cover
Contact Name
Abdul Karim
Contact Email
abdkarim6@gmail.com
Phone
+6285261776876
Journal Mail Official
misjurnal@gmail.com
Editorial Address
Sekretariat: Jalan Sisingamangaraja No. 338
Location
Kota medan,
Sumatera utara
INDONESIA
Management of Information System Journal
ISSN : -     EISSN : 29649455     DOI : https://doi.org/10.47065
Management of Information System Journal merupakan jurnal yang mempublikasi hasil penelitian pada bidang Manajemen Informatika maupun Sistem Informasi, namun Management of Information System Journal dapat juga menampung kajian pada bidang Computer Science. Management of Information System Journal publish pada periode 4 bulanan, yaitu November (Issue 1), Maret (Issue 2) dan Juli (Issue 3). Management of Information System Journal memiliki ISSN 2964-9455 (media online) dengan no SK 29649455/II.7.4/SK.ISSN/12/2022.
Articles 45 Documents
Penerapan Algoritma Boldy Vigna Untuk Mengkompresi Pada File Audio Aplikasi Kajian Dan Murottal Islami Lobe Lahmuddin
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.394

Abstract

At this time mobile phones have developed into a means to study a subject matter in different spheres of life with a wider scope, one of which can make it easier for everyone to access various fields of knowledge without exception, even in the field of religion, now it can be accessed with a Islamic Studies and Murottal applications that are widespread in the play store.The Murottal Isalami Study Application is an application with a clear study delivery technique. However, in the Islamic study and murottal application there are 192 audio studies with the length of the audio duration, which also affects the storage capacity which will also increase. No wonder most Islamic studies and murottal applications have a large capacity so it will require a lot of space to store the application files.This can be avoided if the application's audio file goes through the compression process first. One of the methods used in compressing or compressing data is the Boldy Vigna algorithm. The Boldy vigna algorithm sorts the most appearing characters to the smallest bit and the rare characters to the largest bit. That way, the file size can be minimized from the original size..
Implementasi Algoritma Winnowing Pada Aplikasi Kisah Para Nabi dan Rasul Mirawati
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.396

Abstract

Books are a common learning medium used in telling the story of the prophet, but media such as books have several physical deficiencies that are easily damaged, and are less interactive which cause boredom easily, so we need a learning application about the stories of the Prophets and Messengers that can increase reading interest in the stories of the Prophets and Messengers in society. The purpose of this research is to determine the application procedure of the Prophets and Messengers. Implement an application that implements the winnowing algorithm in the application of the stories of the Prophets and Messengers. The benefits obtained by applying the winnowing algorithm in the application of the stories of the Prophets and Messengers are to increase interest in reading about the stories of the Prophets and Messengers.
Penerapan Digital Signature Untuk Identitas File Audio Dengan Metode Snefru Fajri, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.397

Abstract

In the era of information technology that is developing very rapidly, the use of signatures has been widely applied digitally through digital signatures. Digital signatures along with the times have led to the need for authentication of data or files that are used digitally. Its use also aims to avoid counterfeiting or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, file transfers. The crime of falsifying audio files is a serious problem in various fields. Audio authenticity testing is important and significant in all social areas, especially when audio is used as evidence for conclusions in courts, the basis for judicial decision-making, and corporate reports. Forgery of audio files will cause losses that cannot be estimated. One solution to the problems mentioned above is to perform the process of assigning an identity to the audio file, so that it can be seen that the audio cannot be manipulated. The SNEFRU method is a hash function to detect changes in digital audio. SNEFRU has several variants, varying in number of operands and hash size. The supported hash sizes are 128 and 256 bits. The number of passes in the final 2-pass variant source of SNEFRU is two passes, while a more secure 4-pass version is also available. After the previous attack was published, the 8-pass version was introduced as well. This 8-pass version is still considered safe.
Kombinasi Metode RSA, Secret Sharingasmuth-Bloom Dan Redundant Pattern Encoding Untuk Mengamankan Pesan Zairy Lubis, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.398

Abstract

The combination of algorithms is the process of combining more than one algorithm so that the resulting level of security is better. This study combines 3 direct algorithms so that the level of defense in data security is more optimal. The combined algorithms in this study are the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This study describes how the procedure is carried out to combine the three algorithms above, namely RSA, secret sharing asmuth-bloom, and redundant pattern encoding. The combination process is carried out in stages by carrying out the encryption process using RSA first, then the results of the encryption are encrypted again using secret sharing asuth-bloom, resulting in a new ciphertext and then the new ciphertext is inserted into an image using the redundant pattern encoding method. The result of this study is to design a data-based security application using a combination of the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This application can be used to secure data in the form of text, so that it cannot be taken by others. In addition, the application that will be designed is easier to use in data security.
Penerapan Algoritma Lzy Untuk Mengkompresi Record Dalam Merancang Aplikasi Kamus Besar Bahasa Indonesia Zein Maulana, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.399

Abstract

Dictionary is a medium that can be interpreted as a book that contains the meaning of a word from a foreign language or term, the dictionary is also a large container of knowledge and knowledge, especially language knowledge. Dictionary should be one application that must be owned by every smartphone user. However, the size of the application is quite large so it requires a large enough storage space as well. Limited storage space or free space on smartphones makes users have to be willing to sacrifice other data to be deleted in order to install the dictionary application. Data compression or compression is one method to reduce data storage space on a storage medium, data compression aims to reduce the number of bits used in data storage or transmission. Data compression is carried out due to limited memory space, and limited storage space. To produce the smallest ratio size with a fast process, in this study the algorithm used is the LZY algorithm which is considered capable enough to overcome the above problems.
Perancangan Aplikasi Kumpulan Resep Masakan Dengan Menerapkan Algoritmaternary Comma Code (TCC) Kholijah, Siti
Management of Information System Journal Vol 1 No 2: Maret 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i2.519

Abstract

Application design has increased very rapidly from year to year. One example is an application in the culinary field. Application design can get cooking recipe applications, especially traditional dishes. In the beginning, many recipes were compiled into a recipe book. However, as technology develops, considering how easy it is for people to get various kinds of information, a smartphone application was created. In designing this application, the author used the Ternary Comma Code algorithm for its development. Cooking recipes are really needed as a tool that can guide when preparing cooking ingredients, how to make them and how to serve them in order to produce dishes with delicious and attractive flavors. Ternary Comma Code is a problem solving approach that emphasizes the role of previous experience. New problems can be solved by reusing and perhaps adapting problems that have similarities to those that have been solved previously. This application provides a search feature and recommendations for suitable recipes based on the cooking ingredients available in the user's kitchen using the Ternary Comma Code method. Based on the results of system functional testing, all respondents agreed that the application created functioned as it should.
Kelola Bandwidth Dengan Menerapkan Algoritma Per Connection Queue Pada Jaringan Komputer Rajawali Kupie Nanda Pratama, Agung
Management of Information System Journal Vol 1 No 2: Maret 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i2.520

Abstract

In this day and age generally in places of business using the internet wifi as a tourist attraction for endings, such as coffee shop business. However, it is not uncommon to find wifi facilities provided by coffee shops or coffee shops that cannot be used, usually this is caused by the many users of the wifi network, not to mention one of the users who performs downloading or streaming activities. This causes the allocation of available bandwidth to be captured entirely by users who carry out these activities, resulting in no allocation of the remaining bandwidth for other users. Therefore it is necessary to have a bandwidth processing to regulate bandwidth allocation for wifi network users. One solution to this problem is to manage bandwidth using a proxy routerboard, a proxy routerboard will manage bandwidth to the network using the algorithm per connection queue (PCQ), this algorithm will allocate bandwidth evenly according to the number of users on the wifi network, so the bandwidth distribution the network is carried out fairly and equally. With this bandwidth management it is expected to help the coffee shop management in overcoming problems in the wifi network
Implementasi MAUT Dan ROC Untuk Menentukan Pemenang Wisata Rohani Tahunan Di BTPN Putri Hijau Medan Onella, Nevin
Management of Information System Journal Vol 1 No 2: Maret 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i2.525

Abstract

Bank BTPN stands for Bank Tabungan Pensiunan Nasional which focuses on the mass market segment which consists of retirees, micro, small and medium enterprises (MSMEs), productive underprivileged communities, consuming class segment, and the corporate segment. One of the annual programs carried out by Bank BTPN's Putri Hijau Medan branch is the giving of gifts in the form of spiritual tours to a customer which is carried out annually.Spiritual tourism is tourism / recreation that focuses on the spiritual aspect (example: religion). So far, the winners have been drawn through a lottery, meaning the results were obtained randomly. There is a possibility that a customer can win twice in a row. Therefore a Decision Support System is needed to prevent this from happening so that it does not harm any party.The Descision Support System used are combination of two methods. Firstly used Multi Attribute Utility Theory (MAUT) Method which is a quantitative comparison method that usually combines measurements of the costs of different risks and benefits. This method is implemented using Rank Order Centroid (ROC) as a weighting
Implementasi Metode Elias Gamma Dalam Kompresi Iklan Pada Website PT. HWI Amri Syahputra, Khairul
Management of Information System Journal Vol 1 No 2: Maret 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i2.526

Abstract

Advertising is a marketing communication message or public communication about a product that is conveyed through a medium, financed by a known initiator, and addressed to part or all of the community. PT. HWI is a company engaged in marketing using a network marketing business system. PT. HWI also uses advertising promotions through available websites to attract potential customers to use their services. However, there are so many advertisements on websites such as images and videos, and this can take up storage space on web hosting. One way that this problem can be resolved, because using data compression can minimize a file size in the form of an image or video from the ad. The purpose of this study is to apply the Elias Gamma method in order to determine the compression performance if it is done by compressing website advertisements in the form of images, so that the large images will be compressed into a smaller size, so that the transmission process is carried out faster and reduces the location of data storage.
Sistem Pendukung Keputusan Penerimaan Prodeo Pada Pengadilan Agama Medan Kelas I A Menerapkan EXPROM II Feronika Sitinjak, Dewi
Management of Information System Journal Vol 1 No 2: Maret 2023
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i2.527

Abstract

-- Prodeo is a court litigation process for free with state funding through court DIPA (Article 1 paragraph 7). In receiving assistance for the general public, it is very important to know how the case is and so that the recipients of the aid can be right on target, there is no choice. In determining the acceptance of Prodeo Medan Religious Court Class 1 A, still using manual methods or there is no system to determine the receipt of a computerized prodeo. So with that the authors propose a computerized system in determining the acceptance of Predeo at the Medan Class 1 A Religious Court.The method that the author proposes in determining the Prodeo Recipient at the Medan Class 1 A Religious Court is the EXPROM II Method, namely the comparison of deviation or distance between alternative pairs for each criterion. In this method, the relative value of one of the alternatives is defined by two preference indices. So the procedure for admission of prodeo at the Medan Religious Court Class I A produces values ​​that can provide an overview in decision making, in order to get the right results for the acceptance of prodeo.