa khususnya siswa sekolah dasar dalam memahami materi pembelajaran. Tujuan penelitian ini adalah menghasilkan multimedia interaktif dalam pembelajaran matematik di kelas II sekolah dasar. Penelitian yang dilakukan di Sekolah Dasar ini menggunakan rancangan RandD dengan model ADDIE untuk menghasilkan multimedia cerdas interaktif step by step. Analisis data dilakukan dengan menggunakan teknik kuantitatif dan kualitatif. Hasil kajian menunjukkan bahwa multimedia interaktif yang dihasilkan secara umum memenuhi penilaian ahli materi, media dan ahli bahasa yang berkualifikasi tinggi. Studi ini mengungkapkan bahwa animator dapat digunakan oleh 82% ahli bahasa, 86% ahli konten, dan 85% profesional media. Multimedia interaktif ini dapat digunakan dalam pembelajaran matematika, khususnya bagi siswa kelas dua sekolah dasar.
Perancangan Sistem Keamanan Website Dengan Metode Hill Chiper Marpaung, Adetya Maharani; Husnah, Fauziatun; Efita, Sinta Dara; Nasution, Adnan Buyung
Jurnal Sains dan Teknologi (JSIT) Vol. 2 No. 3 (2022): September - Desember
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.494

Abstract

Security is a protection of something that is considered bad or unfavorable and can be detrimental. A website collection of site pages, which are usually summarized in a domain or subdomain, which is located within the World Wide Web (WWW) on the Internet. The WWW consists of an entire website that is publicly available. along with the development of the times the website is increasingly developing through the hands of programmers and developers so that the website is easily accessible, the Hill cipher is a polygraphy based on linear algebra. Each letter is represented by the modulo number 26. With a simple scheme A = 0, B = 1, ..., Z = 25 is used, each block of n letters (considered an n-component vector) multiplied by an inreversible matrix n × n, against a modulus of 26. The Progress of the Times, especially in the field of Technology, makes many people try to steal websites, in an unexpected way and can harm programmers or developers, therefore researchers make applications as a solution to maintain website security by using the Hill Cipher Cryptography method type symmetric encryption algorithm. and for its safety to be better, So the researcher added the 3x3 order as a verification of data encoding. So that programmers and developers can maintain and protect the website that has been created.
Implementasi Keamanan Aset Sekolah Angkasa Berbasis Website Nasution , Adnan Buyung; Aulia, Hasypa; Audiansyah, Wanda; Raihan, Muhammad Syafiq
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.495

Abstract

Sekolah Angkasa Medan Polonia, Merupakan salah satu Sekolah yang terkenal dan tervaforit. Karena beberapa prestasi yang di dapat, tentunya sekolah ini mempunyai aset yang cukup banyak. Namun dalam pengelolaan aset yang ada, sekolah ini masi menggunakan cara pembukuan atau masi menggunakan cara yang manual yang mempunyai resiko yang cukup besar dalam keamanannya dan masih belum memiliki sistem yang berbasis teknologi. Impelementasi pengembangan sistem dalam bentuk website ini akan mempermudah dalam pendataan serta keaman, Dengan adanya penggunaan bantuan teknologi ini akan membantu sekolah dalam sistem data keamanannya sehingga pelaporan aset sekolah yang didata dengan aset bentuk fisik sama.
Penilaian Kapabilitas Tata Kelola Keamanan Informasi Menggunakan Cobit5 Pada PT.Denya Ikhwan, Ali; Ardiyansyah, Agung; Rayhannur, Muhammad Jaffar; Hidayat, Riyan
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.496

Abstract

This research assesses the copability of asset and information security governance using the COBIT5 framewort. The study aims to evaluate the current state of security goverenance in an organization and identify areas of improvement using the COBIT5 framework. The research will analyze the processes and controls in place for managing and protecting information and assets, and assess their aligmnment with the COBIT5 giudelines. The result of the study will procide valuable insights for ornganizations looking to improve their security governance and compliance with industry standards.
Kajian Kebijakan Keamanan Sistem Informasi Sebagai Bentuk Perlindungan Kerahasiaan Pribadi Karyawan Perusahaan BFI Finance Hafizd, Daffa Al; Asnawi, Azi; Assidiqie, Muhammad Fikri
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.497

Abstract

Technology that connects computers around the world makes it possible to exchange information and data and even communicate with each other in the form of images and videos. The more valuable information is, the more security standards are needed to protect that information. The goal of computer security, among others, is to protect information. The higher the security standards provided, the higher the privacy protection of information. Protection of employee privacy in a company is one of the factors that must be considered in the implementation of information systems. Information system security policies include: System maintenance, risk management, setting access rights and human resources, security and control of information assets and server security policies. The policies that have been reviewed will not only be a form of protection for company information, but also a form of protection for the personal privacy of employees of BFI Finance Company..
Evaluasi Manajemen Keamanan Sistem Informasi Pada Perusahaan PT.Wook Tecnology Wahyu Sofianda; Taufiqurrahman; Satria Habibi Ritonga; Adnan Buyung Nasution
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.498

Abstract

PT WOOK TECNOLOGY adalah salah satu perusahaan besar yang bergerak dibidang jasa logistiks di Indonesia.Manajemen keamanan informasi sangat diperlukan sebagai upaya untuk meminimalkan resiko dalam meningkatnya ancaman data dan informasi. Keamanan Sistem informasi terdiri atas perlindungan harian, yang disebut keamanan informasi (information security) dan persiapan-persiapan operasional. Pengolahan data merupakan bagian dari operasional bisnis perusahaan. standard ISO 27001:2005 adalah yang digunakan dalam penelitian ini. menyesuaikan dengan instrumen penelitian pada kebutuhan organisasi yang dikembangkan dan fokus pada manajemen keamanan informasi adalah standard ISO 27001:2005. Dikugnakannya standard ISO 27001:2005 agar dapat mengurangi resiko tingkat keamanan, dan meningkatkan control keamanan yang direkomendasikan pada PT.WOOK TECNOLOGY, serta melakukan evaluasi secara berkesinambungan.
Media Pembelajaran Interaktif Mengetik 10 Jari Berbasis Multimedia SD IT TPI Audiansyah, Wanda; Atsil, Rayhan Alfatih; Sofianda, Wahyu; ., Taufiqurrahman; Asnawi, Azi; Ikhwan, Ali
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.499

Abstract

Interactive multimedia-based media trains students to change a learning process from manual learning methods to interactive methods. In addition to teaching students to be more active, this application is expected to help teachers teach more effectively and efficiently. Based on these problems, explaining information on system weaknesses, how to overcome them and finding the right references about interactive teaching methods. The results of the analysis at SDIT TPI (Islamic Education Park) found that this learning method is still manual. The process of delivering material manually creates an ineffective and efficient teaching and learning system at SDIT TPI (Islamic Education Park) so that students are still dependent on the teacher. Therefore, this media is made as an interactive media based on multimedia teaching and learning activities so that the learning process is not limited by the classroom learning process. Students are expected to study independently outside the classroom.
Implementasi Keamanan di Cloud Storage Menggunakan Algoritma Key Public Berdasarkan Block Cipher Manik, Hazizah W.S; Utama, Huzefah; Irawan, Muhammad Dedi; Hafizd, Sefian Habil
Jurnal Sains dan Teknologi (JSIT) Vol. 3 No. 1 (2023): January-April
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.500

Abstract

Cloud computing is a new era of the modern world. It is an emerging paradigm and has become one of the hottest research to date, because of its ability to reduce the costs associated with computing. The main issues associated with cloud computing are data privacy, security and authenticity. The aim of the researcher is to find out how the model of cloud data storage and data security of cloud computing systems. In this research, researchers propose an efficient method for providing data storage. Security in cloud computing uses a new public key algorithm based on a linear block cipher. This algorithm has been proven by previous studies such as Data encryption, E-commerce, Digital signature. In research, researchers apply the same algorithm, namely cloud computing. In this algorithm several important security services are included such as key generation, encryption and decryption provided in the cloud computing system. The scope of this research is to solve security problems in cloud provisioning and cloud consumers by using new cryptographic methods.
Perancangan Aplikasi Pembelajaran Anatomi Tubuh Manusia Untuk SD Menggunakan Adobe Flash Ikhwan, Ali; Ardiyansyah, Agung; Maulana, Dimas Krisna; Rayhannur, Muhammad Jaffar; Abdillah, Muhammad Oemar
Jurnal Sains dan Teknologi (JSIT) Vol. 2 No. 3 (2022): September - Desember
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v2i3.505

Abstract

During this digital era, technology has had a huge impact on the way we create, process and enjoy media. The development of multimedia has allowed us to combine various types of media, such as text, images, audio and video, into one interactive and engaging platform. Technology has also made media processing easier and more efficient, allowing us to more quickly and effectively access and enjoy media content. In this article, we will review the development and application of technology in media processing, and discuss how this affects the way we create and enjoy media content. We will also review some case examples that show how technology has changed the multimedia industry and the way we access media content.
Analisis Pengukuran Waktu Kerja Mengunakan Metode Maynard Operation Sequence Tecnique (MOST) Pada UMKM Kebab Dara Syawarma ., Azuardi; Hidayatullah, Roby Ilham Noor; Pratama, Yogi; Adelino, Muhammad Ilham
Jurnal Sains dan Teknologi (JSIT) Vol. 2 No. 3 (2022): September - Desember
Publisher : CV. Information Technology Training Center - Indonesia (ITTC)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47233/jsit.v3i1.511

Abstract

Pengukuran waktu kerja merupakan bagian penting dalam proses standarisasi waktu dalam proses bekerja. Permasalahan pada UMKM Kebab Dara Syawarma ini banyak melakukan aktivitas gerakan yang menganggur sehingga terjadi delay. Tujuan dari penelitian ini untuk mengetahui tangan yang melakukan aktivitas yang paling sering menganggur. Metode yang digunakan dalam pengukuran waktu kerja dengan metode Maynard Operation Sequence Tecnique (MOST). Hasil yang diperoleh dari penelitian ini adalah waktu siklus sebesar 165 detik dan jarak total jangkauan tangan sebesar 328 cm. Faktor penyesuaian didapatkan sebesar 1.25 dan faktor kelonggaran didapatkan 0.45 selanjutnya Waktu normal didapatkan sebesar 206.25 sedangkan untuk Waktu baku didapatkan sebesar 375.00. Pengukuran dengan metode MOST didapatkan total waktu baku TMU sebesar 830 TMU sehingga didapatkan nilai total TMU sebesar 29.88 detik.

Page 5 of 17 | Total Record : 164