cover
Contact Name
Panji novantara
Contact Email
panji@uniku.ac.id
Phone
+6283823234797
Journal Mail Official
jejaring@uniku.ac.id
Editorial Address
Program Studi Manajemen Informatika DIII Lantai 2 Gd. Fakultas Ilmu Komputer Universitas Kuningan Jl. Cut Nyak Dhien No.36 A, Cijoho, Kec. Kuningan, Kabupaten Kuningan, Jawa Barat 45513
Location
Kab. kuningan,
Jawa barat
INDONESIA
JEJARING
Published by Universitas Kuningan
ISSN : 25273930     EISSN : 26145448     DOI : -
Core Subject : Science,
JEJARING (Jurnal Teknologi dan Manajemen Informatika) adalah jurnal peer-review yang menyediakan makalah hasil penelitian, studi kasus, dan ulasan artikel di bidang teknologi informasi. JEJARING merupakan media komunikasi bagi akademisi, pakar dan praktisi teknologi informasi dalam menuangkan ide-ide pemikiran dan gagasan di bidang teknologi informasi. Topik makalah JEJARING berfokus pada bidang teknologi informasi, manajemen informatika, dan topik lain yang terkait dengan bidang teknologi informasi mencakup pemrograman, analisis sistem informasi, manajemen bisnis, jaringan komputer, rekayasa perangkat lunak, multimedia, technopreneurship, dan lain-lain. JEJARING diterbitkan oleh Program Studi Manajemen Informatika Diploma III Fakultas Ilmu Komputer Universitas Kuningan dengan frekuensi yang diterbitkan dua kali dalam setiap volume pada Mei dan November. Jurnal ini telah terdaftar di ISSN 2527-3930 (cetak) dan ISSN 2614-5448 (online).
Articles 5 Documents
Search results for , issue "Vol 5, No 2 (2020)" : 5 Documents clear
Implementasi Algoritma Caesar Ciper untuk Mengidentifikasi Keaslian Sepatu Kulit Parm.id dengan Menggunakan QR Code Tito Sugiharto; Yati Nurhayati; Mochamad Abdul Gofur
JEJARING : Jurnal Teknologi dan Manajemen Informatika Vol 5, No 2 (2020)
Publisher : Universitas Kuningan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/jejaring.v5i2.6718

Abstract

Now day the development of information technology and security are very rapid and important for human life, it cannot be denied that this digital era requires humans to be effective and efficient in gaining information. The security and the authenticity of a product are very important aspects of human life, including the security of authenticity in the field of copyright, for that in a shoe industry, especially leather shoes in Indonesia, there are a lot of misuses of fake leather shoes, so that these factors can affect the quality of leather shoes and it has an impact on the decreasing income obtained by genuine leather shoe craftsmen in Indonesia. This study aims to facilitate customers to be able to distinguish the authenticity of genuine Parm.id leather shoes and it can guarantee more trust to customers. To overcome this problem, in the process of securing the authenticity of leather shoes, parm.id uses the Caesar Ciper algorithm by generating it into a QR Code. The research method uses a Rational Unified Process (RUP) by implementing the Caesar Ciper algorithm which is a cryptographic algorithm by shifting letters of the alphabet. application that is built using an android smartphone, with PHP programming languages, JAVA and MySQL as database storage. In the process of using this application, the customers will scan the QR Code data in the shoe, when it has been scanned and the data is valid, the application will display data on parm.id shoes with compositions in the shoes that customers scan, but when the QR data The shoe code that customers scan is invalid, it can be ascertained that the shoe is not produced by parm.id and it can be said that the shoe is not original. The result of this study is in the form of application that is able to provide convenience and guarantee more trust to parm.id shoes customers.keywords: Android, Caesar Ciper algorithm, encryption, description, rational unified process (RUP)
Implementasi Algoritma Zhu Takaoka Pada Aplikasi Pengenalan Nama Komponen Sepeda Motor Berbasis Android Dadan Nugraha; Heri Syabani
JEJARING : Jurnal Teknologi dan Manajemen Informatika Vol 5, No 2 (2020)
Publisher : Universitas Kuningan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/jejaring.v5i2.6719

Abstract

SMK Karya Nasional Kuningan, merupakan salah satu sekolah menengah kejuruan di Kabupaten Kuningan Jawa Barat yang berdiri sejak tahun 1997, Berdasarkan hasil observasi pada jurusan Teknik Sepeda Motor (TSM) di SMK Karya Nasional Kuningan, bahwa ada beberapa siswa masih sulit untuk mendapatkan nilai standar Kriteria Ketuntasan Minimal (KKM), karena siswa kurang dalam mengetahui bentuk komponen-komponen, Pada aplikasi pengenalan nama komponen sepeda motor merupakan salah satu cara yang baik untuk proses pengenalan nama dan bentuk komponen sepeda motor terhadap siswa yang belum mengetahui bentuk komponen secara nyata/real. Dengan menggunakan algoritma zhu takaoka mampu melakukan pencarian pattern/teks sehingga data komponen yang dicari akan muncul pada halaman. Diharapkan dengan implementasi algoritma zhu takaoka kedalam aplikasi pengenalan komponen dapat membantu siswa khususnya siswa SMK Karya Nasional Kuningan dalam proses belajar dan membantu perkembangan belajar siswa.Kata Kunci : Aplikasi pengenalan, Pencarian pattern, Android, Zhu takaoka.
Implementasi Algoritma Fisher Yates pada Game 3D Petualangan Menyelamatkan Binatang Yulyanto Yulyanto; Dina Permana Dewi
JEJARING : Jurnal Teknologi dan Manajemen Informatika Vol 5, No 2 (2020)
Publisher : Universitas Kuningan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/jejaring.v5i2.6715

Abstract

Abstrack : Many types of games developed by Indonesian game developers such as action games, fight games, and adventure games. Adventure games that take the theme of animals at this time is suitable to be developed considering the rampant hunting of rare animals that are protected. A good randomization method is very important in the development of an application or game. Many methods of randomization that can be used, one of them is Fisher Yates method or commonly known as Fisher Yates algorithm. The advantages of the Fisher Yates algorithm are the effectiveness of the randomization method and its optimal algorithmic complexity. Fisher Yates Algorithm can randomize the location of an animal object in an animal-saving adventure game. In addition to entertainment Animal adventure game also provides knowledge to the users to recall animals in Indonesia, the existence of these animals is increasingly reduced, because human behavior is caused by the scarcity of animals that must be preserved. Therefore, in this game, the writer implements Fisher Yates algorithm to randomize the location of animals that must be found by the users. This game is built using the software Unity 3D and C# programming language. Based on the test results using the black box method, the features contained in the game can run in accordance with the desired.Keywords : Animals, Fisher Yates Algorithm, Game, Unity 3D
Implementasi Algoritma AES 128 Bit sebagai Pengaman Teks di Aplikasi Note Berbasis Android Aji Permana; Elan Jaelani
JEJARING : Jurnal Teknologi dan Manajemen Informatika Vol 5, No 2 (2020)
Publisher : Universitas Kuningan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/jejaring.v5i2.6716

Abstract

Abstract : In all spheres of life from all circles utilizing technology to exchange information. One of the media owned by a lot of people are mobile device, such as mobile phones and tablet computers, many people already use mobile devices for information exchange of messages of information. There are various kind of safety text in the note application, one of them by way of encrypting the note text. Encryption is the process of disguising the contents of the note text, so that unauthorized persons or even hacker can not know the contents of the note text. The encryption process create text notes in disguise their contents but still a form of writing therefore, although its text has been encrypted notes will still arouse suspicion so that occur in the aspects of information security, the security of various technique. Cryptography is a technique to hide so that people who are not interested or even eavesdroppers can not know the contents of the note text. This study discusses the implementation of Aes 128 bit algorithm for securing the text and the algorithm used is advanced encryption standard. This study aims to build application that can encrypt text and describe text which implemented on mobile devices android. The application is built using android studio. Based on the use of the application showed that text is encrypted with advanced encryption standard algorithm on mobile devices android can be described back in.Keywords : Cryptography, AES 128 bit algorithm, encryption, android.
Rancang Bangun Sistem Keamanan Rumah dengan Metode Fuzzy Logic menggunakan Mikrokontroller berbasis Android Sugeng Supriyadi; Nunu Nugraha; Erwin Ligar Nugraha
JEJARING : Jurnal Teknologi dan Manajemen Informatika Vol 5, No 2 (2020)
Publisher : Universitas Kuningan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25134/jejaring.v5i2.6717

Abstract

The need for security is one of the most important things in human life. The era of globalization has demanded humans to create security in everyday life. Likewise with technology based home security systems. Frequent occurrence of crime at home requires creating an integrated security system with smartphone devices so that home owners can monitor his house in realtime. Based on these thoughts the writer makes a home security system that can monitor the house and provide early warning to the homeowner if unknown person is detected entering the house. The home security system consists of PIR (Passive Infra Red) sensor that acts as human motion detectors, ultrasonic sensor that serves to measure the distance when humans are detected outside the home, and a magnetic switch that serves to detect whether the door of the house is opened or closed , the three sensors are integrated with the arduino microcontroller device as the control center. The method applied in this research is fuzzy logic method. The fuzzy logic method plays a role in determining the decision in the home security system whether the house is safe or not based on the input value of the reading from the installed sensor. The arduino device connects directly to the Internet via an ethernet module that is bridged by the web service so the system can be accessed through android smartphone devices. Based on the results of system implementation and testing, the system can run well. The system can display notifications on android smartphone devices when the sensor detects a person coming into the house. The system can also be enabled or disabled through the application by the home owner.Keywords : Android, Arduino, Fuzzy Logic, Home Security, Mikrocontroler, Sensor.

Page 1 of 1 | Total Record : 5