Claim Missing Document
Check
Articles

Found 22 Documents
Search
Journal : KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)

SISTEM INFORMASI ABSENSI MAHASISWA STMIK BUDI DARMA MEDAN BERBASIS WEB MOBILE Zebua, Taronisokhi; Pristiwanto, Pristiwanto
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.480

Abstract

Pendataan kehadiran atau absensi mahasiswa sangat penting dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi termasuk di STMIK Budi Darma Medan. Masalah yang sering terjadi selama ini adalah banyaknya kesalahan penginputan jumlah kehadiran mahasiswa ke dalam sistem informasi akademik kampus yang dilakukan oleh pegawai program studi. Kesalahan tersebut sangat berpengaruh pada penentuan keikutsertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah. Hal inilah yang menjadi salah satu faktor terjadinya complain nilai akhir ujian semester dari mahasiswa kepada program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap efektif untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa berbasis web yang langsung dapat diakses oleh masing-masing dosen pada saat melaksanakan absensi mahasiswa. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
IMPLEMENTASI METODE VIKOR DALAM PENERIMAAN JURNALIS PADA KORAN WASPADA MEDAN Hayati, Soraya Rahma; Mesran, Mesran; Zebua, Taronisokhi; Nurdiyanto, Heri; Khasanah, Khasanah
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.905

Abstract

The reception of journalists at the Waspada Daily Medan always went through several rigorous selections before being determined to be accepted as journalists at the Waspada Medan Daily. There are several criteria that must be possessed by each participant as a condition for becoming a journalist in the Daily Alert Medan. To get the best participants, the Waspada Medan Daily needed a decision support system. Decision Support Systems (SPK) are part of computer-based information systems (including knowledge-based systems (knowledge management)) that are used to support decision making within an organization or company. Decision support systems provide a semitructured decision, where no one knows exactly how the decision should be made. In this study the authors applied the VlseKriterijumska Optimizacija I Kompromisno Resenje (VIKOR) as the method to be applied in the decision support system application. The VIKOR method is part of the Multi-Attibut Decision Making (MADM) Concept, which requires normalization in its calculations. The expected results in this study can obtain maximum decisions.Keywords: Journalist Acceptance, Decision Support System, VIKOR
IMPLEMENTASI ALGORITMA ADVANCED ENCRYPTION STANDARD DAN TRIPLE DATA ENCRYPTION STANDARD UNTUK MENGAMANKAN CITRA DIGITAL Winafil, Mahadi; Sinurat, Sinar; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v2i1.975

Abstract

Digital images that are personal and confidential are very vulnerable to wiretapping by irresponsible parties. Especially if distributed via the internet network such as on Facebook, WhatsApp and e-mail chat based applications. Images that are sent sometimes are often confidential images and must be maintained. In order to maintain the security of digital images can be done by utilizing cryptographic techniques. Cryptographic techniques can secure digital images by changing pixel values from digital images so as to produce different pixel values from the original image to be secured. This research will use AES 128 bit and Triple DES methods for encryption and decryption of digital images on client-server based applications. The results of the encryption AES algorithm will be re-encrypted with the Triple DES Algorithm so as to produce pixel values that are far different from the original pixel values. Keywords: cryptography, image, AES, Triple DES
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN INTERNET SERVICE PROVIDER MENERAPKAN METODE ELIMINATION AND CHOICE TRANSLATION REALITY (ELECTRE) Dahanum, Ismay; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.506

Abstract

Internet users find it difficult to compare and know the quality of services provided by Internet Service Providers (ISP), most Internet users choose an Internet Service Provider (ISP) based on the experience and advice of other users. This is not necessarily appropriate to the needs, because a valid decision must be considered and taken into account from the criteria available to obtain a decision. Decision support systems are designed to help decision making and are interpreted as a datadriven model system that has procedures in data processing and data processing results used to make a decision. Therefore, with the construction of decision support systems can help Internet users in making more efficient decisions. The method used in decision support systems is Elimintaion And Choice Translation Realty (ELECTRE). with the establishment of an Internet Service Provider (ISP) decision support system by applying the ELECTRE method that is expected to assist internet users in determining the Internet Service Provider (ISP) that suits their needs.
PENERAPAN THE EXTENDED PROMETHEE II (EXPROM II) UNTUK PENENTUAN PRODUK DISKON Silalahi, Yohanna; Mesran, Mesran; Zebua, Taronisokhi; Suginam, Suginam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.473

Abstract

Salah satu alternatif strategi pemasaran yang dilakukan oleh Swalayan Palem Store adalah pemberian diskon atau potongan harga untuk produk-produk tertentu dalam periode waktu tertentu. Penentuan produk diskon harus dilakukan dengan pertimbangan dan perhitungan yang tepat. Kesalahan dalam penentuan produk diskon membuat swalayan kehilangan keuntungan bahkan mengalami kerugian. Salah satu solusi untuk permasalahan tersebut dengan menggunakan Sistem Pendukung Keputusan (SPK). Sistem Pedukung Keputusan (SPK) dapat membantu pimpinan swalayan dalam mengambil keputusan untuk menentukan produk diskon yang tepat dan meningkatkan efesiensi keputusan tersebut. Sistem pendukung keputusan memiliki beberapa tahapan sebelum menyelesaikan permasalahan yang ada. Tahapan-tahapan tersebut antara lain studi kelayakan, perancangan, pemilihan dan implementasi.The Extended Promethee (EXPROM II) merupakan salah satu metode penentuan urutan atau prioritas dalam analisis multikriteria. EXPROM II membandingkan alternatif yang satu dengan alternatif yang lainnya dan menghitung jarak selisih alternatif berpasangan sehingga menghasilkan output yaitu perangkingan alternatif berdasarkan nilai net flow tertinggi. Penentuan produk diskon yang tepat dan efektif memberikan dampak positif untuk swalayan karena dapat meningkatkan penjualan secara keseluruhan.
IMPLEMENTASI ALGORITMA CHUA CHAOTIC NOISE PADA ENKRIPSI CITRA RGB Lubis, Utami Rahma Sari; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.501

Abstract

Now this information technology users using computers as his media greatly increased .An effective security of a system was technology information is really needed to day-to-day activities , the issue of security and secrecy is one of the important aspect of a message , data , or information. One of them is image , image is one part of the department of multimedia of what is important. The image of presenting information visually and information presented by an image richer than served in a textual. One way to secure imagery is with the process of encryption , encryption is the process of turning plaintext into chipertext , one of the methods that could be used is an algorithm chua chaotic noise that is the algorithms that having a manner of working with each pixel count that were on the image of pictures and then do rotation pixels in vertical synchronization and horizontal based on the length of pixels of any result rotation pixel image so that encryption would come out the more random. Sensitivity his on the early can also cause to change a significant impact on his iteration. Sensitivity is very talk in cryptography that corresponded to the principle of diffusion. To the principle of this diffusion then transformation of one bit of an initial value of chaos can cause chipertext still not succeed in decryption
IMPLEMENTASI ALGORITMA LEVENSTEIN DALAM MENGKOMPRESI TEKS PADA APLIKASI RANGKUMAN PENGETAHUAN ALAM LENGKAP Winda, Winda; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1594

Abstract

The size of the data that is owned by an application today is very influential on the amount of space in the memory needed one of which is a mobile-based application. One mobile application that is widely used by students and the public at this time is the Complete Natural Knowledge Summary (Rangkuman Pengetahuan Alam Lengkap or RPAL) application. The RPAL application requires a large amount of material storage space in the mobile memory after it has been installed, so it can cause this application to be ineffective (slow). Compression of data can be used as a solution to reduce the size of the data so as to minimize the need for space in memory. The levestein algorithm is a compression technique algorithm that can be used to compress material stored in the RPAL application database, so that the database size is small. This study describes how to compress the RPAL application database records, so as to minimize the space needed on memory. Based on tests conducted on 128 characters of data (200 bits), the compression results obtained of 136 bits (17 characters) with a compression ratio is 68% and redundancy is 32%.Keywords: compression, levestein, aplication, RPAL, text, database, mobile
PENERAPAN THE EXTENDED PROMETHEE II (EXPROM II) UNTUK PENENTUAN PRODUK DISKON Silalahi, Yohanna; Mesran, Mesran; Zebua, Taronisokhi; Suginam, Suginam
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.473

Abstract

Salah satu alternatif strategi pemasaran yang dilakukan oleh Swalayan Palem Store adalah pemberian diskon atau potongan harga untuk produk-produk tertentu dalam periode waktu tertentu. Penentuan produk diskon harus dilakukan dengan pertimbangan dan perhitungan yang tepat. Kesalahan dalam penentuan produk diskon membuat swalayan kehilangan keuntungan bahkan mengalami kerugian. Salah satu solusi untuk permasalahan tersebut dengan menggunakan Sistem Pendukung Keputusan (SPK). Sistem Pedukung Keputusan (SPK) dapat membantu pimpinan swalayan dalam mengambil keputusan untuk menentukan produk diskon yang tepat dan meningkatkan efesiensi keputusan tersebut. Sistem pendukung keputusan memiliki beberapa tahapan sebelum menyelesaikan permasalahan yang ada. Tahapan-tahapan tersebut antara lain studi kelayakan, perancangan, pemilihan dan implementasi.The Extended Promethee (EXPROM II) merupakan salah satu metode penentuan urutan atau prioritas dalam analisis multikriteria. EXPROM II membandingkan alternatif yang satu dengan alternatif yang lainnya dan menghitung jarak selisih alternatif berpasangan sehingga menghasilkan output yaitu perangkingan alternatif berdasarkan nilai net flow tertinggi. Penentuan produk diskon yang tepat dan efektif memberikan dampak positif untuk swalayan karena dapat meningkatkan penjualan secara keseluruhan.
ANALISIS PERBANDINGAN KINERJA ALGORITMA FIXED LENGTH BINARY ENCODING DAN ALGORITMA ELIAS GAMMA CODE DALAM KOMPRESI FILE TEKS Pratiwi, Dian; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 3, No 1 (2019): Smart Device, Mobile Computing, and Big Data Analysis
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v3i1.1623

Abstract

Now days, there are many algorithms developed for data compression, but there is no one that is good for compressing various types of files because of different characteristics or file structures. This research explained the result of two compression algorithms in order to know the performance comparison between the Fixed Length Binary Encoding (FLBE) algorithm and the elias gamma code algorithm in compressing text files, especially in format rtf. The parameters being compared are the ratio of compression, compression ratio, redundancy and time. Based on the test results show that the fixed length binary encoding algorithm is better than the elias gamma code algorithm where the average ratio of compression results of fixed length binary encoding algorithm is 1.66 bits while the elias gamma code is 1.62 bits. The average compression ratio of fixed length binary encoding algorithm is 60.9% while Elias Gamma Code is 62.20%. The average value of the redundancy of the fixed length binary encoding algorithm is 39.1% while the gamma code elias is 37.79%. The average time compression value of the fixed length binary encoding algorithm is 16 ms while the elias gamma code is 21 ms.Keywords: comparison, compression, FLBE algorithm, Elias Gamma Code Algorithm, text, rtf
IMPLEMENTASI ALGORITMA CHUA CHAOTIC NOISE PADA ENKRIPSI CITRA RGB Lubis, Utami Rahma Sari; Mesran, Mesran; Zebua, Taronisokhi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.501

Abstract

Now this information technology users using computers as his media greatly increased .An effective security of a system was technology information is really needed to day-to-day activities , the issue of security and secrecy is one of the important aspect of a message , data , or information. One of them is image , image is one part of the department of multimedia of what is important. The image of presenting information visually and information presented by an image richer than served in a textual. One way to secure imagery is with the process of encryption , encryption is the process of turning plaintext into chipertext , one of the methods that could be used is an algorithm chua chaotic noise that is the algorithms that having a manner of working with each pixel count that were on the image of pictures and then do rotation pixels in vertical synchronization and horizontal based on the length of pixels of any result rotation pixel image so that encryption would come out the more random. Sensitivity his on the early can also cause to change a significant impact on his iteration. Sensitivity is very talk in cryptography that corresponded to the principle of diffusion. To the principle of this diffusion then transformation of one bit of an initial value of chaos can cause chipertext still not succeed in decryption