cover
Contact Name
Muhammad Fajar B
Contact Email
fajarb@lontaradigitech.com
Phone
+6285161421241
Journal Mail Official
fajarb@lontaradigitech.com
Editorial Address
Jalan Abdullah Dg. Sirua, Kompleks BTN CV Dewi Blok B6 No. 12, Makassar
Location
Kota makassar,
Sulawesi selatan
INDONESIA
Journal of Security, Computer, Information, Embedded, Network and Intelligence System
ISSN : 30248701     EISSN : 30248329     DOI : https://doi.org/10.61220/scientist
Articles submitted in SCIENTIST Scientific Journal will be examined by the editorial board. If the article matches the scope and style of writing an SCIENTIST Scientific Journal, the editorial board will assign the article to the reviewer. Reviewers name cannot be seen by the author. The author only sees the review results from the reviewer, so the author must revise the reviewer request. Each article will be reviewed by two reviewers. If one of the reviewers refuses, the decision will be submitted to the editor. If all reviewers receive the article will be published. Articles that do not make revisions will not be published in the SCIENTIST Scientific Journal. These fields include: Intelligence System Artificial Intelligence Machine Learning Data Science Computer Vision Information System Decision Support System Expert System Automation System Data Mining Embedded Sytem Internet of Things Robotic Wearable Technology Wireless Sensor Networks Network and Security Network Security Cryptography Cloud Computing Virtualization
Articles 5 Documents
Search results for , issue "Vol. 1, No. 2 (Desember 2023)" : 5 Documents clear
Implementation of Failover on Mikrotik Router using Check Gateway and Distance Parameters Jayadi, Akhmad; Sadamaputra, Frendy
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20231

Abstract

At the end of 2019 the world faced the Covid 19 Virus pandemic which also changed activities in daily life. All activities are carried out at home (Work From Home) including meetings and exchanging information via digital. Problems at this time in the office of PT. PLN often loses internet connection, at PT. PLN ULTG Tarahan also uses 2 ISP (Internet Service Provider) lines Indihome and Icon Plus in the server room, there is no system that can regulate the two ISP networks so that they can switch connection lines if there is a disturbance on the main ISP line so that there is a possibility of interruption during activities using the internet network. Failover is a technique for adding connections in Mikrotik, where if one of the internet connections dies (main connection), the other connection (backup connection) will replace the main connection line by defining a check gateway and differentiating the distance value on each routing rule. The results of this study will be able to guarantee the availability of internet at the PT. PLN ULTG Tarahan so as to increase employee productivity.
Clustering Tweets Data on Twitter Social Media using K-Means Method Surianto, Dewi Fatmarani
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20232

Abstract

Twitter, as a popular social media with millions to billions of global users, stores a wide variety of information. This study focuses on the use of Text Mining to analyze tweet content through the application of clustering techniques, specifically using the K-Means algorithm. The implementation process involves several stages of text processing, including casefolding, tokenizing, stopword removal, and stemming. Feature extraction is performed to provide input for the K-Means algorithm. The clustering evaluation uses the Silhouette coefficient method. The test results show that different K values result in a variation of the silhouette value. In a particular test scenario, a value of K=2 resulted in a silhouette of 0.5000421, K=5 had a value of 0.0501051, and K=9 had a value of 0.501893. From these values, the data structure of the dataset taken can be categorized as medium structure, because the silhouette value is in the range of 0.5 to 0.7. These results show that cluster quality is influenced by the K value, with the silhouette value being the main determinant.
Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20233

Abstract

Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.
Performance Analysis of The Last Significant Bit (LSB) Method in Steganography for Data Hiding in Image Data Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20234

Abstract

Technology as a means of conveying information can have significant implications for the security and confidentiality of data and information content. When a sender wishes to convey a message to someone and does not want the message to be easily visible, the concealment of this message becomes crucial for the sender. One commonly used method for data concealment is the Least Significant Bit (LSB) method in steganography. The LSB method is preferred for its simplicity, fast process, and greater capacity. Messages are embedded by replacing the least significant bit in the host image with the message bits, with the rule that the number of message bits does not exceed the number of bits in the host image. Based on research findings, the results of steganography are difficult to distinguish from the original content through visual observation. Therefore, it can be concluded that the steganography method is highly effective for concealing a message.
SIPKOM: Efektivitas Sistem Perkuliahan di JTIK Universitas Negeri Makassar Berbasis Website Achyar AM, Andi Muh; Rauf, Annajmi; Sirenden, Deswanto Richard; Faruq, Ahmad Faris Al; Tabagas, Nor Ihsan
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20235

Abstract

This research aims to implement an announcement and communication information system in the Department of Informatics and Computer Engineering, Universitas Negeri Makassar. The system utilizes information technology that combines computation and interaction to develop software and hardware components. Prior to the existence of e-learning, learning was conducted face-to-face, but having these two learning options could lead to communication gaps between teachers and students. Therefore, a website-based announcement and communication information system (SIPKOM) was developed to provide quick information and enable communication among students, administrators, and teachers. The research and development method was employed in this study. Data was collected through literature review, scientific journals, and online questionnaire distribution using Google Form. The system development utilized Agile Development methodology, allowing for quick adaptation to changes. The system design was based on Unified Modeling Language (UML) for visualization and design standards. System testing was conducted through Black box testing, where software was tested without considering its internal details. The development plan for the SIPKOM application encompassed Use case modeling, Activity diagram, sequence diagram, and class diagram. Use case modeling was used to represent the interactions between users and the system. The Activity diagram was utilized to depict the workflow of the application, including schedule display, account announcements, and chat features. Through this research, it is expected to provide a comprehensive insight into the effectiveness of the announcement and communication information system in the Department of Informatics and Computer Engineering. The system is anticipated to help overcome communication gaps between teachers and students and enhance the efficiency of information management and communication in the academic environment.

Page 1 of 1 | Total Record : 5