cover
Contact Name
Soeb Aripin
Contact Email
suefarifin@gmail.com
Phone
+6282370070808
Journal Mail Official
mesran.skom.mkom@gmail.com
Editorial Address
Jalan sisingamangaraja No 338 Medan, Indonesia
Location
Kota medan,
Sumatera utara
INDONESIA
Jurnal Sains dan Teknologi Informasi
ISSN : -     EISSN : 2809610X     DOI : https://doi.org/10.47065/jussi.v3i2.4883
Bidang kajian dari Jurnal Sains dan Teknologi Informasi, yaitu: Teknik Informatika, Manajemen Informatika, Sistem Informasi, Teknik Komputer, Kecerdasan Buatan, dan Computer Science.
Articles 5 Documents
Search results for , issue "Vol 1 No 4 (2022): September 2022" : 5 Documents clear
Perancangan Aplikasi Kata Lintas: Teka-teki Silang Dengan Menerapkan Aplikasi Fisher Yates Ardiyansa, Fahmi
Jurnal Sains dan Teknologi Informasi Vol 1 No 4 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jussi.v1i4.2291

Abstract

Crossword puzzle is a word game which is usually in the form of a series of empty spaces in the form of black and white squares, the objective of this game is to fill the white boxes with letters, form certain words or phrases, by completing clues that lead to to a specific answer. The type of crossword puzzle game is currently developing, one of which is a cross word crossword puzzle, in this game the collection of letters is random and the user will look for a word from the random letters. However, it is still not known what randomization algorithm was used to make the crossword game application to scramble the letters so that they can become random letters that will be compiled by the user. After seeing some previous research, choosing the Fisher Yates Shuffle Algorithm which is applied using the Visual Basic Application as a solution is considered very appropriate, where this algorithm will initialize letters first to numbers then the initialized letters are randomized using an algorithm, and the user guesses the series of letters that are used has been scrambled before.
Implementasi Fungsi Hash Dengan Algoritma Sha-256 Pada Aplikasi Duplicate Image Scanner Ariska, Nova
Jurnal Sains dan Teknologi Informasi Vol 1 No 4 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jussi.v1i4.2292

Abstract

Nowadays we are in the era of the digital world, there are lots of equipment that has a tool for recording photos in the form of a camera on a smartphone. The weakness of smartphones is the small storage space, so users must be good at managing files stored on the smartphone. There are so many applications in smartphones that provide facilities for sharing images. This of course will greatly burden the storage space of the smartphone because it stores image files which are generally large in size, especially if the image files are the same or duplicate, of course it is very burdensome for storage space. It will be very difficult to distinguish an image file without looking at the contents of the image file. So if you want to distinguish one image file from another, the user must see the contents of the image file and this will certainly be very difficult. For that we need a method that can be used to identify the same image file or duplicate image files so that a decision can be made to delete the duplicate document files so as to save storage space. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the image file contains the same content, it will produce the same hash value. It can be used to identify the same or duplicate image files. In the hash function there is the SHA-256 method or the Secure Hash Algorithm 256 which is one of the hashing algorithms that is often used to encrypt data with a length of 256 bits. By applying this algorithm to the file scanner application, the results of the image file search are grouped based on the same hash value and users can make it easier and faster for users to delete duplicate image files without having to open and view the contents of the file.
Implementasi Algoritma MD4 Pada Aplikasi Duplicate Audio Scanner Astuti, Tri Windi
Jurnal Sains dan Teknologi Informasi Vol 1 No 4 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jussi.v1i4.2293

Abstract

Nowadays there are many applications that help the process of duplicating audio, of course this takes up more storage space. For that we need a method that can be used to identify the same or duplicate audio files. The solution that can be done to handle duplication of audio files or duplicates is to apply hash type cryptography techniques where the process of identifying the hash value of the audio file is carried out so that the resulting value is different from the original file. The hash type cryptographic algorithm used is the MD4 algorithm. The results obtained from the process of applying the MD4 algorithm are grouping audio files based on the same hash value, making it easier and faster for users to delete duplicate audio files
Penerapan Algoritma Punctured Elias Code pada Aplikasi Kamus Besar Bahasa Indonesia (KBBI) Berbasis Android Zulkhairia, Zulkhairia
Jurnal Sains dan Teknologi Informasi Vol 1 No 4 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jussi.v1i4.2295

Abstract

The large Indonesian dictionary has a large size because the quality of the resulting dictionary is better, so the file size needed for it is getting bigger. And the compression process is needed to reduce the file capacity to be smaller in order to save on the use of storage space. With a relatively large data size, during the data transfer process it can fail because the storage media does not have enough space. By performing the compression process on the large Indonesian dictionary, a process can be carried out to reduce the size of the data by reducing the bits in the large Indonesian dictionary, making it easier to carry out a data transfer process effectively. The procedure for compressing the large Indonesian dictionary (KBBI) starts from selecting the large Indonesian dictionary to be compressed, then the book will be compressed with the punctured Elias code algorithm so as to produce a compressed book that has a smaller size.2. The implementation of the punctured Elias code algorithm for compression of the Big Indonesian Dictionary (KBBI) is done by reading the hexadecimal value from a Big Indonesian Dictionary (KBBI), then changing the hex value into a new bit value in the form of a binary number, then rearranging the binary value into new character. Where the compression results are based on the ratio of 32% based on 80 bit data samples with 25 Bit compression results
Penerapan Metode Certainty Factor Untuk Sistem Pakar Dalam Mengidentifikasi Jenis Kerusakan Yang Terjadi Pada Radar Aaws Di Kantor BMKG Medan Damayanti, Damayanti
Jurnal Sains dan Teknologi Informasi Vol 1 No 4 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/jussi.v1i4.2296

Abstract

AAWS Radar (Automatic Agroclimate and Weather Station) can also be called automatic agro-climate and weather monitoring post is a tool and installed by BMKG to monitor weather and climate elements automatically and directed to the agricultural sector. With this tool, of course, it can really help BMKG in observing the weather which is certainly useful for agencies from the agricultural sector. Although this radar is very helpful, but when it has been used for a long time it will definitely be damaged. Research with the title "Application of Certainty Factor Methods for Expert Systems in Identifying Types of Damage that Occurs on the AAWS Radar at the BMKG Medan Office". Has a problem formulation such as what damage often occurs on the AAWS radar. The purpose of this study is to determine the cause of damage to the AAWS radar. This research uses direct observation and interview methods with management and experts from the company. The source of the data used is data that will be provided directly from the company where the research is carried out. The data were analyzed using the Expert System with the Certainty Factor method. The theoretical basis used in this research is to describe the theories related to the Expert System and the Certainty Factor Method. Based on the research that has been done, it is concluded that BMKG pays great attention to every existing tool, one of which is the AAWS radar. Because this tool is very influential in the agricultural sector

Page 1 of 1 | Total Record : 5