METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi最新文献

筛选
英文 中文
PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-03-10 DOI: 10.46880/mtk.v5i1.410
Eferoni Ndruru, Taronisokhi Zebua
{"title":"PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA","authors":"Eferoni Ndruru, Taronisokhi Zebua","doi":"10.46880/mtk.v5i1.410","DOIUrl":"https://doi.org/10.46880/mtk.v5i1.410","url":null,"abstract":"A credit card application is a financial facility that allows a person or business entity to borrow money to buy a product and pay it back within a specified time. Credit card manufacture often experiences risk in providing credit, both moderate, good and very good risk, due to lack of data analysis and lack of attention. So the purpose of this study is to analyze the risks that often occur in making credit cards. And provide efficient solutions. In solving this problem, it is necessary to apply the method. The method used in this study is Nearest Neighbor. The Nearest Neighbor algorithm is an approach to finding cases by calculating the proximity between new cases (testing data) and old cases (training data), which is based on matching the weights of a number of existing features. Therefore, it can be applied in analyzing old customer data with data new so that comparisons can be made whether or not it is eligible to receive credit. The results obtained in this study are the results of testing systems and methods by producing a level of risk.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENYIRAMAN TANAMAN SECARA OTOMATIS MENGGUNAKAN SENSOR SUHU DAN KELEMBABAN BERBASIS MICROCONTROLER 用微控制器的温度和湿度传感器自动给植物浇水
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-03-10 DOI: 10.46880/mtk.v5i1.413
Surianto Sitepu
{"title":"PENYIRAMAN TANAMAN SECARA OTOMATIS MENGGUNAKAN SENSOR SUHU DAN KELEMBABAN BERBASIS MICROCONTROLER","authors":"Surianto Sitepu","doi":"10.46880/mtk.v5i1.413","DOIUrl":"https://doi.org/10.46880/mtk.v5i1.413","url":null,"abstract":"Has designed a tool that serves to maintain the plant to grow well. Plants that grow well in need of treatment were quite good, especially in maintaining soil moisture. So that the land remains under inert conditions in accordance with the standard requirements necessary plants enough water. For that need attention regularly for watering plants. The automatic Plant Watering prototype uses temperature sensors and inertial-based Microcontroller Arduino Uno can be used in the treatment plant without the need to set watering schedules. In order for watering is not carried out during the day or during the scorching sun, the temperature sensor is used. Arduino microcontroller pin which has 14 digital input/output, which serves as the center of the brain process or the automatic sprinklers. The system was designed using a motor driver to drive the motor to pump water watering. Watering can prototype uses temperature sensors and inertial-based microcontroller Arduino Uno to move in automation tools for soil moisture has not been reached. If the soil moisture has been reached then the pump will stop watering the plants.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126904725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WATERMARKING PADA CITRA DIGITAL MENGGUNAKAN KOMBINASI PIXEL VALUE INDICATOR DAN METODE MOST SIGNIFICANT BIT 水印数字蒙古纳坎孔比纳西像素值指示丹法最有效位
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2019-03-10 DOI: 10.46880/mtk.v5i1.416
Posma S. M. Lumbanraja
{"title":"WATERMARKING PADA CITRA DIGITAL MENGGUNAKAN KOMBINASI PIXEL VALUE INDICATOR DAN METODE MOST SIGNIFICANT BIT","authors":"Posma S. M. Lumbanraja","doi":"10.46880/mtk.v5i1.416","DOIUrl":"https://doi.org/10.46880/mtk.v5i1.416","url":null,"abstract":"One way to protect the copyright and authenticity of a digital image is to affix a watermark in the form of writing or a sign on the image. If the affixed watermark is visible, then its presence can interfere with the appearance of the image and it is possible that the watermark will be cut, discarded, or cropped by parties who are not entitled to do so. In this paper, an application is designed to affix a watermark in the form of an invisible message, or an invisible watermark by using a combination of pixel value indicator and the Most Significant Bit (MSB) method on the image, so that it is not detected visually and the visual appearance of the image is not disturbed. The message is scrambled using a key, then the scrambled bits are hidden in the 5th bit MSB and the 6th bit of the green channel or blue channel, depending on the number of bits 1 owned by the red channel which serves as an indicator. The process of hiding the watermark is carried out in the middle area of ​​the image, so it is difficult to cut to remove it. Applications designed can be used to affix an invisible watermark in the form of messages that are not easily removed on digital images, so that they can protect the copyright of a digital image.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126765455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENERAPAN DATA MINING UNTUK PEMESANAN PEMESANAN PERCETAKAN BAHAN AJAR DENGAN ALGORITMA APRIORI (STUDI KASUS PERCETAKAN WENDY) 数据挖掘应用于四月的教学算法(温迪的印刷案例研究)
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-09-10 DOI: 10.46880/mtk.v4i2.66
Nurmawaty Hutabarat, J. Sagala
{"title":"PENERAPAN DATA MINING UNTUK PEMESANAN PEMESANAN PERCETAKAN BAHAN AJAR DENGAN ALGORITMA APRIORI (STUDI KASUS PERCETAKAN WENDY)","authors":"Nurmawaty Hutabarat, J. Sagala","doi":"10.46880/mtk.v4i2.66","DOIUrl":"https://doi.org/10.46880/mtk.v4i2.66","url":null,"abstract":"Wendy's printing is one of the printing presses in collaboration with the University of Santo Thomas, especially in the field of computer science, the printing of Wendy is located on the faithful road of the UNIKA campus intersection. Print leaders and employees sometimes have difficulty finding out how much teaching material has been printed in one transaction so that the leader of Wendy's printing press is still manual/speculating in teaching material. The application of data mining for ordering the teaching of teaching materials at the computer science faculty of the University of Saint Thomas is designed to produce this rule can produce rules/rules of association that can be seen and analyzed the results, so that the printing leader can see a frequency of teaching materials that often occur in each transaction. Therefore, analysis and testing are carried out, it is hoped that it can provide information about the transaction patterns of teaching materials that often appear. So that it can help the owner in making decisions to order and print teaching materials.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126390315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PERANCANGAN APLIKASI BROWSER PENCARIAN KEYWORD DENGAN MEMANFAATKAN FITUR SEARCH DI BERBAGAI WEBSITE MENGGUNAKAN METODE QUERY HASH JOIN PADA PERANGKAT ANDROID 设计一个KEYWORD浏览器应用程序,使用ANDROID设备上的查询功能在多个网站上使用搜索功能
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-09-10 DOI: 10.46880/mtk.v4i2.69
Ari Kartanto Sinuhaji, Yolanda Y. P. Rumapea, Darwis Robinson Manalu
{"title":"PERANCANGAN APLIKASI BROWSER PENCARIAN KEYWORD DENGAN MEMANFAATKAN FITUR SEARCH DI BERBAGAI WEBSITE MENGGUNAKAN METODE QUERY HASH JOIN PADA PERANGKAT ANDROID","authors":"Ari Kartanto Sinuhaji, Yolanda Y. P. Rumapea, Darwis Robinson Manalu","doi":"10.46880/mtk.v4i2.69","DOIUrl":"https://doi.org/10.46880/mtk.v4i2.69","url":null,"abstract":"The internet is a medium of information that is very fast and efficient in disseminating information that can not be separated by distance and time. To search for data through the website, sometimes the user forgets the address of the website to search for data so that the data sought is difficult to obtain and if finally obtained, it takes a long time to find the data. Therefore a system is built that will facilitate the user in searching data without having to fill in the URL address of the search website, users can choose which websites will be used as a source of data search. Applications that are built using the hash join method where this method alone can be used to join tables containing website data in a database so that the user can display the desired data based on the input entered into the application. The results of the searches obtained are contents that contain texts in the form of titles or contents of web pages that match the keywords that users enter when searching from selected websites. This content can be in the form of web pages, which can then be accessed directly within the application.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129284911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
APLIKASI MONITORING PERSEDIAAN DENGAN METODE USER CENTER DESIGN PADA PT. SAHABAT JAYA CEMERLANG 采用用户中心设计方法在 Pt.
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-09-10 DOI: 10.46880/mtk.v4i2.65
Rahel Junita
{"title":"APLIKASI MONITORING PERSEDIAAN DENGAN METODE USER CENTER DESIGN PADA PT. SAHABAT JAYA CEMERLANG","authors":"Rahel Junita","doi":"10.46880/mtk.v4i2.65","DOIUrl":"https://doi.org/10.46880/mtk.v4i2.65","url":null,"abstract":"The development of increasingly rapid and modern technology has an influence on the way personal and organizational work. Especially in the business world, technological developments make it easier for business people to make more practical ways of working. In the business world, technology can be used as a tool to monitor activities that occur in the business including sales transactions and monitoring of available merchandise stocks, so the formulation of the problem in this proposal is how to make an application for monitoring beverage product data in a web-based warehouse effectively by implementing User-Centered Design method. So with the monitoring of the stock of goods in the warehouse, it makes it easier for warehouse heads and managers to monitor or find out the stock of goods, incoming and outgoing goods effectively in real-time. The system built can make it easy for warehouse staff to issue and enter goods using barcode scans without having to record goods manually.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"157 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PEMETAAN LOKASI PARIWISATA DAN PENGINAPAN DI PULAU NIAS BERBASIS ANDROID 绘制安卓尼亚斯岛旅游和旅游景点地图
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-09-10 DOI: 10.46880/mtk.v4i2.62
Novri Krisman, J. F. Naibaho
{"title":"PEMETAAN LOKASI PARIWISATA DAN PENGINAPAN DI PULAU NIAS BERBASIS ANDROID","authors":"Novri Krisman, J. F. Naibaho","doi":"10.46880/mtk.v4i2.62","DOIUrl":"https://doi.org/10.46880/mtk.v4i2.62","url":null,"abstract":"The attraction is something that attracts people to visit a certain area. Nias Island has a lot of exotic and interesting tourist areas visited by tourists from home and abroad. However, there are still many tourists who still do not know the location of the tourist and lodging routes. So the purpose of the design of Tourism and Lodging Object Applications in Nias Island based on Android is to make it easier for tourists to search for tourist locations and lodging as well as a navigation tool to find out the route to tourist attractions and lodging. The results of this study will provide a GIS-based Tourist and Lodging Application on Nias Island which is implemented on a Mobile system.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PENERAPAN CUSTOMER RELATIONSHIP MANAGEMENT PADA SISTEM INFORMASI PEMESANAN DAN PENJUALAN PADA TOKO BUKU GAPURA BERBASIS WEB 客户关系管理系统的订购和在线拱门图书销售的应用
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-03-10 DOI: 10.46880/mtk.v4i1.56
Cosmas Tambunan, Darwis Robinson Manalu
{"title":"PENERAPAN CUSTOMER RELATIONSHIP MANAGEMENT PADA SISTEM INFORMASI PEMESANAN DAN PENJUALAN PADA TOKO BUKU GAPURA BERBASIS WEB","authors":"Cosmas Tambunan, Darwis Robinson Manalu","doi":"10.46880/mtk.v4i1.56","DOIUrl":"https://doi.org/10.46880/mtk.v4i1.56","url":null,"abstract":"The use of technology in the application of Customer Relationship Management (CRM) becomes very important to build relationships between customers as well as providing information provided to customers. The benefits of implementing CRM are to help keep existing customers and to gain new customers. In this study, the authors implement CRM in an information system E-commerce on Bookstore Gapura. Where currently there is no E-commission information system available in Gapura Bookstore. The method used in this design is using Data Flow Diagram (DFD). This application is also created by using PHP programming language using MySQL. This application facilitates Bookstore Gapura in providing information and promotion, so that information is delivered more efficiently and clear to the consumer.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130877990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PENGEMBANGAN JARINGAN KOMPUTER NIRKABEL (WiFi) MENGGUNAKAN MIKROTIK ROUTER (STUDI KASUS PADA SMA PGRI AIKMEL) 无线计算机网络(WiFi)使用微路由器的发展(高中PGRI AIKMEL案例研究)
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-03-10 DOI: 10.46880/mtk.v4i1.59
Lalu Delsi Samsumar, S. Hadi
{"title":"PENGEMBANGAN JARINGAN KOMPUTER NIRKABEL (WiFi) MENGGUNAKAN MIKROTIK ROUTER (STUDI KASUS PADA SMA PGRI AIKMEL)","authors":"Lalu Delsi Samsumar, S. Hadi","doi":"10.46880/mtk.v4i1.59","DOIUrl":"https://doi.org/10.46880/mtk.v4i1.59","url":null,"abstract":"Information technology has penetrated into various fields including educational institutions, then the need for information is currently increasing. Currently, everyone needs information in a fast, short, and accurate time, therefore it takes media and tools that can support the work with various applications, media, and easy ways to access the information, one of them is an internet connection with hotspot service or wireless-based computer network (WiFi). SMA PGRI Aikmel is one of the private schools that have many enthusiasts because it has adequate facilities in conducting the teaching and learning process. Along with the increase of public trust in this educational institution, hence required a wireless-based computer network to support performance at academic part and to improve teaching and learning activity. By leveraging rapid technological advancements to enable equipment using cable technology to be replaced with wireless technology such as radiofrequency media. This research is qualitative research. Data were collected by observation, interview, documentation, and literature study. With the Network Development Live Cycle (NDLC) method, this study examines the development of wireless networks using Mikrotik devices and cisco packet tracer applications as simulation media from the development of network schemes.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132766412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL 河豚的算法来增强MYSQL数据库的安全性
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Pub Date : 2018-03-10 DOI: 10.46880/mtk.v4i1.58
H. G. Simanullang, A. P. Silalahi
{"title":"ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL","authors":"H. G. Simanullang, A. P. Silalahi","doi":"10.46880/mtk.v4i1.58","DOIUrl":"https://doi.org/10.46880/mtk.v4i1.58","url":null,"abstract":"The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key-shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, ..., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.","PeriodicalId":384219,"journal":{"name":"METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125526459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信