Claim Missing Document
Check
Articles

SISTEM INFORMASI ABSENSI MAHASISWA STMIK BUDI DARMA MEDAN BERBASIS WEB MOBILE Zebua, Taronisokhi; Pristiwanto, Pristiwanto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.480

Abstract

Pendataan kehadiran atau absensi mahasiswa sangat penting dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi termasuk di STMIK Budi Darma Medan. Masalah yang sering terjadi selama ini adalah banyaknya kesalahan penginputan jumlah kehadiran mahasiswa ke dalam sistem informasi akademik kampus yang dilakukan oleh pegawai program studi. Kesalahan tersebut sangat berpengaruh pada penentuan keikutsertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah. Hal inilah yang menjadi salah satu faktor terjadinya complain nilai akhir ujian semester dari mahasiswa kepada program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap efektif untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa berbasis web yang langsung dapat diakses oleh masing-masing dosen pada saat melaksanakan absensi mahasiswa. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN Hayati, Soraya Rahma; Mesran, Mesran; Zebua, Taronisokhi; Nurdiyanto, Heri; Khasanah, Khasanah
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.905

Abstract

The reception of journalists at the Waspada Daily Medan always went through several rigorous selections before being determined to be accepted as journalists at the Waspada Medan Daily. There are several criteria that must be possessed by each participant as a condition for becoming a journalist in the Daily Alert Medan. To get the best participants, the Waspada Medan Daily needed a decision support system. Decision Support Systems (SPK) are part of computer-based information systems (including knowledge-based systems (knowledge management)) that are used to support decision making within an organization or company. Decision support systems provide a semitructured decision, where no one knows exactly how the decision should be made. In this study the authors applied the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) as the method to be applied in the decision support system application. The VIKOR method is part of the Multi-Attibut Decision Making (MADM) Concept, which requires normalization in its calculations. The expected results in this study can obtain maximum decisions.Keywords: Journalist Acceptance, Decision Support System, VIKOR
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL Winafil, Mahadi; Sinurat, Sinar; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.975

Abstract

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN INTERNET SERVICE PROVIDER MENERAPKAN METODE ELIMINATION AND CHOICE TRANSLATION REALITY (ELECTRE) Dahanum, Ismay; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.506

Abstract

Internet users find it difficult to compare and know the quality of services provided by Internet Service Providers (ISP), most Internet users choose an Internet Service Provider (ISP) based on the experience and advice of other users. This is not necessarily appropriate to the needs, because a valid decision must be considered and taken into account from the criteria available to obtain a decision. Decision support systems are designed to help decision making and are interpreted as a datadriven model system that has procedures in data processing and data processing results used to make a decision. Therefore, with the construction of decision support systems can help Internet users in making more efficient decisions. The method used in decision support systems is Elimintaion And Choice Translation Realty (ELECTRE). with the establishment of an Internet Service Provider (ISP) decision support system by applying the ELECTRE method that is expected to assist internet users in determining the Internet Service Provider (ISP) that suits their needs.
PENERAPAN THE EXTENDED PROMETHEE II (EXPROM II) UNTUK PENENTUAN PRODUK DISKON Silalahi, Yohanna; Mesran, Mesran; Zebua, Taronisokhi; Suginam, Suginam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.473

Abstract

Salah satu alternatif strategi pemasaran yang dilakukan oleh Swalayan Palem Store adalah pemberian diskon atau potongan harga untuk produk-produk tertentu dalam periode waktu tertentu. Penentuan produk diskon harus dilakukan dengan pertimbangan dan perhitungan yang tepat. Kesalahan dalam penentuan produk diskon membuat swalayan kehilangan keuntungan bahkan mengalami kerugian. Salah satu solusi untuk permasalahan tersebut dengan menggunakan Sistem Pendukung Keputusan (SPK). Sistem Pedukung Keputusan (SPK) dapat membantu pimpinan swalayan dalam mengambil keputusan untuk menentukan produk diskon yang tepat dan meningkatkan efesiensi keputusan tersebut. Sistem pendukung keputusan memiliki beberapa tahapan sebelum menyelesaikan permasalahan yang ada. Tahapan-tahapan tersebut antara lain studi kelayakan, perancangan, pemilihan dan implementasi.The Extended Promethee (EXPROM II) merupakan salah satu metode penentuan urutan atau prioritas dalam analisis multikriteria. EXPROM II membandingkan alternatif yang satu dengan alternatif yang lainnya dan menghitung jarak selisih alternatif berpasangan sehingga menghasilkan output yaitu perangkingan alternatif berdasarkan nilai net flow tertinggi. Penentuan produk diskon yang tepat dan efektif memberikan dampak positif untuk swalayan karena dapat meningkatkan penjualan secara keseluruhan.
IMPLEMENTASI ALGORITMA CHUA CHAOTIC NOISE PADA ENKRIPSI CITRA RGB Lubis, Utami Rahma Sari; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.501

Abstract

Now this information technology users using computers as his media greatly increased .An effective security of a system was technology information is really needed to day-to-day activities , the issue of security and secrecy is one of the important aspect of a message , data , or information. One of them is image , image is one part of the department of multimedia of what is important. The image of presenting information visually and information presented by an image richer than served in a textual. One way to secure imagery is with the process of encryption , encryption is the process of turning plaintext into chipertext , one of the methods that could be used is an algorithm chua chaotic noise that is the algorithms that having a manner of working with each pixel count that were on the image of pictures and then do rotation pixels in vertical synchronization and horizontal based on the length of pixels of any result rotation pixel image so that encryption would come out the more random. Sensitivity his on the early can also cause to change a significant impact on his iteration. Sensitivity is very talk in cryptography that corresponded to the principle of diffusion. To the principle of this diffusion then transformation of one bit of an initial value of chaos can cause chipertext still not succeed in decryption
Sistem Pakar Untuk Mendiagnosa Kerusakan Mesin Wet And Dry Vacum Cleaner Menggunakan Metode Certainty Factor (Studi Kasus: PT. ISS Indonesia) Zega, Zulfan Anugerah; Nadeak, Berto; Zebua, Taronisokhi
JURIKOM (Jurnal Riset Komputer) Vol 5, No 2 (2018): April 2018
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (270.193 KB) | DOI: 10.30865/jurikom.v5i2.661

Abstract

Wet and Dry Vacuum Cleaner machines are often damaged, thus slowing down the work of cleaning service operators in completing a job. The slow technician in finding the solution of damage to Wet and Dry Vacum Cleaner machine and schedule of technicians who have been determined in two times a month to check on the condition of Wet and Dry Vacum Cleaner machine in the areas become one of the causes of inhibition of the work of cleaning service operators causing the loss on the side of time efficiency and cost incurred by the company. One solution that can be given to solve the problems being faced by PT. ISS Indonesia is utilizing an expert system-based applications. Expert system application that serves as a solution of the above problems work based on Certainty Factor method built with Microsoft Visual Studio 2008 programming language integrated with MySQL database to store data that become symptom and rules needed when doing the diagnosis by the system. This research will produce the output that is if user or user of a system does the diagnosis by choosing answer given by system through consultation form hence will yield output result of diagnosis of damage in the form of confidence level and solution of damaged machine Wet and Dry Vacum Cleaner.
Penerapan Metode Sobel Edge Detection dan Image Processing Untuk Mengetahui Diameter Apel Fuji Menggunakan Aplikasi Matlab Hasibuan, Alima Hakkon; Zebua, Taronisokhi; Hondro, Rivalri Kristianto
JURIKOM (Jurnal Riset Komputer) Vol 7, No 3 (2020): Juni 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (450.915 KB) | DOI: 10.30865/jurikom.v7i3.2261

Abstract

Fuji apples (Malus Domestika) are fruits that contain a lot of antioxidants. Besides the fruit flesh, the apple also contains pectin. Fuji apples are red and have a yellow line. The size of apples can affect the selling price of apples, the determination of the size of apples can be seen from the size of the diameter, measuring the diameter of apples is usually done visually by comparing apples. Based on these problems, a research is needed to develop a system to determine the diameter of fuji apples by using image processing techniques to find the diameter. This measurement process uses the matlab application and tests with the sobel edge detection method and image processing to see the more visible edges of the lines. The results showed that the developed system was able to obtain images and identify the diameter of fuji apples
PENERAPAN ALGORITMA NEAREST NEIGHBOR DALAM MEMPREDIKSI KELAYAKAN PENERIMAAN KARTU KREDIT PADA BANK CIMB NIAGA Ndruru, Eferoni; Zebua, Taronisokhi
METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi Vol. 5 No. 1 (2019): Maret 2019
Publisher : Universitas Methodist Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46880/mtk.v5i1.410

Abstract

A credit card application is a financial facility that allows a person or business entity to borrow money to buy a product and pay it back within a specified time. Credit card manufacture often experiences risk in providing credit, both moderate, good and very good risk, due to lack of data analysis and lack of attention. So the purpose of this study is to analyze the risks that often occur in making credit cards. And provide efficient solutions. In solving this problem, it is necessary to apply the method. The method used in this study is Nearest Neighbor. The Nearest Neighbor algorithm is an approach to finding cases by calculating the proximity between new cases (testing data) and old cases (training data), which is based on matching the weights of a number of existing features. Therefore, it can be applied in analyzing old customer data with data new so that comparisons can be made whether or not it is eligible to receive credit. The results obtained in this study are the results of testing systems and methods by producing a level of risk.
IMPLEMENTASI ALGORITMA LEVENSTEIN DALAM MENGKOMPRESI TEKS PADA APLIKASI RANGKUMAN PENGETAHUAN ALAM LENGKAP Winda, Winda; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1594

Abstract

The size of the data that is owned by an application today is very influential on the amount of space in the memory needed one of which is a mobile-based application. One mobile application that is widely used by students and the public at this time is the Complete Natural Knowledge Summary (Rangkuman Pengetahuan Alam Lengkap or RPAL) application. The RPAL application requires a large amount of material storage space in the mobile memory after it has been installed, so it can cause this application to be ineffective (slow). Compression of data can be used as a solution to reduce the size of the data so as to minimize the need for space in memory. The levestein algorithm is a compression technique algorithm that can be used to compress material stored in the RPAL application database, so that the database size is small. This study describes how to compress the RPAL application database records, so as to minimize the space needed on memory. Based on tests conducted on 128 characters of data (200 bits), the compression results obtained of 136 bits (17 characters) with a compression ratio is 68% and redundancy is 32%.Keywords: compression, levestein, aplication, RPAL, text, database, mobile