JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
https://journal.iteba.ac.id/index.php/jurnal_quancom
<p><strong>Jurnal Quancom</strong> : Jurnal Quantum Komputer adalah jurnal yang fokus pada bidang Teknik komputer atau rekayasa komputer khusus yang mengkombinasikan teknik elektro dan ilmu komputer. Jurnal ini secara konten akan mempublikasi berkaitan erat dengan perancangan, pengembangan dan sistem -sistem berbasis komputer. Artikel yang dapat diisi dalam jurnal Teknik Komputer ini mencakup: Internet of Things (IoT), Robotic, Artificial Intelligence, network. Jurnal ini akan terbit dua kali dalam setahun, pada <strong>Juni</strong> dan <strong>Desember</strong>.</p>LPPM-ITEBAen-USJURNAL QUANCOM: QUANTUM COMPUTER JURNAL2988-1005Prototype Mesin Pembuat Minuman Kopi Otomatis Terintegrasi Android
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/637
<p>Coffee is one of the popular drinks. The Indonesian people drink coffee is a tradition to celebrate togetherness values and strengthen ties of brotherhood between communities. Along with high mobility society, everything is demanded to be instant and efficient. Coffee drinkers can come from various professions, ages and social background. The automatic coffee maker designed to address people's needs for coffee with an efficient serving process. Input on this design are coffee, milk and sugar where these ingredients can be processed into several types drinks that can be chosen are based on coffee. Design and construction of a microcontroller and android based coffee making equipment devices used to support the system these include the Arduino Mega 2560 as a microcontroller, servo and DC motor as an actuator, DS18B20 sensor as a water temperature reader, solenoid valve to drain the flow, and LCD for displays the coffee selection menu. The payment medium used in this coffee drink making tool is QR-code as practical, easy and responsive transaction. This tool could be an alternative that can be implemented by coffee drinkers or enthusiasts can enjoy coffee at the bus stop instantly just by using their personal Android.</p>Mardhiah MasrilAyu Lestiani NasutionRuri Hartika ZainHasri AwalBilly Hendrik
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-30311710.62375/jqc.v3i1.637Perbandingan Algoritma Kriptografi Hash Sha 256 dan Sha 512 Untuk keamanan sandi
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/627
<p>Hash algorithms are still in great demand for use in data security but there are still many things that need to be tested Time and security of the hash algorithm. the author has tested the hash-256 algorithm and the hash-512 algorithm from testing both hash algorithms found a very unique comparison, namely the results of the hash-256 algorithm encryption of numeric characters are superior to the results of the hash-512 algorithm encryption for numeric characters when the original plaintext is returned. the conclusion is that the encryption of numeric characters from the hash-256 algorithm is safer to use than the results of the hash-512 algorithm encryption..</p>Toras Pangidoan Batubara TorasMhd Adi Setiawan Aritonang
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-303181210.62375/jqc.v3i1.627Analisis Terhadap Keamanan Password Menggunakan Hash SHA-256
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/431
<p>Di era digital saat ini, keamanan kata sandi merupakan salah satu elemen penting dalam melindungi data pengguna dari berbagai ancaman. Penelitian ini berfokus pada analisis algoritma hash SHA-256, yang dikenal luas karena kemampuannya menghasilkan nilai hash yang unik dan sulit ditebak. Dengan menggunakan simulasi beberapa pola kata sandi, penelitian ini mengevaluasi efektivitas algoritma tersebut dalam menghadapi serangan seperti brute force dan rainbow table. Hasil penelitian menunjukkan bahwa SHA-256 cukup andal untuk melindungi kata sandi dari serangan berbasis kolisi. Namun, kemampuan perangkat keras modern untuk mencoba miliaran kombinasi per detik menjadikan panjang dan kompleksitas kata sandi faktor utama dalam memperlambat upaya serangan. Studi ini memberikan gambaran tentang keunggulan dan keterbatasan SHA-256 dalam pengamanan sistem berbasis kata sandi. Diharapkan, penelitian ini dapat membantu pengembang memahami penerapan algoritma ini dalam membangun sistem keamanan yang lebih baik</p>Yen Rylin HutasoitVivaldi SimangunsongDesrico Siallagan
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-3031131710.62375/jqc.v3i1.431Metode Steganografi EOF untuk Penyisipan Pesan Teks Tersembunyi
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/434
<p><em>The transmission of information has become an essential aspect of human life in the modern technological era. Innovations continue to be developed to simplify and accelerate data exchange processes. However, threats to information security, such as data theft, sabotage, and unauthorized access, have also increased significantly. Therefore, innovative solutions are needed to protect information, especially confidential data involving two parties who wish to maintain its secrecy. In this context, research on steganography has become highly relevant. This study employs the End Of File (EOF) steganography technique, which enables embedding secret messages at the end of digital image files. This technique is chosen for its ability to conceal data without significantly altering the main structure of the image file. The embedding process is carried out meticulously so that the final product, known as the stego image, resembles an ordinary image file without any noticeable signs of modification. The primary advantage of the EOF technique lies in its efficiency in embedding and retrieving secret messages, making it a suitable solution for secure message transmission. The findings indicate that stego images produced using the EOF technique not only preserve the integrity of the original image but also enable quick and easy retrieval of messages by authorized recipients. This makes the technique an effective method to prevent data theft or sabotage during transmission. Amid the growing threats of cybercrime, EOF steganography offers an innovative solution to ensure information security while maintaining message confidentiality. Thus, it serves as a promising alternative for advancing future information security technologies.</em></p>Mega MalauSarah HutahaeanGilberd Siboro
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-3031182410.62375/jqc.v3i1.434Implementasi Keamanan Perangkat Lunak Menggunakan Algoritma Kriptografi dan Steganografi berbasis Web
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/445
<p>Software security has become very important in today's digital era, especially in protecting sensitive data that is often the target of cyber attacks. This research proposes a combination of Advanced Encryption Standard (AES) cryptographic algorithm and Least Significant Bit (LSB) steganography to enhance data security. By encrypting data using AES and hiding it in an image through the LSB method, this system not only protects the content of the data but also reduces the possibility of detection by third parties. The research method includes literature analysis, system prototype development, and testing to evaluate the effectiveness of the implementation. The test results show that the number of message characters has a significant effect on the image size after encoding and execution time. The more characters inserted, the image size increases proportionally, and the execution time for encryption and encoding also increases. This research is expected to contribute to the development of information security technology and practical solutions for software developers in improving application security.</p>Emalia Putri TelaumbanuaRivael SagalaAlvina Siallagan
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-3031253110.62375/jqc.v3i1.445Pemanfaatan K-Means Untuk Klasifikasi Citra Toge dan Jamur Enoki Berdasarkan Fitur Bentuk Dan Tekstur
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/610
<p>The Purpose of this study is to explore the application of the K-Means algorithm in the process of classification of toge and enoki mushroom images, focusing on the separation of objects based on visual characteristics extracted from the image of toge and enoki mushroom is a food ingredient that is often found in foods in Asia, although it has almost similar shapes, but bean beetroot and enoki mushroom belong to different families. where toge belongs to the Marasmiaceae family and enoki mushrooms belong to the Marasmiaceae family. The image classification process begins with taking pictures of toge and enoki mushrooms which are then analyzed to extract the features of shape and texture from the image. Shape features are obtained through calculations such as the object's area, perimeter, and width ratio, while texture features are calculated using the Gray Level Co-occurrence Matrix (GLCM) approach to obtain information on contrast, energy, and homogeneity. Furthermore, the K-Means algorithm is used to group images based on the similarity of the features generated. The results of the study show that the use of shape and texture features with the K-Means Clustering and GLCM algorithms can produce a good and effective classification in distinguishing bean sprouts and enoki mushrooms.</p>Devi MaryuniAgung Ramadhanu
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-3031323710.62375/jqc.v3i1.610Pengembangan Kontrol Robot Omnidirectional Menggunakan Sensor Gerakan Mpu 6050 Berbasis Internet Of Things (IoT)
https://journal.iteba.ac.id/index.php/jurnal_quancom/article/view/395
<p>Robotics is a field that encompasses interdisciplinary sciences, ranging from the mechanics of robot construction, electronics, and control systems to artificial intelligence. Initially, robotics was widespread in industry, often referred to as industrial robots. The Mini Trolley Robot provides a solution to issues related to flexibility in the room. The robot’s operation can be directed using motion sensors. This research aims to develop a controlled exploration system with an IoT-based mobile robot using the MPU6050 motion sensor. This aims to provide a solution to flexibility issues in complex environments without using traditional remote controls. The system uses the ESP32Wroom as the microcontroller, ESP32 Cam for video streaming, a driver module as the driver, DC motors, and a 12V to 5V converter. The ESP32 module allows good connectivity and remote control via a Wi-Fi network. The MPU6050 motion sensor can read tilt angles based on sensor data contained in the MPU6050 module. To access this sensor module, the I2C data line is used. This research employs the waterfall method, which includes stages of determining user requirements, followed by planning, modeling, construction, system delivery to users, and supporting the entire developed software. The motion sensor from the MPU6050 achieves a considerable range from 5 to 15 meters with accurate results, while reaching 19 meters results in a delay of 2 or 3 seconds.</p>Bimo Aryo PratamaDeosa Putra CaniagoM. Abrar MasrilLuki HernandoMuhammad Jufri
Copyright (c) 2025 JURNAL QUANCOM: QUANTUM COMPUTER JURNAL
2025-06-302025-06-3031384310.62375/jqc.v3i1.395