cover
Contact Name
Abdul Karim
Contact Email
abdkarim6@gmail.com
Phone
+6285261776876
Journal Mail Official
misjurnal@gmail.com
Editorial Address
Sekretariat: Jalan Sisingamangaraja No. 338
Location
Kota medan,
Sumatera utara
INDONESIA
Management of Information System Journal
ISSN : -     EISSN : 29649455     DOI : https://doi.org/10.47065
Management of Information System Journal merupakan jurnal yang mempublikasi hasil penelitian pada bidang Manajemen Informatika maupun Sistem Informasi, namun Management of Information System Journal dapat juga menampung kajian pada bidang Computer Science. Management of Information System Journal publish pada periode 4 bulanan, yaitu November (Issue 1), Maret (Issue 2) dan Juli (Issue 3). Management of Information System Journal memiliki ISSN 2964-9455 (media online) dengan no SK 29649455/II.7.4/SK.ISSN/12/2022.
Articles 5 Documents
Search results for , issue "Vol 1 No 1: November 2022" : 5 Documents clear
Penerapan Algoritma Boldy Vigna Untuk Mengkompresi Pada File Audio Aplikasi Kajian Dan Murottal Islami Lobe Lahmuddin
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.394

Abstract

At this time mobile phones have developed into a means to study a subject matter in different spheres of life with a wider scope, one of which can make it easier for everyone to access various fields of knowledge without exception, even in the field of religion, now it can be accessed with a Islamic Studies and Murottal applications that are widespread in the play store.The Murottal Isalami Study Application is an application with a clear study delivery technique. However, in the Islamic study and murottal application there are 192 audio studies with the length of the audio duration, which also affects the storage capacity which will also increase. No wonder most Islamic studies and murottal applications have a large capacity so it will require a lot of space to store the application files.This can be avoided if the application's audio file goes through the compression process first. One of the methods used in compressing or compressing data is the Boldy Vigna algorithm. The Boldy vigna algorithm sorts the most appearing characters to the smallest bit and the rare characters to the largest bit. That way, the file size can be minimized from the original size..
Implementasi Algoritma Winnowing Pada Aplikasi Kisah Para Nabi dan Rasul Mirawati
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.396

Abstract

Books are a common learning medium used in telling the story of the prophet, but media such as books have several physical deficiencies that are easily damaged, and are less interactive which cause boredom easily, so we need a learning application about the stories of the Prophets and Messengers that can increase reading interest in the stories of the Prophets and Messengers in society. The purpose of this research is to determine the application procedure of the Prophets and Messengers. Implement an application that implements the winnowing algorithm in the application of the stories of the Prophets and Messengers. The benefits obtained by applying the winnowing algorithm in the application of the stories of the Prophets and Messengers are to increase interest in reading about the stories of the Prophets and Messengers.
Penerapan Digital Signature Untuk Identitas File Audio Dengan Metode Snefru Fajri, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.397

Abstract

In the era of information technology that is developing very rapidly, the use of signatures has been widely applied digitally through digital signatures. Digital signatures along with the times have led to the need for authentication of data or files that are used digitally. Its use also aims to avoid counterfeiting or interference. Currently, the use of digital signatures has been widely applied to software distribution, financial transactions, file transfers. The crime of falsifying audio files is a serious problem in various fields. Audio authenticity testing is important and significant in all social areas, especially when audio is used as evidence for conclusions in courts, the basis for judicial decision-making, and corporate reports. Forgery of audio files will cause losses that cannot be estimated. One solution to the problems mentioned above is to perform the process of assigning an identity to the audio file, so that it can be seen that the audio cannot be manipulated. The SNEFRU method is a hash function to detect changes in digital audio. SNEFRU has several variants, varying in number of operands and hash size. The supported hash sizes are 128 and 256 bits. The number of passes in the final 2-pass variant source of SNEFRU is two passes, while a more secure 4-pass version is also available. After the previous attack was published, the 8-pass version was introduced as well. This 8-pass version is still considered safe.
Kombinasi Metode RSA, Secret Sharingasmuth-Bloom Dan Redundant Pattern Encoding Untuk Mengamankan Pesan Zairy Lubis, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.398

Abstract

The combination of algorithms is the process of combining more than one algorithm so that the resulting level of security is better. This study combines 3 direct algorithms so that the level of defense in data security is more optimal. The combined algorithms in this study are the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This study describes how the procedure is carried out to combine the three algorithms above, namely RSA, secret sharing asmuth-bloom, and redundant pattern encoding. The combination process is carried out in stages by carrying out the encryption process using RSA first, then the results of the encryption are encrypted again using secret sharing asuth-bloom, resulting in a new ciphertext and then the new ciphertext is inserted into an image using the redundant pattern encoding method. The result of this study is to design a data-based security application using a combination of the RSA algorithm, secret sharing asmuth-bloom, and redundant pattern encoding. This application can be used to secure data in the form of text, so that it cannot be taken by others. In addition, the application that will be designed is easier to use in data security.
Penerapan Algoritma Lzy Untuk Mengkompresi Record Dalam Merancang Aplikasi Kamus Besar Bahasa Indonesia Zein Maulana, Muhammad
Management of Information System Journal Vol 1 No 1: November 2022
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/mis.v1i1.399

Abstract

Dictionary is a medium that can be interpreted as a book that contains the meaning of a word from a foreign language or term, the dictionary is also a large container of knowledge and knowledge, especially language knowledge. Dictionary should be one application that must be owned by every smartphone user. However, the size of the application is quite large so it requires a large enough storage space as well. Limited storage space or free space on smartphones makes users have to be willing to sacrifice other data to be deleted in order to install the dictionary application. Data compression or compression is one method to reduce data storage space on a storage medium, data compression aims to reduce the number of bits used in data storage or transmission. Data compression is carried out due to limited memory space, and limited storage space. To produce the smallest ratio size with a fast process, in this study the algorithm used is the LZY algorithm which is considered capable enough to overcome the above problems.

Page 1 of 1 | Total Record : 5