Is a journal managed by the SEAN Institute, this journal discusses science in the field of Computer Science, Appropriate Computer Technology, Information System Design, as a forum for pouring research results both conceptually and technically related to information science. Journal Login is published twice a year, namely in June and December. The incoming article will be accepted by the editor and then forwarded to the section editor and forwarded again to the reviewer for review using a double-blind peer review.

The scope of the journal Login as follows:
[Domain-Specific Frameworks and Applications]: IT Management dan IT Governance, e-Government, e-Healthcare, e-Learning, e-Manufacturing, e-Commerce, ERP dan Supply Chain Management, Business Process Management. [Smart Systems]: Smart City, Smart Cloud Technology, Smart Appliances & Wearable Computing Devices, Smart Sensor Networks, Information Infrastructure for Smart Living Spaces, Intelligent Transportation Systems. [Models, Methods and Techniques]: Conceptual Modeling, Languages, and design, Software Engineering, Information-centric Networking, Human-Computer Interaction, Media, Game and Mobile Technologies, Information Retrieval, Information Security, Image Processing and Pattern Recognition, Natural Language Processing.

================================================================================

 

Login (Jurnal Teknologi Komputer) Indexed and Journal List Title by:

Flag Counter

Web Analytics Made Easy - StatCounterView Stat Login : Jurnal Teknologi Komputer

Vol. 18 No. 02 (2024): Jurnal Teknologi Komputer, Edition December 2024

Is a journal managed by the SEAN Institute, this journal discusses science in the field of Computer Science, Appropriate Computer Technology, Information System Design, as a forum for pouring research results both conceptually and technically related to information science. Journal Login is published twice a year, namely in June and December. The incoming article will be accepted by the editor and then forwarded to the section editor and forwarded again to the reviewer for review using a double-blind peer review.

Published: 2025-04-25

The Implememtation Of Hiding Information By Using Discrete Wavelet Transform (DWT)

Devi Silvia Simbolon, Kevin Enrique Keliat, Kristian Sigalingging, Vicky Nainggolan, Rifelson Sipayung

Page : 102-106


Abstract views : 11 times | PDF Download : 5 times

Steganography With End Of File

Zuvernius Sitohang, Yohana Desma R. Munte, Pembinata Taringan, Hiskia Hasugian, Trihadi Pinem

Page : 107-113


Abstract views : 13 times | PDF Download : 8 times

Abstract views : 12 times | PDF Download : 6 times

Implementation of DCT Based Steganography Algorithm to Hide Information in Images

Septrian Napitupulu, Ryan Revaldo Siagian, Ramli Simanullang, Kelvin Daniel Manalu, Conglii Fao Silalahi

Page : 120-126


Abstract views : 10 times | PDF Download : 6 times

Analysis of Cryptographic Utilization with Merkle-Damgård Algorithm

Peronika Ulianti Nainggolan, Dennis Afrilyans Manik, Laurenzio Gratian A. Daeli, Flory E Bako

Page : 127-132


Abstract views : 11 times | PDF Download : 4 times
View All Issues