Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)

IMPLEMENTASI ALGORITMA J-BIT ENCODING PADA KOMPRESI FILE TEKS Mizwar, Tedi; Ginting, Guidio Leonarde; Mesran, Mesran; Fau, Alwin; Aripin, Soeb; Siregar, Dodi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.503

Abstract

Data is important and has a very important role in the activities of computer use. In general, the size of data that is at this time has a very large size. So at the time of sending large data through the network would lead to waste in the use of network resources when the data is accessed by other users and make the storage media more efficient in storing the data. In this study used J-BIT compression algorithm to reduce the size of text files, thus reducing the file size on storage media.
Implementasi Algoritma AES (Advanced Encryption Standard) Untuk Keamanan File Hasil Radiologi di RSU Imelda Medan Hulu, Delisman; Nadeak, Berto; Aripin, Soeb
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2645

Abstract

Data security is very important for all users of an information system, recently cryptography has become the method used in data. Cryptography is the study of mathematical techniques in an original information or message (plaintext) into a hidden text (Chipertext) and then converted into the original message again. Cryptography has three important elements, namely key generation, encryption and description. In cryptography, the block cipher algorithm is known, which includes AES (Advanced Encyption Standard) which is part of the Modern Symmetric Key Cipher, this algorithm uses the same key during the encryption and description processes so that the data we have will be difficult to cooperate with its meaning. The algorithmic technique is used to measure data in the form of certain codes, for the purpose of so that the stored information cannot be read by anyone except authorized people. Therefore, a data security system is needed in sending radiological results to patients because radiological results are confidential to patients.Keywords: Algorithm, AES, Encryption, Description, Cryptography
IMPLEMENTASI ALGORITMA HORSPOOL PADA APLIKASI ISTILAH FASHION Azhar Azhar; Nasib Marbun; Soeb Aripin; Efori Buulolo
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1641

Abstract

The word fashion is synonymous with fashion, in today's digital era fashion has become a lifestyle that can introduce personality through fashion on social media. In the term fashion, there are many terms that form the basis of knowledge to match one's fashion. The term fashion is generally studied using foreign languages so that many ordinary people find it difficult to understand in more detail related to fashion terms so that there is a need for applications that adopt science related to the term fashion. An application that was built with the main objective to search for information such as fashion terms is inseparable from the existence of string matching. String matching can be interpreted as an activity that works to match something that is sought in a container with the contents stored in the container. Algortima string matching which is implemented to search for the meaning of the term fashion in this study is the Horspool algorithm. The horspool algorithm is a boyer-moore derivative algorithm, to go through the process when there is a mismatch of character patterns with text characters, the horspool algorithm uses bad-matches repeatedly until all the character patterns are found to have a match against the text. The results of the application built in this study can facilitate ordinary people who have difficulty finding information related to fashion terms more easily.Keywords: Implementation, Fashion Terms, Algorithms, Horspool
Penarapan Algoritma Prefix Code Dalam Kompresi File Video Muhammad Alfarizi; Soeb Aripin
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 4, No 1 (2020): The Liberty of Thinking and Innovation
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v4i1.2686

Abstract

Data compression technology is the process of converting a set of data into a lower coded representation of data that is not encoded with a certain encoding. Data compression is done by encoding each character into a shorter coded message, in order to save storage space requirements and time for data transmission. Compressing is used to speed up the sending process from uncoded characters to certain encoded characters. By compressing, large data will be reduced in size so as to save storage capacity. In this study, using the Prefix Code algorithm, by using this method the compression results are very good in making data transmission and transferring video file allocations easier and faster. By doing compression, large data will be reduced in size so that it can save storage space. There are many types of methods or algorithms in video file compression, but in this algorithm the writer only wants to know the compression process using the Prefix Code algorithm using the C1 code where the author has successfully compressed a video file with the prefix code algorithm using the C1 code has the ability to compress video file 37, 5% on a video file.Keywords: Compression, Video, File, Prefix Code, Algorithm.
IMPLEMENTASI ALGORITMA J-BIT ENCODING PADA KOMPRESI FILE TEKS Tedi Mizwar; Guidio Leonarde Ginting; Mesran Mesran; Alwin Fau; Soeb Aripin; Dodi Siregar
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.503

Abstract

Data is important and has a very important role in the activities of computer use. In general, the size of data that is at this time has a very large size. So at the time of sending large data through the network would lead to waste in the use of network resources when the data is accessed by other users and make the storage media more efficient in storing the data. In this study used J-BIT compression algorithm to reduce the size of text files, thus reducing the file size on storage media.