Sequential Search Algorithm And MD5 In Web-Based Goods Inventory Application

##plugins.themes.bootstrap3.article.main##

Doni Alfiyan Septi Andryana Ira Diana Sholihati

Abstract

Along with the development of IT companies began to utilize information systems. This technique makes it easier to find data so it is widely used. And also, if the data is stored using computerized techniques, the data information will be stored properly so as to avoid delays if you are still using a manual system. The system design method uses Agile software development. The programming language used to make the application is PHP, HTML, CSS, Javascript and the DBMS (Database Management System) used is MySQL. The source code is created using the Sublime text editor application. After creating the application, the next researcher conducted testing using the black box testing method. This goods inventory application was developed using the PHP programming language on a web-based platform to make it easier to access from various platforms that only require a browser. The Sequential Search and MD5 algorithms are implemented in a data search system and inventory in a warehouse that has security so that it makes it easier to search data, view stock of goods and company data is protected from people who are not prioritized so that it is more effective and efficient. The results of this study are that the existence of this inventory system application makes it easier in the storage process, reduces risks in the product search process and data security is more guaranteed.

##plugins.themes.bootstrap3.article.details##

Section
Articles
References
A. Munandar, “Perancangan Aplikasi Penjualan Berbasis Web Pada Toko Sport Ipal,” p. 833, 2016, [Online]. Available: www.stmikpringsewu.ac.id
[2] M. Syarif, Y. Kurniawan, and Ardiyansyah, “Rancang Bangun Aplikasi Penjualan Dan Pembelian Berbasis Web Pada Toko Soliders Shop Galing Kabupaten Sambas,” Jurnal Informatika Kaputama(JIK), vol. 4, no. 2, 2020.
[3] M. Elsa Aryani and S. Tendean, “Perancangan Sistem Informasi Penjualan Pada Toko Berkat Sesama,” MASITIKA, vol. 6, 2021.
[4] R. Tarigan and D. Ardiansyah, “Perancangan Aplikasi Inventory Barang Pada Cv. Mr Lestari Berbasis Web,” Jurnal SIMIKA, vol. 3, no. 2, 2020.
[5] Nurhadi and Muhammad Ridwan, “Sistem Informasi Inventaris Berbasis Web Menggunakan Metode Prototype,” Jurnal Multidisiplin Madani, vol. 2, no. 9, pp. 3543–3550, Sep. 2022, doi: 10.55927/mudima.v2i9.1143.
[6] R. R. Maulana and R. T. Komala Sari, “Algoritma Sequential Search dan MD5 Pada Sistem Informasi Stok Barang,” Jurnal Teknologi Informatika dan Komputer, vol. 8, no. 1, pp. 1–14, Mar. 2022, doi: 10.37012/jtik.v8i1.775.
[7] M. I. Habibi, S. Andryana, and S. Ningsih, “Algoritma Binary Search Dan Sequential Searchpada Aplikasi Koperasi Sekolah Online Berbasis Web,” Sistem Siber Sosial, vol. 1, no. 2, pp. 63–72, 2022, Accessed: Nov. 05, 2022. [Online]. Available: http://unig.unas.ac.id:8080/ojs3/index.php/ss/article/view/111
[8] A. Ali and E. W. Faida, “Penerapan Algoritma Message Diggest Algorithm 5 Pada Login Sistem Informasi Managemen Rumah Sakit,” JOUTICA, vol. 7, no. 2, pp. 590–595, 2022.
[9] S. F. Pane, W. K. Sari, and Z. A. Wicaksono, Membuat Aplikasi Pengolahan Data Administrasi Barang Menggunakan Aplikasi Apex Online. Bandung: Kreatif Industri Nusantara, 2020.
[10] R. Arifin, N. Latif, and Supardi, “Sistem Informasi Pencatatan Inventaris Barang Pada Badan Penanggulangan Bencana Daerah (BPBD) Kab. Sorong Selatan,” Inspiration Jurnal Teknologi Informasi dan Komunikasi, vol. 11, no. 2, 2021.
[11] F. Nurzaman, “Pengembangan Sistem Otomatisasi Tagihan Menggunakan Metode Agile Software Development,” vol. 4, no. 1, 2020.
[12] W. Setyawati Wahyuni et al., “Penggunaan Algoritma Sequential Searching Pada Aplikasi Perpustakaan Berbasis Web,” JIPI (Jurnal Ilmiah Penelitian dan Pembelajaran Informatika), vol. 07, no. 02, pp. 294–302, 2022.
[13] A. Isroqmi, “Kemampuan Mahasiswa Memahami Logika Pemrograman Komputer Melalui Algoritma,” 2017. [Online]. Available: http://ejournal.unitaspalembang.ac.id/index.php/nabla/article/view/43
[14] R. Aprilia, N. A. Hasibuan, and K. Ulfa, “KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) PENERAPAN ALGORITMA LINEAR SEQUENTIAL SEARCH PADA APLIKASI KITAB FADHAIL AMAL BERBASIS MOBILE,” KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) , vol. 1, no. 1, pp. 342–346, 2017, [Online]. Available: http://ejurnal.stmik-budidarma.ac.id/index.php/komik
[15] I. Rahim, N. Anwar, A. Mulyo Widodo, K. Karsono Juman, and I. Setiawan, “Komparasi Fungsi Hash Md5 Dan Sha256 Dalam Keamanan Gambar Dan Teks,” Jurnal IKRAITH-INFORMATIKA , vol. 7, no. 2, p. 45, 2022, [Online]. Available: https://journals.upi-yai.ac.id/index.php/ikraith-informatika/issue/archive
[16] S. Sulastri, R. Defi, and M. Putri, “Implementasi Enkripsi Data Secure Hash Algorithm (SHA-256) dan Message Digest Algorithm (MD5) pada Proses Pengamanan Kata Sandi Sistem Penjadwalan Karyawan,” p. 71, Dec. 2018, [Online]. Available: https://journal.unnes.ac.id/nju/index.php/jte/article/view/18628
[17] B. K. Hutasuhut, S. Efendi, and Z. Situmorang, “Digital Signature untuk Menjaga Keaslian Data dengan Algoritma MD5 dan Algoritma RSA,” InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan), vol. 3, no. 2, pp. 164–169, Mar. 2019, doi: 10.30743/infotekjar.v3i2.1019.
[18] M. M. I. Gultom and D. Saripurna, “Perancangan Sistem Keamanan Aplikasi E-Voting Untuk Pemilihan Ketua Badan Eksekutif Mahasiswa Fakultas Teknik UISU Dengan Menggunakan Algoritma MD5,” ALGORITMA: Jurnal Ilmu Komputer dan Informatika, vol. 3, no. 2, 2019.
[19] N. Zaatsiyah, “Implementing Digital Signature With Rsa And Md5 In Securing e-Invoice Document,” Jurnal Pendidikan Teknologi Informasi, vol. 5, no. 2, pp. 129–140, 2021.
[20] I. Saputra and S. D. Nasution, “Perbandingan Performa Algoritma Md5 Dan Sha-256 Dalam Membangkitkan Identitas File,” Jurnal Sains Komputer & Informatika (J-SAKTI), vol. 6, no. 1, pp. 172–187, 2022.