Claim Missing Document
Check
Articles

Penerapan Algoritma Ternary Comma Code Pada Aplikasi Kompresi File Gambar Nurma Ningsih; Surya Darma Nasution; Taronisokhi Zebua
Journal of Computer System and Informatics (JoSYC) Vol 1 No 3 (2020): Journal of Computer System and Informatics (JoSYC) - May 2020
Publisher : Forum Kerjasama Pendidikan Tinggi (FKPT)

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Since the discovery of a tool to capture an image (image) in the form of a camera making technological developments not only focus on the tools but also must focus on where the data is stored. The need for storage media is something that is needed in every communication tool. Data and information communication systems are not only in the form of text but can also be in the form of images, videos and audio. Image file size that is relatively larger compared to text files is one of the causes of the amount of memory used for storing image files. The size of the image file can also cause the length of time to send the image file. Image file compression process is one way that can be done to overcome the problem of image file size. Image compression is an attempt to minimize the file size or bytes of a graphic file without reducing the quality of existing images. A certain amount of storage, such as disk space or memory, makes it possible to reduce the image file size. Many algorithms that can be used to compress image file sizes include the ternary comma code algorithm that can help reduce image file sizes. The ternary comma code algorithm has a faster time space compared to other algorithms.
Pembangunan Web Mobile Absensi Mahasiswa Pada Platform Android Yang Terintegrasi Dengan Website Utama Sistem Informasi Akademik (SIA) STMIK Budi Darma Taronisokhi Zebua; - Pristiwanto
Jurnal Teknik Informatika UNIKA Santo Thomas Vol 2 No. 1 Tahun 2017
Publisher : LPPM UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.579 KB) | DOI: 10.17605/jti.v2i1.48

Abstract

Abstrak Kegiatan pendataan kehadiran atau absensi mahasiswa sangat vital dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi. Kegiatan pendataan absensi mahasiswa pada STMIK Budidarma Medan menjadi tanggungjawab dosen pengampu mata kuliah. Kesalahan penginputan kehadiran mahasiswa ke dalam sistem yang disajikan pada Daftar Nilai Ujian Akhir sangat berpengaruh pada syarat keikut sertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah, sehingga hingga saat ini complain nilai akhir ujian semester oleh mahasiswa sering diterima oleh program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap vital untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa melalui web mobile pada platform android. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Web mobile yang dibagun terintegrasi dengan database website utama Sistem Informasi Akademik (SIA) STMIK Budidarma yang sedang digunakan saat ini. Pengaksesan web mobile ini dapat dilakukan dengan menggunakan handphone android oleh dosen pengampu matakuliah untuk melakukan proses penginputan data kehadiran mahasiswa pada saat tatapmuka perkuliahaan berlangsung. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Mia Diana; Taronisokhi Zebua
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Pengenalan Dasar Aplikasi Blender 3D dalam Pembuatan Animasi 3D Taronisokhi Zebua; Berto Nadeak; Soni Bahagia Sinaga
Jurnal ABDIMAS Budi Darma Vol 1, No 1 (2020): Agustus 2020
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (714.8 KB) | DOI: 10.30865/pengabdian.v1i1.2288

Abstract

Teknologi di bidang desain animasi saat ini sangat berkembang dan banyak diminati oleh kalangan milenial. Salah satu bidang yang banyak memanfaatkan animasi adalah pada bidang iklan dan perfileman. Informasi yang disampaikan melalui animasi menjadi sangat menarik dan mudah dipahami oleh audiens. Pembuatan animasi sangat membutuhkan konsentrasi, pemahaman konsep desain serta imajinasi terhadap kontent yang akan dibuat. Ada banyak aplikasi yang dapat digunakan dalam pembuatan animasi, salah satunya adalah aplikasi Blender Kegiatan pengabdian ini akan menguraikan pengenalan dasar-dasar penggunaan aplikasi blender 2,74 untuk membuat animasi 3d. Kegiatan ini dilaksanakan di LPK Ernala Medan yang merupakan salah satu LPK pelaksanan program pelatihan desain grafis.Kata Kunci: Pelatihan, Desain, Animasi, Aplikasi, Blender 3D
Message Security on Chat App based on Massey Omura Algorithm Taronisokhi Zebua; Rivalri Kristianto Hondro; Eferoni Ndruru
IJISTECH (International Journal of Information System and Technology) Vol 1, No 2 (2018): May
Publisher : Sekolah Tinggi Ilmu Komputer (STIKOM) Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/ijistech.v1i2.11

Abstract

Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
Pembangunan Web Mobile Absensi Mahasiswa Pada Platform Android Yang Terintegrasi Dengan Website Utama Sistem Informasi Akademik (SIA) STMIK Budi Darma Taronisokhi Zebua; - Pristiwanto
Jurnal Teknik Informatika UNIKA Santo Thomas Vol 2 No. 1 Tahun 2017
Publisher : LPPM UNIKA Santo Thomas

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (586.579 KB) | DOI: 10.17605/jti.v2i1.48

Abstract

Abstrak Kegiatan pendataan kehadiran atau absensi mahasiswa sangat vital dalam pelaksanaan kegiatan akademik pada setiap perguruan tinggi. Kegiatan pendataan absensi mahasiswa pada STMIK Budidarma Medan menjadi tanggungjawab dosen pengampu mata kuliah. Kesalahan penginputan kehadiran mahasiswa ke dalam sistem yang disajikan pada Daftar Nilai Ujian Akhir sangat berpengaruh pada syarat keikut sertaan mahasiswa pada ujian akhir semester maupun pada penetapan nilai ujian akhir mahasiswa pada Kartu Hasil Studi (KHS) oleh dosen pengampu matakuliah, sehingga hingga saat ini complain nilai akhir ujian semester oleh mahasiswa sering diterima oleh program studi maupun dosen pengampu matakuliah. Salah satu solusi yang dianggap vital untuk menyelesaikan permasalahan di atas adalah membangun sebuah layanan informasi absensi mahasiswa melalui web mobile pada platform android. Layanan ini diyakini sangat membantu entitas yang berperan dalam pengolahan data absensi kehadiran mahasiswa menjadi informasi yang lebih akurat. Web mobile yang dibagun terintegrasi dengan database website utama Sistem Informasi Akademik (SIA) STMIK Budidarma yang sedang digunakan saat ini. Pengaksesan web mobile ini dapat dilakukan dengan menggunakan handphone android oleh dosen pengampu matakuliah untuk melakukan proses penginputan data kehadiran mahasiswa pada saat tatapmuka perkuliahaan berlangsung. Layanan ini juga dapat dimanfaatkan oleh orangtua mahasiswa untuk mengontrol dan mengetahui kehadiran anaknya.
SISTEM PENDUKUNG KEPUTUSAN PEMILIHAN PERUMAHAN DENGAN METODE SIMPLE ADDITIVE WEIGHTING (SAW) Hartika Manao; Berto Nadeak; Taronisokhi Zebua
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 1, No 2 (2017): Juni 2017
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v1i2.327

Abstract

Housing is a basic human need and needs to be nurtured and developed for the sake of the continuity and improvement of people's lives and settlements that can not be seen as a means of necessity solely, but more than that is the process of human settlements in creating a space of life to socialize themselves in expressing their identity. During this time customers make housing selection based on information from others, observing housing and experience by not considering the criteria needed so often cause new problems for the customer after buying housing. Problems such as inconvenience, credit installment problems and so forth. Decision support systems are generally defined as a system capable of producing solutions and problem- solving. Decision support systems are not intended to replace decision-making roles, but to assist and support decision makers. One of the most commonly used methods in decision support systems is the simple additive weighting (SAW) method. This simple additive weighting method can determine the preference value of each alternative, then perform the warfare process that can select the best alternative from a number of alternatives available.
Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force Taronisokhi Zebua; Natalia Silalahi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jurasik.v3i0.67

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.
Optimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS Mia Diana; Taronisokhi Zebua
J-SAKTI (Jurnal Sains Komputer dan Informatika) Vol 2, No 1 (2018): EDISI MARET
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (727.978 KB) | DOI: 10.30645/j-sakti.v2i1.52

Abstract

The key in the cryptography algorithm is a very important role in the process of encryption and decryption. The more random key numbers are used, the more random the ciphers are generated. The RC4 algorithm and the Beaufort cipher are algorithms of cryptographic techniques. The RC4 algorithm has advantages in generating random keys, whereas Beaufort ciphers have a disadvantage in terms of the number of keys used too much. This research describes how to optimize key formation in Beaufort algorithm by utilizing the key generation process on the RC4 algorithm which is implemented on encoding SMS which until now has not been point-to-point (not directly sent to destination). The results of this study provide convenience for users in the process of generating encryption and decryption keys and generate SMS cipher more random and difficult to understand by others.
Aplikasi Saran Buku Bacaan Bagi Pengunjung Perpustakaan AMIK STIEKOM Sumatera Utara Berdasarkan Algoritma Brute Force Taronisokhi Zebua; Natalia Silalahi
Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) Vol 3 (2018): Edisi Juli
Publisher : STIKOM Tunas Bangsa Pematangsiantar

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (826.679 KB) | DOI: 10.30645/jurasik.v3i0.67

Abstract

Service of information about books in a library is very helpful and makes it easier for visitors to find the book they want to find. Presentation of information on books available in the library of AMIK Stiekom North Sumatra has not been effective and efficient, because it is still done by looking at the library employee records on the list of books that have been provided. This problem becomes one of the factors to decrease interest in reading the library visitors. Utilization of application suggestions reading books in the library of AMIK Stiekom North Sumatra can be used as a trigger of the interest of visitors to keep reading books available in the library. The built-in book suggestion app works based on brute-force algorithms so that it can present book information relevant to the topic being searched by the visitors.