cover
Contact Name
Muhammad Syahrizal
Contact Email
syahrizal83.budidarma@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Journal Global Technology Computer
ISSN : -     EISSN : 28096118     DOI : https://doi.org/10.47065/jogtc.v2i3.3992
Journal Global Technology Computer, ini memiliki bidang kajian: 1. Manajemen Informatika, 2. Sistem Informasi, 3. Game Design, 4. Multimedia System, 5. Sistem Pembelajaran Berbasis Multimedia, 6. GIS, 7. Mobile Programming, 8. Database Design, 9. Network Programming, 10. Distributed System, 11. Data Mining, 12. Sistem Pakar, 13. Kriptografi, dan 14. Sistem Pendukung Keputusan.
Articles 12 Documents
Search results for , issue "Vol 4 No 1 (2024): Desember 2024" : 12 Documents clear
Penilaian Tingkat Kapabilitas Tata Kelola Teknologi Informasi Menggunakan Kerangka Cobit Priyatna, Ade; Sanwani, Sanwani
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6321

Abstract

This study analyzes the capability level of information technology (IT) governance using the COBIT framework, focusing on the APO (Align, Plan, and Organize) and MEA (Monitor, Evaluate, and Assess) domains. In the rapidly evolving digital era, IT plays a crucial strategic role in supporting operational efficiency, product innovation, and customer service enhancement. However, suboptimal governance may hinder the achievement of business objectives. The primary aim of this research is to assess the alignment between business processes and IT strategies, identify weaknesses in IT governance, and provide recommendations for improvement. The methods used in this study include interviews, document analysis, and questionnaires. The results indicate that the integration of the APO and MEA domains can enhance the effectiveness of information system audits and provide significant added value to companies in their efforts to achieve better IT governance.
Sistem Informasi Bank Sampah Dalam Meningkatkan Ekonomi dan Pengendalian Dampak Lingkungan di Desa Kota Pari Muttaqin, Muhammad; Yusup, Mohammad; Syaula, Maya; Widodo, Arif Arya
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6388

Abstract

The Pari City Waste Bank application utilizes a computerized system in managing waste involving the field of information technology. This shows that information technology has become a supporting part in managing waste management. This waste bank is a village institution that operates in the field of waste processing. Apart from saving and sorting waste, the waste bank also teaches people to process waste into items that are useful and have selling value. A computerized system is needed in waste bank institutions so that performance can improve and the institution can develop better. From the existing problems, the author created a system for transactions and management of the Waste Bank in Pari City using a web-based information system. The results of this web-based Waste Bank application can speed up and make it easier for officers to carry out transactions, process and record customer savings data at the waste bank.
Analisis Keamanan Cloud Dengan Zero Trust Dan Blockchain Yang Tangguh Fitrian, Harry Pribadi; Neni, Neni; Aziz Bisri, Farhan Nur; Al Fathir, Muhammad Willy; Hizbulloh, Muhammad Jaisy
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6432

Abstract

This study integrates Zero Trust Architecture (ZTA) and Blockchain to strengthen cloud computing security. In the digital era, cloud computing has become a mainstream technology for data storage and processing globally. However, traditional perimeter-based security models have proven ineffective in dealing with modern threats, such as insider threats increasing by 60% and ransomware attacks on major cloud computing providers in 2022 resulting in billions of dollars in losses, highlighting the weaknesses of existing security models. Zero Trust Architecture (ZTA) offers a solution with a granular access control approach and layered authentication, but its implementation still faces challenges in efficiency and scalability, Blockchain, with its decentralized technology and immutable records, improves data transparency and integrity, but its use is often constrained by high energy consumption and latency. This study aims to explore between ZTA and Blockchain as innovative solutions to improve cloud security. By combining ZTA-based access control and Blockchain transparency, this study develops a security model that is resilient to both internal and external threats. Simulations show that ZTA and Blockchain integrity can reduce insider threats by 35% and increase data audit efficiency by 20%. This approach not only offers stronger protection but also provides an adaptive and transparent system for rapidly evolving cloud infrastructure.
Pemanfaatan Augmented Reality Sebagai Media Interaktif Dalam Pameran Seni Lukisan Sutrisna, Sutrisna; Aulia, Rachmat; Sundari, Siti
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6437

Abstract

Art exhibitions as a means of displaying creative works require innovation in the interaction between visitors to artworks. Currently, the use of augmented reality (AR) in art exhibitions is increasingly relevant and attracts attention as an interactive medium. However, challenges in its implementation still exist, including the lack of visitor engagement and limited physical space. The proposed solution is to use the marker-based tracking method in AR, which allows the integration of artworks with the environment through visual markers. This method allows visitors to interact directly with artworks through their mobile devices. In this context, the marker-based tracking method uses physical and visual markers, such as images or certain objects, to trigger AR elements. Visitors can access additional content, such as information about the artwork, multimedia interactions, or dynamic visualizations, by pointing their devices at the specified markers. This creates a new dimension in art, allowing visitors to interact directly with artworks through additional digital layers. The result is increased visitor interaction and participation in art exhibitions, resulting in a more immersive and dynamic experience. This system is expected to broaden the appreciation of art, encourage discussion, and enrich the visitor experience. The main goal is to enrich the visitor experience in understanding, appreciating, and enjoying artworks through interactive and innovative technology. Thus, the use of AR in art exhibitions with the marker-based tracking method not only creates a creative and immersive experience, but also opens up new potential in connecting art and technology to create a richer and more memorable experience. The results achieved from this study are in the form of providing a deeper experience to visitors in a painting art exhibition.
Implementasi Algoritma MD5 Pada Sistem MBKM Dan Di Universitas Bina Insan Anggardha, Alvin; Rizki, Fido; Karman, Joni
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6464

Abstract

The problem in this study is that in the implementation of the MBKM program there are still many weaknesses and shortcomings, including the fact that currently Bina Insan University does not have its own system that can be used as an information media in providing the best service to students, the current system needed is a system with the application of the Md5 algorithm, the MD5 algorithm is one of the algorithms used to find out that the message sent has not changed while on the network, this system provides registration for each existing independent campus program so that all data will be centralized in one system, on the other hand, the MBKM section also requires a system that can convert credits to programs that have been followed, where in the program each student is given the right to get a conversion of 20 credits or the equivalent of one semester. The results of this study are that with this application, it can facilitate the MBKM in processing and converting the MBKM program, as well as speeding up and streamlining the registration process and converting MBKM program values ​​and providing information to students and lecturers about MBKM.
Implementasi Multimedia Development Life Cycle pada ARbook untuk Pembelajaran Bahasa Inggris di Sekolah Dasar Harahap, Muhammad Azhari
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6498

Abstract

Currently, the challenge of low learning motivation among elementary school students has become a critical issue requiring innovative solutions. To address this, ARbook was developed with the aim of stimulating students' interest in the learning process through dynamic and interactive visual approaches. In developing ARbook, researchers utilized the Marker-based tracking method to enhance user interaction with learning content. The primary objective of this research was to create a multimedia product capable of optimizing students' learning process and outcomes in an effective and efficient manner. The Multimedia Development Life Cycle (MDLC) methodology was employed as a comprehensive framework for developing the product, encompassing six crucial stages: planning, analysis, design, development, implementation, and evaluation. Through this systematic approach, the research successfully demonstrated that the MDLC method can significantly improve students' academic achievements. The final product, consisting of an integrated application and textbook, was assessed as highly user-friendly and easily accessible to students. This research is expected to make a positive contribution to driving educational media innovation in the future, offering more interactive and engaging educational solutions.
Optimalisasi Pengguna Memori Virtual Pada Sistem Operasi Windows 10 Apriana, Shalwa Putri; Hidayat, Rahmat; Rivani, Elkin
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6512

Abstract

Virtual memory plays an essential role in contemporary operating systems like Windows 10, particularly in accommodating big data applications that need significant memory resources. This study seeks to evaluate how virtual memory optimization affects system performance using experimental techniques. Evaluations were performed utilizing benchmark software like Cinebench R20 and Unigine Heaven to assess the performance of the GPU and CPU. With virtual memory activated, the findings indicate a rise in data processing by 5-10% and a notable decrease in application response time. These findings hold significant consequences for application developers and users of systems with limited resources, since virtual memory can enhance physical memory capacity and improve overall system performance.
Sistem Fogging Spray Machine Disinfektan Berbasis Remote Control Dan Microkontroler Arduino Juliantara, Roziardi Putra
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6468

Abstract

Environmental health needs to be a major concern, such as air pollution which results in environmental pollution. That currently 90% of humans do their activities in closed spaces. Air cleanliness in closed spaces is important because it has a direct impact on human health. The aim of this research is to design a Remote Control and Microcontroller Based Disinfectant Fogging Spray Machine System. This tool will use Arduino – Nano as a Microcontroller and Remote Control as a driver and a Wireless IP Camera to monitor the work tool. This tool will require an NRF24L01 PA LNA 2.4Ghz as a detector signal transmitter at a distance of 10cm, an Oled LCD as an output and a GY - 906 temperature sensor that will measure the voltage and temperature that will be used by the tool. Testing CCTV cameras by controlling the Smartphone to find out the distance of the object to be sprayed. And controlling the tool via smartphone, to avoid dangerous areas. The Disinfectant Fogging System uses a CCTV camera system so that it can detect the distance to be sprayed and the cellphone will display an image or video. The remote control will hold or direct what will be sprayed, so that the disinfectant machine will release disinfectant fogging spray liquid.
Perancangan Aplikasi Adopsi Kucing dengan Framework ReactJS dan Pendekatan Agile Berbasis Analisis PIECES Meyliana, Anastasia; Kurniawati, Brilliannissa Zulfa
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6748

Abstract

The increasing population of stray cats in urban areas demands innovative solutions to support a more efficient and transparent adoption process. This study aims to develop a web-based cat adoption application using the ReactJS framework and the Agile approach. In the development process, PIECES (Performance, Information, Economy, Control, Efficiency, and Service) analysis is used to identify system requirements and evaluate application performance. The Agile method is applied to enable iterative and adaptive development according to user needs. The ReactJS framework was chosen because of its ability to build responsive and interactive user interfaces. This application is equipped with cat gallery features, adoption profiles, adoption status tracking, online donations, and volunteer registration. The test results show that the developed application is able to increase the efficiency of the adoption process by up to 40%, increase user satisfaction based on the User Experience Questionnaire (UEQ), and support transparency in shelter management through donation and volunteer management features. PIECES analysis provides important insights to improve the performance and service aspects of the application. This application not only simplifies the adoption process but also increases public awareness of animal welfare equipped with adaptive and user-based features that integrate technology to support more effective and sustainable animal adoption.
Analisis dan Perancangan Sistem Kriptografi Merkle-Hellman Knapsack Untuk Mengamankan File Text Budiman, Arief; Sari, Yunita
Journal Global Technology Computer Vol 4 No 1 (2024): Desember 2024
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jogtc.v4i1.6900

Abstract

Cryptography is a field that is really needed in the current era of globalization where security and confidentiality of information are very difficult to maintain considering wide and open communication access. Cryptography currently has a variety of methods and techniques which are divided into two categories, namely symmetric cryptography and asymmetric cryptography where their use depends on needs and conditions. The Merkle Hellman Knapsack method is an asymmetric cryptography method that uses a public key and a private key so that tapping and cracking becomes more difficult due to the use of different keys both during encryption and during decryption. Application development using the Merkle Hellman Knapsack method generates public keys and private keys using super increasing and inverse modulo series values, making the cryptanalysis process more difficult. The system developed is able to provide an alternative in securing text data.

Page 1 of 2 | Total Record : 12