cover
Contact Name
Mesran
Contact Email
mesran.skom.mkom@gmail.com
Phone
-
Journal Mail Official
ejurnal.stmikbudidarma@gmail.com
Editorial Address
-
Location
Kota medan,
Sumatera utara
INDONESIA
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
ISSN : 25974610     EISSN : 25974645     DOI : -
Jurnal KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) adalah wadah publikasi bagi peneliti dalam bidang kecerdasan buatan, kriptografi, pengolahan citra, data mining, system pendukung keputusan, mobile computing, system operasi, multimedia, system pakar, GIS, jaringan computer.
Arjuna Subject : -
Articles 460 Documents
EVALUASI ANR PADA TRANSMISI DATA NETWORK TERHADAP WP-REST API DALAM APLIKASI ANDROID Riyadi, Agung
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/.v2i1.901

Abstract

The One of many way to connect to the database through the android application is using volleyball and RESTAPI. By using RestAPI, the android application does not directly connect to the database but there is an intermediary in the form of an API. In android development, Android-volley has the disadvantage of making requests from large and large data, so an evaluation is needed to test the capabilities of the Android volley. This research was conducted to test android-volley to retrieve data through RESTAPI presented in the form of an application to retrieve medicinal plant data. From the test results can be used by volley an error occurs when the back button is pressed, in this case another process is carried out if the previous volley has not been loaded. This error occurred on several android versions such as lollipops and marshmallows also on some brands of devices. So that in using android-volley developer need to check the request queue process that is carried out by the user, if the data retrieval process by volley has not been completed, it is necessary to stop the process to download data using volley so that there is no Android Not Responding (ANR) error.Keywords: Android, Volley, WP REST API, ANR Error
EVALUASI ANR PADA TRANSMISI DATA NETWORK TERHADAP WP-REST API DALAM APLIKASI ANDROID Agung Riyadi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/.v2i1.901

Abstract

The One of many way to connect to the database through the android application is using volleyball and RESTAPI. By using RestAPI, the android application does not directly connect to the database but there is an intermediary in the form of an API. In android development, Android-volley has the disadvantage of making requests from large and large data, so an evaluation is needed to test the capabilities of the Android volley. This research was conducted to test android-volley to retrieve data through RESTAPI presented in the form of an application to retrieve medicinal plant data. From the test results can be used by volley an error occurs when the back button is pressed, in this case another process is carried out if the previous volley has not been loaded. This error occurred on several android versions such as lollipops and marshmallows also on some brands of devices. So that in using android-volley developer need to check the request queue process that is carried out by the user, if the data retrieval process by volley has not been completed, it is necessary to stop the process to download data using volley so that there is no Android Not Responding (ANR) error.Keywords: Android, Volley, WP REST API, ANR Error
IMPLEMENTASI ALGORITMA RAITA SEARCH PADA APLIKASI FILSAFAT BERBASIS ANDROID Anggraini, Ratih; Hasibuan, Nelly Astuti; Suginam, Suginam; Waruwu, Fince Tinus
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/.v2i1.978

Abstract

Philosophy is the search for truth through a systematic flow of thinking, meaning that conversations about everything are carried out regularly following the prevailing system so that the stages are easy to follow. Etymologically philosophy comes from English and Greek, namely "philosophy" and "philein". This often causes difficulties to understand the meaning of the term philosophy. The term philosophy in general has a very large number so that to do the search for the meaning of the term philosophy in a philosophical book in the form of a printed book takes a long time because it must open one by one the book manually. To solve the problems described above the author builds an Android-based Philosophy application using eclipse juno. In order to simplify the search process for philosophical terms, the Raita search algorithm is implemented in the search feature contained in the Philosophy application. The raita search algorithm is a string matching algorithm with the arrangement of characters in a matched string that has the number and sequence of characters in the same string. Raita designed an algorithm by comparing the last character of the pattern starting from the far right character of the window. Android-based philosophy application that was built by the author in this study is expected to be an effective and efficient solution to get the search results of the meaning of the term philosophy in understanding the meaning of the term philosophy.Keywords: Implementation, Raita Search Algorithm, Philosophy Application, Android.
IMPLEMENTASI ALGORITMA RAITA SEARCH PADA APLIKASI FILSAFAT BERBASIS ANDROID Ratih Anggraini; Nelly Astuti Hasibuan; Suginam Suginam; Fince Tinus Waruwu
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 2, No 1 (2018): Peranan Teknologi dan Informasi Terhadap Peningkatan Sumber Daya Manusia di Era
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/.v2i1.978

Abstract

Philosophy is the search for truth through a systematic flow of thinking, meaning that conversations about everything are carried out regularly following the prevailing system so that the stages are easy to follow. Etymologically philosophy comes from English and Greek, namely "philosophy" and "philein". This often causes difficulties to understand the meaning of the term philosophy. The term philosophy in general has a very large number so that to do the search for the meaning of the term philosophy in a philosophical book in the form of a printed book takes a long time because it must open one by one the book manually. To solve the problems described above the author builds an Android-based Philosophy application using eclipse juno. In order to simplify the search process for philosophical terms, the Raita search algorithm is implemented in the search feature contained in the Philosophy application. The raita search algorithm is a string matching algorithm with the arrangement of characters in a matched string that has the number and sequence of characters in the same string. Raita designed an algorithm by comparing the last character of the pattern starting from the far right character of the window. Android-based philosophy application that was built by the author in this study is expected to be an effective and efficient solution to get the search results of the meaning of the term philosophy in understanding the meaning of the term philosophy.Keywords: Implementation, Raita Search Algorithm, Philosophy Application, Android.
KRIPTOGRAFI HYBRIDA MENGGUNAKAN ALGORITMA HILL CIPHER DAN ALGORITMA RSA UNTUK KEAMANAN PENGIRIMAN INFORMASI PADA EMAIL Pangaribuan, Lisda Juliana; Simbolon, Fauzi Haris
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.464

Abstract

This research aims to analyze the performance of the algorithm that can improve the security message with a hybrid cryptosystem using algorithm hill cipher and RSA asymmetric key with  a key so that the size of file after the encrypted small time for process encryption and decryption fast. The algorithm used is a modification algorithms Hill Cipher. This research uses  hybrid cryptosystem, which message is hidden by using hill cipher and the key is hidden by using RSA algorithm. The results of this research is that a better message security by making the hybrid cryptosystem using fingerprint image of sender as a key that will be secured because the encryption key is not equal tothe decryption key. Besides it is very difficult to guess the key figures for the sum of characters that is sent to the recipients key is not equal to the actual number of key characters. The time is used to decrypt the ciphertext with hybrid hill cipher and RSA algorithm for the number of characters and fingerprint image with the same threshold value turned out to be longer than the time that is used to decrypt the cipher text with hill cipher algorithm. The sum of characters (size of file) after encrypted and decrypted same. This is because the use of modulo 256 in the calculation of the encryption so the limit of character  after encrypted and decrypted between 0 to 255. Each character encrypted will be 1 ASCII character as well.
KRIPTOGRAFI HYBRIDA MENGGUNAKAN ALGORITMA HILL CIPHER DAN ALGORITMA RSA UNTUK KEAMANAN PENGIRIMAN INFORMASI PADA EMAIL Lisda Juliana Pangaribuan; Fauzi Haris Simbolon
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.464

Abstract

This research aims to analyze the performance of the algorithm that can improve the security message with a hybrid cryptosystem using algorithm hill cipher and RSA asymmetric key with  a key so that the size of file after the encrypted small time for process encryption and decryption fast. The algorithm used is a modification algorithms Hill Cipher. This research uses  hybrid cryptosystem, which message is hidden by using hill cipher and the key is hidden by using RSA algorithm. The results of this research is that a better message security by making the hybrid cryptosystem using fingerprint image of sender as a key that will be secured because the encryption key is not equal tothe decryption key. Besides it is very difficult to guess the key figures for the sum of characters that is sent to the recipient's key is not equal to the actual number of key characters. The time is used to decrypt the ciphertext with hybrid hill cipher and RSA algorithm for the number of characters and fingerprint image with the same threshold value turned out to be longer than the time that is used to decrypt the cipher text with hill cipher algorithm. The sum of characters (size of file) after encrypted and decrypted same. This is because the use of modulo 256 in the calculation of the encryption so the limit of character  after encrypted and decrypted between 0 to 255. Each character encrypted will be 1 ASCII character as well.
IMPLEMENTASI ALGORITMA KRIPTOGRAFI ONE TIME PAD (OTP) DENGAN DYNAMIC KEY LINEAR CONGRUENTIAL GENERATOR (LCG) Clawdia, Jhessica; Khairina, Nurul; Harahap, Muhammad Khoiruddin
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.465

Abstract

Algorithms have an important role in the era of digitalization, by understanding the concept of algorithms can keep information security protected from third parties. Securing a password can increase the security of the data so that the sender can be more comfortable when sending messages to others. This paper aims to make Keys on OTP dynamically generated using random number generator Linear Congruential Generator (LCG) Method. This discussion provides the benefit of an extension of insight that key modifications to OTP can be made and can be dynamically created. Based on the research done, with the random number generator method Linear congruential generator then the key becomes Unique. So there is no repetition of the same key. This depends on the range of random numbers.
IMPLEMENTASI ALGORITMA KRIPTOGRAFI ONE TIME PAD (OTP) DENGAN DYNAMIC KEY LINEAR CONGRUENTIAL GENERATOR (LCG) Jhessica Clawdia; Nurul Khairina; Muhammad Khoiruddin Harahap
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.465

Abstract

Algorithms have an important role in the era of digitalization, by understanding the concept of algorithms can keep information security protected from third parties. Securing a password can increase the security of the data so that the sender can be more comfortable when sending messages to others. This paper aims to make Keys on OTP dynamically generated using random number generator Linear Congruential Generator (LCG) Method. This discussion provides the benefit of an extension of insight that key modifications to OTP can be made and can be dynamically created. Based on the research done, with the random number generator method Linear congruential generator then the key becomes Unique. So there is no repetition of the same key. This depends on the range of random numbers.
HIGH AVAILABILITY NETWORK DESIGN UNIVERSITY CAMPUS NETWORK DENGAN MODEL HIRARKI (HIERARCHICAL NETWORK) Sulaiman, Oris Krianto; Nasution, Khairuddin; Siregar, Dodi
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (23.348 KB) | DOI: 10.30865/komik.v1i1.466

Abstract

Many of the problems that occur in large-scale computer network one of the problems is a complex network design and difficult to change because the system is running, one of these problems is within the university network, as is known the number of most Internet users come from the university, therefore design or reliable network design is required for good access at the university. Hierarchical network model is one of the efficient network design to be applied in large-scale networks. This model uses 3 layers (layer) namely core layer, distribution layer and access layer. Each layer will be maximized for use in the university network distribution layer will use inter vlan routing which will then be distributed to the faculties acting as the access layer. Network design with hierarchical model will also make it easier to monitor or monitor network traffic so it will be easy for the network administration in managing the work.
HIGH AVAILABILITY NETWORK DESIGN UNIVERSITY CAMPUS NETWORK DENGAN MODEL HIRARKI (HIERARCHICAL NETWORK) Oris Krianto Sulaiman; Khairuddin Nasution; Dodi Siregar
KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer) Vol 1, No 1 (2017): Intelligence of Cognitive Think and Ability in Virtual Reality
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/komik.v1i1.466

Abstract

Many of the problems that occur in large-scale computer network one of the problems is a complex network design and difficult to change because the system is running, one of these problems is within the university network, as is known the number of most Internet users come from the university, therefore design or reliable network design is required for good access at the university. Hierarchical network model is one of the efficient network design to be applied in large-scale networks. This model uses 3 layers (layer) namely core layer, distribution layer and access layer. Each layer will be maximized for use in the university network distribution layer will use inter vlan routing which will then be distributed to the faculties acting as the access layer. Network design with hierarchical model will also make it easier to monitor or monitor network traffic so it will be easy for the network administration in managing the work.

Page 1 of 46 | Total Record : 460